Security Services Design in the Next- Generation Data Center
|
|
|
- Grant Jennings
- 9 years ago
- Views:
Transcription
1 Security Services Design in the Next- Generation Data Center Ken Kaminski Security Technical Solutions Architect Northeast CISSP, GCIA, GCFA, GAWN, GPEN Cisco Systems. 1
2 1. Data Center Design Concepts 2. Firewalls in the Data Center 3. Secure Virtual Containers 4. Visibility and Threat Defense This presentation is focused upon the Enterprise Data Center. 2
3
4 . 4
5 . 5 5
6 The whole network is down %IP-4-DUPADDR: Duplicate address on Vlan100, sourced by 00d0.04e0.63fc %IP-4-DUPADDR: Duplicate address on Vlan100, sourced by 00d0.04e0.63fc %IP-4-DUPADDR: Duplicate address on Vlan100, sourced by 00d0.04e0.63fc... I can t access anything All systems are unreachable %C4K_EBM-4-HOSTFLAPPING: Host 00:02:A5:8A:8B:5E in vlan 60 is flapping between port Gi3/6 and port Po9 %C4K_EBM-4-HOSTFLAPPING: Host 00:02:A5:8A:8B:5E in vlan 60 is flapping between port Gi3/6 and port Po9 %C4K_EBM-4-HOSTFLAPPING: Host 00:02:A5:8A:8B:5E in vlan 60 is flapping between port Gi3/6 and port Po9... Nothing seems to work Number of topology changes last change occurred 00:00:02 ago %PM-SP-4-LIMITS: Virtual port count for module 5 exceeded the recommended limit of 1800 %PM-SP-4-LIMITS: Virtual port count for switch exceeded the recommended limit of Many of us have suffered the consequences of a L2 loop. 6 6
7 L2 Fails Open i.e. Broadcast and Unknowns flooded Layer 3 Routing Si Si L2 Control Plane Failure Si No Spanning Tree... a loop and a network down... But this is not a Solution in the Data Center. 7 7
8 VLAN Ubiquity Intra Data Center Rack-Wide VM Mobility DC-Wide VM Mobility DC DC POD POD POD POD VLAN VLAN VLAN VLAN Network protocols enable broader VM Mobility Implementable on Virtual and Physical Examples: VPC, FabricPath/TRILL, VXLAN. 8 8
9 Firewall Virtual Port Channels (vpc) are port channels where both links are actively forwarding traffic Typically deployed in the Data Center VPC was created to solve two inherent network problems: Spanning-tree recalculation times and unused capacity in redundant L2 uplinks (due to STP blocks) No additional config required on Firewall Multi-vendor Multichassis Etherchannel (MEC) Data Center Switches. 9 9
10 Aggregation Layer Data Center Core Layer Centralized point for ingress and egress data center flows Can be demarcation point for L2 and L3 Services can be scaled as data center grows Services Layer DC Aggregation Layer Additional services location for server farm specific protection Offloads port utilization from Aggregation Layer Virtual Network & Access DC Service Layer Physical and virtual form factor for server connectivity Top of rack provides port density for server connections Merging point between physical and virtual networks *Note: This diagram is focused only on internal data center and does not include the data center edge, extranet, DMZ. Storage Data security authenticat e & access control Virtual Access Virtual Firewall Real-time Monitoring Firewall Rules DC Access Layer. 10
11 Classic Multilayer Data Center Design L3 L2 POD A POD B POD C Layer 2 benefits limited to a POD. 11
12 Switching Easy Configuration Plug-and-Play Flexible Provisioning Routing Multipathing (ECMP) Fast Convergence Stable and Scalable FabricPath FabricPath combines benefits of Layer 3 routing with simplicity of Layer 2 switching FabricPath. 12
13 FabricPath Data Plane Innovation Control Plane Innovation Routing Ethernet frame, not bridging MAC in MAC Encapsulation (uses Switch-ids) Built-in loop-mitigation Time-to-Live (TTL) RPF Check Plug-n-Play Layer 2 IS-IS Support unicast and multicast Fast, efficient, and scalable Equal Cost Multipathing (ECMP) VLAN and Multicast Pruning
14 Fabric Path Based Data Center Classical Ethernet Isolation OTV OTV Border LEAF vpc vpc L3 Domain SPINE LEAF Port Channels L2 Domain vpc+ domain 2 vpc+ domain 3 FP L2 link CE L2 link L3 link vpc
15 TRILL is an IETF standard for Layer 2 multipathing IETF Proposed Standard that suggests applying modern network-layer routing protocols at the link layer RFC 5556, RFC 6325, etc Driven by multiple vendors, including Cisco FabricPath capable hardware is also TRILL capable Cisco provides TRILL as a special mode for FabricPath with a software upgrade 15
16 . 16
17 Virtualized Servers: no hardware switches and routers Requirement in Large Multitenant Data Centers Servers perform data encapsulation and forwarding SW based virtual switches instantiate customer topologies V M 1 V M 2 Virtual Switch Ethernet Frames IP Addr IP Network IP Addr Virtual Switch V M 4 V M 5 V M 3 Hypervisor IP/UDP Packets Hypervisor V M 6. 17
18 Ethernet Frames are encapsulated into an IP frame format New control logic for learning and mapping VM identity (MAC address) to Host identity (IP address) Three Hypervisor based Overlays VXLAN Virtual Extensible Local Area Network NVGRE, Network Virtualization Generic Router Encapsulation STT Stateless Transport Tunneling Network Based Overlays VXLAN and NVGRE. 18
19 Ethernet in IP overlay network Entire L2 frame encapsulated in UDP 50 bytes of overhead Include 24 bit VXLAN Identifier 16 M logical networks Mapped into local bridge domains VXLAN can cross Layer 3 Tunnel between VEMs VMs do NOT see VXLAN ID IP multicast used for L2 broadcast/multicast, unknown unicast Technology submitted to IETF for standardization With Cisco, Arista, VMware, Citrix, Red Hat and Others Outer MAC DA Outer MAC SA Outer 802.1Q Outer IP DA Outer IP SA Outer UDP VXLAN ID (24 bits) Inner MAC DA Inner MAC SA Optional Inner 802.1Q Original Ethernet Payload CRC VXLAN Encapsulation Original Ethernet Frame. 19
20 Both MAC and IP addresses could overlap between two tenants, or even within the same tenant in different vapps. Each overlapping address space needs a separate segment VLANs uses 12 bit IDs = 4K VXLANs use 24 bit IDs = 16M NVGRE uses 24 bit IDs = 16M
21 A Cloud Provider using vcloud Director offers catalogs of vapps to their Users When cloned, new vapps retain the same MAC and IP addresses Duplicate MACs within different vapps requires L2 isolation Duplicate IP addresses requires L2/L3 isolation (NAT of externally facing IP addresses) Usage of vapps causes an explosion in the need for isolated L2 segments vapp vapp DB Net vapp App Net vapp Web Net Org Network DB VM s App VM s Web VM s Edge Gateway
22 . 22
23 North - South Core North-South (N-S) flows are typically flows to and from Access layer to Aggregation Layer and Core Aggregation East-West (E-W) flows typically stay either within a zone or between zones and often server to server traffic Virtual Hosts Web Virtual Hosts Database Virtual Hosts App Access East - West
24 Changing Traffic Flow Requirements: (Cisco s Global Cloud Index): Dominant volume of traffic in the DC traverses in an East-West direction (76%), North-South traffic (17%), inter- DC traffic (7%)- gradually growing. In campus networks, traffic is primarily (90+%) North-South traffic. Physical to Virtual Resources - number of hosts huge increase Insertion of services {load-balancing, firewalling, IPS/IDS, WAAS, tenant routing}
25 Insertion of services fundamentally drives the logical design (both L2 and L3) within the Data Center: Firewall, Application Firewalls, Application Delivery Controllers, IDS/IPS, Client Routing Classic MultiLayer Distributed Data Center Design Services Layer large scale appliances Virtualized Services as VMs East-West Fabric Based Data Center Design Separate Border Leaf large scale appliances Virtualized Services as VMs East-West. 25
26
27 Virtual / Multitenant Physical North-south traffic: Inspecting all traffic into and out of the data center Data center edge security appliance inspects all traffic into the data center High speed with all services, best with full Intrusion Prevention System (IPS), through a single choke point Separates what is outside the network from what is inside (such as north-south traffic) East-west traffic: Creating secure trust zones between applications and tenants within the data center Virtual Edge Firewall Virtual Firewall VM Attributes Virtual Regular Firewall controls edges Separates tenants in large scale multitenant environments inter-vlan Virtual Firewall VM Attributes Separates applications or virtual machines within a single tenant or POD, examples: Cisco VSG, VMWare Vshield: intra-vlan. 27
28 Two types: multi-context mode and virtual firewalls Multi-context mode was originally designed for SMT (Secure Multi Tenant) deployments Virtual firewalls are software-only firewalls optimized to work in a hypervisor Examples: Cisco Virtual Security Gateway (VSG),ASA1000V,ASAv. VMWare Vshield. Other vendors also have offerings. Virtual Firewalls are often tied to the vendor s distributed virtual switch (DVS) Virtual firewalls can be deployed rapidly with typical orchestration tools, etc. but there is an added layer of operational complexity Virtual firewalls are heavily dependent on available RAM and CPU on the host server
29 Methods of Operation Core Aggregation Layer 2 Layer 3 Clustering vpath DVS Hypervisor vpath DVS Hypervisor vpath DVS Hypervisor. 29
30 Aggregation VDC Firewall in transparent mode with SVI on Aggregation VDC. Server gateway on outside of firewall v201 - Outside v200 Inside GW: Layer 3 Layer 2 Simple design. Firewall part of layer 2 failure domain.. 30
31 Firewall functions like a bridge ( bump in the wire ) at L2, only ARP packets pass without an explicit ACL Still can use traditional ACLs on the firewall Different VLANs on inside and outside interfaces but the same subnet In addition to Extended ACLs, use an EtherType ACL to restrict or allow L2 protocols Routing protocols can establish adjacencies through the firewall Protocols such as HSRP, VRRP, GLBP can cross the firewall Multicast streams can traverse the firewall Non-IP traffic can be allowed (IPX, MPLS, BPDUs) Deploy where IP address schemes can not be modified. 31
32 Active/Standby Failover Single- or multiple-context mode Device-level switchover on failure One unit is always idling Ideal plain and simple design for single tenant Active/Active Failover Requires multiple-context mode Switchover based on context groups Both units are passing traffic Design caveats exist Inside Inside A Inside B Primary Secondary Primary A B A B Secondary ASA Outside Outside A Outside B Secondary. 32
33 Clustering was introduced to solve the problem of redundancy with scalability Allows for N+1 redundancy with a backup firewall for every active flow A Firewall cluster is treated by the network as one logical firewall Configuration is synchronized among cluster members Three reasons to consider Clustering: 1. Redundancy no single point of failure, actively using all cluster members 2. Scalability cluster can grow as requirements increase over time 3. Asymmetric flow handling the cluster maintains symmetry for all conns
34 Layer 2 better design. You do not want the firewall to be the Default Gateway for the physical and virtual servers. You want that on the high capacity Layer 3 Data Center Switches for redundancy and resiliency reasons. HSRP, VRRP and GLBP in vpc environment operate in Active/Active mode and Anycast HSRP operates in 4-way active mode in FabricPath environment You can overlay Layer 2 firewalls into the DC without having to adjust the ip addressing and routing.. 34
35 3
36 The most significant transformation affecting enterprise data centers today is the adoption of server virtualization technology -- rolling out virtualized servers will require enterprises to invest in new security solutions in the data center Drivers are a mix of specific security issues (preventing new and inter-vm threats) and configuration/management issues (maintaining server configs, improving server performance) 68% of Infonetics survey respondents name protecting virtualized servers an important driver 86% already have a spot in their IT budget for security solutions for their virtualized server environments 82% believe that virtualization fundamentally changes security architecture, but 58% deploy security in their virtualized environments using a reliable (but expensive and difficult to manage) solution: installing discreet security applications on each virtual machine Infonetics : Security for Virtualized Infrastructure: North American Enterprise Survey Security for Virtualized Servers
37 Port Profile > Port Group vcenter API port-profile vm180 vmware port-group pg180 switchport mode access switchport access vlan 180 ip flow monitor ESE-flow input ip flow monitor ESE-flow output no shutdown state enabled interface Vethernet9 inherit port-profile vm180 interface Vethernet10 inherit port-profile vm180 Distributed Virtual Switch supports: ACLs Quality of Service (QoS) PVLANs Port channels SPAN ports. 37
38 The vendor DVS must provide service path chaining or the chaining of various services together inside the virtual environment: Server Load Balancers, Virtual Firewalls, Virtual Edge Firewalls, Virtual Web Application Firewalls, Network Sniffers. These are called Virtual Service Nodes This is all inside the virtual environment within and between Hypervisors Examples: Cisco Vpath, Cisco ACI, and VMWare NSX. 38
39 Virtual Firewall Virtual Edge Firewall Intra-Tenant Security Secures traffic between virtual machines within a tenant Layer 2 and 3 firewall to secure east-to-west traffic ACLs using network attributes and virtual machine attributes vpath DVS Hypervisor Tenant-Edge Security Secures the tenant edge Default gateway; Layer 3 firewall to secure north-tosouth traffic Edge firewall capabilities including network attributebased ACLs, site-to-site VPN, NAT, DHCP, inspections, and IP audit. 39
40 vcenter Example VM Attributes Name Meaning Source vm.name Name of this VM vcenter vm.host-name Name of this ESX-host vcenter vm.os-fullname Name of guest OS vcenter vm.vapp-name Name of the associated vapp vcenter vm.cluster-name Name of the cluster vcenter vm.portprofile-name Name of the port-profile Port-profile VM attribute information collected is used for enforcing security policy. 40
41 . 41
42
43 NetFlow Data Internal Network NetFlow Collector. 43
44 NetFlow Security Use Cases Detecting Sophisticated and Persistent Threats. Malware that makes it past perimeter security can remain in the enterprise waiting to strike as lurking threats. These may be zero day threats. Identifying BotNet Command & Control Activity. BotNets are implanted in the enterprise to execute commands from their Bot herders to send SPAM, Denial of Service attacks, or other malicious acts. Uncovering Network Reconnaissance. Some attacks will probe the network looking for attack vectors to be utilised by custom-crafted cyber threats. Finding Internally Spread Malware. Network interior malware proliferation can occur across hosts for the purpose gathering security reconnaissance data, data exfiltration or network backdoors Revealing Data Loss. Code can be hidden in the enterprise to export of sensitive information back to the attacker. This Data Leakage may occur rapidly or over time.. 44
45 Can be used to answer the questions: Who s talking to whom? What is happening on the network? Where is the data going? Did someone access the payroll server? NetFlow requirements for security Full Flow capabilities Unsampled Line Rate Aggressive export Requires extra fields (new aggregation). 45
46 Data is often exfiltrated over stealthy channels Hidden inside normal communication payloads Payload padding Encrypted over standard ports TCP port 80, TCP port 443, etc. Standard applications and protocols (ex. SFTP, HTTP, HTTPS) Detection requires deep visibility into user and device behaviour Historical data transfers to establish patterns of communication Applications is their behaviour normal? Time of day why is Bob transferring data at 2:00 am? Countries do we really do business with North Korea?. 46
47 Aggregation Flow Collector Secure Container N-S Firewall Netflow Security NBA Cisco NetFlow Virtual Firewall DVS Flow Collectors required in the Data Center as DC switches often do not support Netflow at wire rates Virtual Flow Sensor Hypervisor
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea ([email protected]) Senior Solutions Architect, Brocade Communications Inc. Jim Allen ([email protected]) Senior Architect, Limelight
VXLAN: Scaling Data Center Capacity. White Paper
VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where
Cisco FabricPath Technology and Design
Cisco Technology and Design 2 Agenda Introduction to Concepts Technology vs Trill Designs Conclusion 3 Introduction to By Francois Tallet 5 Why Layer 2 in the Data Centre? Some Applications / Protocols
TRILL for Service Provider Data Center and IXP. Francois Tallet, Cisco Systems
for Service Provider Data Center and IXP Francois Tallet, Cisco Systems 1 : Transparent Interconnection of Lots of Links overview How works designs Conclusion 2 IETF standard for Layer 2 multipathing Driven
VMDC 3.0 Design Overview
CHAPTER 2 The Virtual Multiservice Data Center architecture is based on foundation principles of design in modularity, high availability, differentiated service support, secure multi-tenancy, and automated
VMware Network Virtualization Design Guide. January 2013
ware Network Virtualization Technical WHITE PAPER January 2013 ware Network Virtualization Table of Contents Intended Audience.... 3 Overview.... 3 Components of the ware Network Virtualization Solution....
Roman Hochuli - nexellent ag / Mathias Seiler - MiroNet AG
Roman Hochuli - nexellent ag / Mathias Seiler - MiroNet AG North Core Distribution Access South North Peering #1 Upstream #1 Series of Tubes Upstream #2 Core Distribution Access Cust South Internet West
Simplify IT. With Cisco Application Centric Infrastructure. Barry Huang [email protected]. Nov 13, 2014
Simplify IT With Cisco Application Centric Infrastructure Barry Huang [email protected] Nov 13, 2014 There are two approaches to Control Systems IMPERATIVE CONTROL DECLARATIVE CONTROL Baggage handlers follow
VXLAN Bridging & Routing
VXLAN Bridging & Routing Darrin Machay [email protected] CHI-NOG 05 May 2015 1 VXLAN VM-1 10.10.10.1/24 Subnet A ESX host Subnet B ESX host VM-2 VM-3 VM-4 20.20.20.1/24 10.10.10.2/24 20.20.20.2/24 Load
Palo Alto Networks. Security Models in the Software Defined Data Center
Palo Alto Networks Security Models in the Software Defined Data Center Christer Swartz Palo Alto Networks CCIE #2894 Network Overlay Boundaries & Security Traditionally, all Network Overlay or Tunneling
Virtual PortChannels: Building Networks without Spanning Tree Protocol
. White Paper Virtual PortChannels: Building Networks without Spanning Tree Protocol What You Will Learn This document provides an in-depth look at Cisco's virtual PortChannel (vpc) technology, as developed
NSX TM for vsphere with Arista CloudVision
ARISTA DESIGN GUIDE NSX TM for vsphere with Arista CloudVision Version 1.0 August 2015 ARISTA DESIGN GUIDE NSX FOR VSPHERE WITH ARISTA CLOUDVISION Table of Contents 1 Executive Summary... 4 2 Extending
Expert Reference Series of White Papers. vcloud Director 5.1 Networking Concepts
Expert Reference Series of White Papers vcloud Director 5.1 Networking Concepts 1-800-COURSES www.globalknowledge.com vcloud Director 5.1 Networking Concepts Rebecca Fitzhugh, VMware Certified Instructor
Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心
Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心 1 SDN Introduction Decoupling of control plane from data plane
DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch
DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch What You Will Learn A demilitarized zone (DMZ) is a separate network located in the neutral zone between a private (inside)
Network Virtualization for Large-Scale Data Centers
Network Virtualization for Large-Scale Data Centers Tatsuhiro Ando Osamu Shimokuni Katsuhito Asano The growing use of cloud technology by large enterprises to support their business continuity planning
TRILL Large Layer 2 Network Solution
TRILL Large Layer 2 Network Solution Contents 1 Network Architecture Requirements of Data Centers in the Cloud Computing Era... 3 2 TRILL Characteristics... 5 3 Huawei TRILL-based Large Layer 2 Network
Intro to NSX. Network Virtualization. 2014 VMware Inc. All rights reserved.
Intro to NSX Network Virtualization 2014 VMware Inc. All rights reserved. Agenda Introduction NSX Overview Details: Microsegmentation NSX Operations More Information SDDC/Network Virtualization Security
Configuring the Transparent or Routed Firewall
5 CHAPTER This chapter describes how to set the firewall mode to routed or transparent, as well as how the firewall works in each firewall mode. This chapter also includes information about customizing
TRILL for Data Center Networks
24.05.13 TRILL for Data Center Networks www.huawei.com enterprise.huawei.com Davis Wu Deputy Director of Switzerland Enterprise Group E-mail: [email protected] Tel: 0041-798658759 Agenda 1 TRILL Overview
RESILIENT NETWORK DESIGN
Matěj Grégr RESILIENT NETWORK DESIGN 1/36 2011 Brno University of Technology, Faculty of Information Technology, Matěj Grégr, [email protected] Campus Best Practices - Resilient network design Campus
Cisco Nexus 1000V Switch for Microsoft Hyper-V
Data Sheet Cisco Nexus 1000V Switch for Microsoft Hyper-V Product Overview Cisco Nexus 1000V Switches provide a comprehensive and extensible architectural platform for virtual machine and cloud networking.
How Network Virtualization can improve your Data Center Security
How Network Virtualization can improve your Data Center Security Gilles Chekroun SDDC, NSX Team EMEA [email protected] 2014 VMware Inc. All rights reserved. Security IT spending Security spending is
VMware. NSX Network Virtualization Design Guide
VMware NSX Network Virtualization Design Guide Table of Contents Intended Audience... 3 Overview... 3 Components of the VMware Network Virtualization Solution... 4 Data Plane... 4 Control Plane... 5 Management
Reference Design: Deploying NSX for vsphere with Cisco UCS and Nexus 9000 Switch Infrastructure TECHNICAL WHITE PAPER
Reference Design: Deploying NSX for vsphere with Cisco UCS and Nexus 9000 Switch Infrastructure TECHNICAL WHITE PAPER Table of Contents 1 Executive Summary....3 2 Scope and Design Goals....3 2.1 NSX VMkernel
Multitenancy Options in Brocade VCS Fabrics
WHITE PAPER DATA CENTER Multitenancy Options in Brocade VCS Fabrics As cloud environments reach mainstream adoption, achieving scalable network segmentation takes on new urgency to support multitenancy.
Cloud Networking Disruption with Software Defined Network Virtualization. Ali Khayam
Cloud Networking Disruption with Software Defined Network Virtualization Ali Khayam In the next one hour Let s discuss two disruptive new paradigms in the world of networking: Network Virtualization Software
Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide. Revised February 28, 2013 2:32 pm Pacific
Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide Revised February 28, 2013 2:32 pm Pacific Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide
Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES
Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 SDN - An Overview... 2 SDN: Solution Layers and its Key Requirements to be validated...
Virtualization, SDN and NFV
Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,
How To Set Up A Virtual Network On Vsphere 5.0.5.2 (Vsphere) On A 2Nd Generation Vmkernel (Vklan) On An Ipv5 Vklan (Vmklan)
Best Practices for Virtual Networking Karim Elatov Technical Support Engineer, GSS 2009 VMware Inc. All rights reserved Agenda Best Practices for Virtual Networking Virtual Network Overview vswitch Configurations
Analysis of Network Segmentation Techniques in Cloud Data Centers
64 Int'l Conf. Grid & Cloud Computing and Applications GCA'15 Analysis of Network Segmentation Techniques in Cloud Data Centers Ramaswamy Chandramouli Computer Security Division, Information Technology
Network Virtualization
Network Virtualization Petr Grygárek 1 Network Virtualization Implementation of separate logical network environments (Virtual Networks, VNs) for multiple groups on shared physical infrastructure Total
VXLAN, Enhancements, and Network Integration
VXLAN, Enhancements, and Network Integration Apricot 2014 - Malaysia Eddie Parra Principal Engineer, Juniper Networks Router Business Unit (RBU) [email protected] Legal Disclaimer: This statement of product
Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.
Securely Architecting the Internal Cloud Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc. Securely Building the Internal Cloud Virtualization is the Key How Virtualization Affects
VXLAN Overlay Networks: Enabling Network Scalability for a Cloud Infrastructure
W h i t e p a p e r VXLAN Overlay Networks: Enabling Network Scalability for a Cloud Infrastructure Table of Contents Executive Summary.... 3 Cloud Computing Growth.... 3 Cloud Computing Infrastructure
Top-Down Network Design
Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,
Extending Networking to Fit the Cloud
VXLAN Extending Networking to Fit the Cloud Kamau WangŨ H Ũ Kamau Wangũhgũ is a Consulting Architect at VMware and a member of the Global Technical Service, Center of Excellence group. Kamau s focus at
Cisco Virtual Security Gateway for Nexus 1000V Series Switch
Data Sheet Cisco Virtual Security Gateway for Nexus 1000V Series Switch Product Overview Cisco Virtual Security Gateway (VSG) for Nexus 1000V Series Switch is a virtual appliance that provides trusted
VMware Software Defined Network. Dejan Grubić VMware Systems Engineer for Adriatic
VMware Software Defined Network Dejan Grubić VMware Systems Engineer for Adriatic The Transformation of Infrastructure Infrastructure Servers Clouds Be more responsive to business, change economics of
Cisco Prime Network Services Controller. Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems
Cisco Prime Network Services Controller Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems Agenda Cloud Networking Challenges Prime Network Services Controller L4-7 Services Solutions
Data Center Infrastructure of the future. Alexei Agueev, Systems Engineer
Data Center Infrastructure of the future Alexei Agueev, Systems Engineer Traditional DC Architecture Limitations Legacy 3 Tier DC Model Layer 2 Layer 2 Domain Layer 2 Layer 2 Domain Oversubscription Ports
SOFTWARE-DEFINED NETWORKING AND OPENFLOW
SOFTWARE-DEFINED NETWORKING AND OPENFLOW Freddie Örnebjär TREX Workshop 2012 2012 Brocade Communications Systems, Inc. 2012/09/14 Software-Defined Networking (SDN): Fundamental Control
"Charting the Course...
Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content
Expert Reference Series of White Papers. Planning for the Redeployment of Technical Personnel in the Modern Data Center
Expert Reference Series of White Papers Planning for the Redeployment of Technical Personnel in the Modern Data Center [email protected] www.globalknowledge.net Planning for the Redeployment of
SDN CONTROLLER. Emil Gągała. PLNOG, 30.09.2013, Kraków
SDN CONTROLLER IN VIRTUAL DATA CENTER Emil Gągała PLNOG, 30.09.2013, Kraków INSTEAD OF AGENDA 2 Copyright 2013 Juniper Networks, Inc. www.juniper.net ACKLOWLEDGEMENTS Many thanks to Bruno Rijsman for his
How To Make A Vpc More Secure With A Cloud Network Overlay (Network) On A Vlan) On An Openstack Vlan On A Server On A Network On A 2D (Vlan) (Vpn) On Your Vlan
Centec s SDN Switch Built from the Ground Up to Deliver an Optimal Virtual Private Cloud Table of Contents Virtualization Fueling New Possibilities Virtual Private Cloud Offerings... 2 Current Approaches
How To Orchestrate The Clouddusing Network With Andn
ORCHESTRATING THE CLOUD USING SDN Joerg Ammon Systems Engineer Service Provider 2013-09-10 2013 Brocade Communications Systems, Inc. Company Proprietary Information 1 SDN Update -
Transform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure
White Paper Transform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure What You Will Learn The new Cisco Application Centric Infrastructure
Why Software Defined Networking (SDN)? Boyan Sotirov
Why Software Defined Networking (SDN)? Boyan Sotirov Agenda Current State of Networking Why What How When 2 Conventional Networking Many complex functions embedded into the infrastructure OSPF, BGP, Multicast,
Using Network Virtualization to Scale Data Centers
Using Network Virtualization to Scale Data Centers Synopsys Santa Clara, CA USA November 2014 1 About Synopsys FY 2014 (Target) $2.055-2.065B* 9,225 Employees ~4,911 Masters / PhD Degrees ~2,248 Patents
Multi-Hypervisor Networking - Compare and Contrast
Multi-Hypervisor Networking - Compare and Contrast Alejandra Sanchez Garcia Customer Support Engineer, CCIE DC #clmel Agenda Evolution of the Workloads in the Data Centre Achieving Virtualisation in Multiple
VMware vcloud Networking and Security Overview
VMware vcloud Networking and Security Overview Networks and Security for Virtualized Compute Environments WHITE PAPER Overview Organizations worldwide have gained significant efficiency and flexibility
CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE
CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE EXECUTIVE SUMMARY This application note proposes Virtual Extensible LAN (VXLAN) as a solution technology to deliver departmental segmentation, business
Data Center Networking Designing Today s Data Center
Data Center Networking Designing Today s Data Center There is nothing more important than our customers. Data Center Networking Designing Today s Data Center Executive Summary Demand for application availability
VMware NSX Network Virtualization Design Guide. Deploying VMware NSX with Cisco UCS and Nexus 7000
VMware NSX Network Virtualization Design Guide Deploying VMware NSX with Cisco UCS and Nexus 7000 Table of Contents Intended Audience... 3 Executive Summary... 3 Why deploy VMware NSX on Cisco UCS and
Cisco Data Center Network Manager Release 5.1 (LAN)
Cisco Data Center Network Manager Release 5.1 (LAN) Product Overview Modern data centers are becoming increasingly large and complex. New technology architectures such as cloud computing and virtualization
Next-Gen Securitized Network Virtualization
Next-Gen Securitized Network Virtualization Effective DR and Business Continuity Strategies Simplify when the lights go out www.ens-inc.com Your premiere California state government technology provider.
WHITE PAPER. Network Virtualization: A Data Plane Perspective
WHITE PAPER Network Virtualization: A Data Plane Perspective David Melman Uri Safrai Switching Architecture Marvell May 2015 Abstract Virtualization is the leading technology to provide agile and scalable
VMware NSX @SoftLayer!!
A VMware@SoftLayer CookBook v1.1 April 30, 2014 VMware NSX @SoftLayer Author(s) & Contributor(s) (IBM) Shane B. Mcelligott Dani Roisman (VMware) Merlin Glynn, [email protected] Chris Wall Geoff Wing Marcos
Stretched Active- Active Application Centric Infrastructure (ACI) Fabric
Stretched Active- Active Application Centric Infrastructure (ACI) Fabric May 12, 2015 Abstract This white paper illustrates how the Cisco Application Centric Infrastructure (ACI) can be implemented as
Outline VLAN. Inter-VLAN communication. Layer-3 Switches. Spanning Tree Protocol Recap
Outline Network Virtualization and Data Center Networks 263-3825-00 DC Virtualization Basics Part 2 Qin Yin Fall Semester 2013 More words about VLAN Virtual Routing and Forwarding (VRF) The use of load
Cyb T er h Threat D f e ense S l o uti tion Moritz Wenz, Lancope 1
C b Th Cyber Threatt Defense D f S Solution l ti Moritz Wenz, Lancope 1 The Threat Landscape is evolving Enterprise Response Antivirus (Host-Based) IDS/IPS (Network Perimeter) Reputation (Global) and Sandboxing
Evolution of Software Defined Networking within Cisco s VMDC
Evolution of Software Defined Networking within Cisco s VMDC Software-Defined Networking (SDN) has the capability to revolutionize the current data center architecture and its associated networking model.
STATE OF THE ART OF DATA CENTRE NETWORK TECHNOLOGIES CASE: COMPARISON BETWEEN ETHERNET FABRIC SOLUTIONS
STATE OF THE ART OF DATA CENTRE NETWORK TECHNOLOGIES CASE: COMPARISON BETWEEN ETHERNET FABRIC SOLUTIONS Supervisor: Prof. Jukka Manner Instructor: Lic.Sc. (Tech) Markus Peuhkuri Francesco Maestrelli 17
Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance
CHAPTER 4 Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance This chapter describes how to configure the switch ports and VLAN interfaces of the ASA 5505 adaptive
Installing Intercloud Fabric Firewall
This chapter contains the following sections: Information About the Intercloud Fabric Firewall, page 1 Prerequisites, page 1 Guidelines and Limitations, page 2 Basic Topology, page 2 Intercloud Fabric
A Case for Overlays in DCN Virtualization Katherine Barabash, Rami Cohen, David Hadas, Vinit Jain, Renato Recio and Benny Rochwerger IBM
Presenter: Vinit Jain, STSM, System Networking Development, IBM System & Technology Group A Case for Overlays in DCN Virtualization Katherine Barabash, Rami Cohen, David Hadas, Vinit Jain, Renato Recio
Course. Contact us at: Information 1/8. Introducing Cisco Data Center Networking No. Days: 4. Course Code
Information Price Course Code Free Course Introducing Cisco Data Center Networking No. Days: 4 No. Courses: 2 Introducing Cisco Data Center Technologies No. Days: 5 Contact us at: Telephone: 888-305-1251
VMware and Brocade Network Virtualization Reference Whitepaper
VMware and Brocade Network Virtualization Reference Whitepaper Table of Contents EXECUTIVE SUMMARY VMWARE NSX WITH BROCADE VCS: SEAMLESS TRANSITION TO SDDC VMWARE'S NSX NETWORK VIRTUALIZATION PLATFORM
How To Learn Cisco Cisco Ios And Cisco Vlan
Interconnecting Cisco Networking Devices: Accelerated Course CCNAX v2.0; 5 Days, Instructor-led Course Description Interconnecting Cisco Networking Devices: Accelerated (CCNAX) v2.0 is a 60-hour instructor-led
Cloud Network Security End to End Cloud Overview
Cloud Network Security End to End Cloud Overview Session 17007 Thursday, March 5, 2015: 3:15 PM-4:15 PM Issaquah A (Sheraton Seattle) Junnie Sadler [email protected] Kevin Manweiler - [email protected]
Building Scalable Multi-Tenant Cloud Networks with OpenFlow and OpenStack
Building Scalable Multi-Tenant Cloud Networks with OpenFlow and OpenStack Dave Tucker Hewlett-Packard April 2013 1 About Me Dave Tucker WW Technical Marketing HP Networking [email protected] Twitter:
Networking and High Availability
TECHNICAL BRIEF Networking and High Availability Deployment Note Imperva appliances support a broad array of deployment options, enabling seamless integration into any data center environment. can be configured
Enhancing Cisco Networks with Gigamon // White Paper
Across the globe, many companies choose a Cisco switching architecture to service their physical and virtual networks for enterprise and data center operations. When implementing a large-scale Cisco network,
Brocade One Data Center Cloud-Optimized Networks
POSITION PAPER Brocade One Data Center Cloud-Optimized Networks Brocade s vision, captured in the Brocade One strategy, is a smooth transition to a world where information and applications reside anywhere
Lecture 02b Cloud Computing II
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
Software Defined Network (SDN)
Georg Ochs, Smart Cloud Orchestrator ([email protected]) Software Defined Network (SDN) University of Stuttgart Cloud Course Fall 2013 Agenda Introduction SDN Components Openstack and SDN Example Scenario
Network Virtualization and Data Center Networks 263-3825-00 Data Center Virtualization - Basics. Qin Yin Fall Semester 2013
Network Virtualization and Data Center Networks 263-3825-00 Data Center Virtualization - Basics Qin Yin Fall Semester 2013 1 Walmart s Data Center 2 Amadeus Data Center 3 Google s Data Center 4 Data Center
Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)
Cisco Certified Network Associate Exam Exam Number 200-120 CCNA Associated Certifications CCNA Routing and Switching Operation of IP Data Networks Operation of IP Data Networks Recognize the purpose and
Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops
ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Implement Spanning Tree Protocols LAN Switching and Wireless Chapter 5 Explain the role of redundancy in a converged
Simplifying Virtual Infrastructures: Ethernet Fabrics & IP Storage
Simplifying Virtual Infrastructures: Ethernet Fabrics & IP Storage David Schmeichel Global Solutions Architect May 2 nd, 2013 Legal Disclaimer All or some of the products detailed in this presentation
Network Virtualization and Software-defined Networking. Chris Wright and Thomas Graf Red Hat June 14, 2013
Network Virtualization and Software-defined Networking Chris Wright and Thomas Graf Red Hat June 14, 2013 Agenda Problem Statement Definitions Solutions She can't take much more of this, captain! Challenges
Outline. Why Neutron? What is Neutron? API Abstractions Plugin Architecture
OpenStack Neutron Outline Why Neutron? What is Neutron? API Abstractions Plugin Architecture Why Neutron? Networks for Enterprise Applications are Complex. Image from windowssecurity.com Why Neutron? Reason
Network Virtualization Solutions
Network Virtualization Solutions An Analysis of Solutions, Use Cases and Vendor and Product Profiles October 2013 The Independent Community and #1 Resource for SDN and NFV Tables of Contents Introduction
Expert Reference Series of White Papers. VMware vsphere Distributed Switches
Expert Reference Series of White Papers VMware vsphere Distributed Switches [email protected] www.globalknowledge.net VMware vsphere Distributed Switches Rebecca Fitzhugh, VCAP-DCA, VCAP-DCD, VCAP-CIA,
Cisco Virtual Topology System: Data Center Automation for Next-Generation Cloud Architectures
White Paper Cisco Virtual Topology System: Data Center Automation for Next-Generation Cloud Architectures 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Introduction to Network Virtualization in IaaS Cloud. Akane Matsuo, [email protected] Midokura Japan K.K. LinuxCon Japan 2013 May 31 st, 2013
Introduction to Network Virtualization in IaaS Cloud Akane Matsuo, [email protected] Midokura Japan K.K. LinuxCon Japan 2013 May 31 st, 2013 About myself 2001.4 l NTTCommunications: OCN, Verio, Arcstar
Secure Cloud-Ready Data Centers Juniper Networks
Secure Cloud-Ready Data Centers Juniper Networks JUNIPER SECURITY LEADERSHIP A $1B BUSINESS Market Leadership Data Center with High- End Firewall #1 at 42% Secure Mobility with SSL VPN #1 at 25% Security
Data Center Use Cases and Trends
Data Center Use Cases and Trends Amod Dani Managing Director, India Engineering & Operations http://www.arista.com Open 2014 Open Networking Networking Foundation India Symposium, January 31 February 1,
Cross-vCenter NSX Installation Guide
NSX 6.2 for vsphere This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of
Networking and High Availability
yeah SecureSphere Deployment Note Networking and High Availability Imperva SecureSphere appliances support a broad array of deployment options, enabling seamless integration into any data center environment.
Network Technologies for Next-generation Data Centers
Network Technologies for Next-generation Data Centers SDN-VE: Software Defined Networking for Virtual Environment Rami Cohen, IBM Haifa Research Lab September 2013 Data Center Network Defining and deploying
HAWAII TECH TALK SDN. Paul Deakin Field Systems Engineer
HAWAII TECH TALK SDN Paul Deakin Field Systems Engineer SDN What Is It? SDN stand for Software Defined Networking SDN is a fancy term for: Using a controller to tell switches where to send packets SDN
Scalable Approaches for Multitenant Cloud Data Centers
WHITE PAPER www.brocade.com DATA CENTER Scalable Approaches for Multitenant Cloud Data Centers Brocade VCS Fabric technology is the ideal Ethernet infrastructure for cloud computing. It is manageable,
Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family
Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family White Paper June, 2008 Legal INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL
CONNECTING PHYSICAL AND VIRTUAL WORLDS WITH VMWARE NSX AND JUNIPER PLATFORMS
White Paper CONNECTING PHYSICAL AND VIRTUAL WORLDS WITH WARE NSX AND JUNIPER PLATFORMS A Joint Juniper Networks-ware White Paper Copyright 2014, Juniper Networks, Inc. 1 Connecting Physical and Virtual
Chapter 3. Enterprise Campus Network Design
Chapter 3 Enterprise Campus Network Design 1 Overview The network foundation hosting these technologies for an emerging enterprise should be efficient, highly available, scalable, and manageable. This
