GlobalProtect Product Presentation
Download
Report
Transcript GlobalProtect Product Presentation
GlobalProtect
Product Presentation
Agenda
Overview of GlobalProtect
Technical Details
Use Cases
Overview
Challenge: Quality of Security Tied to Location
malware
exploits
botnets
Airport
Headquarters
Home Office
Branch Offices
Enterprise-secured with
full protection
4 | ©2012, Palo Alto Networks. Confidential and Proprietary.
Hotel
Exposed to threats, risky
apps, and data leakage
Existing Approaches Fall Short
exploits
malware
botnets
Corp Resources
Traditional VPN
Indeterminate security
5 | ©2012, Palo Alto Networks. Confidential and Proprietary.
Corp Resources
Always-on VPN
Inconsistent security
Web
NonWeb
Mix of Proxies + VPN
Both indeterminate and
inconsistent security
GlobalProtect: Consistent Security Everywhere
exploits
malware
botnets
•Headquarters
•
•
•
•Branch Office
VPN connection to a purpose built firewall that is performing the security work
Automatic protected connectivity for users both inside and outside
Unified policy control, visibility, compliance & reporting
6 | ©2012, Palo Alto Networks. Confidential and Proprietary.
How GlobalProtect Works
What GlobalProtect replaces
Existing Point Products
Next-Generation Firewall Components
VPN/Remote Access
External Gateways
Network Access Control
Internet Proxy
8 | ©2012, Palo Alto Networks. Confidential and Proprietary.
Host Information Profile +
Internal Gateways at Layer 3
Threat Prevention + URL
Filtering
GlobalProtect Licensing
Licensing based on Portals and Gateways (firewall), not users
Portal
License
Gateway
Subscription
Single
Gateway
Multiple
Gateway
Internal
Gateway
HIP check
●
●
●
Mobile App
9 | ©2012, Palo Alto Networks. Confidential and Proprietary.
Portal – one-time perpetual license
Required on the device that would run Portal
Required for multi-gateway deployments
Required for internal gateways
Gateway – annual subscription
●
●
Required on the devices that would check host
profile
Required on the devices that would connect
iOS and Android app
Provides ongoing content updates to check
the host profile
GlobalProtect
Technical Details
GlobalProtect Components
GlobalProtect Portal
Portal and Gateway
Gateway
GlobalProtect Gateway
Central authority for GlobalProtect
Provides list of known gateways
Provides certificates to validate gateways
Hosts GlobalProtect agent for initial download
May be installed on same device as a GlobalProtect
Gateway
Provides tunnel termination points
Enforces security policy for connected users
GlobalProtect Agent
Software that runs on endpoint
Supported on Windows 8, Windows 7, Windows
Vista 32/64bit
Mac OS X 10.6/10.7/10.8 ( PAN OS 4.1)
iOS 5.1+
Android 4.0.3+
Endpoint with
GlobalProtect Agent
iOS 5.1+
Third Party IPSec Client Support
iOS 4.3+
Android 4.0.3+
Linux vpnc
Android 4.0.3+
Gateway
Technical Details
Technical Details
External User Sequence - Step 1
LDAP
Radius
Kerberos
Gateway
Portal and Gateway
Gateway
User authenticates to portal
Site to Site IPSec tunnel
Portal pushes
• Certificates
• List of Gateways
• Agent software updates
• Host internal/external
detection parameters
• Host check requirements
External User Sequence - Step 2
LDAP
Radius
Kerberos
Gateway
Portal and Gateway
Gateway
Agent determines if it is
inside or outside the
corporate network
Site to Site IPSec tunnel
External User Sequence - Step 3
LDAP
Radius
Kerberos
Gateway
Portal and Gateway
Gateway
Agent checks available GWs
SSL/IPsec VPN tunnel
Site to Site IPSec tunnel
Automatically connects to
the best gateway
External User Sequence - Step 4
User moves to new location
Automatically connects to
the new best gateway
LDAP
Radius
Kerberos
Gateway
Portal and Gateway
Gateway
SSL/IPsec VPN tunnel
Site to Site IPSec tunnel
Internal User Sequence - Step 1
Data Center Firewall
Data Center
User authenticates to portal
Portal and Gateway
LAN
Portal pushes
• Certificates
• List of Gateways
• Agent software updates
• Host internal/external
detection parameters
• Host check requirements
Internal User Sequence - Step 1
Data Center Firewall
Data Center
Agent determines if it is
inside or outside the
corporate network
Portal and Gateway
LAN
Internal User Sequence - Step 3
The tunnel for internal users is
optional
Data Center Firewall
Agent sends user and HIP
information to gateway for
policy enforcement
Data Center
Portal and Gateway
LAN
Architecture
Example deployment scenario
Site to Site IPSec tunnel
Static NAT on router
76.220.12.43 – 192.168.1.2
Gateway
72.5.13.1
Portal / Gateway
76.220.12.43
.1
Data Center
.2
192.168.1.0/30
10.1.1.1
Remote Users
Function
IP address
Portal
76.220.12.43
External Gateway
76.220.12.43
External Gateway
72.5.13.1
Internal Gateway
10.1.1.1
LAN
Portal Failure Scenario
Single Portal Failure Scenario
Portal
Portal with High Availability
Portal
Portal
HA Link
Gateway
Gateway
Portal is not
available
Existing
GlobalProtect
users connect
to gateway
using cache
configuration
Portal in an
HA Pair
provides
redundancy
Same Gateway for External / Internal
External Gateway
Ethernet 2
External Users
Internal Gateway
Ethernet 1
Internal Users
Ethernet 3
DMZ
Data Center
Gateway Failure Scenario
Single Gateway Failure Scenario
Portal
Gateway High Availability
Portal
Gateway
New York
Gateway
Toronto
When gateway
is unavailable,
agent can
automatically
make
connection to
next best
gateway
Gateway New York
HA Link
Gateway
Toronto
Additional Use Cases
Consistent Enforcement of Application Policies
Challenge in Education
o
School boards concerned about inappropriate teacher/student activity on social
media
o
Children’s Internet Protection Act requires school to block adult content
o
Students using web proxies to circumvent URL filters
o
Popular high-bandwidth applications such as bittorrent reduce available resources
Solution
o
Use next-generation firewall
for protection
o
Enforce policy consistently
with GlobalProtect
•Page 26 | © 2013 Palo Alto Networks. Proprietary and Confidential.
Consistent Enforcement of Application Policies
Policy for Teachers
Teacher and Students
using laptop at home
Always-On
GlobalProtect
Teachers and
Students using
laptops at school
Personal Devices
Facebook
Read/Post
Allow
Facebook Chat
Block
Facebook Short
URLs
Scan for
threats
Policy for Students
Captive Portal
•Page 27 | © 2013 Palo Alto Networks. Proprietary and Confidential.
URL Category
Adult
Block
Peer-to-Peer &
Proxy
Block
Streaming
Video
QoS
Untrusted Local Network
Don’t assume everyone should have local network access
Moving away from “give access to everyone” on LAN to “don’t trust anyone”
Just like the external scenario, don’t trust anyone internally
Solution
o
Use next-generation firewall for
protection
o
Enforce policy consistently with
GlobalProtect
•Page 28 | © 2013 Palo Alto Networks. Proprietary and Confidential.
Secure Local Network
Internet
LAN
GlobalProtect
Portal and Gateway
Internet access
with safe
enablement
WAP w/WPA2
LAN access
through
GlobalProtect
GlobalProtect only permits
authorized users with access
to LAN resources
Contractors / Guests
Employees
•Page 29 | © 2013 Palo Alto Networks. Proprietary and Confidential.
Tunnel provides privacy for
LAN traffic
Data Center:
Enforcing Policy with Host Information Profile
Challenge
Data center has applications with sensitive data, like customer
info
Concern about access from non-compliant endpoints, such as
laptops that do not have hard disk encryption
Solution
All users must have a
compliant endpoint to access
customer information
Users with non-compliant
devices use virtual desktop
•Page 30 | © 2013 Palo Alto Networks. Proprietary and Confidential.
Enforcing Policy with Host Information Profile
Application policy
enforcement
Devices with
GlobalProtect
Employees on IT
managed devices
Trusted user with
compliant host
information profile
Corporate
Laptop
GlobalProtect
Devices without
GlobalProtect
Personal
Laptop
Contractors on Guest WiFi
Captive
Portal
•Page 31 | © 2013 Palo Alto Networks. Proprietary and Confidential.
Permit app access
Trusted user, with
neither
GlobalProtect nor
HIP
Permit Citrix Only
Data
Center
Features
User Authentication
Authentication Methods Supported:
• Local Database
• LDAP
• RADIUS
• Kerberos
Authentication Factors
Supports Single Sign-On from Windows authentication
Username/Password
X.509 Certificate
Smartcard + X.509
Certificate
RSA SecureID
Host Checks
Host checks can be used with security policy to restrict access to resources
Supported on both Windows and Mac
Portal
Can be used to set policy for what attributes are evaluated
Gateway
Examines the HIP report
Controls access to applications based on matches
Host Check
Custom Host Checks
GlobalProtect for User-ID
GlobalProtect agent
can identify users
for User-Id purposes
Works with and
without a tunnel
User identification
must be enabled
on the zone where
the gateway
interface is located
IP to user mapping
happens once the
user successfully
connects to the
gateway.
GlobalProtect for iOS and Android
Available on App Store / Google Play
Supports Always-on Connection
Supports Automatic / Manual Gateway
Selection
iOS IPsec Client Support
Compatibility with iOS
-
Compatible with iOS 4.3
and later
-
Uses the IPSec VPN Client on the IOS
device
-
Support for group secret and device
certificates.
-
Remote access VPN can be configured
on the iPhone/iPad
through iOS Configuration Utility (send
profile via email or web)
using MDM from technology partners
Android IPsec Client Support
Compatibility with
Android
- Compatible with Android
4.0.3+
- Uses the IPSec VPN Client
- Support for group secret
and device certificates.
Demo
Demonstration of the User Experience
Demonstration of the Admin Experience
New Features for
GlobalProtect in PAN-OS
5.0
Overview
Manual gateway selection
Machine authentication
3rd Party Clients: vpnc IPsec client support
Localization
Manual Gateway Selection
Allows users to manually
select specific gateways
Any rediscovery event will
revert to Auto Discovery
mode
User may also manually
revert to Auto Discovery
mode
Manual Gateway Selection (On-Demand Mode)
User enables GlobalProtect in
Windows
Agent contacts Portal
Agent downloads configuration
Did user select
a gateway?
Yes
Agent contacts selected
gateway
Agent closes previously
connected tunnel (if necessary)
GlobalProtect tunnel
established
No
Agent discovers gateways using
standard methods
Manual Gateway Selection Persistence
Some actions taken by a user will switch GlobalProtect agent back to default
mode:
•
Rediscovery
•
Logoff, then login
•
Restart computer
•
Switch to another user, then switch back
•
User selects Auto discovery from the Connect to... Menu
•
Tunnel is terminated due to the user closing his laptop
(sleep/standby/hibernate)
Machine Authentication
Pre-logon connection
GlobalProtect can be configured
to establish a connection using
a already deployed machine
certificate.
VPN connection will be
established before the user
logs onto the machine.
All AD policies and changes,
software distribution and
system management can
be applied even to remote
users if tunnel is established.
© 2010 Palo Alto Networks. Proprietary and Confidential.
Machine Authentication
Username not known at the time the connection is established, generic “prelogon user” is reported to User-ID instead.
Can be used in policy to restrict access to authentication resources (see sample).
Username is reported to gateway once the user logs in.
© 2010 Palo Alto Networks. Proprietary and Confidential.
Machine Authentication
Connection and authentication flow
Certificates need to be pre-deployed
Customers requiring this feature have PKIs
deployed already
Agent uses machine certificates matching
the accepted CAs of the gateway
Pre-logon username is updated as soon as
user logs in and GlobalProtect Agent starts.
© 2010 Palo Alto Networks. Proprietary and Confidential.
3rd Party Client Support
New: Now supports vpnc
Common VPN client used on Unix systems with Cisco Concentrators
Tested on Ubuntu Linux and CentOS
Supports pre-shared key for IKE
© 2010 Palo Alto Networks. Proprietary and Confidential.
Localization
Localized GlobalProtect Agent UI
Japanese
Chinese (simplified)
French
Spanish
German (GlobalProtect only)
© 2010 Palo Alto Networks. Proprietary and Confidential.