Intro to NSX. Network Virtualization. 2014 VMware Inc. All rights reserved.



Similar documents
VMware Software Defined Network. Dejan Grubić VMware Systems Engineer for Adriatic

Advancing Security with Software Defined Datacenter. Karen Law Senior Systems Consultant VMware Hong Kong Ltd

Limiting the Spread of Threats: A Data Center for Every User

How To Build A Software Defined Data Center

How Network Virtualization can improve your Data Center Security

Netzwerkvirtualisierung? Aber mit Sicherheit!

Itex VMware NSX Network Virtualization Presentation

Business Values of Network and Security Virtualization

How To Protect A Data Center From A Hacker Attack

Software Defined Data Centers Network Virtualization & Security. Jeremy van Doorn Director of Systems Engineering EMEA, Network & Security

SDDC: A New Architecture for a New Era of Ed IT

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

Softverski definirani data centri - 2. dio

Orchestrating Software Defined Networks (SDN) to Disrupt the APT Kill Chain

Data Center Micro-Segmentation

Secure Cloud-Ready Data Centers Juniper Networks

VMware NSX A Perspective for Service Providers part 2

1518 Best Practices in Virtualization & Cloud Security with Symantec

Advanced Security Services with Trend Micro Deep Security and VMware NSX Platforms

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

HAWAII TECH TALK SDN. Paul Deakin Field Systems Engineer

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud

Security in the Software Defined Data Center

Palo Alto Networks. Security Models in the Software Defined Data Center

Devising a Server Protection Strategy with Trend Micro

Unlock the full potential of data centre virtualisation with micro-segmentation. Making software-defined security (SDS) work for your data centre

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Virtualization, SDN and NFV

Securing Virtual Applications and Servers

IT Security at the Speed of Business: Security Provisioning with Symantec Data Center Security

Securing the Virtualized Data Center With Next-Generation Firewalls

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat

(R)Evolution im Software Defined Datacenter Hyper-Converged Infrastructure

The first agentless Security, Virtual Firewall, Anti- Malware and Compliance Solution built for Windows Server 2012 Hyper-V

How the Software-Defined Data Center Is Transforming End User Computing

VMware vcloud Networking and Security Overview

Devising a Server Protection Strategy with Trend Micro

About the VM-Series Firewall

Cloud and Data Center Security

Mitigating Information Security Risks of Virtualization Technologies

PCI DSS 3.0 Compliance

Shifting Roles for Security in the Virtualized Data Center: Who Owns What?

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

PICO Compliance Audit - A Quick Guide to Virtualization

VM-Series for VMware. PALO ALTO NETWORKS: VM-Series for VMware

Cisco Unified Network Services: Overcome Obstacles to Cloud-Ready Deployments

SDN Security for VMware Data Center Environments

The Hillstone and Trend Micro Joint Solution

SYMANTEC DATA CENTER SECURITY: MONITORING EDITION 6.5

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch

Palo Alto Networks Cyber Security Platform for the Software Defined Data center. Zekeriya Eskiocak Security Consultant Palo Alto Networks

How To Protect Your Cloud From Attack

A Case for Overlays in DCN Virtualization Katherine Barabash, Rami Cohen, David Hadas, Vinit Jain, Renato Recio and Benny Rochwerger IBM

SOFTWARE DEFINED NETWORKING

Protect Root Abuse privilege on Hypervisor (Cloud Security)

Unified Threat Management, Managed Security, and the Cloud Services Model

#ITtrends #ITTRENDS SYMANTEC VISION

VMware vcloud Networking and Security

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Software Defined Environments

Forward-Looking Statements

Meeting the Challenges of Virtualization Security

SourceFireNext-Generation IPS

FROM PRODUCT TO PLATFORM

The Virtualization Practice

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide. Revised February 28, :32 pm Pacific

Software Defined Network (SDN)

VMware Integrated Partner Solutions for Networking and Security

VXLAN: Scaling Data Center Capacity. White Paper

RIDE THE SDN AND CLOUD WAVE WITH CONTRAIL

The Challenges of Securing Hosting Hyper-V Multi-Tenant Environments

Protecting the un-protectable Addressing Virtualisation Security Challenges

SANS Top 20 Critical Controls for Effective Cyber Defense

ILLUMIO ADAPTIVE SECURITY PLATFORM TM

Microsegmentation Using NSX Distributed Firewall: Getting Started

Securing Virtualization with Check Point and Consolidation with Virtualized Security

Active Visibility for Multi-Tiered Security. Juergen Kirchmann Director Enterprise Sales EMEA

Cisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.]

JUNIPER. One network for all demands MICHAEL FRITZ CEE PARTNER MANAGER. 1 Copyright 2010 Juniper Networks, Inc.

Automating Network Security

Security. Environments. Dave Shackleford. John Wiley &. Sons, Inc. s j}! '**»* t i j. l:i. in: i««;

Expert Reference Series of White Papers. VMware vsphere Distributed Switches

Next Generation Security with VMware NSX and Palo Alto Networks VM-Series TECHNICAL WHITE PAPER

Next Generation Security with VMware NSX and Palo Alto Networks VM-Series TECHNICAL WHITE PAPER

5 Best Practices to Protect Your Virtual Environment

NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015

VMware NSX Network Virtualization Design Guide. Deploying VMware NSX with Cisco UCS and Nexus 7000

Bitdefender GravityZone Sales Presentation

Cisco Prime Network Services Controller. Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems

McAfee Next Generation Firewall Optimize your defense, resilience, and efficiency.

Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop

Hillstone Intelligent Next Generation Firewall

SECURING YOUR MODERN DATA CENTER WITH CHECK POINT

White Paper. SDN 101: An Introduction to Software Defined Networking. citrix.com

Tufin Orchestration Suite

HP Virtual Controller and Virtual Firewall for VMware vsphere 1-proc SW LTU

Transcription:

Intro to NSX Network Virtualization 2014 VMware Inc. All rights reserved.

Agenda Introduction NSX Overview Details: Microsegmentation NSX Operations More Information SDDC/Network Virtualization Security and Micro-segmentation Micro-segmentation on NSX SDDC and Micro-segmentation Isolation Segmentation Advanced Services Operations and Logging Audit and Compliance More information and next steps NSX and the Goldilocks Zone Use Case 1: Segmentation Distributed Firewall Performance Distributed Switching, Routing, Firewall Use Case 2: Multi-tenancy Use Case 3: VDI Security Partner Integrations CONFIDENTIAL 2

Business leaders want their IT to be like Amazon CONFIDENTIAL 3

New IT Internal/Hybrid Software Defined Data Center (SDDC) or or Hardware Defined Data Center (HDDC) No IT Outsourced Taking what we have learned CONFIDENTIAL 4

Automated Operational Model Programmatically Create, Snapshot, Store, Applications Intelligence in the virtualization layer Vendor independent x86 capacity Move, Virtual Transformative operational model Restore Delete, Machines Automated configuration & management Software Hardware Server Virtualization Compute Capacity Manual Op er ational Model Network Storage Intelligence in hardware Dedicated, vendor specific infrastructure Manual configuration & management CONFIDENTIAL 5

To deliver a Software Defined Data Center approach Automation and orchestration with Snapshot, Store, Move, Delete, Virtual Machines Virtual Networks Virtual Storage Automated Operational Model RESTful APIs Programmatically Create, Restore Applications CONFIDENTIAL 6

Software Hardware Data Center Virtualization Compute Capacity Network Capacity Storage Capacity Location Independence Pooled compute, network and storage capacity Vendor independent, best price/performance Simplified configuration & management CONFIDENTIAL 7

Network virtualization overview CONFIDENTIAL 8

Breaches still 2 3 1 Targeted system perimeter But threats and exploits still infect servers. Low-priority systems are often the target, and SSL is no guarantee of protection. Threats can lie dormant, waiting for the right moment to strike. occur in data centers with a secure Today s data centers are protected by strong perimeter defense CONFIDENTIAL 9

4 5 6 Critical system Attacks spread inside the data center, Server-server traffic growth has Possibly after months of where internal controls are often weak. outpaced client-server traffic. The reconnaissance, the infiltration Critical systems are targeted. attack spreads and goes unnoticed. relays secret data to the attacker. The Problem: Data Center Network Security Perimeter-centric network security has proven insufficient CONFIDENTIAL 10

Internet IT Spend Security Spend Security Breaches Today s security model focuses on perimeter defense But continued security breaches show this model is not enough CONFIDENTIAL 11

The Solution: Micro-segmentation CONFIDENTIAL 12

But micro-segmentation has been operationally infeasible Directing all traffic (virtual + physical) And a physical firewall per workload through chokepoint firewalls is inefficient is cost prohibitive CONFIDENTIAL 13

Until now: Micro-segmentation with NSX vcenter Physical workloads and VLANS CONFIDENTIAL 14

Until now: Micro-segmentation with NSX vcenter Physical workloads and VLANS CONFIDENTIAL 15

Until now: Micro-segmentation with NSX vcenter Physical workloads and VLANS CONFIDENTIAL 16

Until now: Micro-segmentation with NSX vcenter Physical workloads and VLANS CONFIDENTIAL 17

SDDC is the foundation for Microsegmentation CONFIDENTIAL 18

NSX: at the Goldilocks Zone of security Snapshot, Store, Move, Delete, Virtual Machines Virtual Networks Virtual Storage Automated Operational Model Programmatically Create, Software Hardware Restore Compute Capacity Applications Data Center Virtualization Network Capacity Storage Capacity CONFIDENTIAL 19

Location Independence Pooled compute, network and storage capacity Vendor independent, best price/performance Simplified configuration & management CONFIDENTIAL 20

NSX: at the Goldilocks Zone of security Switching Routing Firewalling Core Services Built Into Hypervisor Kernel Isolation fine-grained containment Ubiquity Context better security through insight Ecosystem of Distributed Services CONFIDENTIAL 21

A complete virtual network in software: Logical switching CONFIDENTIAL 22

Logical switching achieved through overlays L2 Frame Outer MAC HDR Outer IP HDR UDP HDR Overlay HDR L2 Frame L2 Frame 1 3 5 2 4 Overlay Encapsulated Frame VM Sends a Source Hypervisor Physical Network Destination Hypervisor Original L2 Frame standard L2 Frame adds overlay/ forwards frame as de-encapsulates delivered to VM encapsulation standard IP frame headers CONFIDENTIAL 23

A complete virtual network in software: Overlay technologies encapsulate L2 packets to isolate traffic flows. Use network isolation for: Multi-tenancy Separating highly secure Fault containment application infrastructures CONFIDENTIAL 24

Distributed routing CONFIDENTIAL 25

A complete virtual network in software: Distributed routing OSPF BGP ISIS A Logical Router Control VM is deployed and exchanges routing updates with peers. The NSX admin creates a The logical router VM sends route which distributes the routes to new logical router. updates to the NSX controller each hypervisor data plane. NSX routing: Highly available routing with CONFIDENTIAL 26

fully distributed data plane Distributed in each hypervisor Controllers are clustered can Central configuration scale-out based as needed CONFIDENTIAL 27

A complete virtual network in software: Distributed firewalling CONFIDENTIAL 28

Distributed firewalling is made up of distributed network elements embedded in each hypervisor, own firewall. NSX firewalling: fully distributed, embedded in every hypervisor in the data center Firewalls/policies provisioned Retiring a VM deprovisions its simultaneously with VMs firewall no possibility of stale CONFIDENTIAL 29

A complete virtual network in software: Policies move with their VMs rules CONFIDENTIAL 30

Achieving Isolation with NSX CONFIDENTIAL 31

Achieving segmentation with NSX CONFIDENTIAL 32

Configure policy with Security Groups 1 2 3 Select elements to uniquely Use attributes to create Apply policies to security identify application workloads Security Groups groups ABC DEF Policy 1 IPS for Desktops FW for Desktops Group XYZ Group XYZ Static Data center Virtual net Virtual machine vnic Dynamic VM name OS type User ID Security tag App 1 OS: Windows 8 TAG: Production Policy 2 AV for Production FW for Production Use security groups to abstract policy from application workloads. Enforce policy based on logical constructs Reduce configuration errors Policy follows VM, not IP Reduce rule sprawl and complexity CONFIDENTIAL 33

Element type CONFIDENTIAL 34

Automate security operations ATTRIBUTE (if) ACTION (then) 35

Quarantine VM with Firewall Virus found Monitor VM IIS.EXE Vulnerability found ( old software version) with IPS PCI Sensitive Data Found OR Allow & Encrypt* Restrict access while investigating Security operations are automated and adapt to dynamic conditions Automated detection of security conditions ( virus, vulnerability, etc.) Security policies define automated actions 36

Advanced services insertion Traditional Data Center NSX Data Center 1 2 3 Static service chain Dynamic service chain NSX enables dynamic actions to respond to changing security conditions Flexible service chain that adapts to changing conditions more efficient use of services Platform for integrating the leading security products: better security by sharing tags 37

Use case 1: Network segmentation Controlling traffic within a network Control traffic between groups within a network Secure traffic based on logical grouping rather than physical topology Create network segments flexibly even between systems on the same VLAN CONFIDENTIAL 38

Use case 2: Multi-tenancy with segmentation and advanced services 39

40

41 E

xternal Contractor 2 42

Security Operations Centralized operations and workflow plugs into existing infrastructure vcenter NSX Manager Distributed Services Syslog NetFlow collectors Audit/ compliance Centralized configuration and policy System events, audit logging, firewall messages Centralized monitoring and reporting CONFIDENTIAL 43

Distributed firewall performance 140 120 100 80 60 40 20 0 1 2 3 4 VMs (per host) 100 Rules 250 Rules 500 Rules CONFIDENTIAL 44

Partner integrations Partner Ecosystem NSX is the platform for integrating advanced security services. Next-generation IPS Granular protection of individual VM workloads with customizable policy definitions Automation of advanced malware interception Unified management for physical and virtual sensors Vulnerability Management Automatic vulnerability risk assessment Data Center wide real- time risk visibility Auto segmentation of risky assets Vulnerability prioritization for effective remediation Next-Generation Firewall Multiple threat prevention disciplines including firewall, IPS, and antimalware Safe application enablement with continuous content inspection for all threats Granular user-based controls for apps, content, users, Malware Protection Data Center security with agentless anti-malware and guest network threat protection Real-time, dynamic threat protection and response for workloads moving between hosts and virtual data centers CONFIDENTIAL 45

Malware Protection Single virtual appliance provides agentless: Anti-malware with URL filtering Vulnerability and software scanning Detection of file changes Intrusion Detection & Prevention CONFIDENTIAL 46

VMware NSX Ecosystem Technology Partners

VMware Named a Visionary in Gartner s Magic Quadrant for Data Center Networking Positioned the furthest for completeness of vision Gartner Magic Quadrant for Data Center Networking by Mark Fabbi, Tim Zimmerman, Andrew Lerner, April 24, 2014. This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from VMware, Inc.

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. More information Certification and Training www.vmware.com/products/nsx/ #virtualizeyournetwork Learn how WestJet secured their network with NSX NSX www.vmware.com/go/nvtraining CONFIDENTIAL 37

It s our Cisco upgrade plan Or, we could virtualize it.