Introducing The Security Fabric
Introducing The Security Fabric
Introducing The Security Fabric
Presenter
Date
3
HTTP Threats
5
Application Layer Security
Network Firewall
• Network firewalls detect network attacks
• Inspect IP and port
IPS/Deep Packet
Inspection Firewalls
• IPS products detect known signatures only
• No real HTTP understanding (headers, FortiWeb
parameters, etc.) Web Application Firewall
• Signature evasion is possible, No protection
of SSL traffic, No application awareness
• No user awareness, High rate of false Network / Application layer
positives Transport (OSI 5-7)
layer
(OSI 1-4)
Only Web Application Firewalls can
detect and block application attacks!
6
FortiWeb WAF Deployment and Management Features
Application Layer Out of the box protection for the most complex
Vulnerability Protection attacks such as SQL Injection, Cross Site
Scripting, CSRF and many others
Data Leak Prevention Extended monitoring and protection for data
leakage and application information disclosure by
tightly monitoring all outbound traffic
Web Anti Defacement Unique capabilities for monitoring protected
applications for any defacement and ability to
automatically and quickly revert to stored version
8
FortiWeb WAF Application Delivery Features
9
FortiWeb Family- Appliances
FWB-4000E
FWB-3000E
FWB-600D
FWB-1000D
FWB-400D
FWB-100D
10
FortiWeb Product Matrix
100D 400D 600D 1000D 3000E/3010E 4000E
WAF Throughput 25 Mbps 100 Mbps 250 Mbps 1 Gbps 5 Gbps 20.0 Gbps
Latency Sub-ms Sub-ms Sub-ms Sub-ms Sub-ms Sub-ms
SSL Software Software Software ASIC ASIC ASIC
L7 Load Balancing P P P P P P
L7 DoS Protection P P P P P P
Site Publishing/SSO P P P P P P
Vulnerability Scanner P P P P P P
Antivirus/antimalware P P P P P P
GE SFP 0 4 4 2 4 4
10GE SFP+ 0 0 0 0 4 4
ADOMs N/a 32 32 64 64 64
11
FortiWeb Virtual Appliances
Enterprise grade virtual WAF
Deploy WAFs without extra hardware
Dynamic expansion in VM environments
Resource efficiency with uncompromised WAF functionality
VMware, Microsoft Hyper-V, Citrix XenServer, Open Source Xen, KVM, Amazon
Web Services (AWS) and Microsoft Azure.
Technical Specifications FortiWeb VM01 FortiWeb VM02 FortiWeb VM04 FortiWeb VM08
vCPU Support (Max) 1 2 4 8
Memory Support (Max) Unlimited* Unlimited* Unlimited* Unlimited*
Network Interface Support (Max) 10 10 10 10
Storage Support (Min / Max) 40 GB / 1TB 40 GB / 1TB 40 GB / 1TB 40 GB / 1TB
12
Operation modes
13
Reverse Proxy (Default)
14
Transparent Inspection
15
True Transparent Proxy
16
Offline Protection
17
How Does FortiWeb Block Attacks?
18
How Does Reverse Proxy Mode Block Attacks?
X Attack detected
Request blocked
FortiWeb replies with
HTTP error or TCP RST
19
How Does FortiWeb Block Attacks?
20
How Does Offline Mode Block Attacks?
21
Topology: FortiWeb Before, or After SNAT?
22
Topology: FortiWeb After SNAT
23
Topology: FortiWeb Before SNAT
24
Configuring FortiWeb to Find the Original Client’s IP
Your front-end
load balancer’s
IP
25
Administrative Domains (ADOMs) on FortiWeb
26
Assigning Administrators to ADOMs
27
Access Profiles & ADOM Administrators
28
FortiWeb Training
System Configuration
Date
Web Login
https://192.168.1.99
31
Real Time Dashboard
Customizable Dashboard
» System information
» CLI console
» System resources
» FortiGuard Information
» Attack log console
» Event log console
» Server status
» Policy sessions
32
Context Sensitive On-Line Help
33
Network Interfaces
34
V-Zone (bridge)
port1
35
V-Zone configuration
36
Routing
37
IP-Based Forwarding
38
Admin Accounts
39
Access Profiles
40
FortiGuard Subscription Services
41
FortiGuard Updates
42
Fail-open
43
Fail-Open Configuration
Connectivity is
interrupted
44
High Availability (HA)
45
HA topology
46
Heartbeat Interface
47
Fail-over
48
HA Configuration
49
Firmware upgrade
50
Why Log Externally?
51
Setup on FortiAnalyzer
52
External Logging to a FortiAnalyzer
53
FortiWeb Training
Policies and Profiles
Date
56
Web Protection Profiles Definition
57
Configuration Steps for Reverse-Proxy
Web
Protection Web
Policy Protection
Profile
1
2
Server
Virtual Policy
Server
Application
Delivery
Policy
5
3
1 DoS
Physical
Policy
Server or
Server Farm
1 4
58
Configuration Steps for Transparent Modes
Web
Protection Web
Policy Protection
Profile
1
2
Server
V-Zone Policy
Application
Delivery
Policy
5
3
1 DoS
Server
Policy (*)
Farm
(*) Only in True
Transparent Proxy mode
1 4
59
Configuration Steps for Offline Protection
Web
Protection Web
Policy Protection
Profile
1
2
Server
Policy
Application
Delivery
Policy
5
1 Server
Farm One port is selected
as the “Data
Capture Port”
3
60
Policy Behavior by Operational Mode
Reverse Proxy Offline Protection True Transparent Transparent
Proxy Inspection
Matches by •Server port •Data Capture Port •V-zone (bridge) •V-zone (bridge)
•Virtual Server •Server Farm •Server Farm •Server Farm
61
Creating a Virtual Server
62
Creating a Server Pool
63
Server Farms
64
Load Balancing
65
Round Robin
1
FortiWeb
1 2 3
2 Web application
Servers
66
Weighted Round Robin
For every 10 requests sent to physical server wg1, wg2 receives 2 requests
67
Least Connection
68
HTTP Session Based Round Robin
69
Session Persistence
70
Session Persistence (cont.)
71
Server Health Checks
72
Server Policy for Single-Server Reverse Proxy
73
Certificate Management
The FortiWeb unit requires the use of digital certificates for the
following tasks:
» SSL offloading and content scanning (Reverse Proxy only)
» HTTPS session content scanning (Transparent modes and Offline
Protection)
74
Certificate Signing Request
75
Certificate Status
76
Certificate Importing
77
SSL Offloading
78
Server Policy SSL Offloading
Select a service
79
SSL Inspection
80
Customized Services
81
FortiWeb Training
Web Protection
Date
87
Standalone IP or Shared IP
88
Shared IP Configuration
89
IP List
Black IP addresses
» They are not allowed to connect to the protected web servers
Trust IP addresses
» They are exempted from most of the protection scan and policies
90
Brute Force Login
91
Brute Force Login Entry
92
HTTP Protocol Constraints
93
Protocol Constraints Configuration
94
Cookies Overview
The HTTP protocol was not designed to maintain the data related
with the same user during the navigation
Cookies were introduced to achieve session management
95
Cookies Sequence
96
Cookie Poison
97
Cookie Poison Detection
To detect any change in the cookies, the FortiWeb unit encrypts the
digest of the cookie. This value is added as an additional cookie to
the cookie list under the syntax :
“AuthCookie_fortinet_waf_auth=<ENC>”
If the attacker replies with a different cookie, the digest will not match
When a cookie poison attack is detected, one of the following
actions can be triggered:
» Alert and deny
» Remove cookie
» Alert
» Period block
98
Start Page
100
Start Page Configuration
Actions:
• Alert
• Alert&Deny
• Period Block
• Redirect
• Send 403 Forbidden
101
Page Access
102
Page Access Configuration
103
URL Access
104
URL Access Configuration
105
Parameter Validation
106
Parameter Validation Rules
107
Upload Restriction Rules
Limits the file size and file types that can be uploaded to a
protected server
108
Upload Restriction Policy
109
IP Reputation
110
IP Reputation Policy
111
Allow Known Search Engines
112
Known Search Engines
113
Signature Policies
114
Signature Policy Configuration
115
Cross Site Scripting (XSS)
116
SQL Injection
117
Other Signature Policy Options
119
Fine Tuning the Signature Policy
120
Anti-Defacement
121
Anti-Defacement Configuration
122
How Anti-Defacement Works
The FortiWeb unit takes a backup of all the files matching the
policy configured. It also stores a checksum of them
During configurable intervals, the FortiWeb unit takes again the
checksum of the files being monitored
If a change is identified, the administrator has three possibilities:
» Can delete the file(s) altogether
» If you Acknowledge the changes, you are accepting them
» Restore the files to a previous revision kept by the FortiWeb unit
123
FortiWeb User Tracking
124
FortiWeb User Tracking
125
Web Vulnerability Scan
126
Vulnerability Scan Preparation
127
Vulnerability Scan Profile
128
Vulnerability Scan Profile Configuration
129
Vulnerability Scan Schedule
130
Vulnerability Scan Policy
131
Vulnerability Scan Report
132
Vulnerability Report Details
133
Third Party Scanner – Virtual Patching
Automatically use scan results to virtually patch vulnerabilities
XML integration customized to each scanning service
Partners
» IBM AppScan
» HP Webinspect
Web
» WhiteHat Application
» Acunetix
» Qualys
FortiWeb Automatic
Vulnerability
Patches
Third-party
Scanner
Vulnerabilities
XML
134
Virtual Patching
135
Virtual Patching
136
Virtual Patching
137
FortiWeb Training
Application Delivery and DoS Protection
Date
140
Local User
141
Remote Server (Radius example)
142
Authentication Rule
143
Authentication Policy
144
Authentication Offloading Sequence
145
File Compress Policy
146
File Compress Policy Configuration
147
Offloading Response Compression
148
Configuring the Cache
150
Why Redirect Clients?
151
How Redirects Work
152
Packet Trace: ARP through HTTPS Redirect
153
Why Rewrite?
154
How Rewrites Work
HTTP/1.1 200 OK
Last-Modified: Wed, 01 Apr 2015 07:59:17 GMT
ETag: "810-4f61ec71f1f40"
Content-Length: 12064…
HTTP/1.1 200 OK
Last-Modified: Wed, 01 Apr 2015 07:59:17 GMT
ETag: "810-4f61ec71f1f40"
Content-Length: 12064…
155
Config Rewrite
156
Denial of Service Protection
157
HTTP Access Limit
158
Real Browser Enforcement
159
Malicious IPs
160
HTTP Flood Prevention
Limits the number of HTTP requests with the same session cookie
If Real Browser Enforcement is enabled and the limit is reached,
the FortiWeb will validate if the requests are coming from a real
browser
161
TCP Flood Prevention
162
Applying DoS Protection
Steps:
1. Create individual DoS Protection Rules
2. Group the DoS Protection Rules by creating a DoS Protection
Policy
3. Apply the DoS Protection Policy to the Web Protection Profile
163
Stronger DDoS Protection?
164