Sei sulla pagina 1di 35

Firewall

End-to-End Network Access Protection for System i

Overview

Firewall
A solution which secures every type of access to and from System i, within & outside the organization

Market Need
Hacking Open TCP/IP environment has increased System i risks
Many remote activities are now easy Initiating commands Installing programs Changing data Moving files

Limited ability to log/block unauthorized access


Internal Fraud FBI Study: the most significant threat to an organization's information systems comes from inside Control and follow-up on user access - a necessity

Firewall Features
Airtight protection from both internal and external threats
Covers more exit points than any other product Protection from User Level to Object Level Protects both incoming and outgoing IP addresses

Unique layered architecture - easy to use and maintain Excellent performance - especially in large environments User-friendly Wizards streamline rule definitions
Historical data statistics enable effective rule definition Best-Fit feature formulates rule to suit each security event

Detailed log of all access and actions Simulation Mode

Tests existing Firewall rules Enables defining rules based on the simulation

Reports in various formats: e-mail, print-out, HTML/PDF/CSV

Firewall Scenario

Monday, Midnight

OK, Im bored Lets do some quick hacking

Rob Black Hacker

5 Minutes Later
Got it! Im inside IronTrust Bank systems. I really need a new sports car Lets extract a few hundred thousands...

Tuesday, Midnight

OK, now lets try SMART Insurance this should take about 5 minutes!

Rob Black Hacker

One Minute Later

Our Firewall just blocked a break-in attempt. Ill have the identity, time and IP address in a minute.

Glenda Wright, Information Security Manager, SMART Insurance

5 Hours Later

Hey, what are all those security layers? And all these protected exit points I cant get through there goes my new car!

Rob Black Hacker

Firewall Info

Firewall Gateways

iSecurity Firewall Gateways IP Address User Verb File Library Commands Other products Gateways IP Address

i5 server

Firewall Adds Another Security Layer


Native IBM System i security suitable
for stand-alone systems External access bypasses IBM security System i is vulnerable in network environments
System i

BeforeFirewall With Firewall

Native IBM System i Security

Firewall
FTP Network PC Internet Telnet ODBC

Firewall - Layered Security Design

Exit Point Security

Reject Allow Level of Control

FYI Simulation Mode Emergency Override

IP/SNA Firewall

IP / SNA Name to Service

Subnet Mask Support

User/Verb

User-to-Service/Verb/IP/Device/ Application

Firewall User Groups IBM Group Profiles

Object

User-to-Object Management Rights Data Rights

User/Group/Supplem ental/ internal groups & Generic Names

Firewall - Layered Security Design (2)


Exit Point Control Standard Firewall User/Verb Object
FTP: Authorities Based onon IP User Home dir, CCSID, Encrypt FTP: Authorities Based IP & & User,

Remote Internet (WSG): User IP address Logon Internet (WSG): User to to IP address

Telnet: Terminal based onon IP-SSL, Automatic Signon, Naming Telnet: Terminal based IP-Automatic Signon Passthrough: User to System name (SNA) Passthrough: User* to System (SNA), Replace user

3 Ways to Steal Your Data

Client Access File Transfer

Network Neighborhood Drag & Drop

Firewall GUI

GUI Example

User Management

Generate Firewall Query

21

Edit a Firewall Query

22

Edit a Firewall Query

23

Firewall Suggests an Appropriate New Rule based on Log Entry


Results (historical log entries)

Current FW definitions

24

From Log: Get an Appropriate Rule Definition

25

From Log: Create Real-Time Detection Rule

26

From Log: Create Detection rule Populates the Filter with Data from Request

27

Visualizer for Firewall

Visualizer

Visualizer

Tool for presenting at-a-glance graphic views of log data from Firewall Immediate response to queries for any database size Analyzes network access activity (Firewall) and system journal events
(Audit) to pinpoint breaches and trends

29

How Visualizer obtains Firewall & Audit Data


Daily Log Files Daily Log Files

Firewall

Audit

Firewall Statistics File

Night Maintenance Job

Audit Statistics File

Visualizer

30

Visualizer Analysis of Firewall Log

Example: Select Object

32

Or: Select the Server

33

And Continue investigating, filtering by Directory & down to the SQL Verb level!

34

Thank You!
Please visit us at www.razlee.com

Potrebbero piacerti anche