Upload
patrick-hodges
View
222
Download
0
Tags:
Embed Size (px)
Citation preview
FireProof
The Challenge
Firewall - the challenge
• Network security devices
• Critical gateway to your network
• Constant service
The Challenge
Firewall concerns
• CPU intensive
• First line of defense - hacker prone
• Single Firewall is not an option
– Due to its importance in the network, you must have an additional back up Firewall
– Single point of failure
– Limited performance growth
– Service interruption during maintenance and upgrade
The Challenge
Firewall fault tolerance
No Internet access in case of firewall failure
The Challenge
Access router
Firewalls
Optimal firewall performance
• Limited to single Firewall performance
• Static load distribution
• Expensive performance improvement
The Challenge
Access router
Firewalls
Requirements
• Downtime is not an option– Continuously available systems
– Transparent Recovery
– Consistent service
– Reliable
• Optimize Security Resources– Manageable
– Efficient use of network
The Challenge
Security ITM Solutions
FireProof
• High availability for all firewalls (transparent and non-transparent)
• Hardware based- no additional software installed on the firewall
• Compatible with any OS
• Compatible with multiple firewall vendors
• All firewalls are active
• Firewall resource optimization
Security Solutions
Defacto standard
Recognized leader by NAI, Secure Computing, Axent, Netscreen, Checkpoint (OPSEC certified) for Firewall load balancing and HA
Security Solutions
FireProof - the solution
FireProof assures that your security resources are always available and optimized
Security Solutions
Local clients
Firewalls
Access routerFireProof FireProof
Non-stop service
Health monitoring– Monitor Firewalls health
• Monitor physical servers• Monitor full data path
– In case of failure, clients are directed to alternate Firewall
Redundancy– 2 Units can work in a redundant configuration– If one fails the other takes over
Resilience– Recovery and warm-up period
Security Solutions
Full path health monitoringSecurity Solutions
Local clients
Firewalls
FireProof
PingPingPing
TCP Port
TCP Port
Traffic redirection
• FireProof takes into account both incoming and outgoing traffic
• Load balancing algorithms– Cyclic
– Least number of users
– Least number of bytes
– Least number of packets
– Customized algorithm
•Firewall weights
Security Solutions
Traffic redirection
Firewall grouping by application
Security Solutions
Firewalls
Email filtering
FireProof
Application?email
Application SwitchSecurity Solutions
• Multi-layer switching architecture
• Gigabit connectivity
• Switching Asics per port
• PPC 750 RISC processor
• 1U box
Conclusion
Conclusion
• FireProof provides certainty through non-stop service of your security environment
• FireProof ensures the best service by optimizing your security resources
Conclusion
AwardsConclusion
thank you