SlideShare a Scribd company logo
1 of 18
Download to read offline
Quantum -
Firewall As A Service
Havana Design Summit, Portland, April 2013
Big Switch Networks (Sumit
Naiksatam, Kanzhe Jiang,
KC Wang, Mike Cohen)
Pay Pal (Vinay Bannai,
Anand Palanisamy)
VMware (Serge Maskalik,
Kai-Wei, Aaron Rosen,
Sachin Thakkar, Salvatore
Orlando)
Palo Alto Networks (Marc
Benoit)
Checkpoint (Tamir Zegman,
Bob Hinden)
Dell (Rajesh Mohan)
Red Hat (Gary Kotton) NTT (Nachi Ueno) Cisco (Sirdar Kandaswamy,
Dan Florea)
Design doc: https://docs.google.com/document/d/1PJaKvsX2MzMRlLGfR0fBkrMraHYF0flvl0sqyZ704tA/edit
Session Etherpad: https://etherpad.openstack.org/Quantum_Firewall_As_A_Service
Goal and Guiding Principles
● Offer rich security features of Firewalls to Quantum
users
● Tenant facing abstractions - users consume
services through a logical Firewall instance
● Will hide implementation and device management
details from the users
● No assumptions about virtual or physical Firewalls
● Adhere to established audit workflows, avoid
reinventing accepted definitions/conventions
● Model for a reasonable common denominator, allow
for extensions
Use Case
Web-Tier
Firewall and
Load Balancer
Mid-Tier
Firewall and
Load Balancer
Data-Tier
Firewall and
Load Balancer
Storage
North-South Traffic
East – West
Traffic
Use Cases
- Multi-tier
- Firewalls fronting load balancers
- Perimeter Firewall
- Security Groups
- Need a unified way to define security
- Auditing
- Logging
- Firewall state enforcement
Resource Model
Firewalls - A logical instance of a firewall
embodying a Firewall Policy
Firewall Policies - An ordered collection of
Firewall Rules
Firewall Rules - N-tuple that generically models
firewall rules
Entity Relationship
One Firewall -> One Firewall Policy
One Firewall Policy -> Many Firewall Rules
One Firewall Policy -> Many Firewalls (policies
can be reused)
One Firewall Rule -> Many Firewall Policies
(rules can be reused)
1
Workflow
Firewall Rules are defined and Firewall Policy
is composed
Firewall Policy is audited (audit process in not
modeled here)
Tenant creates Firewall instance using Firewall
Policy
Existing Firewalls
Resource Model
Firewall Rules - Attributes
Core attributes: id, name, description, source,
destination, action, service, action
Extension candidates: user, firewall service
profile, logging, zones
Source and destination can point to raw IP
addresses or grouping/dynamic/placeholder
objects
Firewall Policies - Attributes
Core attributes: id, name, description, firewall
rules, audited, shared
Firewall rules: an ordered list of firewall rules
Firewall Instances - Attributes
Core attributes: id, name, description, firewall
policy id, service type
Extension candidates: firewall rules blob
Dynamic and Grouping Objects
● Allow placeholders to be inserted into
firewall rules
● Avoids having to audit firewall policies for
dynamic tenant attributes
● Potentially avoids rules sprawl
● Commonly used for source and destination
fields
Firewall Insertion Types
Q-Router
+ Q-
Firewall
Quantum
Network
Quantum
Network
Q-Router - Quantum Logical Router Instance
Q-Firewall - Quantum Logical Firewall Instance
Bump-in-the-wire
insertion
Quantum
Network
Quantum
Network
Q-Firewall
L2 insertion
L3 insertion
Quantum
Network
Quantum
Network
Q-Firewall
Quantum
Network
Firewall Service attachment
● Service has one or more interfaces
(number of interfaces depend on the service
type)
● Each interface plugs into a Quantum port
● Plugging operations is performed by an
interface driver
(interface driver is specific to the Firewall
technology)
Firewall Service Instances
Base Service Definition:
- service type
- ingress/egress ports
Firewall Service
Service Type:
- one of [LB, FW, ...]
- service insertion type [L2,
L3, BITW, Tap]
- vendor
Firewall Instances
1
*
Havana Roadmap
● API, Resource and DB model
implementation: https://blueprints.launchpad.
net/quantum/+spec/quantum-fwaas
● Plugin integration
● Base firewall implementation/libraries
● CLI Support
● Horizon Support

More Related Content

What's hot

Lightweight M2M 1.1 - LwM2M 1.1 Protocol Overview & New Features
Lightweight M2M 1.1 - LwM2M 1.1 Protocol Overview & New FeaturesLightweight M2M 1.1 - LwM2M 1.1 Protocol Overview & New Features
Lightweight M2M 1.1 - LwM2M 1.1 Protocol Overview & New FeaturesAVSystem
 
Modeling self-adaptative IoT architectures
Modeling self-adaptative IoT architecturesModeling self-adaptative IoT architectures
Modeling self-adaptative IoT architecturesIván Alfonso
 
OMA Lightweight M2M Tutorial
OMA Lightweight M2M TutorialOMA Lightweight M2M Tutorial
OMA Lightweight M2M Tutorialzdshelby
 
Architecting Azure IoT Solutions
Architecting Azure IoT SolutionsArchitecting Azure IoT Solutions
Architecting Azure IoT SolutionsGlobalLogic Ukraine
 
Zoura Subscribed 2013 LinkBermuda Metered Cloud Services
Zoura Subscribed 2013 LinkBermuda Metered Cloud ServicesZoura Subscribed 2013 LinkBermuda Metered Cloud Services
Zoura Subscribed 2013 LinkBermuda Metered Cloud ServicesWinston Morton
 
Cloud, SDN, NFV
Cloud, SDN, NFVCloud, SDN, NFV
Cloud, SDN, NFVIgor D.C.
 
Gluing the IoT world with Java and LoRaWAN (Jfokus 2018)
Gluing the IoT world with Java and LoRaWAN (Jfokus 2018)Gluing the IoT world with Java and LoRaWAN (Jfokus 2018)
Gluing the IoT world with Java and LoRaWAN (Jfokus 2018)Pance Cavkovski
 
Optimising nfv service chains on open stack using docker
Optimising nfv service chains on open stack using dockerOptimising nfv service chains on open stack using docker
Optimising nfv service chains on open stack using dockerAnanth Padmanabhan
 
Artificial Intelligence in the Network
Artificial Intelligence in the Network Artificial Intelligence in the Network
Artificial Intelligence in the Network Michelle Holley
 
Machine learning in optical
Machine learning in opticalMachine learning in optical
Machine learning in opticalVishal Waghmare
 
Network Function Virtualization - Security Best Practices AtlSecCon 2015
Network Function Virtualization - Security Best Practices AtlSecCon 2015Network Function Virtualization - Security Best Practices AtlSecCon 2015
Network Function Virtualization - Security Best Practices AtlSecCon 2015Winston Morton
 

What's hot (11)

Lightweight M2M 1.1 - LwM2M 1.1 Protocol Overview & New Features
Lightweight M2M 1.1 - LwM2M 1.1 Protocol Overview & New FeaturesLightweight M2M 1.1 - LwM2M 1.1 Protocol Overview & New Features
Lightweight M2M 1.1 - LwM2M 1.1 Protocol Overview & New Features
 
Modeling self-adaptative IoT architectures
Modeling self-adaptative IoT architecturesModeling self-adaptative IoT architectures
Modeling self-adaptative IoT architectures
 
OMA Lightweight M2M Tutorial
OMA Lightweight M2M TutorialOMA Lightweight M2M Tutorial
OMA Lightweight M2M Tutorial
 
Architecting Azure IoT Solutions
Architecting Azure IoT SolutionsArchitecting Azure IoT Solutions
Architecting Azure IoT Solutions
 
Zoura Subscribed 2013 LinkBermuda Metered Cloud Services
Zoura Subscribed 2013 LinkBermuda Metered Cloud ServicesZoura Subscribed 2013 LinkBermuda Metered Cloud Services
Zoura Subscribed 2013 LinkBermuda Metered Cloud Services
 
Cloud, SDN, NFV
Cloud, SDN, NFVCloud, SDN, NFV
Cloud, SDN, NFV
 
Gluing the IoT world with Java and LoRaWAN (Jfokus 2018)
Gluing the IoT world with Java and LoRaWAN (Jfokus 2018)Gluing the IoT world with Java and LoRaWAN (Jfokus 2018)
Gluing the IoT world with Java and LoRaWAN (Jfokus 2018)
 
Optimising nfv service chains on open stack using docker
Optimising nfv service chains on open stack using dockerOptimising nfv service chains on open stack using docker
Optimising nfv service chains on open stack using docker
 
Artificial Intelligence in the Network
Artificial Intelligence in the Network Artificial Intelligence in the Network
Artificial Intelligence in the Network
 
Machine learning in optical
Machine learning in opticalMachine learning in optical
Machine learning in optical
 
Network Function Virtualization - Security Best Practices AtlSecCon 2015
Network Function Virtualization - Security Best Practices AtlSecCon 2015Network Function Virtualization - Security Best Practices AtlSecCon 2015
Network Function Virtualization - Security Best Practices AtlSecCon 2015
 

Similar to Quantum firewall as a service open stack havana design summit, portland 2013

Places in the network (featuring policy)
Places in the network (featuring policy)Places in the network (featuring policy)
Places in the network (featuring policy)Jeff Green
 
Network Telemetry: Pushing Boundaries
Network Telemetry: Pushing BoundariesNetwork Telemetry: Pushing Boundaries
Network Telemetry: Pushing BoundariesRam (Ramki) Krishnan
 
Cisco Connect 2018 Thailand - Software defined access a transformational appr...
Cisco Connect 2018 Thailand - Software defined access a transformational appr...Cisco Connect 2018 Thailand - Software defined access a transformational appr...
Cisco Connect 2018 Thailand - Software defined access a transformational appr...NetworkCollaborators
 
Alexei_Plescan - updated
Alexei_Plescan - updatedAlexei_Plescan - updated
Alexei_Plescan - updatedAlexei Plescan
 
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Amazon Web Services
 
Lessons Learned during IBM SmartCloud Orchestrator Deployment at a Large Tel...
Lessons Learned during IBM SmartCloud Orchestrator Deployment at a Large Tel...Lessons Learned during IBM SmartCloud Orchestrator Deployment at a Large Tel...
Lessons Learned during IBM SmartCloud Orchestrator Deployment at a Large Tel...Eduardo Patrocinio
 
Security defined routing_cybergamut_v1_1
Security defined routing_cybergamut_v1_1Security defined routing_cybergamut_v1_1
Security defined routing_cybergamut_v1_1Joel W. King
 
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks
 
Building the SD-Branch using uCPE
Building the SD-Branch using uCPEBuilding the SD-Branch using uCPE
Building the SD-Branch using uCPEMichelle Holley
 
Design and Deploy Secure Clouds for Financial Services Use Cases
Design and Deploy Secure Clouds for Financial Services Use CasesDesign and Deploy Secure Clouds for Financial Services Use Cases
Design and Deploy Secure Clouds for Financial Services Use CasesPLUMgrid
 
ManageIQ Overview at Management and Orchestration Developer (MODM) Meet-up
ManageIQ Overview at Management and Orchestration Developer (MODM) Meet-upManageIQ Overview at Management and Orchestration Developer (MODM) Meet-up
ManageIQ Overview at Management and Orchestration Developer (MODM) Meet-upJerome Marc
 
MPLS/SDN 2013 Intercloud Standardization and Testbeds - Sill
MPLS/SDN 2013 Intercloud Standardization and Testbeds - SillMPLS/SDN 2013 Intercloud Standardization and Testbeds - Sill
MPLS/SDN 2013 Intercloud Standardization and Testbeds - SillAlan Sill
 
Silicon Valley CloudStack User Group - Designing CloudStack Clouds
Silicon Valley CloudStack User Group - Designing CloudStack CloudsSilicon Valley CloudStack User Group - Designing CloudStack Clouds
Silicon Valley CloudStack User Group - Designing CloudStack CloudsShapeBlue
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Srinivasa Addepalli
 
SDN_and_NFV_technologies_in_IoT_Networks
SDN_and_NFV_technologies_in_IoT_NetworksSDN_and_NFV_technologies_in_IoT_Networks
SDN_and_NFV_technologies_in_IoT_NetworksSrinivasa Addepalli
 
Introduction to Fog
Introduction to FogIntroduction to Fog
Introduction to FogCisco DevNet
 
Investigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureInvestigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureFiras Alsayied
 

Similar to Quantum firewall as a service open stack havana design summit, portland 2013 (20)

Places in the network (featuring policy)
Places in the network (featuring policy)Places in the network (featuring policy)
Places in the network (featuring policy)
 
Network Telemetry: Pushing Boundaries
Network Telemetry: Pushing BoundariesNetwork Telemetry: Pushing Boundaries
Network Telemetry: Pushing Boundaries
 
Cisco Connect 2018 Thailand - Software defined access a transformational appr...
Cisco Connect 2018 Thailand - Software defined access a transformational appr...Cisco Connect 2018 Thailand - Software defined access a transformational appr...
Cisco Connect 2018 Thailand - Software defined access a transformational appr...
 
Alexei_Plescan - updated
Alexei_Plescan - updatedAlexei_Plescan - updated
Alexei_Plescan - updated
 
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
 
Manjesh cv
Manjesh cvManjesh cv
Manjesh cv
 
Lessons Learned during IBM SmartCloud Orchestrator Deployment at a Large Tel...
Lessons Learned during IBM SmartCloud Orchestrator Deployment at a Large Tel...Lessons Learned during IBM SmartCloud Orchestrator Deployment at a Large Tel...
Lessons Learned during IBM SmartCloud Orchestrator Deployment at a Large Tel...
 
Security defined routing_cybergamut_v1_1
Security defined routing_cybergamut_v1_1Security defined routing_cybergamut_v1_1
Security defined routing_cybergamut_v1_1
 
Cloud Breach - Forensics Audit Planning
Cloud Breach - Forensics Audit PlanningCloud Breach - Forensics Audit Planning
Cloud Breach - Forensics Audit Planning
 
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-Sheet
 
Building the SD-Branch using uCPE
Building the SD-Branch using uCPEBuilding the SD-Branch using uCPE
Building the SD-Branch using uCPE
 
Design and Deploy Secure Clouds for Financial Services Use Cases
Design and Deploy Secure Clouds for Financial Services Use CasesDesign and Deploy Secure Clouds for Financial Services Use Cases
Design and Deploy Secure Clouds for Financial Services Use Cases
 
ManageIQ Overview at Management and Orchestration Developer (MODM) Meet-up
ManageIQ Overview at Management and Orchestration Developer (MODM) Meet-upManageIQ Overview at Management and Orchestration Developer (MODM) Meet-up
ManageIQ Overview at Management and Orchestration Developer (MODM) Meet-up
 
MPLS/SDN 2013 Intercloud Standardization and Testbeds - Sill
MPLS/SDN 2013 Intercloud Standardization and Testbeds - SillMPLS/SDN 2013 Intercloud Standardization and Testbeds - Sill
MPLS/SDN 2013 Intercloud Standardization and Testbeds - Sill
 
Resume
ResumeResume
Resume
 
Silicon Valley CloudStack User Group - Designing CloudStack Clouds
Silicon Valley CloudStack User Group - Designing CloudStack CloudsSilicon Valley CloudStack User Group - Designing CloudStack Clouds
Silicon Valley CloudStack User Group - Designing CloudStack Clouds
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2
 
SDN_and_NFV_technologies_in_IoT_Networks
SDN_and_NFV_technologies_in_IoT_NetworksSDN_and_NFV_technologies_in_IoT_Networks
SDN_and_NFV_technologies_in_IoT_Networks
 
Introduction to Fog
Introduction to FogIntroduction to Fog
Introduction to Fog
 
Investigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureInvestigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a Secure
 

More from Sumit Naiksatam

Open stack gbp final sn-4-slideshare
Open stack gbp final sn-4-slideshareOpen stack gbp final sn-4-slideshare
Open stack gbp final sn-4-slideshareSumit Naiksatam
 
Group-based Policy for Networking
Group-based Policy for NetworkingGroup-based Policy for Networking
Group-based Policy for NetworkingSumit Naiksatam
 
Group-based Policy For OpenStack Networking
Group-based Policy For OpenStack NetworkingGroup-based Policy For OpenStack Networking
Group-based Policy For OpenStack NetworkingSumit Naiksatam
 
Network Policy Abstractions in OpenStack Neutron
Network Policy Abstractions in OpenStack NeutronNetwork Policy Abstractions in OpenStack Neutron
Network Policy Abstractions in OpenStack NeutronSumit Naiksatam
 
OpenStack Neutron Service Chaining and Insertion
OpenStack Neutron Service Chaining and InsertionOpenStack Neutron Service Chaining and Insertion
OpenStack Neutron Service Chaining and InsertionSumit Naiksatam
 
Quantum services' chaining open stack havana design summit, portland 2013
Quantum services' chaining   open stack havana design summit, portland 2013Quantum services' chaining   open stack havana design summit, portland 2013
Quantum services' chaining open stack havana design summit, portland 2013Sumit Naiksatam
 
Quantum L3 (forwarding) model - OpenStack Folsom Design Summit
Quantum L3 (forwarding) model - OpenStack Folsom Design SummitQuantum L3 (forwarding) model - OpenStack Folsom Design Summit
Quantum L3 (forwarding) model - OpenStack Folsom Design SummitSumit Naiksatam
 

More from Sumit Naiksatam (8)

Open stack gbp final sn-4-slideshare
Open stack gbp final sn-4-slideshareOpen stack gbp final sn-4-slideshare
Open stack gbp final sn-4-slideshare
 
Group-based Policy for Networking
Group-based Policy for NetworkingGroup-based Policy for Networking
Group-based Policy for Networking
 
Group-based Policy For OpenStack Networking
Group-based Policy For OpenStack NetworkingGroup-based Policy For OpenStack Networking
Group-based Policy For OpenStack Networking
 
Network Policy Abstractions in OpenStack Neutron
Network Policy Abstractions in OpenStack NeutronNetwork Policy Abstractions in OpenStack Neutron
Network Policy Abstractions in OpenStack Neutron
 
OpenStack Neutron Service Chaining and Insertion
OpenStack Neutron Service Chaining and InsertionOpenStack Neutron Service Chaining and Insertion
OpenStack Neutron Service Chaining and Insertion
 
Quantum services' chaining open stack havana design summit, portland 2013
Quantum services' chaining   open stack havana design summit, portland 2013Quantum services' chaining   open stack havana design summit, portland 2013
Quantum services' chaining open stack havana design summit, portland 2013
 
Quantum L3 (forwarding) model - OpenStack Folsom Design Summit
Quantum L3 (forwarding) model - OpenStack Folsom Design SummitQuantum L3 (forwarding) model - OpenStack Folsom Design Summit
Quantum L3 (forwarding) model - OpenStack Folsom Design Summit
 
OpenStack Quantum
OpenStack QuantumOpenStack Quantum
OpenStack Quantum
 

Quantum firewall as a service open stack havana design summit, portland 2013

  • 1. Quantum - Firewall As A Service Havana Design Summit, Portland, April 2013 Big Switch Networks (Sumit Naiksatam, Kanzhe Jiang, KC Wang, Mike Cohen) Pay Pal (Vinay Bannai, Anand Palanisamy) VMware (Serge Maskalik, Kai-Wei, Aaron Rosen, Sachin Thakkar, Salvatore Orlando) Palo Alto Networks (Marc Benoit) Checkpoint (Tamir Zegman, Bob Hinden) Dell (Rajesh Mohan) Red Hat (Gary Kotton) NTT (Nachi Ueno) Cisco (Sirdar Kandaswamy, Dan Florea) Design doc: https://docs.google.com/document/d/1PJaKvsX2MzMRlLGfR0fBkrMraHYF0flvl0sqyZ704tA/edit Session Etherpad: https://etherpad.openstack.org/Quantum_Firewall_As_A_Service
  • 2. Goal and Guiding Principles ● Offer rich security features of Firewalls to Quantum users ● Tenant facing abstractions - users consume services through a logical Firewall instance ● Will hide implementation and device management details from the users ● No assumptions about virtual or physical Firewalls ● Adhere to established audit workflows, avoid reinventing accepted definitions/conventions ● Model for a reasonable common denominator, allow for extensions
  • 4. Web-Tier Firewall and Load Balancer Mid-Tier Firewall and Load Balancer Data-Tier Firewall and Load Balancer Storage North-South Traffic East – West Traffic
  • 5. Use Cases - Multi-tier - Firewalls fronting load balancers - Perimeter Firewall - Security Groups - Need a unified way to define security - Auditing - Logging - Firewall state enforcement
  • 6. Resource Model Firewalls - A logical instance of a firewall embodying a Firewall Policy Firewall Policies - An ordered collection of Firewall Rules Firewall Rules - N-tuple that generically models firewall rules
  • 7. Entity Relationship One Firewall -> One Firewall Policy One Firewall Policy -> Many Firewall Rules One Firewall Policy -> Many Firewalls (policies can be reused) One Firewall Rule -> Many Firewall Policies (rules can be reused) 1
  • 8. Workflow Firewall Rules are defined and Firewall Policy is composed Firewall Policy is audited (audit process in not modeled here) Tenant creates Firewall instance using Firewall Policy
  • 11. Firewall Rules - Attributes Core attributes: id, name, description, source, destination, action, service, action Extension candidates: user, firewall service profile, logging, zones Source and destination can point to raw IP addresses or grouping/dynamic/placeholder objects
  • 12. Firewall Policies - Attributes Core attributes: id, name, description, firewall rules, audited, shared Firewall rules: an ordered list of firewall rules
  • 13. Firewall Instances - Attributes Core attributes: id, name, description, firewall policy id, service type Extension candidates: firewall rules blob
  • 14. Dynamic and Grouping Objects ● Allow placeholders to be inserted into firewall rules ● Avoids having to audit firewall policies for dynamic tenant attributes ● Potentially avoids rules sprawl ● Commonly used for source and destination fields
  • 15. Firewall Insertion Types Q-Router + Q- Firewall Quantum Network Quantum Network Q-Router - Quantum Logical Router Instance Q-Firewall - Quantum Logical Firewall Instance Bump-in-the-wire insertion Quantum Network Quantum Network Q-Firewall L2 insertion L3 insertion Quantum Network Quantum Network Q-Firewall Quantum Network
  • 16. Firewall Service attachment ● Service has one or more interfaces (number of interfaces depend on the service type) ● Each interface plugs into a Quantum port ● Plugging operations is performed by an interface driver (interface driver is specific to the Firewall technology)
  • 17. Firewall Service Instances Base Service Definition: - service type - ingress/egress ports Firewall Service Service Type: - one of [LB, FW, ...] - service insertion type [L2, L3, BITW, Tap] - vendor Firewall Instances 1 *
  • 18. Havana Roadmap ● API, Resource and DB model implementation: https://blueprints.launchpad. net/quantum/+spec/quantum-fwaas ● Plugin integration ● Base firewall implementation/libraries ● CLI Support ● Horizon Support