Overview
January 2005
Tokyo, Seoul, Beijing, Shanghai, Hong Kong, Taipei, Singapore, KL, etc .
CONFIDENTIAL
La Vision
Le management des solutions de scurits Fortinet est effectu par une autre
gamme dAppliances nommes le Fortimanager. Fortimanager est une solution
complte pour facilement dployer, administr et contrl vos solutions Fortigate.
Fortinet, dveloppe et vends des produits Reseaux industriel, avec un trs haut
niveau de performance, ceci en intgrant les solutions Firewall, Vpn, antivirus, et
Intrusion Protection.
Ceci toujours dans une problmatique, afin doffrir une meilleur protection contre
les attaques multiples.
Pourquoi Fortinet ?
Firewall/VPN
UTM Security
Appliance
Total TM
Security
Appliance
2003
2004
2005
2006
2007
2008
2003
Share
(%)
CAGR
(%)
$1,479.1
$1,667.
7
$1,791.6
$1,804.4
$1,623.5
$1,462.3
93.4%
-0.2%
42.4%
$104.9
$225.0
$517.5
$828.0
$1,324.8
$1,987.2
6.6%
80.1%
57.6%
$1,584.0
$1,892.
7
$ 2,309.1
$2,632.4
$2,948.3
$3,449.5
16.8%
2008
Share
(%)
Revenue
Units
Revenue Share
30.9
21496
29.5%
$ 1,437.48
Symantec
24.0
13790
22.9%
$ 1,740.39
Secure Computing
22.8
5050
21.7%
$ 4514.81
ServGate
12.0
11743
11.4%
$ 1,021.89
Netscreen (acquired by
Juniper)
5.2
6601
5.9%
eSoft
4.0
3162
3.8%
$ 1,265.00
Pyramid Computer
1.3
509
1.2%
$ 2,554.03
Others
4.7
3680
4.5%
$ 1,227.12
104.9
66031
100.0%
$ 1,588.84
Total
Source: IDC, 2004
787.76
Branch Office
Medium Enterprise
Service Provider/Telco
Large Enterprise
FortiGate-5000
FortiGate-3600
FortiGate-3000
THROUGHPUT
Gigabit Eth
FortiGate 800
FortiGate 500A
Gigabit perf
FortiGate-400A
FortiGate-300A
FortiGate-200A
Integrated Logging
FortiGate-100A
FortiGate-60 / FortiWifi
FortiGate-50A
Fortinet Confidential
Branch Office
Medium Enterprise
New!
Large Enterprise
FortiMail-2000
FortiMail-400
Capacity
FortiReporter
FortiLog-800
FortiLog-400
FortiLog-100
FortiManager-3000
FortiManager-400A
FortiClient
Fortinet Confidential
Service Provider/Telco
Fonctionnalits
Fonctionnalits FortiGate
Pare-feu
VPNs
Slection des
communauts
utilisateurs
Association de groupes
utilisateurs des profils de
protection spcifique
Caractristiques Antivirus
Efficacit de recherche
Recherche contextuelle Consultation des sections appropries de la
base de connaissance, relativement la nature des donnes analyses
Haute performance
Seule solution dantivirus de flux acclr par ASIC pour un traitement
temps rel
Analyse des protocoles temps rel comme HTTP sans dlai notable
Performances ingales ce jour: 5x 10x fois suprieures aux solutions
logicielles traditionnelles
Caractristiques Antivirus
Trois services:
Protocoles supports
Trafic FTP
Message de remplacement
Le filtrage
antivirus sactive
au choix sur rgle
pare-feu
Analyse slective
sur les flux
risque
Granularit de
configuration
Optimisation des
ressources
Elment
diffrenciateur
par rapport aux
solutions
traditionnelles
Serveur Web
Internet
Analyse
antivirus
Proxy Cache
AV mode transparent
Pare-feu
Client
Intranet
Pas danalyse
antivirus
Contrle Grayware
Caractristiques Antivirus
Fitlrage statique
Listes noires / blanches
Contenu mots & phrases interdits
Filtrage dURLs
Import possible de la configuration par fichier texte
Filtrage dynamique
FortiGuard (service Fortinet )
Filtrage bas sur des catgories 56 categories
Activation
sur rgle
pare-feu
Analyse
web
slective
Optimisation
des
ressources
Filtrage
diffrenci
en fonctions
des groupes
utilisateurs
Consultation de rapports
sur les sites web filtrs en
fonction des profils
Tableau et camemberts
Autorises ou bloques
Soumission de nouvelles
pages web eou demande
de rvaluation dune page
web
4a
Internet
3b
3a
2
4b
5
Serveur FortiGuard
1. User requests a URL.
2. If the URL rating is already cached, it is compared with the policy for the user. If
the site is allowed, the page is requested (3a) and the response is retrieved (4a).
3. If the URL rating is not in the FortiGate cache, the page is requested (3a) and a
rating request is made simultaneously to a FortiGuard Serveurs (3b).
4. When the rating response is received (4b) it is compared with the policy while
the response from the Web site (4a) is received.
5. If the policy is to allow the page, the Web site response is passed to the
requestor (5). Otherwise, a configurable blocked message is sent to the
requestor.
Intranet
1
Client Web
Dfinition de listes
noires / blanches
statiques
Recherche de mots
clefs et filtrage de
dURLs
Les configurations de
blocs dURLs et de
mots clefs peut se fair
epar importation de
fichier texte
Caractristiques IPS
Certifi ICSA
Haute performance
Acclaration hardware (ASIC)
Permet une dtection en temps rel
Configuration simplissime
Caractristiques IPS
Le moteur IPS:
Intervient de lanalyse des paquets par le module de routage, le module parefeur et le module de rassemblage applicatif
Coordonne son activit avec le FortiASIC pour rapidement intercepter le trafic
et vrifier les attaques contre la base de signature
Caractristiques IPS
Exemple: Sasser
Dtection et prvention temps rel grce une connexion spcifique vers du moteur
IPS vers le module firewall
Caractristiques IPS
Activation des
dtections et
prventions
dattaque au niveau
des profils de
protection
Lanalyse IPS
sactive au choix sur
rgle pare-feu
Granularit de
configuration
Lutilisation des
ressources est
optimise
Elments
diffrentiateur par
rapport aux
solutions
traditionnelles qui
se limitent aux
VLANs et interfaces
Contrle de la source
Par adresses IP
Listes statiques
Listes dynamiques
(RBL)
Helo DNS lookup
Contrle du contenu
Characteristiques
Spam
Mots / phrases clefs
contrle de la source
contrle du contenu
Spammer
Destinataire
Antispam Scenarios
Internet
Internet
Pop3 / IMAP
Les SPAMs peuvent alors te supprims ou tagu avant avant quils ne soient reus
sur le serveur de messagerie
Le FortiGate analyse des courriels qui ont dj t trait par le MTA local
Vrification de ladresse
mail source en fonction de
listes statiques dfinies
localement
Liste noire:
Action = Spam
Liste blanche
Action = Clear
Internet
Email Sender
Recipient
SMTP
Serveur
Email Recipient
DNS-based
database
(ORDB, RBL, etc.)
Par exemple:
viagra = /v.?[il;1'!\|].?[a@0].?[gq].?r.?[a@0]/i
Caractristiques Pare-feu
Haute performance
Many-to-one (PAT)
Many-to-many NAT
H.323/SIP NAT Traversal
Authentification des
utlisateurs
Base de donnes locale
Support Radius
Policy-based NAT
Support LDAP
Support SecureID
Table de correspondance
IP/MAC
Qualit de Service
Trafic shaping
Bufferisation des donnes pour une rgulation du trafic selon les limites
paramtres
Les paquets dpassant les limites fixes sont mise en mmoire pour un
traitement ultrieur
Tente dviter les pertes de paquets en ajoutant ventuellement un dlai
aux transmissions
Utilisation de techniques de filtrage par panier de jeton pour garantir ou
limiter la bande passante
Files dattente
Bufferisation des paquets en file dattente
Filtes dattente haute / moyenne /basse priorit
En cas de congestion, les paquets de haute priorit sont traits en priorit
DiffServ
Marquage des champs DSCP
La qualit de
service
sapplique au
choix sur rgle
pare-feu
Granularit de
configuration
La bande
passante est
contrle
A partir du FortiGate 60
10
30
40
20
Trunk interface
Trunk interface
ModeTransparent
Les paquets sont ponts entre les VLANs.
Dans le cas dune insertion sur un trunk,
le FortiGate revient un pare-feu par
VLAN
30
30
40
Trunk interface
40
Trunk interface
Routage
Support de OSPF
Internet
Intranet
ISP2
Routage policy-based
Internet
Intranet
ISP2
Autre
trafic
Routage policy-based
Caractristiques VPN
Protocoles support :
Authentification:
IPsec, PPTP
L2TP/Passthrough of IPSec and
PPTP
Support de Xauth
Support des certificats X.509
Internet
ISP2
Authentification
utilisateur
Journalisation FortiClient
Haute-disponibilit Caractristiques
A partir du FortiGate-60
Haute-disponibilit Architecture
Cluster FortiGate :
Secours automatique et
transparent
Rpartition de charge
Internet
Lien HA
Interface quelconque
Non ddi
Peut tre redondant
Intranet
Haute-disponibilit Caractristiques
Les hearbeats HA
Servent :
Synchroniser les sessions pare-feu et IPSec
Synchroniser les configurations du cluster
Rapporter les statuts de fonctionnement (disponibilit des interfaces,
etc.)
Haute-disponibilit Configuration
Choix parmi 6
algorithmes de
rpartition de charge
Choix des interfaces
surveilles
Choix des liens HA
Le lien sur lequel seffectue les
changes HA a la plus grande
prioroit. Les autres liens sont en
secours
VLANs
Le routage
La configuration VPN
La configuration des authentifications utilisateurs (base locale, configuration RADIUS & LDAP)
Vdom et VLANs
VDOM et interfaces
Visualisation des VLANs
par domaine virtuel
DHCP Caractristiques
DHCP Relay
Serveur DHCP
Multiples plages dadresses IP par interface
Exclusion dadresses
WEP 64 or 128
Support de IPv6
Support clef pour le march japonais
Plusieurs adresse IP par tlphone portable
Web GUI
Scurise par SSL
Interface graphique
Interface
en 6
langues
Role-based management
Backup/restore
the entire config
Backup/restore
part of the config
Backup is done in
the form of a text
file
SNMP support
MIBs
Traps
CPU usage above 90%
proprietary MIB
Traps
HA cluster fails
Tunnel up/down
cold start
Flooding attacks
system down
interface up/down
Virus detection
Log full
Etc.
FortiManager Caractristiques
Device Manager
Models
Create offline devices and configs, check differences
Policy Manager
Create Policies for multiple devices and groups
Create Profil de protections for multiple devices
Admin Manager
Role Based Administration
Supports multiple simultaneous administrators with different
authorization levels
FortiManager Caractristiques
Centralized configuration and
management
Configuration and view of FortiGate
devices
FortiGate domains management
Devices groups
FortiManager Caractristiques
Firmware update
Centralized monitoring & logging
Status, trafic, alerts, etc.
Easy centralized data storage and analysis/reporting
Sortable and filterable logs
Log database backup
Realtime Monitor
System Health, Device Status, Session Monitor, trafic Flow,
Anti-Virus, Attack, Alert Notification
FortiManager Architecture
Console 1
Console 2
FortiManager
Admin
Console(s)
FortiManager
Server
(Appliance)
RDB
Security
Domain A
FortiGate
Firewall under
mgmt
Console N
Security
Domain B
Integral RDB
included in the
FortiManager
Server appliance
Config mgmt
Network mgmt
Monitoring/Log mgmt
Security mgmt
CLI
SSH
SFTP
API
Policy mgmt
Persistent
Storage API
FortiManager Serveur
Console(s)
RDB LDAP
SFTP API
SNMP API
FortiOS Firmware
FG Units
CLI/SSH
Corba-based interfaces
Eases integration into customer existing management systems
If changes are made to the device using the web-based manager or the CLI
rather than the FortiManager System, differences can occur between the
device and the database
Resynchronizing with the device forces the Serveur to retrieve the data from the
device
Antivirus highlights
Three services:
Virus detection
File and email blocking service (oversized files or pattern matching file names)
Supported protocols:
FTP traffic
Grayware control
Fortinet Confidential
Agenda
Firewall Features
Antivirus Features
Increase productivity
Viewing unproductive and objectionable material can
reduces employee productivity
4a
Internet
3b
3a
2
4b
5
FortiGuard Server
1. User requests a URL.
2. If the URL rating is already cached, it is compared with the policy for the user. If
the site is allowed, the page is requested (3a) and the response is retrieved (4a).
3. If the URL rating is not in the FortiGate cache, the page is requested (3a) and a
rating request is made simultaneously to a FortiGuard Servers (3b).
4. When the rating response is received (4b) it is compared with the policy while
the response from the Web site (4a) is received.
5. If the policy is to allow the page, the Web site response is passed to the
requestor (5). Otherwise, a configurable blocked message is sent to the
requestor.
Fortinet Confidential
Intranet
1
Web client
Fortinet Confidential
Static control
Based on local
black/white lists
Lists can be
imported from
text files
Agenda
Firewall Features
Antivirus Features
Web (URL) Filtering
IDS/IPS
Anti-SPAM
VPN
Virtual Domains
Administration
Fortinet Confidential
ICSA certified
Fortinet Confidential
Fortinet Confidential
Detection methods:
Signatures
Anomalies
Scanning attacks
Flooding attacks
Fortinet Confidential
Agenda
Firewall Features
Antivirus Features
Web (URL) Filtering
IDS/IPS
Anti-SPAM
VPN
Virtual Domains
Administration
Fortinet Confidential
Source blocking
By IP addresses
Static lists
Dynamic lists
(RBL, ORDB)
FortiShield
Reverse DNS
lookup
By URI content
By email addresses
Spammer
Fortinet Confidential
Content blocking
Spam characteristics
Banned words
Recipient
Internet
Internet
Pop3 / IMAP
Fortinet Confidential
Email address
FortiShield (IP Address and URI scanning)
SPA
Content blocking
MIME headers
Banned word
Or rejected (SMTP)
Benefits
Greatly reduces processing overhead on email servers and antispam
gateways
Reclaims bandwidth taken by spam email
Supplements any other antispam solution
Cost effective managed solution lowers maintenance overhead of
managing static content filters
Session
5.5.Session
terminate
terminate
d if Spam
d if Spam
FortiShield
AntiSpam
Service
Extract
2.2.Extract
Server
Server
Source
Source IPIP
Address
Address
Receive
4.4.Receive
Result
Result
(Cachefor
for
(Cache
future
use)
future use)
FortiGate
or
FortiMail
Check
3.3.Check
Source
Source
with
IPIPwith
Databas
Databas
e
e
FortiMail
or
SMTP Email Server
Clients
Email
Hi there,
how are you?
<Spam>
FortiShield
3.3.FortiShield
scans
spam
scans spam
URIcontent
content
URI
FortiGate
or
FortiMail
Email
2.2.Email
content
content
inspected for
inspected for
URIcontent
content
URI
FortiShield
4.4.FortiShield
result
result
receivedand
and
received
cached
cached
Hi there,
how are you?
<Spam>
FortiShield
AntiSpam
Service
Spamfiltered
filteredor
or
5.5.Spam
taggedand
and
tagged
distributedbased
based
distributed
on
policy
on policy
FortiMail
or
SMTP Email Server
Clients
Agenda
Firewall Features
Antivirus Features
Web (URL) Filtering
IDS/IPS
Anti-SPAM
VPN
Virtual Domains
Administration
VPN Highlights
Supported protocols:
Authentication:
IPsec, PPTP
L2TP/Passthrough of IPSec and
PPTP
Hardware encryption:
VPN benefits
VPN redundancy
Up to 3 redundant VPN gateway can be defined
for each VPN tunnel
VPN gateway availability is checked using DPD
Can be used to setup redundant tunnels with
redundant ISPs:
ISP1
Internet
ISP2
Agenda
Firewall Features
Antivirus Features
Web (URL) Filtering
IDS/IPS
Anti-SPAM
VPN
Virtual Domains
Administration
Virtual domains
VDOM objects:
VLANs
Routing setup
VPN setup
Agenda
Firewall Features
Antivirus Features
Web (URL) Filtering
IDS/IPS
Anti-SPAM
VPN
Virtual Domains
Administration
Users
Security Policy
Device configuration
Administrator
Assignable permissions
Not accessible
Read only
Read / write
Lock-downadministration
administration
Lock-down
Host
system
Host system
Web GUI
Security through SSL
Backup/restore
the entire config
Backup/restore
part of the config
Backup is done in
the form of a text
file
SNMP support
MIBs
Traps
CPU usage above 90%
proprietary MIB
Traps
HA cluster fails
Tunnel up/down
cold start
Flooding attacks
system down
interface up/down
Virus detection
Log full
Etc.