Netscreen Technologies: March 2002 Technical Overview Richard Cassidy, Se Emea
Netscreen Technologies: March 2002 Technical Overview Richard Cassidy, Se Emea
Netscreen Technologies: March 2002 Technical Overview Richard Cassidy, Se Emea
Support Website
Comprehensive Technical Resource
TAC online, Manuals and User guides
Webcasts
Netscreen on-line training courses
2
NetScreen Confidential Internal Use Only
NetScreen by design:
Enforce Maximum Security without sacrificing:
Performance
Interoperability
Scalability
Reliability
Manageability
Flexibility
NetScreen-500 NetScreen-1000
Resilient, solid-state solutions with high availability architectures Policy-based management of devices and remote users
NetScreen Confidential Internal Use Only
Where it continues to go
ASIC-Acceleration
DES 3DES MD5 SHA-1 Public Key Accelerator Random # Generator RC4 Firewall
Traditional Design
In Out
NetScreen Design
CPU In Out I/O RAM
CPU
I/O
RAM
VPN CoProcessor
Bus
- Multiple passes across the bus - No separation of the data & control planes
- Single pass across the bus - Separation of data & control planes
10
12
13
Award-wining and proven technology since 1999 2 port auto-sensing 10/100 Ethernet Trust, Untrust AC power
NS5xp/25/50 Architecture
SRAM
MPC8xx
PCMCIA Interface RS232 UART RTC
Power PC Core
SDRAM
32-bit/48MHz bus
MAC 1
PHY
Trusted
15
MAC 2
PHY
Untrusted
MAC 3
PHY
NS25/50
MAC 4
PHY
NS25/50
Flash
Boot ROM
16
Broadband enabled
2 port 10Mbps Full Duplex 10BaseT Ethernet
Easily Managed
RS232 serial console port for management Asset Recovery Switch
17
Transparent, Route, and NAT modes of operation Traffic Management: 8 levels of priority, plus guaranteed & maximum bandwidth, defined by policy 10 IPSec VPN Tunnels 2000 Firewall Concurrent Sessions
18
NetScreen-5XP Performance
Full duplex 10 Mbit line speed Symmetrical Performance 10 Mbps 3DES VPN 10 Mbps Firewall Latency reached a record low of 380 Sec (or 0.38 mSec) for support of new applications
VoIP Streaming media
19
NetScreen-5XP Performance
NS-5XP Bi-Directional Performance Results
20.00 18.00 16.00 14.00 12.00 10.00 8.00 6.00 4.00 2.00 0.00
Bandwidth (Mbps)
64
100
200
300
400
500
600
700
800
Bytes/Packet
NAT
20
DES
3DES
DES+MD5
3DES+MD5
DES+SHA-1
3DES+SHA-1
21
Competitive Landscape
Appliance Features Users NetScreen-5XP 10-user/Elite 10 / Unrestricted Cisco 506 10 SonicWALL SOHO2 50 Firewall, VPN
2 10/100 Ethernet
Nokia IP110 50
Nokia IP55 50
List Price
$495 / $995
$1,995
$995
$2,495*
$1,295
Cisco 506
High Price
$1995 list for a 10 user license 4 Tunnels supported vs. NetScreens 10 tunnels.
Low number of VPN tunnels supported for the price No ASIC support for VPN acceleration Hard to configure manage and deploy
Need to understand Cisco IOS/PIX CLI to configure VPNs or any other configuration. GUI support is limited to basic tasks. Limited real time logging and alarm capabilities.
Low performance
Firewall throughput 8 Mbps vs. NS-5XP 10 Mbps 56-bit DES throughput 6 Mbps vs. NS-5XP 10 Mbps 168-bit 3DES throughput 6 Mbps vs. NS-5XP 10 Mbps
23
SOHO2 costs $990 - $1490 for 10/50 users with 10 VPN tunnels
Anti Virus is not performed at the appliance contrary to perception Lack of Secure Remote Manageability
24
Nokia IP110
High Price
IP110 base cost $2,495 + Check Point 50 user license fee $4995 =$7490.
No traffic management. Hard to configure manage and deploy Lack of Single Support Point
25
Lack VPN support and Traffic Management capability High Price for limited functionality
IP51 lists for $895, and IP55 lists for $1295; compared to 5XP price of $995 integrating Firewall, VPN and Traffic Shaping.
Do not have ICSA certification on the appliance Lack of Single Support Point
26
Supporting Documentation
This presentation Datasheetnew appliances datasheet New price list with detailed pricing and options Competitive analysis Product FAQ NetScreen-5XP white paper
27
28
AC power
AC power; DC option
Status LEDs
Compact Flash
Trust
Untrust
31
Robust attack prevention including SYN, ICMP, and port scan attacks
3DES and AES encryption using digital certificates or IKE auto-key IPSec NAT traversal
Allowing IPSec VPN tunnels to be established through NAT, PAT, or NAPT devices
Yes
Yes
Yes
No
No
No
VPN acceleration
NAT traversal Policy-based NAT
Yes
Yes Yes
No
No No
Extra Cost
No Yes
No
CP clients to FW-1 only Yes
No
No No
PPPoE support
DHCP server
Yes
Yes
Yes
Yes
No
No
No
No
Yes
No
33
No Yes No No No
PPPoE support
DHCP server
Yes
Yes
No
No
No
No
No
34
Missed Opportunities
NetScreen-10
NetScreen-50
Missed Opportunities
NetScreen-25
NetScreen-5XP
NetScreen-5XP
35
Award-wining and proven technology since 1998 3 port auto-sensing 10/100 Ethernet Trust, Untrust, DMZ High Availability options
Active/Standby, Active/Active (1H 02)
AC power; DC option
NS100 Architecture
SRAM
CPU
(MIPS R5000)
64bit/66MHz bus
SDRAM
Packet Memory
(Dual Port)
Host Bridge
(GT64120)
64bit/66MHz bus 32bit/33MHz PCI
MAC 2 PHY
DMZ
MAC 3 PHY
Untrusted
PCMCIA Interface
RTC
UART RS232
37
100%
% of theoretical maximum
95%
80% 65% 60% 40% 20% 15% 0% NetScreen-100 Check Point FireWall-1/ VPN-1 64-byte packets 1,024-byte packets Nokia IP650 Cisco PIX-515 5% 10% 5% 5% 60%
19,048
3,402 1,600
Cisco PIX-515
NetScreen-200 Series
Solutions for Enterprise Central Sites and Service Provider Environments
40
Stateful inspection firewall with advanced firewall and DoS attack protections IPSec VPN with 3DES, DES, L2TP & AES Bandwidth prioritization and reservation and/or DiffServ marking 4 or 8 auto-sensing 10/100 Ethernet Transparent, NAT, and Route mode ports High availability with full FW and All ports active today VPN synchronization Auto-correct to DCE or DTE Ships with ScreenOS 3.1
42
Device Management
NetScreen MIBs Logging Enhancements
All interfaces support up to 28 common attacks such as syn flood, port scan, and others Familiar Trust, Untrust, and DMZ security zones available for easeof-use and backward compatibility
43
Certificate Management
Automated Certificate Enrollment (SCEP) Online Certificate Validation (OCSP)
250 Virtual Systems (VSYS) Per Virtual System - address book, policies and management Firewall and VPN configured per VSYS Able to support multiple security domains or customers without sharing policy
46
Virtual Systems
Security Domain Per Customer 250 Security Domains Per NetScreen-1000
SW 10/100
100/1000
Switch SW 10/100
Internet
Untrust
Trust
Integrated firewall and VPN capabilities Implementation of 802.1q VLANs providing the ability to manage multiple customers from a single security system A Virtual System
Saves rack space Reduces capital cost Eases management and administration Simplifies network architecture
VLAN1
VLAN2
VLAN3
48
Firewall policy based on IP addr / VPN not practical due VPN authenication issue
49
NetScreen-500
High-performance Security System for Enterprise Central Site and Data Center Environments
50
The NetScreen-500
High security
ICSA-certified firewall and VPN FIPS 140 ready
Redundant
High availability features Internal system redundancies (swappable fans, power) Separate traffic and management bus
High performance
250 Mbps 3DES IPSec VPN 700 Mbps stateful firewall
High capacity
10,000 IPSec tunnels 250,000 concurrent sessions 22,000 new sessions per second
Flexible
Multiple ports AC/DC power Virtual Systems
51
Easily managed
2 DB-9 Serial RS-232, Console and Modem Dedicated out-of-band 10/100 management port Programmable LCD and diagnostic LEDs
NS500 Architecture
53
The NetScreen-500
LCD
Modem
Console
Management
Dual HA
Fan Module
Transparent, Route, and NAT modes of operation Traffic Management: 8 levels of priority, plus guaranteed & maximum bandwidth, defined by policy Up to 25 Virtual Systems and 100 VLANs High Availability (through redundant, dedicated HA links): complete with full session and VPN synchronization
55
3DES VPN
VPN Tunnels
Sessions New Sessions/Sec. Virtual Systems
10,000
250,000 22,000 0, 5, 10, 25
10,000
No firewall No firewall No, 3 physical interfaces
Transparent Mode
HA w/ Full Session & VPN Synchronization List Price
Yes
Yes $24,995, ES system with 2 10/100 interfaces $34,995, ES system with 2 GBIC interfaces
No
Yes $73,600 with 2 10/100 interfaces.
No
VPN synchronization $75,000 for redundant pair + cost of firewall
Price listed as US List Prices in US$. Appropriate price changes should be made for in-country pricing
56
NetScreen Confidential Internal Use Only
Nokia IP530
400 Mbps Check Point license required < 20 Mbps, 50 Mbps with accelerator card 4,500, Check Point license required Est. 2,000 Up to 16 interfaces Yes, not redundant No, AC only $30,985*
Nokia IP650
235 Mbps, Check Point license required < 20 Mbps, 40 Mbps with accelerator card 4,500, Check Point license required Est. 2,000 Up to 20 interfaces Yes, redundant Yes, AC only $34,985*
250 Mbps 10,000 22,000 0, 5, 10, 25 No Yes, DC or AC $24,995, ES system with 2 10/100 interfaces
VPN Tunnels New Sessions/Sec. Virtual Systems Hard Disk Drives Redundant Power List Price
Price listed as US List Prices in US$. Appropriate price changes should be made for in-country pricing *IP530 and IP650 configured with: base chassis, Luna VPN accelerator card, single AC power supply, Check Point license for 250 IP addresses with firewall and VPN functionality. An unlimited IP license requires the central management console to be purchased (about $10,000 extra)
57
NetScreen Confidential Internal Use Only
NetScreen-500
800 800
600
600
400
400
200
200
High-performance & High Bandwidth Security System for Demanding Enterprise and Service Provider Environments
59
NetScreen Confidential Internal Use Only
High Capacity
Firewall: Stateful inspection - 500,000 sessions VPN: 25,000 IPSec tunnels
High availability/redundancy
Hot swappable power supplies, fans, cards Mirrored configuration maintains sessions through a failover
NetScreen-1000
Switch Card
Security Processor Cards (from 2 to 6) Management Interface Card with Separate OoB HA interfaces
Fans
62
NetScreen-1000 Switch II
HA
P r o c e s s o r I n t e r c o n n e c t s 63
Up to 2 Gbps firewall
NS1000 Architecture
Each with its own RISC processor and GigaScreen ASIC Backplane Bus (Compact PCI)
Gbit
Processing card Processing card Processing card Processing card Processing card
Trust
Gbit
Gbit
Untrust
Gbit
Switch card
1st packet in session forwarded to Master Policy lookup Packet classification Load balanced handoff to processor cards Configure switch
2nd+ packet Session status hand-off from master Packets forwarded by switch card Policy enforcement Encryption, firewall, NAT Hot failover between cards
Processing card
Aux card
100BaseT Management
65 Flash Card
HA
Console
Max Throughput 2G FW & 1G VPN 750M FW & 250M VPN 550M FW & 200M VPN 400M FW & 200M VPN 200 FW & 185 VPN 170M FW 50M VPN 100M FW 20M VPN 10M FW & VPN Varies by PC
Max Sessions 500,000 250,000 128,000 128,000 128,000 8,000 4,000 2,000 NA
Max # Policies 40,000 20,000 4,000 4,000 4,000 1,000 500 100 NA
HA Yes A/A Yes A/A Yes A/P ** Yes A/P ** Yes A/P ** Yes A/P * No No No
A/A = Active-Active High Availability * Available when 4th port is enabled NetScreen Confidential Internal Use Only A/P = Active-Passive High Availability ** To be updated to Active-Active 1HCY02
Bottom Line
NetScreen Security Systems have been built from the ground-up with the purpose of removing the performance factor from the equation to allow decision-makers to concentrate on solving the real problem of conquering security challenges and network management issues.
67
Support Website
Comprehensive Technical Resource
TAC online, Manuals and User guides
Webcasts
Netscreen on-line training courses
68
NetScreen Confidential Internal Use Only
Questions
69
70
Stateful Screening
Next Generation Stateful Inspection
71
Screening
Alternatives
Access Control Lists Application Proxies
NetScreens Architecture
Policy-based stateful screening
72
Stateful Inspection
Policy classification includes: Security zones IP addresses Transport protocol Transport ports Applications Policy actions include: Deny Permit Authenticate Log Count
73
Packet Flows
Classified by PROTO Identified by SIP, DIP Session is bundle of forward and reverse flows
Initiating Flow
Responding Flow
74
IP Packet
0 Ver 7 8 15 16 Hdr Len Service Type Identification Flags Time To Live Protocol Source IP Address Destination IP Address IP Options (If Any) Data 23 24 Total Length Fragment Offset Header Checksum 31
Padding
75
UDP Packet
0 7 8 Source Port Length 15 16 23 24 Destination Port Checksum 31
Data
76
TCP Packet
Source Port Destination Port Sequence Number Acknowledgement Number Code Bits Options Data
Hdr Len
Reserved Checksum
Blue: Normal Flow Classifiers Yellow: TCP State and Sequence Check
77
Packet Walk
Receive
Hash Classifiers
Session Lookup
No
Yes
Screen Packet
Send
Path Lookup
No
Yes
Policy Lookup
No
Yes
Create Session
Drop
Drop
78
79
Traffic Management
Next Generation Quality of Service
80
Traffic Shaping
Alternatives
Priority Queuing Class-Based Queuing (CBQ) TCP Rate Control ATM Generic Cell Rate Algorithm (GCRA)
NetScreens Architecture
Bandwidth Guarantees, Maximums, Priorities Hardware Accelerated Algorithms
81
82
83
NetScreen Algorithm
Double Token Bucket Algorithm Controlled by Guaranteed Bandwidth (GBW), Maximum Bandwidth (MBW) and Priority Per Policy Classification and Queues
84
85
86
Questions
87
Internet
NetScreen
DMZ 0.0.0.0
Corporate Web 2.2.2.2 Mail Relay 2.2.2.3 DMZ DNS 2.2.2.4
VPN/PKI
Next Generation Privacy and Authentication
89
VPN FEATURES
IPSEC Netscreen is ICSA certified (www.icsa.net) Manual Keys, IKE, and Group IKE X.509 Certificate (PKI) support Policy based VPNs (Full firewall control of traffic through tunnel) Hub and Spoke VPNs Support of NAT within the VPN tunnel Support of Dynamically addressed VPN gateways (and dial users) L2TP/IPSEC for Win2K native VPN dial support Redundant Gateways SCEP and OCSP
90
IPSEC Interoperability
Real world implementations with:
Checkpoint, Cisco, Nortel, Sonic Wall, WatchGuard, Microsoft, etc.
91
Encrypted Traffic
Internet
Dial-Up NAT Pool 10.1.1.0/24 1.1.1.1 -> 10.1.1.1 2.2.2.2 -> 10.1.1.2 3.3.3.3 -> 10.1.1.3
Corp Net
NAT Pool is defined as subnet of trusted network Each client is dynamically assigned an IP address in subnet 10.1.1/24 for duration of VPN session Policy on client sends all traffic to corporate network (10.0.0.0/8) through VPN Dial-up client can access all services at corporate net If Hub and Spoke is setup, client can access services at other sites
93
NetScreen Confidential Internal Use Only
Default Route
Internet
ASP Network
Cust B
10.1/16
10.1.1.1
NAT each customers client addresses into unique subnet of ASP network If server address overlaps customer address space, provide MIP within VPN for the server that is unused by customer
94
NetScreen Confidential Internal Use Only
Digital ID
95
Certificate Authorities
Baltimore Entrust Microsoft Netscape (iPlanet) RSA Verisign
97
Corporate LAN
98
SA M=1 A.0
Hub A
B.0 Hub B
99
NAT-Traversal
Without NAT-Traversal IPSec packets that are modified by a NAT-Device fail packet authentication checks, and are thus dropped by VPN Gateway as illegal packets.
NAT-Device Modifies IP and UDP Header of IPSec & IKE Packets source IP address & port Packet is Received by VPN Gateway, ESP checksum dont match indicating packet has been modified in transit. Normal IPSec will drop packet
NAT-Device
VPN Gateway
IPSec Client
100
Sales
Engineering
Sales
Engineering
Any user offering a certificate with fields matching all defined values will be accepted as an instance of a defined user
In this example, anyone in the Sales group for Company A is defined as a user
101
Example 1: User in the Sales group for Company A; Access is permitted Example 2: User in the Sales group for Company A; Access is permitted; Building number is not defined value Example 3: User in the Sales Group for Company B; Access is denied
Denied
102
In this example any user whos certificate credentials match the following will be authenticated as an IKE User for a specific VPN
103
NetScreen Confidential Internal Use Only
104
Major New Features Includes support for NAT-Traversal (explained in next few slides) New Auth and Go works in conjunction with Global Pro 3.0 Policy Manager
105
Authenticate and Go
Auth and Go is an application bundled with NetScreen Remote which allows direct integration with NetScreens Policy Manager The purpose of Auth and Go is to allow secure, easy VPN Policy deployment for environments with a large number of clients. Auth and Go prompts the user with a login dialog, requesting username and password.
106
107
108
Overview
NetScreens High Availability Security Solution built to match high performance requirements of mission critical networks
Designed for Enterprise and Service Provider Gateways & Data Centers Carrier Access Networks Provides the availability, redundancy and performance of Switched and Routed Networks + providing Stateful Security
109
Overview - Continued
NetScreen enhances high availability, resilience and performance
Redundancy protocol support - NSRP v2 (Similar to VRRP + being stateful) Stateful Fail-over for Firewall and VPN Redundant Interfaces for participation in full mesh topologies with or without Load-balancing switches Active Active load sharing for Multi-Gigabit throughput Sub Second Fail-over
110
System Redundancy
Active / Active
System Redundancy
Active / Active / Full Mesh
SW1
SW1
SW1
2 Gbps
4 Gbps 2 Gbps
4 Gbps 2 Gbps
111
Path monitor from NetScreen device rapidly identifies upstream & down stream failures
112
Full Mesh
+ 3rd party
Full Mesh
FW
Device Redundancy
VPN FW
VPN
VPN Only
Stateless Fail-over
113
Stateful Fail-over
HA Competitive Matrix
NetScreen 500 & 1000 Check Point HA Check Point Rainfinity Cisco Pix 535 Cisco VPN 3080 Nokia CC5205 Nokia IP-740 SonicWall ProVX
Stateful Firewall FailOver Stateful VPN FailOver Active Active Firewall Active Active VPN
Yes Yes No No
Yes No No No
No Yes No Yes
No Yes No Yes
Yes No No No
No No No No
Redundant HA ports
Fully Meshed Trust / Untrust Interfaces Path Monitor (conn / health)
Yes
Yes Yes
No
Yes No
No
Yes Yes
No
No No
No
No No
No
No No
No
Yes No
No
No No
Yes
No
No
No
No
Yes
No
No
114
Conclusion
NetScreen takes a leadership position in High Availability Security Solutions
Stateful Fail-over VPN and Firewall including (Vsys) Active Active Load Sharing Interface Redundancy for full mesh topologies and additional levels of resilience
Redundant Trust & Untrust Interfaces Redundant HA interface
115
ScreenOS
Purpose-built for Maximum Security & Performance
116
ScreenOS
ScreenOS 2.8r1 - Supported on the NS-1000
Has NSRPv2 - Active / Active Failover Features Adds NAT Traversal, L2TP in root and VSYS, and Generic IKE ID
ScreenOS 3.0r2 - Supported on the NS-5XP, NS-10, NS-25, NS-50, NS-100, NS-500
Adds NAT Traversal, Generic IKE IDs, 38 new MIBs, SCEP, OCSP, and Secondary IP Addresses Mainstream ScreenOS code for most customers Not supported on the NS-5 Please note ScreenOS 3.0r2 adds a few new minor features. Read the release notes!
ScreenOS 3.0.0 with User Authentication Extended Features - Supported on NS-100 and NS-500
118
Multiple Authentication Servers External User-Groups Firewall Authentication Enhancements Custom Authentication Banner messages Admin Authentication Enhancements L2TP IP Pool / RADIUS Enhancements NetScreen RADIUS Attributes
Available on
beta.netscreen.com
NetScreen Confidential Internal Use Only
Device Management
NetScreen MIBs Logging Enhancements
Certificate Management
Automated Certificate Enrollment (SCEP) Online Certificate Validation (OCSP)
119
NetScreen Confidential Internal Use Only
Logging Enhancements
Now support a standardized format for log messages - including the reporting module, the message severity, and a timestamp Admin has much more granular control over the destination(s) of specific severity messages
120
Logging Enhancement
121
Structured Logging
122
Clear Session
Provides admin with more control over what active sessions to display or clear from the active tables Can specify matching sessions to display or clear by
Source and/or destination IP Source and/or destination port numbers Source and/or destination MAC address
123
Session Threshold Per Source IP Address: When enabled, the NetScreen will limit the number of sessions that any one trusted or DMZ IP can occupy on the NetScreen box
Prevents sessions table from becoming full when web server infected with worm tries to access other web servers
125
126
128
Untrust
Trust
Policy Engine
DMZ
Mkt
Eng
Zones include three predefined and arbitrary user defined Policy Engine controls traffic between zones Policy sets explicitly list from and to zones
Mkt UntToMkt TruToMkt DMZToMkt N/A EngToMkt Eng UntToEng TruToEng DMZToEng MktToEng N/A
129
Reserved Zones
Management zone for support of out-of-band management interfaces and tunnels for management traffic HA zone for HA interfaces, NSRP, etc. Specific VLAN zones for trust, untrust and DMZ for transparent mode, backward compatibility Specific tunnel zones for trust, untrust and DMZ for transparent mode, backward compatibility
130
131
Hardware Interfaces
ScreenOS currently supports
3 well known interfaces, trust, untrust and DMZ Each individual interface permanently bound to like named security zone
Untrust
Ether4/1 Ether2/1
Finance
Policy Engine
IT
Ether3/1
Ether2/2
Mkt
Eng
Ether3/2
Each interface can be bound to only a single zone Multiple interfaces may be bound to single zone, such as for untrust/internet zone where redundant ISP links are used The pre-defined zones may be used (or not) as desired
133
NetScreen Confidential Internal Use Only
MGT
HA1
HA2
134
Listing Interfaces
135
Configuration of Interfaces
136
Sub-interfaces
ScreenOS currently supports
Sub-interfaces, each bound to a 802.1q VLAN, on trust and untrust interfaces Usable only on Vsys enabled systems Trust sub-interface must be bound to trust security zone in Vsys
Sub-Interfaces in USGA
Ether1/1 Ether1/2
Untrust
Ether2/1
Corp
Policy Engine
IT
Ether 2/2
Ether2/1.1
Service
Sales/Mkt
Ether2/1.2
Eng
Ether 3/1
Ether2/1.3 Ether2/1.4
Sub- interfaces will extend physical interface name with .Z to denote the sub-interface number of a given physical interface Sub-interfaces may be bound to any security zone, they are not restricted to the same zone as the physical interface. Multiple Interfaces, physical, sub, or combination can be bound to a security zone
138
NetScreen Confidential Internal Use Only
Configuration of Sub-Interfaces
139
Routing
Currently in ScreenOS
Single route domain Routing of inbound packets used to determine intended outbound interface/zone to limit policy search No overlapping networks allowed Limited u-turn traffic support with-in zone
Routing in USGA
Multiple virtual routers Security zones bound to virtual routers Controlled route re-distribution between virtual routers
140
Routing in USGA
Ether1/1 Ether1/2
Ether 2/2
Ether2/1
Corp
Ether2/1.1
Service
Eng
Sales/Mkt
Ether2/1.2
Ether 3/1
Ether2/1.4
Zones bound to one of 2 routing domains Each routing domain is independent, including the ability to run separate routing protocols or areas in different domains Controlled redistribution of routing information to tie the two together E.g. - redistribute default route from 2 to 1 so inside hosts can reach outside hosts Routing is performed for traffic between interfaces within same zone without policy search, between zones in same domain still engages policy engine
141
NetScreen Confidential Internal Use Only
Configure Routes
142
Virtual Systems
ScreenOS currently provides for each Vsys
Private trust zone Single virtual router Multiple sub-interfaces
USGA
Multiple security zones Physical or sub-interfaces bound to Vsys Single virtual router
143
Vsys In USGA
Route Domain 2
Ether4/1.1 Ether1/1.5 Ether1/1.3 Ether1/1.4
Ether1/1.2
Untrust
Policy Engine Local Vsys DMZ1 Router DMZ2
Ether2/1.1 Ether2/2.1
Ether3/2
Vsys 1
Vsys 2
144
ether1
ether3
145
Routing Domain 2
Ether1.1 Ether3.1 ether5
IPSec tunnels may be bound to a specific tunnel interface Tunnel interface is treated like other interfaces, physical or virtual in that
It may be bound to any security zone It may participate as interface in routing It may have NAT/NAPT services
ExNet Tunnel2
Tunnel3 Routing Domain 1
IT
Ether2
Corp
Ether4
Traffic directed to tunnel interface is encrypted and sent through tunnel bound to that tunnel interface Tunnel to tunnel interface binding is oneto-one
146
Untrust
Trust
Trust
Policy Engine
Untrust
DHCP Relay
Ether2/1
Finance
Policy Engine
IT
Ether3/1
MIP
DoS Protection
Ether2/2
Mkt
Eng
Ether3/2
DHCP Relay
Questions
149