Automating Network Security



Similar documents
Virtual Firewalls. Ivan Pepelnjak NIL Data Communications

Palo Alto Networks. Security Models in the Software Defined Data Center

SOFTWARE DEFINED NETWORKING

Cloud Networking From Theory to Practice" Ivan Pepelnjak NIL Data Communications"

Software Defined Networks Four Years Later. Quo Vadis, SDN? Ivan Pepelnjak Network Architect. ipspace.net AG

Introduction to Software Defined Networking (SDN) and how it will change the inside of your DataCentre

Data Center Fabrics What Really Matters. Ivan Pepelnjak NIL Data Communications

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

RIDE THE SDN AND CLOUD WAVE WITH CONTRAIL

VMware vcloud Networking and Security

Designing Virtual Network Security Architectures Dave Shackleford

Skip the Transitions, Jump Straight into IPv6

Virtualization, SDN and NFV

VMware NSX Network Virtualization Design Guide. Deploying VMware NSX with Cisco UCS and Nexus 7000

VMware Software Defined Network. Dejan Grubić VMware Systems Engineer for Adriatic

SDN PARTNER INTEGRATION: SANDVINE

HAWAII TECH TALK SDN. Paul Deakin Field Systems Engineer

BRINGING NETWORKS TO THE CLOUD ERA

How To Make A Vpc More Secure With A Cloud Network Overlay (Network) On A Vlan) On An Openstack Vlan On A Server On A Network On A 2D (Vlan) (Vpn) On Your Vlan

Unlock the full potential of data centre virtualisation with micro-segmentation. Making software-defined security (SDS) work for your data centre

VMware vcloud Networking and Security Overview

IPOP-TinCan: User-defined IP-over-P2P Virtual Private Networks

BUILDING A NEXT-GENERATION DATA CENTER

How Network Virtualization can improve your Data Center Security

Cisco Prime Network Services Controller. Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems

VM-Series for VMware. PALO ALTO NETWORKS: VM-Series for VMware

Software Defined Network (SDN)

How To Orchestrate The Clouddusing Network With Andn

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

VXLAN: Scaling Data Center Capacity. White Paper

VIRTUALIZED SERVICES PLATFORM Software Defined Networking for enterprises and service providers

Core and Pod Data Center Design

The Road to SDN: Software-Based Networking and Security from Brocade

Business Values of Network and Security Virtualization

SOFTWARE-DEFINED NETWORKING AND OPENFLOW

Simplify IT. With Cisco Application Centric Infrastructure. Barry Huang Nov 13, 2014

White Paper. Juniper Networks. Enabling Businesses to Deploy Virtualized Data Center Environments. Copyright 2013, Juniper Networks, Inc.

SDN Architecture and Service Trend

Group-Based Policy for OpenStack

Use Case Brief CLOUD MANAGEMENT SOFTWARE AUTOMATION

CERN Cloud Infrastructure. Cloud Networking

Analysis of Network Segmentation Techniques in Cloud Data Centers

JUNIPER. One network for all demands MICHAEL FRITZ CEE PARTNER MANAGER. 1 Copyright 2010 Juniper Networks, Inc.

Using SouthBound APIs to build an SDN Solution. Dan Mihai Dumitriu Midokura Feb 5 th, 2014

OpenFlow and Software Defined Networking presented by Greg Ferro. Software Defined Networking (SDN)

Overlay networking with OpenStack Neutron in Public Cloud environment. Trex Workshop 2015

VMware NSX A Perspective for Service Providers part 2

Building Scalable Multi-Tenant Cloud Networks with OpenFlow and OpenStack

Network Virtualization for the Enterprise Data Center. Guido Appenzeller Open Networking Summit October 2011

Outline. Why Neutron? What is Neutron? API Abstractions Plugin Architecture

Software Defined Networks Virtualized networks & SDN

Programmable Networking with Open vswitch

Software-Defined Networking Architecture Framework for Multi-Tenant Enterprise Cloud Environments

Software Defined Environments

Brocade SDN 2015 NFV

SINGLE-TOUCH ORCHESTRATION FOR PROVISIONING, END-TO-END VISIBILITY AND MORE CONTROL IN THE DATA CENTER

7 Ways OpenStack Enables Automation & Agility for KVM Environments

SDN CONTROLLER. Emil Gągała. PLNOG, , Kraków

VMware

SOFTWARE DEFINED NETWORKING: INDUSTRY INVOLVEMENT

Cisco Nexus 1000V Switch for Microsoft Hyper-V

CloudStack Networking. Paul Angus Cloud

VMware. NSX Network Virtualization Design Guide

Installing Intercloud Fabric Firewall

Use Case Brief BUILDING A PRIVATE CLOUD PROVIDING PUBLIC CLOUD FUNCTIONALITY WITHIN THE SAFETY OF YOUR ORGANIZATION

Simplify IT. With Cisco Application Centric Infrastructure. Roberto Barrera VERSION May, 2015

BROCADE NETWORKING: EXPLORING SOFTWARE-DEFINED NETWORK. Gustavo Barros Systems Engineer Brocade Brasil

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

Network Virtualization and Software-defined Networking. Chris Wright and Thomas Graf Red Hat June 14, 2013

Stanford SDN-Based Private Cloud. Johan van Reijendam Stanford University

Orchestrating the next generation data center

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud

OpenFlow and Software Defined Networking presented by Greg Ferro. OpenFlow Functions and Flow Tables

Securing the Virtualized Data Center With Next-Generation Firewalls

Multitenancy Options in Brocade VCS Fabrics

Network Services Orchestration Software Defined Networks, Network Function Virtualization - TODAY

2013 ONS Tutorial 2: SDN Market Opportunities

Nuage Networks Virtualised Services Platform. Packet Pushers White Paper

Software defined networking. Your path to an agile hybrid cloud network

VMware vcloud Air Networking Guide

NETWORK FUNCTIONS VIRTUALIZATION. Segmenting Virtual Network with Virtual Routers

Bring your virtualized networking stack to the next level

Lecture 02b Cloud Computing II

Software Defined Networking and Security

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch

Proactively Secure Your Cloud Computing Platform

NSX TM for vsphere with Arista CloudVision

Hardening and Hacking vsphere and Private Cloud Everything you need to know about vsphere Security

CoIP (Cloud over IP): The Future of Hybrid Networking

Software Defined Data Centers Network Virtualization & Security. Jeremy van Doorn Director of Systems Engineering EMEA, Network & Security

SOFTWARE-DEFINED NETWORKING AND OPENFLOW

Open Fabric SDN The Comprehensive SDN approach. Jake Howering, Director SDN Product Line Management Bithika Khargharia, PhD, Senior Engineer

The Role of Virtual Routers In Carrier Networks

Netzwerkvirtualisierung? Aber mit Sicherheit!

Cloud Networking Disruption with Software Defined Network Virtualization. Ali Khayam

How To Build A Software Defined Data Center

Transcription:

Automating Network Security Ivan Pepelnjak (ip@ipspace.net) Network Architect ipspace.net AG

Who is Ivan Pepelnjak (@ioshints) Past Kernel programmer, network OS and web developer Sysadmin, database admin, network engineer, CCIE Trainer, course developer, curriculum architect Team lead, CTO, business owner Present Network architect, consultant, blogger, webinar and book author Teaching the art of Scalable Web Application Design Focus Large-scale data centers, clouds and network virtualization Scalable application design Core IP routing/mpls, IPv6, VPN More @ ipspace.net/about 2 ipspace.net 2015 Automating Network Security (Troopers 2015)

Sounds Familiar? Increase flexibility while reducing costs Faster application deployments Compete with public cloud offerings 3 ipspace.net 2015 Automating Network Security (Troopers 2015)

Does Your Data Center Look Like This? Outside Web servers App servers DB servers Single pair of central firewalls and load balancers Large VLANs spanning the whole data center All inter-subnet traffic goes through an appliance è chokepoint 4 ipspace.net 2015 Automating Network Security (Troopers 2015)

How Long Does It Take To Create a New Firewall Rule?

Think Again From Initial Request to Production

It Works for Other People Why does it work? Simple rules, no ALG Configured by tenants (application owners) Deployed in real time Source: Amazon VPC documentation 7 ipspace.net 2015 Automating Network Security (Troopers 2015)

Automating Network Security

We Want to Be Here Application requirements Security policies Security Orchestration System Web servers Outside App servers DB servers 9 ipspace.net 2015 Automating Network Security (Troopers 2015)

How Do We Get There?

Simplify Standardize Automate Abstract

Before We Start: Reduce the Blast Radius

Virtualize Everything

NFV Performance Is Acceptable Some performance maximums 50+ Gbps through a Xeon-based server (Multipath TCP) 50 Mpps on Open vswitch with DPDK (~ 130 Gbps with IMIX traffic load) 200 Gbps on a Xeon server (Snabb switch) Commercial products performance A10 load balancer VM on a single core: up to 4 to 8 Gbps F5 load balancer VM: 3 Gbps @ 2 vcpu Vmware NSX Edge Services Router: 10 Gbps firewall, 4 10 Gbps load balancer Juniper Firefly Perimeter: 1,1 4,1 Gbps (IMIX/UDP) Palo Alto firewall: 1 Gbps @ 4 vcpu Vyatta 5600 series routers: 10 Gbps @ 1 core Potential showstopper: SSL tps (key generation) 14 ipspace.net 2015 Automating Network Security (Troopers 2015)

Minimize Complexity & Standardize

Minimize Complexity & Standardize Per-application firewall ruleset Easier to manage, understand and audit Ruleset lives and dies with the application Stale rules in central firewall are gone Standardize rulesets Applications are not as special as their owners think Create a standard ruleset for each application class Changes to ruleset void warranty Rethink the security policy Packet filters are often good enough Stateful inspection is required only on links to external networks or for outgoing sessions 16 ipspace.net 2015 Automating Network Security (Troopers 2015)

VM NIC Firewalls: Changing the Security Paradigm Old world security Security zones = IP subnets = VLANs Add VXLAN/NVGRE for scalability Subnets segregated with firewalls or virtual appliance firewalls Traffic trombones Firewalls are choke points Brave new world Firewall rules attached to virtual NICs Everything else is outside Optimal any-to-any traffic flow Infinitely scalable Outside Outside 17 ipspace.net 2015 Automating Network Security (Troopers 2015)

Decouple Virtual and Physical Worlds

Decouple Virtual and Physical Worlds Outside Web servers App servers DB servers Physical Virtual Simplified workload migration Automated deployment No interaction with the physical gear è no maintenance windows 19 ipspace.net 2015 Automating Network Security (Troopers 2015)

Network Appliance Implementation: Decision Points Per-application appliances è use virtual appliances, not contexts Firewall & load balancer self-service è use virtual appliances Rigid security rules è use physical devices (but you ll get the cloud you deserve) Compromise: Combine the virtual and the physical appliances Shared physical firewall Outside Scrubbed segment Shared caches and proxy servers Per-tenant virtual appliance Application stack 20 ipspace.net 2015 Automating Network Security (Troopers 2015)

What Others Are Doing

Multi-Tenant Isolation With Firewalls Typical IaaS cloud provider approach Customer VMs attached to random L3 subnets (or per-customer subnets) VM IP addresses allocated by the IaaS provider (example: DHCP) Predefined configurations or user-controlled firewalls Implementations OpenStack (iptables or vendor plugin) CloudStack (iptables) VMware NSX Juniper Contrail Hyper-V? Hypervisor Most implementations use functionality equivalent to reflexive ACLs 22 ipspace.net 2015 Automating Network Security (Troopers 2015)

Integration with Orchestration Systems Fact: Most traffic filtering products include L3/L4 information in filter rules Challenge: Integrating filter rules in dynamic VM environment Traditional solutions: use subnets to indicate security group membership Tighter integration with orchestration systems Defined security group membership based on port groups, VM names or other VM attributes Collect VM information from the orchestration system (example: vcenter) Automatically build L3-7 filter rules from orchestration system information Sample products: Security groups in OpenStack and CloudStack VMware vshield Edge and NSX Distributed Firewall Palo Alto Panorama Cisco Prime Network Services Controller? Hypervisor 23 ipspace.net 2015 Automating Network Security (Troopers 2015)

Tap Aggregation on Arista 7150 Internet Regular, tap and tool ports Tap tools are input-only ports, tool ports are output-only ports MAC learning and STP is disabled on tap and tool ports Switch operates in normal or tap aggregation mode Tap and tool ports disabled in normal mode, regular ports in aggregation mode Programmed through XMPP, REST API, Puppet, Chef 24 ipspace.net 2015 Automating Network Security (Troopers 2015)

Traffic Tapping with OpenFlow-Enabled Switches A B Span port Hardware tap Use OpenFlow flows to mirror traffic to SPAN ports Higher traffic redirection granularity è lower number of SPAN ports required Any OpenFlow controller capable of inserting individual flows could be used Solution from Cisco (on Nexus 3000 switches) and Arista (monitor bind mode) 25 ipspace.net 2015 Automating Network Security (Troopers 2015)

Firewall Cluster with Deterministic ECMP Switches have synchronized ECMP behavior Same hashing mechanism Coarse-grained ECMP based on source or destination IP addresses Caveats Number of active links must match on both ends (need central control) Addition / removal of devices should cause minimal disruption Demonstrated: Arista + Palo Alto 26 ipspace.net 2015 Automating Network Security (Troopers 2015)

Remote-Triggered Black Hole: a Decade of SDN ISP Backbone Data Center RTBH 101 Install a host route to a bogus IP address (RTBH address) pointing to null interface on all routers Use BGP to advertise host routes of attacked hosts with next-hop = RTBH address (alternative: use BGP communities, set next-hop locally) è drops DoS traffic at backbone ingress point Use urpf to drop traffic from DoS sources Widely used in ISP environments 27 ipspace.net 2015 Automating Network Security (Troopers 2015)

Scale-Out IPS with OpenFlow Controller Internet Data Center OpenFlow used to distribute the load to multiple IDS appliances Coarse-grained flows deployed on the OpenFlow switch Flow granularity adjusted in real time to respond to changes in traffic Each appliance receives all traffic from a set of endpoints (complete session and endpoint behavior visibility) Pretty easy to implement, used by (at least) Indiana University 28 ipspace.net 2015 Automating Network Security (Troopers 2015)

Scale-Out IDS Using OpenFlow to Block Traffic Internet Data Center DoS detection system reports offending X-tuples Source IP addresses Targeted servers Applications (port numbers) OpenFlow controller installs drop flows 29 ipspace.net 2015 Automating Network Security (Troopers 2015)

The Roadblocks

The Roadblocks Internal Mindset Processes and procedures Rigid security policies External Licensing Management tools Auditing tools 31 ipspace.net 2015 Automating Network Security (Troopers 2015)

Does It Work Today? Virtual appliance vendors: Palo Alto, Checkpoint, Fortinet, Cisco, VMware Distributed virtual firewalls: VMware NSX, Palo Alto, Orchestration tools: VMware vcloud, CloudStack, OpenStack Automation tools: Ansible, Chef, Puppet 32 ipspace.net 2015 Automating Network Security (Troopers 2015)

Start NOW

Gartner on Shiny New Object Syndrome [ ] address the following questions before introducing any new technology: Can the root issue be addressed via a policy or process change? If we wait a year, will this become a commoditized capability from established providers (or my existing providers)? Do we have existing network, security, or management capabilities that can address the bulk (i.e., 85%) of the technological requirements? Do we have the right process and staff expertise to properly leverage the new technology? Source: http://blogs.gartner.com/andrew-lerner/2015/01/15/netsecdirtydozen/ 34 ipspace.net 2015 Automating Network Security (Troopers 2015)

Advanced SDN and Network Automation Track SDN Use Cases Monitoring Software Defined Networks Mid-2015 February 2015 SDN and NFV Tools Network Function Virtualization Late 2015 BGP SDN OpenFlow Deep Dive Using Schprokits Jinja2, YAML and Ansible NETCONF Deep Dive Network Automation Tools SDN Architectures and Deployment Considerations What is SDN? Network Programmability 101 Inter-DC More information FCoE has @ very http://www.ipspace.net/sdn limited use and requires no bridging 35 ipspace.net 2015 Automating Network Security (Troopers 2015)

Stay in Touch Web: ipspace.net Blog: blog.ipspace.net Email: ip@ipspace.net Twitter: @ioshints SDN: ipspace.net/sdn Webinars: ipspace.net/webinars Consulting: ipspace.net/consulting 36 ipspace.net 2015 Automating Network Security (Troopers 2015)