Archive for the ‘Network Security’ Category

The trick to Geo-IP blocking is not turning off the country from accessing critical areas of your network, its filtering them to receive only the traffic that is necessary to your business. Firewalls just do not get you there.

Even with well made firewalls like Sonicwall, Foritnet, Checkpoint, and several others that have geo-ip capabilities. Their approach is broad stroking when tackling Geo-IP management. It’s not that they do not care; it could be as simple as a marketing move, limitations given all they do, or simply put “It’s not their focus” for the product line.

If you ever tried really cranking up the geo-ip for any of them you will find internal hardship for your users, latency, load, and frustration. Understandable because the feature isn’t treated very seriously, or an after thought.

The fact is Geo-IP should not be done on any application layer inspecting anything, rather MUST be done within its own layer given the scope of the Geo-IP task.

The question is always asked “What countries should I block?”, as if judging the name of the country, and ideology is the gauge on how to filter it. The fact is there are no borders on the internet, ideology, and greed so asking what country to block is not the best measuring stick. Sure the attackers motivation could stem from that country, but it rarely starts and ends there. An attackers attack surface, and their resources are limitless because of their ability to traverse country to country without resistance. There are many factors why they can do this, and it all starts with what we call “The Human Condition”. The two main traits being imperfection, and the inability to predict the future yet.

– See more at: http://www.packetviper.com/event/blog/2015/02/what-countries-should-i-block/#sthash.rDpJGurd.dpuf

As I read through the news on the Ebay breach, I got to thinking,  it’s not just the Ebay account informationEbay you have to worry about, rather ANY other account that matches.

For instance you can log into Ebay with either your email address, or userID. Now let’s say you are using the same email address and password for PayPal, Amazon, Facebook, YouTube, WordPress, Twitter, or some other fairly popular public site.

Since the hackers stole your information from Ebay, they could simply troll through other sites on the web with your login information, and see if the door opens.

Change All Your Passwords!You do not need to be a brain surgeon to put two and two together.  So after you change your Ebay account password, do the same for your other accounts.

Written by: Francesco Trama, CEO, PacketViper

 

By: Francesco Trama: Co-Founder: PacketViper, LLC

Network Security Driving Me NutsI woke one morning and found this alert in my email:

ON WORLD Press Freedom Day, Saturday May 3, Panama’s TVN channel 2 received another “cyber-attack” on its website (tvn-2.com). The network said that the attacks have gone on continuously for five days leading up to Sunday’s election and a TVN broadcaster has been threatened via Twitter. read http://www.newsroompanama.com/panama/7645-press-freedom-day-marred-by-cyber-attack-on-tvn.html” 

My opinion is this: There needs to be a point when “we” as security sales professionals provide a disclaimer that clearly explains:

Disclaimer: This security device may get you 80% secure at best with hard work, and commitment; This device will need constant attention, managing, and there’s a good possibility if you forget, or ignore something on it your network and all its data will be compromised! 

I’m sure it might say something in twenty paragraphs of the EULA.

There are many factors on why I say this,

1. Complexity

2. Learning curve

3. Commitment to product

4. Lack of firewall and security knowledge

5. Management

6. False sense of security after the sale.

[Read More]

Time and time again the question is asked “How Does PacketViper compare to a <Insert Firewall Name Here>?

We explain what we do, compared to what they do.  The very next sentence is We can do that now with <Insert Firewall Name Here>

Can you Really?

I’m going to explain the differences between <Insert Firewall Name Here> and PacketViper. What you have to keep in mind is PacketViper is designed to remove the traffic before entering the security environment. It quickly eliminates unwanted traffic to improve the performance throughout the entire security environment.  PacketViper’s sits inline, fail-open bypass, transparent Geo IP layer has a significant positive impact to every gateway, spam filter, mail and web servers, VPN portals, and so on. It immediately hardens even the most exposed networks with a few clicks, and no complex configuration.

Although many want to compare us to <Insert Firewall Name Here>, we are in the security layer to to help them work more efficiently. Our layer can do many different things which they can not offer because of their Layer3+ inspections. if you activated every feature to its fullest on <Insert Firewall Name Here>, what would the latency cost be to your traffic? I would say pretty great, not to mention log and alert overload, false positives, troubleshooting connection issues, and customer complaints.

Technically we are a firewall, but <Insert Firewall Name Here> is not a PacketViper,

CheckPoint IPS blade note from a commentator ” Please Note enabling the perform all IPS inspection on all traffic, can have a adverse effect on the performance of the firewall”

1. PacketViper is a inline appliance or software that operates transparent, and adds no network hop to the packet.

2. PacketViper looks “only” at the header information of the packet.  This is how we keep near wire speeds, negligible latency, and yet provide better details.

Explanation: PacketViper keeps its high performance by only looking at the header information that is then matched to our Geo Location database. <Insert Firewall Name Here> runs the packet through a gambit of tests, checks, patterns, and anything else you can imagine.

3. PacketViper is very simple to filter out unwanted country traffic.

Explanation:  PacketViper is one of the simplest devices to use, to filter unwanted traffic into the environment.  Looking at the <Insert Firewall Name Here> configuration is a challenge. I understand the devil is in the details, but when you are being flooded with email, web requests, DDoS, dictionary attacks, probes, or NMAP’s on a daily basis, so to us the devil is the common sense.  Do you really need someone from some country probing your VPN port? You see some firewall vendors show statements like;

4. PacketViper Triggers to prevent DDoS, By Country, Company, Network, IP, or Port.

5. PacketViper blocks countries by ports.

Explanation: Even though blocking a country is not new, the way we do it is. We do not just filter the country but rather the country, its ports bi-directionally, and some.  It is so simple with PacketViper you will wonder how this can be.  I found one video from Fortinet that was tolerable. The others would just lose you in the details trying to block a country at a port.

If you take a look at everything these super firewall and IDS systems do, it would amaze and awe anyone, until you get into them.  Like looking down from space at the earth its breathtaking. Until you get to the ground to find billions roadways, buildings, offices, rooms, closets, and alcoves. – Francesco Trama

6.  PacketViper can quickly redirect traffic based on the source IP, network, country, or Global Network List.

Explanation:  DNat is not a new thing, but with PacketViper you have a much more common sense method, and more details.

Aside from a constant labor intensive management, false positives, log overload, and long learning curve with complex firewalls. They are an absolute MUST in the security environment.  Which ever one you choose or have chosen, PacketViper will eliminate the pressure to and through them.  PacketViper eliminates the unwanted traffic hereby freeing up valuable bandwidth, and resources. PacketViper improves the entire security layer by removing the unwanted traffic through them.

This is a good read (The Sydney Morning Herald).

 

As I read through the article I couldn’t help wonder how each method the writer described could have been complicated for the attacker if there was a Geo IP Layer as the first and last inspection.

Point 1

Attacks are not limited just to theft and can take the form of denial of service assaults on a bank’s online operations to prevent customers from accessing their accounts. Last year, HSBC became the victim of one of the largest attacks of this kind yet recorded, causing the failure of its online banking services. Stuart Gulliver, chief executive of HSBC, and other senior managers at Britain’s largest bank, believe cyber threats are one of the biggest dangers to the industry.

Because of the distribution of the attack this could have been watered-down to a non event if these banks employed an additional Geo IP layer to limit their network port exposure to the world. The Geo IP layer would have absorbed the blunt of the traffic to before it entering the environment, or the touching the attacked service.

Point 2

One of the biggest areas of weakness is lax security among employees. In particular, the use of unauthorised applications.

Again, the Geo IP filter in this case would have prevented unknown outbound connections to high risk networks in the app.  The Geo IP layer is your first and last line in defense for these rogue applications to enter or escape.  For instance:  Bad user downloads Facebook widget X, which is coded to siphon and collect data to send it to country Y, using some common port X. which tricks IDS using your very own internal web filter/proxy. Unfortunately for the hacker application, the Geo IP filter isn’t fooled by the apps stealth or program trickery, it only cares where its going.

Ernst & Young, says the use of outside technology, as well as social networks, such as Facebook and LinkedIn, have proved a boon for those looking to circumvent banks’ online defences.

Point 3

Criminals have also begun targeting the physical hardware underpinning banks’….

 

[continue reading]

Below I’m going to describe the changes from 1.4 to 2.0, which has just been released, then break down those changes in PacketViper 2.0, our Geo IP filter.  I do have a little bias, but will keep it as neutral as possible.

Deployment and Installation Reviews

Fairly straight forward.  When the appliance is turned on you will notice the option to add an IP address or use DHCP.  Most customer choose the DHCP options. Once plugged into your secure LAN, and an IP is obtained, the system will display the web address for you to access.  From here you simply open a web browser and enter the address.

Once logged in you are required to register the product by clicking on a red box. This takes you to the setup area where you paste your license into.  Once applying the license, the red box goes away and you are all set. One thing to note is the PacketViper will require internet access to register. This is done using the management port interface IP address.
Once the product is registered it is recommended you perform an update.  This is simply done by clicking on the update now button in setup. Once updated, you are now set to place the appliance inline in the front of your gateway.

Schedule a brief outage, then connect the internet side to one of the bridge ports, and the other bridge port to your router/firewall. Once these are connected, you can begin geo ip filtering. You can go to its Home page and see the traffic passing.

A new installation of PacketViper hasn’t changed much from 1.4.  The biggest changes and noticeable difference is the new optimized GUI screen, starting with the log in screen. You will find the interface is more dynamic and responsive, with better color coordination.

A new installation of PacketViper hasn’t changed much from 1.4.  The biggest difference is the log in splash screen logo.

PVNewLoginReviewing Filtering, Blocking, Alerting of PacketViper

PacketViper offers you a suite of options for Geo IP filtering. We will review the features and capabilities of five of them.

Country Filtering Page

ImageReview: The clickable country map area is very simple to use.  You can choose to country filter using a clickable map, or the text version of the countries.  Using your scroll button on your mouse you can quickly zoom in and out on the map.  This makes it easier to target those small countries.  This was a significant change from 1.4.

Mousing over an area of the map displays the traffic information along with related rules, triggers  and triggers.

The map can be displayed in several different heat maps, which gives you a variety of views for you to identify how you are filtering countries;

CountryDropDownInbound: Displays countries that you have filter rules set for inbound operations

  • Outbound: Display countries which have filter rules set for outbound operations
  • Threat: shows country threat levels based your traffic.
  • Inbound Blocked: Shows the countries where you have blocked the most traffic from
  • Outbound Blocked: Shows the countries where you have blocked the most traffic To.

The map can be clicked on and ports entered on a by country basis.  A small pop up will appear where you can restrict ports specifically to and from that country. You can also use the text version of the country filtering page where you can accomplish the exact same as you would if you click on the country on the map.

CountryMap_Notes_LoggingThe Country Filtering map display the amount of traffic you dropped shown in MB and connections.  In addition you are able to add notes and display logging for any particular country.  This is a good forensic tool for digging into your gateway traffic.

CountryMap_CountryDetails2.0 added a information link, which when click displays the complete details, along with a map of that country.  Some the details provided:

Country Code
Continent
Threat Level
Network Hosts
Users
User Rank

Global Network Lists

ImageAre proprietary network lists which contains well known global businesses, and high risk networks that customers can quickly enable to allow or protect themselves from. Customers can choose to restrict these lists bi-directionally by port, trigger, and shape traffic to their business needs.

You can use the custom filter at the top to narrow your search criteria to zero in on the right Global Network Lists for your company. Global Network Lists are evaluated second.

ImageNetcheck

NetCheck can be accessed any page.  Use NetCheck to view the complete details of any IP address.  In addition, is capable of blocking the IP, Network Range, Global Network Lists, or Country by port bi-directionally. NetCheck provides DNS and IP whois, Country, Region, City information, including assigned network ranges.

Custom Rules:

ImageIs an area for customer to enter specific networks relating to their business.  Something outside of the country filter and Global Network Lists evaluation layer.  Custom rules are good to add this obscure networks which are could fall with a Global Network List which you may want to exclude for those rules.

Within custom rules you can also specific a rule and base it on the country, or Global Network lists. This allows the customer to add their our specific rules based on their business model. Customer can apply global settings, to multiple rules, create groups, and disable logging within this area.

Image

Triggers, Alerts, Honeypots, Tarpit;  

Triggers and alerts can be setup to perform a variety of task to protect your networks.  Triggers cab be set to alert you on based on a country, global network lists, IP, or port.  Each trigger can be set with thresholds to and should the be exceed can auto block, rate limit, or notify. Trigger rules can also be set a priority evaluation so they can be moved anywhere in the security chain.

Management and Administration Reviews

The GUI interface makes our product one of the easiest to manage.  With its intuitive integration of geo location database to the logs and reporting modules, customers can quickly click any IP address and see its immediate IP details.  The system is capable of exporting its logs to your own event manager, and importing PCAP files so they can be analyzed faster.

PacketViper can be configured to accept updates which best suites your business needs, multiple users, log in captcha, and many other features to simple network management.

PacketViper, LLC took the guessing out at the gateway by providing simple interface to view what traffic is accessing from which country, and it networks.

How to Get It:

Visit http://wwww.packetviper.com and request a free trial.

Review By: Francesco Trama, CEO