• No results found

Achieving Low-Latency Security

N/A
N/A
Protected

Academic year: 2021

Share "Achieving Low-Latency Security"

Copied!
22
0
0

Loading.... (view fulltext now)

Full text

(1)

Darren Turnbull, VP Strategic Solutions - Fortinet

Achieving

Low-Latency Security

In Today's Competitive, Regulatory and

High-Speed Transaction Environment

(2)

Agenda

2

•  Firewall Architecture

•  Typical Requirements

1

2

3

(3)

What is latency?

§  Latency defines your reaction time to an event

with the delay in completing a task

§  At the simplest level you receive input, make a

decision and take an action, this all takes time

§  Different system components contribute to the

latency, but the total value is all that we care about

§  Latency accumulates

APPLICATION

MIDDLEWARE

(4)

§ It depends

§ Consider different applications

§ Media Streaming

§ Voice over IP

§ Email

§ Web Browsing

§ Peer to Peer networks

§ Financial

§  Market Data

§  Algorithmic Trading

Impact of Latency

(5)

§  It depends

§  Consider different applications

§  Media Streaming

§  Voice over IP

§  Email

§  Web Browsing

§  Peer to Peer networks

§  Financial §  Market Data §  Algorithmic Trading

Impact of Latency

5

TIME = MONEY

(6)

Making Time

§  You have no more time than the

competition

§  You can not make more time

§  You need to use less of the

available time

§  Available time means the time

used by your competition

Your competitive advantage is derived

from doing the right thing, first!

(7)

Agenda

7

•  Latency and Time

•  Typical Requirements

2

1

3

(8)

Firewall Perception

§  Firewalls were not designed with low latency in mind

§  Throughput sensitive to packet size

§  Latency is bad

§  Firewalls become more complex over time

§  Oversized rule base

§  Limited, or no optimization

§  Unable to effectively process multicast traffic

§  Traditional firewalls start dropping packets

at modest traffic levels

§  Reducing firewall latency is the final piece

(9)

Why Do I Need a Firewall?

MARKET / EXCHANGE CLIENT ROUTER FIREWALL

§  Allows you to define a trusted set of

connections

§  between devices, people, companies

§  …and monitor them

§  Enables topology hiding

§  Infrastructure is not exposed to

potential attack

§  One external address

§  Enables connectivity between

conflicting networks

§  Network Address Translation

(10)

Physical Limits on Latency Range

§  Serialization delays

§  Due to physical port speeds and internal

connectivity bottlenecks in the case of distributed architectures

§  Bits on the wire

§  Propagation delays

§  Caused by distance

§  Limited by the speed of light

§  No easy fix!

§  Sample numbers

§  Assume our crow flies straight

§  In a vacuum

§  Doesn t stop on the way

§  And doesn t want to come back

§  Triple these numbers to get latency

19 NEW YORK

27 BEIJING

(11)

Latency Range Things We Change

§  Features versus Performance

§  Software based solutions are limited by

general purpose CPU performance

§  Offloading features in to hardware is

more difficult

§  A flexible approach is needed

§  Distributed Architectures

§  Are created to solve problems

§  Latency is not always the prime

consideration

(12)

Multicast and Unicast

§  Unicast traffic has a one to one relationship

between the sender and receiver.

§  Multicast traffic is intended for multiple

destinations from a single source

§  A multicast packet can require replication by

network devices to ensure all receivers are sent the data

§  Multicast traffic is typically handles

differently to unicast within a firewalll

§  FortiGate can provide acceleration of both

(13)

Market Data Throughput

§  Ideally delivered via multicast

§  Network Address Translation requirement

§  Source and destination

§  Market data feeds typically fall under the

same security policies as unicast data

§  Provides particular challenges for traditional

firewall solutions

§  Fortinet solution can provide more than

4.5Gbps of multicast forwarding

Up to 100M Throughput

Greater than 100M Throughput

4.5Gps Throughput Traditional Firewall

(14)

Security Processor Offload

14

Phase 1

•  Full IPS Signature Analysis

•  IPSec

•  Multicast

•  Low Latency IPv4 Firewall

<2.5us(ADM-XE2)

§  Part of the FortiASIC family

§  Security Processor Module includes physical

connectivity and processing power

§  Processing takes place at the interface level

§  Simple to scale. Module = Port + Processing

(15)

Traditional Firewall

15

Management CPU

•  Multiple Processing Cards / Modules added separately to I/O

Switch

•  Switch Chip to connect from I/O to processing

•  Management CPU

Traditional Firewall

• Dumb I/O Modules or cards for external

connectivity I/O I/O I/O I/O

(16)

Integrated Switch Fabric and the

3950 Series

16 FMC 0 FMC 1 FMC 2 FMC 3 FMC 4 Board On 4x1G

CPU Block FortiASIC CP7

•  FortiASIC NP or SP modules for packet processing, fast path forwarding and encryption

I S F

•  Integrated Switch Fabric 240Gbps non-blocking low latency path

Physical port density and processing capability added via FMC Modules

•  Dual Multi-core processors and FortiASIC CP7 for control, setup and proxy functions

3950 Architecture

•  External Connectivity via 2 x 10Gbps or

20 x 1Gbps Ethernet PHY PHY PHY PHY PHY PHY

NP NP/SP NP/SP NP/SP NP/SP NP/SP

(17)

Latency Numbers

§  FortiGate firewall can provide unicast and

(18)

Agenda

18

•  Firewall Architecture

•  Latency and Time

3

2

1

(19)

Typical Requirements

•  Total 15 microsecond roundtrip time

•  Sub 5 microsecond Unicast and Multicast Firewall latency

•  True 10Gbit Capabilities

•  Over 2 Gbps Multicast streams

•  Small Packet Size

•  Full BGP and OSPF Routing Capabilities

•  Sub Second High Availability Failover

•  Virtualisation

(20)

Why Virtualization?

§  Provides the ability to create customer

specific topologies, and services.

§  For example:

Allows predictable failover of market data delivery

§  Zero convergence

§  Same data is available via multiple paths

§  Two active streams

CLIENT NETWORK

(21)

Conclusion

•  Financial Markets provide a demanding set of requirements

for even the most advanced traditional firewall vendor •  Fortinet have worked closely with our Financial market

customer base to develop focused solutions to their needs

•  FortiGate Appliance range provides maximum security with

minimum latency to the leading financial trading firms and

exchanges worldwide, including 9 of the top 10 Fortune banking companies

(22)

Come meet us on our stand or contact us at

FortiFinance@fortinet.com

References

Related documents

Fortinet is a global provider of high‐performance network security solutions that provide our customers with the  power  to  protect  and  control  their 

shall be scarified as clause R5 11-1 (iv) and completely broken up so that all cleavage planes are destroyed and fill material will bond properly. Where the old pavement is of

The blue dashed vertical lines are located at BrO termination and recurrence dates, and the red dashed vertical line is the melt onset date.. BrO 1° elevation dSCD (top panels) and

For the first part of the training stage of our approach, we attempt to train a convolutional neural network to distinguish blur type using the training images with no assumptions

This book was written as a general guide and not as a source of legal advice for your particular circumstance or otherwise. The author and publisher of this book are not a

Guru atau Pengajar Dengan menggunakan media kartu huruf, diharapkan dapat memberikan masukan kepada para guru bahasa Perancis, salah satu cara untuk melaksanakan proses

У результаті проведеного дослідження й на підставі власного досвіду використання відкритих електронних систем для підтримки і

It is beneficial for the company if they can manage their local cultural differences with the South Korean leadership style where the company has an array of managers