SlideShare une entreprise Scribd logo
1  sur  78
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Connect 11© 2013 Cisco and/or its affiliates. All rights reserved.
Toronto, Canada
May 30, 2013
Data Centre Security
Best Practices and Achitecture
Mason Harris, CCIE #5916
Solutions Architect
Advanced Technology Team
Agenda
• Today’s DC Architecture
• Threat Prevention
• Threat Visibility
• Virtualized Security
• Validated Architectures
• Summary
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 3
DC Architecure:
Building Blocks
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 4© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 4Data Center Security
Building an Efficient DC Fabric to Scale
4
• Scaling the Network Fabric - Virtual Device Context (VDC)
Nexus 7000 VDC – Virtual Device Contexts
• Flexible separation/distribution of hardware resources and software
components
• Complete data plane and control plane separation
• Complete software fault isolation
• Securely delineated administrative contexts
• Each physical interface can only be active in one VDC
Layer 2 Protocols Layer 3 Protocols
VLAN
PVLAN
OSPF
BGP
EIGRP
GLBP
HSRP
IGMP
UDLD
CDP
802.1XSTP
LACP PIMCTS SNMP
……
VDC 1
Layer 3 Protocols
OSPF
BGP
EIGRP
GLBP
HSRP
IGMP
PIM SNMP
…
VDC 2
Layer 2 Protocols
VLAN
PVLAN
UDLD
CDP
802.1XSTP
LACP CTS
…
VDCs
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 5© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 5Data Center Security
vPC Peers
vPC Peers
MCEC
5
• Allow a single device to use a port channel across two
upstream switches (aka MCEC)
• Eliminate STP blocked ports
• Simplify L2 Paths by supporting loopfree non-blocking
concurrent L2 paths
• Dual-homed server operate in active-active mode
• Provide fast convergence upon link/device failure
Virtual PortChannels
• Scaling the Fabric – Virtual Port Channel vPC)
Logical Topology with vPC
Aggregation
Access
Aggregation
Access
MCEC
! Enable vpc on the switch
dc11-5020-1(config)# feature vpc
! Check the feature status
dc11-5020-1(config)# show feature | include vpc
vpc 1 enabled
The Security Practicioner’s Challange
• How to integrate security in a dynamic network (the DC)
• Loss of traditional L2 and L3 boundaries
• Other technologies like VXLAN, OTV and Vmotion extend the
network topology
• How do stateful inspection devices handle assymetric flows?
• Where can I get flow visibility if there isn’t a network “edge”?
• DC is rapidly changing, security services difficult to keep up
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 7
Threat Prevention:
Firewall and IPS
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 8© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 8Data Center Security
Why Deploy a Firewall in the DC?
• Firewalls provide a stateful inspection point for access control
• Can be either a physical appliance or virtual appliance
• Frequently positioned between VRFs or VDC for granular control and
visibility
• Throughput is one consideration, but connection count is just as
important due to applications and their services
• Provide user and application visibility as well as flow based services
• Virtual firewalls are an option where physical appliances can’t exist or
rapid expansion of virtual services
8
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 9© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 9Data Center Security
Physical Firewalls: Service Modules and Appliances
• Cisco currently only has one service module firewall, the ASA SM for the
Catalyst 6500-E
• SM firewalls have no physical interfaces and rely entirely on the existing
switching infrastructure for packet flow
• It uses VLANs to redirect which packets are inspected or bypassed
• Uses same code base as physical appliances ASA firewalls
9
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 10© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 10Data Center Security
Physical Firewalls: ASA 5585 Appliances
10
• 2U chassis with dual power supplies on each blade
• Can be deplyed as two firewalls or a firewall and services blade
• 4 10G ports on 2 high end firewall blades, expansion card for more 10G ports
• BreakingPoint Test Results: http://blogs.ixiacom.com/ixia-blog/cisco-asa-live-validation-with-breakingpoint-firestorm-ctm/
• Miercom report here: http://www.miercom.com/2011/06/cisco-asa-5585-x-vs-juniper-srx3600/
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 11© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 11Data Center Security
Virtualized Firewalls and Virtual Firewalls
• Two types: multi-context mode and virtual firewalls
• Multi-context mode was originally designed for SMT (Secure Multi Tenant)
deployments and is a licensed feature
• Virtual firewalls are software-only firewalls running in a hypervisor
• Cisco has two virtual firewalls: the Virtual Security Gateway (VSG) and the
ASA1000V
• Both require the Nexus 1000V distributed virtual switch and an “Advanced” license
• Virtual firewalls can be deployed rapidly with typical orchestration tools, etc. but
there is an added layer of operational complexity
• Virtual firewalls are heavily dependent on available RAM and CPU on the host
server
• We’ll cover virtual firewalls shortly
11
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 12© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 12Data Center Security
4 Virtualized Firewalls - Common Configuration
12
• Firewalls can be in tranparent or routed mode or both (mixed mode 9.0+)
• Physical links are typically trunks but could be physical interfaces
• Contexts in routed mode can share VLANs, but not in transparent mode
VLAN 10 VLAN 20 VLAN 30 VLAN 40
VLAN 11 VLAN 21 VLAN 31 VLAN 41
VFW
1
VFW
2
VFW
3
VFW
4
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 13© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 13Data Center Security
What is a Transparent mode Firewall?
13
• Transparent Firewall (L2) mode provides an option in traditional L3
environments where existing services can’t be sent through the firewall
• Very popular architecture in data center environments
• In L2 mode:
• Routing protocols can establish adjacencies through the firewall
• Protocols such as HSRP, VRRP, GLBP can pass
• Multicast streams can traverse the firewall
• Non-IP traffic can be allowed (IPX, MPLS, BPDUs)
• Allows for three forwarding interfaces, inside and outside and DMZ
• NO dynamic routing protocol support or VPN support (sourced from ASA)
• Specific design requirements, reference Configuration Guide for details
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 14© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 14Data Center Security
How Does Transparent Mode Work?
• Firewall functions like a bridge (“bump in the wire”) at L2, only ARP packets
pass without an explicit ACL
• Still can use traditional ACLs on the firewall
• Does not forward Cisco Discovery Protocol (CDP)
• Same subnet exists on all interfaces in the bridge-group
• Different VLANs on inside and outside interfaces
• In addition to Extended ACLs, use an EtherType ACL to restrict or allow L2
protocols
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 15© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 15Data Center Security
10.1.1.0 /24 – vlan 10
10.1.1.0 /24 – vlan 20
BVI 1: 10.1.1.100 /24
firewall transparent
hostname ciscoasa
!
interface GigabitEthernet0/0
vlan 20
nameif outside
security-level 0
bridge-group 1
!
interface GigabitEthernet0/1
vlan 10
nameif inside
security-level 100
bridge-group 1
!
interface BVI1
ip address 10.1.1.100 255.255.255.0
Transparent Mode Configuration (2 interfaces shown)
Bridge-group
1
Up to 4 interfaces are permitted per bridge-group
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 16© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 16Data Center Security
Data Center: ASA L2 FW – Design #1
• ASAs in transparent mode with upstream L3 gateway
• Server gateway on outside of firewall
• Firewall is L2 adjacent and in path to hosts
• Segmentation through VLAN assignment
Vlan 10
(Inside)
vlan 20 VIP: 10.1.1.254
L3 Switch
Hosts: 10.1.1.1-99
10.1.1.x /24
Vlan 20
(Outside)
ASA HA Pair
BVI: 10.1.1.100
Virtual
Hosts
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 17© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 17Data Center Security
Data Center: ASA L2 FW – Design #2
VDC-Out
Outside Inside
VDC-In
HSRP VIP: 10.1.1.254
Single L2 Domain
Firewalls for Intra-VDC Traffic
• ASA in either L2 or L3 mode, L2 is optimal in most cases
• Add VRFs on Cat 6500 or Nexus 7K for segmentation
• Server gateway inside of firewall
• Minimizes firewall failures, route around failures if needed
Virtual
Hostsvlan 20vlan xvlan y
10.199.199.210.199.199.1
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 18© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 18Data Center Security
N7k1-VDC-2
Aggregation
vrf1 vrf2
ASA L2 FW – Design #3
• Transparent (L2) firewall services are
“sandwiched” between Nexus VDCs
• Allows for other services (IPS, LB, etc) to be
layered in as needed
• ASAs can be virtualized to for 1x1 mapping
to VRFs
• Useful for topologies that require a FW
between aggregation and core
• Downside is that most/all traffic destined for
Core traverses FW; possible bottleneck, etc.
• Firewalls could be L2 or L3
N7k1-VDC-1
Core
vrf1 vrf2
Firewalls for Inter-VDC Traffic
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 19© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 19Data Center Security
Interface Redundancy: Port Channels
19
• Port channel support was added to the
ASA in 8.4 (2011)
• Best practice: Utilize Link Aggregation
Control Protocol (LACP) where possible
• LACP dynamically adds and removes (if
necessary) links to the port channel
bundle
• Up to 8 active links and 8 standby links
are supported in the channel
• Link aggregation benefit
• Best practice in the DC is to use Virtual
Port Channels
interface TenGigabitEthernet0/8
channel-group 40 mode active
no nameif
no security-level
!
interface TenGigabitEthernet0/9
channel-group 40 mode active
no nameif
no security-level
!
interface Port-channel40
nameif inside
ip add 10.1.1.2 255.255.255.0
Actively
negotiate
LACP with
switch
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 20© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 20Data Center Security
‘Show port-channel summary' on ASA
Flags: D – down P - bundled in port-channel
I - stand-alone s – suspended
H - Hot-standby (LACP only)
U - in use N - not in use, no aggregation/nameif
M - not in use, no aggregation due to minimum links not met
w - waiting to be aggregated
Number of channel-groups in use: 1
Group Port-channel Protocol Span-cluster Ports
------+-------------+---------+------------+---------------------------
40 Po40(U) LACP No Te0/8(P) Te0/9(P)
20
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 21© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 21Data Center Security
Virtual Port Channels (VPC) and the ASA
21
• Virtual Port Channels (VPC) are port channels where
both links are actively forwarding traffic
• Only two uplinks
• VPC was created to solve two inherent network
problems: Spanning-tree recalculation times and
unused capacity in redundant L2 uplinks (due to STP
blocks)
• No additional config required on ASA
• Supported in Nexus devices
• VPC Design Guide:
http://www.cisco.com/en/US/prod/collateral/switches/ps9441/ps96
70/C07-572830-00_Agg_Dsgn_Config_DG.pdf Nexus 5K/7Ks
ASA
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 22
Firewall Clustering
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 23© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 23Data Center Security
ASA Clustering Design Guidelines
• Up to 8 ASAs are supported in a cluster (minimum of two) and all must be the
same model and DRAM (only flash memory can differ)
• All cluster units must share same software except during upgrade (e.g. 9.0(0)1
to 9.0(0)3)
• Approximate maximum cluster throughput is ~ 70% of combined throughput and
connections of units in the cluster
• Cluster elects one master that syncs configuration with other members
• Supported in both routed (L3) and transparent (L2) firewall modes
• Requires at least one cluster control interface on ASA for cluster control plane –
this is analogous to state and failover link in A/S today
• Cluster control links must be sized properly to accept a load that is equal to or
greater than the cluster throughput
23
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 24© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 24Data Center Security
Clustering Best Practices – Control Plane
24
• Cluster control links must be sized
accordingly (e.g.10GE interfaces)
• Recommended to use a local port-channel
on each ASA for link redundancy and
aggregation
• Do NOT use a spanned port-channel for
cluster control links
• Could also use ASA interface redundancy
which supports up to 8 pairs of interfaces in
an active-passive mode
ManagementNetwork
Cluster Control
Links
M0/0
M0/0
M0/0
M0/0
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 25© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 25Data Center Security
Clustering Best Practices – Cat 6K Data Plane
25
Inside
Switch
Outside
Switch
• ASA clustering relies upon stateless load
balancing from an external mechanism
• Recommended method is to use a L2
spanned port-channel to a switch for
ingress and egress connections
• BP is to use a symmetrical hashing
algorithm like src-dest IP (the default)
• Could also use Policy Based Routing (PBR)
or Equal Cost Multi-Path (ECMP); use both
with Object Tracking L3 only
• Cat 6K VSS is supported with ASA
clustering
• Spanned port-channel will not come up
until clustering is enabled!
“Spanned” Port-Channels
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 26© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 26Data Center Security
Clustering Best Practices – Nexus 7K Data Plane
26
Nexus 7K
• Nexus 7K data center offers advantages
with clustering due to VPC feature
• All ASAs are dual homed to each 7K
• VPC ensures that a single link failure will
have zero packet loss
• Enhancements to LACP such that ASA
cluster appears as one logical firewall to
rest of network
• Port channel provides packet forwarding
• ASAs in L2 or L3 mode
Nexus 7K
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 27© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 27Data Center Security
TCP Session: Symmetric Traffic Flow
• State replication from Owner to Director, also serves as failover message to provide
redundancy should Owner fail
• Director is selected per connection using consistent hashing algorithm
• Director will act as backup should Owner fail
InsideNetwork
OutsideNetwork
Owner
SYN
Client
Server
SYN/ACKSYN/ACK
SYN
Member
1. State
update
Director
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 28© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 28Data Center Security
TCP Session: Asymmetric Traffic Flow
• Forwarder receives packet that it did not originate, queries Director
• Packet is forwarded via cluster control link to Owner who then forwards on to
originating client and all subsequent packets are forwarded to Owner with no lookup
• This step is eliminated if the Owner can be derived via syn-cookies
InsideNetwork
OutsideNetwork
Owner
Director
SYN
Client
Server
SYN/ACK
1. State
update
SYN/ACK
SYN
Forwarder
2. Who is
Owner?
3. Owner
Location
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 29© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 29Data Center Security
FW+IPS Clustering with ASA 5585 Chassis
• Clustering is supported 5585s which also
support IPS module on top slot
• Leverage ASA Clustering technology for :
• Traffic load-balancing
• Traffic Symmetry
• High availability
• Caveats
• Every module is managed individually
• No “Cluster” event correlation
ClusterControlLink
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 30
Threat Visibility:
NetFlow
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 31© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 31Data Center Security
NetFlow Security Use Cases
• Detecting Persistent Threats
• Identify Botnet Command and Control Activity
• Detect Network Reconaissance
• Track Internal Malware Proliferation
• Check for Data Loss (DLP)
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 32© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 32Data Center Security
Netflow Overview
• Netflow was created by Cisco over 30 years ago as a flow accounting tool
• If packet capture is like a wiretap then NetFlow is like a phone bill
• We can learn a lot from studying the phone bill!
• Today many devices support line rate Netflow (Catalyst family 15.0) while the Nexus
7K supports “Flexible” Netflow
• ASA firewall has supported NSEL (Netflow Secure Event Logging) for many years
• NSEL has three options: Track flows as they are built, torn down, updated or denied
• Many vendors take in NetFlow data--Lancope, Arbor, Plixer are a few
• Cisco OEM’s Lancope’s StealthWatch as Cybersecurity Threat Defense (CTD)
32
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 33© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 33Data Center Security
Flow Is Defined By Seven Unique Keys
NetFlow Enabled
Device
Traffic
•Input Interface
•TOS byte (DSCP)
•Layer 3 protocol
•Destination port
•Source port
•Destination IP address
•Source IP address
•Input Interface
•TOS byte (DSCP)
•Layer 3 protocol
•Destination port
•Source port
•Destination IP address
•Source IP address
Create a flow from the packet
attributes
…
152811000Address, ports…
Bytes/packetPacketsFlow Information
…
152811000Address, ports…
Bytes/packetPacketsFlow Information
NetFlow Cache
Inspect
Packet
NetFlow
Export Packets
Reporting
• Inspect a packet’s 7 key fields and identify the values
• If the set of key field values is unique, create a new flow record or cache entry
• When the flow terminates, export the flow to the collection/analysis system
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 34© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 34Data Center Security
Cyber Threat Defense Solution Components
34
Cisco Network
StealthWatch
FlowCollector
StealthWatch
Management
Console
NetFlow
Users/Devices
Cisco
ISE
NetFlow
StealthWatch
FlowReplicator
Other
tools/collecto
rs
https
https
NBAR NSEL
NGA (NetFlow Generating
Appliance)
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 35© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 35Data Center Security
Cisco CTD Solution: Attack Detection without
Signatures High Concern Index indicates a
significant number of suspicious events
that deviate from established baselines
Host Groups Host CI CI% Alarms Alerts
Desktops 10.10.101.118 338,137,280 112,712% High Concern index Ping, Ping_Scan, TCP_Scan
Monitor and baseline activity for a host and within host groups.
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 36© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 36Data Center Security
1. Infected host opens
connection from
inside
Detecting Command and Control
36
Devices
Management
StealthWatch
FlowCollector
StealthWatch
Management
Console
Cisco ISE
3. Infrastructure generates a record of
the communication using NetFlow
5. Contextual information
added to NetFlow analysis
6. Concern Index increased
Host Lock Violation alarm triggered
2. Commands are sent
in return traffic
NetFlow Capable
4. Collection and analysis
of NetFlow data
Internal Network
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 37© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 37Data Center Security
Detecting Command and Control
37
Alarm indicating
communication with known
BotNet Controllers
IP Address
Source user
name
Policy that
triggered
alarm
Policy Start
Active
Time
Alarms Source Source Host
Groups
Source
User Name
Target Target Host
Group
Inside
Hosts
Jan 27,
2012
Host Lock
Violation
10.35.88.171 Remote VPN Bob ZeusServer.com Zeus BotNet
Controllers
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 38
Virtualized Security
Nexus 1000V
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 39© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 39Data Center Security
Common Virtualization Concerns
39
• Policy Enforcement
• Applied at physical server—not the individual VM
• Impossible to enforce policy for VMs in motion
• Operations and Management
• Lack of VM visibility, accountability, and consistency
• Difficult management model and inability to effectively troubleshoot
• Roles and Responsibilities
• Muddled ownership as server admin must configure
virtual network
• Organizational redundancy creates compliance challenges
• Machine Segmentation
• Server and application isolation on same physical server
• No separation between compliant and non-compliant systems Hypervisor
Roles and
Responsibiliti
es
Isolation and
Segmentation
Management
and Monitoring
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 40© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 40Data Center Security
Virtualization Security Concerns
40
• Operations and Management
• Lack of VM visibility, accountability, and consistency
• Difficult management model and inability to effectively
troubleshoot vm issues
• Machine Segmentation
• Server and application isolation on same physical server
• No separation between compliant and non-compliant systems
• Lack of visibility
• Unified policy requires a little more thought…and work
Hypervisor
Initial Infection
Secondary
Infection
Hypervisor
Tertiary
Infection
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 41© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 41Data Center Security
What are North-South and East-West Flows?
• North-South (N-S) flows are
typically flows to and from Access
layer to Aggregation Layer and
Core
• East-West (E-W) flows typically
stay either within a zone or
between zones and often server to
server traffic
41
Web App
Access
Aggregation
Core
Database
East - West
North-South
Virtual
Hosts
Virtual
Hosts
Virtual
Hosts
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 42© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 42Data Center Security
42
Nexus 1000V Architecture
42
Hypervisor Hypervisor Hypervisor
Modular Switch
…
Linecard-N
Supervisor-1
Supervisor-2
Linecard-1
Linecard-2
BackPlane
VEM-NVEM-1 VEM-2
VSM1
VSM2
Network
Admin
Virtual Appliance
Virtual Supervisor Module (VSM)
 CLI interface into the Nexus 1000V
 Leverages NX-OS
 Controls multiple VEMs as a single network
device
 Not in data path!
Virtual Ethernet Module (VEM)
 Replaces Vmware DVS
 Enables advanced switching capability on the
hypervisor
 Provides each VM with dedicated “switch ports”
Server
Admin
Server
Admin
Server
Admin
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 43© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 43Data Center Security
Nexus 1000V Architecture
43
port-profile type vethernet ASA1000V-1_Inside
switchport mode access
switchport access vlan 210
no shutdown
state enabled
port-profile type vethernet ASA1000V-Outside
vmware port-group
switchport access vlan 211
switchport mode access
no shutdown
state enabled
Nexus 1000V supports:
• ACLs
• Quality of Service (QoS)
• PVLANs
• Port channels
• SPAN ports
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 44© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 44Data Center Security
What is Vpath?
• vPath is the forwarding “brains” built into the Virtual Ethernet Module (VEM) of the Nexus
1000V
• It is an encapsulation that tags flows based upon attributes
• It has two main functions:
• Intelligent traffic steering
• Offload processing from virtual service nodes (VSN) to VEM
• vPath allows processing to be offloaded to Hypervisor for performance
• Currently only supported on VMWare today with future support for Hyper-V and others
• vPath is cornerstone for Cisco’s VSN delivery
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 45
Virtualized Security
Firewalls
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 46© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 46Data Center Security
Centralized or Decentralized Firewalls or Both?
• Centralized firewalls are the traditional approach
to virtualized host security
• Often a transitional architecture
• Firewalls in the core, aggregation or edge?
• Big challenge is scalability
• Usually the limiting factor is connections not
bandwidth
• How to handle a requirement for L2 separation of
hosts?
• How to address virtual host mobility?
46
Virtual
Hosts
Virtual
Hosts
Physical
Hosts
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 47© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 47Data Center Security
Cisco’s Virtual Firewalls: VSG and ASA1000V
• Cisco has two virtual firewalls: the ASA 1000V and the Virtual Security Gateway (VSG)
• Each runs as a virtual machine in VMWare (future HyperV support)
• Both are managed via Virtual Network Management Center (VNMC)
• Both are licensed per CPU socket
• They are complementary to each other and require the Nexus 1000V Distributed Virtual
Switch and utilize a new forwarding plane, vPath
47
Virtual Security Gateway ASA 1000V
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 48© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 48Data Center Security
What is the ASA1000V Cloud Firewall?
• ASA1000V is a software-only version of an ASA
appliance—an edge firewall
• Runs ASA codebase in a virtual machine in L3 mode
only
• Supports S2S IPSEC VPN (not RA VPN)
• Can be deployed in active/standby HA
• Subset of physical ASA features are supported, check
docs for specifics (no multimode, no L2FW, etc)
• Management via ASDM or VNMC but not both
• Not a replacement for physical appliance!
48
Virtual
Hosts
Virtual
Hosts
Virtual
Hosts
4 interfaces: inside, outside,
failover and management
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 49© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 49Data Center Security
ASA 1000V Deployment: Public Cloud
49
Hosts Hosts Hosts
Cloud Service Provider
Company A
VM 1
VM 2
VM 3
VM 4
ASA 1000V
Physical ASA
on Premise
Site-to-Site
IPSEC VPN
VM 5
VM 6
VM 7
VM 8
• Company A has moved to virtualized cloud
based servers
• Requires connectivity between existing hosts
(physical or virtual)
• ASA 1000V acts as default gateway to cloud
servers, DHCP services etc
• S2S IPSEC VPN tunnel connects existing
infrastructure to cloud
• Other VPN devices can establish S2S tunnels
with ASA1000V
• No RA VPN support (AnyConnect)
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 50© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 50Data Center Security
ASA 1000V Deployment with NAT
50
Hosts Hosts Hosts
Cloud Service Provider
Company A - PROD
VM 1
VM 2
VM 3
VM 4
ASA 1000V
Physical ASA
on Premise
Site-to-Site
IPSEC VPN
VM 5
VM 6
VM 7
VM 8
Company A - DEV
VM 1
VM 2
VM 3
VM 4
VM 5
VM 6
VM 7
VM 8
• Company A clones cloud servers for Production
and Development services
• ASA 1000V can provide dynamic and static
NAT as needed
NAT x-y
ASA 1000V
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 51© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 51Data Center Security
ASA 1000V Deployment: Internal Private Cloud
51
Zone 1 Zone 2 Zone 3
VM 1
VM 2
VM 3
VM 4
VFW 1
VM 5
VM 6
VM 7
VM 8
VFW 2 VFW 3
• Today multi context mode on ASA is used to provide
firewall inspection for multi tenant and multi zone
environments
• Trunks are typically used to transport zone and tenant
traffic
• Challenge of E-W scale requires more firewall
resources
• ASA 1000V provides edge firewall and can scale
alongside E-W buildout
• Each tenant or zone gets one or more ASA 1000V
• Provides NAT and DHCP services for scale
Vzone 1 Vzone 2
Multi Context Mode ASA
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 52© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 52Data Center Security
What is the Virtual Security Gateway?
• VSG is a L2 firewall that runs as a virtual machine
“bump in the wire”
• Similar to L2 transparent FW mode of ASA
• It provides stateful inspection between L2 adjacent
hosts (same subnet or VLAN)
• It can use VMware attributes for policy
• Provides benefits of L2 separation for East-West
traffic flows
• One or more VSGs are deployed per tenant
52
Virtual
Hosts
Virtual
Hosts
Virtual
Hosts
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 53© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 53Data Center Security
VM Attributes Used by VSG (Partial List)
Name Meaning Source
vm.name Name of this VM vCenter
vm.host-name Name of this ESX-host vCenter
vm.os-fullname Name of guest OS vCenter
vm.vapp-name Name of the associated
vApp
vCenter
vm.cluster-name Name of the cluster vCenter
vm.portprofile-name Name of the port-profile Port-profile
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 54© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 54Data Center Security
ASA1000V and VSG – 3 Tier Server Zone
54
Web Zone Database Application
VM 1
VM 2
VM 3
VM 4
VM 1
VM 2
VM 3
VM 4
VM 1
VM 2
VM 3
VM 4
NAT pool
ASA1000V Policy:
Block any external
web access to DB
servers
ASA1000V
Policy: Allow
only tcp/80 to
Web Zone
VSG: Only permit Web Zone
to access DB Zone
VSG: Permit App Zone to
access Web Zone but not DB
Tenant1
Tenant1
Web client
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 55© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 55Data Center Security
ASA1000V and VSG Compared
ASA1000V (Edge) Virtual Security Gateway
L3 routed mode only L2 mode (transparent)
Static routes only No routing
DHCP server and client support No DHCP support
Supports site-to-site IPSEC No IPSEC support
Managed by ASDM and VNMC Managed by VNMC only
Uses ASA code, CLI, SSH Minimal config via CLI, SSH
55
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 56
Virtualized Security
Cloud Services Router
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 57© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 57Data Center Security
57
External Cloud Networking Challenges
• Challenges
Inconsistent VPN Configuration
Incompatible IP addressing
Incomplete network services
• Extending Enterprise WAN to External Clouds
Different management tools
No WAN optimization options
Inability to prioritize traffic
Branch
ISRBranch
ISR
Branch
ISR
Data
Center ASR
Public Cloud
VPC/vDC
VPC/vDC
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 58© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 58Data Center Security
CSR 1000v
• Cisco IOS XE Software in Virtual Form-factor
• Cisco IOS XE Cloud Edition
• Selected feature set of Cisco IOS XE
• Virtual Route Processor (RP)
• Virtual Forwarding Processor (FP)
• Virtual Private Cloud/Data Center
Gateway
• Optimized for single tenant use cases
• Agnostic to Other Infrastructure
Elements
• Hypervisor agnostic
• Virtual switch agnostic
• Server agnostic
Server
Hypervisor
Virtual Switch
VPC/vDC
OS
App
CSR 1000v
OS
App
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 59© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 59Data Center Security
Use Case: Secure VPN Gateway
• Scalable, Dynamic, and Consistent Connectivity to External Cloud
CSR
1000v
Branch
ISR
WAN
Router
Distribution
and ToR
Switches
Servers
DC
ASR
CSR
1000v
Cloud Provider Data Center
Branch
ISR
Enterprise
Challenges
• Inconsistent security
• High network latency
• Limited scalability
Solutions
• IPSec VPN, DMVPN,
EZVPN, FlexVPN
• Routing and addressing
• Firewall, ACLs, AAA
Benefits
• Direct, secure access
• Scalable, reliable VPN
• Operational simplicity
Internet
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 60© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 60Data Center Security
Use Case: Traffic Control and Management
• Comprehensive Networking Services Gateway in External Cloud
CSR
1000v
WAN
Router
Distribution
and ToR
Switches
Servers
CSR
1000v
Cloud Provider Data Center
Enterprise
Optimized TCP connection
Challenges
• Response time of apps
• Application prioritization
• Connectivity resiliency
Solutions
• AppNav for WAAS
• QoS prioritization
• HSRP VPN resiliency
Benefits
• Single point of control
• Rich portfolio of service
and network features
vWAAS
HSRP
Branch
ISR
WAAS
Branch
ISR
WAAS
DC
ASR
WAAS
WAN
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 61
TrustSec in the DC
Security Group Tags
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 62© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 62Data Center Security
62
Security Group Based Access Control
SGACL
• Security Group Based Access Control allows customers:
• To keep existing logical design
• To change / apply policy from central management server
• To distribute policy enforcement to switches, routers and Firewalls
802.1X/MAB/Web Auth
HR Database (SGT=4)
IT Server (SGT=10)
I’m a contractor
My group is IT Admin
Contractor
& IT Admin
SGT = 10
SGT = 10
= SGT capable device
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 63© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 63Data Center Security
How SGT/SGA Scales Policy Control
• TrustSec tags every packet from identified sources with an “SGT” Security Group Tag. The
Tag shows which group the identified user belongs to.
• SGTs identify logical groups of users and/or servers sharing similar sets of privileges or
roles
• SGTs are 16-Bits (2-bytes) supporting up to 64K (65536) logical groups
Individuals
Sample
Logical Security Groups
Contractor
Employee
Partner
Guest
Unknown
Sample
Logical Security Groups
Individual Servers
Data Center
Sensitive
Company
Confidential
NDA
Confidential
General Access
In this simple example
source entities are
reduced from 46 to 4
In this simple example
destination entities are
reduced from 60 to 4
Example Access Policy Simplification
Before - 46 (source IPs) x 60 (dest IPs) x 4 TCP/UDP Port Permissions = 11040 ACE/ACLs
After - 4 (source SGTs) x 4 (dest SGs) x 4 TCP/UDP Port Permissions = 64 SGACLs
Tagged
Traffic
evaluated
against SG-
ACL on
Egress
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 64© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 64Data Center Security
Why Security Group Tags?
64
Source: Ken Hook
Traditional Discretionary Access
Control
Individuals Resources
Server 1
Permissions
Server 2
Server 3
Challenges
• Leads to ACE explosion
(# of sources) X (# of Destinations) X (# of permissions) = #
ACEs
• IP-address based ACLs are challenging
- Changes in addressing schemes
- Use of DHCP
- Proliferation of Wireless LAN devices
• Assumes relatively static placement of users/resources
TrustSec SGT Addresses these challenges via:
• Security Group Tags (SGT) provide a level of abstraction, reducing the
ACL/ACE proliferation dramatically
• Simplified Policy Definition – Security Groups are logical and Topology
Independent
• Portable Policy – Security Groups allows for mobility of users and resources
access-list 101 permit tcp S1/32 D1/32 eq http
access-list 101 permit tcp S1/32 D1/32 eq https
access-list 101 permit tcp S1/32 D2/32 eq ftp
access-list 101 permit tcp S1/32 D2/32 eq http
access-list 101 permit tcp S1/32 D2/32 eq https
access-list 101 permit tcp S1/32 D2/32 eq ftp
access-list 101 permit udp S1/32 D1/32 gt 1023
access-list 101 permit udp S1/32 D2/32 gt 1023
Access List for S1
Individuals
Resources
Security Groups
Partners
Employee
Contractor
Internet
Confidential
Special
Projects
Authz Rules
Authz Rules
Authz Rules
Authz Rules
Security Groups
Source Destination
Guest/Unknown
Print / Copy
Employee
Outside US
Access Rules
Access Rules
Source 1
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 65© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 65Data Center Security
65
How To Create SGT Policy
Doctor (SGT 7)
IT Admin (SGT 5)
IT Portal
(SGT 4)
Public Portal
(SGT 8)
Internal Portal
(SGT 9)
Patient Record DB
(SGT 10)
Destination
SGT
Source
SGT
Web Web No Access
Web
File Share
Web
SSH
RDP
File Share
Web
SSH
RDP
File Share
Full Access
SSH
RDP
File Share
permit tcp dst eq 443
permit tcp dst eq 80
permit tcp dst eq 22
permit tcp dst eq 3389
permit tcp dst eq 135
permit tcp dst eq 136
permit tcp dst eq 137
permit tcp dst eq 138
permit tcp des eq 139
deny ip
IT Maintenance ACL
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 66
Secure Data Center
Validated Architectures
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 67© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 67Data Center Security
Why Validation Matters
• We test to validate that certains systems coexist and function as expected
• Testing also exposes weaknesses to a given design or architecture
• Results are documented and shared to customers, partners and other entitites
• Customer facing labs like Customer Proof of Concept (CPOC) and ECATS
(Enhanced Customer Aligned Testing Service)
• Internal labs like the Virtualized Multiservice Data Center (VMDC) lab on
Cisco’s campus in Research Triangle Park, NC http://www.cisco.com/go/vmdc
• VMDC mission is to build a reference architecture for secure, scalable cloud
and traditional DCs
• Latest architecture version is 3.01
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 68© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 68Data Center Security
vPC Peer-link
vPC9 vPC10
7k-1
AGG-
VDC
7k-2
AGG-
VDC
7k-1
Core-
VDC
7k-2
Core-
VDC
(L2 Boundary)
VMNIC #3 VMNIC #2
VMNIC #3VMNIC#2
vPC11
vPC111
vPC66 vPC67
Secure DC Architecture 1.0
• Virtual Device Contexts (VDC) used to
create virtual core and aggregation layer
• Each ASA firewall is connected to
aggregation switch over a dedicated vPC
domain
• Each firewall is deployed in transparent
mode. Offers easiest integration with
existing addressing and flows and
additional services (load balancing, etc).
• Server gateway location is critical design
decision
• ASAs can be in A/S or A/A
s
Core 3 Core 4
Congo
AGG 1
VDC 2
Nigeria
AGG 2
VDC 2
OTV OTV
ASA4
Core 1 Core 2
AGG 1 AGG 2
OTV OTV
ASA1 ASA2 ASA3
OTV
Data Center 1 Data Center 2
20.3.1.0/24 .
2
.1
Core 3
OTV 3
20.4.1.0/24.
2
.1
Core 4
OTV 4
20.1.1.0/24 .
2
.1
Core 1
OTV 1
20.2.1.0/24.
2
.1
Core 2
OTV 2
OTV Site VLAN 700
vPC 10 vPC 11
OTV Site VLAN 700
vPC 25 vPC 26
Master
Secure DC Architecture 2.0 with Firewall Clustering
Clustering over OTV
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 70© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 70Data Center Security
Helpful Reference Links
• VPC Design Guide: http://www.cisco.com/en/US/prod/collateral/switches/ps9441/ps9670/C07-572830-
00_Agg_Dsgn_Config_DG.pdf
• Virtual Multi-Tenant Data Center (2013) (VMDC) 3.01 Validated Design
http://www.cisco.com/en/US/partner/docs/solutions/Enterprise/Data_Center/VMDC/3.0.1/DG/VMDC_3.0.1_DG.html
• Virtual Security Gateway (VSG) Deployment Guide
http://www.cisco.com/en/US/prod/collateral/modules/ps2706/ps11208/deployment_guide_c07-647435.html
• TrustSec 2.0 Design and Implementation Guide
http://www.cisco.com/en/US/partner/solutions/ns340/ns414/ns742/ns744/landing_DesignZone_TrustSec.html
• TAC Security Podcast http://www.cisco.com/en/US/solutions/ns170/tac/security_tac_podcasts.html
• ASA IPv6 Config Guide http://www.cisco.com/en/US/docs/security/asa/asa90/configuration/guide/route_ipv6_neighbor.html
70
Complete Your Paper
“Session Evaluation”
Give us your feedback and you could win
1 of 2 fabulous prizes in a random draw.
Complete and return your paper
evaluation form to the room attendant
as you leave this session.
Winners will be announced today.
You must be present to win!
..visit them at BOOTH# 100
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 72
Thank you.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 73
Appendix
Additional Slides
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 74© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 74Data Center Security
Overlay Transport Virtualization (OTV)
74
O
V
Overlay - A solution that is independent of the
infrastructure technology and services, flexible
over various inter-connect facilities
Transport - Transporting services for layer 2 and
layer 3 Ethernet and IP traffic
Virtualization - Provides virtual stateless multi-
access connections, which can be further
partitioned into VPNs, VRFs, VLANs
T
OTV delivers a virtual L2 transport over any L3 Infrastructure
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 75© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 75Data Center Security
Transport
Infrastructure
OTV OTV OTV OTV
MAC 1  MAC 3
Layer 2
Lookup
5
MAC 1  MAC 3Layer 2
Lookup
1 Encap
2
Decap
4
MAC 1  MAC 3
West
Site
MAC 1
MAC 3
East
Site
1. Layer 2 lookup on the destination MAC. MAC 3 is
reachable through IP B
2. The Edge Device encapsulates the frame
3. The transport delivers the packet to the Edge
Device on site East
4. The Edge Device on site East receives and
decapsulates the packet
5. Layer 2 lookup on the original frame. MAC 3 is a
local MAC
6. The frame is delivered to the destination
3
6
IP A IP B
MAC TABLE
VLAN MAC IF
100 MAC 1 Eth 2
100 MAC 2 Eth 1
100 MAC 3 IP B
100 MAC 4 IP B
MAC TABLE
VLAN MAC IF
100 MAC 1 IP A
100 MAC 2 IP A
100 MAC 3 Eth 3
100 MAC 4 Eth 4
IP A  IP BMAC 1  MAC 3
IP A  IP BMAC 1  MAC 3
OTV
75
• Extending Layer 2
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 76© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 76Data Center Security
FabricPath Terminology
76
• Interface connected to another
FabricPath device
• Sends/receives traffic with FabricPath
header
• Does not run spanning tree
• Does not perform MAC learning!
• Exchanges topology info through L2
ISIS adjacency
• Forwarding based on ‘Switch ID Table’
CE Edge Ports
FP Core Ports
Spine Switch
Leaf Switch
Classical Ethernet (CE)
S10 S20 S30 S40
S100 S200 S300
1/1 1/2
FabricPath (FP)
S100  S300A  B
A B
• Interface connected to traditional
network device
• Sends/receives traffic in standard
802.3 Ethernet frame format
• Participates in STP domain
• Forwarding based on MAC table
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 77© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 77Data Center Security
ASA Service Policy Selects Virtual Sensor
ASA service policy can select traffic based on incoming
interface, source/destination etc and direct different flows to
different virtual sensors.
It is possible to mix IDS and IPS Virtual Sensor so critical traffic
will not be impacted by Sensor
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 78© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 78Data Center Security
Multi-Sensor Environment with Cisco Security Manager 4.4
• Add all sensors into CSM
• Cleared a shared Policy and Policy
Bundle
• Assign the Policy Bundle to all cluster
members
• Tune the Policy Bundle
• “Submit and Deploy” to apply tuned
configuration to all members
• Deep technical overview here:
http://www.cisco.com/web/learning/le21/le39/docs/tdw_167_prezo.pdf

Contenu connexe

Tendances

From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmPriyanka Aash
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Security
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)Ahmed Ayman
 
The business case for SD WAN in the enterprise
The business case for SD WAN in the enterprise The business case for SD WAN in the enterprise
The business case for SD WAN in the enterprise Colt Technology Services
 
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKMaganathin Veeraragaloo
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoPrime Infoserv
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)Ahmad Haghighi
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)k33a
 
4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptxaungyekhant1
 
cyber-security-reference-architecture
cyber-security-reference-architecturecyber-security-reference-architecture
cyber-security-reference-architectureBirendra Negi ☁️
 
Cisco Meraki Portfolio Guide
Cisco Meraki Portfolio GuideCisco Meraki Portfolio Guide
Cisco Meraki Portfolio GuideMaticmind
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)Shah Sheikh
 
Cisco Security portfolio update
Cisco Security portfolio updateCisco Security portfolio update
Cisco Security portfolio updateAtanas Gergiminov
 
TechWiseTV Workshop: Cisco Catalyst 9100 Access Points for Wi-Fi 6
TechWiseTV Workshop: Cisco Catalyst 9100 Access Points for Wi-Fi 6TechWiseTV Workshop: Cisco Catalyst 9100 Access Points for Wi-Fi 6
TechWiseTV Workshop: Cisco Catalyst 9100 Access Points for Wi-Fi 6Robb Boyd
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMEAlienVault
 

Tendances (20)

From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity Chasm
 
Presentacion Palo Alto Networks
Presentacion Palo Alto NetworksPresentacion Palo Alto Networks
Presentacion Palo Alto Networks
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
The business case for SD WAN in the enterprise
The business case for SD WAN in the enterprise The business case for SD WAN in the enterprise
The business case for SD WAN in the enterprise
 
ClearPass Overview
ClearPass OverviewClearPass Overview
ClearPass Overview
 
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAlto
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
Cisco ASA Firewalls
Cisco ASA FirewallsCisco ASA Firewalls
Cisco ASA Firewalls
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx
 
cyber-security-reference-architecture
cyber-security-reference-architecturecyber-security-reference-architecture
cyber-security-reference-architecture
 
Cisco Meraki Portfolio Guide
Cisco Meraki Portfolio GuideCisco Meraki Portfolio Guide
Cisco Meraki Portfolio Guide
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
 
Soc
SocSoc
Soc
 
Cisco Security portfolio update
Cisco Security portfolio updateCisco Security portfolio update
Cisco Security portfolio update
 
TechWiseTV Workshop: Cisco Catalyst 9100 Access Points for Wi-Fi 6
TechWiseTV Workshop: Cisco Catalyst 9100 Access Points for Wi-Fi 6TechWiseTV Workshop: Cisco Catalyst 9100 Access Points for Wi-Fi 6
TechWiseTV Workshop: Cisco Catalyst 9100 Access Points for Wi-Fi 6
 
Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SME
 

En vedette

Future of Data Storage in the Cloud
Future of Data Storage in the CloudFuture of Data Storage in the Cloud
Future of Data Storage in the CloudBret Piatt
 
Converged Data Center: FCoE, iSCSI and the Future of Storage Networking
Converged Data Center: FCoE, iSCSI and the Future of Storage NetworkingConverged Data Center: FCoE, iSCSI and the Future of Storage Networking
Converged Data Center: FCoE, iSCSI and the Future of Storage NetworkingEMC
 
Webinar: Cloud Storage: The 5 Reasons IT Can Do it Better
Webinar: Cloud Storage: The 5 Reasons IT Can Do it BetterWebinar: Cloud Storage: The 5 Reasons IT Can Do it Better
Webinar: Cloud Storage: The 5 Reasons IT Can Do it BetterStorage Switzerland
 
Data Center Security Now and into the Future
Data Center Security Now and into the FutureData Center Security Now and into the Future
Data Center Security Now and into the FutureCisco Security
 
20 Data Center Site Selection Best Practices (SlideShare)
20 Data Center Site Selection Best Practices (SlideShare)20 Data Center Site Selection Best Practices (SlideShare)
20 Data Center Site Selection Best Practices (SlideShare)SP Home Run Inc.
 
Best practices-for-handling-it-equipment-in-a-data-center-server lift-corpora...
Best practices-for-handling-it-equipment-in-a-data-center-server lift-corpora...Best practices-for-handling-it-equipment-in-a-data-center-server lift-corpora...
Best practices-for-handling-it-equipment-in-a-data-center-server lift-corpora...serverlift15
 
Next Generation Data Center - IT Transformation
Next Generation Data Center - IT TransformationNext Generation Data Center - IT Transformation
Next Generation Data Center - IT TransformationDamian Hamilton
 
Tia 942 Data Center Standards
Tia 942 Data Center StandardsTia 942 Data Center Standards
Tia 942 Data Center StandardsSri Chalasani
 
Data center Building & General Specification
Data center Building & General Specification Data center Building & General Specification
Data center Building & General Specification Ali Mirfallah
 
POWER POINT PRESENTATION ON DATA CENTER
POWER POINT PRESENTATION ON DATA CENTERPOWER POINT PRESENTATION ON DATA CENTER
POWER POINT PRESENTATION ON DATA CENTERvivekprajapatiankur
 

En vedette (11)

Future of Data Storage in the Cloud
Future of Data Storage in the CloudFuture of Data Storage in the Cloud
Future of Data Storage in the Cloud
 
Converged Data Center: FCoE, iSCSI and the Future of Storage Networking
Converged Data Center: FCoE, iSCSI and the Future of Storage NetworkingConverged Data Center: FCoE, iSCSI and the Future of Storage Networking
Converged Data Center: FCoE, iSCSI and the Future of Storage Networking
 
Webinar: Cloud Storage: The 5 Reasons IT Can Do it Better
Webinar: Cloud Storage: The 5 Reasons IT Can Do it BetterWebinar: Cloud Storage: The 5 Reasons IT Can Do it Better
Webinar: Cloud Storage: The 5 Reasons IT Can Do it Better
 
Data Center Security Now and into the Future
Data Center Security Now and into the FutureData Center Security Now and into the Future
Data Center Security Now and into the Future
 
20 Data Center Site Selection Best Practices (SlideShare)
20 Data Center Site Selection Best Practices (SlideShare)20 Data Center Site Selection Best Practices (SlideShare)
20 Data Center Site Selection Best Practices (SlideShare)
 
Best practices-for-handling-it-equipment-in-a-data-center-server lift-corpora...
Best practices-for-handling-it-equipment-in-a-data-center-server lift-corpora...Best practices-for-handling-it-equipment-in-a-data-center-server lift-corpora...
Best practices-for-handling-it-equipment-in-a-data-center-server lift-corpora...
 
Next Generation Data Center - IT Transformation
Next Generation Data Center - IT TransformationNext Generation Data Center - IT Transformation
Next Generation Data Center - IT Transformation
 
Tia 942 Data Center Standards
Tia 942 Data Center StandardsTia 942 Data Center Standards
Tia 942 Data Center Standards
 
Data center Building & General Specification
Data center Building & General Specification Data center Building & General Specification
Data center Building & General Specification
 
Datacenter overview
Datacenter overviewDatacenter overview
Datacenter overview
 
POWER POINT PRESENTATION ON DATA CENTER
POWER POINT PRESENTATION ON DATA CENTERPOWER POINT PRESENTATION ON DATA CENTER
POWER POINT PRESENTATION ON DATA CENTER
 

Similaire à Data Center Security

Presentation cisco data center security deep dive
Presentation   cisco data center security deep divePresentation   cisco data center security deep dive
Presentation cisco data center security deep divexKinAnx
 
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:Cisco Canada
 
PLNOG14: Application Centric Infrastructure Introduction - Nick Martin
PLNOG14: Application Centric Infrastructure Introduction - Nick MartinPLNOG14: Application Centric Infrastructure Introduction - Nick Martin
PLNOG14: Application Centric Infrastructure Introduction - Nick MartinPROIDEA
 
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...Cisco Russia
 
Cisco prime network 4.1 technical overview
Cisco prime network 4.1 technical overviewCisco prime network 4.1 technical overview
Cisco prime network 4.1 technical overviewsolarisyougood
 
End-to-End Data Center Virtualization
End-to-End Data Center VirtualizationEnd-to-End Data Center Virtualization
End-to-End Data Center VirtualizationCisco Canada
 
Enterprise Architecture, Deployment and Positioning
Enterprise Architecture, Deployment and Positioning Enterprise Architecture, Deployment and Positioning
Enterprise Architecture, Deployment and Positioning Cisco Russia
 
Introduction to Segment Routing
Introduction to Segment RoutingIntroduction to Segment Routing
Introduction to Segment RoutingMyNOG
 
The Data Center Network Evolution
The Data Center Network EvolutionThe Data Center Network Evolution
The Data Center Network EvolutionCisco Canada
 
Deploying Applications in Today’s Network Infrastructure
Deploying Applications in Today’s Network InfrastructureDeploying Applications in Today’s Network Infrastructure
Deploying Applications in Today’s Network InfrastructureCisco Canada
 
Security & Virtualization in the Data Center
Security & Virtualization in the Data CenterSecurity & Virtualization in the Data Center
Security & Virtualization in the Data CenterCisco Russia
 
Scalable midsize data center designs
Scalable midsize data center designsScalable midsize data center designs
Scalable midsize data center designsJing Bai
 
Integration and Interoperation of existing Nexus networks into an ACI Archite...
Integration and Interoperation of existing Nexus networks into an ACI Archite...Integration and Interoperation of existing Nexus networks into an ACI Archite...
Integration and Interoperation of existing Nexus networks into an ACI Archite...Cisco Canada
 
Presentation cloud orchestration
Presentation   cloud orchestrationPresentation   cloud orchestration
Presentation cloud orchestrationxKinAnx
 
Brocade Ethernet Fabrics and the ODDC
Brocade Ethernet Fabrics and the ODDCBrocade Ethernet Fabrics and the ODDC
Brocade Ethernet Fabrics and the ODDCEMC Nederland
 
MX Deep Dive PPT
MX Deep Dive PPTMX Deep Dive PPT
MX Deep Dive PPTomar awad
 
Wireless Feature Update
Wireless Feature UpdateWireless Feature Update
Wireless Feature UpdateCisco Canada
 

Similaire à Data Center Security (20)

BRKCRS-2110.pdf
BRKCRS-2110.pdfBRKCRS-2110.pdf
BRKCRS-2110.pdf
 
Presentation cisco data center security deep dive
Presentation   cisco data center security deep divePresentation   cisco data center security deep dive
Presentation cisco data center security deep dive
 
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
 
PLNOG14: Application Centric Infrastructure Introduction - Nick Martin
PLNOG14: Application Centric Infrastructure Introduction - Nick MartinPLNOG14: Application Centric Infrastructure Introduction - Nick Martin
PLNOG14: Application Centric Infrastructure Introduction - Nick Martin
 
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
 
Cisco prime network 4.1 technical overview
Cisco prime network 4.1 technical overviewCisco prime network 4.1 technical overview
Cisco prime network 4.1 technical overview
 
End-to-End Data Center Virtualization
End-to-End Data Center VirtualizationEnd-to-End Data Center Virtualization
End-to-End Data Center Virtualization
 
Enterprise Architecture, Deployment and Positioning
Enterprise Architecture, Deployment and Positioning Enterprise Architecture, Deployment and Positioning
Enterprise Architecture, Deployment and Positioning
 
Introduction to Segment Routing
Introduction to Segment RoutingIntroduction to Segment Routing
Introduction to Segment Routing
 
The Data Center Network Evolution
The Data Center Network EvolutionThe Data Center Network Evolution
The Data Center Network Evolution
 
Deploying Applications in Today’s Network Infrastructure
Deploying Applications in Today’s Network InfrastructureDeploying Applications in Today’s Network Infrastructure
Deploying Applications in Today’s Network Infrastructure
 
Security & Virtualization in the Data Center
Security & Virtualization in the Data CenterSecurity & Virtualization in the Data Center
Security & Virtualization in the Data Center
 
Scalable midsize data center designs
Scalable midsize data center designsScalable midsize data center designs
Scalable midsize data center designs
 
BRKSEC-3035.pdf
BRKSEC-3035.pdfBRKSEC-3035.pdf
BRKSEC-3035.pdf
 
Integration and Interoperation of existing Nexus networks into an ACI Archite...
Integration and Interoperation of existing Nexus networks into an ACI Archite...Integration and Interoperation of existing Nexus networks into an ACI Archite...
Integration and Interoperation of existing Nexus networks into an ACI Archite...
 
CCNP Security-Firewall
CCNP Security-FirewallCCNP Security-Firewall
CCNP Security-Firewall
 
Presentation cloud orchestration
Presentation   cloud orchestrationPresentation   cloud orchestration
Presentation cloud orchestration
 
Brocade Ethernet Fabrics and the ODDC
Brocade Ethernet Fabrics and the ODDCBrocade Ethernet Fabrics and the ODDC
Brocade Ethernet Fabrics and the ODDC
 
MX Deep Dive PPT
MX Deep Dive PPTMX Deep Dive PPT
MX Deep Dive PPT
 
Wireless Feature Update
Wireless Feature UpdateWireless Feature Update
Wireless Feature Update
 

Plus de Cisco Canada

Cisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco Canada
 
Cisco connect montreal 2018 iot demo kinetic fr
Cisco connect montreal 2018   iot demo kinetic frCisco connect montreal 2018   iot demo kinetic fr
Cisco connect montreal 2018 iot demo kinetic frCisco Canada
 
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco Canada
 
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018    secure dcCisco connect montreal 2018    secure dc
Cisco connect montreal 2018 secure dcCisco Canada
 
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018   enterprise networks - say goodbye to vla nsCisco connect montreal 2018   enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018 enterprise networks - say goodbye to vla nsCisco Canada
 
Cisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco Canada
 
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec CiscoCisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec CiscoCisco Canada
 
Cisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco Canada
 
Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Cisco Canada
 
Cisco connect montreal 2018 compute v final
Cisco connect montreal 2018   compute v finalCisco connect montreal 2018   compute v final
Cisco connect montreal 2018 compute v finalCisco Canada
 
Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco Canada
 
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco Canada
 
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...Cisco Canada
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kineticCisco Canada
 
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...Cisco Canada
 
Cisco Connect Toronto 2018 DevNet Overview
Cisco Connect Toronto 2018  DevNet OverviewCisco Connect Toronto 2018  DevNet Overview
Cisco Connect Toronto 2018 DevNet OverviewCisco Canada
 
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018  DNA assuranceCisco Connect Toronto 2018  DNA assurance
Cisco Connect Toronto 2018 DNA assuranceCisco Canada
 
Cisco Connect Toronto 2018 network-slicing
Cisco Connect Toronto 2018   network-slicingCisco Connect Toronto 2018   network-slicing
Cisco Connect Toronto 2018 network-slicingCisco Canada
 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco merakiCisco Canada
 
Cisco Connect Toronto 2018 sixty to zero
Cisco Connect Toronto 2018   sixty to zeroCisco Connect Toronto 2018   sixty to zero
Cisco Connect Toronto 2018 sixty to zeroCisco Canada
 

Plus de Cisco Canada (20)

Cisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devops
 
Cisco connect montreal 2018 iot demo kinetic fr
Cisco connect montreal 2018   iot demo kinetic frCisco connect montreal 2018   iot demo kinetic fr
Cisco connect montreal 2018 iot demo kinetic fr
 
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
 
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018    secure dcCisco connect montreal 2018    secure dc
Cisco connect montreal 2018 secure dc
 
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018   enterprise networks - say goodbye to vla nsCisco connect montreal 2018   enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
 
Cisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse locale
 
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec CiscoCisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
 
Cisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybrides
 
Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018
 
Cisco connect montreal 2018 compute v final
Cisco connect montreal 2018   compute v finalCisco connect montreal 2018   compute v final
Cisco connect montreal 2018 compute v final
 
Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2
 
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
 
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
 
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
 
Cisco Connect Toronto 2018 DevNet Overview
Cisco Connect Toronto 2018  DevNet OverviewCisco Connect Toronto 2018  DevNet Overview
Cisco Connect Toronto 2018 DevNet Overview
 
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018  DNA assuranceCisco Connect Toronto 2018  DNA assurance
Cisco Connect Toronto 2018 DNA assurance
 
Cisco Connect Toronto 2018 network-slicing
Cisco Connect Toronto 2018   network-slicingCisco Connect Toronto 2018   network-slicing
Cisco Connect Toronto 2018 network-slicing
 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
 
Cisco Connect Toronto 2018 sixty to zero
Cisco Connect Toronto 2018   sixty to zeroCisco Connect Toronto 2018   sixty to zero
Cisco Connect Toronto 2018 sixty to zero
 

Dernier

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 

Dernier (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Data Center Security

  • 1. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Connect 11© 2013 Cisco and/or its affiliates. All rights reserved. Toronto, Canada May 30, 2013 Data Centre Security Best Practices and Achitecture Mason Harris, CCIE #5916 Solutions Architect Advanced Technology Team
  • 2. Agenda • Today’s DC Architecture • Threat Prevention • Threat Visibility • Virtualized Security • Validated Architectures • Summary
  • 3. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 3 DC Architecure: Building Blocks
  • 4. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 4© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 4Data Center Security Building an Efficient DC Fabric to Scale 4 • Scaling the Network Fabric - Virtual Device Context (VDC) Nexus 7000 VDC – Virtual Device Contexts • Flexible separation/distribution of hardware resources and software components • Complete data plane and control plane separation • Complete software fault isolation • Securely delineated administrative contexts • Each physical interface can only be active in one VDC Layer 2 Protocols Layer 3 Protocols VLAN PVLAN OSPF BGP EIGRP GLBP HSRP IGMP UDLD CDP 802.1XSTP LACP PIMCTS SNMP …… VDC 1 Layer 3 Protocols OSPF BGP EIGRP GLBP HSRP IGMP PIM SNMP … VDC 2 Layer 2 Protocols VLAN PVLAN UDLD CDP 802.1XSTP LACP CTS … VDCs
  • 5. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 5© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 5Data Center Security vPC Peers vPC Peers MCEC 5 • Allow a single device to use a port channel across two upstream switches (aka MCEC) • Eliminate STP blocked ports • Simplify L2 Paths by supporting loopfree non-blocking concurrent L2 paths • Dual-homed server operate in active-active mode • Provide fast convergence upon link/device failure Virtual PortChannels • Scaling the Fabric – Virtual Port Channel vPC) Logical Topology with vPC Aggregation Access Aggregation Access MCEC ! Enable vpc on the switch dc11-5020-1(config)# feature vpc ! Check the feature status dc11-5020-1(config)# show feature | include vpc vpc 1 enabled
  • 6. The Security Practicioner’s Challange • How to integrate security in a dynamic network (the DC) • Loss of traditional L2 and L3 boundaries • Other technologies like VXLAN, OTV and Vmotion extend the network topology • How do stateful inspection devices handle assymetric flows? • Where can I get flow visibility if there isn’t a network “edge”? • DC is rapidly changing, security services difficult to keep up
  • 7. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 7 Threat Prevention: Firewall and IPS
  • 8. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 8© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 8Data Center Security Why Deploy a Firewall in the DC? • Firewalls provide a stateful inspection point for access control • Can be either a physical appliance or virtual appliance • Frequently positioned between VRFs or VDC for granular control and visibility • Throughput is one consideration, but connection count is just as important due to applications and their services • Provide user and application visibility as well as flow based services • Virtual firewalls are an option where physical appliances can’t exist or rapid expansion of virtual services 8
  • 9. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 9© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 9Data Center Security Physical Firewalls: Service Modules and Appliances • Cisco currently only has one service module firewall, the ASA SM for the Catalyst 6500-E • SM firewalls have no physical interfaces and rely entirely on the existing switching infrastructure for packet flow • It uses VLANs to redirect which packets are inspected or bypassed • Uses same code base as physical appliances ASA firewalls 9
  • 10. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 10© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 10Data Center Security Physical Firewalls: ASA 5585 Appliances 10 • 2U chassis with dual power supplies on each blade • Can be deplyed as two firewalls or a firewall and services blade • 4 10G ports on 2 high end firewall blades, expansion card for more 10G ports • BreakingPoint Test Results: http://blogs.ixiacom.com/ixia-blog/cisco-asa-live-validation-with-breakingpoint-firestorm-ctm/ • Miercom report here: http://www.miercom.com/2011/06/cisco-asa-5585-x-vs-juniper-srx3600/
  • 11. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 11© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 11Data Center Security Virtualized Firewalls and Virtual Firewalls • Two types: multi-context mode and virtual firewalls • Multi-context mode was originally designed for SMT (Secure Multi Tenant) deployments and is a licensed feature • Virtual firewalls are software-only firewalls running in a hypervisor • Cisco has two virtual firewalls: the Virtual Security Gateway (VSG) and the ASA1000V • Both require the Nexus 1000V distributed virtual switch and an “Advanced” license • Virtual firewalls can be deployed rapidly with typical orchestration tools, etc. but there is an added layer of operational complexity • Virtual firewalls are heavily dependent on available RAM and CPU on the host server • We’ll cover virtual firewalls shortly 11
  • 12. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 12© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 12Data Center Security 4 Virtualized Firewalls - Common Configuration 12 • Firewalls can be in tranparent or routed mode or both (mixed mode 9.0+) • Physical links are typically trunks but could be physical interfaces • Contexts in routed mode can share VLANs, but not in transparent mode VLAN 10 VLAN 20 VLAN 30 VLAN 40 VLAN 11 VLAN 21 VLAN 31 VLAN 41 VFW 1 VFW 2 VFW 3 VFW 4
  • 13. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 13© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 13Data Center Security What is a Transparent mode Firewall? 13 • Transparent Firewall (L2) mode provides an option in traditional L3 environments where existing services can’t be sent through the firewall • Very popular architecture in data center environments • In L2 mode: • Routing protocols can establish adjacencies through the firewall • Protocols such as HSRP, VRRP, GLBP can pass • Multicast streams can traverse the firewall • Non-IP traffic can be allowed (IPX, MPLS, BPDUs) • Allows for three forwarding interfaces, inside and outside and DMZ • NO dynamic routing protocol support or VPN support (sourced from ASA) • Specific design requirements, reference Configuration Guide for details
  • 14. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 14© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 14Data Center Security How Does Transparent Mode Work? • Firewall functions like a bridge (“bump in the wire”) at L2, only ARP packets pass without an explicit ACL • Still can use traditional ACLs on the firewall • Does not forward Cisco Discovery Protocol (CDP) • Same subnet exists on all interfaces in the bridge-group • Different VLANs on inside and outside interfaces • In addition to Extended ACLs, use an EtherType ACL to restrict or allow L2 protocols
  • 15. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 15© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 15Data Center Security 10.1.1.0 /24 – vlan 10 10.1.1.0 /24 – vlan 20 BVI 1: 10.1.1.100 /24 firewall transparent hostname ciscoasa ! interface GigabitEthernet0/0 vlan 20 nameif outside security-level 0 bridge-group 1 ! interface GigabitEthernet0/1 vlan 10 nameif inside security-level 100 bridge-group 1 ! interface BVI1 ip address 10.1.1.100 255.255.255.0 Transparent Mode Configuration (2 interfaces shown) Bridge-group 1 Up to 4 interfaces are permitted per bridge-group
  • 16. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 16© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 16Data Center Security Data Center: ASA L2 FW – Design #1 • ASAs in transparent mode with upstream L3 gateway • Server gateway on outside of firewall • Firewall is L2 adjacent and in path to hosts • Segmentation through VLAN assignment Vlan 10 (Inside) vlan 20 VIP: 10.1.1.254 L3 Switch Hosts: 10.1.1.1-99 10.1.1.x /24 Vlan 20 (Outside) ASA HA Pair BVI: 10.1.1.100 Virtual Hosts
  • 17. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 17© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 17Data Center Security Data Center: ASA L2 FW – Design #2 VDC-Out Outside Inside VDC-In HSRP VIP: 10.1.1.254 Single L2 Domain Firewalls for Intra-VDC Traffic • ASA in either L2 or L3 mode, L2 is optimal in most cases • Add VRFs on Cat 6500 or Nexus 7K for segmentation • Server gateway inside of firewall • Minimizes firewall failures, route around failures if needed Virtual Hostsvlan 20vlan xvlan y 10.199.199.210.199.199.1
  • 18. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 18© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 18Data Center Security N7k1-VDC-2 Aggregation vrf1 vrf2 ASA L2 FW – Design #3 • Transparent (L2) firewall services are “sandwiched” between Nexus VDCs • Allows for other services (IPS, LB, etc) to be layered in as needed • ASAs can be virtualized to for 1x1 mapping to VRFs • Useful for topologies that require a FW between aggregation and core • Downside is that most/all traffic destined for Core traverses FW; possible bottleneck, etc. • Firewalls could be L2 or L3 N7k1-VDC-1 Core vrf1 vrf2 Firewalls for Inter-VDC Traffic
  • 19. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 19© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 19Data Center Security Interface Redundancy: Port Channels 19 • Port channel support was added to the ASA in 8.4 (2011) • Best practice: Utilize Link Aggregation Control Protocol (LACP) where possible • LACP dynamically adds and removes (if necessary) links to the port channel bundle • Up to 8 active links and 8 standby links are supported in the channel • Link aggregation benefit • Best practice in the DC is to use Virtual Port Channels interface TenGigabitEthernet0/8 channel-group 40 mode active no nameif no security-level ! interface TenGigabitEthernet0/9 channel-group 40 mode active no nameif no security-level ! interface Port-channel40 nameif inside ip add 10.1.1.2 255.255.255.0 Actively negotiate LACP with switch
  • 20. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 20© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 20Data Center Security ‘Show port-channel summary' on ASA Flags: D – down P - bundled in port-channel I - stand-alone s – suspended H - Hot-standby (LACP only) U - in use N - not in use, no aggregation/nameif M - not in use, no aggregation due to minimum links not met w - waiting to be aggregated Number of channel-groups in use: 1 Group Port-channel Protocol Span-cluster Ports ------+-------------+---------+------------+--------------------------- 40 Po40(U) LACP No Te0/8(P) Te0/9(P) 20
  • 21. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 21© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 21Data Center Security Virtual Port Channels (VPC) and the ASA 21 • Virtual Port Channels (VPC) are port channels where both links are actively forwarding traffic • Only two uplinks • VPC was created to solve two inherent network problems: Spanning-tree recalculation times and unused capacity in redundant L2 uplinks (due to STP blocks) • No additional config required on ASA • Supported in Nexus devices • VPC Design Guide: http://www.cisco.com/en/US/prod/collateral/switches/ps9441/ps96 70/C07-572830-00_Agg_Dsgn_Config_DG.pdf Nexus 5K/7Ks ASA
  • 22. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 22 Firewall Clustering
  • 23. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 23© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 23Data Center Security ASA Clustering Design Guidelines • Up to 8 ASAs are supported in a cluster (minimum of two) and all must be the same model and DRAM (only flash memory can differ) • All cluster units must share same software except during upgrade (e.g. 9.0(0)1 to 9.0(0)3) • Approximate maximum cluster throughput is ~ 70% of combined throughput and connections of units in the cluster • Cluster elects one master that syncs configuration with other members • Supported in both routed (L3) and transparent (L2) firewall modes • Requires at least one cluster control interface on ASA for cluster control plane – this is analogous to state and failover link in A/S today • Cluster control links must be sized properly to accept a load that is equal to or greater than the cluster throughput 23
  • 24. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 24© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 24Data Center Security Clustering Best Practices – Control Plane 24 • Cluster control links must be sized accordingly (e.g.10GE interfaces) • Recommended to use a local port-channel on each ASA for link redundancy and aggregation • Do NOT use a spanned port-channel for cluster control links • Could also use ASA interface redundancy which supports up to 8 pairs of interfaces in an active-passive mode ManagementNetwork Cluster Control Links M0/0 M0/0 M0/0 M0/0
  • 25. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 25© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 25Data Center Security Clustering Best Practices – Cat 6K Data Plane 25 Inside Switch Outside Switch • ASA clustering relies upon stateless load balancing from an external mechanism • Recommended method is to use a L2 spanned port-channel to a switch for ingress and egress connections • BP is to use a symmetrical hashing algorithm like src-dest IP (the default) • Could also use Policy Based Routing (PBR) or Equal Cost Multi-Path (ECMP); use both with Object Tracking L3 only • Cat 6K VSS is supported with ASA clustering • Spanned port-channel will not come up until clustering is enabled! “Spanned” Port-Channels
  • 26. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 26© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 26Data Center Security Clustering Best Practices – Nexus 7K Data Plane 26 Nexus 7K • Nexus 7K data center offers advantages with clustering due to VPC feature • All ASAs are dual homed to each 7K • VPC ensures that a single link failure will have zero packet loss • Enhancements to LACP such that ASA cluster appears as one logical firewall to rest of network • Port channel provides packet forwarding • ASAs in L2 or L3 mode Nexus 7K
  • 27. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 27© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 27Data Center Security TCP Session: Symmetric Traffic Flow • State replication from Owner to Director, also serves as failover message to provide redundancy should Owner fail • Director is selected per connection using consistent hashing algorithm • Director will act as backup should Owner fail InsideNetwork OutsideNetwork Owner SYN Client Server SYN/ACKSYN/ACK SYN Member 1. State update Director
  • 28. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 28© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 28Data Center Security TCP Session: Asymmetric Traffic Flow • Forwarder receives packet that it did not originate, queries Director • Packet is forwarded via cluster control link to Owner who then forwards on to originating client and all subsequent packets are forwarded to Owner with no lookup • This step is eliminated if the Owner can be derived via syn-cookies InsideNetwork OutsideNetwork Owner Director SYN Client Server SYN/ACK 1. State update SYN/ACK SYN Forwarder 2. Who is Owner? 3. Owner Location
  • 29. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 29© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 29Data Center Security FW+IPS Clustering with ASA 5585 Chassis • Clustering is supported 5585s which also support IPS module on top slot • Leverage ASA Clustering technology for : • Traffic load-balancing • Traffic Symmetry • High availability • Caveats • Every module is managed individually • No “Cluster” event correlation ClusterControlLink
  • 30. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 30 Threat Visibility: NetFlow
  • 31. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 31© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 31Data Center Security NetFlow Security Use Cases • Detecting Persistent Threats • Identify Botnet Command and Control Activity • Detect Network Reconaissance • Track Internal Malware Proliferation • Check for Data Loss (DLP)
  • 32. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 32© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 32Data Center Security Netflow Overview • Netflow was created by Cisco over 30 years ago as a flow accounting tool • If packet capture is like a wiretap then NetFlow is like a phone bill • We can learn a lot from studying the phone bill! • Today many devices support line rate Netflow (Catalyst family 15.0) while the Nexus 7K supports “Flexible” Netflow • ASA firewall has supported NSEL (Netflow Secure Event Logging) for many years • NSEL has three options: Track flows as they are built, torn down, updated or denied • Many vendors take in NetFlow data--Lancope, Arbor, Plixer are a few • Cisco OEM’s Lancope’s StealthWatch as Cybersecurity Threat Defense (CTD) 32
  • 33. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 33© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 33Data Center Security Flow Is Defined By Seven Unique Keys NetFlow Enabled Device Traffic •Input Interface •TOS byte (DSCP) •Layer 3 protocol •Destination port •Source port •Destination IP address •Source IP address •Input Interface •TOS byte (DSCP) •Layer 3 protocol •Destination port •Source port •Destination IP address •Source IP address Create a flow from the packet attributes … 152811000Address, ports… Bytes/packetPacketsFlow Information … 152811000Address, ports… Bytes/packetPacketsFlow Information NetFlow Cache Inspect Packet NetFlow Export Packets Reporting • Inspect a packet’s 7 key fields and identify the values • If the set of key field values is unique, create a new flow record or cache entry • When the flow terminates, export the flow to the collection/analysis system
  • 34. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 34© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 34Data Center Security Cyber Threat Defense Solution Components 34 Cisco Network StealthWatch FlowCollector StealthWatch Management Console NetFlow Users/Devices Cisco ISE NetFlow StealthWatch FlowReplicator Other tools/collecto rs https https NBAR NSEL NGA (NetFlow Generating Appliance)
  • 35. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 35© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 35Data Center Security Cisco CTD Solution: Attack Detection without Signatures High Concern Index indicates a significant number of suspicious events that deviate from established baselines Host Groups Host CI CI% Alarms Alerts Desktops 10.10.101.118 338,137,280 112,712% High Concern index Ping, Ping_Scan, TCP_Scan Monitor and baseline activity for a host and within host groups.
  • 36. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 36© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 36Data Center Security 1. Infected host opens connection from inside Detecting Command and Control 36 Devices Management StealthWatch FlowCollector StealthWatch Management Console Cisco ISE 3. Infrastructure generates a record of the communication using NetFlow 5. Contextual information added to NetFlow analysis 6. Concern Index increased Host Lock Violation alarm triggered 2. Commands are sent in return traffic NetFlow Capable 4. Collection and analysis of NetFlow data Internal Network
  • 37. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 37© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 37Data Center Security Detecting Command and Control 37 Alarm indicating communication with known BotNet Controllers IP Address Source user name Policy that triggered alarm Policy Start Active Time Alarms Source Source Host Groups Source User Name Target Target Host Group Inside Hosts Jan 27, 2012 Host Lock Violation 10.35.88.171 Remote VPN Bob ZeusServer.com Zeus BotNet Controllers
  • 38. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 38 Virtualized Security Nexus 1000V
  • 39. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 39© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 39Data Center Security Common Virtualization Concerns 39 • Policy Enforcement • Applied at physical server—not the individual VM • Impossible to enforce policy for VMs in motion • Operations and Management • Lack of VM visibility, accountability, and consistency • Difficult management model and inability to effectively troubleshoot • Roles and Responsibilities • Muddled ownership as server admin must configure virtual network • Organizational redundancy creates compliance challenges • Machine Segmentation • Server and application isolation on same physical server • No separation between compliant and non-compliant systems Hypervisor Roles and Responsibiliti es Isolation and Segmentation Management and Monitoring
  • 40. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 40© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 40Data Center Security Virtualization Security Concerns 40 • Operations and Management • Lack of VM visibility, accountability, and consistency • Difficult management model and inability to effectively troubleshoot vm issues • Machine Segmentation • Server and application isolation on same physical server • No separation between compliant and non-compliant systems • Lack of visibility • Unified policy requires a little more thought…and work Hypervisor Initial Infection Secondary Infection Hypervisor Tertiary Infection
  • 41. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 41© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 41Data Center Security What are North-South and East-West Flows? • North-South (N-S) flows are typically flows to and from Access layer to Aggregation Layer and Core • East-West (E-W) flows typically stay either within a zone or between zones and often server to server traffic 41 Web App Access Aggregation Core Database East - West North-South Virtual Hosts Virtual Hosts Virtual Hosts
  • 42. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 42© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 42Data Center Security 42 Nexus 1000V Architecture 42 Hypervisor Hypervisor Hypervisor Modular Switch … Linecard-N Supervisor-1 Supervisor-2 Linecard-1 Linecard-2 BackPlane VEM-NVEM-1 VEM-2 VSM1 VSM2 Network Admin Virtual Appliance Virtual Supervisor Module (VSM)  CLI interface into the Nexus 1000V  Leverages NX-OS  Controls multiple VEMs as a single network device  Not in data path! Virtual Ethernet Module (VEM)  Replaces Vmware DVS  Enables advanced switching capability on the hypervisor  Provides each VM with dedicated “switch ports” Server Admin Server Admin Server Admin
  • 43. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 43© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 43Data Center Security Nexus 1000V Architecture 43 port-profile type vethernet ASA1000V-1_Inside switchport mode access switchport access vlan 210 no shutdown state enabled port-profile type vethernet ASA1000V-Outside vmware port-group switchport access vlan 211 switchport mode access no shutdown state enabled Nexus 1000V supports: • ACLs • Quality of Service (QoS) • PVLANs • Port channels • SPAN ports
  • 44. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 44© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 44Data Center Security What is Vpath? • vPath is the forwarding “brains” built into the Virtual Ethernet Module (VEM) of the Nexus 1000V • It is an encapsulation that tags flows based upon attributes • It has two main functions: • Intelligent traffic steering • Offload processing from virtual service nodes (VSN) to VEM • vPath allows processing to be offloaded to Hypervisor for performance • Currently only supported on VMWare today with future support for Hyper-V and others • vPath is cornerstone for Cisco’s VSN delivery
  • 45. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 45 Virtualized Security Firewalls
  • 46. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 46© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 46Data Center Security Centralized or Decentralized Firewalls or Both? • Centralized firewalls are the traditional approach to virtualized host security • Often a transitional architecture • Firewalls in the core, aggregation or edge? • Big challenge is scalability • Usually the limiting factor is connections not bandwidth • How to handle a requirement for L2 separation of hosts? • How to address virtual host mobility? 46 Virtual Hosts Virtual Hosts Physical Hosts
  • 47. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 47© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 47Data Center Security Cisco’s Virtual Firewalls: VSG and ASA1000V • Cisco has two virtual firewalls: the ASA 1000V and the Virtual Security Gateway (VSG) • Each runs as a virtual machine in VMWare (future HyperV support) • Both are managed via Virtual Network Management Center (VNMC) • Both are licensed per CPU socket • They are complementary to each other and require the Nexus 1000V Distributed Virtual Switch and utilize a new forwarding plane, vPath 47 Virtual Security Gateway ASA 1000V
  • 48. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 48© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 48Data Center Security What is the ASA1000V Cloud Firewall? • ASA1000V is a software-only version of an ASA appliance—an edge firewall • Runs ASA codebase in a virtual machine in L3 mode only • Supports S2S IPSEC VPN (not RA VPN) • Can be deployed in active/standby HA • Subset of physical ASA features are supported, check docs for specifics (no multimode, no L2FW, etc) • Management via ASDM or VNMC but not both • Not a replacement for physical appliance! 48 Virtual Hosts Virtual Hosts Virtual Hosts 4 interfaces: inside, outside, failover and management
  • 49. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 49© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 49Data Center Security ASA 1000V Deployment: Public Cloud 49 Hosts Hosts Hosts Cloud Service Provider Company A VM 1 VM 2 VM 3 VM 4 ASA 1000V Physical ASA on Premise Site-to-Site IPSEC VPN VM 5 VM 6 VM 7 VM 8 • Company A has moved to virtualized cloud based servers • Requires connectivity between existing hosts (physical or virtual) • ASA 1000V acts as default gateway to cloud servers, DHCP services etc • S2S IPSEC VPN tunnel connects existing infrastructure to cloud • Other VPN devices can establish S2S tunnels with ASA1000V • No RA VPN support (AnyConnect)
  • 50. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 50© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 50Data Center Security ASA 1000V Deployment with NAT 50 Hosts Hosts Hosts Cloud Service Provider Company A - PROD VM 1 VM 2 VM 3 VM 4 ASA 1000V Physical ASA on Premise Site-to-Site IPSEC VPN VM 5 VM 6 VM 7 VM 8 Company A - DEV VM 1 VM 2 VM 3 VM 4 VM 5 VM 6 VM 7 VM 8 • Company A clones cloud servers for Production and Development services • ASA 1000V can provide dynamic and static NAT as needed NAT x-y ASA 1000V
  • 51. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 51© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 51Data Center Security ASA 1000V Deployment: Internal Private Cloud 51 Zone 1 Zone 2 Zone 3 VM 1 VM 2 VM 3 VM 4 VFW 1 VM 5 VM 6 VM 7 VM 8 VFW 2 VFW 3 • Today multi context mode on ASA is used to provide firewall inspection for multi tenant and multi zone environments • Trunks are typically used to transport zone and tenant traffic • Challenge of E-W scale requires more firewall resources • ASA 1000V provides edge firewall and can scale alongside E-W buildout • Each tenant or zone gets one or more ASA 1000V • Provides NAT and DHCP services for scale Vzone 1 Vzone 2 Multi Context Mode ASA
  • 52. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 52© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 52Data Center Security What is the Virtual Security Gateway? • VSG is a L2 firewall that runs as a virtual machine “bump in the wire” • Similar to L2 transparent FW mode of ASA • It provides stateful inspection between L2 adjacent hosts (same subnet or VLAN) • It can use VMware attributes for policy • Provides benefits of L2 separation for East-West traffic flows • One or more VSGs are deployed per tenant 52 Virtual Hosts Virtual Hosts Virtual Hosts
  • 53. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 53© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 53Data Center Security VM Attributes Used by VSG (Partial List) Name Meaning Source vm.name Name of this VM vCenter vm.host-name Name of this ESX-host vCenter vm.os-fullname Name of guest OS vCenter vm.vapp-name Name of the associated vApp vCenter vm.cluster-name Name of the cluster vCenter vm.portprofile-name Name of the port-profile Port-profile
  • 54. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 54© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 54Data Center Security ASA1000V and VSG – 3 Tier Server Zone 54 Web Zone Database Application VM 1 VM 2 VM 3 VM 4 VM 1 VM 2 VM 3 VM 4 VM 1 VM 2 VM 3 VM 4 NAT pool ASA1000V Policy: Block any external web access to DB servers ASA1000V Policy: Allow only tcp/80 to Web Zone VSG: Only permit Web Zone to access DB Zone VSG: Permit App Zone to access Web Zone but not DB Tenant1 Tenant1 Web client
  • 55. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 55© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 55Data Center Security ASA1000V and VSG Compared ASA1000V (Edge) Virtual Security Gateway L3 routed mode only L2 mode (transparent) Static routes only No routing DHCP server and client support No DHCP support Supports site-to-site IPSEC No IPSEC support Managed by ASDM and VNMC Managed by VNMC only Uses ASA code, CLI, SSH Minimal config via CLI, SSH 55
  • 56. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 56 Virtualized Security Cloud Services Router
  • 57. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 57© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 57Data Center Security 57 External Cloud Networking Challenges • Challenges Inconsistent VPN Configuration Incompatible IP addressing Incomplete network services • Extending Enterprise WAN to External Clouds Different management tools No WAN optimization options Inability to prioritize traffic Branch ISRBranch ISR Branch ISR Data Center ASR Public Cloud VPC/vDC VPC/vDC
  • 58. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 58© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 58Data Center Security CSR 1000v • Cisco IOS XE Software in Virtual Form-factor • Cisco IOS XE Cloud Edition • Selected feature set of Cisco IOS XE • Virtual Route Processor (RP) • Virtual Forwarding Processor (FP) • Virtual Private Cloud/Data Center Gateway • Optimized for single tenant use cases • Agnostic to Other Infrastructure Elements • Hypervisor agnostic • Virtual switch agnostic • Server agnostic Server Hypervisor Virtual Switch VPC/vDC OS App CSR 1000v OS App
  • 59. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 59© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 59Data Center Security Use Case: Secure VPN Gateway • Scalable, Dynamic, and Consistent Connectivity to External Cloud CSR 1000v Branch ISR WAN Router Distribution and ToR Switches Servers DC ASR CSR 1000v Cloud Provider Data Center Branch ISR Enterprise Challenges • Inconsistent security • High network latency • Limited scalability Solutions • IPSec VPN, DMVPN, EZVPN, FlexVPN • Routing and addressing • Firewall, ACLs, AAA Benefits • Direct, secure access • Scalable, reliable VPN • Operational simplicity Internet
  • 60. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 60© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 60Data Center Security Use Case: Traffic Control and Management • Comprehensive Networking Services Gateway in External Cloud CSR 1000v WAN Router Distribution and ToR Switches Servers CSR 1000v Cloud Provider Data Center Enterprise Optimized TCP connection Challenges • Response time of apps • Application prioritization • Connectivity resiliency Solutions • AppNav for WAAS • QoS prioritization • HSRP VPN resiliency Benefits • Single point of control • Rich portfolio of service and network features vWAAS HSRP Branch ISR WAAS Branch ISR WAAS DC ASR WAAS WAN
  • 61. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 61 TrustSec in the DC Security Group Tags
  • 62. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 62© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 62Data Center Security 62 Security Group Based Access Control SGACL • Security Group Based Access Control allows customers: • To keep existing logical design • To change / apply policy from central management server • To distribute policy enforcement to switches, routers and Firewalls 802.1X/MAB/Web Auth HR Database (SGT=4) IT Server (SGT=10) I’m a contractor My group is IT Admin Contractor & IT Admin SGT = 10 SGT = 10 = SGT capable device
  • 63. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 63© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 63Data Center Security How SGT/SGA Scales Policy Control • TrustSec tags every packet from identified sources with an “SGT” Security Group Tag. The Tag shows which group the identified user belongs to. • SGTs identify logical groups of users and/or servers sharing similar sets of privileges or roles • SGTs are 16-Bits (2-bytes) supporting up to 64K (65536) logical groups Individuals Sample Logical Security Groups Contractor Employee Partner Guest Unknown Sample Logical Security Groups Individual Servers Data Center Sensitive Company Confidential NDA Confidential General Access In this simple example source entities are reduced from 46 to 4 In this simple example destination entities are reduced from 60 to 4 Example Access Policy Simplification Before - 46 (source IPs) x 60 (dest IPs) x 4 TCP/UDP Port Permissions = 11040 ACE/ACLs After - 4 (source SGTs) x 4 (dest SGs) x 4 TCP/UDP Port Permissions = 64 SGACLs Tagged Traffic evaluated against SG- ACL on Egress
  • 64. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 64© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 64Data Center Security Why Security Group Tags? 64 Source: Ken Hook Traditional Discretionary Access Control Individuals Resources Server 1 Permissions Server 2 Server 3 Challenges • Leads to ACE explosion (# of sources) X (# of Destinations) X (# of permissions) = # ACEs • IP-address based ACLs are challenging - Changes in addressing schemes - Use of DHCP - Proliferation of Wireless LAN devices • Assumes relatively static placement of users/resources TrustSec SGT Addresses these challenges via: • Security Group Tags (SGT) provide a level of abstraction, reducing the ACL/ACE proliferation dramatically • Simplified Policy Definition – Security Groups are logical and Topology Independent • Portable Policy – Security Groups allows for mobility of users and resources access-list 101 permit tcp S1/32 D1/32 eq http access-list 101 permit tcp S1/32 D1/32 eq https access-list 101 permit tcp S1/32 D2/32 eq ftp access-list 101 permit tcp S1/32 D2/32 eq http access-list 101 permit tcp S1/32 D2/32 eq https access-list 101 permit tcp S1/32 D2/32 eq ftp access-list 101 permit udp S1/32 D1/32 gt 1023 access-list 101 permit udp S1/32 D2/32 gt 1023 Access List for S1 Individuals Resources Security Groups Partners Employee Contractor Internet Confidential Special Projects Authz Rules Authz Rules Authz Rules Authz Rules Security Groups Source Destination Guest/Unknown Print / Copy Employee Outside US Access Rules Access Rules Source 1
  • 65. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 65© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 65Data Center Security 65 How To Create SGT Policy Doctor (SGT 7) IT Admin (SGT 5) IT Portal (SGT 4) Public Portal (SGT 8) Internal Portal (SGT 9) Patient Record DB (SGT 10) Destination SGT Source SGT Web Web No Access Web File Share Web SSH RDP File Share Web SSH RDP File Share Full Access SSH RDP File Share permit tcp dst eq 443 permit tcp dst eq 80 permit tcp dst eq 22 permit tcp dst eq 3389 permit tcp dst eq 135 permit tcp dst eq 136 permit tcp dst eq 137 permit tcp dst eq 138 permit tcp des eq 139 deny ip IT Maintenance ACL
  • 66. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 66 Secure Data Center Validated Architectures
  • 67. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 67© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 67Data Center Security Why Validation Matters • We test to validate that certains systems coexist and function as expected • Testing also exposes weaknesses to a given design or architecture • Results are documented and shared to customers, partners and other entitites • Customer facing labs like Customer Proof of Concept (CPOC) and ECATS (Enhanced Customer Aligned Testing Service) • Internal labs like the Virtualized Multiservice Data Center (VMDC) lab on Cisco’s campus in Research Triangle Park, NC http://www.cisco.com/go/vmdc • VMDC mission is to build a reference architecture for secure, scalable cloud and traditional DCs • Latest architecture version is 3.01
  • 68. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 68© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 68Data Center Security vPC Peer-link vPC9 vPC10 7k-1 AGG- VDC 7k-2 AGG- VDC 7k-1 Core- VDC 7k-2 Core- VDC (L2 Boundary) VMNIC #3 VMNIC #2 VMNIC #3VMNIC#2 vPC11 vPC111 vPC66 vPC67 Secure DC Architecture 1.0 • Virtual Device Contexts (VDC) used to create virtual core and aggregation layer • Each ASA firewall is connected to aggregation switch over a dedicated vPC domain • Each firewall is deployed in transparent mode. Offers easiest integration with existing addressing and flows and additional services (load balancing, etc). • Server gateway location is critical design decision • ASAs can be in A/S or A/A
  • 69. s Core 3 Core 4 Congo AGG 1 VDC 2 Nigeria AGG 2 VDC 2 OTV OTV ASA4 Core 1 Core 2 AGG 1 AGG 2 OTV OTV ASA1 ASA2 ASA3 OTV Data Center 1 Data Center 2 20.3.1.0/24 . 2 .1 Core 3 OTV 3 20.4.1.0/24. 2 .1 Core 4 OTV 4 20.1.1.0/24 . 2 .1 Core 1 OTV 1 20.2.1.0/24. 2 .1 Core 2 OTV 2 OTV Site VLAN 700 vPC 10 vPC 11 OTV Site VLAN 700 vPC 25 vPC 26 Master Secure DC Architecture 2.0 with Firewall Clustering Clustering over OTV
  • 70. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 70© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 70Data Center Security Helpful Reference Links • VPC Design Guide: http://www.cisco.com/en/US/prod/collateral/switches/ps9441/ps9670/C07-572830- 00_Agg_Dsgn_Config_DG.pdf • Virtual Multi-Tenant Data Center (2013) (VMDC) 3.01 Validated Design http://www.cisco.com/en/US/partner/docs/solutions/Enterprise/Data_Center/VMDC/3.0.1/DG/VMDC_3.0.1_DG.html • Virtual Security Gateway (VSG) Deployment Guide http://www.cisco.com/en/US/prod/collateral/modules/ps2706/ps11208/deployment_guide_c07-647435.html • TrustSec 2.0 Design and Implementation Guide http://www.cisco.com/en/US/partner/solutions/ns340/ns414/ns742/ns744/landing_DesignZone_TrustSec.html • TAC Security Podcast http://www.cisco.com/en/US/solutions/ns170/tac/security_tac_podcasts.html • ASA IPv6 Config Guide http://www.cisco.com/en/US/docs/security/asa/asa90/configuration/guide/route_ipv6_neighbor.html 70
  • 71. Complete Your Paper “Session Evaluation” Give us your feedback and you could win 1 of 2 fabulous prizes in a random draw. Complete and return your paper evaluation form to the room attendant as you leave this session. Winners will be announced today. You must be present to win! ..visit them at BOOTH# 100
  • 72. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 72 Thank you.
  • 73. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 73 Appendix Additional Slides
  • 74. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 74© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 74Data Center Security Overlay Transport Virtualization (OTV) 74 O V Overlay - A solution that is independent of the infrastructure technology and services, flexible over various inter-connect facilities Transport - Transporting services for layer 2 and layer 3 Ethernet and IP traffic Virtualization - Provides virtual stateless multi- access connections, which can be further partitioned into VPNs, VRFs, VLANs T OTV delivers a virtual L2 transport over any L3 Infrastructure
  • 75. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 75© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 75Data Center Security Transport Infrastructure OTV OTV OTV OTV MAC 1  MAC 3 Layer 2 Lookup 5 MAC 1  MAC 3Layer 2 Lookup 1 Encap 2 Decap 4 MAC 1  MAC 3 West Site MAC 1 MAC 3 East Site 1. Layer 2 lookup on the destination MAC. MAC 3 is reachable through IP B 2. The Edge Device encapsulates the frame 3. The transport delivers the packet to the Edge Device on site East 4. The Edge Device on site East receives and decapsulates the packet 5. Layer 2 lookup on the original frame. MAC 3 is a local MAC 6. The frame is delivered to the destination 3 6 IP A IP B MAC TABLE VLAN MAC IF 100 MAC 1 Eth 2 100 MAC 2 Eth 1 100 MAC 3 IP B 100 MAC 4 IP B MAC TABLE VLAN MAC IF 100 MAC 1 IP A 100 MAC 2 IP A 100 MAC 3 Eth 3 100 MAC 4 Eth 4 IP A  IP BMAC 1  MAC 3 IP A  IP BMAC 1  MAC 3 OTV 75 • Extending Layer 2
  • 76. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 76© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 76Data Center Security FabricPath Terminology 76 • Interface connected to another FabricPath device • Sends/receives traffic with FabricPath header • Does not run spanning tree • Does not perform MAC learning! • Exchanges topology info through L2 ISIS adjacency • Forwarding based on ‘Switch ID Table’ CE Edge Ports FP Core Ports Spine Switch Leaf Switch Classical Ethernet (CE) S10 S20 S30 S40 S100 S200 S300 1/1 1/2 FabricPath (FP) S100  S300A  B A B • Interface connected to traditional network device • Sends/receives traffic in standard 802.3 Ethernet frame format • Participates in STP domain • Forwarding based on MAC table
  • 77. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 77© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 77Data Center Security ASA Service Policy Selects Virtual Sensor ASA service policy can select traffic based on incoming interface, source/destination etc and direct different flows to different virtual sensors. It is possible to mix IDS and IPS Virtual Sensor so critical traffic will not be impacted by Sensor
  • 78. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 78© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Connect 2013 78Data Center Security Multi-Sensor Environment with Cisco Security Manager 4.4 • Add all sensors into CSM • Cleared a shared Policy and Policy Bundle • Assign the Policy Bundle to all cluster members • Tune the Policy Bundle • “Submit and Deploy” to apply tuned configuration to all members • Deep technical overview here: http://www.cisco.com/web/learning/le21/le39/docs/tdw_167_prezo.pdf