SlideShare ist ein Scribd-Unternehmen logo
1 von 18
High performing IT Solutions




     Firewall /UTM
High availability Solution

               Presented by
            Mr.Vihang S . Kathe
            Founder & Director
                   IBC
Need of H/A Solution for Business
Current Business scenario
Working of H/A Solution
How to avoid Downtime with H/A
Case Scenarios
Business Benefits
Question and Answers
Action plan Forward
Need of H/A for Business
Current Business Situation
• Network Availability is dependent on Single Firewall UTM Appliance .
• Remote Branches connected to this Firewall Appliance .
• Web servers , Application Servers and email services are NATted to
Firewall .
• Internal users dependent on Firewall for internet browsing .
• Multiple ISP might be terminated on Firewall for ISP failover solution

 Incase this Firewall has a hardware failure

• Complete business communication fails .
• Users are not able to browse the internet , send emails and branch
offices are not able to connect to central applications .
• Results in complete business downtime .
Single Firewall scenario
How to ensure N/W availability
 With High availability or Clustering solution with 2 Identical Firewall / UTM
appliance .
 Firewall Clustering or Firewall Redundancy is the arrangement of 2 or more
Firewalls designed & configured either for Availability or for Performance or for
both.
 Firewalls configured in Master-Slave/Hot-Cold/Active-Passive/Primary-
Backup mode, ensures High Availability of N/W.
 So incase the primary Firewall fails , the complete network can be
automatically diverted to the secondary firewall thus ensuring no business
downtime /loss .
How the H/A solution works
Working of H/A Solution

•One Firewall in Cluster is configured as
Primary/Master/Active.
•Redundancy based protocol VRRP is used to detect
failure.
•The Detection is based on Heartbeats.
•Heartbeats are token messages that Firewall sends
periodically to each other.
•If Primary stops Heartbeats, VRRP assumes Primary is
not Available.
•Subsequently VRRP selects the
Secondary/Slave/Passive Firewall to become new
Primary.
•The prevalent Primary Firewall owns a Virtual IP.
•This Virtual IP is the Gateway for All the Servers
, Applications and Network Nodes .
When Primary appliance Fails Secondary takes over .
Firewall in Load balancing
•The other approach in Firewall Clustering is Multi-Primary or Load Balancing
mode.This configuration ensures Performance as well as Availability.


•N/W Traffic Flow can be evenly distributed. This results in Performance.
Also in case of Failure, Secondary Firewall takes over all the N/W traffic
management until Primary Firewall is restored/revived.

• This Scenario is particularly useful in Sudden High peak requirements of
network where Network load needs to be shared and ensure performance
for applications like Web Services , Trading , ERP , CRM or Emails .
High availability Network Design
When Primary Device Fails , Network Diagram
How to avoid Business downtime with H/A

1. H/A ensures almost zero Downtime of your Business Network .
2. As a failure of any single Firewall Device involved in H/A design is transparent
   to the N/W traffic .
3. In effect, the N/W stays unaffected in the event of failure of any single Firewall
   without loss of packets, sessions and more importantly security.
4. H/A Solution Ensures that your IT infrastructure Runs smoothly without any
   downtime . Thus ensuring your instant ROI .
5. Your Business Applications , internet services and remote branch connectivity
   can run smoothly even if your primary firewall fails with an H/A design
Business Benefits of H/A Solution
Technical Benefits of H/A Design:

It ensure higher throughput of bandwidth
Smaller Latency
Lesser Bottlenecks in your networks
Higher Performance for your Apps
Higher Availability for your Servers , Apps and Networks
More frequent Security Updates & Patches

Business Benefits of H/A Design:

Almost Zero Business Downtime
Improved Productivity of N/W and business Applications .
Lesser Security threats as it ensure 100% firewall uptime .
Improved N/W Efficiency
Resilient IT infrastructure and Business productivity
Questions and Answer
• Cost of Ownership of the H/A Solution .
The cost of ownership of this solution can around 5-6 Lakhs depending
on your Network sizing and users .

• Budgetary allocation and ROI .
You can definitely justify the ROI of this solution by your Network
uptime from the date of installation of this solution till next 3yrs .

• How the Solution would be beneficial for my Business
This solution ensures high availability of your firewall/UTM appliance
and thus avoids any business downtime for your network and
applications .

• Business results provided by the H/A Solution .
The business results can be measured with Server uptime , Application
uptime and internet productivity of your employees .

• Action plan moving forward .
Follow us on our twitter handle , email us or call us on 02230584577 for
more details on the solution , thank you .
Business Clients
Contact Info

Registered Office :
IBC
A/105 , BLUE BELL , CENTRAL AVENUE
HIRANANDANI GARDENS , POWAI ,
MUMBAI – 400076 , MH , INDIA .
TEL - 022 30584577
FAX - 022 30584577
24X7 mobile - 9820980046
WEB - www.ibcworld.co.in
EMAIL - info@ibcworld.co.in
SUPPORT – support@ibcworld.co.in
TWITTER - @ibcworld

Weitere ähnliche Inhalte

Was ist angesagt?

Palo Alto Virtual firewall deployment guide on OpenStack Cloud
Palo Alto Virtual firewall deployment guide on OpenStack Cloud  Palo Alto Virtual firewall deployment guide on OpenStack Cloud
Palo Alto Virtual firewall deployment guide on OpenStack Cloud Ajeet Singh
 
FTTH Planning using GIS
FTTH Planning using GISFTTH Planning using GIS
FTTH Planning using GISUmar Farooq
 
Firewall
FirewallFirewall
FirewallApo
 
Aruba Netwrok(1).pptx
Aruba Netwrok(1).pptxAruba Netwrok(1).pptx
Aruba Netwrok(1).pptxEmanHashem6
 
FIREWALL
FIREWALL FIREWALL
FIREWALL Akash R
 
02 opti x rtn 900 v100r002 system hardware-20100223-a
02 opti x rtn 900 v100r002 system hardware-20100223-a02 opti x rtn 900 v100r002 system hardware-20100223-a
02 opti x rtn 900 v100r002 system hardware-20100223-aWaheed Ali
 
2 Basic Principal Of Utp Installation
2 Basic Principal Of Utp Installation2 Basic Principal Of Utp Installation
2 Basic Principal Of Utp InstallationMrirfan
 
Beginners: Different Types of RAN Architectures - Distributed, Centralized & ...
Beginners: Different Types of RAN Architectures - Distributed, Centralized & ...Beginners: Different Types of RAN Architectures - Distributed, Centralized & ...
Beginners: Different Types of RAN Architectures - Distributed, Centralized & ...3G4G
 
6.5.1.2 packet tracer layer 2 security instructor
6.5.1.2 packet tracer   layer 2 security instructor6.5.1.2 packet tracer   layer 2 security instructor
6.5.1.2 packet tracer layer 2 security instructorSalem Trabelsi
 
RUCKUS Unleashed & SmartZone
RUCKUS Unleashed & SmartZoneRUCKUS Unleashed & SmartZone
RUCKUS Unleashed & SmartZoneCarla Nadin
 
Cisco_4 Packet Tracer 9.3.1.2
Cisco_4 Packet Tracer 9.3.1.2Cisco_4 Packet Tracer 9.3.1.2
Cisco_4 Packet Tracer 9.3.1.2Kyle Fitzpatrick
 
Firewall and It's Types
Firewall and It's TypesFirewall and It's Types
Firewall and It's TypesHem Pokhrel
 

Was ist angesagt? (20)

Palo Alto Virtual firewall deployment guide on OpenStack Cloud
Palo Alto Virtual firewall deployment guide on OpenStack Cloud  Palo Alto Virtual firewall deployment guide on OpenStack Cloud
Palo Alto Virtual firewall deployment guide on OpenStack Cloud
 
FTTH Planning using GIS
FTTH Planning using GISFTTH Planning using GIS
FTTH Planning using GIS
 
Firewall
FirewallFirewall
Firewall
 
Aruba Netwrok(1).pptx
Aruba Netwrok(1).pptxAruba Netwrok(1).pptx
Aruba Netwrok(1).pptx
 
FIREWALL
FIREWALL FIREWALL
FIREWALL
 
Firewalls
FirewallsFirewalls
Firewalls
 
02 opti x rtn 900 v100r002 system hardware-20100223-a
02 opti x rtn 900 v100r002 system hardware-20100223-a02 opti x rtn 900 v100r002 system hardware-20100223-a
02 opti x rtn 900 v100r002 system hardware-20100223-a
 
EMEA Airheads- LACP and distributed LACP – ArubaOS Switch
EMEA Airheads- LACP and distributed LACP – ArubaOS SwitchEMEA Airheads- LACP and distributed LACP – ArubaOS Switch
EMEA Airheads- LACP and distributed LACP – ArubaOS Switch
 
BTS
BTSBTS
BTS
 
2 Basic Principal Of Utp Installation
2 Basic Principal Of Utp Installation2 Basic Principal Of Utp Installation
2 Basic Principal Of Utp Installation
 
Siae datasheet
Siae datasheetSiae datasheet
Siae datasheet
 
Les vlans
Les vlansLes vlans
Les vlans
 
Beginners: Different Types of RAN Architectures - Distributed, Centralized & ...
Beginners: Different Types of RAN Architectures - Distributed, Centralized & ...Beginners: Different Types of RAN Architectures - Distributed, Centralized & ...
Beginners: Different Types of RAN Architectures - Distributed, Centralized & ...
 
6.5.1.2 packet tracer layer 2 security instructor
6.5.1.2 packet tracer   layer 2 security instructor6.5.1.2 packet tracer   layer 2 security instructor
6.5.1.2 packet tracer layer 2 security instructor
 
Ethernet VPN (EVPN) EVerything Provider Needs
Ethernet VPN (EVPN) EVerything Provider NeedsEthernet VPN (EVPN) EVerything Provider Needs
Ethernet VPN (EVPN) EVerything Provider Needs
 
ECI - The Elastic Network - winds of change
ECI - The Elastic Network - winds of changeECI - The Elastic Network - winds of change
ECI - The Elastic Network - winds of change
 
Roaming behavior and Client Troubleshooting
Roaming behavior and Client TroubleshootingRoaming behavior and Client Troubleshooting
Roaming behavior and Client Troubleshooting
 
RUCKUS Unleashed & SmartZone
RUCKUS Unleashed & SmartZoneRUCKUS Unleashed & SmartZone
RUCKUS Unleashed & SmartZone
 
Cisco_4 Packet Tracer 9.3.1.2
Cisco_4 Packet Tracer 9.3.1.2Cisco_4 Packet Tracer 9.3.1.2
Cisco_4 Packet Tracer 9.3.1.2
 
Firewall and It's Types
Firewall and It's TypesFirewall and It's Types
Firewall and It's Types
 

Andere mochten auch

D link corporate-presentation_apr. 2014
D link corporate-presentation_apr. 2014D link corporate-presentation_apr. 2014
D link corporate-presentation_apr. 2014Kunal Raul
 
GEANOZ Organic Cotton Vintage RAW Selvedge Jeans
GEANOZ Organic Cotton Vintage RAW Selvedge JeansGEANOZ Organic Cotton Vintage RAW Selvedge Jeans
GEANOZ Organic Cotton Vintage RAW Selvedge JeansVintage Denim Factory
 
داشبوردهای دیجیتالی
داشبوردهای دیجیتالیداشبوردهای دیجیتالی
داشبوردهای دیجیتالیhodais pirdadeh
 
התנהלות וניהול משחק - מנהלת הליגות אוגוסט 2016
התנהלות וניהול משחק  - מנהלת הליגות אוגוסט 2016התנהלות וניהול משחק  - מנהלת הליגות אוגוסט 2016
התנהלות וניהול משחק - מנהלת הליגות אוגוסט 2016Israfans
 
Emerce e financials_151215
Emerce e financials_151215Emerce e financials_151215
Emerce e financials_151215Frank van de Ven
 
Rangoli Magazine_Jan_2017_Final_Web[5608]
Rangoli Magazine_Jan_2017_Final_Web[5608]Rangoli Magazine_Jan_2017_Final_Web[5608]
Rangoli Magazine_Jan_2017_Final_Web[5608]Traci Lennon
 
Voz pasiva y voz activa
Voz pasiva y voz activaVoz pasiva y voz activa
Voz pasiva y voz activaWuendyFer2405
 
Bullseye! Developing Your Brand Identity and Targeted Distribution Strategy
Bullseye! Developing Your Brand Identity and Targeted Distribution Strategy Bullseye! Developing Your Brand Identity and Targeted Distribution Strategy
Bullseye! Developing Your Brand Identity and Targeted Distribution Strategy Oregon Wine Board
 
Difference between hardware and  software computer hardware vs software
Difference between hardware and  software   computer hardware vs softwareDifference between hardware and  software   computer hardware vs software
Difference between hardware and  software computer hardware vs softwareSwapan Das
 
Will Danny Meyer tip move change restaurant landscape?
Will Danny Meyer tip move change restaurant landscape? Will Danny Meyer tip move change restaurant landscape?
Will Danny Meyer tip move change restaurant landscape? Bloomberg LP
 
Alphorm.com Formation Fortinet UTM
Alphorm.com Formation Fortinet UTMAlphorm.com Formation Fortinet UTM
Alphorm.com Formation Fortinet UTMAlphorm
 
Flyktingkatastrofen
FlyktingkatastrofenFlyktingkatastrofen
Flyktingkatastrofendaad52
 
Data communication (simple explanation)
Data communication (simple explanation)Data communication (simple explanation)
Data communication (simple explanation)Twist Akid Sultan
 
Powerpoint for data communication
Powerpoint for data communication Powerpoint for data communication
Powerpoint for data communication samanthaanderson21
 
Pl sql student guide v 1
Pl sql student guide v 1Pl sql student guide v 1
Pl sql student guide v 1Nexus
 

Andere mochten auch (20)

D link corporate-presentation_apr. 2014
D link corporate-presentation_apr. 2014D link corporate-presentation_apr. 2014
D link corporate-presentation_apr. 2014
 
GEANOZ Organic Cotton Vintage RAW Selvedge Jeans
GEANOZ Organic Cotton Vintage RAW Selvedge JeansGEANOZ Organic Cotton Vintage RAW Selvedge Jeans
GEANOZ Organic Cotton Vintage RAW Selvedge Jeans
 
كيف اتوب
كيف اتوبكيف اتوب
كيف اتوب
 
داشبوردهای دیجیتالی
داشبوردهای دیجیتالیداشبوردهای دیجیتالی
داشبوردهای دیجیتالی
 
התנהלות וניהול משחק - מנהלת הליגות אוגוסט 2016
התנהלות וניהול משחק  - מנהלת הליגות אוגוסט 2016התנהלות וניהול משחק  - מנהלת הליגות אוגוסט 2016
התנהלות וניהול משחק - מנהלת הליגות אוגוסט 2016
 
Emerce e financials_151215
Emerce e financials_151215Emerce e financials_151215
Emerce e financials_151215
 
Rangoli Magazine_Jan_2017_Final_Web[5608]
Rangoli Magazine_Jan_2017_Final_Web[5608]Rangoli Magazine_Jan_2017_Final_Web[5608]
Rangoli Magazine_Jan_2017_Final_Web[5608]
 
Pag 162
Pag 162Pag 162
Pag 162
 
Voz pasiva y voz activa
Voz pasiva y voz activaVoz pasiva y voz activa
Voz pasiva y voz activa
 
IED004
IED004IED004
IED004
 
Bullseye! Developing Your Brand Identity and Targeted Distribution Strategy
Bullseye! Developing Your Brand Identity and Targeted Distribution Strategy Bullseye! Developing Your Brand Identity and Targeted Distribution Strategy
Bullseye! Developing Your Brand Identity and Targeted Distribution Strategy
 
Difference between hardware and  software computer hardware vs software
Difference between hardware and  software   computer hardware vs softwareDifference between hardware and  software   computer hardware vs software
Difference between hardware and  software computer hardware vs software
 
Yo soy inicial 3 años
Yo soy inicial 3 añosYo soy inicial 3 años
Yo soy inicial 3 años
 
Will Danny Meyer tip move change restaurant landscape?
Will Danny Meyer tip move change restaurant landscape? Will Danny Meyer tip move change restaurant landscape?
Will Danny Meyer tip move change restaurant landscape?
 
Alphorm.com Formation Fortinet UTM
Alphorm.com Formation Fortinet UTMAlphorm.com Formation Fortinet UTM
Alphorm.com Formation Fortinet UTM
 
Flyktingkatastrofen
FlyktingkatastrofenFlyktingkatastrofen
Flyktingkatastrofen
 
Data communication (simple explanation)
Data communication (simple explanation)Data communication (simple explanation)
Data communication (simple explanation)
 
CV 2014 II
CV 2014 IICV 2014 II
CV 2014 II
 
Powerpoint for data communication
Powerpoint for data communication Powerpoint for data communication
Powerpoint for data communication
 
Pl sql student guide v 1
Pl sql student guide v 1Pl sql student guide v 1
Pl sql student guide v 1
 

Ähnlich wie Ibc Firewall Utm High Availability Solution .

2020 Webinar BSN April Temporary Connectivity Work from home failed deployments
2020 Webinar BSN April Temporary Connectivity Work from home failed deployments2020 Webinar BSN April Temporary Connectivity Work from home failed deployments
2020 Webinar BSN April Temporary Connectivity Work from home failed deploymentsMaureen Donovan
 
Endpoint Data Protection and Data Loss Prevention by EVault - Introduction fo...
Endpoint Data Protection and Data Loss Prevention by EVault - Introduction fo...Endpoint Data Protection and Data Loss Prevention by EVault - Introduction fo...
Endpoint Data Protection and Data Loss Prevention by EVault - Introduction fo...EVault
 
Cloud Printing For SaaS Providers With OM Plus i-Sat
Cloud Printing For SaaS Providers With OM Plus i-SatCloud Printing For SaaS Providers With OM Plus i-Sat
Cloud Printing For SaaS Providers With OM Plus i-SatPlus Technologies
 
Algo sec suite overview 2013 05
Algo sec suite overview 2013 05Algo sec suite overview 2013 05
Algo sec suite overview 2013 05hoanv
 
Netbiter solutions to m2m problems with ethernet and gprs 3g
Netbiter solutions to m2m problems with ethernet and gprs  3gNetbiter solutions to m2m problems with ethernet and gprs  3g
Netbiter solutions to m2m problems with ethernet and gprs 3gnetbiter
 
Telehouse Enhanced Connect slide share
Telehouse Enhanced Connect  slide shareTelehouse Enhanced Connect  slide share
Telehouse Enhanced Connect slide shareTelehouse Europe
 
Cisco IT and ThousandEyes
Cisco IT and ThousandEyesCisco IT and ThousandEyes
Cisco IT and ThousandEyesThousandEyes
 
Acma Computers : Network Solutions
Acma Computers : Network Solutions Acma Computers : Network Solutions
Acma Computers : Network Solutions Acma Computers Ltd
 
Net motion mobility_intro_overview
Net motion mobility_intro_overviewNet motion mobility_intro_overview
Net motion mobility_intro_overviewStef Coetzee
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewallsCastleforce
 
Avaya Aura® Communication Manager Greater than 5 Nines Availability
Avaya Aura® Communication Manager Greater than 5 Nines AvailabilityAvaya Aura® Communication Manager Greater than 5 Nines Availability
Avaya Aura® Communication Manager Greater than 5 Nines AvailabilityAvaya Inc.
 
secure-your-branch via Virtualized Firewall on SD-WAN Edge.pdf
secure-your-branch via Virtualized Firewall on SD-WAN Edge.pdfsecure-your-branch via Virtualized Firewall on SD-WAN Edge.pdf
secure-your-branch via Virtualized Firewall on SD-WAN Edge.pdfrhunter5312
 
Room alert introduction
Room alert introductionRoom alert introduction
Room alert introductionTod Richardson
 
Aruba Remote Networks
Aruba Remote NetworksAruba Remote Networks
Aruba Remote Networkshypknight
 
5 Worst Case Scenarios Your Hosted VoIP Provider Should Be Ready For-LONG VER...
5 Worst Case Scenarios Your Hosted VoIP Provider Should Be Ready For-LONG VER...5 Worst Case Scenarios Your Hosted VoIP Provider Should Be Ready For-LONG VER...
5 Worst Case Scenarios Your Hosted VoIP Provider Should Be Ready For-LONG VER...Jive Communications
 
Addressing the Challenges to Support the New Remote and Mobile Workforce
 Addressing the Challenges to Support the New Remote and Mobile Workforce Addressing the Challenges to Support the New Remote and Mobile Workforce
Addressing the Challenges to Support the New Remote and Mobile Workforcepanagenda
 

Ähnlich wie Ibc Firewall Utm High Availability Solution . (20)

5WorstCase
5WorstCase5WorstCase
5WorstCase
 
2020 Webinar BSN April Temporary Connectivity Work from home failed deployments
2020 Webinar BSN April Temporary Connectivity Work from home failed deployments2020 Webinar BSN April Temporary Connectivity Work from home failed deployments
2020 Webinar BSN April Temporary Connectivity Work from home failed deployments
 
MMPL corporate overview mail
MMPL corporate overview mailMMPL corporate overview mail
MMPL corporate overview mail
 
Experience the Windstream Advantage
Experience the Windstream AdvantageExperience the Windstream Advantage
Experience the Windstream Advantage
 
Endpoint Data Protection and Data Loss Prevention by EVault - Introduction fo...
Endpoint Data Protection and Data Loss Prevention by EVault - Introduction fo...Endpoint Data Protection and Data Loss Prevention by EVault - Introduction fo...
Endpoint Data Protection and Data Loss Prevention by EVault - Introduction fo...
 
Cloud Printing For SaaS Providers With OM Plus i-Sat
Cloud Printing For SaaS Providers With OM Plus i-SatCloud Printing For SaaS Providers With OM Plus i-Sat
Cloud Printing For SaaS Providers With OM Plus i-Sat
 
Algo sec suite overview 2013 05
Algo sec suite overview 2013 05Algo sec suite overview 2013 05
Algo sec suite overview 2013 05
 
Netbiter solutions to m2m problems with ethernet and gprs 3g
Netbiter solutions to m2m problems with ethernet and gprs  3gNetbiter solutions to m2m problems with ethernet and gprs  3g
Netbiter solutions to m2m problems with ethernet and gprs 3g
 
Telehouse Enhanced Connect slide share
Telehouse Enhanced Connect  slide shareTelehouse Enhanced Connect  slide share
Telehouse Enhanced Connect slide share
 
Cisco IT and ThousandEyes
Cisco IT and ThousandEyesCisco IT and ThousandEyes
Cisco IT and ThousandEyes
 
Acma Computers : Network Solutions
Acma Computers : Network Solutions Acma Computers : Network Solutions
Acma Computers : Network Solutions
 
Net motion mobility_intro_overview
Net motion mobility_intro_overviewNet motion mobility_intro_overview
Net motion mobility_intro_overview
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
Avaya Aura® Communication Manager Greater than 5 Nines Availability
Avaya Aura® Communication Manager Greater than 5 Nines AvailabilityAvaya Aura® Communication Manager Greater than 5 Nines Availability
Avaya Aura® Communication Manager Greater than 5 Nines Availability
 
secure-your-branch via Virtualized Firewall on SD-WAN Edge.pdf
secure-your-branch via Virtualized Firewall on SD-WAN Edge.pdfsecure-your-branch via Virtualized Firewall on SD-WAN Edge.pdf
secure-your-branch via Virtualized Firewall on SD-WAN Edge.pdf
 
Room alert introduction
Room alert introductionRoom alert introduction
Room alert introduction
 
Aruba Remote Networks
Aruba Remote NetworksAruba Remote Networks
Aruba Remote Networks
 
5 Worst Case Scenarios Your Hosted VoIP Provider Should Be Ready For-LONG VER...
5 Worst Case Scenarios Your Hosted VoIP Provider Should Be Ready For-LONG VER...5 Worst Case Scenarios Your Hosted VoIP Provider Should Be Ready For-LONG VER...
5 Worst Case Scenarios Your Hosted VoIP Provider Should Be Ready For-LONG VER...
 
Moving Beyond the Router to a Thin-branch or Application-driven SD-WAN
Moving Beyond the Router to a Thin-branch or Application-driven SD-WANMoving Beyond the Router to a Thin-branch or Application-driven SD-WAN
Moving Beyond the Router to a Thin-branch or Application-driven SD-WAN
 
Addressing the Challenges to Support the New Remote and Mobile Workforce
 Addressing the Challenges to Support the New Remote and Mobile Workforce Addressing the Challenges to Support the New Remote and Mobile Workforce
Addressing the Challenges to Support the New Remote and Mobile Workforce
 

Ibc Firewall Utm High Availability Solution .

  • 1. High performing IT Solutions Firewall /UTM High availability Solution Presented by Mr.Vihang S . Kathe Founder & Director IBC
  • 2. Need of H/A Solution for Business Current Business scenario Working of H/A Solution How to avoid Downtime with H/A Case Scenarios Business Benefits Question and Answers Action plan Forward
  • 3. Need of H/A for Business
  • 4. Current Business Situation • Network Availability is dependent on Single Firewall UTM Appliance . • Remote Branches connected to this Firewall Appliance . • Web servers , Application Servers and email services are NATted to Firewall . • Internal users dependent on Firewall for internet browsing . • Multiple ISP might be terminated on Firewall for ISP failover solution Incase this Firewall has a hardware failure • Complete business communication fails . • Users are not able to browse the internet , send emails and branch offices are not able to connect to central applications . • Results in complete business downtime .
  • 6. How to ensure N/W availability  With High availability or Clustering solution with 2 Identical Firewall / UTM appliance .  Firewall Clustering or Firewall Redundancy is the arrangement of 2 or more Firewalls designed & configured either for Availability or for Performance or for both.  Firewalls configured in Master-Slave/Hot-Cold/Active-Passive/Primary- Backup mode, ensures High Availability of N/W.  So incase the primary Firewall fails , the complete network can be automatically diverted to the secondary firewall thus ensuring no business downtime /loss .
  • 7. How the H/A solution works
  • 8. Working of H/A Solution •One Firewall in Cluster is configured as Primary/Master/Active. •Redundancy based protocol VRRP is used to detect failure. •The Detection is based on Heartbeats. •Heartbeats are token messages that Firewall sends periodically to each other. •If Primary stops Heartbeats, VRRP assumes Primary is not Available. •Subsequently VRRP selects the Secondary/Slave/Passive Firewall to become new Primary. •The prevalent Primary Firewall owns a Virtual IP. •This Virtual IP is the Gateway for All the Servers , Applications and Network Nodes .
  • 9. When Primary appliance Fails Secondary takes over .
  • 10.
  • 11. Firewall in Load balancing •The other approach in Firewall Clustering is Multi-Primary or Load Balancing mode.This configuration ensures Performance as well as Availability. •N/W Traffic Flow can be evenly distributed. This results in Performance. Also in case of Failure, Secondary Firewall takes over all the N/W traffic management until Primary Firewall is restored/revived. • This Scenario is particularly useful in Sudden High peak requirements of network where Network load needs to be shared and ensure performance for applications like Web Services , Trading , ERP , CRM or Emails .
  • 13. When Primary Device Fails , Network Diagram
  • 14. How to avoid Business downtime with H/A 1. H/A ensures almost zero Downtime of your Business Network . 2. As a failure of any single Firewall Device involved in H/A design is transparent to the N/W traffic . 3. In effect, the N/W stays unaffected in the event of failure of any single Firewall without loss of packets, sessions and more importantly security. 4. H/A Solution Ensures that your IT infrastructure Runs smoothly without any downtime . Thus ensuring your instant ROI . 5. Your Business Applications , internet services and remote branch connectivity can run smoothly even if your primary firewall fails with an H/A design
  • 15. Business Benefits of H/A Solution Technical Benefits of H/A Design: It ensure higher throughput of bandwidth Smaller Latency Lesser Bottlenecks in your networks Higher Performance for your Apps Higher Availability for your Servers , Apps and Networks More frequent Security Updates & Patches Business Benefits of H/A Design: Almost Zero Business Downtime Improved Productivity of N/W and business Applications . Lesser Security threats as it ensure 100% firewall uptime . Improved N/W Efficiency Resilient IT infrastructure and Business productivity
  • 16. Questions and Answer • Cost of Ownership of the H/A Solution . The cost of ownership of this solution can around 5-6 Lakhs depending on your Network sizing and users . • Budgetary allocation and ROI . You can definitely justify the ROI of this solution by your Network uptime from the date of installation of this solution till next 3yrs . • How the Solution would be beneficial for my Business This solution ensures high availability of your firewall/UTM appliance and thus avoids any business downtime for your network and applications . • Business results provided by the H/A Solution . The business results can be measured with Server uptime , Application uptime and internet productivity of your employees . • Action plan moving forward . Follow us on our twitter handle , email us or call us on 02230584577 for more details on the solution , thank you .
  • 18. Contact Info Registered Office : IBC A/105 , BLUE BELL , CENTRAL AVENUE HIRANANDANI GARDENS , POWAI , MUMBAI – 400076 , MH , INDIA . TEL - 022 30584577 FAX - 022 30584577 24X7 mobile - 9820980046 WEB - www.ibcworld.co.in EMAIL - info@ibcworld.co.in SUPPORT – support@ibcworld.co.in TWITTER - @ibcworld