Wednesday, October 25, 2023

What is the difference between the firewall and IPS?

The article Comparison and Differences Between IPS vs IDS vs Firewall vs WAF briefly introduces the differences between IPS, IDS, WAF, and the firewall. But there are many details that are not included. Especially the difference between firewall and IPS/IDS. In this article, we will introduce in more depth the difference between IPS and firewall as a security defense product.

Firewall

The current mainstream fire protection uses the state detection function to check the legitimacy of the link state of the message, and discard the message with the illegal link state. The core basis is the session state. When user traffic that meets the access conditions traverses the firewall for the first time, a session entry will be generated, and subsequent packets of the session will be forwarded based on this session entry.

firewall inspection

Figure 1: Firewall inspects the traffic based on the pre-configured security policy

Static security defense technology in the firewall: The firewall's judgment on whether the traffic is illegal is often based on the security policy pre-configured by the administrator, which cannot intercept some special attacks. For example, traditional firewalls cannot intercept XSS attacks and SQL injection attacks against web servers.

IPS/IDS

To put it simply, IPS is an advanced version of IDS, which can not only detect threats like IDS, but also block intrusion traffic in real-time, thereby preventing greater losses in time.

Compared with passive detection firewalls, the biggest difference of IPS is its active detection.

Intrusion detection technology enables the security system to respond in real-time to the time and process of intrusion by studying the process and characteristics of intrusion behavior. The technologies used by IPS can be divided into:

1. Anomaly detection: The assumption of anomaly detection is that the activities of the intruder are abnormal from the activities of the normal subject, and an "activity profile" of normal activities is established. When the current subject's activity violates its statistical law, it is considered to be an "intrusion" behavior.

2. Feature detection: Feature detection assumes that the activity of the intruder can be represented by a pattern, and the goal of the system is to detect whether the activity of the subject conforms to these patterns. Feature detection requires signature library support.

ips inspection

Figure 2: One of the IPS implement location

Usually, IPS adopts the feature detection mode. At this time, the IPS will perform feature inspection on all traffic and block the traffic that meets the intrusion characteristics. Since the signature database can be updated in real-time from the official website of the equipment supplier, IPS can often detect intrusions in a more timely manner.

In addition, as a border device, the firewall distinguishes different areas by zone but does not detect traffic in the same area. This leaves nothing for the attacks launched within the intranet. However, IPS is often deployed at key nodes through which all traffic flows. In addition to detecting external attacks, IPS can also respond to internal attacks.

Why can the firewall also perform content security detection?

For some scenarios where the business volume is not large, deploying IPS and firewalls separately will bring huge hardware cost pressures to the company. In order to alleviate this situation, many manufacturers have introduced firewalls that integrate content security detection, such as Huawei's USG firewall. Based on the security detection and processing capabilities of traditional NGFW firewalls, these devices also support the security analyzer HiSec Insight ( Also known as CIS), FireHunter sandbox, security controller SecoManager and other network security devices are linked, using intelligent detection technology to effectively detect and proactively defend against advanced threats. However, compared to separate IPS devices, these integrated firewalls tend to be slightly inferior in processing performance. 

In conclusion

 Table 1: The difference between Firewall and IPS


Firewall

IPS

Basis   for inspection

Pre-configured security policy

Signature

Deployment   location

Network boundary

Intranet backbone node

Timeliness

Security policy updates rely on   administrators

Fast update of signature database

Detection   flow

Cross-region traffic

All traffic

Performance   requirements

Need high hardware

Need high-performance hardware to support   real-time detection and forwarding

Advantage

Other functions can be integrated,   cost-effective

Active detection, strong detection   ability



Huawei hot-sell firewall USG6615E-AC, USG6630E-AC, USG6620E-AC supplying at Thunder-link.com.

Friday, October 20, 2023

Why NE40E CPU usage raise too high?

Fault description

The customer reports that the CPU usage of Huawei NE40E-X3 raise too high, which reaches 60%

 

Processing procedures

1. Check the CPU usage to locate which tasks are using a lot of CPU resource.

 

<NE40E-X3>dis cpu-usage
Cpu utilization statistics at 2019-02-22 15:10:26 916 ms
System cpu use rate is : 74%
Cpu utilization for five seconds: 72% ;  one minute: 65% ;  five minutes: 77%.
Max CPU Usage : 99%
Max CPU Usage Stat. Time : 2018-09-10 18:58:15 410 ms
---------------------------
ServiceName UseRate 
---------------------------
SYSTEM           40%
BRAS             26%
CMF               3%
FEC               3%
IP STACK          2%
AAA               0%
ARP               0%

 

The result shows that the BRAS service and system service occupy massive CPU resource.

It’s suspected that the BRAS related configuration or device fault cause the error.

 

2.  Check boards health in the device

 

<NE40E-X3>dis health
----------------------------------------------------------------
Slot                       CPU Usage  Memory Usage(Used/Total)
----------------------------------------------------------------
4      MPU(Master)            53%          38%  1562MB/4022MB
1      LPU                    39%          22%   859MB/3736MB
3      VSU                     3%          14%   509MB/3545MB
5      MPU(Slave)              18%         31%   1274MB/4022MB
----------------------------------------------------------------

 

3.  Check the services implemented on the boards, found that misconfiguration cause a lot of users cannot online, which cause high CPU usage, after modifying the configuration.

 

Root Cuase

Misconfiguration cause a lot of users cannot online, which cause high CPU usage.

cpu high

Previous configuration:

acl 3001
 rule 5 permit ip source 10.5.x.0 0.0.0.255

 

Modified configuration:

acl 3001
 rule 5 permit ip source 10.5.x.0 0.0.255.255

Solution

The misconfiguration cause massive users cannot get online which generates massive re-authentication messages, as a result, the device CPU is exhausted.