dc2013_day2-05-ozgur-danisman-next-generation-dc-security

Page 1

Next Generation DC Security Ozgur Danisman, MBA, CISSP odanisma@cisco.com Kuwait, 4 June 2013

Š 2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

1


• Introduction • Inserting Firewalls into a state-of-art Data Center • Next Generation Firewall features in Data Center

• Virtualization Security

© 2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

2


Keep Bad Stuff Out of the Environment

Keep Critical Services Running and Protected

Keep Good Stuff Protected

Enable Security Productivity and Innovation

Be Compliant

Practical Challenges • Protect data center from internal and

external threats • Secure application delivery and eCommerce • Secure data for compliance • Secure virtualization, multitenancy, and cloud

© 2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

3


• Existing and new vulnerabilities Infrastructure, applications, and now virtualization

• Industrialization of hackers Financially motivated; sophisticated

• Risks on internal networks Many security breaches started on the internal networks

© 2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

4


Main Reasons for Data Center Technology Investment Increase Security Incease Security

76%

Decrease Downtime Decrease Downtime

70%

Data Storage/Backup

69%

Drivers

Decrease Operating Decrease Operating Cost Costs

68%

Virtualization

66%

Improve Management Capability

66%

Consolidate Data Centers

65%

Improve Scalability Iimprove Scalability

62%

Consolidate Equipment

59%

Centralize IT Services

58%

Enable a New Application

55%

Higher Energy Efficiency/Green Initiatives

50%

0% 10% 20% 30% 40% 50% 60% 70% 80% Percent of Respondents Rating 6 or 7 Source: Data Center Deployment Strategies: North American Enterprise Survey, Infonetics, February 2011.


• At the Internet Edge?

• At the Branch Office?

• At the Data Center Services layer?

• In the virtual (hypervisor) world?

© 2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

6


THROUGHPUT

59 78 9

MultiScale™ CONNECTIONS PER SECOND

# OF CONCURRENT CONNECTIONS

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential


Rich Services

Š 2012 Cisco and/or its affiliates. All rights reserved.

IPS

ContextAware

VPN

TrustSec

Cisco Confidential


• Introduction • Inserting Firewalls into a state-of-art Data Center

• Next Generation Firewall features in Data Center • Virtualization Security

© 2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

9


• “I manage security policies.. I don’t want to care about network

cabling…”

© 2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

10


• “I manage security policies.. I don’t want to care about network cabling…”

• Understanding Firewall interaction with network infrastructure is paramount

to decrease downtime and operating cost and improve scalability in Data Center. Decrease Downtime

Decrease Operating Cost

Improve Scalability

• Once designed properly, we don’t have to care any more (we can focus on

managing security policies) 

© 2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

11


= Compute = Network

Internet Edge

= Security

CORE

DISTRIBUTION

VDC Nexus 7018

Nexus 7018

SAN ASA 5585-X

VPC

VPC

VPC

ASA 5585-X

VPC

VPC

VPC

Nexus 5000 Series Nexus 7000 Series

Nexus 2100 Series

Zone

VPC

VPC

Catalyst 6500

VSS VSS

SERVICES

Unified Computin g System Nexus 1000V

Firewall

ACE

NAM

IPS

VSG

Multizone

10G Server Rack

10 G Server Rack

Unified Compute

Unified Access


• Layer 2 has some advantages Plug&Play, no ip addressing L2 adjacency required by some data center applications

• Layer 2 has some risks Scalability Layer 2 loops are disastrous… Spanning Tree Protocol (STP) needs to create loopfree topology by blocking ports STP convergence times… Mistakes/bugs in STP implementations still disastrous STP Domain

STP Blocking

© 2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

14


• vPC is a Port-channeling

concept extending link aggregation to two separate physical switches Physical Topology

Logical Topology

• Allows the creation of

resilient L2 topologies based on Link Aggregation.

L2 Si

Si

• Provides increased

bandwidth All links are actively forwarding Non-vPC

© 2011 Cisco and/or its affiliates. All rights reserved.

vPC

Cisco Confidential

15


Core IP1

•ASA supports Link Aggregation Control Protocol (LACP), IEEE 802.3ad standard

Core IP2

vPC Peer-link

Active S1

S2

vPC

vPC

S3 vApp

S4 vApp

vApp

vApp

vApp

vApp

Zone/Multi-Tennant

Zone/Multi-Tennant

Active or Standby

• Etherchannel ports are treated just like physical and logical interfaces on ASA


L3 Switch

10.1.1.x /24

Vlan 10 (Inside)

VServers: 10.1.1.1-99

Vlan 20 (Outside) ASA HA Pair

BVI: 10.1.1.100

vlan 20 VIP: 10.1.1.254

• ASAs in transparent mode with L3 gateway in Aggregation

layer • Server gateway on outside of firewall


Routing protocols can establish adjacencies through the firewall

Protocols such as HSRP, VRRP, GLBP can cross the firewall

Multicast streams can traverse the firewall

Non-IP traffic can be allowed (IPX, MPLS, BPDUs)

Deploy where IP address schemes can not be modified


Core IP1

Core IP2

VLAN 20

Active VLAN 10 S1

vPC Peer-link

S2

vPC

vPC

S3 vApp

S4 vApp

vApp

vApp

vApp

vApp

Zone/Multi-Tennant

Zone/Multi-Tennant

Active or Standby

•ASA supports VLAN rewrite in L2 (transparent) mode

•Allows on-astick: FW does not have to be inline for all traffic


• Cluster up to 8 ASA

appliances managed as ONE Cluster Control Link

• Load Balancing Approach Stateless load balancing by external switch(ECLB) or Router(ECMP, PBR)

• In-Cluster High

Availability • Hitless Upgrade

© 2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

21


• Introduction • Inserting Firewalls into a state-of-art Data Center

• Next Generation Firewall features in Data Center • Virtualization Security

© 2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

25


Source

Destination

InsideNets100

FinanceServers

10.1.1.0/24 10.1.9.0/24 192.168.3.0/24

172.16.2.0/24 172.16.9.0/24 172.16.15.0/24

Service

Action

HTTPS

PERMIT

• Firewall Rules based on IP addresses no knowledge of identity

firewall ruleset changes when network grows/changes

Š 2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

26


Source

Destination

Finance

Finance Servers 172.16.2.0/24 172.16.15.0/24

IT

Finance Servers 172.16.2.0/24 172.16.15.0/24

ANY

Finance Servers 172.16.2.0/24 172.16.15.0/24

Application

Action

HTTPS

PERMIT

SSH

PERMIT

ANY

DENY

• Firewall Ruleset Leverages Active Directory Source independent of IP addressing works for users logged into Active Directory Domain does not convey identity for iPADs, IP phones etc. does not convey other context such as posture, location... © 2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

27


Source Action

TAG

Finance

CleanMachine

Any

financeIPAD

IP Phones

Destination

FinanceServers

FinanceVDI

Phone Servers

Application

HTTPS

PERMIT

ICA

PERMIT

SIP

PERMIT

• Ruleset can utilize Security Group TAGs (SGTs) info on who, what device, posture, where

also works for devices outside of AD domain also works for destinations/servers

© 2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

28


• TrustSec tags every packet from identified sources with

an “SGT” Security Group Tag. • SGTs identify logical groups of users and/or servers

sharing similar sets of privileges or roles • SGTs are 16-Bits (2-bytes) supporting up to 64K

(65536) logical groups Individual Servers Data Center

Individuals Sample Logical Security Groups

Employee

In this simple example source entities are reduced from 46 to 4

Partner

Contractor

Tagged Traffic evaluated against SG-ACL on Egress

Sample Logical Security Groups

Company Confidential

NDA Confidential

In this simple example destination entities are reduced from 60 to 4

Sensitive

Example Access Policy Simplification Guest Unknown

General Access

Before - 46 (source IPs) x 60 (dest IPs) x 4 TCP/UDP Port Permissions = 11040 ACE/ACLs After - 4 (source SGTs) x 4 (dest SGs) x 4 TCP/UDP Port Permissions = 64 SGACLs


I’m a contractor My AD group is IT Admin Using a iPAD managed by MDM

SGT = 10

HR Database (SGT=4)

IT Server (SGT=10)

• Leveraging Cisco ISE taking into account identity, device type, posture, location, access method (VPN, wireless…) • Static assignment (port, subnet, vlan, ip range also possible)


Assigning TAGs (Servers)

SGT = 10

HR Database (SGT=4)

IT Server (SGT=10)

• Nexus 1000V integration with vSphere, • Static assignment (port, subnet, vlan, ip range also possible)


• Introduction • Inserting Firewalls into a state-of-art Data Center • Next Generation Firewall features in Data Center

• Virtualization Security

© 2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

32


1. VMware vMotion moves virtual machines across physical ports, and the network policy must follow this migration (across racks, pods, and data centers) 2. Administrators must view or apply network and security policy to locally switched traffic Port Group

3. Administrators need to maintain segregation of duties while helping ensure nondisruptive operations 4. Organizations need a VLANagnostic solution to decrease complexity and enhance scalability

Security Administration

Server Administration Network Administration

Š 2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

33


• Proven Cisco® security: virtualized physical and virtual consistency • Collaborative security model ̶ Cisco Virtual Secure Gateway (VSG) for intra-tenant secure zones

VMware vCenter Cisco® Virtual Network Management Center (VNMC) Tenant B

Tenant A VDC

VDC vApp

̶ Cisco ASA 1000V for tenant edge controls

Cisco VSG

• Transparent integration

Cisco VSG

̶ With Cisco Nexus® 1000V Switch and Cisco vPath

• Scale flexibility to meet cloud demand ̶ Multi-instance deployment for scaleout deployment across the data center © 2011 Cisco and/or its affiliates. All rights reserved.

vApp

Cisco VSG

Cisco VSG

Cisco ASA 1000V

Cisco ASA 1000V Cisco vPath Cisco Nexus® 1000V

Hypervisor Cisco Confidential

34


• No need to deploy virtual services on every host • Multi-hypervisor support

• Policies follow vMotion • vCenter Integration

vPath: Virtual Service Datapath VXLAN: Virtual Extensible LAN

VEM vPath

VXLAN

ESX

VEM

vPath

Win8 Hyper-V*

VSM: Virtual Supervisor Module VEM: Virtual Ethernet Module © 2012 Cisco and/or its affiliates. All rights reserved.

VXLAN

VEM

VEM

vPath

VXLAN

XenServer*

* Target: 1H CY13

vPath

VXLAN

NX-OS Data Plane

KVM**

** Target: 2HCY13 Cisco Confidential

35


VM

VM

VM

VM

VM

VM

VM

VM

VM

VNMC

VM VM

VM

VM

VM

VM

VM

VM

VM

VM

VM

4

Nexus 1000V Distributed Virtual Switch

vPath

3

1

Š 2012 Cisco and/or its affiliates. All rights reserved.

Initial Packet Flow

2

Decision Caching

Flow Access Control

VSG

Log/Audit Cisco Confidential

36


VM

VM

VM

VM

VM

VM

VM

VM

VM

VNMC

VM VM

VM

VM

VM

VM

VM

VM

VM

VM

VM

Nexus 1000V Distributed Virtual Switch

vPath

VSG ACL Offloaded to Nexus 1000V

Remaining Packets from Flow

Š 2012 Cisco and/or its affiliates. All rights reserved.

Log/Audit Cisco Confidential

37


1

Secure Internal Zone from External Zone

Internet

vPC

2

Secure Data for Compliance

CTX1

VDC1

CTX2

VDC2

Cisco VXI

vPC

Campus/Data Center

3

4

Secure Application Tiers

CTX1

Secure Multitenancy

Front-End (Presentation)

Extranet Vendor

CTX1 CTX2

Web Tier (Business Logic) DB Tier (Data Access)

Š 2012 Cisco and/or its affiliates. All rights reserved.

Partner

CTX2

vPC

Cisco Confidential

38


MultiScale™ Performance Superior Protection at Data Center Speeds

ASA 5585-SSP60 40 Gbps Firewall 10 MM Connections 350,000 CPS

ASA 5585-SSP40 ASA 5585-SSP20

ASA 5585-SSP10 4 Gbps Firewall 1 MM Connections 50,000 CPS

10 Gbps Firewall 2 MM Connections 125,000 CPS

20 Gbps Firewall 4 MM Connections 200,000 CPS

ASA Services Module 16 Gbps Firewall 10 MM Connections 300,000 CPS

Campus © 2012 Cisco and/or its affiliates. All rights reserved.

Data Center Cisco Confidential


5000 + CUSTOMERS

q

800,000+ End to End Management at Scale GLOBALLY DEPLOYED DEVICES Policy Optimization and Analysis @ no additional cost

80%

FORTUNE 100

4.28 CSAT SCORE

Events, reports and close investigative workflows

135+ Granular RBAC and Change COUNTRIES

Management

Š 2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

40


Trusted Partner Committed to Customer Success Policy Consistency and Operational Excellence for Customers

Deployment Options Broad Range of Choices for Customers: Appliances, Modules and Cloud

Industry Excellence Proven Firewall Track Record for 15 Years Delivering Measurable Risk Reduction

Strong Industry Alliances Secure Multitenancy: VMware and NetApp vBlock: the VCE Company OpenStack Participant

Š 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

41


Thank you.

Š 2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

42


High-Performance Data Center Today

ASA 8.4.1 64-Bit

ASA 8.4.2 Dual Blade

ASA 9.0 Clustering

5X Capacity

2X Performance

5-7X Scale

80 Gbps 700K CPS 20 million connections

300 Gbps 1.5 million CPS 50 million connections

64-Bit 10 million connections 250 contexts 1000 VLANs

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential


Nexus 7000 ASA SM (Osiris) ASA Services Module for the Nexus 7000 • Improved features, performance

• 8x Clustering Support • Clustering across a vPC pair • Leverages the 5585-X SSP60/ASA SM

architecture x2 • Flexible hardware design supports

multiple services on a single blade

Targeted FCS: 2H CY 2013 © 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

Perf

Chassis Performance

250 Gbps+

Blade Single Single Blade

and capabilities

Metric

Performance

40 Gbps

Concurrent Sessions

20M+

New Connections /Second

500K

Security Contexts

500

VLANs

2,000


MultiScale™ Performance with Clustering

Clustering: $0.00 SKU

1.5M+ CPS 50M+ Conns 320 Gbps Max 1.5M CPS 50M Conns 300 Gbps Max x8

1.2M CPS 50M Conns 160 Gbps Max

x8

5585-X x8

C6K ASASM © 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

N7K ASASM (Osiris)


Linear Scaling with ASA Clustering

Integration with Nexus 7K vPC and Fabric Path Nexus with vPC

Linear Cluster Scaling

ASA Clustered

Asymmetric Traffic Support with Clustering Multi-site Clustering (future)

Š 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential


3 ASA 5585-X IO Modules* New!

• Half-slot IO modules • Max ASA 5585-X port density

• 20x10G ports or 50x1G ports in ASA 5585-X chassis Module Description

Number of Dual 10G/1G SFP+/SFP ports

Number of 1G SFP ports

Number of 1G RJ45 ports

4-port 1G/10G SFP/SFP+ module

4

0

0

8-port 1G/10G SFP/SFP+ module

8

0

0

20-port 1G module

0

12

8

* Clustering support with IO modules 1HCY13 © 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential


• Introduction • Inserting Firewalls into a state-of-art Data Center • Next Generation Firewall features in Data Center

• Virtualization Security • Competitive Analysis

© 2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

48


Cisco ASA 5585-S60 vs Juniper SRX 5800

Clustering Performance

Cisco ASA 5585-X 4 unit Cluster

Juniper SRX 5800

EMIX Throughput

60 Gbps

37.5 Gbps (IMIX)

Connections Per Second

750,000

380,000

List Price

$899,980

$1,200,000

Š 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential


Cisco ASA 5585 vs Check Point 61000

Clustering Performance

Cisco ASA 5585-X Cluster

Check Point 61000

EMIX Throughput

120 Gbps

30 Gbps*

Connections Per Second

1.5 million

600,000

* Extrapolation from Miercom report http://www.miercom.com/pdf/reports/20120514.pdf Š 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential


Cisco ASA 5585 vs Fortinet 5140B

Clustering Performance

Cisco ASA 5585-X 8-units

Fortinet 5140B*

EMIX Throughput (clustered)

120 Gbps

120 Gbps

2.8 million (non-clustered)

3.29 million (non-clustered)

$1,799,960

$2,060,000

Connections Per Second

For graceful upgrade, require 2 Fortinets

Fortinet: double number of boxes and 4X rackspace!! Š 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential


Cisco ASA 5585 S40 vs Palo Alto 5000

Performance

Cisco ASA 5585-X S40

Palo Alto 5060

Max Throughput

20 Gbps

20 Gbps

Connections Per Second

200,000

120,000

Max connections

4,000,000

4,000,000

IPS (server side inspection on)

5 Gbps

5 Gbps

SSL

4 Gbps

626 Mbps

Palo Alto 5060 does not work with Nexus vPC Palo Alto 5060 architecture has security vulnerabilities http://www.youtube.com/watch?v=riVqLQWfDlw Š 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential


Thank you.

Š 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

53


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.