This article is based upon the analysis done on various Next Generation Firewalls from different vendors. In order to determine the relative security effectiveness of devices on the market and facilitate accurate product
comparisons, there are some factors taken into considerations for all these next generation firewalls.
Fig 1.1 - Network Firewall
|
So if we are talking about the factors as per the Gartner says about Next Generation Firewall, we can take it as
- Inbuilt NGIPS- Next Generation IPS
- Stability
- Reliability
- Security effectiveness
These factors are very important factors for the next generation firewall and for the testing of the NGFW products the devices are deployed using the default or recommended policy as provided by
the vendor.This provides readers with the most useful information on key NGFW security effectiveness and performance
capabilities based upon their expected usage.
Lets start with the features for all the vendors. The vendors i am including here are
- Barracuda Firewalls
- Check Point
- Cisco NGFW
- Cyberoam
- Dell SonicWALL
- Fortinet
- McAfee
- Palo Alto Networks
- WatchGuard
Bypassing information from security devices by any means is conceal and modifying attacks in order to avoid detection and blocking by
security products. Resistance to bypass security devices are a critical component in an NGFW. If a single evasion is missed, an
attacker can utilize an entire class of exploits to circumvent the NGFW, rendering it virtually useless. Many of the
techniques used in this test have been widely known for years and should be considered minimum requirements
for the NGFW product category, while others are more recent. This particular category of tests is critical in the final
weighting with regard to product guidance.
Fig 1.2- Firewall Comparison
|
An NGFW should be able to identify users and groups and apply security policy based on identity. Where possible,
this should be achieved via direct integration with existing enterprise authentication systems (such as Active
Directory) without the need for custom server-side software. This allows the administrator to create even more
granular policies.
Security effectiveness testing leverages the deep expertise of Security engineers to generate the same types of
attacks used by modern cybercriminals, utilizing multiple commercial, open-source, and proprietary tools as
appropriate. With over 1800 live exploits, this is the industry’s most comprehensive test to date. Most notable, all
of the live exploits and payloads in these tests have been validated such that:
- Reverse shell is returned
- Bind shell is opened on the target, allowing the attacker to execute arbitrary commands
- Malicious payload is installed
- System is rendered unresponsive
Exploits can be initiated either locally by the target (desktop client) or remotely by the attacker against a server.
Since 2007, Researchers have noticed a dramatic rise in the number of client-side exploits, as these can be
easily launched by an unsuspecting user who visits an infected website. At first , IPS products did not focus on
these types of attacks, which were deemed to be the responsibility of antivirus products.
This approach is no longer viewed as acceptable and, despite the difficulty of providing extensive coverage for client-side attacks, the IPS (and NGFW) industry has attempted to provide more complete client-side coverage. This is particulary important for NGFW devices, which are typically used to protect client desktops rather than data centers and servers; the latter comprise deployment scenarios where separate, dedicated firewall and IPS devices are more common.
The security effectiveness of the IPS component of the NGFW can be seen in the following table as factors in
evasions to the exploit block rate
Fig 1.3- Security Effectiveness (IPS)
|
Finally, the overall security effectiveness of the NGFW is determined using the formula in figure 1. Here combines scores relating to firewall security effectiveness, IPS security effectiveness, and stability and reliability in
order to generate a combined security effectiveness score for the NGFW device.
Fig 1.4- Security Effectiveness (NGFW)
|
Long-term stability is particularly important for an in-line device, where failure can produce network outages.
These tests verify the stability of the DUT along with its ability to maintain security effectiveness while under
normal load and while passing malicious traffic.