NSS Group logo

CyberGuard STARLord

Table of Contents

Introduction
What is a Firewall
Firewall Architecture
Static Packet Filtering
Dynamic Packet Filtering/Stateful Inspection
Proxy Servers
CyberGuard STARLord
Platform & Architecture
Installation
Management 
Configuration
Reporting
Other Features
Verdict

INTRODUCTION

With the whole of the networking world moving toward inhabiting a single global village, we inevitably have to start thinking about locking our doors and bolting our windows. It has to be recognised that no computer system can ever be 100 per cent secure, but it has to be secure enough to deter the casual hacker – we don’t want some spotty adolescent spiriting away our corporate secrets from his bedroom using nothing more than a cheap PC, a modem and a few lines of code downloaded from the “Hackers ’R’ Us” Web site.

One in five respondents to a recent survey admitted that intruders had broken into, or had tried to break into, their corporate networks, via the Internet, during the preceding twelve months. This is even more worrying than it sounds, since most experts agree that the majority of break-ins go undetected.

For example, attacks by the Defence Information Systems Agency (DISA) on 9,000 US Department of Defence computer systems had an 88 per cent success rate but were detected by less that one in twenty of the target organisations. Of those organisations, only five per cent actually reacted to the attack (Source: NCSA).

The first step in securing our networks is not to rush out and buy the best firewall or encryption software we can find, however. Instead, some thought and effort should be put into developing a comprehensive, yet manageable, corporate security policy. This needs to cover everything from anti-virus protection to business recovery strategy. It should cover network access, password policy, authentication methods and how and when encryption should be employed. It should also cover physical security aspects too, such as building access, shredding of sensitive documents, and physical security of PCs and file servers.

When it comes to implementing the security policy, one of the major tools available to the network administrator is the firewall.

What Is A Firewall?

There are a number of definitions of the firewall, but perhaps the simplest is “a mechanism used to protect a trusted network from an untrusted network”. A firewall is a system, or group of systems that enforces an access control policy between two networks, and thus should be viewed as an implementation of policy.

The bottom line, therefore, is that a firewall is only as good as the Security Policy it supports. However, it is also true to say that a completely secure firewall is not always transparent to the user, and this can often lead to problems of users trying to circumvent the corporate security policy to get around some unpopular restriction imposed by the firewall.

In addition to providing protection from outside attacks, many firewalls today can present just a single IP address to the outside world (known as Network Address Translation, or NAT), thus hiding the real structure of your network from prying eyes. They will also usually provide full auditing and reporting facilities.

One thing to bear in mind right from the outset is that a firewall is not simply for protecting a corporate network from unauthorised external access via the Internet, it can also be used internally to prevent unauthorised access to a particular subnet, workgroup or LAN within a corporate network.

Figures from the FBI suggest that 70 per cent of all security problems originate from inside an organisation. Thus, for example, if your Research and Development department has its own server, you could protect it and the department’s workstations behind a firewall, whilst still allowing them to remain a part of the corporate-wide network.

One caveat here, however. Be aware that there are few firewalls on the market today that can provide wire speed throughput even at 100Mbps, let alone Gigabit speeds. Whilst this is not always an issue when the firewall is sitting in front of a slow Internet link, it can cause some serious bottlenecks if you try to put it on a Gigabit backbone!

With recent advances in processing speeds and multi-processor implementations we are beginning to see dedicated appliances that can provide wire speed throughput on a Fast Ethernet network with a proxy server architecture, and even higher speeds when configured as stateful inspection devices. Careful network design and load balancing across multiple firewall devices are still prerequisites for Gigabit networks and above, however.

Firewall Architectures

When looking at today’s firewall products, there are three main architectures currently in use :

Static Packet Filtering

Working at the Network Layer of the OSI stack, packet filters make simple deny or permit choices depending on the source/destination network address and port number contained within the packet, determined by a number of rules defined by the administrator.

Packet filtering is fast, transparent (no changes are required at the client), flexible and cheap (most routers will provide packet filtering capabilities, pure packet filter firewalls do not require powerful hardware on which to run). However, packet filter firewalls are traditionally difficult to configure and provide relatively poor logging capabilities.

Dynamic Packet Filtering/Stateful Inspection

Some vendors are touting this as the “third generation” of firewall architectures, but it is really just an extension of the basic packet filtering architecture employed by most routers, and is becoming more and more common in even the most basic firewall products. With the release of version 2.4 of the Linux kernel, stateful packet filtering is even available in your basic Linux distributions.

Stateful Inspection occurs at the MAC or Network Layer, thus making it fast and preventing suspect packets from travelling up the protocol stack.

Unlike static packet filtering, however, Stateful Inspection is capable of making its decisions based on all the data in the packet (corresponding to all the levels of the OSI stack), although it is rare that all seven layers are examined in any great depth in practice.

The state of the connection is monitored at all times (hence Stateful Inspection), allowing the actions of the firewall to vary based on the administrator-defined rules and the state of previous conversations. In effect, the firewall is capable of remembering the state of each ongoing conversation across it and dynamically modifying the packet filter rules to suit (hence Dynamic Packet Filtering), thus allowing it to more effectively determine which inbound packets are part of an existing session and which are “rogue” packets.

Proxy Servers

A Proxy Server firewall acts as an intermediary for user requests, setting up a second connection to the desired resource either at the application layer (an application level gateway) or at the session or transport layer (a circuit level gateway).

A strong application proxy works at all seven layers of the OSI model, performing such tasks as verifying the RFC-required three-way handshake which are normally omitted by pure stateful inspection devices. It will also ensure that protocol header lengths meet with RFC guidelines, hence preventing an entire class of buffer overrun attacks.

Proxy code actually “stands in” for both client and server operations, relaying valid requests between the trusted and untrusted networks via the proxies. Unlike Packet Filter and Stateful Inspection firewalls, a direct connection is never allowed between the two networks. It is important to note that the application proxy actually builds a new datagram from scratch, only copying known acceptable commands to the new datagram before forwarding it to the server behind the firewall. The datagram that enters the firewall from the outside is thus not the datagram that is delivered to the server, and thus the proxy effectively breaks the client server model (but in a “good way”).

With other technologies such as packet filtering there is still a direct connection between the client and server, albeit one that is monitored closely for abnormalities in a Stateful Inspection architecture. However, the nature of the direct connection does still provide the means for attackers to either hide data in unused datagram headers or to bury dangerous commands within the data area. This is simply not an issue with Proxy Servers.

The penalties paid for this level of security, however, are performance (Proxy Server firewalls have large processor and memory requirements in order to support many simultaneous users), and flexibility (since the introduction of new Internet applications and protocols can often involve significant delays while new proxies are developed specifically to support them). Once again, recent advances in processor speeds and SMP platforms are beginning to provide effective arguments against the performance criticism in well-designed systems, whilst the provision of “generic” proxies can allow unsupported protocols to be handled by the firewall.

Whilst static packet filtering alone is usually confined to the router these days and not considered strong enough for enterprise class firewall devices, the differences between the remaining two architectures are negligible in most real world environments.

True proxy servers are undoubtedly the safest, but can impose a severe overhead in heavily loaded networks if not designed properly. Dynamic packet filtering is definitely faster, though most of the high-end firewalls are hybrids these days, incorporating elements of all three architectures and, arguably, the “best of all worlds”.

One final consideration is the underlying operating system. Good firewall code will not help if the OS on which the firewall is running is itself not secured. Whilst a dedicated firewall OS could be considered the best solution to this problem, general purpose operating systems can offer a secure platform providing they are “hardened” sufficiently before the firewall is installed.

However, at the end of the day, it is just as important to ensure that you have a comprehensive security policy in place and that your firewall is configured and managed effectively, as it is to have a firewall in the first place.

After all, a badly configured firewall could lead to a false sense of security – and that could be worse than leaving yourself unprotected.

CyberGuard STARLord

CyberGuard was one of the first firewall products to achieve the rigorous ITSEC E3 classification, and for a long time this made it the product of choice for sensitive Government and military applications in the UK. It is still the only commercially available firewall to ever achieve the even more rigorous Orange Book B1 certification, and has since added B2 functionality.

In January 2001, the prestigious Common Criteria Evaluation Assurance Level 4 (EAL4) certification was achieved for the CyberGuard Firewall for Secure UnixWare Release 4.3 software, and the appliance line which incorporates that software.

Fig1_STARLord.JPG (37553 bytes)
Figure 1 - The CyberGuard STARLord

This white paper examines the new STARLord premium network appliance, a complete hardware and software solution running on the Unix version of CyberGuard 4.3. STARLord is the high-end enterprise-level product in the CyberGuard family of premium appliance firewalls, which consists of:

FireSTAR - Designed for use in mid-size, growing network environments and available as a compact 1U size unit.

KnightSTAR - Designed to provide powerful protection for enterprises, data centres and service providers, and available as a 2U or 5U size unit.

STARLord - Designed to provide comprehensive security for high-bandwidth data centres, web hosting and ISP/ASP markets, and available as a 4U size unit.

Platform & Architecture

On the hardware front, STARLord comprises a 17” 4U rack-mount unit with a door in the front cover which hides the power and reset buttons, status LEDs, hot-swap hard drive array, floppy and CD-ROM drives.

The latter is particularly useful since it provides a rapid recovery mechanism (less than 30 minutes for a complete reinstall of all software including the OS) via a pre-staged installation image (using Symantec Norton Ghost) burned onto bootable CDR media.

The entire front cover can be removed to reveal the three hot-swap power supplies, any two of which can power the appliance. Under the easily-removable top cover (which makes maintenance tasks straightforward when the STARLord is installed in a sliding rack-mount assembly) there are six PCI slots – one is occupied by the SCSI RAID controller, leaving five available for various combinations of network cards. The default configuration comes with two Gigabit Ethernet interfaces, and eight auto-sensing 10/100 Ethernet ports, leaving one slot free.

Also under the hood are six hot-swap cooling fans, quad 700MHz Pentium III Xeon processors, and 1GB ECC RAM. CyberGuard claims that this level of processing power will provide over 700Mbps throughput and support for over 600,000 simultaneous connections. There are five hot-swap drive bays, and four SCSI drives are provided in a RAID 5 array in the default configuration. A high availability option is also available, with two identical STARLord devices linked via two dedicated heartbeat cables providing fully-automatic fail-over.


Figure 2 - Inside the STARLord

The motherboard used in the STARLord supports Intel’s Intelligent Platform Management Interface (IPMI) which defines a standardised, abstract interface to the platform management hardware on selected Intel motherboards. It gives the host system management software the ability to track and obtain information on certain physical components in the system.

A user-level daemon process will monitor an IPMI device driver embedded in the kernel in order to collect information and statistics related to certain hardware components on the platform’s motherboard:

  • Chassis intrusion
  • Power
  • Temperature
  • System Fans 

This information will be used both to display data to a GUI window, and to determine if preset thresholds related to those hardware components have been exceeded. Should any of the preset thresholds be exceeded, an alert can be generated for delivery via the standard firewall mechanisms to the administrator.

Although it doesn’t need one to operate, a keyboard and mouse can be attached for local configuration, and there is a serial port on the rear panel for configuration via a remote console.

The underlying operating system, a hardened version of SCO UnixWare, is actually a B2-compliant secure system, and provides a robust and secure platform for the firewall code itself. CyberGuard can also be supplied as a software-only product, of course, together with installation assistance and training.

CyberGuard is one of the new breed of hybrid firewalls that effectively combines all three firewall architectures in a single package. It is also possible to combine multiple physical network interface controller (NIC) ports into one logical network interface - via a feature known as Link Aggregation (LAG) - thus providing increased reliability, via redundancy, and/or increased throughput.

The protocol and configuration utilities treat a Link Aggregate group just as they would a single, physical NIC, and all physical ports which are members of the same Link Aggregate group share the same MAC and IP address.

Redundancy comes via a LAG feature called Hot Standby, where two physical ports are configured beneath one LAG device, but only one physical port is active at a time. If the active port’s link fails, the LAG device will activate the other port for a seamless fail-over.

Performance, on the other hand, is provided by a feature called Basic Aggregation. In this mode, as with Hot Standby, two or more physical ports are configured beneath one LAG device, but this time all physical ports with good link status are considered active. Packets can be received on any of the active ports, and the LAG driver will distribute output traffic over all active ports (although the driver will transmit packets of the same flow via the same port to maintain packet order within a flow). 

Installation

Installation is totally painless, since STARLord comes pre-staged and configured out of the box (even the customer’s own DNS and network interface configuration can be pre-loaded at the factory) ready for custom rules to be applied.

The fact that it is only necessary to connect a few Ethernet leads to have it up and running makes STARLord ideal for large-scale remote deployment, since the plug and play approach means anyone can physically install the device, following which all major configuration and management can be performed via an SSL-encrypted browser-based console.

It is also possible for a central administrator to provide a “personality file” (created via a browser-based JavaScript utility called KSINIT) on floppy disk that contains pre-defined parameters for critical components of the STARLord system:

System host name

Domain name

High Availability configuration

Network interface names, IP addresses, and subnetwork masks

Central Authentication configuration parameters

Remote Web administration configuration parameters to permit access to the appliance

System license data

System time – Manual or NTP?

Mouse type

Default route

Administrator login and password

The personality file is read on first boot, allowing the firewall to boot fully configured to talk securely on the network (or Internet) to a remote administrator for initial configuration.

Fig3_STARLord KSINIT.jpg (78338 bytes)
Figure 3 - The STARLord Web-based initialisation screen

A complete image of a pre-installed STARLord system is also provided on a bootable CD-ROM along with Norton Ghost software, thus providing a simple means to restore a unit back to “factory” condition, or upgrade to the latest release of software, in under thirty minutes simply by inserting the CD and power cycling. We used the CD included with the review unit to upgrade the STARLord to the latest version of the firewall software – 4.3 PSU 1.

Finally, the remote administration capabilities are completed with the Automatic System Update feature. This provides the ability for a firewall administrator to update a system with firewall and operating system patches automatically via a secure remote download rather than manually via media such as floppy disk, tape, or CD-ROM.

The power and simplicity of this approach should not be underestimated. Many firewall appliances force the administrator to attach a local console to perform initial configuration of the network interfaces or, even worse, require that a networked PC be re-configured with an arbitrary IP address that allows it to communicate with a similarly pre-configured interface on the firewall. Neither of these approaches is conducive to installation by unskilled personnel, usually requiring the network, security or firewall administrator to make a personal visit to the remote site to install and configure the appliance.

The ability to provide all the machine-specific parameters in a text file that can be created using the KSINIT utility running on any PC means that a CyberGuard appliance can be shipped to remote sites in a pre-configured state. New software updates can be applied in less than thirty minutes by simply loading the bootable CD before powering up. With the latest release of the software, it is even possible to fetch and install a partial or complete configuration stored on a remote system - using FTP- during the initial boot of the system after it is installed. The configuration to load is expected to have been stored in an encrypted or plain text format as a cpio or tcpio archive, and this feature can be used to configure a new installation or recover from a catastrophic failure.

Following that, the KSINIT floppy disk is inserted and the appliance power cycled, after which it becomes available for remote configuration via an encrypted link over the corporate network or even the Internet. At this point, the administrator in the central office can apply the appropriate security policy and the firewall is ready for use. 

All of these features ensure that the CyberGuard appliance can be installed on remote sites by unskilled personnel, whose only task is to place the appliance in the rack and connect the power and network cables to the correct sockets. From that point on, the initial set-up and configuration of the appliance is under the ultimate control of the administrator. 

This “hands-off” method of deployment is perfect for large multi-site corporates, or for providing the means to “mass produce” pre-configured firewalls for ISP/ASP environments.

Management

The management interface is entirely graphical, and very intuitive - not at all what you would expect from a Unix-based system. The documentation is excellent too – very clear and comprehensive.

All configuration can be performed directly at the server console, or via an optional remote management package available that utilises a secure encryption mechanism (SSH). The latest release also provides a secure (128 bit SSL) Web-based administration capability facilitated by the integration of Tarantella Enterprise software. Firewall administrators can be authenticated via a centralised RADIUS server, and different roles can be assigned to different administrative personnel, each role restricting the level of access permitted to the administrator.

This makes it possible to administer every CyberGuard firewall in an organisation (whether Unix or NT-based) from any single console. The Central Commander, as it is known, allows you to define rules and configurations and export these to individual firewalls or groups over an encrypted link.

The Central Commander can also be configured in a redundant management scheme to facilitate non stop security and management across geographically independent network operation centres.

Using the remote management option, it is possible to take control of a remote console and configure it on the fly, and all alerts and alarms generated by the remote firewalls can be sent back to the Central Commander console.

Fig4_w_cm_alertchoice.gif (20925 bytes)
Figure 4 - Central Commander screen

All changes made to the firewall configuration are also tracked by a secure “ticketing” or version control system which permits system administrators to audit and track changes to the firewall and system configuration. Each “ticket” is associated with the configuration file modifications made by a specific administrator, and the modifications are logged in a database. The database is maintained by the Source Code Control System (SCCS) which is a reliable Unix-based system used to store and maintain changes made to the contents of specified files. SCCS is capable of displaying the changes (deltas) between an older version of a file and its current version, as well as merging those changes or restoring previous changes, and providing change auditing capabilities.

A new “Save and Restore” option also provides the ability to save and restore firewall configuration files. A history of configuration files can be archived on the firewall or on a remote system, and files can be archived on a scheduled basis. Configuration files can also be restored to any directory or currently active firewall

Configuration

As with any good firewall, CyberGuard is set to deny everything by default. Below the proxy servers in the stack operates a full packet filter firewall, incorporating the usual static filters as well as the more flexible dynamic filters, often called “Stateful Inspection” by other firewall vendors.

The CyberGuard packet filter is as far removed from a router-based system as it is possible to get, however. An intuitive icon and menu-driven utility allows you to specify whether individual services should be permitted, denied or proxied, and on which network interfaces, based on the source or destination host addresses, network service and protocol - no esoteric command-line stuff here.

Fig5_w_filter_basic.gif (21329 bytes)
Figure 5 - Defining packet filter rules

The ability to define user-friendly names for networks and hosts (and logically bundle them together into named groups) ought to make the rules that much easier both to define initially, and analyse later. However, the user-friendly names do not actually appear in the packet filter definition window.

Using stateful rules-based packet filtering techniques, it is possible to enforce connection time-out periods, maintain an audit trail of connections, force port matching and validate source addresses (to protect against IP spoofing). Unlike other stateful-type architectures, however, CyberGuard’s stateful packet filter implementation is not susceptible to ACK flooding. It is also possible to implement TCP SYN flood protection with different timeout periods for every packet filter rule.

At the highest layer of the OSI stack, there are a number of smart application proxies, including circuit gateway, authenticating, and content enforcement proxies. Circuit gateway proxies (such as SOCKS) provide a relay connection between the public and private networks, ensuring that only well-formed requests traverse the firewall.

Authenticating proxies require users to authenticate or log on to the firewall before allowing connections to traverse it, thus ensuring that a valid user is identified before allowing, say, an FTP connection.

It is then possible to determine the individual activities permitted or denied - FTP Get or Put, for example - on a per user basis. If a proxy is not defined as requiring authentication, then it is completely transparent to the end user, and no client configuration is necessary.

Finally, content enforcement proxies examine the content of network connections and control the actions or information travelling through the firewall. The HTTP proxy, for example, is capable of scanning inbound connections for ActiveX, Java, JavaScript or VBScript content and quarantining that content if required.

Proxies are provided for the following services:

  • FTP
  • Gopher
  • HTTP
  • LDAP
  • NNTP
  • Lotus Notes
  • RealAudio
  • Remote Login
  • SMTP
  • SQL *Net
  • Telnet
  • X-Windows
  • Socks
  • Port Guard – Generic Proxy
  • Passport One (user authentication)
  • Load Balancing Proxy 
  • NT Authentication

The generic proxy allows administrators to define source port, destination port and destination server to allow traffic through the firewall where it is necessary to provide more protection than is available through packet filtering, but where there is not a specific proxy available. The only proxy that is in the NT product but missing here is POP3.

The Split Domain Name System (DNS) hides critical information when the firewall is configured as the network DNS server. A separate DNS server can be configured for each network interface, responding to DNS queries only for its own interface and hiding all others.

Although internal host requests can be configured to resolve external host names, DNS requests from external hosts cannot resolve internal names. Together with address translation (where the external network sees only a single firewall IP address, no matter how many internal hosts are behind it), this permits the utilisation of unregistered IP addresses within the customer’s private network.

The NT Authentication Detection Daemon (NTADD) Proxy is a stand-alone daemon that provides authorisation of multiple service connections through the firewall, contingent upon a single, successful authentication session. Access rules for the authenticated user are applied to the connecting system for the duration of the session and are removed by the proxy upon termination of the session. 

The addition of this proxy provides an added layer of security on top of NT domain authentication and identification in that it allows access from an NT client to a Primary Domain Controller (PDC) if and only if the client has successfully authenticated with the PDC and only for the duration of the time the client remains authenticated. The proxy mediates the access during the authenticated session so that no direct connections are permitted between the PDCs and NT Clients at any time.

Both static and dynamic Network Address Translation are allowed on any of the interfaces installed in the firewall. The combination of Static NAT, Dynamic NAT and integral Split DNS provides enormous flexibility when it comes to hiding the configuration of the internal network from would-be intruders.

Creating the rules for the firewall is very straightforward, since the graphical user interface is very intuitive and the documentation is excellent. The ability to duplicate existing rules in order to make minor modifications, and to re-order rules quickly and easily using up and down arrow buttons makes rules configuration as quick and painless as possible.

Fig6_w_prox_httpset.gif (26873 bytes)
Figure 6 - Configuring proxy services

One of the nicest features is that configuring a proxy server automatically creates the appropriate packet filter rules which are then available for examination or further manual modification in the packet filter rules window.

This does cause a few problems depending on how you define your DMZ, however. Given that there is no specific interface definition for DMZ, you have to designate it either as “internal” or “external”.

Since many of the auto-generated rules from the proxies allow access from “all internal” interfaces, you may find yourself providing access to somewhere from your DMZ which you had not intended. This can be solved by designating the DMZ as an “external” interface and maybe opening a couple of extra paths to it using manual packet filer rules, but we would prefer to see a specific DMZ interface within CyberGuard and have the auto-generated rules treat it sensibly.

CyberGuard also includes a unique user-based authentication feature called Passport One, which allows the administrator to define rules on a per-user basis rather than by IP address, thus eliminating the risk of users gaining access to unauthorised services by logging on at another machine.

Users can be defined at the CyberGuard console to authenticate with a simple password, RADIUS, SecurID or SecureNetKey technologies. Each user can be restricted to a single source address, have their connection time limited, and have their FTP operations restricted to certain commands.

Effectively this feature allows the administrator to build “virtual firewalls”, since the rules only exist after the user properly authenticates. Then, when the user has completed his session, the rules are removed. Hence the term “virtual firewall” – it is not possible to hack a rule if it does not exist in the rule base!

Reporting

Auditing and reporting capabilities of CyberGuard are amongst the best we have seen. 

Fig7_w_usr_central.gif (22025 bytes)
Figure 7 - Configuring alerts and reporting activity

It is possible to specify in fine detail which activities should be logged by the firewall, including all packets processed, only denied packets, only permitted packets, login attempts, session completion, system updates and proxy activity.

IDS alerts can also be set on suspicious or abnormal activity such as failed logon attempts, disk full, packet forwarding attacks, LAND attacks, Ping of Death attacks, SYN Flood attacks, spoofing attempts and port scanning attempts.

Alerts can be shown in real time in an alert summary window as well as being logged to disk. The extensive activity reports can filter on any of these alert events, or a more specific user-defined filter can be applied.

System and application log files can be archived automatically to one or more remote archive servers or locally on the firewall, and a wide range of media is supported, including tape device, file system on the firewall or FTP server. The log files can be encrypted during the archive process if required.

Other Features

There are a number of additional features available for the CyberGuard firewall which we were not able to test in our labs:

CyberGuard supports CVP for anti-virus Scanning, typically using the popular Symantec anti-virus package

The latest release supports URL filtering and blocking using WebSENSE in conjunction with the HTTP proxy.

IPSec-compliant VPN capabilities are provided via the RedCreek Ravlin product range, and there is also a hardware accelerator option available for STARLord

Log consolidation Central Audit System - CyberGuard's Central Auditing System provides a global security monitoring capability for supported CyberGuard firewalls. The system is typically used to:

Monitor alerts that indicate firewalls are under attack. 

Identify changes in firewall configuration or unusual activity at the firewall console. 

Create reports on session traffic for a single firewall or a network of firewalls. 

The Central Auditing System collects and stores information sent from one or more firewalls. The information is displayed in graphs, useful in identifying trends, and in tables for detailed analysis

A key feature which will be of interest to large enterprise users and ISPs is High Availability, essential for continuous operation and security of a critical business firewalls.

Many organisations keep a standby firewall already configured in case of system failure, but there is still some down time while the hardware is swapped.

CyberGuard HA+ firewalls provide automatic fail-over detection and switch-over from one firewall to another when failed services are detected.

When a firewall failure is detected, a transparent process initiates commands that will allow another firewall to become the active (primary) firewall. Fail-over on an average will take place in less than a minute without rebooting. Heartbeat Ethernet interfaces are used to provide dedicated communication between the fail-over firewalls. IP addresses are migrated across firewalls when a fail-over occurs so the IP will not change to the outside world, and CyberGuard can be configured to fail-over without losing connections.

CyberGuard HA+ Firewall will also replicate important firewall command files that are critical to security so that every aspect in the highly available environment will remain secure. The replication of critical files will be synchronised between the active and inactive firewall to insure that the identical security rules and attributes are maintained.

Finally, it is worth noting that CyberGuard allows the administrator to monitor the health of key servers behind the firewall, thereby offering a degree of higher availability for the entire network.

Verdict

CyberGuard remains one of the market leaders by continuing to offer a wide range of proxies coupled with both static and dynamic packet filtering capabilities in a B2-compliant EAL4-certified system. By maximising performance in multi-processor systems, CyberGuard also provides high levels of performance even when operating as a proxy server.

It offers just about every feature you are ever likely to want in a firewall with a flexible and easy to use management interface. One of the things we particularly liked about CyberGuard is that there are usually multiple ways of achieving the same ends. Whereas many firewalls force you down a particular path or impose a particular way of working to suit their architecture, CyberGuard usually incorporates all the options and offers the administrator the choice. This makes it one of the easiest firewalls we have come across to configure for an existing environment, and means that it should never be necessary for the administrator to be forced to modify the corporate security policy in order to meet the limitations of the firewall.

In bundling the CyberGuard software with a dedicated hardware platform, CyberGuard has produced an excellent range of firewall appliances that offer high levels of performance and are remarkably easy to use. The resulting package makes light work of deployment across large-scale enterprises - particularly with the ability to pre-configure key firewall parameters and distribute on floppy disk - making it ideal for larger organisations and ISP/ASP environments.

At the same time, it offers almost a “plug and play” experience for the inexperienced user, yet provides extremely high levels of flexibility and performance that belie its simplicity. This makes it an ideal choice for large organisations, ISPs and ASPs, where ease of deployment and the highest levels of performance and resilience are paramount.

CyberGuard STARLord earns the coveted “NSS Gold Award”.

 

 

 

 

Contact: CyberGuard Europe Ltd    
Phone:
+44 (0) 1344 382550   
Web:
http:// www.cyberguard.co.uk

Top         Home

Security Testing

NSS Awards

Group Test Reports

Articles/White Papers

Contact

Home

 
Send mail to webmaster with questions or 
comments about this web site.

Copyright � 1991-2005 The NSS Group Ltd.
All rights reserved.