Software Defined Networking Hva kan du starte med i dag? Geir Åge Leirvik HP Networking



Similar documents
Sikkerhet Network Protector SDN app Geir Åge Leirvik HP Networking

Embrace SDN the Future of Networking is Here

Virtual Application Networks Innovations Advance Software-defined Network Leadership

The Last Piece of the Puzzle From Legacy to SDN and NFV. Benjamin Then

Simplifying IT with SDN & Virtual Application Networks

Debunking the Myths: An Essential Guide to Software-Defined Networking April 17, 2013

New Virtual Application Networks Innovations Advance Software-defined Network Leadership

The SDN Opportunity. Erik Papir Director, Global Technical Marketing & Competitive Intelligence HP Networking May 2014

Software Defined Networks Virtualized networks & SDN

How To Use Network Software Network (Network) To Improve Your Business

Software Defined Networking (SDN)

Technical white paper. Realizing the power of SDN with HP Virtual Application Networks

Software defined networking. Your path to an agile hybrid cloud network

Welcome to New Style of Networking. Budhaditya Mukherjee Country Product Manager - HP Networking India

Extreme Networks: A SOLUTION WHITE PAPER

Zscaler Internet Security Frequently Asked Questions

The promise of SDN. EU Future Internet Assembly March 18, Yanick Pouffary Chief Technologist HP Network Services

FASTER, SIMPLER AND SMARTER NETWORKS THROUGH SDN INNOVATION

SDN for Wi-Fi OpenFlow-enabling the wireless LAN can bring new levels of agility

Security Solution Architecture for VDI

SOFTWARE DEFINED NETWORKING

Securing the Virtualized Data Center With Next-Generation Firewalls

Orchestrating the next generation data center

Extreme Networks Solutions for Microsoft Skype for Business Deployments SOLUTION BRIEF

RIDE THE SDN AND CLOUD WAVE WITH CONTRAIL

HP Networking Is Poised to Capitalize on the Software-Defined Networking Market Transition

Welcome to New Style of Networking. Budhaditya Mukherjee Product Manager HP Networking India

Software-Defined Networks Powered by VellOS

SDN PARTNER INTEGRATION: SANDVINE

Strategic Direction of Networking IPv6, SDN and NFV Where Do You Start?

How To Manage A Network From A Microsoft Lab

isheriff CLOUD SECURITY

Defend Your Network with DNS Defeat Malware and Botnet Infections with a DNS Firewall

Defend Your Network with DNS Defeat Malware and Botnet Infections with a DNS Firewall

Virtualization, SDN and NFV

HAWAII TECH TALK SDN. Paul Deakin Field Systems Engineer

Simplifying. Single view, single tool virtual machine mobility management in an application fluent data center network

Unified Threat Management, Managed Security, and the Cloud Services Model

When SDN meets Mobility

Simplify IT. With Cisco Application Centric Infrastructure. Roberto Barrera VERSION May, 2015

APPLICATION PROGRAMMING INTERFACE

2013 ONS Tutorial 2: SDN Market Opportunities

vsrx Services Gateway: Protecting the Hybrid Data Center

Introduction to Software Defined Networking (SDN) and how it will change the inside of your DataCentre

How OpenFlow -Based SDN Transforms Private Cloud. ONF Solution Brief November 27, 2012

CUTTING THROUGH THE HYPE: WHAT IS TRUE NEXT GENERATION SECURITY?

Software Defined Network (SDN)

How Attackers are Targeting Your Mobile Devices. Wade Williamson

Palo Alto Networks. Security Models in the Software Defined Data Center

Business Case for Cisco SDN for the WAN

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

The Fortinet Secure Health Architecture

The Value of Open vswitch, Fabric Connect and Fabric Attach in Enterprise Data Centers

SECURING YOUR MODERN DATA CENTER WITH CHECK POINT

Wedge Networks: Transparent Service Insertion in SDNs Using OpenFlow

HP OpenFlow and SDN Technical Overview

Software Defined Networking - a new approach to network design and operation. Paul Horrocks Pre-Sales Strategist 8 th November 2012

What is SDN? And Why Should I Care? Jim Metzler Vice President Ashton Metzler & Associates

White Paper. SDN 101: An Introduction to Software Defined Networking. citrix.com

Vyatta Network OS for Network Virtualization

Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical

Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks

Aligning Applications and Connectivity to Enable Fast And Safe Cloud Computing Derrick Loi, May 2015

How To Make A Vpc More Secure With A Cloud Network Overlay (Network) On A Vlan) On An Openstack Vlan On A Server On A Network On A 2D (Vlan) (Vpn) On Your Vlan

SOFTWARE DEFINED NETWORKING: INDUSTRY INVOLVEMENT

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks

HPN Saga Continues. Ramesh Budharup. Channel Manager HP Networking Africa

Towards Smart and Intelligent SDN Controller

Don't outsource IT! Bring your own Cloud with SDN

Enterprise Buyer Guide

Introduction to Software Defined Networking

The Promise and the Reality of a Software Defined Data Center

SDN and NFV in the WAN

Network Virtualization

Simple, scalable and secure unified wired and wireless networking

The Purview Solution Integration With Splunk

Network Virtualization

Flexible SDN Transport Networks With Optical Circuit Switching

Network Virtualization Solutions

Mock RFI for Enterprise SDN Solutions

WAN & Carrier Networks

Veranderende bedreigingen Security in het virtuele datacenter

Software-Defined Storage Extending the Power of Your Datacenter Eric Tsai Senior Technic Architect Presale Division Enterprise Group Taiwan

Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心

Extreme Networks Software Defined Networking (SDN) Platform: Open, Standards-based and Comprehensive

Horizontal Integration - Unlocking the Cloud Stack. A Technical White Paper by FusionLayer, Inc.

Vladimir Yordanov Director of Technology F5 Networks, Asia Pacific Developments in Web Application and Cloud Security

Internal Network Firewall (INFW) Protecting your network from the inside out

SANS Top 20 Critical Controls for Effective Cyber Defense

Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES

NEC contribution to OpenDaylight: Virtual Tenant Network (VTN)

What is SDN all about?

HP FlexNetwork Architecture

Security Issues in Cloud Computing

Network Virtualization Solutions - A Practical Solution

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

Orchestrating Software Defined Networks (SDN) to Disrupt the APT Kill Chain

VIRTUALIZING THE EDGE

Emerging Approaches in a Cloud-Connected Enterprise: Containers and Microservices

Transcription:

Software Defined Networking Hva kan du starte med i dag? Geir Åge Leirvik HP Networking

Agenda App Store keeping it simple HP apps: Protector Optimizer Lync Partners apps: BlueCat DNS KEMP Community apps: Flow Maker Blacklist

HP SDN App Store http://hp.com/sdn/appstore Accelerated time to ROI with integrated and validated applications Network agility with rapid and seamless deployment Standards-based for open and simplified collaboration and enterprise ready

Current applications highlights Apps Circle 1 HP Apps Circle 2 Partner Apps Circle 3 Community Network Protector Bluecat, DNS Director Central DNS security, globally delivered NorthboundNetworks, Flow Maker Network Optimizer Kemp vloadmaster AT Application Delivery Controller With SDN Adaptive Blackhole Technology Fortinet Fortigate & FortiManager SDN extensions Privatizer TechMahindra Server Load Balancer GuardiCore, Defense Suite Active Honeypot Data center security redefined Ecode, evolve Dynamic design to deployment Saisei Flow Command Real time flow policy control, analysis and security suite Adara Orchestration suite Real Status, Hyperglance Interactive 3D visibility and control Aricent Pure SDN Load Balancer iboss FireSphere Threat Isolator NEC Univerge Network Coordinator

HP Apps Optional subtitle

Network Protector

Modern malware, spyware, botnet businesses Client / server business and architecture Use it - $$$ Sell the capability - $

SDN Application example : BYOD botnet scenario WAN Wireless LAN Core Campus LAN Edge 1 Internet Employee Laptop + Son s USB Stick + Star Buck s WIFI 2 BotNet infected Laptop plugs back into Corp Net and attempts to infect all computers in LAN 3 BotNet attempts to access external server via DNS request and is detected by Gatekeeper and blocked

HP Network Protector SDN application Enabling real time threat detection across enterprise campus networks TippingPoint SDN Architecture Application Control Infrastructure Network Protector App VAN SDN Controller RepDV Database Secure BYOD Unprecedented Visibility 1 million + every 2 hours Malicious-site.com

HP Network Protector SDN Application Bringing security to the edge of the network Reputation DV data base (1M+ bad sites) HP VAN SDN Controller with Network Protector SDN Application Edge Core Distribution

HP Network Protector SDN Application benefits Simple security for BYOD Reduce time IT spends on security from weeks to hours Based on open standards Unprecedented visibility High visibility automation and control Protects the internal network from its host Malware/Botnet /Spyware protection Enables real time threat protection Protects from more than 1M malware/botnet & spyware

HP TippingPoint Reputation DV service Identifying known bad hosts Botnet CnC 5,000 6,000 sites worldwide Spammers Up to 80% of spam generated by top 100 spammers Malware Depots Estimates of 2,500 50,000 new malware depots discovered daily Compromised Hosts Millions worldwide Phishing Sites 50,000+ new phishing sites discovered monthly Reputation DV identifies these as Known Bad devices so you can block traffic to and from these sites

Malicious DNS requests reporting Per VLAN visibility DNS 10.10.120.11 RepD VDB Network Protector App HP SDN controller 10.10.105.25 IRF DC Core Switch (non OF capable) 10.10.150.72

Findings and Outcomes Resulting in a more secure network Proven efficiency Block Botnet propagation. Provide Blacklisting capability. Easiness of deployment OF at access layer or even few aggregation points. Legacy core is kept unchanged. Security reporting Instantaneous reporting of malicious DNS queries showing threat level

Network Optimizer

HP Network Optimizer for Lync Automating policy for campus enterprise business applications SDN Architecture Application Control Infrastructure Network Optimizer VAN SDN Controller Legacy LAN WAN SDN API POC Simplified operation Visibility Enhanced user experience Preserve existing core and WAN

High level overview Active Directory, Exchange & SharePoint Lync SDN API. Lync SDN Manager HP Network Optimizer SDN Application SDN Controller HP Server HP Server HP OpenFlow Switch HP OpenFlow Switch User: James User: Linda

Network Optimizer Demo

HP SDN Lync Demo

Network Optimizer Configuration DSCP setting

Network Optimizer Dashboard

Network Optimizer Lync/Sessions

Network Optimizer QoE metrics

Findings and Outcomes Lync just works better Proven QoS marking for Lync dynamic flows Lync flows are configured based on Lync FE servers DB. Easiness of deployment OF at access layer or even only on very few aggregation points. Legacy core QoS is kept almost unchanged. Lync application performance metrics Instantaneous reporting of Lync application quality in a networking operational dashboard.

PARTNER APPLICATIONS Optional subtitle

BlueCat DNS Director

DNS Director Secures the open enterprise with global visibility and centralized control over all DNS traffic across all connected devices. Central DNS security, globally delivered across all devices regardless of ownership & configuration Features Prevents devices from bypassing DNS driven security policies & accessing untrusted DNS servers Detects, intercepts and transparently redirects DNS queries at the edge of the network to secure DNS servers Enables elastic DNS service delivery for Enterprise & Carriers (NFV) Benefits Complete network visibility and control of all DNS traffic Prevent data exfiltration through DNS tunneling Ensure DNS driven security policies are applied to all connected devices, regardless of ownership and configuration Central DNS security, globally delivered across all devices regardless of ownership & configuration

BlueCat DNS Director Central DNS Security, Globally Delivered Application BlueCat DNS Director B Complete network visibility and control over all DNS traffic Prevent data exfiltration through DNS tunneling Ensure DNS driven security policies are applied to all connected devices SDN Architecture Control Infrastructure VM Connected Things VAN SDN Controller A C A B C DNS queries intercepted at edge through SDN rules when not targeted at corporate DNS Intercepted queries redirected to BlueCat s DNS/DHCP server where policies are applied BlueCat s DNS response structured to appear as if it came from originally targeted server so interception is undetected VM VM VM Hypervisor Customer DC VM Hybrid Cloud BlueCat DNS Server with Threat Protection Non Corporate DNS Servers Compromised DNS Servers https://www.youtube.com/watch?v=vzqg9vyiaji

KEMP LoadMaster

LoadMaster Application Delivery Controller With SDN Adaptive Technology Central DNS security, globally delivered across all devices regardless of ownership & configuration Features Dynamically adapt flow distribution based on network switch statistics Redirecting flows to optimize the overall QoE for the client Benefits Increased Application Delivery Performance Eliminates session outages and slow application response due to network congestion conditions Better overall quality of experience for end users of application services Application Delivery Controller With SDN Adaptive Technology

SDN Adaptive Load Balancing Enriching Load Balancing Policies Application Application flow 1 Virtual Load Master Application flow REST API 3 SDN Architecture Control Infrastructure Inbound traffic VAN SDN Controller 1 4 2 Server Cluster1 Server Cluster2 1 2 3 4 Typical flow path to the server access layer switch Controller detects the congestion on the Openflow switch port connecting to server 3 LoadMaster is pulling that layer 2 congestion information from the controller Kemp Loadmaster makes automated adjustment to sending traffic to server 3, instead distributing the load across servers 1 and 2 until the congestion condition clears

COMMUNITY APPLICATIONS FLOW MAKER Blacklist Optional subtitle Privatizer

Quiz