SlideShare une entreprise Scribd logo
1  sur  18
Télécharger pour lire hors ligne
Technical Forum
Introducing Arista Macro-Segmentation
Autumn 2015
Technical Forum
Definitions
Micro-Segmentation
• Inserting services in the path of inter-VM traffic (e.g. intra-tenant)
• Policies defined byVMware NSX for each workload
• Enforced in the Distributed vSwitch based application, tag,etc.,
Macro-SegmentationTM
• Inserting services between workgroups (inter-tenant) in the physical network
by defining inter-workgroup policies
Arista Macro-Segmentation Security (MSSTM)
• An extension in EOS that utilizes CloudVision to automate security service
insertion in the network
• Integration with leading next-generation firewalls
Technical Forum
Micro-Segmentation
§ Enabled by partners – e.g.VMware NSX
§ Provides fine-grained security policies at virtual switch
level
§ Works great!
• Provided all hosts and devices are virtualized,and there’s a single
vSwitch variant
§ Some security vendors (e.g. Palo Alto) are onboard
• Virtual security appliance embedded with virtual switch
with centralized policy and reporting
§ Unfortunately,many challenges around physical devices
• e.g. non-virtualized,different hypervisor/vSwitch, appliance
devices,storage
• Existing estate
Internet
Security Policy
Security
Admin
Traffic
Steering
Technical Forum
Current Approaches for DC Security
§ Focus is on Perimeter Security e.g. north-south
flows only
§ Scaling challenges – e.g. firewall active/standby HA
pairs
§ Security policy dependent on network topology –
and vice versa
• Network & security administration are co-dependent
§ Limited or no security of east-west flows,
especially for physical devices
§ Little or no coordination between vSwitch
security and physical firewalling
Active Active/Standby
vSwitch vSwitch
Current approaches ill-suited to the needs of the Software Driven Cloud Data Center
Technical Forum
Arista Macro-Segmentation
§ Enabled byArista CloudVision
• Understands physical topology and location of
every device
• Full visibility of any adds,moves and changes
• 2-way exchange of information with overlay
controllers – knows all virtual device locations
§ Provides network service physical device
integration e.g. Palo Alto Firewalls
• Service device can be anywhere in the network
• Devices to serviced can be anywhere
• Non-proprietary,standard-bases,existing
frame/packet formats
Cloud
Orchestrators
Overlay
Controllers
www.arista.com
Network
Services
Technical Forum
Arista Macro-Segmentation
§ No new tagging or encapsulation
§ One point of control – e.g. the
security policy manager
• For both physical and virtual
firewalls
§ Directly maps to security model
– zones etc.
§ No server reconfiguration
§ No per application overhead
Virtual Virtual
Physical Firewalls
Physical Servers
& Storage
Transparent Insertion of Firewall/ Service
Technical Forum
Macro-Segmentation with Palo Alto Network
Security Admin owns the
security policies
No Network Admin
involvement required
Network Admin owns the network configuration.
PAN service is enabled within CloudVision, which:
• Learns security policies and associated end devices
• Logically instantiates them in the neetwork
Technical Forum
Arista Macro-Segmentation
Existing Approaches With Arista Macro-Segmentation
Perimeter (“North-South”Traffic) Only Logically instantiated anywhere in the network
Scaling Limitations (e.g. only HA pairs of Firewalls) Scale out design – security admin can use multiple
firewalls rather than larger central devices
Requires security & network admin to jointly architect
solution
Topology independent – all devices covered
Limited protection “East-West” for physical devices Security for all points of the compass covered!
Separate solutions for physical and virtual firewalling
and perimeter security (no P2V and P2P east-west
security)
Coordinated approach forV2V,P2V,P2P security
Technical Forum
Arista Macro-Segmentation
§ Delivers flexible services
deployment in the network
§ No forklift upgrades
§ No proprietary lock-ins
§ Server virtualization and
vSwitch agnostic
§ Uses Arista CloudVision
to coordinate policy across the
entire network
Cloud
Orchestrators
Overlay
Controllers
www.arista.com
Network
Services
Technical Forum
Summary
Technical Forum
Thank you for joining us
§ Join us forATF #9 in the spring
§ Please invite your colleagues to this year’s remaining
events
3/11 – Paris
10/11 – Zurich
12/11 – Johannesburg
17/11 – CapeTown
19/11 – Milan
26/11 – Utrecht
TBA – Warsaw, Moscow,
Dublin and Madrid
Technical Forum
Thank you – See you in the spring!
Technical Forum
Thank you for joining us
§ Feedback forms
§ Join us for drinks afterwards at …
Technical Forum
One last thing…..
Technical Forum
Reminder - SSU Leaf – Hitless Upgrade
SSU Hitless Upgrade
§ Designed to provide simple,low risk upgrade options,for fixed configuration systems and single connected servers
§ Key feature for critical applications where maintenance windows are impossible to schedule
§ During reload,Data Plane remains fully operational and acts as a proxy for Control Plane
§ Traffic loss during an SSU Hitless Upgrade is unnoticeable to applications
5+ Minutes
Application
Loss Report
200ms
Application
Loss Report
Existing Approaches SSU Hitless Upgrade
✓✗
Technical Forum
Competition - Guess the outage
§ Arista 7050X running 4.15.2F
• 8 reloads in 20 minutes
• 64-byte packets
§ TX count - 1,989,541,312
§ RX count - 1,989,350,703
§ Average 0.00958% Packet Loss
Average
16ms
outage!
Technical Forum
Our winners …
§ IWon
§ A Nother
§ Lar Stwun
Technical Forum
Thank you – See you in the spring!

Contenu connexe

Tendances

Tendances (20)

VMworld 2013: Deploying VMware NSX Network Virtualization
VMworld 2013: Deploying VMware NSX Network Virtualization VMworld 2013: Deploying VMware NSX Network Virtualization
VMworld 2013: Deploying VMware NSX Network Virtualization
 
Arista reinventing data center switching
Arista   reinventing data center switchingArista   reinventing data center switching
Arista reinventing data center switching
 
NFV Orchestration for Optimal Performance
NFV Orchestration for Optimal PerformanceNFV Orchestration for Optimal Performance
NFV Orchestration for Optimal Performance
 
VMworld 2013: Bringing Network Virtualization to VMware Environments with NSX
VMworld 2013: Bringing Network Virtualization to VMware Environments with NSX VMworld 2013: Bringing Network Virtualization to VMware Environments with NSX
VMworld 2013: Bringing Network Virtualization to VMware Environments with NSX
 
L4-L7 services for SDN and NVF by Youcef Laribi
L4-L7 services for SDN and NVF by Youcef LaribiL4-L7 services for SDN and NVF by Youcef Laribi
L4-L7 services for SDN and NVF by Youcef Laribi
 
NSX for vSphere Logical Routing Deep Dive
NSX for vSphere Logical Routing Deep DiveNSX for vSphere Logical Routing Deep Dive
NSX for vSphere Logical Routing Deep Dive
 
The Vision for the Future of Network Virtualization with VMware NSX
The Vision for the Future of Network Virtualization with VMware  NSXThe Vision for the Future of Network Virtualization with VMware  NSX
The Vision for the Future of Network Virtualization with VMware NSX
 
VMworld 2016: How to Deploy VMware NSX with Cisco Infrastructure
VMworld 2016: How to Deploy VMware NSX with Cisco InfrastructureVMworld 2016: How to Deploy VMware NSX with Cisco Infrastructure
VMworld 2016: How to Deploy VMware NSX with Cisco Infrastructure
 
The evolution of data center network fabrics
The evolution of data center network fabricsThe evolution of data center network fabrics
The evolution of data center network fabrics
 
ONAP - Open Network Automation Platform
ONAP - Open Network Automation PlatformONAP - Open Network Automation Platform
ONAP - Open Network Automation Platform
 
VMWare NSX Components
VMWare NSX ComponentsVMWare NSX Components
VMWare NSX Components
 
VMworld 2015: The Future of Network Virtualization with VMware NSX
VMworld 2015: The Future of Network Virtualization with VMware NSXVMworld 2015: The Future of Network Virtualization with VMware NSX
VMworld 2015: The Future of Network Virtualization with VMware NSX
 
The Need for Complex Analytics from Forwarding Pipelines
The Need for Complex Analytics from Forwarding Pipelines The Need for Complex Analytics from Forwarding Pipelines
The Need for Complex Analytics from Forwarding Pipelines
 
Introduction to SDN
Introduction to SDNIntroduction to SDN
Introduction to SDN
 
Summit 16: Open-O Mini-Summit - TOSCA and YANG Data Modeling for NFV
Summit 16: Open-O Mini-Summit - TOSCA and YANG Data Modeling for NFVSummit 16: Open-O Mini-Summit - TOSCA and YANG Data Modeling for NFV
Summit 16: Open-O Mini-Summit - TOSCA and YANG Data Modeling for NFV
 
VMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesVMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use cases
 
VMworld 2013: Advanced VMware NSX Architecture
VMworld 2013: Advanced VMware NSX Architecture VMworld 2013: Advanced VMware NSX Architecture
VMworld 2013: Advanced VMware NSX Architecture
 
VMworld 2013: VMware NSX Integration with OpenStack
VMworld 2013: VMware NSX Integration with OpenStack VMworld 2013: VMware NSX Integration with OpenStack
VMworld 2013: VMware NSX Integration with OpenStack
 
Advanced Data Retrieval and Analytics with Apache Spark and Openstack Swift
Advanced Data Retrieval and Analytics with Apache Spark and Openstack SwiftAdvanced Data Retrieval and Analytics with Apache Spark and Openstack Swift
Advanced Data Retrieval and Analytics with Apache Spark and Openstack Swift
 
Sdn primer pdf
Sdn primer pdfSdn primer pdf
Sdn primer pdf
 

En vedette

3 Techniques to Increase Conversions for Your SaaS Business
3 Techniques to Increase Conversions for Your SaaS Business3 Techniques to Increase Conversions for Your SaaS Business
3 Techniques to Increase Conversions for Your SaaS Business
Kissmetrics on SlideShare
 
Gross domestic product and gnp
Gross domestic product and gnpGross domestic product and gnp
Gross domestic product and gnp
Sigrid Jose Xiv
 

En vedette (11)

Tbl business plan
Tbl business planTbl business plan
Tbl business plan
 
Arista_Advantage
Arista_AdvantageArista_Advantage
Arista_Advantage
 
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...
 
3 Techniques to Increase Conversions for Your SaaS Business
3 Techniques to Increase Conversions for Your SaaS Business3 Techniques to Increase Conversions for Your SaaS Business
3 Techniques to Increase Conversions for Your SaaS Business
 
Go International: Challenges and Opportunities
Go International: Challenges and OpportunitiesGo International: Challenges and Opportunities
Go International: Challenges and Opportunities
 
Customer segmentation approach
Customer segmentation approachCustomer segmentation approach
Customer segmentation approach
 
Cisco Switch Security
Cisco Switch SecurityCisco Switch Security
Cisco Switch Security
 
Exploratory Research and Qualitative Analysis Lecture-7
Exploratory Research and Qualitative Analysis  Lecture-7Exploratory Research and Qualitative Analysis  Lecture-7
Exploratory Research and Qualitative Analysis Lecture-7
 
Gross domestic product and gnp
Gross domestic product and gnpGross domestic product and gnp
Gross domestic product and gnp
 
Unilever presentation
Unilever presentationUnilever presentation
Unilever presentation
 
Customer Segmentation Principles
Customer Segmentation PrinciplesCustomer Segmentation Principles
Customer Segmentation Principles
 

Similaire à Atf 3 q15-8 - introducing macro-segementation

cloudblanket_nms_ds_revb
cloudblanket_nms_ds_revbcloudblanket_nms_ds_revb
cloudblanket_nms_ds_revb
Ori Guez
 
Server And Hardware Virtualization_Aakash1.1
Server And Hardware Virtualization_Aakash1.1Server And Hardware Virtualization_Aakash1.1
Server And Hardware Virtualization_Aakash1.1
Aakash Agarwal
 

Similaire à Atf 3 q15-8 - introducing macro-segementation (20)

Integration of pola alto and v mware nsx to protect virtual and cloud environ...
Integration of pola alto and v mware nsx to protect virtual and cloud environ...Integration of pola alto and v mware nsx to protect virtual and cloud environ...
Integration of pola alto and v mware nsx to protect virtual and cloud environ...
 
Sicurezza integrate nella tua piattaforma Cloud-Native con VMware NSX (Pivota...
Sicurezza integrate nella tua piattaforma Cloud-Native con VMware NSX (Pivota...Sicurezza integrate nella tua piattaforma Cloud-Native con VMware NSX (Pivota...
Sicurezza integrate nella tua piattaforma Cloud-Native con VMware NSX (Pivota...
 
Gigamon Pervasive Visibility into SDDC/NSX Deployments
Gigamon Pervasive Visibility into SDDC/NSX DeploymentsGigamon Pervasive Visibility into SDDC/NSX Deployments
Gigamon Pervasive Visibility into SDDC/NSX Deployments
 
TFI2014 Session I - State of SDN - Gary Hemminger
TFI2014 Session I - State of SDN - Gary HemmingerTFI2014 Session I - State of SDN - Gary Hemminger
TFI2014 Session I - State of SDN - Gary Hemminger
 
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
 
cloudblanket_nms_ds_revb
cloudblanket_nms_ds_revbcloudblanket_nms_ds_revb
cloudblanket_nms_ds_revb
 
Server And Hardware Virtualization_Aakash1.1
Server And Hardware Virtualization_Aakash1.1Server And Hardware Virtualization_Aakash1.1
Server And Hardware Virtualization_Aakash1.1
 
VMware vRealize Network Insight 3.4 whats new
VMware vRealize Network Insight 3.4 whats newVMware vRealize Network Insight 3.4 whats new
VMware vRealize Network Insight 3.4 whats new
 
Self service it with v realizeautomation and nsx
Self service it with v realizeautomation and nsxSelf service it with v realizeautomation and nsx
Self service it with v realizeautomation and nsx
 
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...
 
CCI2018 - Azure Network - Security Best Practices
CCI2018 - Azure Network - Security Best PracticesCCI2018 - Azure Network - Security Best Practices
CCI2018 - Azure Network - Security Best Practices
 
[OpenStack Day in Korea 2015] Track 2-3 - 오픈스택 클라우드에 최적화된 네트워크 가상화 '누아지(Nuage)'
[OpenStack Day in Korea 2015] Track 2-3 - 오픈스택 클라우드에 최적화된 네트워크 가상화 '누아지(Nuage)'[OpenStack Day in Korea 2015] Track 2-3 - 오픈스택 클라우드에 최적화된 네트워크 가상화 '누아지(Nuage)'
[OpenStack Day in Korea 2015] Track 2-3 - 오픈스택 클라우드에 최적화된 네트워크 가상화 '누아지(Nuage)'
 
VMworld 2013: Case Study: VMware vCloud Ecosystem Framework for Network and S...
VMworld 2013: Case Study: VMware vCloud Ecosystem Framework for Network and S...VMworld 2013: Case Study: VMware vCloud Ecosystem Framework for Network and S...
VMworld 2013: Case Study: VMware vCloud Ecosystem Framework for Network and S...
 
NSX, un salt natural cap a SDN
NSX, un salt natural cap a SDNNSX, un salt natural cap a SDN
NSX, un salt natural cap a SDN
 
VTU Open Elective 6th Sem CSE - Module 2 - Cloud Computing
VTU Open Elective 6th Sem CSE - Module 2 - Cloud ComputingVTU Open Elective 6th Sem CSE - Module 2 - Cloud Computing
VTU Open Elective 6th Sem CSE - Module 2 - Cloud Computing
 
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
 
NSX: La Virtualizzazione di Rete e il Futuro della Sicurezza
NSX: La Virtualizzazione di Rete e il Futuro della SicurezzaNSX: La Virtualizzazione di Rete e il Futuro della Sicurezza
NSX: La Virtualizzazione di Rete e il Futuro della Sicurezza
 
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
 
IaaS with Software Defined Networking
IaaS with Software Defined NetworkingIaaS with Software Defined Networking
IaaS with Software Defined Networking
 
A New Way of Thinking | NATS 2.0 & Connectivity
A New Way of Thinking | NATS 2.0 & ConnectivityA New Way of Thinking | NATS 2.0 & Connectivity
A New Way of Thinking | NATS 2.0 & Connectivity
 

Plus de Mason Mei

10 2013 sdn summit ch reviewed-new
10 2013 sdn summit ch reviewed-new10 2013 sdn summit ch reviewed-new
10 2013 sdn summit ch reviewed-new
Mason Mei
 
08 sdn system intelligence short public beijing sdn conference - 130828
08 sdn system intelligence   short public beijing sdn conference - 13082808 sdn system intelligence   short public beijing sdn conference - 130828
08 sdn system intelligence short public beijing sdn conference - 130828
Mason Mei
 
01 dan chinese-chinese sdn china 2013- dan's keynote draft aug 14 2013
01 dan chinese-chinese sdn china 2013- dan's keynote draft aug 14 201301 dan chinese-chinese sdn china 2013- dan's keynote draft aug 14 2013
01 dan chinese-chinese sdn china 2013- dan's keynote draft aug 14 2013
Mason Mei
 
New idc architecture
New idc architectureNew idc architecture
New idc architecture
Mason Mei
 
201507131408448146
201507131408448146201507131408448146
201507131408448146
Mason Mei
 
16 vxlan配置指导-整本手册
16 vxlan配置指导-整本手册16 vxlan配置指导-整本手册
16 vxlan配置指导-整本手册
Mason Mei
 
Atf 3 q15-9 - summary and close
Atf 3 q15-9 - summary and closeAtf 3 q15-9 - summary and close
Atf 3 q15-9 - summary and close
Mason Mei
 
Atf 3 q15-3 - transitioning to an automated
Atf 3 q15-3 - transitioning to an automatedAtf 3 q15-3 - transitioning to an automated
Atf 3 q15-3 - transitioning to an automated
Mason Mei
 
基于Aws的持续集成、交付和部署 代闻
基于Aws的持续集成、交付和部署 代闻基于Aws的持续集成、交付和部署 代闻
基于Aws的持续集成、交付和部署 代闻
Mason Mei
 
基于Aws的dev ops实践指南 王毅
基于Aws的dev ops实践指南 王毅基于Aws的dev ops实践指南 王毅
基于Aws的dev ops实践指南 王毅
Mason Mei
 

Plus de Mason Mei (20)

Brkdcn 2035 multi-x
Brkdcn 2035 multi-xBrkdcn 2035 multi-x
Brkdcn 2035 multi-x
 
Ovn vancouver
Ovn vancouverOvn vancouver
Ovn vancouver
 
11 zhuai chuanpu h3 c
11 zhuai chuanpu h3 c11 zhuai chuanpu h3 c
11 zhuai chuanpu h3 c
 
10 2013 sdn summit ch reviewed-new
10 2013 sdn summit ch reviewed-new10 2013 sdn summit ch reviewed-new
10 2013 sdn summit ch reviewed-new
 
08 sdn system intelligence short public beijing sdn conference - 130828
08 sdn system intelligence   short public beijing sdn conference - 13082808 sdn system intelligence   short public beijing sdn conference - 130828
08 sdn system intelligence short public beijing sdn conference - 130828
 
07 tang xiongyan
07 tang xiongyan07 tang xiongyan
07 tang xiongyan
 
06 duan xiaodong
06 duan xiaodong06 duan xiaodong
06 duan xiaodong
 
05 zhao huiling
05 zhao huiling05 zhao huiling
05 zhao huiling
 
04 hou ziqiang
04 hou ziqiang04 hou ziqiang
04 hou ziqiang
 
03 jiang lintao
03 jiang lintao03 jiang lintao
03 jiang lintao
 
02 china sdn conf ron keynote
02 china sdn conf ron keynote02 china sdn conf ron keynote
02 china sdn conf ron keynote
 
01 dan chinese-chinese sdn china 2013- dan's keynote draft aug 14 2013
01 dan chinese-chinese sdn china 2013- dan's keynote draft aug 14 201301 dan chinese-chinese sdn china 2013- dan's keynote draft aug 14 2013
01 dan chinese-chinese sdn china 2013- dan's keynote draft aug 14 2013
 
New idc architecture
New idc architectureNew idc architecture
New idc architecture
 
H3 cswitch2015
H3 cswitch2015H3 cswitch2015
H3 cswitch2015
 
201507131408448146
201507131408448146201507131408448146
201507131408448146
 
16 vxlan配置指导-整本手册
16 vxlan配置指导-整本手册16 vxlan配置指导-整本手册
16 vxlan配置指导-整本手册
 
Atf 3 q15-9 - summary and close
Atf 3 q15-9 - summary and closeAtf 3 q15-9 - summary and close
Atf 3 q15-9 - summary and close
 
Atf 3 q15-3 - transitioning to an automated
Atf 3 q15-3 - transitioning to an automatedAtf 3 q15-3 - transitioning to an automated
Atf 3 q15-3 - transitioning to an automated
 
基于Aws的持续集成、交付和部署 代闻
基于Aws的持续集成、交付和部署 代闻基于Aws的持续集成、交付和部署 代闻
基于Aws的持续集成、交付和部署 代闻
 
基于Aws的dev ops实践指南 王毅
基于Aws的dev ops实践指南 王毅基于Aws的dev ops实践指南 王毅
基于Aws的dev ops实践指南 王毅
 

Dernier

Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
gajnagarg
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
galaxypingy
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
pxcywzqs
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
JOHNBEBONYAP1
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
Asmae Rabhi
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Monica Sydney
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
ydyuyu
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
ydyuyu
 

Dernier (20)

Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 

Atf 3 q15-8 - introducing macro-segementation

  • 1. Technical Forum Introducing Arista Macro-Segmentation Autumn 2015
  • 2. Technical Forum Definitions Micro-Segmentation • Inserting services in the path of inter-VM traffic (e.g. intra-tenant) • Policies defined byVMware NSX for each workload • Enforced in the Distributed vSwitch based application, tag,etc., Macro-SegmentationTM • Inserting services between workgroups (inter-tenant) in the physical network by defining inter-workgroup policies Arista Macro-Segmentation Security (MSSTM) • An extension in EOS that utilizes CloudVision to automate security service insertion in the network • Integration with leading next-generation firewalls
  • 3. Technical Forum Micro-Segmentation § Enabled by partners – e.g.VMware NSX § Provides fine-grained security policies at virtual switch level § Works great! • Provided all hosts and devices are virtualized,and there’s a single vSwitch variant § Some security vendors (e.g. Palo Alto) are onboard • Virtual security appliance embedded with virtual switch with centralized policy and reporting § Unfortunately,many challenges around physical devices • e.g. non-virtualized,different hypervisor/vSwitch, appliance devices,storage • Existing estate Internet Security Policy Security Admin Traffic Steering
  • 4. Technical Forum Current Approaches for DC Security § Focus is on Perimeter Security e.g. north-south flows only § Scaling challenges – e.g. firewall active/standby HA pairs § Security policy dependent on network topology – and vice versa • Network & security administration are co-dependent § Limited or no security of east-west flows, especially for physical devices § Little or no coordination between vSwitch security and physical firewalling Active Active/Standby vSwitch vSwitch Current approaches ill-suited to the needs of the Software Driven Cloud Data Center
  • 5. Technical Forum Arista Macro-Segmentation § Enabled byArista CloudVision • Understands physical topology and location of every device • Full visibility of any adds,moves and changes • 2-way exchange of information with overlay controllers – knows all virtual device locations § Provides network service physical device integration e.g. Palo Alto Firewalls • Service device can be anywhere in the network • Devices to serviced can be anywhere • Non-proprietary,standard-bases,existing frame/packet formats Cloud Orchestrators Overlay Controllers www.arista.com Network Services
  • 6. Technical Forum Arista Macro-Segmentation § No new tagging or encapsulation § One point of control – e.g. the security policy manager • For both physical and virtual firewalls § Directly maps to security model – zones etc. § No server reconfiguration § No per application overhead Virtual Virtual Physical Firewalls Physical Servers & Storage Transparent Insertion of Firewall/ Service
  • 7. Technical Forum Macro-Segmentation with Palo Alto Network Security Admin owns the security policies No Network Admin involvement required Network Admin owns the network configuration. PAN service is enabled within CloudVision, which: • Learns security policies and associated end devices • Logically instantiates them in the neetwork
  • 8. Technical Forum Arista Macro-Segmentation Existing Approaches With Arista Macro-Segmentation Perimeter (“North-South”Traffic) Only Logically instantiated anywhere in the network Scaling Limitations (e.g. only HA pairs of Firewalls) Scale out design – security admin can use multiple firewalls rather than larger central devices Requires security & network admin to jointly architect solution Topology independent – all devices covered Limited protection “East-West” for physical devices Security for all points of the compass covered! Separate solutions for physical and virtual firewalling and perimeter security (no P2V and P2P east-west security) Coordinated approach forV2V,P2V,P2P security
  • 9. Technical Forum Arista Macro-Segmentation § Delivers flexible services deployment in the network § No forklift upgrades § No proprietary lock-ins § Server virtualization and vSwitch agnostic § Uses Arista CloudVision to coordinate policy across the entire network Cloud Orchestrators Overlay Controllers www.arista.com Network Services
  • 11. Technical Forum Thank you for joining us § Join us forATF #9 in the spring § Please invite your colleagues to this year’s remaining events 3/11 – Paris 10/11 – Zurich 12/11 – Johannesburg 17/11 – CapeTown 19/11 – Milan 26/11 – Utrecht TBA – Warsaw, Moscow, Dublin and Madrid
  • 12. Technical Forum Thank you – See you in the spring!
  • 13. Technical Forum Thank you for joining us § Feedback forms § Join us for drinks afterwards at …
  • 15. Technical Forum Reminder - SSU Leaf – Hitless Upgrade SSU Hitless Upgrade § Designed to provide simple,low risk upgrade options,for fixed configuration systems and single connected servers § Key feature for critical applications where maintenance windows are impossible to schedule § During reload,Data Plane remains fully operational and acts as a proxy for Control Plane § Traffic loss during an SSU Hitless Upgrade is unnoticeable to applications 5+ Minutes Application Loss Report 200ms Application Loss Report Existing Approaches SSU Hitless Upgrade ✓✗
  • 16. Technical Forum Competition - Guess the outage § Arista 7050X running 4.15.2F • 8 reloads in 20 minutes • 64-byte packets § TX count - 1,989,541,312 § RX count - 1,989,350,703 § Average 0.00958% Packet Loss Average 16ms outage!
  • 17. Technical Forum Our winners … § IWon § A Nother § Lar Stwun
  • 18. Technical Forum Thank you – See you in the spring!