ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Arg! The money spent the month before I stated here.

    Scheduled Pinned Locked Moved IT Discussion
    119 Posts 9 Posters 9.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • wrx7mW
      wrx7m @scottalanmiller
      last edited by

      @scottalanmiller Right, but now almost everything is HTTPS.

      scottalanmillerS S 2 Replies Last reply Reply Quote 0
      • travisdh1T
        travisdh1 @StorageNinja
        last edited by

        @storageninja said in Arg! The money spent the month before I stated here.:

        @wrx7m said in Arg! The money spent the month before I stated here.:

        @jaredbusch Right but my question was related to ACLs, not IDS/IPS.

        Did they have compliance requirements that would drive IDS/IPS? Honestly, I wouldn't deploy an office network without some sort of layer 7 edge inspection. Users are just too dumb...

        No compliance related things, yet at least.

        1 Reply Last reply Reply Quote 0
        • scottalanmillerS
          scottalanmiller @wrx7m
          last edited by

          @wrx7m said in Arg! The money spent the month before I stated here.:

          @scottalanmiller Right, but now almost everything is HTTPS.

          Oh, I see what you mean.

          1 Reply Last reply Reply Quote 0
          • JaredBuschJ
            JaredBusch @wrx7m
            last edited by

            @wrx7m said in Arg! The money spent the month before I stated here.:

            @jaredbusch I know firewalls use rules. In Sophos and Sonicwall and others, I'm sure, you can define a host, network and service and call it something like ServerA and drag and drop the hosts/ip address, services and networks to create the rules.

            An ACL provides rules applied to IP address and ports.

            What you are describing is not an ACL. It is a group or list of information applied to an ACL.

            In the VyOS/EdgeMax world, you can see an example in my router snippet above. I have a firewall group named Strongarm.io that is an address group of two addresses.

            That group is applied to rule 1 of ACL named WAN_OUT

            1 Reply Last reply Reply Quote 1
            • S
              StorageNinja Vendor @wrx7m
              last edited by

              @wrx7m said in Arg! The money spent the month before I stated here.:

              @jaredbusch I know firewalls use rules. In Sophos and Sonicwall and others, I'm sure, you can define a host, network and service and call it something like ServerA and drag and drop the hosts/ip address, services and networks to create the rules.

              An object based rule engine. This is what most modern firewalls have moved to.

              1 Reply Last reply Reply Quote 0
              • S
                StorageNinja Vendor @wrx7m
                last edited by

                @wrx7m Inbound attacks on systems you are hosting it's still an issue (and yes, your IDS/F5/LB's need to terminate SSL for this to work). On the outbound traffic, there's a lot that can be inferred from what/where you are talking to. If someone is phoning home to a known bot C&C system then you likely want to know that...

                1 Reply Last reply Reply Quote 0
                • ObsolesceO
                  Obsolesce
                  last edited by

                  A lot of malware such as ransomware is delivered from legitimate SSL sites that have been hacked.

                  So if you don't have some kind of SSL Inspection (like SonicWALL's SSL-DPI), then you are solely relying on your users' AV and ability to spot fake "java update" ads for example.

                  scottalanmillerS 2 Replies Last reply Reply Quote 0
                  • scottalanmillerS
                    scottalanmiller @Obsolesce
                    last edited by

                    @tim_g said in Arg! The money spent the month before I stated here.:

                    A lot of malware such as ransomware is delivered from legitimate SSL sites that have been hacked.

                    So if you don't have some kind of SSL Inspection (like SonicWALL's SSL-DPI), then you are solely relying on your users' AV and ability to spot fake "java update" ads for example.

                    You are relying on the same thing in both cases, just one runs no a central processor and one runs closer to the end user. Same scanning functionality, though.

                    ObsolesceO 1 Reply Last reply Reply Quote 0
                    • scottalanmillerS
                      scottalanmiller @Obsolesce
                      last edited by

                      @tim_g said in Arg! The money spent the month before I stated here.:

                      ...and ability to spot fake "java update" ads for example.

                      No, that's not how that works. Anything that runs on the router can be run on the client machine. The idea that UTM can do something that traditional AV cannot is incorrect. It's the same thing, just one runs on a low powered shared machine and one runs on the high powered desktop.

                      ObsolesceO 2 Replies Last reply Reply Quote 1
                      • ObsolesceO
                        Obsolesce @scottalanmiller
                        last edited by

                        @scottalanmiller said in Arg! The money spent the month before I stated here.:

                        @tim_g said in Arg! The money spent the month before I stated here.:

                        A lot of malware such as ransomware is delivered from legitimate SSL sites that have been hacked.

                        So if you don't have some kind of SSL Inspection (like SonicWALL's SSL-DPI), then you are solely relying on your users' AV and ability to spot fake "java update" ads for example.

                        You are relying on the same thing in both cases, just one runs no a central processor and one runs closer to the end user. Same scanning functionality, though.

                        Security in layers... why not one at the gateway?

                        scottalanmillerS 1 Reply Last reply Reply Quote 0
                        • ObsolesceO
                          Obsolesce @scottalanmiller
                          last edited by Obsolesce

                          @scottalanmiller said in Arg! The money spent the month before I stated here.:

                          @tim_g said in Arg! The money spent the month before I stated here.:

                          ...and ability to spot fake "java update" ads for example.

                          No, that's not how that works. Anything that runs on the router can be run on the client machine. The idea that UTM can do something that traditional AV cannot is incorrect. It's the same thing, just one runs on a low powered shared machine and one runs on the high powered desktop.

                          It works because one protects against stuff that bypasses the firewall... like if you plug in an infected USB stick, or some other means of bypassing the firewall.

                          And the other helps against things that pass do through the firewall (like a pc connecting to the internet). Both together are better.

                          The SonicWALL may catch something the other does not.

                          The SonicWALL may deny something that an unprotected device can't see... like an iPAD with no antivirus or a cell phone on the wireless network.

                          travisdh1T scottalanmillerS 2 Replies Last reply Reply Quote 0
                          • travisdh1T
                            travisdh1 @Obsolesce
                            last edited by

                            @tim_g said in Arg! The money spent the month before I stated here.:

                            @scottalanmiller said in Arg! The money spent the month before I stated here.:

                            @tim_g said in Arg! The money spent the month before I stated here.:

                            ...and ability to spot fake "java update" ads for example.

                            No, that's not how that works. Anything that runs on the router can be run on the client machine. The idea that UTM can do something that traditional AV cannot is incorrect. It's the same thing, just one runs on a low powered shared machine and one runs on the high powered desktop.

                            It works because one protects against stuff that bypasses the firewall... like if you plug in an infected USB stick, or some other means of bypassing the firewall.

                            And the other helps against things that pass through the firewall. Both together are better.

                            Why do you need to pay so much money when you can get the same functionality free? That's my beef, not that security in-depth isn't a good thing.

                            ObsolesceO travisdh1T 2 Replies Last reply Reply Quote 1
                            • ObsolesceO
                              Obsolesce @travisdh1
                              last edited by

                              @travisdh1 said in Arg! The money spent the month before I stated here.:

                              @tim_g said in Arg! The money spent the month before I stated here.:

                              @scottalanmiller said in Arg! The money spent the month before I stated here.:

                              @tim_g said in Arg! The money spent the month before I stated here.:

                              ...and ability to spot fake "java update" ads for example.

                              No, that's not how that works. Anything that runs on the router can be run on the client machine. The idea that UTM can do something that traditional AV cannot is incorrect. It's the same thing, just one runs on a low powered shared machine and one runs on the high powered desktop.

                              It works because one protects against stuff that bypasses the firewall... like if you plug in an infected USB stick, or some other means of bypassing the firewall.

                              And the other helps against things that pass through the firewall. Both together are better.

                              Why do you need to pay so much money when you can get the same functionality free? That's my beef, not that security in-depth isn't a good thing.

                              Where do you get good SSL-DPI for free, with reliable gateway AV?

                              travisdh1T 1 Reply Last reply Reply Quote 0
                              • ObsolesceO
                                Obsolesce @scottalanmiller
                                last edited by

                                @scottalanmiller said in Arg! The money spent the month before I stated here.:

                                @tim_g said in Arg! The money spent the month before I stated here.:

                                ...and ability to spot fake "java update" ads for example.

                                No, that's not how that works. Anything that runs on the router can be run on the client machine. The idea that UTM can do something that traditional AV cannot is incorrect. It's the same thing, just one runs on a low powered shared machine and one runs on the high powered desktop.

                                I meant the user spot fake ads there.

                                1 Reply Last reply Reply Quote 0
                                • travisdh1T
                                  travisdh1 @Obsolesce
                                  last edited by

                                  @tim_g said in Arg! The money spent the month before I stated here.:

                                  @travisdh1 said in Arg! The money spent the month before I stated here.:

                                  @tim_g said in Arg! The money spent the month before I stated here.:

                                  @scottalanmiller said in Arg! The money spent the month before I stated here.:

                                  @tim_g said in Arg! The money spent the month before I stated here.:

                                  ...and ability to spot fake "java update" ads for example.

                                  No, that's not how that works. Anything that runs on the router can be run on the client machine. The idea that UTM can do something that traditional AV cannot is incorrect. It's the same thing, just one runs on a low powered shared machine and one runs on the high powered desktop.

                                  It works because one protects against stuff that bypasses the firewall... like if you plug in an infected USB stick, or some other means of bypassing the firewall.

                                  And the other helps against things that pass through the firewall. Both together are better.

                                  Why do you need to pay so much money when you can get the same functionality free? That's my beef, not that security in-depth isn't a good thing.

                                  Where do you get good SSL-DPI for free, with reliable gateway AV?

                                  Every proxy server around offers that.

                                  ObsolesceO 1 Reply Last reply Reply Quote 0
                                  • ObsolesceO
                                    Obsolesce @travisdh1
                                    last edited by

                                    @travisdh1 said in Arg! The money spent the month before I stated here.:

                                    @tim_g said in Arg! The money spent the month before I stated here.:

                                    @travisdh1 said in Arg! The money spent the month before I stated here.:

                                    @tim_g said in Arg! The money spent the month before I stated here.:

                                    @scottalanmiller said in Arg! The money spent the month before I stated here.:

                                    @tim_g said in Arg! The money spent the month before I stated here.:

                                    ...and ability to spot fake "java update" ads for example.

                                    No, that's not how that works. Anything that runs on the router can be run on the client machine. The idea that UTM can do something that traditional AV cannot is incorrect. It's the same thing, just one runs on a low powered shared machine and one runs on the high powered desktop.

                                    It works because one protects against stuff that bypasses the firewall... like if you plug in an infected USB stick, or some other means of bypassing the firewall.

                                    And the other helps against things that pass through the firewall. Both together are better.

                                    Why do you need to pay so much money when you can get the same functionality free? That's my beef, not that security in-depth isn't a good thing.

                                    Where do you get good SSL-DPI for free, with reliable gateway AV?

                                    Every proxy server around offers that.

                                    Have fun with that.

                                    travisdh1T 1 Reply Last reply Reply Quote 0
                                    • travisdh1T
                                      travisdh1 @Obsolesce
                                      last edited by

                                      @tim_g said in Arg! The money spent the month before I stated here.:

                                      @travisdh1 said in Arg! The money spent the month before I stated here.:

                                      @tim_g said in Arg! The money spent the month before I stated here.:

                                      @travisdh1 said in Arg! The money spent the month before I stated here.:

                                      @tim_g said in Arg! The money spent the month before I stated here.:

                                      @scottalanmiller said in Arg! The money spent the month before I stated here.:

                                      @tim_g said in Arg! The money spent the month before I stated here.:

                                      ...and ability to spot fake "java update" ads for example.

                                      No, that's not how that works. Anything that runs on the router can be run on the client machine. The idea that UTM can do something that traditional AV cannot is incorrect. It's the same thing, just one runs on a low powered shared machine and one runs on the high powered desktop.

                                      It works because one protects against stuff that bypasses the firewall... like if you plug in an infected USB stick, or some other means of bypassing the firewall.

                                      And the other helps against things that pass through the firewall. Both together are better.

                                      Why do you need to pay so much money when you can get the same functionality free? That's my beef, not that security in-depth isn't a good thing.

                                      Where do you get good SSL-DPI for free, with reliable gateway AV?

                                      Every proxy server around offers that.

                                      Have fun with that.

                                      What makes you think your favored solution isn't using ClamAV and Snort under the hood?

                                      ObsolesceO 1 Reply Last reply Reply Quote 0
                                      • ObsolesceO
                                        Obsolesce @travisdh1
                                        last edited by

                                        @travisdh1 said in Arg! The money spent the month before I stated here.:

                                        @tim_g said in Arg! The money spent the month before I stated here.:

                                        @travisdh1 said in Arg! The money spent the month before I stated here.:

                                        @tim_g said in Arg! The money spent the month before I stated here.:

                                        @travisdh1 said in Arg! The money spent the month before I stated here.:

                                        @tim_g said in Arg! The money spent the month before I stated here.:

                                        @scottalanmiller said in Arg! The money spent the month before I stated here.:

                                        @tim_g said in Arg! The money spent the month before I stated here.:

                                        ...and ability to spot fake "java update" ads for example.

                                        No, that's not how that works. Anything that runs on the router can be run on the client machine. The idea that UTM can do something that traditional AV cannot is incorrect. It's the same thing, just one runs on a low powered shared machine and one runs on the high powered desktop.

                                        It works because one protects against stuff that bypasses the firewall... like if you plug in an infected USB stick, or some other means of bypassing the firewall.

                                        And the other helps against things that pass through the firewall. Both together are better.

                                        Why do you need to pay so much money when you can get the same functionality free? That's my beef, not that security in-depth isn't a good thing.

                                        Where do you get good SSL-DPI for free, with reliable gateway AV?

                                        Every proxy server around offers that.

                                        Have fun with that.

                                        What makes you think your favored solution isn't using ClamAV and Snort under the hood?

                                        My favored solution is local A/V on every device, such as ESET, plus at the network gateway / firewall (and using SSL inspection when possible), local firewall enabled on all network clients, etc etc.

                                        What are you using? or are you just relying on a single layer? Can you guarantee A/V is running and up to date on every device on your wired and wireless network at all times?

                                        travisdh1T scottalanmillerS 3 Replies Last reply Reply Quote 0
                                        • ObsolesceO
                                          Obsolesce
                                          last edited by

                                          I don't know what size your company is, but when you have thousands of devices and hundreds of users... you need layers. You need layers no matter what actually.

                                          scottalanmillerS 1 Reply Last reply Reply Quote 0
                                          • travisdh1T
                                            travisdh1 @travisdh1
                                            last edited by

                                            @tim_g said in Arg! The money spent the month before I stated here.:

                                            I don't know what size your company is, but when you have thousands of devices and hundreds of users... you need layers. You need layers no matter what actually.

                                            @travisdh1 said in Arg! The money spent the month before I stated here.:

                                            not that security in-depth isn't a good thing.

                                            It doesn't matter what "size" the organization is, you need layered security everywhere, period.

                                            1 Reply Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 3
                                            • 4
                                            • 5
                                            • 6
                                            • 6 / 6
                                            • First post
                                              Last post