Securing Internet Traffic with SonicWall Cloud Secure Edge (CSE)

Description

Overview #

CSE’s Internet Threat Protection (ITP) capability is designed to protect end users from malicious websites, ransomware, or phishing attacks by examining internet traffic. ITP can also be used to enforce acceptable use policies (AUPs) by blocking specific categories of websites (e.g., Gambling, Drugs, Adult Content, etc).

Traditionally, the Secure Web Gateway (SWG) functionality was enforced on firewalls tied to a specific network; CSE’s implementation provides a modern SWG functionality that applies to users’ devices no matter which network they are on.

The ITP capability is implemented and applied in 3 stages, with functionality being automatically enabled or disabled based on the policies you assign to your users.

StageDescription
DNS-layer SecurityEvaluate domain for threats & acceptable use
URL FilteringFilter or explicitly block URLs
Payload InspectionScan HTTP payloads for malicious content & sensitive data

Diagram

Details #

Routing #

Traffic destined for Private Resources or routed through Service Tunnels is automatically excluded from ITP policy evaluation; admins can add further org-specific exemptions as needed. DNS resolution and content inspection are carried out at the Global Edge Network-level (via swg agent), while URL filtering is performed primarily on the device. Enforcing ITP in this fashion allows security to be always-on but not always-inline, ensuring your users do not face any extra hops or network performance degradation while still enforcing all your organization’s security policies.

DNS-layer Security #

DNS-layer security allows admins to decide which domains, or categories of domains, they need to block. These domains are added to an ITP policy, and the policy is then associated to a device or a group of devices.

These devices then update their name servers to point to CSE’s name servers for all DNS traffic. The next time the device uses DNS, the request is sent to CSE name servers, along with the device’s unique identifier. The name servers recognize the device based on its unique identifier and then match the device to the associated ITP policy.

Then, in real time, the ITP policy categorizes the request(s) from the device, based on domain, and determines whether the request(s) should be blocked or allowed:

  • If the request is blocked, then the device receives a redirect to a block page (the messaging on the block page is configurable by the organization).
  • If the request is allowed, the device continues to the endpoint without any notification of evaluation.

Related Articles

  • Cloud Secure Edge (CSE) Global Edge Network
    Read More
  • Cloud Secure Edge (CSE) Cloud Command Center
    Read More
  • SonicWall CSE: Install Connector using Windows Executable
    Read More
not finding your answers?