Net Optics Confidential and Proprietary 1 High-Availability Security Monitoring using Bypass Switches August, 2011 Intelligent Access and Monitoring Architecture.

Slides:



Advertisements
Similar presentations
Intrusion Detection/Prevention Systems Charles Poff Bearing Point.
Advertisements

©2012 Check Point Software Technologies Ltd. Bypass Support Feature Overview August 2012 Threat Prevention Team [Restricted] ONLY for designated groups.
Business Solutions Network Security Solutions Gateway Security
SHARKFEST '08 | Foothill College | March 31 - April 2, 2008 Non-Intrusive Out-of-Band Network Monitoring Utilizing a Data-Access Switch April 1, 2008 Patrick.
NERC Lessons Learned Summary December NERC lessons learned published in December 2014 Three NERC lessons learned (LL) were published in December.
Managed Premises Firewall. 2 Common IT Security Challenges Does my network security protect my IT environment and sensitive data and meet the regulatory.
MSIT 458: Information Security & Assurance By Curtis Pethley.
What is a Virtual Tap? Intelligent Access and Monitoring Architecture Solutions.
RIT Campus Data Network. General Network Statistics Over 23,000 wired outlets Over 14,500 active switched ethernet ports > 250 network closets > 1,000.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Net Optics Confidential and Proprietary Director xStream Intelligent Access and Monitoring Architecture Solutions.
Net Optics Virtualization Solutions Deployment Case Study Intelligent Access and Monitoring Architecture Solutions.
Lesson 1: Configuring Network Load Balancing
1© Copyright 2011 EMC Corporation. All rights reserved. EMC RECOVERPOINT/ CLUSTER ENABLER FOR MICROSOFT FAILOVER CLUSTER.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
It’s What You Can’t See That Will Sink You
Troubleshooting Software Tools vs. Professional Test Equipment.
Remote Monitoring and Desktop Management Week-7. SNMP designed for management of a limited range of devices and a limited range of functions Monitoring.
Solutions for Network Monitoring Access Performance Challenges Load Balancing Monitoring Access.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Net Optics Confidential and Proprietary Net Optics Launches Spyke Intelligent Access and Monitoring Architecture Solutions.
Net Optics Confidential and Proprietary Phantom Virtual Tap May 2011 Intelligent Access and Monitoring Architecture Solutions.
Net Optics Confidential and Proprietary 1 iLink Agg.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Net Optics Confidential and Proprietary Net Optics appTap Intelligent Access and Monitoring Architecture Solutions.
COEN 252 Computer Forensics
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
InfiniSwitch Company Confidential. 2 InfiniSwitch Agenda InfiniBand Overview Company Overview Product Strategy Q&A.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
Net Optics Confidential and Proprietary iLink Agg xStream Intelligent Access and Monitoring Architecture Solutions.
Challenges Facing IT Professionals Flat Budgets: “More with Less” Lack of Skilled Resources Expansion, Mergers & Acquisitions SLA’s and Uptime Requirements.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Chapter 5: Implementing Intrusion Prevention
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
A Snapshot on MPLS Reliability Features Ping Pan March, 2002.
FireProof. The Challenge Firewall - the challenge Network security devices Critical gateway to your network Constant service The Challenge.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
Net Optics Confidential and Proprietary 1 Bypass Switches Intelligent Access and Monitoring Architecture Solutions.
OSIsoft High Availability PI Replication
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 ver.2 Module 8 City College.
IT Priorities Minimize CAPEX Maximize employee productivity Grow the business Add new compute resources real- time to support growth Meet compliance requirements.
March 2010 Gig Zero Delay Tap. TP-CU3-ZD The Gig Zero Delay Tap is TP-CU3 enhanced with the industry’s first TRUE Zero Delay technology for 10/100/1000.
Lesson 2a © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1 Firewall Technologies and the Cisco Security Appliance.
Access Network Devices Remotely— Even if the Network is Down— with Out-of-Band Management.
A Snapshot on MPLS Reliability Features Ping Pan March, 2002.
IS3220 Information Technology Infrastructure Security
Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
FireEye NX In line Solution
1© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | REFERENCE ARCHITECTURE GUIDE ADDING SCALE & RESILIENCY TO YOUR FIREEYE NX DEPLOYMENTS.
IXIA + FIREEYE SECURITY BATTLECARD
CompTIA Security+ Study Guide (SY0-401)
HP ProCurve Alliance + Dr Carl Windsor CISSP Major Account Manager
Optical-Based Switching Solutions
Intrusion Prevention Systems
CCNA Network Fundamentals
CompTIA Security+ Study Guide (SY0-401)
Cloud Testing Shilpi Chugh.
Intrusion Detection system
(With Hybrid Network Support)
What’s New In WatchGuard Wi-Fi Cloud v8.6
Presentation transcript:

Net Optics Confidential and Proprietary 1 High-Availability Security Monitoring using Bypass Switches August, 2011 Intelligent Access and Monitoring Architecture Solutions

Net Optics Confidential and Proprietary 2 Guest Speakers Lannie Rhodes – Product Manager Lannie spent 25 years as a hardware design engineer at Intel, Tandem computers, and several start-up companies before shifting to a product management role. In her three years at Net Optics, she has been instrumental in building the control product line, making key contributions in the Director, iLink Agg, and xBalancer families. Lannie is also a writer; her booklets "Asic Basics" and "Developing Printed Circuit Assemblies" can be found on Amazon.com and Lulu.com. Her non- technical writing is published under the pen name Lannie Rose. Daniel Aharon – Director of Access Solutions Daniel’s background includes 20 years of experience in Enterprise software with a focus on application and transaction performance management and system management. Daniel has held leadership roles in Product Management, Engineering, and Business Development for market leaders such as Symantec, Veritas, OpTier and BMC.

Net Optics Confidential and Proprietary 3 Agenda Trends and challenges Highly reliable security monitoring How a Bypass Switch works High Availability Bypassing Configurations Net Optics Bypass Solutions Bypass Switch Benefits

Net Optics Confidential and Proprietary 4 Network Security Trends Threats Intrusions escalating in Sophistication Severity Frequency Malware and spam proliferating Insider attack vectors growing Responses IPS Systems Firewalls DLP Systems UTM Systems

Net Optics Confidential and Proprietary 5 The Security Monitoring Access Challenge Deploy today’s sophisticated security and compliance monitoring tools in-line in the network while minimizing the risk of downtime IPS DLP WAF DAM APM NGF

Net Optics Confidential and Proprietary 6 Bypass switches provide fail-safe ports for in-line security devices The Bypass Switch Solution Provides peace of mind when deploying new technology in-line Protects against power, link, and application failure Flexibility for testing, upgrades, and moves Fully passive –when Bypass Switch loses power, the link is still up Normal Operation (Bypass Off)

Net Optics Confidential and Proprietary 7 Bypass switches provide fail-safe ports for in-line security devices The Bypass Switch Solution Provides peace of mind when deploying new technology in-line Protects against power, link, and application failure Flexibility for testing, upgrades, and moves Fully passive –when Bypass Switch loses power, the link is still up IPS Failure (Bypass On – Fail OPEN)

Net Optics Confidential and Proprietary 8 Bypass switches provide fail-safe ports for in-line security devices The Bypass Switch Solution Provides peace of mind when deploying new technology in-line Protects against power, link, and application failure Flexibility for testing, upgrades, and moves Fully passive –when Bypass Switch loses power, the link is still up Normal Operation (Bypass Off)

Net Optics Confidential and Proprietary 9 Bypass switches provide fail-safe ports for in-line security devices The Bypass Switch Solution Provides peace of mind when deploying new technology in-line Protects against power, link, and application failure Flexibility for testing, upgrades, and moves Fully passive –when Bypass Switch loses power, the link is still up IPS Failure (Bypass On – Fail CLOSED)

Net Optics Confidential and Proprietary 10 What is a Tool Failure? Bypass Switch triggers on Loss of link between Bypass Switch and tool o Tool maintenance or redeployment Power loss to the Bypass Switch Heartbeat failure o Power loss to the tool o Tool dropping packets due to oversubscription o Tool processing packets too slowly o Tool software hung o Tool hardware failure

Net Optics Confidential and Proprietary 11 The Need for High Availability Monitoring If Bypass Switch fails OPEN to traffic, can you tolerate passing traffic without monitoring while a tool is down? –Intrusions and other attacks –Data loss –Compliance issues If Bypass Switch fails CLOSED to traffic, can you tolerate link down while a tool is down? –Loss of mission-critical applications –Customers cannot be serviced –$$$$$ impact

Net Optics Confidential and Proprietary 12 Redundant Tools Protect Against Tool Failure Traffic flows through primary IPS If primary IPS fails, traffic is routed through backup IPS When primary IPS recovers, traffic returns to it If both IPSs fail, traffic passed directly through the link

Net Optics Confidential and Proprietary 13 Redundant Links Protect Against Link Failure Traffic flows through the primary link and the IPS If the primary link fails, traffic from the backup link is routed through the IPS When primary link recovers, its traffic returns to the IPS The link traffic that is not being routed through the IPS is open to traffic flow Fault mirroring across the links is required so both endpoints are aware of any fault

Net Optics Confidential and Proprietary 14 Redundant Tools and Links Together Traffic flows through primary link and primary IPS If primary IPS fails, traffic from the active link is routed through backup IPS If the primary link fails, traffic from the backup link is routed through the active IPS

Net Optics Confidential and Proprietary 15 iBypass HD – Redundant Links & Tools Net Optics iBypass HD — High Density, eight Bypass Switches in a 1U appliance Four Dual Bypass Modules (DBMs) o Configure DBM as two independent Bypass Switches o Configure DBM as a single HA Bypass Switch with Tool redundancy and/or Link redundancy o Configure as a Bypass Switch plus a Tap

Net Optics Confidential and Proprietary 16 iBypass HD Features Manual (forced) Bypass On mode – Take tool offline immediately in case of emergency Acts as a Tap when traffic is bypassing the tool – Test signature set out in IDS mode Dual Heartbeat packets check both directions of data flow Link Fault Detection (LFD) — fault mirroring across Link Bypass Detection — signals tool that bypass is engaged Fail-open and fail-closed modes Remote monitoring (RMON) traffic statistics RADIUS and TACACS+ authentication and authorization Dual hot-swappable AC or DC redundant power supplies FiberCopper

Net Optics Confidential and Proprietary 17 Tap Mode While Bypassing Bypass Switch acts as a full-duplex breakout Tap while in Bypass ON mode – Use IPS as IDS to test new signature sets – Use as Tap when you don’t need a Bypass Switch FiberCopper Half-duplex mirrored traffic

Net Optics Confidential and Proprietary 18 Bypass Switch Benefits Protects links with IPSs and other in-line security monitoring tools against –Power failure (IPS or bypass switch) –Tool failure (hardware, software hangs or slowdowns) Increases solution reliability by independently checking the IPS and supporting High Availability (HA) network architectures Provides capability to take tools offline instantly when problems occur Provides flexibility to remove IPSs without interrupting link traffic; also flexibility to use as Taps Increases traffic visibility with RMON traffic statistics and remote manageability 10GigaBit iBypass Switch

Net Optics Confidential and Proprietary 19 Bypass Switch Interface 10GigaBit iBypass Switch

Net Optics Confidential and Proprietary 20 Question & Answer Please post questions to either the Chat or Q&A window To receive future invitations to our webinars, please sign up for our newsletter at the following URL:

Net Optics Confidential and Proprietary 21 Net Optics, Inc Thank You!