Visibility into the Cloud and Virtualized Data Center // White Paper



Similar documents
Visibility into the Cloud and Virtualized Data Center // White Paper

Enhancing Cisco Networks with Gigamon // White Paper

Visibility in the Modern Data Center // Solution Overview

Whitepaper Unified Visibility Fabric A New Approach to Visibility

End-to-End Visibility

Enhancing Cisco Networks with Gigamon // White Paper

Intelligent Data Access Networking TM

In-Band Security Solution // Solutions Overview

Virtualization, SDN and NFV

VMware vcloud Networking and Security

Out-of-Band Security Solution // Solutions Overview

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS

Traffic Visibility Fabric for Revenue and Differentiation in the Cloud Provider Market // White Paper

Solutions Guide End-to-End Visibility for Your Cisco Infrastructure

How To Make A Vpc More Secure With A Cloud Network Overlay (Network) On A Vlan) On An Openstack Vlan On A Server On A Network On A 2D (Vlan) (Vpn) On Your Vlan

Monitoring, Managing, and Securing SDN Deployments // White Paper

Analysis of Network Segmentation Techniques in Cloud Data Centers

Network Access Control in Virtual Environments. Technical Note

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch

Expert Reference Series of White Papers. vcloud Director 5.1 Networking Concepts

VXLAN: Scaling Data Center Capacity. White Paper

5 Best Practices to Protect Your Virtual Environment

ConnectX -3 Pro: Solving the NVGRE Performance Challenge

CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE

Enabling Visibility for Wireshark across Physical, Virtual and SDN. Patrick Leong, CTO Gigamon

Expert Reference Series of White Papers. VMware vsphere Distributed Switches

Network Virtualization

Deliver the Next Generation Intelligent Datacenter Fabric with the Cisco Nexus 1000V, Citrix NetScaler Application Delivery Controller and Cisco vpath

White Paper. Juniper Networks. Enabling Businesses to Deploy Virtualized Data Center Environments. Copyright 2013, Juniper Networks, Inc.

VMware vcloud Networking and Security Overview

Multitenancy Options in Brocade VCS Fabrics

Virtual Networking Features of the VMware vnetwork Distributed Switch and Cisco Nexus 1000V Series Switches

Software Defined Network (SDN)

Transform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure

Cisco Unified Network Services: Overcome Obstacles to Cloud-Ready Deployments

Virtual Machine Manager Domains

SDN CENTRALIZED NETWORK COMMAND AND CONTROL

What is SDN? And Why Should I Care? Jim Metzler Vice President Ashton Metzler & Associates

White Paper. SDN 101: An Introduction to Software Defined Networking. citrix.com

What s New in VMware vsphere 5.5 Networking

Securing Virtual Applications and Servers

Software-Defined Networks Powered by VellOS

Network Virtualization and Software-defined Networking. Chris Wright and Thomas Graf Red Hat June 14, 2013

A Look at the New Converged Data Center

Protecting VMs in a Multi-Tenancy Environment

SOFTWARE-DEFINED NETWORKING AND OPENFLOW

SINGLE-TOUCH ORCHESTRATION FOR PROVISIONING, END-TO-END VISIBILITY AND MORE CONTROL IN THE DATA CENTER

Extending Networking to Fit the Cloud

White Paper. Advanced Server Network Virtualization (NV) Acceleration for VXLAN

Cloud Networking Disruption with Software Defined Network Virtualization. Ali Khayam

How Network Virtualization can improve your Data Center Security

The Advantages of Cloud Services

WHITE PAPER. Addressing Monitoring, Access, and Control Challenges in a Virtualized Environment

Software Defined Environments

DCB for Network Virtualization Overlays. Rakesh Sharma, IBM Austin IEEE 802 Plenary, Nov 2013, Dallas, TX

Network Virtualization Solutions - A Practical Solution

Data Center Infrastructure of the future. Alexei Agueev, Systems Engineer

VXLAN Overlay Networks: Enabling Network Scalability for a Cloud Infrastructure

Brocade VCS Fabrics: The Foundation for Software-Defined Networks

ALTERNATIVES FOR SECURING VIRTUAL NETWORKS

Secure Access Complete Visibility

Windows Server 2012 Hyper-V Extensible Switch and Cisco Nexus 1000V Series Switches

A Coordinated. Enterprise Networks Software Defined. and Application Fluent Programmable Networks

Whitepaper Active Visibility into SSL Traffic for Multi-tiered Security

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

WHITE PAPER. Data Center Fabrics. Why the Right Choice is so Important to Your Business

Underneath OpenStack Quantum: Software Defined Networking with Open vswitch

Redefine Network Visibility in the Data Center with the Cisco NetFlow Generation Appliance

SDN Applications in Today s Data Center

CloudEngine 1800V Virtual Switch

Optimizing Data Center Networks for Cloud Computing

Network Services in the SDN Data Center

White Paper. Protect Your Virtual. Realizing the Benefits of Virtualization Without Sacrificing Security. Copyright 2012, Juniper Networks, Inc.

SDN v praxi overlay sítí pro OpenStack Daniel Prchal daniel.prchal@hpe.com

Network Virtualization for Large-Scale Data Centers

The Promise and the Reality of a Software Defined Data Center

基 於 SDN 與 可 程 式 化 硬 體 架 構 之 雲 端 網 路 系 統 交 換 器

Virtualizing Apache Hadoop. June, 2012

HAWAII TECH TALK SDN. Paul Deakin Field Systems Engineer

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers

Virtualization Essentials

Network Virtualization Solutions

Whitepaper Software-Defined Visibility (SDV): The New Paradigm for IT

Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES

Branches as Nimble as the Cloud: Unleashing Agility with Nuage Networks Virtualized Network Services EXECUTIVE SUMMARY

Cisco Nexus 1000V Switch for Microsoft Hyper-V

Creating Overlay Networks Using Intel Ethernet Converged Network Adapters

Virtualized Access Layer. Petr Grygárek

Cisco Dynamic Workload Scaling Solution

Linux KVM Virtual Traffic Monitoring

Nutanix Tech Note. Configuration Best Practices for Nutanix Storage with VMware vsphere

Transcription:

Executive Summary IT organizations today face unprecedented challenges. Internal business customers continue to demand rapid delivery of innovative services to respond to outside threats and opportunities. At the same time, it is not unusual for organizations to issue broad mandates to cut back on spending budgets. In these tough times, the adoption of disruptive technologies holds the key to improving efficiency and truly accomplishing more with less. Cloud computing and virtualization as a technology is one such innovation that allows creation of a more dynamic and flexible infrastructure by maximizing resource utilization while increasing IT service delivery. Virtualization stands to bring enormous cost savings by streamlining server management while also improving the efficiency in space and power usage. With Virtualization technology in place, enterprises can be more agile than they have been in the past. In one series of case studies presented by VMware, for example, companies using virtualization achieved a 67% reduction in total cost of ownership for IT operations after implementation. It is therefore no wonder that adoption of virtualization is proceeding at a rapid rate and is most likely being accelerated even further by tough economic times and cost cutting mandates. With Virtualization as the driving technology standard, public reports estimate that in five years, the cloud market will exceed $300 Billion. Even with the undeniable cost and scalability benefits of virtualization and cloud computing, the elastic and dynamic nature of software-defined cloud computing introduces a whole new set of challenges to IT professionals. While responsiveness to immediate needs has improved, diagnosing problems and analyzing performance has become more complex. With more of the path of application data being shrouded in virtual networks, managing and monitoring network operations with traditional approaches is becoming difficult. IT leaders and stakeholders are constantly struggling with gaining back visibility, maintaining and improving application performance and enforcing corporate regulatory policies across this new type of network while also leveraging benefits brought by virtualization. Their challenge is to adjust expectations based upon exaggeration and hype so that the true value and return on investment are understood. Introduction Virtualization is here to stay because it offers such compelling benefits. The financial justification comes from maximizing capacity utilization by hosting more and more VMs on a single piece of hardware thereby enabling cost savings, management flexibility and business agility to name just a few. With a literal click of a button a new server can be deployed and be in production in minutes, often at no hard cost to the organization. 1

Figure 1: Maximizing capacity utilization with virtualization However the dynamic nature of server virtualization also makes it more difficult to protect, predict and monitor the performance and security of a server or application bringing the following questions to the forefront: With more and more of IT infrastructures moving to virtualization, what are the implications for network, application and security monitoring systems? Do these systems have visibility of application and network traffic to provide the monitoring capabilities that they have been designed for? Intra-host Traffic Virtualization is creating blind spots, or invisible networks, within server infrastructure. With a large share of traffic flowing across software-defined cloud infrastructure, being encapsulated across virtual tunnel endpoints and, in many cases, not even hitting the physical network at all, VM and network administrators are losing the visibility and control over this communication. This lack of comprehensive visibility is causing reticence among IT professionals seeking to wrap up complex workloads in virtualized infrastructure. With security and compliance being top of mind in virtualization and cloud deployments, organizations are struggling with how to reconcile competing priorities to virtualize their environments, while still satisfying the existing requirements for visibility. It should therefore come as no surprise to see traffic visibility, compliance and data security consistently listed among the top inhibitors to cloud adoption. vswitch The most common way to provide Virtual Machine (VM) switching connectivity is a Virtual Ethernet Bridge (VEB), otherwise called a vswitch in VMware. A VEB is basically software that acts similar to a Layer 2 hardware switch providing inbound/outbound and inter-vm communication. By default, every VM can communicate directly with every other VM on the same host through the simple virtual switch, without any inter-vm traffic monitoring or policy-based inspection and filtering. Intra-host VM traffic, handled internally by the VEB doesn t touch the physical network. This communication may not even be visible to network-based security and monitoring appliances residing outside a virtual server. As a result, collapsing multiple servers into a single one significantly impacts all of the network and application monitoring, firewall, intrusion detection, and other compliance tools that were in place prior to the virtualization of workloads. Simply put, traditional network monitoring and security measures are unable to effectively manage the growing volume of inter-vm traffic, leaving VMs highly vulnerable to attack. This lack of visibility complicates problem identification and resolution, potentially erasing any cost savings associated with virtual environments. 2

VN-Tag VN-Tag standard was proposed as an alternative solution to provide access layer extension without extending management and STP domains, end-to-end policy enforcement and therefore better network visibility in virtualized environments specifically VM-VM traffic on the same host. are used in bridge extensions, where a unique identifying tag is inserted into each frame exchanged between the Cisco fabric extenders and the Nexus parent switch to uniquely identify the originating port. One of the disadvantages of VN-Tags is that it utilizes additions to the Ethernet frame. Standard monitoring tools which do not understand VN-Tag would be completely blind to this traffic and therefore rendered useless. It also increases traffic on the host server s physical network links. Figure 2: VN-Tag added as an additional header Using VN-Tag, an additional header is added into the Ethernet frame which will be used by a VN-Tag aware external (switching) device to uniquely identify virtual interfaces (VIF) and forward data after enforcing the necessary security policies. VN-Tags thus provide virtual networking awareness allowing for individual configuration of each virtual interface as if it were a physical port. This completely removes any switching function from the hypervisor and locates it in an external hardware network switch physically independent of the server. With this approach, packet switching is completely decoupled from the hypervisor. The versatility of VN-Tags allows this technology to be applied in existing physical network infrastructures. For example, VN-Tags Overlay Networks for Virtualized Data Centers Virtual extensible Local Area Network (VXLAN) Current limitations of physical networks tie an increasingly pooled dynamic virtual world back to rigid, complex network architectures creating artificial barriers to realizing the full agility organizations expect from private clouds. While a virtual machine can be provisioned in a matter of minutes, surrounding that VM with all the necessary network and security services still takes days. Highly available virtualization technologies such as VMware Fault Tolerance work best with flat Layer 2 networks, but creating and managing this architecture can be operationally difficult, especially at scale. True software-defined networking (SDN), where a data center or cloud operator would not care about the hardware and device OS, really starts with plumbing projects like OpenFlow and VXLAN. Figure 3: VN-Tagged intra-host traffic where switching is managed by the physical switch 3

Figure 4: VXLAN allows Layer 2 virtual networks to span across physical boundaries VXLAN helps solve the data center networking challenge. It provides the capability to create isolated, multi-tenant broadcast domains across data center fabrics and enables customers to create elastic, logical networks that span physical network boundaries. Thus virtualizing the network and creating networks that meet the agility, performance and scale requirements of virtualized applications and data. VXLAN works by creating Layer 2 logical networks that are encapsulated in standard Layer 3 IP packets thus allowing the extension of Layer 2 virtual networks across physical boundaries. A Segment ID in every frame differentiates the VXLAN logical networks from each other without any need for VLAN-Tags. This not only allows very large numbers of isolated Layer 2 VXLAN networks to coexist on a common Layer 3 infrastructure, it also allows virtual machines to reside on the same Layer 2 virtual network but be on two different Layer 3 networks. VXLAN runs over standard switching hardware, with no need for software upgrades, enabling multi-tenancy while extending virtual data centers across different physical locations of the cloud / data center networks. However, there is a huge disadvantage of this approach: the traffic is hidden in a tunnel, making network monitoring difficult. Individual applications flowing within the tunnel therefore cannot be monitored. Even with (hardware or software) modifications to make monitoring tools compatible with VN-Tag labels and VXLAN encapsulated tunnels, these tools would still be spending precious resource cycles stripping out encapsulations while they can be more efficiently used for what they were originally designed to do, i.e. analyze and monitor traffic. Pervasive Visibility into the Virtualized Data Center and Cloud Today, as organizations drive toward the adoption of further virtualization and cloud solutions, there is no longer any need for them to let performance, or security concerns, hinder that advance. 4

Figure 5: GigaVUE-VM provides traffic visibility into virtualized environments Visibility of Inter-VM Traffic on a Single Host Enabling Visibility with GigaVUE-VM As mission-critical workloads migrate to virtual servers, an increasingly large share of critical network traffic is occurring between VM s residing on the same host. Visibility into this virtual switching infrastructure becomes critical to manage end-to-end service delivery. A solution is therefore required to push only interesting data streams flowing between virtual machines, on the same host, out to external monitoring tools without introducing any security concerns. The Gigamon GigaVUE-VM Visibility Fabric node addresses these requirements by providing an intelligent filtering technology allowing specific inter-vm traffic flows of interest to be selected, forwarded and delivered to the appropriate monitoring, analysis or security devices. Options provided by virtualization vendors such as placing the guest s network adapter in promiscuous mode have its own set of concerns and limitations. Promiscuous mode allows a monitoring tool connected to the virtual switch to receive all frames passed on the virtual switch including traffic destined to other guests or host operating systems. This mode can raise legitimate security concerns (even more so with multitenant environments) since any adapter in promiscuous mode has access to the packets regardless of whether the traffic is destined to that particular network adapter. The alternative option of using the port-mirroring capability available in VSphere 5.0 is identical to this functionality in physical switches. This would result in all the virtual machineto-virtual machine traffic being sent out to the physical network, thereby potentially overloading the physical NIC as well as the network with traffic that might not even be interesting from the end-user s monitoring perspective. A native VMware vsphere 5 Virtual Machine, the GigaVUE-VM fabric node is installed without the need for invasive agents, or changes to the hypervisor, allowing system managers to achieve the same packet-level traffic visibility between virtualized applications as is normally available between discrete physical applications and servers. End-users can selectively filter traffic flows between virtual machines on the same ESXi host, based on specific application criteria and forward these to GigaVUE fabric nodes resident in the physical network to be additionally aggregated, replicated and made available to network performance, application performance and security monitoring systems. 5

Figure 6: ERSPAN termination Enabling Visibility in Cisco 1000V Deployments with Encapsulated Remote SPAN (ERSPAN) Cisco Nexus 1000V Series represents the first example of third-party distributed virtual switches that are fully integrated with VMware virtual infrastructure, including VMware vcenter for the virtualization administrator. When deployed, the Cisco Nexus 1000V Series not only maintains the virtualization administrator s regular workflow; it also offloads the vswitch and port group configuration to the network administrator, reducing network configuration mistakes and helping ensure that consistent network policy is enforced throughout the data center. In the Cisco Nexus 1000V Series, traffic between virtual machines is switched locally without ever hitting the physical switch. Using Encapsulated Remote SPAN, this traffic can be copied and sent over a Generic Routing Encapsulation (GRE) tunnel to one or more IP-reachable destinations, enabling monitoring by external network and security analyzers. However, to receive this traffic, these destinations would need to have the ability to terminate ERSPAN sessions. As a valuable alternative to building de-capsulation routines with monitoring or security tools, Gigamon GigaSMART technology hosted on GigaVUE fabric nodes can be used for terminating ERSPAN tunnels. GigaSMART, which provides advanced packet manipulation features, supports ERSPAN session termination. GigaSMART will de-capsulate packets received within the ERSPAN session, then efficiently send the packets to one or more network analyzers that need access to this information which would have otherwise been hidden in the virtualized servers and therefore inaccessible. Enabling Visibility in Cisco Deployments with VN-Link In addition to the distributed virtual switch, Cisco also provides the option of forwarding virtual traffic streams to an external network switch, after tagging the original packets with a unique VN-Tag id. However, now that the packets have been modified with tags, the primary challenge for monitoring devices is to access this encapsulated traffic without making hardware or software changes or wasting processing cycles. The VN-Tagged traffic flows can alternatively be sent out to GigaVUE fabric nodes. Using the advanced processing available with GigaSMART, the original packets are extracted after removing all the encapsulations including VN-Tags. With the preprocessing provided by GigaSMART, the network and security monitoring devices can now inspect the traffic source from the virtual network without expending precious resources. 6

Figure 7: GigaSMART provides advanced processing to remove VN-Tags thereby enhancing the efficiency of monitoring and security tools Visibility in Overlay Networks Enabling Visibility of VXLAN Encapsulated Traffic With a 24 bit segment ID to uniquely identify broadcast domains, VXLAN enables multi-tenant environments at cloud scale and extending the Layer 2 network across physical boundaries by encapsulating the original frames in a MAC-in-UDP encapsulation. Monitoring performance of VXLAN SDNs and virtual tunnel endpoints is the key to enabling network operations teams to control and comprehend the virtual domains floated on top of the common networking and virtualization infrastructure. In figure 8, the VXLAN encapsulated traffic can be sent to the GigaVUE Visibility Fabric architecture, which can utilize the processing capabilities provided by GigaSMART to de-capsulate it before sending it to the tools that need access to this information. Thus the network and security analyzers that need critical visibility into the UDP-encapsulated traffic can now monitor the security and performance of the VXLAN virtual overlay network without any hardware or software modifications. Figure 8: VXLAN de-encapsulation 7

End-To-End Pervasive Visibility enabled by Gigamon With the pervasive visibility enabled by the Gigamon Visibility Fabric architecture, network and security analyzers can monitor and troubleshoot software-defined data centers and physical networks in a single solution. Gigamon s unique patented Flow Mapping filtering technology and GigaSMART packet modification intelligently segregates network traffic flows and removes unwanted information from packets based upon Layer 2, 3 or 4 parameters, significantly reducing the amount of overhead required on monitoring, analysis and security devices. Advanced filtering, aggregation, and replication capabilities ensure that network and security monitoring appliances are used most effectively. In addition to providing access to critical information, the Visibility Fabric architecture can be used to modify packets in order to hide confidential information, add timing information, remove duplicate data and strip out extraneous headers thereby enhancing the efficiency of monitoring and security tools. performance and security as they look to adopt virtualization and Cloud solutions, and take advantage of the tremendous value propositions they both offer. About Gigamon Gigamon provides an intelligent Visibility Fabric architecture to enable the management of increasingly complex networks. Gigamon technology empowers infrastructure architects, managers and operators with pervasive visibility and control of traffic across both physical and virtual environments without affecting the performance or stability of the production network. Through patented technologies, centralized management and a portfolio of high availability and high density fabric nodes, network traffic is intelligently delivered to management, monitoring and security systems. Gigamon solutions have been deployed globally across enterprise, data centers and service providers, including over half of the Fortune 100 and many government and federal agencies. Pervasive visibility across the virtual and physical network provides a singular view across the entire infrastructure, thus helping to ensure productivity, performance, and meeting service level agreements. The plug-and-play architecture of the traffic visibility solution deploys easily in complex environments, providing network administrators with the vital insight they need to proactively and effectively govern IT infrastructures and ensure continuous availability of servers and applications. For more information about the Gigamon Visibility Fabric architecture visit: www.gigamon.com Today more and more organizations are driving toward the adoption of virtualization, Cloud and programmable networks. As they do so, they are faced with the challenge of maintaining visibility of technologies used to deliver traffic between the physical network and the virtual machines residing on hypervisors. New technologies such as VXLAN, ERSPAN, VN-Tag and VN-Link are rendering tools used to monitor, analyze and secure the IT infrastructure essentially blind to the traffic flowing in and out of the data center. The pervasive visibility solutions offered by the Gigamon Visibility Fabric architecture enable organizations to overcome concerns about 1 VMware, Reducing Server Total Cost of Ownership with VMware Virtualization Software, http://www.isdsecurity.com/vmwaretcowhitepaper.pdf (2006). 2 Market Info Group, The Future of Virtualization, Cloud Computing & Green IT Global Technologies & Markets Outlook 2011-2016 (October, 2010). Gigamon and the Gigamon logo are trademarks of Gigamon in the United States and/or other countries. Gigamon trademarks can be found at www.gigamon.com/legal-trademarks. All other trademarks are the trademarks of their respective owners. Gigamon reserves the right to change, modify, transfer, or otherwise revise this publication without notice. Gigamon 598 Gibraltar Drive Milpitas, CA 95035 PH 408.263.2022 www.gigamon.com 8