cases for ibm xgs5000 (5.0) demo

84
© 2013 IBM Corporation IBM Security Systems IBM Next Generation IPS (XGS5000) demo

Upload: wilbert-fernando-alvarez-tirado

Post on 16-Jul-2015

145 views

Category:

Technology


2 download

TRANSCRIPT

Page 1: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

IBM Next Generation IPS (XGS5000) demo

Page 2: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

XGS5000 demo setup

Hacker

InternetInternet

Server UserDesktop

XGS5000

Page 3: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

XGS5000 demo setup – firmware, xpu, url & web db

Page 4: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

XGS5000 demo setup – inline blocking

Page 5: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

XGS5000 demo setup – leverage on X-Force default signature & blocking

Page 6: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

XGS5000 demo setup – fixpacks

Page 7: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Test cases

1. Blocking Web Application attacks2. Blocking malicious files3. Application control

• Blocking uploads4. URL control5. Enforcing user authentication6. Identifying applications and users

• Application that takes up the most bandwidth• Top users of a specific application• Breakdown of network and application traffic for a specific user• Breakdown of Web traffic category

Page 8: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

IBM X-Force detailed information on web applications, URLs

Page 9: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Blocking Web Application attacks – vulnerable web server

Page 10: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Blocking Web Application attacks – attempting XSS injection attack

Page 11: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Blocking Web Application attacks – page cannot load

Page 12: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Blocking Web Application attacks – XGS blocks attack

Page 13: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Blocking Web Application attacks – XGS blocks attack

Page 14: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Blocking malicious files – attempt to download file from server

Page 15: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Blocking malicious files – download disrupted

Page 16: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Blocking malicious files – XGS blocks malicious file download

Page 17: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Blocking malicious files – XGS blocks malicious file download

Page 18: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Blocking uploads

Page 19: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Blocking uploads – create new rule

Page 20: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Blocking uploads – create web application object

Page 21: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Blocking uploads – control uploading of data

Page 22: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Blocking uploads – deploy changes

Page 23: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Blocking uploads – add web application object to the rule

Page 24: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Blocking uploads – policy deployed

Page 25: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Blocking uploads – user logs in to email

Page 26: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Blocking uploads – user compose email

Page 27: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Blocking uploads – user attempt to upload file as attachment in the email

Page 28: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Blocking uploads - uploading

Page 29: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Blocking uploads – upload fail

Page 30: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Blocking uploads – XGS blocks upload via email

Page 31: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Blocking uploads – XGS blocks upload via email

Page 32: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Blocking uploads – XGS blocks upload via email

Page 33: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

URL control – create a new rule

Page 34: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

URL control – deploy changes

Page 35: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

URL control – create new URL list

Page 36: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

URL control – add URL to block in the list

Page 37: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

URL control – deploy changes

Page 38: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

URL control – URL list to rule

Page 39: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

URL control – deploy changes

Page 40: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

URL control – user attempt to access URL

Page 41: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

URL control – user redirected to XGS

Page 42: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

URL control – user redirected to XGS

Page 43: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

URL control – XGS display warning message, URL has been blocked

Page 44: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

URL control – XGS blocks URL

Page 45: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

URL control – XGS blocks URL

Page 46: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

URL control – XGS blocks URL

Page 47: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

URL control – access to other URL in the same domain is allowed

Page 48: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Enforcing user authentication – create group and user objects

Page 49: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Enforcing user authentication – create group and user objects

Page 50: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Enforcing user authentication – create group

Page 51: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Enforcing user authentication – create group and user objects

Page 52: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Enforcing user authentication – user object

Page 53: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Enforcing user authentication – user object

Page 54: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Enforcing user authentication – specify group membership

Page 55: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Enforcing user authentication – specify group membership

Page 56: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Enforcing user authentication – specify group membership

Page 57: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Enforcing user authentication – object created

Page 58: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Enforcing user authentication – create rule, source = unauthenticated users

Page 59: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Enforcing user authentication – deploy changes

Page 60: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Enforcing user authentication – create web application object

Page 61: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Enforcing user authentication – specify granular control for YouTube

Page 62: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Enforcing user authentication – deploy changes

Page 63: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Enforcing user authentication – add object to rule

Page 64: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Enforcing user authentication – deploy changes

Page 65: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Enforcing user authentication – set action to Authenticate

Page 66: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Enforcing user authentication – deploy changes

Page 67: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Enforcing user authentication – user attempt to access youtube

Page 68: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Enforcing user authentication – user attempt to load a video on YouTube

Page 69: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Enforcing user authentication – user redirected to authentication page

Page 70: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Enforcing user authentication – user fills in credentials

Page 71: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Enforcing user authentication – user redirected to YouTube video

Page 72: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Application that takes up the most bandwidth

Page 73: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Application that takes up the most bandwidth

Page 74: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Application that takes up the most bandwidth

Page 75: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Top users of a specific application

Page 76: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Top users of a specific application

Page 77: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Top users of a specific application

Page 78: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Breakdown of network and application traffic for a specific user

Page 79: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Breakdown of network and application traffic for a specific user

Page 80: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Breakdown of network and application traffic for a specific user

Page 81: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Breakdown of Web traffic category

Page 82: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Breakdown of Web traffic category

Page 83: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

Breakdown of Web traffic category

Page 84: cases for IBM xgs5000 (5.0) demo

© 2013 IBM Corporation

IBM Security Systems

ibm.com/security

© Copyright IBM Corporation 2013. All rights reserved. The information contained in these materials is provided for informational purposesonly, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the useof, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating anywarranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreementgoverning the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available inall countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s solediscretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in anyway. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the UnitedStates, other countries or both. Other company, product, or service names may be trademarks or service marks of others.

Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and responseto improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriatedor can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secureand no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed tobe part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems,products or services to be most effective. IBM DOES NOT WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THEMALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.