SlideShare a Scribd company logo
1 of 48
Download to read offline
Михаил Кадер,
mkader@cisco.com
security-request@cisco.com



                      © 2013 Cisco and/or its affiliates. All rights reserved.   Cisco Public
Cisco Validated Designs Deliver Results
Data Center / Secure Data Center CVD – www.cisco.com/go/vmdc



“59% of organizations lack the lab resources or test environments to validate
                        vendor claims for themselves.”
                                                                                                     —SANS Institute




       “Organizations clearly lack well-defined standards, processes, and
  resources for determining the resiliency of their critical network devices and
   systems.... Need methodical resiliency validation using a combo of real
                    traffic, heavy load and security attacks.”
                                                                                                  —SANS and TOGAG




                        © 2013 Cisco and/or its affiliates. All rights reserved.   Cisco Public
Setting the Foundation for the Secure
                                        Designs




© 2013 Cisco and/or its affiliates. All rights reserved.   Cisco Public   3
Architecture
      Traditional Data Center Architecture

Items of note:

- Both Physical Network Fabric and Virtualization components
    are represented
-   Well defined DC Edge (layer 3) providing connectivity and
    security services to/from DC and Internet/Extranet
-   DMZ network (physical or virtual workload) on DC edge that
    could securely leverage physical workloads or virtual
    workloads
-   DC Core is Routed (OSPF, BGP, EIGRP) with ECMP
-   DC Aggregation layer contains Physical Security Services
    allowing the creation of internal zones / trust enclaves without
    crossing core (East-West) and crossing core (North-South)
    only when required
-   Various End-of-Row/Top-of-Rack options represented between
    Aggregation and Compute/Access Layer
-   Virtual Security services represented with Nexus 1000v




                                                      © 2013 Cisco and/or its affiliates. All rights reserved.   Cisco Public                  4
Traditional Secure Data Center Design – Basic and Simplified
                   Data Center                                                       1.
                                                                                      1
                                                                                      1       Physical Network Fabric –
    1
    1                        2
                             2                                                                     -Creates the shared physical infrastructure for moving packets within the
        Physical Network         Virtual Fabric &                                                     Data Center (North, South, East and West)
             Fabric                  Compute
                                                                                                   -Leverages the DC-Class Technologies of Cisco Nexus Switching
                                  A
                                                                                          A   External DC Edge – (External Zoning)
         A
              External DC              Virtual                                                     -Boundary between the Data Center and the rest of the corporate
                 Edge                 Workloads                                                     network (or Internet) (North-South)
                                                                                          B   Internal DC Zones – Stateful Internal separation
          B                       B
                                                                                                   -Allows Secure Zones or Trust Enclaves to be established within the DC
              Internal DC
                 Zoning
                                       Virtual
                                      Services
                                                                                                    Network Fabric, establishing secure separation via External DC Zones
                                                                                                    or other Internal DC Zones (North-South)
                                                                                                   -Should inherently take advantage of the optimized network infrastructure
                                                                                                    without violating proper Data Center Design objectives
                                                                                                              High-Availability / Zero Downtime
                                                                                                              Scalability / Massive Workload Processing
                                                                                                              Survivability / Redundancy
                                                                                                              Low Latency / No Packet Loss
                                                                                                              Asymmetric Traffic Flows




                                           © 2013 Cisco and/or its affiliates. All rights reserved.                      Cisco Public
Traditional Secure Data Center Design – Basic and Simplified
                   Data Center                                                       1.
                                                                                     22       Virtual Fabric and Compute–
    1
    1                        2
                             2                                                                     -Creates the shared virtual infrastructure for moving packets within the
        Physical Network         Virtual Fabric &                                                      Virtualized Data Center
             Fabric                  Compute
                                                                                                   -Leverages Virtualization & Compute Technologies of Cisco Nexus /
                                                                                                    Unified Compute System (UCS) and Virtualization Software e.g.
         A                        A
              External DC
                                       ‘Secure’                                                     VMWare, Citrix, etc.
                                        Virtual
                 Edge
                                      Workloads
                                                                                          A   Secure Virtual Workloads -
                                                                                                   -Securing the sum of the requests made by users and applications of a
          B                       B                                                                  ‘virtual system’
                                       Virtual
              Internal DC
                                      Security                                                     -Typically defined as a self-contained unit: an integrated stack consisting
                 Zoning
                                      Services                                                       of application, middleware, database, and operating system devoted to a
                                                                                                     specific computing task
                                                                                          B
                                                                                              Virtual Security Services -
                                                                                                   -The Virtual services defined to successfully secure and optimize a Virtual
                                                                                                     Workload - Virtual Firewalls, Virtual Routing, Network Management,
                                                                                                     Virtual Load Balancers, Cloud Interconnect, VPN, etc.




                                           © 2013 Cisco and/or its affiliates. All rights reserved.                      Cisco Public
Architecture
      Secure DC: Traditional Use Cases
1   Secure Internal Zone From External Zone                                                         Secure Data in a Compliance Scenario [PCI, FISMA, HIPAA, etc.]
                                                                                              2

             Internet                                                                                                                        VDC1
                                                                                          CTX1
                                              DMZ
                                                                                          CTX2                                                VDC2


                                                    Cisco VXI
                           vPC
                                                                                                                      vPC

            Campus / Data Center




3      Secure Application Tiers
                                                                                              4                                             Secure Multi-Tenancy
                                                                                                           Extranet
                                                          Front-End
                                                          (Presentation)
                                                                                                                                                    Vendor
                    CTX1                                                                          CTX1

                                                                                                  CTX2                                               Partner
                                                          Web Tier
                                                          (business logic)

                   CTX2                                                                                                     vPC

                                                          DB Tier
                                                          (data access)

                                                © 2013 Cisco and/or its affiliates. All rights reserved.                    Cisco Public
Architecture
    Secure DC: Evolving Deployment Use Cases
                                                                                                                                              VDC1
                                                                                                                                              VDC2

1   Traditional (Physical) DC                                                                                      vPC
                                                                                                                                    VMDC
     2   Virtual DC                                                                                                               Custom DC
                                                                                                       IPsec/SSL
                                                                                                                   5    Virtual Private Cloud
                                3      Virtual Desktop                                    Internet

                                         Cisco VXI




                                                                                                                                                     PaaS
                                                                                                                                  6 Public Cloud




                                                                      4      Internal Private Cloud

                                                                                                                                                      SaaS

             Physical                      Virtual                                             Private Cloud                                  Public Cloud
                                    © 2013 Cisco and/or its affiliates. All rights reserved.                       Cisco Public
Architecture
        The Evolving Data Center Architecture

        Aggregation Layer                                                                                                                                  Data Center Core
        • Workload is localized to the Aggregation Block                                                                                                   Layer
        • Centralized point for ingress and egress data center
          flows                                                                                 Layer 3
        • Can be demarcation point for L2 and L3
        • Services can be scaled as data center grows
                                                                                                Layer 2
                                                                                                                                                                   DC Aggregation
        Services Layer (option)                                                                                                                                    Layer

        • Additional services location for server farm specific
          protection / optimization
        • Services localized to the applications running on the                                                                                                        DC Service Layer
          servers connected to the physical pod – SLB, Monitors,
          etc.
        • Offloads port utilization from Aggregation Layer
                                                                                                                                                            DC Access Layer
       Virtual Network & Access
       • Physical and virtual form factor for server connectivity
                                                                                                          Storage            Virtual            UCS
       • Top of rack provides port density for server connections
                                                                                                                             Access
       • Merging point between physical and virtual networks
                                                                                                          Data security      Virtual Firewall   Port security
                                                                                                          authenticate &     Real-time          authentication,
                                                                                                          access control     Monitoring         QoS features
                                                                                                                             Firewall Rules
 Goal #1: Understand the current approach (De-Couple the Elements of the Design)
 Goal #2: Understand the options we have to build a more efficient architecture (Re-assemble the elements into a more flexible design)
                                           © 2013 Cisco and/or its affiliates. All rights reserved.                        Cisco Public                                                   9
Architecture
              The Evolving Data Center Architecture
             Adding Layered Security Services
            Data Center Edge
• Physical Delineation for all ingress and egress into the ‘CORE’ of
  the DC – Traditional Security Models apply to North-South
  Protection

             Aggregation Layer
• Initial filter for all ingress and egress to DC services & compute -
  “North-South” protection
• Stateful filtering and logging for all ingress and egress traffic flows
• Physical appliances can be virtualized and applied to server enclaves

             Services Layer (option)
• Additional services location for server farm specific protection and
  other potential zones



            Virtual Network & Access                                                                          Storage            Virtual            UCS
                                                                                                                                 Access
• Virtual firewall, zone/enclave based filtering
• IP-Based Access Control Lists                                                                               Data security      Virtual Firewall   Port security
                                                                                                              authenticate &     Real-time          authentication,
• VM attribute-based policies – Should Follow VM                                                              access control     Monitoring         QoS features
                                                                                                                                 Firewall Rules
• “East-West” protection

                                                   © 2013 Cisco and/or its affiliates. All rights reserved.                    Cisco Public                           10
VDC and VPC Designs




© 2013 Cisco and/or its affiliates. All rights reserved.       Cisco Public
Traditional Secure DC Design – Network Fabric Best Practices
                   Data Center                                                        1
                                                                                     1.
                                                                                      1       Physical Network Fabric –
    1
    1                        2                                                                     -Leverage the full capacity of the Cisco Nexus Switching infrastructure
        Physical Network         Virtual Fabric &                                                  -Security is pervasive, and while it has been known to ‘reduce
             Fabric                  Compute
                                                                                                    convenience’; decreasing required network functionality is unacceptable.
                                  A
                                                                                          A   External DC Edge – (External Zoning)
         A
              External DC              Virtual                                                     -Leverage Edge connectivity (routing)
                 Edge                 Workloads                                                    -Provide Edge Security (Firewall at minimum)
                                                                                                   -Layer 3 Firewalling (with or without NAT) may be used successfully
          B                       B
                                                                                                   -IPS and Next Generation Systems can add additional visibility and
              Internal DC              Virtual
                 Zoning               Services                                                      protection
                                                                                                   -If very high-speed firewalling / federations, etc. are desired at the DC
                                                                                                    edge, ASR1K can deliver up to 100Gbps FW with Stateful HA
                                                                                                   -Path diversity into the datacenter if you can. Stateless with Federation to
                                                                                                    authenticate to the app, Stateful with Federation for compliance
                                                                                          B
                                                                                              Internal DC Zones – Stateful Internal separation
                                                                                                   -Keep routing on the Routers (Firewalls implemented transparently)
                                                                                                   -Leverage vPC/vPC+ and/or FabricPath technology to maximize DC traffic
                                                                                                    flow capability
                                                                                                               -All flows are expected to be asymmetric, therefore zone design
                                                                                                                should support this
                                                                                                   -No additional Packet-Loss penalties should be introduced
                                                                                                   -Zero-downtime Firewall upgrades should be supported
                                                                                                   -Survivability/HA on the Firewall / IPS devices is critical
                                           © 2013 Cisco and/or its affiliates. All rights reserved.                      Cisco Public
Connectivity
Building an Efficient DC Fabric to Scale
Scaling the Network Fabric - Virtual Device Context (VDC)
                                                                 VDC 1
                                                                         Layer 2 Protocols         Layer 3 Protocols
                                                                          VLAN             UDLD    OSPF          GLBP
                                                                          PVLAN            CDP      BGP          HSRP
                                                                            STP           802.1X   EIGRP         IGMP
                                                                           LACP             CTS     PIM          SNMP
                       VDCs                                                        …                        …


                                                                  VDC 2
                                                                        Layer 2 Protocols           Layer 3 Protocols
                                                                       VLAN               UDLD      OSPF           GLBP
                                                                       PVLAN               CDP       BGP           HSRP
                                                                         STP              802.1X    EIGRP          IGMP
                                                                        LACP               CTS       PIM           SNMP
                                                                                  …                         …




Nexus 7000 VDC – Virtual Device Context (up to 8 VDCs plus 1 Management VDC – SUP2E w/ NXOS
  6.04/6.1)
   Flexible separation/distribution of hardware resources and software components
   Complete data plane and control plane separation
   Complete software fault isolation
   Securely delineated administrative contexts
 Each physical interface can only be active in one VDC
                               © 2013 Cisco and/or its affiliates. All rights reserved.                         Cisco Public                  13
Connectivity
Using VDCs for Vertical Consolidation
One of the most common uses of VDCs
• Allows Consolidation of Core, Aggregation while maintaining network hierarchy
• No reduction in port count or links but fewer physical switches
  ‒ Copper Twinax cables (CX-1) provide a low cost 10G interconnect option


                Core




                                                                                        Core         Core

                Agg
                                                                                         Agg          Agg




                Access




                          © 2013 Cisco and/or its affiliates. All rights reserved.   Cisco Public
Connectivity
Using VDCs for Internet Edge/DMZ/Core


 Option to meet multiple needs – XL VDC, DMZ and Core
 Maintains security model with logical separation

                                                                                   Internet


          Internet
         Edge(XL)                                                    Internet                 Internet Edge
                                                                    Edge(XL)                       (XL)


                                                                                                                   Firewalls for Intra
                                                                                                                   or Inter-VDC
           DMZ                                                        DMZ                         DMZ              Traffic Flows




                                                                      Core                        Core

           Core




                        © 2013 Cisco and/or its affiliates. All rights reserved.                    Cisco Public
Connectivity
VDC Security Certification

 VDC separation is industry certified ‘Leak-proof Security Mechanism’
 NSS Labs for PCI Compliant Environments – http://www.nsslabs.com
 FIPS 140-2 http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140InProcess.pdf
 Common Criteria Evaluation and Validation Scheme – Certification
  #10349 - http://www.niap-ccevs.org/st/vid10349/




                                  © 2013 Cisco and/or its affiliates. All rights reserved.   Cisco Public                  16
Connectivity
Using VDCs for PCI Compliance Segmentation


• Maintains compliant security model with physical separation
  ‒ FW and IPS at the boundary of the CDE zone as required by PCI-DSS 2.0


                                                                                    Internet


          Internet
         Edge(XL)                                                     Internet                 Internet Edge
                                                                     Edge(XL)                       (XL)




           PCI                                                          PCI                        PCI




                                                                       Core                        Core

           Core




                         © 2013 Cisco and/or its affiliates. All rights reserved.                    Cisco Public
Connectivity
Building an Efficient DC Fabric to Scale
                                                                                                               Logical Topology without vPC
Scaling the Network Fabric – Virtual Port Channel vPC)
                                                                                                                         Aggregation
• Allow a single device to use a port channel across two upstream
  switches (aka MCEC)
• Eliminate STP blocked ports
                                                                                                                           Access
• Simplify L2 Paths by supporting loopfree non-blocking concurrent
  L2 paths
• Dual-homed server operate in active-active mode
• Provide fast convergence upon link/device failure
                                                                                            Logical Topology with vPC                   vPC Peers
  ! Enable vpc on the switch                                                                                  Aggregation
  dc11-5020-1(config)# feature vpc
                                                                                                                                         MCEC
  ! Check the feature status
  dc11-5020-1(config)# show feature | include vpc
  vpc 1 enabled                                                                                                                         vPC Peers
                                                                                                                Access



                                                                                                                                         MCEC



                                 © 2013 Cisco and/or its affiliates. All rights reserved.      Cisco Public                                         18
Connectivity
What is a Virtual Port Channel (vPC)?
 • vPC is a Port-channeling concept extending link aggregation to two separate physical switches
     • vPC allows a single device to use a port channel
       across two neighbor switches (vPC peers)
     • vPC Peer link is used to synchronize state between
       vPC peer devices, must be 10GE
 • Eliminates STP blocked ports/STP delays/Calculations
   and uses all available uplink bandwidth (active/active)
    ‒ Does not actually turn off STP – FabricPath does this
 • Supported in NX-OS switches only
 • Recommended to always use LACP for dynamic LAG
                                                                                                             VPC PEER LINK
 • vPC Design & Best Practices Guide:
   http://www.cisco.com/en/US/prod/collateral/switches/ps9441/ps9670/C07-572830-
   00_Agg_Dsgn_Config_DG.pdf



                                                                                                                                19
                                   © 2013 Cisco and/or its affiliates. All rights reserved.   Cisco Public
Connectivity
Why use vPC? – Multi-Chassis Etherchannel (MEC)

     No Port Channel:                                            Single-Chassis LACP Port
     STP Allows only one active link                             Channel:                                       vPC Multi-Chassis LACP Port
     Sub-optimal flows and resource                              Both links active but no                       Channel:
     usage                                                       device redundancy (single                      Both links active, optimal
                                                                 switch)                                        redundancy, all links active




                                                                                                                LACP Load Balance
                                                                        LACP Load Balance src-                  src-dst-IP (hash)
                                                                        dst-IP (hash)




                                                                                                                         VPC PEER LINK




                                                                                                                                               20
                                © 2013 Cisco and/or its affiliates. All rights reserved.         Cisco Public
Connectivity
VPC with Multiple ASAs – A/S or A/A Failover
 • Part of CVD architecture since in July 2011
 • vPC ensures zero packet loss in the event of a link failure to the                                      ASA channel 32
   firewall, a firewall failure, a switch failure, VDC reset, or vPC peer-                                                  State and Failover links
   link loss
    ‒ Works with both A/S and A/A failover (and with ASA 9x Clustering)
 • Allows ASA to participate in necessary DC redundancy technologies
   with expected flow asymmetry
 • ASA is only DC Firewall on market that can simultaneously:
    1. Run standards-based LACP for Dynamic LAG to Nexus vPC/vPC+ or Cat6K
       VSS with proper bundling semantics                                                                  N7K VPC 40                                  N7K VPC 41

        no traffic black holes or loss of state due to expected flow asymmetry / out-of-order packets                              VPC PEER LINK

    2. Supports all of the same LACP load balancing hash values as the switch
       fabric(s) [def. = src-dst IP]
    3. Able to support dynamic LAG (LACP) in all modes: Routed / Transparent /
       Multi-context / Mixed-context(s) / Clustering
    4. Successfully handles the expected flow asymmetry and out-of-order packets
       from Multiple chassis simultaneously
                                                                                                                                                               21
                                                © 2013 Cisco and/or its affiliates. All rights reserved.     Cisco Public
Connectivity
ASA Connecting to Nexus with vPC (basic)
                                 interface Ethernet4/1
                                 switchport mode trunk
                                 channel-group 40 mode active
                                 no shutdown
                                 !
                                 interface Ethernet4/2                                                                             VPC PEER LINK
                                 switchport mode trunk                                                                                                            North Zone
                                 channel-group 40 mode active
                                 no shutdown                                                                                                                      VLAN 200
                                 !
                                 interface port-channel4 0                                                                   N7K VPC 40
                                 switchport                                          interface TenGigabitEthernet0/6
                                 switchport mode trunk                               channel-group 32 mode active vss-id 1
                                 switchport trunk allowed vlan 1,200,201 vpc 40      no nameif                                                           Trunks
                                 !                                                   no security-level                                             VPC
                                 vpc domain 10                                       !
                                  role priority 50                                   interface TenGigabitEthernet0/7
                                  peer-keepalive dest 10.1.1.2 source 10.1.1.1 vrf   channel-group 32 mode active vss-id 2       ASA channel 32
                                                                                                                                                           VLAN 200
                                  vpc-mgmt                                           no nameif                                                             Outside
                                  peer-gateway                                       no security-level
                                                                                     !
                                                                                     interface BVI1
                                                                                     ip address 172.16.25.86 255.255.255.0                                 VLAN 201
                                                                                     !                                                                     Inside
                                                                                     interface Port-channel32
                                                                                      no nameif
                                                                                      no security-level
                                                                                     !                                                                             South Zone
 Note:                                                                               interface Port-channel32.201                                                  VLAN 201
                                                                                      mac-address 3232.1111.3232
                                                                                      vlan 201
 Example shows only one side of config: N7K1 and ASA1.                                nameif inside
 Full configuration would be assumed.                                                 bridge-group 1
                                                                                      security-level 100
                                                                                     !
 ASA connected to Nexus with vPC and establishing an                                 interface Port-channel32.200
 internal DC zone pair between VL200 (N) and VL201(S).                                mac-address 3232.1a1a.3232
                                                                                      vlan 200
 ASA is deployed using transparent (L2) mode in this                                  nameif outside
 example to minimize network fabric modification(s) – Will                            bridge-group 1
                                                                                      security-level 0
 be discussed in detail later
Connectivity
ASA Connecting to Nexus with vPC (Best Practices Shown)
 • ASA connected to Nexus using multiple
   physical interfaces on vPC                                                      DC Core /
                                                                                    EDGE
    ‒ ASA can be configured to failover after a
      certain number of links lost (when using HA)
                                                     L3
                                                             SVI VLAN200                                       SVI VLAN200   Aggregation Layer
 • Note that vPC identifiers are different                          FHRP
                                                                              VPC PEER LINK
                                                                                                           FHRP
                                                     L2
   for each ASA on the Nexus switch (this
                                                                                                                               VLAN 200
   changes with ASA clustering feature                         N7K VPC 40
                                                                                  Trunks
                                                                                                        N7K VPC 41             Outside
                                                                    VPC
   and cLACP [not yet shown])                                                                                VPC
                                                                                                                                                 North Zone
                                                                                                          FW HA                                  VLAN 200
                                                      ASA channel 32
                                                                            VPC                   VPC                          VLAN 201
                                                                                                                               Inside

                                                                                  VPC PEER LINK

                                                                                                                             Access Layer

                                                                                     VPC




                                                                                                                                            South Zone
                                                                                                                                            VLAN 201
Secure Design Building Blocks




© 2013 Cisco and/or its affiliates. All rights reserved.   Cisco Public
Segmentation
Security Building Block: Segmentation

• While not a security technology, segmentation has long been used as a means for
  grouping similar resources in order to apply specific configuration or policy
• Sometimes there is a technical benefit with segmentation
• An example is using VLANs to reduce the L2 broadcast domain and improve network
  efficiency
• VRF (Virtual Routing and Forwarding) typically used for virtualizing L3 services
• VDCs (Virtual Device Context) on the Nexus platforms allow multiple, independent
  virtualized switches inside of a single physical switch
• Zones are a common term to refer to units in the data centre that share a common trait and
  can reduce operational complexity with both physical and virtualized hosts and services




                            © 2013 Cisco and/or its affiliates. All rights reserved.   Cisco Public                  25
Segmentation
Security Building Block: Segmentation
6 Degrees of Separation

Nexus 7000                                                                               Segmentation Building Blocks

                                                                                                   Nexus 7K
1. Virtual Device Context
2. Virtual Routing/Forwarding (VRF)
    VRF-Lite can be easily used as it does not require MPLS
3. VLANs
4. Security Group Tags (SGT in packet)                                                             ASA

5. 802.1AE MACSEC Encryption
                                                                                                                  CTX1              CTX2     CTX3
ASA
6. Virtual Firewall Context (Virtualized Firewall)
                                                                                                                VLANx1          VLANy1     VLANz1
                                                                                                                VLANx2          VLANy2     VLANz2
                                                                                                               SGT SGT          SGT SGT    SGT SGT

                                                                                                                 802.1AE
                                                                                                                (encrypt)




                                    © 2013 Cisco and/or its affiliates. All rights reserved.                         Cisco Public
© 2013 Cisco and/or its affiliates. All rights reserved.   Cisco Public
Segmentation
Firewall Design: Modes of Operation

• Routed Mode is the traditional mode of the firewall. Two or more interfaces that separate
  L3 domains
• Transparent Mode is where the firewall acts as a bridge functioning mostly at L2
• Multi-context mode involves the use of virtual firewalls, which can be either routed or
  transparent mode
• Mixed mode is the concept of using virtualization to combine routed and transparent mode
  virtual firewalls
• Transparent mode firewall offers some unique benefits in the DC




                            © 2013 Cisco and/or its affiliates. All rights reserved.   Cisco Public                  28
Segmentation
Why Deploy Transparent Mode?

•       Existing Nexus Network Fabric does not need to be modified to employ L2 Firewall!
    •     Simple as changing host(s) VLAN ID
•       Firewall does not need to run routing protocols / become a segment gateway
    •     Firewalls are more suited to flow-based inspection (not packet forwarding like a router)
•       Routing protocols can establish adjacencies through the firewall
•       Protocols such as HSRP, VRRP, GLBP can cross the firewall
•       Multicast streams can traverse the firewall
•       Non-IP traffic can be allowed (IPX, MPLS, BPDUs)
•       (CVD) 9 of 10 internal zoning scenarios recommends Transparent FW (L2) deployed
        versus Routed Firewall (L3)



                                   © 2013 Cisco and/or its affiliates. All rights reserved.   Cisco Public                  29
Segmentation
Firewall - Transparent Mode
L2 Firewall

•   Firewall functions like a bridge (“bump in the wire”) at L2, only ARP packets pass without an explicit ACL
•   Uses traditional ACLs on the firewall
•   Does not forward Cisco Discovery Protocol (CDP)
•   Same subnet exists on all interfaces in the bridge-group
•   Different VLANs on inside and outside interfaces
•   In addition to Extended ACLs, use an EtherType ACL to restrict or allow L2 protocols




                                © 2013 Cisco and/or its affiliates. All rights reserved.   Cisco Public                  30
Transparent Mode Configuration in the DC (2 interfaces)

               interface TenGigabitEthernet0/6
                                                       SVI VLAN200 172.16.25.253                                SVI VLAN200 172.16.25.254
               channel-group 32 mode active vss-id 1   FHRP – 172.16.25.1                                       FHRP – 172.16.25.1
               no nameif
               no security-level                                                                                          North Zone
               !                                                                                                          VLAN 200
               interface TenGigabitEthernet0/7
               channel-group 32 mode active vss-id 2
               no nameif
               no security-level
               !
               interface BVI1
               ip address 172.16.25.86 255.255.255.0                                                     VPC
               !                                                                                                                VLAN 200
               interface Port-channel32                                                                                         Outside
                no nameif
                no security-level                                                                                                VLAN 201
               !                                                                                                                 Inside
               interface Port-channel32.201                                            VPC                   172.16.25.86/24
                mac-address 3232.1111.3232
                vlan 201
                nameif inside
                bridge-group 1
                security-level 100
               !                                                                   Trunk Allowed 1,201                    South Zone
               interface Port-channel32.200
                                                                                                                          VLAN 201
                mac-address 3232.1a1a.3232
                vlan 200
                nameif outside
                bridge-group 1
                security-level 0
                                                                                                 Server in
                                                                                                 VLAN 201
Segmentation
Firewall - Mixed Mode vFW Contexts

• Mixed Mode is the concept of using virtual firewalls, some in routed mode and some in transparent (L2)
  mode
• This is only supported on the ASA running at least v9.0 or any ASA-SM version
• Up to 8 pairs of physical interfaces are supported per context
• This could conceivably allow both the Edge (L3) firewall and Internal (L2) firewall to live on the same set of
  physical appliances

        mode multiple

        context context1
          firewall transparent
          allocate-interface vlan99 outside
          allocate-interface vlan100 inside
          config-url disk0:/ctx1.cfg
          member gold
        context context2
          allocate-interface vlan200 outside
          allocate-interface vlan210 inside
          config-url disk0:/ctx2.cfg

                                 © 2013 Cisco and/or its affiliates. All rights reserved.   Cisco Public
Physical and Virtual Internal Zoning




© 2013 Cisco and/or its affiliates. All rights reserved.   Cisco Public
Example Internal Zoning for DEV – Option 1                                                                                                                       Internal Zoning
Physical Separation                                                                             Internet /
                                                                                                Extranet




Model could provide for Application load testing.                      ASA A/S HA                             CTX

If dedicated path through Core is required,
consider using a DEV vRF                                 DC Edge

If dedicated Edge is required, consider using
                                                            DC Core VDC (Routed)                               DEV VRF
vFW Contexts on edge ASAs or a separate
(lower-end) ASA PAir                                                         BGP/OSPF         DEV VRF

                                                                             Core                                              DEV VRF
                                                    L3
                                                    L2
DEV VDC Created on Nexus 7K, attached to                 Prod Aggregation Layer                                                                             Dev Aggregation Layer
CORE VDC and supporting its own PoD                                        VDC                                                                                               VDC



                                                                                                        FW CLUSTER(s)
ASAs in Aggregation layer could be oriented in
several ways.                                                                           CTX                              CTX
1- Single ASA Cluster with separate vFW
Contexts for the DEV zones – Would require
ports on the ASA are physically connected to                                                                                                                                              Virtual
each VDC                                                                                                                                                                            Access Layer
2- Separate ASA Clusters with or without vFW
Contexts                                                                                          PoD                                       PoD

Compute structure creates a mirrored server
environment for DEV operating on it own PoD
                                                                                                                                                               Virtual Switch
                                                               Virtual Switch
                                                                                                                                                                Hypervisor
                                                                Hypervisor
                                                                                          PROD Compute Zone                              DEV Compute Zone
Example Internal Zoning for DEV – Option 2                                                         Internal Zoning
Virtual Separation                                                                    Internet /
                                                                                       Extranet




                                                                   ASA A/S HA


                                                       DC Edge
Virtual Separation model uses a shared
Physical Infrastructure (Nexus) for routing and
transport                                                  DC Core VDC (Routed)

                                                                           BGP/OSPF
ASAs are used to separate DEV and PROD                                     Core
traffic                                           L3
                                                  L2
Virtual resources can share physical Server              Aggregation Layer VDC
Hardware and PoD. Security implemented
similarly than to a Secure Multi Tenant
environment




                                                                     FW CLUSTER



                                                                           Virtual
                                                                      Access Layer
Internal Zoning
Virtualization Security Concerns
Policy Enforcement
   ‒ Applied at physical server—not the individual VM
   ‒ Impossible to enforce policy for VMs in motion
Operations and Management
  ‒ Lack of VM visibility, accountability, and consistency
  ‒ Difficult management model and inability to effectively troubleshoot
Roles and Responsibilities
   ‒ Muddled ownership as server admin must configure
     virtual network
   ‒ Organizational redundancy creates compliance challenges
Machine Segmentation
   ‒ Server and application isolation on same physical server
   ‒ No separation between compliant and non-compliant systems…




                                 © 2013 Cisco and/or its affiliates. All rights reserved.   Cisco Public
Internal Zoning
 Cisco Virtual Networking and Cloud Network Services
                                                             Cloud Network Services
                                                                                                                                                                        Tenant A
         Virtualized/Cloud                             Imperva
                                                     SecureSphere
                                                                                Cloud Services                Network
                                                                                                                            ASA 1000V
                                                                                                                              Cloud
                                                                                                                                          Cisco Virtual
                                                                                                                                            Security
            Data Center                                  WAF
                                                                     Citrix     Router 1000V                  Analysis
                                                                                                              Module
                                                                                                                             Firewall       Gateway
                                                                    NetScaler
                                   Servers                            VPX
                                                                                                  vWAAS
                                                                                                              (vNAM)
WAN Router        Switches
                                                                                                                                                            Zone A


                                                                                                                                                                              Zone B


           Physical Infrastructure                           vPath               VXLAN                                   Nexus 1000V

                                                                                         Multi-Hypervisor (VMware, Microsoft*, RedHat*, Citrix*)

  Nexus 1000V                       VSG             ASA 1000V                        vWAAS                    CSR 1000V                        vNAM                          Ecosystem
  (Dist. Virtual Switch)      (Zone-based FW)           (Cloud FW)                (WAN Optimization)           (Cloud Router)            (Network Analytics)                  Services
 • Distributed switch        • VM-level controls   • Edge firewall, VPN         • WAN optimization                                                                    • Citrix NetScaler VPX
                                                                                                            • WAN L3 gateway            • App Visibility (L2-L7)
                                                                                                                                                                        virtual ADC
 • NX-OS consistency         • Zone-based FW       • Protocol Inspection        • Application traffic       • Routing and VPN           • Overlay Intelligence
                                                                                                                                                                      • Imperva Web App. FW
                                                                                                                                         (OTV, VXLAN, FP**)
                                                                                                                                                                             N1110: 1H CY2013
   7000+ Customers              Available Now         Available Now                 Available Now                 1H 2013                    PoC: 1H 2013                    vPath: 2H CY2013


                                                                                          **MSFT: 2Q CY2013; Open-source: In PoC                          **FP: FabricPath
Internal Zoning
Managing Virtual Networking Policy


                     Server
          Network    Team
                                                   Security
          Team
                                                   Team
                                                                                         Nexus 1000V (1110/1010)
                                                                                          Non-disruptive operation model to maintain
                                                                                           current workflows using Port Profiles
                    Nexus 1000V                                                           Maintain network security policies with
                                                                                           isolation and segmentation via VLANs,
                                                                                           Private VLANs, Port-based Access Lists,
                                                                                           Cisco Integrated Security Features
                                                                                          Ensure visibility (VM Introspection) into
                                                                                           virtual machine traffic flows using traditional
                                                                                           network features such as ERSPAN and
                                                                                           NetFlow



  Isolation and      Management and                             Roles and
  Segmentation       Monitoring                                 Responsibilities

                              © 2013 Cisco and/or its affiliates. All rights reserved.     Cisco Public
Internal Zoning
Cisco’s Virtual Security Portfolio


   Cisco® VSG                            Cisco ASA 1000V

             Intra-Tenant                     Tenant-Edge
             Security                             Security
  • Secures traffic between virtual
                                       • Secures the tenant edge
    machines within a tenant
                                       • Default gateway; Layer 3 firewall
  • Layer 2 and 3 firewall to secure     to secure north-to-south traffic
    east-to-west traffic
                                       • Edge firewall capabilities including
  • ACLs using network attributes        network attribute-based ACLs,
    and virtual machine attributes       site-to-site VPN, NAT, DHCP,
                                         inspections, and IP audit
  • First-packet lookup and
    performance acceleration using     • All packets go through the Cisco
    vPath                                ASA 1000V
Internal Zoning
Security for Virtualization
                                                                                               Virtual Security Gateway




                                                                                                                Zone based intra-tenant
                                                                                                                 segmentation of VMs
                                                                     Nexus 1000V

                                                                                                      ASA 1000V
      Virtual Service Nodes
              vPATH
          Nexus 1000V

           Hypervisor

                                                                                                       Ingress/Egress multi-tenant edge
                                                                                                                 deployment
                              vCenter                                 Nexus 1KV              VNMC




                                        Server                            Network Admin        Security Admin
                                        Admin

                                  © 2013 Cisco and/or its affiliates. All rights reserved.            Cisco Public
Internal Zoning
    Microsegmenation
     Policy Per Zone, Per VM, Per vNIC

                                       Control ingress/egress & inter-VM traffic
                                                  Firewall, ACL, VM Attributes
Virtual ASA
                                                                                                                               Virtual ASA

 Zone A                                       Enable Dynamic Provisioning
                                                                                                            Zone B             Zone C



                                          Mobility Transparent Enforcement
                                                                                                                                    vApp

                        VSG                     Administrative Segregation                                           VSG
                                                 Server • Network • Security
                                                                                                                                    vApp
                                                                                                                                             VSG

                vPath
                         Nexus 1000V
              vSphere                                                                                                vPath
                                                                                                                                           Nexus 1000V
                                                                                                                     vSphere




                                         © 2013 Cisco and/or its affiliates. All rights reserved.   Cisco Public
Internal Zoning
 Physical to Virtual



• Zones used define policy
  enforcement
• Unique policies and traffic
  decisions applied to each zone
• Physical Infrastructure mapped
  per zone                                                                                    Steer VM traffic to Firewall
   ‒ VRF, Virtual Context                                                                     Context

• Merging physical and virtual
  infrastructure
                                                                                                    Segment pools of
                                                                                                   blade resources per
                                                                                                          Zone
                                                                 Virtual Switch                                                  Virtual Switch
                                                                    Hypervisor                                                    Hypervisor


                                                                                                                                                   48
                                   © 2013 Cisco and/or its affiliates. All rights reserved.                       Cisco Public
Internal Zoning
vPath Intelligence: Service Chaining
ASA 1000V and VSG

• vservice node ASA1 type asa
    ip address 172.31.2.11                                                                 Defining the Service Node
    adjacency l2 vlan 3770                                                                 on Nexus 1000V
• vservice node VSG1 type vsg
    ip address 10.10.11.202
    adjacency l3

• vservice path chain-VSG-ASA                                                            Chain the Service Nodes
    node VSG1 profile sp-web order 10                                                    Order is inside to outside
    node ASA1 profile sp-edge order 20

• port-profile type vethernet Tenant-1                                                   Enable the Service Chain
   org root/Tenant-1                                                                     Per Port-Profile
   vservice path chain-VSG-ASA
                              © 2013 Cisco and/or its affiliates. All rights reserved.   Cisco Public                     49
Internal Zoning
Virtual Firewall and Physical Network
ASA 1000V Deployment

                                              Core




                                       Aggregation                                                  10.1.2.254

                                                                                                              Layer 3
         Protected VRF                                                                                      10.1.2.254
                                                                                                                                               ASA 5585
                                                                                                       ASA 5585
                        Layer 3
                      10.1.1.254                                                                                                                      Layer 3
                                                                                                              Layer 2                               10.1.3.254



     10.1.1.252                                       10.1.1.253
                   ASA 1000V




                           vPath                                                                                                                             vPath
                                                                                                              vPath
                      Nexus 1000V                                                                        Nexus 1000V                                      Nexus 1000V
                          Hypervisor                                                                                                                       Hypervisor
                                                                                                           Hypervisor                  Sub Zones



                                         © 2013 Cisco and/or its affiliates. All rights reserved.                       Cisco Public                                    50
Internal Zoning
Multi-Tier Application Architecture
Edge Firewall                                                                                                                               Web
                                                                                                                                            Client


• Tier Deployment
   •   Multi-Tier application architectures
   • Application vendor often has specific recommendations on                                                                               ASA 1000V
     how to deploy an application
   • Can consist of
                                                                                                      Permit Only Port    Permit Only Port 22 Block all external access
       • Web (presentation) tier                                                                  80(HTTP) of Web Servers (SSH) to application  to database servers
                                                                                                                                servers
       • Application tier
       • Database tier
                                                                                                          Web                    App                   DBDB
                                                                                                            Web                    App
   • Web and Application services can be on physically separate                                           Server
                                                                                                            Server
                                                                                                                                 Server
                                                                                                                                   Server
                                                                                                                                                       server
                                                                                                                                                         server
     servers or collapsed into single in some cases
                                                                                                       Web-zone          Application-zone            Database-zone
   • Normal flow is often client->web->application->database
   • No direct client to database communication                                                        Only Permit Web servers          Only Permit Application servers
                                                                                                       access to Application servers    access to Database servers
   • Servers may be clustered for high availability. Often uses
     layer 2 multicast protocol for state exchange



                                       © 2013 Cisco and/or its affiliates. All rights reserved.                       Cisco Public                                        51
© 2013 Cisco and/or its affiliates. All rights reserved.   Cisco Public
Compliance
PCI Compliance Design Option –
Physical Separation with VDC
                                                                                                    Internet /
                                                                                                    Extranet
Edge ASAs may implement a specific context for                     IPSec
Compliance needs or a distinct pair of ASA s may be
used

                                                                           ASA A/S HA         CTX                CTX

                                                                                                PCI VRF
                                                            DC Edge
                                                                                                                                    SGT
Nexus 7K carries traffic from ASA Context across
vRF – PCI VRF – Moves packets across routed Core               DC Core VDC (Routed)                                PCI VRF
                                                                                                                                        802.1AE
to PCI Distribution VDC                                                                                                                (encrypt)
                                                                                              SGT VRF
                                                                                               PCI
                                                                                                                  SGT
                                                                BGP/OSPF
Security Group Access with MACSEC can be used on                Core                                                              PCI VRF
the Nexus 7000 to provide hop-by-hop encryption        L3
                                                       L2
Dedicated ASAs (or vFW Context(s)) in Distribution          Prod Aggregation Layer                                                                          PCI Aggregation Layer
Layer VDC invoke North-South Security Policy,                                 VDC                                                                                            VDC
possibly even enforcing using the SGT (via SXP)
limiting compliant access to only the PCI Zone
Servers by network, service or application
                                                                                                            FW CLUSTER(s)

                                                                                        CTX                                  CTX SGT



Within Virtual Access Layer dedicated Server                                                                                                                                              Virtual
hardware is recommended for Security (compliance)                                                                                                                                   Access Layer

Additional port profiles may be created and leverage                                                  PoD                                          PoD
the Virtual Security Gateway (VSG) for East-West
zoning between VMs in the DMZ

ASA1000v can also be used to implement a Secure
IPSec VPN to another secure destination                                                                                                                       Virtual Switch
                                                                  Virtual Switch
                                                                                                                                                                Hypervisor
                                                                   Hypervisor

                                                                                        Production Servers                        Compliance Zone Servers
Thank you.




© 2012 Cisco and/or its affiliates. All rights reserved.   CISCO CONFIDENTIAL INTERNAL USE ONLY   54

More Related Content

What's hot

Data center proposal
Data center proposalData center proposal
Data center proposalMuhammad Ahad
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsThousandEyes
 
The business case for SD WAN in the enterprise
The business case for SD WAN in the enterprise The business case for SD WAN in the enterprise
The business case for SD WAN in the enterprise Colt Technology Services
 
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Anwesh Dixit
 
Modern Data Center Network Architecture - The house that Clos built
Modern Data Center Network Architecture - The house that Clos builtModern Data Center Network Architecture - The house that Clos built
Modern Data Center Network Architecture - The house that Clos builtCumulus Networks
 
Colt's L3 VPN Evolution: Towards Hybrid MPLS and SD WAN
Colt's L3 VPN Evolution: Towards Hybrid MPLS and SD WAN Colt's L3 VPN Evolution: Towards Hybrid MPLS and SD WAN
Colt's L3 VPN Evolution: Towards Hybrid MPLS and SD WAN Colt Technology Services
 
Brkarc 3454 - in-depth and personal with the cisco nexus 2000 fabric extender...
Brkarc 3454 - in-depth and personal with the cisco nexus 2000 fabric extender...Brkarc 3454 - in-depth and personal with the cisco nexus 2000 fabric extender...
Brkarc 3454 - in-depth and personal with the cisco nexus 2000 fabric extender...kds850
 
SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN Ashutosh Kaushik
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)Iftikhar Ali Iqbal
 
Azure SQL Database & Azure SQL Data Warehouse
Azure SQL Database & Azure SQL Data WarehouseAzure SQL Database & Azure SQL Data Warehouse
Azure SQL Database & Azure SQL Data WarehouseMohamed Tawfik
 
Azure Networking (1).pptx
Azure Networking (1).pptxAzure Networking (1).pptx
Azure Networking (1).pptxRazith2
 
Understanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN SolutionUnderstanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN SolutionCisco Canada
 
RPP PPG TKJ (PENERAPAN PJBL & PBL) - ADMINISTRASI INFRASTRUKTUR JARINGAN (WAL...
RPP PPG TKJ (PENERAPAN PJBL & PBL) - ADMINISTRASI INFRASTRUKTUR JARINGAN (WAL...RPP PPG TKJ (PENERAPAN PJBL & PBL) - ADMINISTRASI INFRASTRUKTUR JARINGAN (WAL...
RPP PPG TKJ (PENERAPAN PJBL & PBL) - ADMINISTRASI INFRASTRUKTUR JARINGAN (WAL...Walid Umar
 
Az 104 session 6 azure networking part2
Az 104 session 6 azure networking part2Az 104 session 6 azure networking part2
Az 104 session 6 azure networking part2AzureEzy1
 

What's hot (20)

Data center proposal
Data center proposalData center proposal
Data center proposal
 
projecto de rede computadores
projecto de rede computadoresprojecto de rede computadores
projecto de rede computadores
 
SD WAN
SD WANSD WAN
SD WAN
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of Concepts
 
Cisco DCACI
Cisco DCACICisco DCACI
Cisco DCACI
 
The business case for SD WAN in the enterprise
The business case for SD WAN in the enterprise The business case for SD WAN in the enterprise
The business case for SD WAN in the enterprise
 
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)
 
Modern Data Center Network Architecture - The house that Clos built
Modern Data Center Network Architecture - The house that Clos builtModern Data Center Network Architecture - The house that Clos built
Modern Data Center Network Architecture - The house that Clos built
 
49778140 projeto-de-rede
49778140 projeto-de-rede49778140 projeto-de-rede
49778140 projeto-de-rede
 
Colt's L3 VPN Evolution: Towards Hybrid MPLS and SD WAN
Colt's L3 VPN Evolution: Towards Hybrid MPLS and SD WAN Colt's L3 VPN Evolution: Towards Hybrid MPLS and SD WAN
Colt's L3 VPN Evolution: Towards Hybrid MPLS and SD WAN
 
Brkarc 3454 - in-depth and personal with the cisco nexus 2000 fabric extender...
Brkarc 3454 - in-depth and personal with the cisco nexus 2000 fabric extender...Brkarc 3454 - in-depth and personal with the cisco nexus 2000 fabric extender...
Brkarc 3454 - in-depth and personal with the cisco nexus 2000 fabric extender...
 
SD-WAN
SD-WANSD-WAN
SD-WAN
 
SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
 
Azure SQL Database & Azure SQL Data Warehouse
Azure SQL Database & Azure SQL Data WarehouseAzure SQL Database & Azure SQL Data Warehouse
Azure SQL Database & Azure SQL Data Warehouse
 
Azure Networking (1).pptx
Azure Networking (1).pptxAzure Networking (1).pptx
Azure Networking (1).pptx
 
Understanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN SolutionUnderstanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN Solution
 
RPP PPG TKJ (PENERAPAN PJBL & PBL) - ADMINISTRASI INFRASTRUKTUR JARINGAN (WAL...
RPP PPG TKJ (PENERAPAN PJBL & PBL) - ADMINISTRASI INFRASTRUKTUR JARINGAN (WAL...RPP PPG TKJ (PENERAPAN PJBL & PBL) - ADMINISTRASI INFRASTRUKTUR JARINGAN (WAL...
RPP PPG TKJ (PENERAPAN PJBL & PBL) - ADMINISTRASI INFRASTRUKTUR JARINGAN (WAL...
 
Az 104 session 6 azure networking part2
Az 104 session 6 azure networking part2Az 104 session 6 azure networking part2
Az 104 session 6 azure networking part2
 
Threat hunting using notebook technologies
Threat hunting using notebook technologiesThreat hunting using notebook technologies
Threat hunting using notebook technologies
 

Viewers also liked

Data Center Security
Data Center SecurityData Center Security
Data Center SecurityCisco Canada
 
Data Center Network Topologies
Data Center Network TopologiesData Center Network Topologies
Data Center Network Topologiesrjain51
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data CenterCisco Canada
 
DataCenter:: Infrastructure Presentation
DataCenter:: Infrastructure PresentationDataCenter:: Infrastructure Presentation
DataCenter:: Infrastructure PresentationMuhammad Asad Rashid
 
Отказоустойчивость с использованием Cisco ASA Clustering
Отказоустойчивость с использованием Cisco ASA ClusteringОтказоустойчивость с использованием Cisco ASA Clustering
Отказоустойчивость с использованием Cisco ASA ClusteringCisco Russia
 
Data Center Network Trends - Lin Nease
Data Center Network Trends - Lin NeaseData Center Network Trends - Lin Nease
Data Center Network Trends - Lin NeaseHPDutchWorld
 
Data Center Proposal (System Network Administration)
Data Center Proposal (System Network Administration)Data Center Proposal (System Network Administration)
Data Center Proposal (System Network Administration)Muhammad Ahad
 
Reference Architecture-Validated & Tested Approach to Define Network Design
Reference Architecture-Validated & Tested Approach to Define Network DesignReference Architecture-Validated & Tested Approach to Define Network Design
Reference Architecture-Validated & Tested Approach to Define Network DesignDataWorks Summit
 
POWER POINT PRESENTATION ON DATA CENTER
POWER POINT PRESENTATION ON DATA CENTERPOWER POINT PRESENTATION ON DATA CENTER
POWER POINT PRESENTATION ON DATA CENTERvivekprajapatiankur
 
Data Center Convergentes - Carlos Spera - 20 de octubre - UY
Data Center Convergentes - Carlos Spera - 20 de octubre - UYData Center Convergentes - Carlos Spera - 20 de octubre - UY
Data Center Convergentes - Carlos Spera - 20 de octubre - UYLogicalis Latam
 
Построение и развитие сети крупного ЦОД.
 Построение и развитие сети крупного ЦОД.  Построение и развитие сети крупного ЦОД.
Построение и развитие сети крупного ЦОД. Cisco Russia
 
Стратегия Cisco в ЦОД (доклад на английском языке)
Стратегия Cisco в ЦОД (доклад на английском языке)Стратегия Cisco в ЦОД (доклад на английском языке)
Стратегия Cisco в ЦОД (доклад на английском языке)Cisco Russia
 
Тестирование QoS на экспериментальном стенде
Тестирование QoS на экспериментальном стендеТестирование QoS на экспериментальном стенде
Тестирование QoS на экспериментальном стендеARCCN
 
Deploy Failover/High Availability in ASA Firewall
Deploy Failover/High Availability in ASA FirewallDeploy Failover/High Availability in ASA Firewall
Deploy Failover/High Availability in ASA FirewallKHNOG
 
Domain name system
Domain name systemDomain name system
Domain name systemRahul Baghla
 
Case Study: Datotel Extended the Power of Infrastructure Management to the Ph...
Case Study: Datotel Extended the Power of Infrastructure Management to the Ph...Case Study: Datotel Extended the Power of Infrastructure Management to the Ph...
Case Study: Datotel Extended the Power of Infrastructure Management to the Ph...CA Technologies
 
Контроль производительности приложений в сети при помощи маршрутизаторов ISR...
 Контроль производительности приложений в сети при помощи маршрутизаторов ISR... Контроль производительности приложений в сети при помощи маршрутизаторов ISR...
Контроль производительности приложений в сети при помощи маршрутизаторов ISR...Cisco Russia
 
Secure Data Center Solution with FP 9300 - BDM
Secure Data Center Solution with FP 9300 - BDMSecure Data Center Solution with FP 9300 - BDM
Secure Data Center Solution with FP 9300 - BDMBill McGee
 

Viewers also liked (20)

Data Center Security
Data Center SecurityData Center Security
Data Center Security
 
Data Center Network Topologies
Data Center Network TopologiesData Center Network Topologies
Data Center Network Topologies
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data Center
 
DataCenter:: Infrastructure Presentation
DataCenter:: Infrastructure PresentationDataCenter:: Infrastructure Presentation
DataCenter:: Infrastructure Presentation
 
Отказоустойчивость с использованием Cisco ASA Clustering
Отказоустойчивость с использованием Cisco ASA ClusteringОтказоустойчивость с использованием Cisco ASA Clustering
Отказоустойчивость с использованием Cisco ASA Clustering
 
Data Center Network Trends - Lin Nease
Data Center Network Trends - Lin NeaseData Center Network Trends - Lin Nease
Data Center Network Trends - Lin Nease
 
Data Center Proposal (System Network Administration)
Data Center Proposal (System Network Administration)Data Center Proposal (System Network Administration)
Data Center Proposal (System Network Administration)
 
Reference Architecture-Validated & Tested Approach to Define Network Design
Reference Architecture-Validated & Tested Approach to Define Network DesignReference Architecture-Validated & Tested Approach to Define Network Design
Reference Architecture-Validated & Tested Approach to Define Network Design
 
POWER POINT PRESENTATION ON DATA CENTER
POWER POINT PRESENTATION ON DATA CENTERPOWER POINT PRESENTATION ON DATA CENTER
POWER POINT PRESENTATION ON DATA CENTER
 
Data Center Convergentes - Carlos Spera - 20 de octubre - UY
Data Center Convergentes - Carlos Spera - 20 de octubre - UYData Center Convergentes - Carlos Spera - 20 de octubre - UY
Data Center Convergentes - Carlos Spera - 20 de octubre - UY
 
Dmz data center
Dmz data centerDmz data center
Dmz data center
 
Построение и развитие сети крупного ЦОД.
 Построение и развитие сети крупного ЦОД.  Построение и развитие сети крупного ЦОД.
Построение и развитие сети крупного ЦОД.
 
VPN in Virtualized DataCenter
VPN in Virtualized DataCenterVPN in Virtualized DataCenter
VPN in Virtualized DataCenter
 
Стратегия Cisco в ЦОД (доклад на английском языке)
Стратегия Cisco в ЦОД (доклад на английском языке)Стратегия Cisco в ЦОД (доклад на английском языке)
Стратегия Cisco в ЦОД (доклад на английском языке)
 
Тестирование QoS на экспериментальном стенде
Тестирование QoS на экспериментальном стендеТестирование QoS на экспериментальном стенде
Тестирование QoS на экспериментальном стенде
 
Deploy Failover/High Availability in ASA Firewall
Deploy Failover/High Availability in ASA FirewallDeploy Failover/High Availability in ASA Firewall
Deploy Failover/High Availability in ASA Firewall
 
Domain name system
Domain name systemDomain name system
Domain name system
 
Case Study: Datotel Extended the Power of Infrastructure Management to the Ph...
Case Study: Datotel Extended the Power of Infrastructure Management to the Ph...Case Study: Datotel Extended the Power of Infrastructure Management to the Ph...
Case Study: Datotel Extended the Power of Infrastructure Management to the Ph...
 
Контроль производительности приложений в сети при помощи маршрутизаторов ISR...
 Контроль производительности приложений в сети при помощи маршрутизаторов ISR... Контроль производительности приложений в сети при помощи маршрутизаторов ISR...
Контроль производительности приложений в сети при помощи маршрутизаторов ISR...
 
Secure Data Center Solution with FP 9300 - BDM
Secure Data Center Solution with FP 9300 - BDMSecure Data Center Solution with FP 9300 - BDM
Secure Data Center Solution with FP 9300 - BDM
 

Similar to Designing Secure Cisco Data Centers

2 25008 domain_ten11.29.12_v2_opt
2 25008 domain_ten11.29.12_v2_opt2 25008 domain_ten11.29.12_v2_opt
2 25008 domain_ten11.29.12_v2_optEdda Kang
 
Cloud Networking: Network aspects of the cloud
Cloud Networking: Network aspects of the cloudCloud Networking: Network aspects of the cloud
Cloud Networking: Network aspects of the cloudSAIL
 
From Physical to Virtual to Cloud
From Physical to Virtual to CloudFrom Physical to Virtual to Cloud
From Physical to Virtual to CloudCisco Security
 
Managing an Enterprise WLAN with Cisco Prime NCS & WCS
Managing an Enterprise WLAN with Cisco Prime NCS & WCSManaging an Enterprise WLAN with Cisco Prime NCS & WCS
Managing an Enterprise WLAN with Cisco Prime NCS & WCSCisco Mobility
 
Accel Partners New Data Workshop 7-14-10
Accel Partners New Data Workshop 7-14-10Accel Partners New Data Workshop 7-14-10
Accel Partners New Data Workshop 7-14-10keirdo1
 
Cisco Presentation
Cisco PresentationCisco Presentation
Cisco PresentationRBratton
 
Triangle bdpa wo vid
Triangle bdpa wo vidTriangle bdpa wo vid
Triangle bdpa wo vidsantosomar
 
The unified data center for cloud david yen
The unified data center for cloud david yenThe unified data center for cloud david yen
The unified data center for cloud david yendeepersnet
 
Cisco open network environment
Cisco open network environmentCisco open network environment
Cisco open network environmentdeepers
 
Cisco tec rob soderbery - core enterprise networking
Cisco tec   rob soderbery - core enterprise networkingCisco tec   rob soderbery - core enterprise networking
Cisco tec rob soderbery - core enterprise networkingCisco Public Relations
 
2010 09-24-闕志克老師-cloud computing where do we go
2010 09-24-闕志克老師-cloud computing where do we go2010 09-24-闕志克老師-cloud computing where do we go
2010 09-24-闕志克老師-cloud computing where do we gonccuscience
 
Gef 2012 InduSoft Presentation
Gef 2012  InduSoft PresentationGef 2012  InduSoft Presentation
Gef 2012 InduSoft PresentationAVEVA
 
Nicira chef webinar-merged
Nicira chef webinar-mergedNicira chef webinar-merged
Nicira chef webinar-mergedStathy Touloumis
 
Cisco cloud strategy cisco
Cisco cloud strategy ciscoCisco cloud strategy cisco
Cisco cloud strategy ciscoOpenSourceCamp
 
Vxi design zone and partner refresh combined v4
Vxi   design zone and partner refresh combined v4Vxi   design zone and partner refresh combined v4
Vxi design zone and partner refresh combined v4tariqkmh
 
A Hitchhiker's Guide to the Inter-Cloud
A Hitchhiker's Guide to the Inter-CloudA Hitchhiker's Guide to the Inter-Cloud
A Hitchhiker's Guide to the Inter-CloudGovCloud Network
 

Similar to Designing Secure Cisco Data Centers (20)

2 25008 domain_ten11.29.12_v2_opt
2 25008 domain_ten11.29.12_v2_opt2 25008 domain_ten11.29.12_v2_opt
2 25008 domain_ten11.29.12_v2_opt
 
Cloud Networking: Network aspects of the cloud
Cloud Networking: Network aspects of the cloudCloud Networking: Network aspects of the cloud
Cloud Networking: Network aspects of the cloud
 
The Network Enabled EOC
The Network Enabled EOCThe Network Enabled EOC
The Network Enabled EOC
 
From Physical to Virtual to Cloud
From Physical to Virtual to CloudFrom Physical to Virtual to Cloud
From Physical to Virtual to Cloud
 
Managing an Enterprise WLAN with Cisco Prime NCS & WCS
Managing an Enterprise WLAN with Cisco Prime NCS & WCSManaging an Enterprise WLAN with Cisco Prime NCS & WCS
Managing an Enterprise WLAN with Cisco Prime NCS & WCS
 
Accel Partners New Data Workshop 7-14-10
Accel Partners New Data Workshop 7-14-10Accel Partners New Data Workshop 7-14-10
Accel Partners New Data Workshop 7-14-10
 
Cisco Presentation
Cisco PresentationCisco Presentation
Cisco Presentation
 
The SDN Opportunity
The SDN OpportunityThe SDN Opportunity
The SDN Opportunity
 
Osac2012
Osac2012Osac2012
Osac2012
 
Triangle bdpa wo vid
Triangle bdpa wo vidTriangle bdpa wo vid
Triangle bdpa wo vid
 
Chapter1 rev1.0
Chapter1   rev1.0Chapter1   rev1.0
Chapter1 rev1.0
 
The unified data center for cloud david yen
The unified data center for cloud david yenThe unified data center for cloud david yen
The unified data center for cloud david yen
 
Cisco open network environment
Cisco open network environmentCisco open network environment
Cisco open network environment
 
Cisco tec rob soderbery - core enterprise networking
Cisco tec   rob soderbery - core enterprise networkingCisco tec   rob soderbery - core enterprise networking
Cisco tec rob soderbery - core enterprise networking
 
2010 09-24-闕志克老師-cloud computing where do we go
2010 09-24-闕志克老師-cloud computing where do we go2010 09-24-闕志克老師-cloud computing where do we go
2010 09-24-闕志克老師-cloud computing where do we go
 
Gef 2012 InduSoft Presentation
Gef 2012  InduSoft PresentationGef 2012  InduSoft Presentation
Gef 2012 InduSoft Presentation
 
Nicira chef webinar-merged
Nicira chef webinar-mergedNicira chef webinar-merged
Nicira chef webinar-merged
 
Cisco cloud strategy cisco
Cisco cloud strategy ciscoCisco cloud strategy cisco
Cisco cloud strategy cisco
 
Vxi design zone and partner refresh combined v4
Vxi   design zone and partner refresh combined v4Vxi   design zone and partner refresh combined v4
Vxi design zone and partner refresh combined v4
 
A Hitchhiker's Guide to the Inter-Cloud
A Hitchhiker's Guide to the Inter-CloudA Hitchhiker's Guide to the Inter-Cloud
A Hitchhiker's Guide to the Inter-Cloud
 

More from Cisco Russia

Service portfolio 18
Service portfolio 18Service portfolio 18
Service portfolio 18Cisco Russia
 
История одного взлома. Как решения Cisco могли бы предотвратить его?
История одного взлома. Как решения Cisco могли бы предотвратить его?История одного взлома. Как решения Cisco могли бы предотвратить его?
История одного взлома. Как решения Cisco могли бы предотвратить его?Cisco Russia
 
Об оценке соответствия средств защиты информации
Об оценке соответствия средств защиты информацииОб оценке соответствия средств защиты информации
Об оценке соответствия средств защиты информацииCisco Russia
 
Обзор Сервисных Услуг Cisco в России и странах СНГ.
Обзор Сервисных Услуг Cisco в России и странах СНГ.Обзор Сервисных Услуг Cisco в России и странах СНГ.
Обзор Сервисных Услуг Cisco в России и странах СНГ.Cisco Russia
 
Клиентские контракты на техническую поддержку Cisco Smart Net Total Care
Клиентские контракты на техническую поддержку Cisco Smart Net Total CareКлиентские контракты на техническую поддержку Cisco Smart Net Total Care
Клиентские контракты на техническую поддержку Cisco Smart Net Total CareCisco Russia
 
Cisco Catalyst 9000 series
Cisco Catalyst 9000 series Cisco Catalyst 9000 series
Cisco Catalyst 9000 series Cisco Russia
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Russia
 
Профессиональные услуги Cisco для Software-Defined Access
Профессиональные услуги Cisco для Software-Defined AccessПрофессиональные услуги Cisco для Software-Defined Access
Профессиональные услуги Cisco для Software-Defined AccessCisco Russia
 
Обнаружение известного вредоносного кода в зашифрованном с помощью TLS трафик...
Обнаружение известного вредоносного кода в зашифрованном с помощью TLS трафик...Обнаружение известного вредоносного кода в зашифрованном с помощью TLS трафик...
Обнаружение известного вредоносного кода в зашифрованном с помощью TLS трафик...Cisco Russia
 
Промышленный Интернет вещей: опыт и результаты применения в нефтегазовой отрасли
Промышленный Интернет вещей: опыт и результаты применения в нефтегазовой отраслиПромышленный Интернет вещей: опыт и результаты применения в нефтегазовой отрасли
Промышленный Интернет вещей: опыт и результаты применения в нефтегазовой отраслиCisco Russia
 
Полугодовой отчет Cisco по информационной безопасности за 2017 год
Полугодовой отчет Cisco по информационной безопасности за 2017 год Полугодовой отчет Cisco по информационной безопасности за 2017 год
Полугодовой отчет Cisco по информационной безопасности за 2017 год Cisco Russia
 
Годовой отчет Cisco по кибербезопасности за 2017 год
Годовой отчет Cisco по кибербезопасности за 2017 годГодовой отчет Cisco по кибербезопасности за 2017 год
Годовой отчет Cisco по кибербезопасности за 2017 годCisco Russia
 
Безопасность для цифровой экономики. Развитие продуктов и решений Cisco
Безопасность для цифровой экономики. Развитие продуктов и решений CiscoБезопасность для цифровой экономики. Развитие продуктов и решений Cisco
Безопасность для цифровой экономики. Развитие продуктов и решений CiscoCisco Russia
 
Cisco StealthWatch. Использование телеметрии для решения проблемы зашифрованн...
Cisco StealthWatch. Использование телеметрии для решения проблемы зашифрованн...Cisco StealthWatch. Использование телеметрии для решения проблемы зашифрованн...
Cisco StealthWatch. Использование телеметрии для решения проблемы зашифрованн...Cisco Russia
 
Обеспечение бесперебойной работы корпоративных приложений в больших гетероген...
Обеспечение бесперебойной работы корпоративных приложений в больших гетероген...Обеспечение бесперебойной работы корпоративных приложений в больших гетероген...
Обеспечение бесперебойной работы корпоративных приложений в больших гетероген...Cisco Russia
 
Новое поколение серверов Сisco UCS. Гиперконвергентное решении Cisco HyperFle...
Новое поколение серверов Сisco UCS. Гиперконвергентное решении Cisco HyperFle...Новое поколение серверов Сisco UCS. Гиперконвергентное решении Cisco HyperFle...
Новое поколение серверов Сisco UCS. Гиперконвергентное решении Cisco HyperFle...Cisco Russia
 

More from Cisco Russia (20)

Service portfolio 18
Service portfolio 18Service portfolio 18
Service portfolio 18
 
История одного взлома. Как решения Cisco могли бы предотвратить его?
История одного взлома. Как решения Cisco могли бы предотвратить его?История одного взлома. Как решения Cisco могли бы предотвратить его?
История одного взлома. Как решения Cisco могли бы предотвратить его?
 
Об оценке соответствия средств защиты информации
Об оценке соответствия средств защиты информацииОб оценке соответствия средств защиты информации
Об оценке соответствия средств защиты информации
 
Обзор Сервисных Услуг Cisco в России и странах СНГ.
Обзор Сервисных Услуг Cisco в России и странах СНГ.Обзор Сервисных Услуг Cisco в России и странах СНГ.
Обзор Сервисных Услуг Cisco в России и странах СНГ.
 
Клиентские контракты на техническую поддержку Cisco Smart Net Total Care
Клиентские контракты на техническую поддержку Cisco Smart Net Total CareКлиентские контракты на техническую поддержку Cisco Smart Net Total Care
Клиентские контракты на техническую поддержку Cisco Smart Net Total Care
 
Cisco Catalyst 9000 series
Cisco Catalyst 9000 series Cisco Catalyst 9000 series
Cisco Catalyst 9000 series
 
Cisco Catalyst 9500
Cisco Catalyst 9500Cisco Catalyst 9500
Cisco Catalyst 9500
 
Cisco Catalyst 9400
Cisco Catalyst 9400Cisco Catalyst 9400
Cisco Catalyst 9400
 
Cisco Umbrella
Cisco UmbrellaCisco Umbrella
Cisco Umbrella
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPs
 
Cisco FirePower
Cisco FirePowerCisco FirePower
Cisco FirePower
 
Профессиональные услуги Cisco для Software-Defined Access
Профессиональные услуги Cisco для Software-Defined AccessПрофессиональные услуги Cisco для Software-Defined Access
Профессиональные услуги Cisco для Software-Defined Access
 
Обнаружение известного вредоносного кода в зашифрованном с помощью TLS трафик...
Обнаружение известного вредоносного кода в зашифрованном с помощью TLS трафик...Обнаружение известного вредоносного кода в зашифрованном с помощью TLS трафик...
Обнаружение известного вредоносного кода в зашифрованном с помощью TLS трафик...
 
Промышленный Интернет вещей: опыт и результаты применения в нефтегазовой отрасли
Промышленный Интернет вещей: опыт и результаты применения в нефтегазовой отраслиПромышленный Интернет вещей: опыт и результаты применения в нефтегазовой отрасли
Промышленный Интернет вещей: опыт и результаты применения в нефтегазовой отрасли
 
Полугодовой отчет Cisco по информационной безопасности за 2017 год
Полугодовой отчет Cisco по информационной безопасности за 2017 год Полугодовой отчет Cisco по информационной безопасности за 2017 год
Полугодовой отчет Cisco по информационной безопасности за 2017 год
 
Годовой отчет Cisco по кибербезопасности за 2017 год
Годовой отчет Cisco по кибербезопасности за 2017 годГодовой отчет Cisco по кибербезопасности за 2017 год
Годовой отчет Cisco по кибербезопасности за 2017 год
 
Безопасность для цифровой экономики. Развитие продуктов и решений Cisco
Безопасность для цифровой экономики. Развитие продуктов и решений CiscoБезопасность для цифровой экономики. Развитие продуктов и решений Cisco
Безопасность для цифровой экономики. Развитие продуктов и решений Cisco
 
Cisco StealthWatch. Использование телеметрии для решения проблемы зашифрованн...
Cisco StealthWatch. Использование телеметрии для решения проблемы зашифрованн...Cisco StealthWatch. Использование телеметрии для решения проблемы зашифрованн...
Cisco StealthWatch. Использование телеметрии для решения проблемы зашифрованн...
 
Обеспечение бесперебойной работы корпоративных приложений в больших гетероген...
Обеспечение бесперебойной работы корпоративных приложений в больших гетероген...Обеспечение бесперебойной работы корпоративных приложений в больших гетероген...
Обеспечение бесперебойной работы корпоративных приложений в больших гетероген...
 
Новое поколение серверов Сisco UCS. Гиперконвергентное решении Cisco HyperFle...
Новое поколение серверов Сisco UCS. Гиперконвергентное решении Cisco HyperFle...Новое поколение серверов Сisco UCS. Гиперконвергентное решении Cisco HyperFle...
Новое поколение серверов Сisco UCS. Гиперконвергентное решении Cisco HyperFle...
 

Recently uploaded

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 

Recently uploaded (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

Designing Secure Cisco Data Centers

  • 1. Михаил Кадер, mkader@cisco.com security-request@cisco.com © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public
  • 2. Cisco Validated Designs Deliver Results Data Center / Secure Data Center CVD – www.cisco.com/go/vmdc “59% of organizations lack the lab resources or test environments to validate vendor claims for themselves.” —SANS Institute “Organizations clearly lack well-defined standards, processes, and resources for determining the resiliency of their critical network devices and systems.... Need methodical resiliency validation using a combo of real traffic, heavy load and security attacks.” —SANS and TOGAG © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public
  • 3. Setting the Foundation for the Secure Designs © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
  • 4. Architecture Traditional Data Center Architecture Items of note: - Both Physical Network Fabric and Virtualization components are represented - Well defined DC Edge (layer 3) providing connectivity and security services to/from DC and Internet/Extranet - DMZ network (physical or virtual workload) on DC edge that could securely leverage physical workloads or virtual workloads - DC Core is Routed (OSPF, BGP, EIGRP) with ECMP - DC Aggregation layer contains Physical Security Services allowing the creation of internal zones / trust enclaves without crossing core (East-West) and crossing core (North-South) only when required - Various End-of-Row/Top-of-Rack options represented between Aggregation and Compute/Access Layer - Virtual Security services represented with Nexus 1000v © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
  • 5. Traditional Secure Data Center Design – Basic and Simplified Data Center 1. 1 1 Physical Network Fabric – 1 1 2 2 -Creates the shared physical infrastructure for moving packets within the Physical Network Virtual Fabric & Data Center (North, South, East and West) Fabric Compute -Leverages the DC-Class Technologies of Cisco Nexus Switching A A External DC Edge – (External Zoning) A External DC Virtual -Boundary between the Data Center and the rest of the corporate Edge Workloads network (or Internet) (North-South) B Internal DC Zones – Stateful Internal separation B B -Allows Secure Zones or Trust Enclaves to be established within the DC Internal DC Zoning Virtual Services Network Fabric, establishing secure separation via External DC Zones or other Internal DC Zones (North-South) -Should inherently take advantage of the optimized network infrastructure without violating proper Data Center Design objectives High-Availability / Zero Downtime Scalability / Massive Workload Processing Survivability / Redundancy Low Latency / No Packet Loss Asymmetric Traffic Flows © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public
  • 6. Traditional Secure Data Center Design – Basic and Simplified Data Center 1. 22 Virtual Fabric and Compute– 1 1 2 2 -Creates the shared virtual infrastructure for moving packets within the Physical Network Virtual Fabric & Virtualized Data Center Fabric Compute -Leverages Virtualization & Compute Technologies of Cisco Nexus / Unified Compute System (UCS) and Virtualization Software e.g. A A External DC ‘Secure’ VMWare, Citrix, etc. Virtual Edge Workloads A Secure Virtual Workloads - -Securing the sum of the requests made by users and applications of a B B ‘virtual system’ Virtual Internal DC Security -Typically defined as a self-contained unit: an integrated stack consisting Zoning Services of application, middleware, database, and operating system devoted to a specific computing task B Virtual Security Services - -The Virtual services defined to successfully secure and optimize a Virtual Workload - Virtual Firewalls, Virtual Routing, Network Management, Virtual Load Balancers, Cloud Interconnect, VPN, etc. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public
  • 7. Architecture Secure DC: Traditional Use Cases 1 Secure Internal Zone From External Zone Secure Data in a Compliance Scenario [PCI, FISMA, HIPAA, etc.] 2 Internet VDC1 CTX1 DMZ CTX2 VDC2 Cisco VXI vPC vPC Campus / Data Center 3 Secure Application Tiers 4 Secure Multi-Tenancy Extranet Front-End (Presentation) Vendor CTX1 CTX1 CTX2 Partner Web Tier (business logic) CTX2 vPC DB Tier (data access) © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public
  • 8. Architecture Secure DC: Evolving Deployment Use Cases VDC1 VDC2 1 Traditional (Physical) DC vPC VMDC 2 Virtual DC Custom DC IPsec/SSL 5 Virtual Private Cloud 3 Virtual Desktop Internet Cisco VXI PaaS 6 Public Cloud 4 Internal Private Cloud SaaS Physical Virtual Private Cloud Public Cloud © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public
  • 9. Architecture The Evolving Data Center Architecture Aggregation Layer Data Center Core • Workload is localized to the Aggregation Block Layer • Centralized point for ingress and egress data center flows Layer 3 • Can be demarcation point for L2 and L3 • Services can be scaled as data center grows Layer 2 DC Aggregation Services Layer (option) Layer • Additional services location for server farm specific protection / optimization • Services localized to the applications running on the DC Service Layer servers connected to the physical pod – SLB, Monitors, etc. • Offloads port utilization from Aggregation Layer DC Access Layer Virtual Network & Access • Physical and virtual form factor for server connectivity Storage Virtual UCS • Top of rack provides port density for server connections Access • Merging point between physical and virtual networks Data security Virtual Firewall Port security authenticate & Real-time authentication, access control Monitoring QoS features Firewall Rules  Goal #1: Understand the current approach (De-Couple the Elements of the Design)  Goal #2: Understand the options we have to build a more efficient architecture (Re-assemble the elements into a more flexible design) © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
  • 10. Architecture The Evolving Data Center Architecture Adding Layered Security Services Data Center Edge • Physical Delineation for all ingress and egress into the ‘CORE’ of the DC – Traditional Security Models apply to North-South Protection Aggregation Layer • Initial filter for all ingress and egress to DC services & compute - “North-South” protection • Stateful filtering and logging for all ingress and egress traffic flows • Physical appliances can be virtualized and applied to server enclaves Services Layer (option) • Additional services location for server farm specific protection and other potential zones Virtual Network & Access Storage Virtual UCS Access • Virtual firewall, zone/enclave based filtering • IP-Based Access Control Lists Data security Virtual Firewall Port security authenticate & Real-time authentication, • VM attribute-based policies – Should Follow VM access control Monitoring QoS features Firewall Rules • “East-West” protection © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
  • 11. VDC and VPC Designs © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public
  • 12. Traditional Secure DC Design – Network Fabric Best Practices Data Center 1 1. 1 Physical Network Fabric – 1 1 2 -Leverage the full capacity of the Cisco Nexus Switching infrastructure Physical Network Virtual Fabric & -Security is pervasive, and while it has been known to ‘reduce Fabric Compute convenience’; decreasing required network functionality is unacceptable. A A External DC Edge – (External Zoning) A External DC Virtual -Leverage Edge connectivity (routing) Edge Workloads -Provide Edge Security (Firewall at minimum) -Layer 3 Firewalling (with or without NAT) may be used successfully B B -IPS and Next Generation Systems can add additional visibility and Internal DC Virtual Zoning Services protection -If very high-speed firewalling / federations, etc. are desired at the DC edge, ASR1K can deliver up to 100Gbps FW with Stateful HA -Path diversity into the datacenter if you can. Stateless with Federation to authenticate to the app, Stateful with Federation for compliance B Internal DC Zones – Stateful Internal separation -Keep routing on the Routers (Firewalls implemented transparently) -Leverage vPC/vPC+ and/or FabricPath technology to maximize DC traffic flow capability -All flows are expected to be asymmetric, therefore zone design should support this -No additional Packet-Loss penalties should be introduced -Zero-downtime Firewall upgrades should be supported -Survivability/HA on the Firewall / IPS devices is critical © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public
  • 13. Connectivity Building an Efficient DC Fabric to Scale Scaling the Network Fabric - Virtual Device Context (VDC) VDC 1 Layer 2 Protocols Layer 3 Protocols VLAN UDLD OSPF GLBP PVLAN CDP BGP HSRP STP 802.1X EIGRP IGMP LACP CTS PIM SNMP VDCs … … VDC 2 Layer 2 Protocols Layer 3 Protocols VLAN UDLD OSPF GLBP PVLAN CDP BGP HSRP STP 802.1X EIGRP IGMP LACP CTS PIM SNMP … … Nexus 7000 VDC – Virtual Device Context (up to 8 VDCs plus 1 Management VDC – SUP2E w/ NXOS 6.04/6.1)  Flexible separation/distribution of hardware resources and software components  Complete data plane and control plane separation  Complete software fault isolation  Securely delineated administrative contexts  Each physical interface can only be active in one VDC © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
  • 14. Connectivity Using VDCs for Vertical Consolidation One of the most common uses of VDCs • Allows Consolidation of Core, Aggregation while maintaining network hierarchy • No reduction in port count or links but fewer physical switches ‒ Copper Twinax cables (CX-1) provide a low cost 10G interconnect option Core Core Core Agg Agg Agg Access © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public
  • 15. Connectivity Using VDCs for Internet Edge/DMZ/Core  Option to meet multiple needs – XL VDC, DMZ and Core  Maintains security model with logical separation Internet Internet Edge(XL) Internet Internet Edge Edge(XL) (XL) Firewalls for Intra or Inter-VDC DMZ DMZ DMZ Traffic Flows Core Core Core © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public
  • 16. Connectivity VDC Security Certification  VDC separation is industry certified ‘Leak-proof Security Mechanism’  NSS Labs for PCI Compliant Environments – http://www.nsslabs.com  FIPS 140-2 http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140InProcess.pdf  Common Criteria Evaluation and Validation Scheme – Certification #10349 - http://www.niap-ccevs.org/st/vid10349/ © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
  • 17. Connectivity Using VDCs for PCI Compliance Segmentation • Maintains compliant security model with physical separation ‒ FW and IPS at the boundary of the CDE zone as required by PCI-DSS 2.0 Internet Internet Edge(XL) Internet Internet Edge Edge(XL) (XL) PCI PCI PCI Core Core Core © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public
  • 18. Connectivity Building an Efficient DC Fabric to Scale Logical Topology without vPC Scaling the Network Fabric – Virtual Port Channel vPC) Aggregation • Allow a single device to use a port channel across two upstream switches (aka MCEC) • Eliminate STP blocked ports Access • Simplify L2 Paths by supporting loopfree non-blocking concurrent L2 paths • Dual-homed server operate in active-active mode • Provide fast convergence upon link/device failure Logical Topology with vPC vPC Peers ! Enable vpc on the switch Aggregation dc11-5020-1(config)# feature vpc MCEC ! Check the feature status dc11-5020-1(config)# show feature | include vpc vpc 1 enabled vPC Peers Access MCEC © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
  • 19. Connectivity What is a Virtual Port Channel (vPC)? • vPC is a Port-channeling concept extending link aggregation to two separate physical switches • vPC allows a single device to use a port channel across two neighbor switches (vPC peers) • vPC Peer link is used to synchronize state between vPC peer devices, must be 10GE • Eliminates STP blocked ports/STP delays/Calculations and uses all available uplink bandwidth (active/active) ‒ Does not actually turn off STP – FabricPath does this • Supported in NX-OS switches only • Recommended to always use LACP for dynamic LAG VPC PEER LINK • vPC Design & Best Practices Guide: http://www.cisco.com/en/US/prod/collateral/switches/ps9441/ps9670/C07-572830- 00_Agg_Dsgn_Config_DG.pdf 19 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public
  • 20. Connectivity Why use vPC? – Multi-Chassis Etherchannel (MEC) No Port Channel: Single-Chassis LACP Port STP Allows only one active link Channel: vPC Multi-Chassis LACP Port Sub-optimal flows and resource Both links active but no Channel: usage device redundancy (single Both links active, optimal switch) redundancy, all links active LACP Load Balance LACP Load Balance src- src-dst-IP (hash) dst-IP (hash) VPC PEER LINK 20 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public
  • 21. Connectivity VPC with Multiple ASAs – A/S or A/A Failover • Part of CVD architecture since in July 2011 • vPC ensures zero packet loss in the event of a link failure to the ASA channel 32 firewall, a firewall failure, a switch failure, VDC reset, or vPC peer- State and Failover links link loss ‒ Works with both A/S and A/A failover (and with ASA 9x Clustering) • Allows ASA to participate in necessary DC redundancy technologies with expected flow asymmetry • ASA is only DC Firewall on market that can simultaneously: 1. Run standards-based LACP for Dynamic LAG to Nexus vPC/vPC+ or Cat6K VSS with proper bundling semantics N7K VPC 40 N7K VPC 41 no traffic black holes or loss of state due to expected flow asymmetry / out-of-order packets VPC PEER LINK 2. Supports all of the same LACP load balancing hash values as the switch fabric(s) [def. = src-dst IP] 3. Able to support dynamic LAG (LACP) in all modes: Routed / Transparent / Multi-context / Mixed-context(s) / Clustering 4. Successfully handles the expected flow asymmetry and out-of-order packets from Multiple chassis simultaneously 21 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public
  • 22. Connectivity ASA Connecting to Nexus with vPC (basic) interface Ethernet4/1 switchport mode trunk channel-group 40 mode active no shutdown ! interface Ethernet4/2 VPC PEER LINK switchport mode trunk North Zone channel-group 40 mode active no shutdown VLAN 200 ! interface port-channel4 0 N7K VPC 40 switchport interface TenGigabitEthernet0/6 switchport mode trunk channel-group 32 mode active vss-id 1 switchport trunk allowed vlan 1,200,201 vpc 40 no nameif Trunks ! no security-level VPC vpc domain 10 ! role priority 50 interface TenGigabitEthernet0/7 peer-keepalive dest 10.1.1.2 source 10.1.1.1 vrf channel-group 32 mode active vss-id 2 ASA channel 32 VLAN 200 vpc-mgmt no nameif Outside peer-gateway no security-level ! interface BVI1 ip address 172.16.25.86 255.255.255.0 VLAN 201 ! Inside interface Port-channel32 no nameif no security-level ! South Zone Note: interface Port-channel32.201 VLAN 201 mac-address 3232.1111.3232 vlan 201 Example shows only one side of config: N7K1 and ASA1. nameif inside Full configuration would be assumed. bridge-group 1 security-level 100 ! ASA connected to Nexus with vPC and establishing an interface Port-channel32.200 internal DC zone pair between VL200 (N) and VL201(S). mac-address 3232.1a1a.3232 vlan 200 ASA is deployed using transparent (L2) mode in this nameif outside example to minimize network fabric modification(s) – Will bridge-group 1 security-level 0 be discussed in detail later
  • 23. Connectivity ASA Connecting to Nexus with vPC (Best Practices Shown) • ASA connected to Nexus using multiple physical interfaces on vPC DC Core / EDGE ‒ ASA can be configured to failover after a certain number of links lost (when using HA) L3 SVI VLAN200 SVI VLAN200 Aggregation Layer • Note that vPC identifiers are different FHRP VPC PEER LINK FHRP L2 for each ASA on the Nexus switch (this VLAN 200 changes with ASA clustering feature N7K VPC 40 Trunks N7K VPC 41 Outside VPC and cLACP [not yet shown]) VPC North Zone FW HA VLAN 200 ASA channel 32 VPC VPC VLAN 201 Inside VPC PEER LINK Access Layer VPC South Zone VLAN 201
  • 24. Secure Design Building Blocks © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public
  • 25. Segmentation Security Building Block: Segmentation • While not a security technology, segmentation has long been used as a means for grouping similar resources in order to apply specific configuration or policy • Sometimes there is a technical benefit with segmentation • An example is using VLANs to reduce the L2 broadcast domain and improve network efficiency • VRF (Virtual Routing and Forwarding) typically used for virtualizing L3 services • VDCs (Virtual Device Context) on the Nexus platforms allow multiple, independent virtualized switches inside of a single physical switch • Zones are a common term to refer to units in the data centre that share a common trait and can reduce operational complexity with both physical and virtualized hosts and services © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
  • 26. Segmentation Security Building Block: Segmentation 6 Degrees of Separation Nexus 7000 Segmentation Building Blocks Nexus 7K 1. Virtual Device Context 2. Virtual Routing/Forwarding (VRF) VRF-Lite can be easily used as it does not require MPLS 3. VLANs 4. Security Group Tags (SGT in packet) ASA 5. 802.1AE MACSEC Encryption CTX1 CTX2 CTX3 ASA 6. Virtual Firewall Context (Virtualized Firewall) VLANx1 VLANy1 VLANz1 VLANx2 VLANy2 VLANz2 SGT SGT SGT SGT SGT SGT 802.1AE (encrypt) © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public
  • 27. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public
  • 28. Segmentation Firewall Design: Modes of Operation • Routed Mode is the traditional mode of the firewall. Two or more interfaces that separate L3 domains • Transparent Mode is where the firewall acts as a bridge functioning mostly at L2 • Multi-context mode involves the use of virtual firewalls, which can be either routed or transparent mode • Mixed mode is the concept of using virtualization to combine routed and transparent mode virtual firewalls • Transparent mode firewall offers some unique benefits in the DC © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
  • 29. Segmentation Why Deploy Transparent Mode? • Existing Nexus Network Fabric does not need to be modified to employ L2 Firewall! • Simple as changing host(s) VLAN ID • Firewall does not need to run routing protocols / become a segment gateway • Firewalls are more suited to flow-based inspection (not packet forwarding like a router) • Routing protocols can establish adjacencies through the firewall • Protocols such as HSRP, VRRP, GLBP can cross the firewall • Multicast streams can traverse the firewall • Non-IP traffic can be allowed (IPX, MPLS, BPDUs) • (CVD) 9 of 10 internal zoning scenarios recommends Transparent FW (L2) deployed versus Routed Firewall (L3) © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
  • 30. Segmentation Firewall - Transparent Mode L2 Firewall • Firewall functions like a bridge (“bump in the wire”) at L2, only ARP packets pass without an explicit ACL • Uses traditional ACLs on the firewall • Does not forward Cisco Discovery Protocol (CDP) • Same subnet exists on all interfaces in the bridge-group • Different VLANs on inside and outside interfaces • In addition to Extended ACLs, use an EtherType ACL to restrict or allow L2 protocols © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
  • 31. Transparent Mode Configuration in the DC (2 interfaces) interface TenGigabitEthernet0/6 SVI VLAN200 172.16.25.253 SVI VLAN200 172.16.25.254 channel-group 32 mode active vss-id 1 FHRP – 172.16.25.1 FHRP – 172.16.25.1 no nameif no security-level North Zone ! VLAN 200 interface TenGigabitEthernet0/7 channel-group 32 mode active vss-id 2 no nameif no security-level ! interface BVI1 ip address 172.16.25.86 255.255.255.0 VPC ! VLAN 200 interface Port-channel32 Outside no nameif no security-level VLAN 201 ! Inside interface Port-channel32.201 VPC 172.16.25.86/24 mac-address 3232.1111.3232 vlan 201 nameif inside bridge-group 1 security-level 100 ! Trunk Allowed 1,201 South Zone interface Port-channel32.200 VLAN 201 mac-address 3232.1a1a.3232 vlan 200 nameif outside bridge-group 1 security-level 0 Server in VLAN 201
  • 32. Segmentation Firewall - Mixed Mode vFW Contexts • Mixed Mode is the concept of using virtual firewalls, some in routed mode and some in transparent (L2) mode • This is only supported on the ASA running at least v9.0 or any ASA-SM version • Up to 8 pairs of physical interfaces are supported per context • This could conceivably allow both the Edge (L3) firewall and Internal (L2) firewall to live on the same set of physical appliances mode multiple context context1 firewall transparent allocate-interface vlan99 outside allocate-interface vlan100 inside config-url disk0:/ctx1.cfg member gold context context2 allocate-interface vlan200 outside allocate-interface vlan210 inside config-url disk0:/ctx2.cfg © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public
  • 33. Physical and Virtual Internal Zoning © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public
  • 34. Example Internal Zoning for DEV – Option 1 Internal Zoning Physical Separation Internet / Extranet Model could provide for Application load testing. ASA A/S HA CTX If dedicated path through Core is required, consider using a DEV vRF DC Edge If dedicated Edge is required, consider using DC Core VDC (Routed) DEV VRF vFW Contexts on edge ASAs or a separate (lower-end) ASA PAir BGP/OSPF DEV VRF Core DEV VRF L3 L2 DEV VDC Created on Nexus 7K, attached to Prod Aggregation Layer Dev Aggregation Layer CORE VDC and supporting its own PoD VDC VDC FW CLUSTER(s) ASAs in Aggregation layer could be oriented in several ways. CTX CTX 1- Single ASA Cluster with separate vFW Contexts for the DEV zones – Would require ports on the ASA are physically connected to Virtual each VDC Access Layer 2- Separate ASA Clusters with or without vFW Contexts PoD PoD Compute structure creates a mirrored server environment for DEV operating on it own PoD Virtual Switch Virtual Switch Hypervisor Hypervisor PROD Compute Zone DEV Compute Zone
  • 35. Example Internal Zoning for DEV – Option 2 Internal Zoning Virtual Separation Internet / Extranet ASA A/S HA DC Edge Virtual Separation model uses a shared Physical Infrastructure (Nexus) for routing and transport DC Core VDC (Routed) BGP/OSPF ASAs are used to separate DEV and PROD Core traffic L3 L2 Virtual resources can share physical Server Aggregation Layer VDC Hardware and PoD. Security implemented similarly than to a Secure Multi Tenant environment FW CLUSTER Virtual Access Layer
  • 36. Internal Zoning Virtualization Security Concerns Policy Enforcement ‒ Applied at physical server—not the individual VM ‒ Impossible to enforce policy for VMs in motion Operations and Management ‒ Lack of VM visibility, accountability, and consistency ‒ Difficult management model and inability to effectively troubleshoot Roles and Responsibilities ‒ Muddled ownership as server admin must configure virtual network ‒ Organizational redundancy creates compliance challenges Machine Segmentation ‒ Server and application isolation on same physical server ‒ No separation between compliant and non-compliant systems… © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public
  • 37. Internal Zoning Cisco Virtual Networking and Cloud Network Services Cloud Network Services Tenant A Virtualized/Cloud Imperva SecureSphere Cloud Services Network ASA 1000V Cloud Cisco Virtual Security Data Center WAF Citrix Router 1000V Analysis Module Firewall Gateway NetScaler Servers VPX vWAAS (vNAM) WAN Router Switches Zone A Zone B Physical Infrastructure vPath VXLAN Nexus 1000V Multi-Hypervisor (VMware, Microsoft*, RedHat*, Citrix*) Nexus 1000V VSG ASA 1000V vWAAS CSR 1000V vNAM Ecosystem (Dist. Virtual Switch) (Zone-based FW) (Cloud FW) (WAN Optimization) (Cloud Router) (Network Analytics) Services • Distributed switch • VM-level controls • Edge firewall, VPN • WAN optimization • Citrix NetScaler VPX • WAN L3 gateway • App Visibility (L2-L7) virtual ADC • NX-OS consistency • Zone-based FW • Protocol Inspection • Application traffic • Routing and VPN • Overlay Intelligence • Imperva Web App. FW (OTV, VXLAN, FP**) N1110: 1H CY2013 7000+ Customers Available Now Available Now Available Now 1H 2013 PoC: 1H 2013 vPath: 2H CY2013 **MSFT: 2Q CY2013; Open-source: In PoC **FP: FabricPath
  • 38. Internal Zoning Managing Virtual Networking Policy Server Network Team Security Team Team Nexus 1000V (1110/1010)  Non-disruptive operation model to maintain current workflows using Port Profiles Nexus 1000V  Maintain network security policies with isolation and segmentation via VLANs, Private VLANs, Port-based Access Lists, Cisco Integrated Security Features  Ensure visibility (VM Introspection) into virtual machine traffic flows using traditional network features such as ERSPAN and NetFlow Isolation and Management and Roles and Segmentation Monitoring Responsibilities © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public
  • 39. Internal Zoning Cisco’s Virtual Security Portfolio Cisco® VSG Cisco ASA 1000V Intra-Tenant Tenant-Edge Security Security • Secures traffic between virtual • Secures the tenant edge machines within a tenant • Default gateway; Layer 3 firewall • Layer 2 and 3 firewall to secure to secure north-to-south traffic east-to-west traffic • Edge firewall capabilities including • ACLs using network attributes network attribute-based ACLs, and virtual machine attributes site-to-site VPN, NAT, DHCP, inspections, and IP audit • First-packet lookup and performance acceleration using • All packets go through the Cisco vPath ASA 1000V
  • 40. Internal Zoning Security for Virtualization Virtual Security Gateway Zone based intra-tenant segmentation of VMs Nexus 1000V ASA 1000V Virtual Service Nodes vPATH Nexus 1000V Hypervisor Ingress/Egress multi-tenant edge deployment vCenter Nexus 1KV VNMC Server Network Admin Security Admin Admin © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public
  • 41. Internal Zoning Microsegmenation Policy Per Zone, Per VM, Per vNIC Control ingress/egress & inter-VM traffic Firewall, ACL, VM Attributes Virtual ASA Virtual ASA Zone A Enable Dynamic Provisioning Zone B Zone C Mobility Transparent Enforcement vApp VSG Administrative Segregation VSG Server • Network • Security vApp VSG vPath Nexus 1000V vSphere vPath Nexus 1000V vSphere © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public
  • 42. Internal Zoning Physical to Virtual • Zones used define policy enforcement • Unique policies and traffic decisions applied to each zone • Physical Infrastructure mapped per zone Steer VM traffic to Firewall ‒ VRF, Virtual Context Context • Merging physical and virtual infrastructure Segment pools of blade resources per Zone Virtual Switch Virtual Switch Hypervisor Hypervisor 48 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public
  • 43. Internal Zoning vPath Intelligence: Service Chaining ASA 1000V and VSG • vservice node ASA1 type asa ip address 172.31.2.11 Defining the Service Node adjacency l2 vlan 3770 on Nexus 1000V • vservice node VSG1 type vsg ip address 10.10.11.202 adjacency l3 • vservice path chain-VSG-ASA Chain the Service Nodes node VSG1 profile sp-web order 10 Order is inside to outside node ASA1 profile sp-edge order 20 • port-profile type vethernet Tenant-1 Enable the Service Chain org root/Tenant-1 Per Port-Profile vservice path chain-VSG-ASA © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
  • 44. Internal Zoning Virtual Firewall and Physical Network ASA 1000V Deployment Core Aggregation 10.1.2.254 Layer 3 Protected VRF 10.1.2.254 ASA 5585 ASA 5585 Layer 3 10.1.1.254 Layer 3 Layer 2 10.1.3.254 10.1.1.252 10.1.1.253 ASA 1000V vPath vPath vPath Nexus 1000V Nexus 1000V Nexus 1000V Hypervisor Hypervisor Hypervisor Sub Zones © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
  • 45. Internal Zoning Multi-Tier Application Architecture Edge Firewall Web Client • Tier Deployment • Multi-Tier application architectures • Application vendor often has specific recommendations on ASA 1000V how to deploy an application • Can consist of Permit Only Port Permit Only Port 22 Block all external access • Web (presentation) tier 80(HTTP) of Web Servers (SSH) to application to database servers servers • Application tier • Database tier Web App DBDB Web App • Web and Application services can be on physically separate Server Server Server Server server server servers or collapsed into single in some cases Web-zone Application-zone Database-zone • Normal flow is often client->web->application->database • No direct client to database communication Only Permit Web servers Only Permit Application servers access to Application servers access to Database servers • Servers may be clustered for high availability. Often uses layer 2 multicast protocol for state exchange © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
  • 46. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public
  • 47. Compliance PCI Compliance Design Option – Physical Separation with VDC Internet / Extranet Edge ASAs may implement a specific context for IPSec Compliance needs or a distinct pair of ASA s may be used ASA A/S HA CTX CTX PCI VRF DC Edge SGT Nexus 7K carries traffic from ASA Context across vRF – PCI VRF – Moves packets across routed Core DC Core VDC (Routed) PCI VRF 802.1AE to PCI Distribution VDC (encrypt) SGT VRF PCI SGT BGP/OSPF Security Group Access with MACSEC can be used on Core PCI VRF the Nexus 7000 to provide hop-by-hop encryption L3 L2 Dedicated ASAs (or vFW Context(s)) in Distribution Prod Aggregation Layer PCI Aggregation Layer Layer VDC invoke North-South Security Policy, VDC VDC possibly even enforcing using the SGT (via SXP) limiting compliant access to only the PCI Zone Servers by network, service or application FW CLUSTER(s) CTX CTX SGT Within Virtual Access Layer dedicated Server Virtual hardware is recommended for Security (compliance) Access Layer Additional port profiles may be created and leverage PoD PoD the Virtual Security Gateway (VSG) for East-West zoning between VMs in the DMZ ASA1000v can also be used to implement a Secure IPSec VPN to another secure destination Virtual Switch Virtual Switch Hypervisor Hypervisor Production Servers Compliance Zone Servers
  • 48. Thank you. © 2012 Cisco and/or its affiliates. All rights reserved. CISCO CONFIDENTIAL INTERNAL USE ONLY 54