3Com to Sell Firewall-in-a-NIC 209
Broue Master writes "According to a UK ZDNet article, 3Com is commercializing a firewall into a NIC aimed at desktop and servers."
Interesting idea, although it'll be interesting to see if the idea catches on.
Great.. (Score:1)
Re:Great.. (Score:1, Interesting)
Re:Great.. (Score:1, Informative)
The Masses, as you put it, are not the intended audience of this.
Re:Great.. (Score:2, Informative)
Now firewalls area available to the masses who don't know what they are!
No news threre. Windows XP has a bundled software firewall and many consumer routers toute built in firewalls as well. The main significange is the NIC taking the (nominal) load off the rest of the system and allowing greater control of user terminals, I believe. Now, the article :-) says a selling point of this dealy is that computers with it installed can only connect to trusted adresses /on the hardware level/. "The device also makes it harder to misuse corporate equipment by plugging it in in the wrong place" or CONTROL, you be the judge. Somebody correct me if [when] I'm wrong.
Re:Great.. (Score:2)
Strangely enough, using XP's own firewalling system this does not happen...
Odd that, isn't it?
Awkward (Score:2, Funny)
I can only imagine the long line of emotionally shattered English teachers that Taco left in his wake.
Re:Awkward (Score:2)
Mabye your eyes are crossed? ^_^
Re:Awkward (Score:2)
BTW, I had difficulty parsing your use of the word "parase". ;)
Re:Awkward (Score:1)
Technology for its own sake (Score:1)
Re:Technology for its own sake (Score:2)
What's a "real firewall" that this isn't? I can imagine numerous situations where people connect their NIC directly to an untrusted network where this could be useful - college dorm networks, cable modem users etc.
Re:Technology for its own sake (Score:3, Interesting)
If you're putting a firewall on the machine, the only area where you don't have to care about security is within your machine. But within your machine, you have other methods: IPC, shared memory, or even net 127.
But what this really does is it talks to a server which tells the NIC what to ignore, overriding what your machine wants to do (if there are any security holes on your machine, your OS will presumably configure the firewall to expose them, if it can; if it weren't going to, it would filter at the OS level). This essentially prevents your machine from listening on any ports that the central server doesn't want you listening on or making connections the central server doesn't want you to make.
There are two functional differences between this and a traditional firewall. The policy machine doesn't have to look at the packets, because it tells the machines which have to look at the packets anyway what to do; therefore, it's harder for an outsider to overwhelm the policy machine. Also, this setup will allow the firewall to stop you from talking to other machines on the network. This could stop a worm from spreading within a company over services which aren't supposed to be enabled.
So the policy server and the set of cards together make what amounts to a firewall. If you buy one of these, you don't get your own firewall.
Re:Technology for its own sake (Score:3, Insightful)
And in any case what makes this not a "real" firewall? I haven't even looked at the product, but if your simplistic idea of a firewall is that it has to have an impressive box, then you're woefully mistaken: The job of a firewall is a very simple one, and in most "hardware" solutions is just a couple of chips to fulfill the task.
Re:Technology for its own sake (Score:1)
Re:Technology for its own sake (Score:1)
Re:Technology for its own sake (Score:2, Informative)
To quote the article "The product is aimed at enterprises, to provide centralised control over security."
Re:Technology for its own sake (Score:2)
Re:Technology for its own sake (Score:2)
Re:Technology for its own sake (Score:2)
$120 for the NIC card, $50 for the firmware/software, and $1000 for a license server...
Where's those grandparents who need/afford that? and for what reason?
"Central Policy Server"... (Score:3, Insightful)
Sounds like it's using some proprietry protocols. Also, the network card will not work if plugged into a different switch. You'd better trust 3com a lot if you use this stuff.
Re:"Central Policy Server"... (Score:1)
Doesn't make any sense (Score:2)
Or is this to implement security against other clients on the same local network?
I'm confused.
-Mark
Re:Doesn't make any sense (Score:1)
In a corporate environment, wouldn't all your computers be talking to the internet through a router, anyway? Wouldn't it make sense to have the "firewall" on the borders of your network, rather than in the middle? Isn't that what the term "firewall" means?
Or is this to implement security against other clients on the same local network?
It's for use against other clients on the same network. I think the intended use is to keep employess/keyboard wielding monkeys/schoolchildren from hax0ring each other.
Re:Doesn't make any sense (Score:3, Informative)
Re:Doesn't make any sense (Score:1, Informative)
It can be used as access control, only allowing client devices to go to certain places on your network. (ie: kiosk in the lobby only needs to surf through proxy server 1.1.1.1:8080, all else is denied).
Protect desktops w/ confidential information (Human Resources, Finance, etc.)
It can be used to harden servers. Many companies take the "tootsie pop" approach to security. Hard shell, gooshey center. This way, you open a couple of ports on a server, potentially not allow it to initiate connections to other boxen, etc.
Maybe the server is co-located at an ISP. You still control the rules.
Even if the server is owned, the machine itself has no control over it's security policy. That only happens from a central management station.
There are lots of uses for these NICs - just depends on where your security need is.
Re:Doesn't make any sense (Score:2, Informative)
The most common implimentation is to use a single firewall to protect a network. This configuration also provides a single point of failure. If a cracker can get past the single firewall, he can mount attacks on any internal systems.
With a firewall on every machine and a general network firewall, you have a layered defense that is exponentially harder to subvert. It will also help stop internal attacks by employees, which are much more likely to succeed than external attacks.
The main reason that per machine firewalls are not a common practice is the administration overhead for a heterogenous network. Putting the firewall in an OS independant and inexpensive hardware implimentation might change this.
Re:Doesn't make any sense (Score:1)
All true, but how effective would this be? Don't forget that just about every enterprise desktop is windows using netbios. Open the firewall on the NIC enough to let the netbios ports through, and you've pretty much opened the machine up to 90% of potential attacks anyway.
It could have a use in stopping certain groups of machines being able to talk to each other at all though.
I know W2K and later don't need netbios, but they can also have centrally managed IPSec group policies to achieve pretty much the same thing as this firewall.
This card doesn't seem worth the extra expense to me - upgrading the OS to W2K would probably be comparable in cost to upgrading the NIC.
Re:Doesn't make any sense (Score:2, Insightful)
I'm with you on layered defense. However, it breaks down when you trust other systems.
Re:Doesn't make any sense (Score:2)
Putting a firewall at the edge is fine and a good idea, but the bigger threat is internal attackers. Don't want a disgruntled employee accessing the HR records.
Re:"Central Policy Server"... (Score:2)
Re:"Central Policy Server"... (Score:2)
For this, though it (theoretically) should support much finer firewalling rules based per client and be easier to do such, I'd really have to look at the implementation of the server software to determine if i would like it or not...
For example, what happens if the policy manager server goes down? does the software support redundancy? Will the entire network end up a mess without the server to command each cards filtering and packet routing? or do the cards hold that information until next updated?
Id like to read some deeper information on this system.
Re:"Central Policy Server"... (Score:1, Informative)
Should all 3 policy servers be down, then the nics will go into a pre-defined fallback policy until the policy servers come back up. You can fail open, closed, and in the near future, to the last policy you had.
Interoperability (Re:"Central Policy Server"...) (Score:1)
The tricky thing is writing a server that integrates well with existing back-end security and authentication infrastructure: having a bunch of standalone systems really sucks from a management point of view. Depending on how the client/agent/firewall (in software or firmware, as on a NIC) is structured, it may be possible to mix and match vendors in the future. (For example, another vendor's server monitoring these 3com NICs.)
The protocols themselves don't really need to be proprietary to the point of precluding interoperability: most are based on good solid Internet/IETF standards like IPSec, SSL, TCP, XML, etc. (Full disclosure: I was the system architect for Zone Labs Integrity [zonelabs.com].) If the protocols could be standardized, I could easily see ZLI serving policy to the various firewall-enabled gadgets out there, as the server is easily extensible.
I guess I just want to see things interoperate, but that's probably just because I'm an old Unix hacker....
Re:Interoperability (Re:"Central Policy Server"... (Score:2)
As for the guy above who remarked about how silly it was to require these things to be configured by a central console, he obviously hasn't been the firewall management staff at a large company. A central console is the _only_ way to fly if you have a large number of firewall policy engines to manage. Otherwise, the flagpoles in front of most buildings would be draped with suicidal firewall admins wanting to end it all. :>
(Besides, it's not like there isn't a central console for iptables/ipchains that works pretty well [fwbuilder.org] -- a firewall need not be a standalone unit with a custom policy all its own to be secure. Sometimes, it's more secure to provide an administrator with an easy way to avoid screwups.)
Re:Interoperability (Re:"Central Policy Server"... (Score:1)
Wrong. It's only their latest firewall. Their Sidewinder product has been around since 1994 or so.
Re:"Central Policy Server"... (Score:4, Informative)
The card has a few oddities nonetheless. First, when you install these cards, you need to build an "install image" on the policy manager. You then have to run that after you put the card in the machine to flash it's firmware (the cards send heartbeats back to the Policy Server, so they have to know where to send them). In effect, your users always have to download an install from your network to set up their cards, they can't just go out to the web and grab one. Fortunatly the card works as a regular NIC before you flash it.
This card also includes IPSEC offload for people running VPNs and the like. I never actually got it to work, but it's supposed to do the encryption in hardware. Apparently the firewall sits OUTSIDE of the ipsec traffic though, so all it sees are the encrypted packets, which limits its usefulness considerably.
All in all the cards are OK, not supurb yet (that management console is very click intensive to use), and reasonably cheap for their target market. I think they stand a good chance of taking off, especially as corporate security folks notice that these are the perfect replacment for the ubiquitious software firewalls in use today.
One more thing I thought would be amusing. If someone were to steal your machine and turn it on elsewhere without noticing what card you have, the security folks would immediatly know where their machine went.
Sounds good but.... (Score:3, Interesting)
Re:Sounds good but.... (Score:2)
Interesting Idea (Score:2, Insightful)
But I don't believe it can be useful in filtering outgoing packets; how can it tell what program or user is sending it.
Because of that I think that software based solutions are better.
And besides
Re:Interesting Idea (Score:1, Informative)
You can't rely upon a software firewall when readily-available, freely-downloadable, simple programs can take it completely out? These trojans and viruses can take out software firewalls today:
OptixPro
OptixLite
OptixKiller
Buschtrommel
Pentagoner
Plus more. Embedded Firewall is hardware-based. Because all of the firewalling functions happen in hardware, they are completely independent of the host operating system. Even if you circumvent the host OS, you will never be able to change your own security policy.
Re:Interesting Idea (Score:2, Insightful)
Now I'm sure 3Com don't expect users to have to flash each and every NIC. They will include some sort of software based setup tool. If a trojan has control of the OS, then it simply needs to emulate that tool. It's then 'just another firewall' to the trojan, software based or not.
It wouldn't even have to go that far, what's stopping the trojan from sending anyway? A firewall that is OS independent cannot filter outgoing packets based on who or what sent it.
too much (Score:2)
Re:too much (Score:2)
(phththt, hi slordak :) )
Re:too much (Score:2)
Pricewatch [pricewatch.com] has a vendor selling a (no doubt earlier version) 3CR990 for $59. That's a bit more than your CompUSA card, but a respectable price for a brand-name card -- especially one with an embedded ARM processor specifically for offload processing.
I certainly won't be standing in line... (Score:4, Informative)
a) buggy, or
b) very inflexible
For the life of me, I couldn't get the linksys box to track an incoming FTP session. The D-link router would crash if you tried to pump too much traffic through it (I was running UDP netperf tests). lrp just didn't have the features I wanted. Eventually I just scrapped it all and installed RH 7.2 on a p166, and turned off everything except iptables, roaring penguin, and ssh. It tracks all my connections just fine, forwards ports appropriately, and I've got scripts set up to restart my IPSec tunnel and re-register my IP with a dynamic DNS server every time my IP changes. I get the same throughput and latency I got through the other solutions, too. Sure, I'm doing more complicated things than most users, but even when I wasn't, the 'firewall in a box' gizmos still gave me headaches. I have a feeling a 'firewall on a NIC' would be even less flexible...
Re:I certainly won't be standing in line... (Score:2)
Aren't firewalls SUPPOSED to be inflexibe?
Heh I think I should wear asbestos underpants when I make a comment like that...
Re:I certainly won't be standing in line... (Score:2)
A DMZ must be a seperate physical network, hanging off a different port on the firewall. The Linksys "DMZ" is really just a 'let's forward all incoming ports to this machine that's sitting somewhere behind the NAPT'. If the machine in the linksys DMZ is compromised, the rest of your network is exposed.
It's highly convenient, especially for games and such, but shouldn't be called a DMZ.
Good idea but (Score:1)
Re:Good idea but (Score:1)
"NIC costs $120 list price, and the embedded firewall is another $50 for each client. The policy server costs $1000."
Looks a little pricey at the moment as well. How many firewalls do you need? One per desktop or one per gateway?
Re:Good idea but (Score:1)
Even a stripped-down firewall on each desktop would give you a little more defense in depth than just a firewall per gateway. Sure, the OS could handle firewalling too, but here's a solution that's OS independent (I'm assuming).
I think that's supposed to be the appeal, but then, what do I know? I'm an amateur.
Hardware VPN? (Score:3, Interesting)
In related news, I hear that Sonicwall will have a VPN/Firewall in a PCMCIA card later this year.
Re:Hardware VPN? (Score:1)
Re:Hardware VPN? (Score:1)
Re:Hardware VPN? (Score:1)
interesting (Score:5, Funny)
That's interestingly a very interesting comment that piqued by interest in this interesting subject of interest. What I'm more interested in knowing is if any other interesting people are interested in this interesting idea? Because if there are interesting people interested in this interesting idea, well, I almost hesitate to say it, I'd be interested!
Moderators on crack (Score:5, Funny)
Who's the target? (Score:3, Insightful)
Remote users? They all use laptops.
What's that leave?
The target is probably... (Score:2, Informative)
And Also (Score:1)
Re:Who's the target? (Score:3, Informative)
Disgruntled employees. Fired employees. Untrustworthy people on the inside trying to access payroll systems.
(avoiding debate between hardware vs software firewalls here)
Re:Who's the target? (Score:2)
Re:Who's the target? (Score:2)
Although I'd say 80% of the attempts will be external, but 80% of the successes will be internal.
Re:Who's the target? (Score:2)
Furthermore if you're protecting say, a payroll server, it will only have 1 ethernet connection. Put the firewall there.
(note: I personally think firewalls are a BAD idea. The entire concept of a closed box firewall defeats the entire purpose of security. If you want machines to be secure, make them secure, don't put filtering in front of them and expect that to be fool/hack-proof. The only place for ACL's is to protect machines that run vulnerable services that you must run, or machines that you wish to limit access to via ip (due to someone trying to brute force passwords, flooding, etc.))
interesting? (Score:1)
Good idea? (Score:1)
Does sound interesting, but, If you have even modest connections, you can pick up an old pentium for around 20 bucks. Plenty of preconfigured linux packages with firewalling options, right?
Considering you can make a firewall/router for so little.. 120 bucks for a nick card seems a little pricey. Although, if it works well and isn't a hassle to set up, I suppose its a good solution. Also good if you don't have the know-how or desire to set up a whole system.
Re:Good idea? (Score:4, Insightful)
Having a principle firewall on the border of your network isn't challenged, but in a setting with many computers which can't be closely individually monitored (libraries, college campuses, etc.), these will at least help to prevent one person from attacking/abusing other machines on the same network.
steve
Hmmm. Interesting reutilization. (Score:5, Informative)
What is especially interesting is what is loaded: Secure Computing's Gauntlet firewall product (yes, it is originally derived from the old TIS stuff, but has been commercially, er... hydrogenized :) ). This would seem to indicate that the card can support applications that weren't written for it, e.g., it can use software whose platform has been retargeted in compilation (well, at least it implies that).
I wonder what other derived applications could be loaded into that space? Hmmm... the mind wanders...
You thought I was going to mention a Beowulf cluster, didn't you? Shame on you. No cookie for you.
Re:Hmmm. Interesting reutilization. (Score:2, Informative)
If you can write MIPS assembly, you can run anything that you can fit into 64k on this card.
Re:Hmmm. Interesting reutilization. (Score:1)
Re:Hmmm. Interesting reutilization. (Score:3, Flamebait)
If you were one of the three people with one of these, YOU COULD RUN LINUX ON YOUR NIC! But WHO CARES??? THAT'S WHY YOU HAVE A CPU!!!!!! Companies sell a computer on a PCI card! NIC's don't need to run an os, a firewall, or Duke Nukem.
Jesus.
Re:Hmmm. Interesting reutilization. (Score:3, Insightful)
The processor is an offload processor. This doesn't mean a lot to the average user, but to a business user, it's gangbusters.
The "point" is that the NIC is essentially like putting a small server box in front of each of your real servers at a much lower cost. It's also platform independent: With a Linux implementation on the card, you could get a Linux firewall protecting every Linux, OS/X, or Windows server that you own. And those servers wouldn't expend any CPU just processing packets in order to reject them.
Put it this way: If you ran a business that made money on CPU cycles dedicated to a particular application, you'd want that processor dedicated full-time to the task at hand. You'd take great leaps to turn off all non-essential services, tweak the bus speeds, optimize block sizes on the filesystems, nice the process to the max, rob Peter and pay Paul -- just to get the extra 5%. In business, time is money, regardless of whether it's personnel or CPU. That's why an offload NIC is so damned attractive -- because some of us work in companies that care about the bottom line as opposed to dicking with ways to make our 1st-person shooter faster.
Re:Hmmm. Interesting reutilization. (Score:2)
Re:Hmmm. Interesting reutilization. (Score:3, Informative)
All in all, should be pretty cool for people like me stuck in the corporate world.
Re:Hmmm. Interesting reutilization. (Score:1)
Re:Hmmm. Interesting reutilization. (Score:1)
Maybe 3Com will release a scaled down policy server that isn't $1000... especially when you're only controlling 3-4 machines.
Yep... I have mixed feelings (Score:1)
However the concept has extreme merit if used in conjunction with contempory firewall solutions already in place. It would definitely add an extra layer of security to the network if properly managed. That then brings the only bad point I can think of right off the top of my head which would be the headache involved in managing so many different firewall configurations. It might turn out to be more of a headache than it is really worth for the Sys. admins in charge of a given network.
Re:Yep... I have mixed feelings (Score:1)
Already happened (Score:5, Informative)
It isn't quite the same, but it exists.
Re:Already happened (Score:1)
-Knots
Uses (Score:4, Insightful)
selling points... (Score:2)
Catches on? Fuck that. (Score:2)
Don't get me wrong, I'm sure there are a few people here who know how to configure a proper firewall, but most people with cable modems, DSL connections, or other high-speed access at home have no idea how to harden their desktop machines. What's worse, they run dangerously vulnerable email programs such as Outlook and use web browsers such as Internet Explorer. This opens them up to a wide variety of very vicious viruses, worms, and other nice programs which can be used to gain access to their computers and turn them into little more than bandwidth machine-guns.
With a network card such as this shipping in a relatively locked-down state, it would be easier to detect and block attacks originating from a compromised computer. Unfortunately, I can't smack every clueless computer user on the Internet upside the head with one of these things. Because of this, I'm sure things will only get worse before they get better.
- A.P.
Nothing really new.... (Score:1)
3com Mailer (Score:3, Interesting)
How does it work. (Score:1)
Re:How does it work. (Score:1)
This card and the software is impressive. (Score:1, Interesting)
The NICS have onboard 3DES crypto accelerators and talk via an encrypted channel to policy servers that in turn are all then handled by a centralized management console. So from one place, you can distribute NIC firewall policies to the policy servers on different networks who then distribute the firewall policies to the cards. The onboard accelerators and manual keying basically enable you to create a corporate VPN that allows ONLY these keyed cards to operate on the network--theoretically.
There is a server version and a client version of the card. The client can handle 16 rules, the server 32 rules. At the time of the beta test, the onboard firewalls were not stateful, but that was to be implemented.
Now the cool stuff: The user can't tamper with the card or its firewall ruleset--it's centrally managed. Should the user try, the card "breaks" and denies all traffic--with the exception of traffic from the policy server. And policies can be applied remotely to the client controlling OUTBOUND communication. For example, if users ONLY get to browse the web, then you ONLY allow outbound port 80. No audiogalaxy for you. Additionally, these cards remotely log policy violations to the centralized server. And you can remotely TURN OFF the card from the centralized server. Suspect a machine is compromised? Remotely disconnect it from the network by telling the card to disallow all traffic (except from the policy server of course).
The bad stuff: Windows only at the time of beta testing, although Linux and Solaris support was planned. Control software runs on Windows only. And the cards can only be configured via the management software--which was a completely different beast you had to purchase, and the cost depends on the scale of your EFW deployment.
This info may have changed since last year as well, so take it all in stride.
Overall, I think the cards are great to deploy for select critical Windows servers or public lab resources you want to lock down a bit. It would be nice to have the ability to buy a server card, stick it in a Linux box, and use some floppy util to configure some basic rules that get burned to firmware. Disregarding OS compatibility, these cards seriously rock, and should be added to any "defense in depth" arsenal, IMO.
Re:This card and the software is impressive. (Score:1)
What a price tag ! (Score:1)
"The NIC costs $120 list price, and the embedded firewall is another $50 for each client. The policy server costs $1000."
For fifty dollars per client I would be happy to configure a firewall through remote access using free software and a $15 NIC.
I hate to admit it, but I'm getting envious. While I'm having difficulties finding a job as a Linux admin - probably because companies here in Germany fear to employ me with my 57 years, the big companies are charging $50 per client for some crypto-interface software.
Obviously hardware sells better than humans.
A marketing thought... (Score:1)
You can deposit my check with Pay-Pal, Time Warner...
Time vs security (Score:3, Insightful)
Or (says the 3com salesperson) you can just spend some money. Central server says this box can only talk on this (short) port|protocol list. Everything else is droped at the interface, doesn't even get to the kernel.
Sure, there are things you can do on a large scale to make securing boxes much easier (jumpstart, kickstart, whatever NT calls it, to get a secure base install, etc), but you still have to deal with patching individual boxes.
If I have to deploy a lot of computers in an activly hostile environment, something like this would be very nice.
about danged time (Score:1, Offtopic)
maybe the next thing we see will be a little UPS-in-a-power-supply combo thingy.
that would cut down on a lot of clutter for me, lose a couple more boxes under the desk, and three or four cables.
firewalled network cards (Score:2, Interesting)
Does this mean you will be unable to ping the loopback address???
Will you have to swap the card out to see whether the firewall on the card is playing up?
Jeeezus
It's their way to stop P2P sharing software (Score:2)
I personally think the OpenNAP servers and Gnutella apps need to self terminate the connections if such a condition is found with a "Open your firewall on Port XXXX and YYYY and this program will start to operate again."
64MB on a NIC (Score:2, Insightful)
Poor man's blade (Score:2)
It's a really sweet idea - the card sounds really hackable. I'm gonna have to pick up a gigabit version when it hits the shelves and see what kind of evil can be wrought with it.
The research was done here... (Score:2, Informative)
All the research for this product was done by college students at Calpoly [calpoly.edu] as a part of a 3Com sponsored project. Its a rather interesting read as to what else has been done by in the field on Intelligent NICs and the number of PhDs and MSs that came out of it too. Another interesting site on NIC based Firewalls from Carnegie Mellon University [cmu.edu] as a part of their "Better Security via Smarter Devices" research is up here [cmu.edu]. I would strongly suggest that people explore these links.
Firewall NIC is not overkill (Score:4, Insightful)
What some of you don't realize is that some of the worst offenders of "hacking" or "people being where they shouldn't" (sorry, couldn't think of a better way to say it) are INSIDE your network. There are a lot of users that might be "just looking around" on the network, but they can cause problems unintentionally.
This example might be harsh but everyone here remembers the TV commercial where the users say "I'm off to crash the server" or "I'm about to take user error to the next lever".
Bad things can happen on the inside, too!
Re:Merilus FireCard (Score:1)
Also the 750$ price tag puts the FireCard into a diferent market.
Re:been there, done that! (Score:1)
Allow DHCP Client
Allow DNS Client
allow VPN ports/protocols to 1.1.1.1 bidirectional
deny all other traffic
This would prevent a "bounce" attack (someone coming in on the coat tails of a VPN connection).
Something like this also extends the perimeter firewall at the headquarters... So you still get IDS, web filtering, etc. etc... Interesting proposition.