SlideShare a Scribd company logo
1 of 23
Using SDN to secure the campus
Hewlett Packard Enterprise
Eugene Berger
HPE Aruba CTO, UK&I
@Eugatwork
Cloud and Datacenter
Leader
Leadership in both
SMB & enterprise
networking
Leading the Mobility
and Campus
Enterprise
HPE and Aruba – Better Together
HPE SDN vision and strategy
SDN provides programmable networks that rapidly aligns to business
applications
Data center, campus
& branch automation
Open Standards
ecosystem
Reignite
innovation
Easily accessible
marketplace
Agility Alignment
Coexist with brownfield Platform for innovation
Use case-led Automation & simplicity
Journey to Software-defined Networking
HP & Stanford collaborate and demo OpenFlow
HP Ships 30 Million SDN-Enabled Ports
& SDN Controller
Software-defined Networking
2007
2011
2015+
Solving the problems of the
New Style of IT
SDN is Now
Security Cloud Big Data Mobility Innovation
Defining Software-defined Networking
Open standard-based programmatic access
to infrastructureInfrastructure
Control
Application
Separate control and data plane; abstract
control plane of many devices to one
Deliver open programmable interfaces to
orchestrate network service automation
SDNArchitecture
Source: opennetworking.org
Delivering the functions of an SDN architecture
Software-defined Network components
Infrastructure
Control
Application
Separate control and data plane; abstract
control plane of many devices to one
Deliver open programmable interfaces to
orchestrate network service automation
SDNArchitecture
Open standard-based programmatic access
to infrastructure
Network Device Network Device Network Device
Controller
Open Programmable Interface
Cloud
Orchestration
SDN
Applications
Open Programmable APIs
Virtual Application Networks SDN Controller
Infrastructure
SDNArchitecture
Programmable network aligned to business objectives
Virtual Application Networks deliver automation, agility
Virtual Cloud
Network Protector
Load Balancing
Partner Apps
Network Optimizer
ConvergedControl Design
Implementation
and Support
Services
Over 30 million ports across 50 Switches
10 Routers
VAN Network
Resource
Automation
Intelligent
ManagementCenter
VAN SDN
Manager
Management
Applications
Control
VAN Server Connect
VXLAN, NVGRE
Risk-free SDN Deployment
Snapshot of Where We are Today
92 Members
OptimizationSecurity Orchestration
Select SDN Customers
21 SDN Apps
Enabling real-time threat protection across enterprise networks
HPE Network Protector – Security
• Malware/Botnet/
Spyware
Protection
• IPS as a Service
• Security Sensors
& Actions
TippingPoint
HP Network Protector – IPS Integration
Core
Distribution
Edge
Threat Management Center
(1M+ bad sites)
• Reputation(piratesmustdie.com)  Malware
• Inspect all User traffic
Bad DNS Response
IPS
SDN Controller &
Network Protector
South Washington County
Network Protector SDN App
• Maintain 31-site wired and wireless network
serving over 30,000 users with 1 staff member
• Deploy in less than 1 hour
• Fraction of the cost, $200K vs $2million of
hardware
Roseville – R&D Protector
Roseville – R&D Protector
SDN: Knowing the context vs guessing - Clearpass
Traditional Network ‘guessing’ User/Application Directed
??
Traffic Classification
Identity Inference
Context Inference
Telemetry
Inferred Network Policy
Inferred Action
AppUser
Traffic Classification
Telemetry
Network Policy
Coordinated Action
Identity
Event Context
Service Request
CLEARPASS
SDN Customer References
SDN Customer References Brochure
Thank you
18
19CONFIDENTIAL © Copyright 2015. Aruba Networks, an HP company. All rights reserved.
Network Optimizer Customers
SDN Customer References Brochure
HPE VMware Network Virtualization (SDN) collaboration
Network virtualization solutions can run over any IP
network, but app performance/reliability and service
delivery rely on underlying physical network.
VN = logical network services
L2/3, L4-7 - connected to
workloads
Problem: Data Center Network Security
Perimeter-centric network security has proven
insufficient, and micro-segmentation is operationally
infeasible
Little or no
lateral controls
inside perimeter
Internet Internet
Insufficient Operationally
Infeasible
+
Why traditional approaches are
operationally infeasible…
Internet
Perimeter
Firewalls
• Create firewall rules before provisioning
• Update Firewall rules when move or change
• Delete firewall rules when app decommissioned
• Problem increases with more East-West traffic
+
VMware NSX makes micro-segmentation
possible
Internet
Security Policy
Perimeter
Firewalls
Cloud
Management
Platform
+

More Related Content

What's hot

Detroit A Smart City..... inspired by a "Community of Practice"
Detroit  A Smart City..... inspired by a "Community of Practice"Detroit  A Smart City..... inspired by a "Community of Practice"
Detroit A Smart City..... inspired by a "Community of Practice"Charles "Chuck" Speicher Jr.
 
How you can engage the future of business
How you can engage the future of businessHow you can engage the future of business
How you can engage the future of businessGen-i
 
ASIS 2013: Extending Surveillance Through Wireless Communications
ASIS 2013: Extending Surveillance Through Wireless CommunicationsASIS 2013: Extending Surveillance Through Wireless Communications
ASIS 2013: Extending Surveillance Through Wireless CommunicationsDrew Lentz
 
Unified Access from Application Chaos to Application Fluency
Unified Access from Application Chaos to Application FluencyUnified Access from Application Chaos to Application Fluency
Unified Access from Application Chaos to Application FluencyAlcatel-Lucent Enterprise
 
Extreme networks - Better Connections. Better Experiences. For Everyone.
Extreme networks - Better Connections. Better Experiences. For Everyone.Extreme networks - Better Connections. Better Experiences. For Everyone.
Extreme networks - Better Connections. Better Experiences. For Everyone.Aruj Thirawat
 
Next Generation Network For Next Generation Students
Next Generation Network For Next Generation StudentsNext Generation Network For Next Generation Students
Next Generation Network For Next Generation StudentsAlcatel-Lucent Enterprise
 
Seminar ppt on li fi technology
Seminar ppt on li fi technologySeminar ppt on li fi technology
Seminar ppt on li fi technologySasankBonagiri
 
Extreme Networks Retail Guest Analytics Solution
Extreme Networks Retail Guest Analytics SolutionExtreme Networks Retail Guest Analytics Solution
Extreme Networks Retail Guest Analytics SolutionExtreme Networks
 
Telefónica Edge Computing Case Study
Telefónica Edge Computing Case StudyTelefónica Edge Computing Case Study
Telefónica Edge Computing Case StudyDavid Artuñedo
 
Internet infrastructure in South Asia
Internet infrastructure in South AsiaInternet infrastructure in South Asia
Internet infrastructure in South AsiaAPNIC
 
Services Update ARM 3/bdNOG 1
Services Update ARM 3/bdNOG 1Services Update ARM 3/bdNOG 1
Services Update ARM 3/bdNOG 1APNIC
 
APSIG 2016 - IANA Transition: Why do we care?
APSIG 2016 -  IANA Transition: Why do we care?APSIG 2016 -  IANA Transition: Why do we care?
APSIG 2016 - IANA Transition: Why do we care?APNIC
 
Edge computing: Cord build 17 telefonica use cases
Edge computing: Cord build 17 telefonica use casesEdge computing: Cord build 17 telefonica use cases
Edge computing: Cord build 17 telefonica use casesPatrick Lopez
 

What's hot (20)

Detroit A Smart City..... inspired by a "Community of Practice"
Detroit  A Smart City..... inspired by a "Community of Practice"Detroit  A Smart City..... inspired by a "Community of Practice"
Detroit A Smart City..... inspired by a "Community of Practice"
 
Open access and beyond
Open access and beyondOpen access and beyond
Open access and beyond
 
How you can engage the future of business
How you can engage the future of businessHow you can engage the future of business
How you can engage the future of business
 
Connected Healthcare
Connected HealthcareConnected Healthcare
Connected Healthcare
 
Quortus Edge Computing
Quortus Edge ComputingQuortus Edge Computing
Quortus Edge Computing
 
Federations on the rise
Federations on the rise Federations on the rise
Federations on the rise
 
ASIS 2013: Extending Surveillance Through Wireless Communications
ASIS 2013: Extending Surveillance Through Wireless CommunicationsASIS 2013: Extending Surveillance Through Wireless Communications
ASIS 2013: Extending Surveillance Through Wireless Communications
 
Extreme Networks IdentiFi
Extreme Networks IdentiFiExtreme Networks IdentiFi
Extreme Networks IdentiFi
 
Unified Access from Application Chaos to Application Fluency
Unified Access from Application Chaos to Application FluencyUnified Access from Application Chaos to Application Fluency
Unified Access from Application Chaos to Application Fluency
 
Extreme networks - Better Connections. Better Experiences. For Everyone.
Extreme networks - Better Connections. Better Experiences. For Everyone.Extreme networks - Better Connections. Better Experiences. For Everyone.
Extreme networks - Better Connections. Better Experiences. For Everyone.
 
Next Generation Network For Next Generation Students
Next Generation Network For Next Generation StudentsNext Generation Network For Next Generation Students
Next Generation Network For Next Generation Students
 
Seminar ppt on li fi technology
Seminar ppt on li fi technologySeminar ppt on li fi technology
Seminar ppt on li fi technology
 
Nas nie zaatakują!
Nas nie zaatakują!Nas nie zaatakują!
Nas nie zaatakują!
 
Extreme Networks Retail Guest Analytics Solution
Extreme Networks Retail Guest Analytics SolutionExtreme Networks Retail Guest Analytics Solution
Extreme Networks Retail Guest Analytics Solution
 
Telefónica Edge Computing Case Study
Telefónica Edge Computing Case StudyTelefónica Edge Computing Case Study
Telefónica Edge Computing Case Study
 
Internet infrastructure in South Asia
Internet infrastructure in South AsiaInternet infrastructure in South Asia
Internet infrastructure in South Asia
 
Services Update ARM 3/bdNOG 1
Services Update ARM 3/bdNOG 1Services Update ARM 3/bdNOG 1
Services Update ARM 3/bdNOG 1
 
Simplify Operations
Simplify OperationsSimplify Operations
Simplify Operations
 
APSIG 2016 - IANA Transition: Why do we care?
APSIG 2016 -  IANA Transition: Why do we care?APSIG 2016 -  IANA Transition: Why do we care?
APSIG 2016 - IANA Transition: Why do we care?
 
Edge computing: Cord build 17 telefonica use cases
Edge computing: Cord build 17 telefonica use casesEdge computing: Cord build 17 telefonica use cases
Edge computing: Cord build 17 telefonica use cases
 

Viewers also liked

Eduroam seminar - Networkshop44 2016
Eduroam seminar - Networkshop44 2016Eduroam seminar - Networkshop44 2016
Eduroam seminar - Networkshop44 2016Jisc
 
Find out about Jisc - Networkshop44 2016
Find out about Jisc - Networkshop44 2016Find out about Jisc - Networkshop44 2016
Find out about Jisc - Networkshop44 2016Jisc
 
Whats new in ict law - Networkshop44
Whats new in ict law - Networkshop44Whats new in ict law - Networkshop44
Whats new in ict law - Networkshop44Jisc
 
Network performance lessons from the coal face - Networkshop44
Network performance lessons from the coal face - Networkshop44Network performance lessons from the coal face - Networkshop44
Network performance lessons from the coal face - Networkshop44Jisc
 
Welcome to Networkshop44 - Networkshop44
Welcome to Networkshop44 - Networkshop44Welcome to Networkshop44 - Networkshop44
Welcome to Networkshop44 - Networkshop44Jisc
 
Jisc and janet network updates from network operations, operational services ...
Jisc and janet network updates from network operations, operational services ...Jisc and janet network updates from network operations, operational services ...
Jisc and janet network updates from network operations, operational services ...Jisc
 
Eduroam in portsmouth's wireless city - Networkshop44
Eduroam in portsmouth's wireless city - Networkshop44Eduroam in portsmouth's wireless city - Networkshop44
Eduroam in portsmouth's wireless city - Networkshop44Jisc
 
End to end performance - Networkshop44
End to end performance -  Networkshop44End to end performance -  Networkshop44
End to end performance - Networkshop44Jisc
 
Next gen insight networkshop44
Next gen insight   networkshop44Next gen insight   networkshop44
Next gen insight networkshop44Jisc
 
Eduroam workshop nic mitev probes - networkshop44
Eduroam workshop  nic mitev probes - networkshop44Eduroam workshop  nic mitev probes - networkshop44
Eduroam workshop nic mitev probes - networkshop44Jisc
 
Jisc update janet6 upgrade networkshop44
Jisc update janet6 upgrade   networkshop44Jisc update janet6 upgrade   networkshop44
Jisc update janet6 upgrade networkshop44Jisc
 
Edupert best practices in supporting end users - Networkshop44
Edupert best practices in supporting end users - Networkshop44Edupert best practices in supporting end users - Networkshop44
Edupert best practices in supporting end users - Networkshop44Jisc
 
Managing and monitoring large scale data transfers - Networkshop44
Managing and monitoring large scale data transfers - Networkshop44Managing and monitoring large scale data transfers - Networkshop44
Managing and monitoring large scale data transfers - Networkshop44Jisc
 
End to end performance networkshop44
End to end performance   networkshop44End to end performance   networkshop44
End to end performance networkshop44Jisc
 
Dealing with pervasive monitoring - Networkshop44
Dealing with pervasive monitoring - Networkshop44Dealing with pervasive monitoring - Networkshop44
Dealing with pervasive monitoring - Networkshop44Jisc
 
Eduroam workshop nic mitev proactive learning - networkshop44
Eduroam workshop nic mitev proactive learning - networkshop44Eduroam workshop nic mitev proactive learning - networkshop44
Eduroam workshop nic mitev proactive learning - networkshop44Jisc
 
Eduroam workshop nic mitev loughborough uni - networkshop44
Eduroam workshop nic mitev loughborough uni - networkshop44Eduroam workshop nic mitev loughborough uni - networkshop44
Eduroam workshop nic mitev loughborough uni - networkshop44Jisc
 
Multiprotocol label switching (mpls) - Networkshop44
Multiprotocol label switching (mpls)  - Networkshop44Multiprotocol label switching (mpls)  - Networkshop44
Multiprotocol label switching (mpls) - Networkshop44Jisc
 
Hyper efficient data centres – key ingredient intelligence networkshop44
Hyper efficient data centres – key ingredient intelligence   networkshop44Hyper efficient data centres – key ingredient intelligence   networkshop44
Hyper efficient data centres – key ingredient intelligence networkshop44Jisc
 
Dev ops, noops or hypeops - Networkshop44
Dev ops, noops or hypeops -  Networkshop44Dev ops, noops or hypeops -  Networkshop44
Dev ops, noops or hypeops - Networkshop44Jisc
 

Viewers also liked (20)

Eduroam seminar - Networkshop44 2016
Eduroam seminar - Networkshop44 2016Eduroam seminar - Networkshop44 2016
Eduroam seminar - Networkshop44 2016
 
Find out about Jisc - Networkshop44 2016
Find out about Jisc - Networkshop44 2016Find out about Jisc - Networkshop44 2016
Find out about Jisc - Networkshop44 2016
 
Whats new in ict law - Networkshop44
Whats new in ict law - Networkshop44Whats new in ict law - Networkshop44
Whats new in ict law - Networkshop44
 
Network performance lessons from the coal face - Networkshop44
Network performance lessons from the coal face - Networkshop44Network performance lessons from the coal face - Networkshop44
Network performance lessons from the coal face - Networkshop44
 
Welcome to Networkshop44 - Networkshop44
Welcome to Networkshop44 - Networkshop44Welcome to Networkshop44 - Networkshop44
Welcome to Networkshop44 - Networkshop44
 
Jisc and janet network updates from network operations, operational services ...
Jisc and janet network updates from network operations, operational services ...Jisc and janet network updates from network operations, operational services ...
Jisc and janet network updates from network operations, operational services ...
 
Eduroam in portsmouth's wireless city - Networkshop44
Eduroam in portsmouth's wireless city - Networkshop44Eduroam in portsmouth's wireless city - Networkshop44
Eduroam in portsmouth's wireless city - Networkshop44
 
End to end performance - Networkshop44
End to end performance -  Networkshop44End to end performance -  Networkshop44
End to end performance - Networkshop44
 
Next gen insight networkshop44
Next gen insight   networkshop44Next gen insight   networkshop44
Next gen insight networkshop44
 
Eduroam workshop nic mitev probes - networkshop44
Eduroam workshop  nic mitev probes - networkshop44Eduroam workshop  nic mitev probes - networkshop44
Eduroam workshop nic mitev probes - networkshop44
 
Jisc update janet6 upgrade networkshop44
Jisc update janet6 upgrade   networkshop44Jisc update janet6 upgrade   networkshop44
Jisc update janet6 upgrade networkshop44
 
Edupert best practices in supporting end users - Networkshop44
Edupert best practices in supporting end users - Networkshop44Edupert best practices in supporting end users - Networkshop44
Edupert best practices in supporting end users - Networkshop44
 
Managing and monitoring large scale data transfers - Networkshop44
Managing and monitoring large scale data transfers - Networkshop44Managing and monitoring large scale data transfers - Networkshop44
Managing and monitoring large scale data transfers - Networkshop44
 
End to end performance networkshop44
End to end performance   networkshop44End to end performance   networkshop44
End to end performance networkshop44
 
Dealing with pervasive monitoring - Networkshop44
Dealing with pervasive monitoring - Networkshop44Dealing with pervasive monitoring - Networkshop44
Dealing with pervasive monitoring - Networkshop44
 
Eduroam workshop nic mitev proactive learning - networkshop44
Eduroam workshop nic mitev proactive learning - networkshop44Eduroam workshop nic mitev proactive learning - networkshop44
Eduroam workshop nic mitev proactive learning - networkshop44
 
Eduroam workshop nic mitev loughborough uni - networkshop44
Eduroam workshop nic mitev loughborough uni - networkshop44Eduroam workshop nic mitev loughborough uni - networkshop44
Eduroam workshop nic mitev loughborough uni - networkshop44
 
Multiprotocol label switching (mpls) - Networkshop44
Multiprotocol label switching (mpls)  - Networkshop44Multiprotocol label switching (mpls)  - Networkshop44
Multiprotocol label switching (mpls) - Networkshop44
 
Hyper efficient data centres – key ingredient intelligence networkshop44
Hyper efficient data centres – key ingredient intelligence   networkshop44Hyper efficient data centres – key ingredient intelligence   networkshop44
Hyper efficient data centres – key ingredient intelligence networkshop44
 
Dev ops, noops or hypeops - Networkshop44
Dev ops, noops or hypeops -  Networkshop44Dev ops, noops or hypeops -  Networkshop44
Dev ops, noops or hypeops - Networkshop44
 

Similar to Using sdn to secure the campus - Networkshop44

Apache Hadoop India Summit 2011 Keynote talk "Exploring the Future IT Infrast...
Apache Hadoop India Summit 2011 Keynote talk "Exploring the Future IT Infrast...Apache Hadoop India Summit 2011 Keynote talk "Exploring the Future IT Infrast...
Apache Hadoop India Summit 2011 Keynote talk "Exploring the Future IT Infrast...Yahoo Developer Network
 
Cisco Connect Halifax 2018 Simple IT
Cisco Connect Halifax 2018   Simple ITCisco Connect Halifax 2018   Simple IT
Cisco Connect Halifax 2018 Simple ITCisco Canada
 
Software Defined networking (SDN)
Software Defined networking (SDN)Software Defined networking (SDN)
Software Defined networking (SDN)Milson Munakami
 
Virtual Application Networks Innovations Advance Software-defined Network Lea...
Virtual Application Networks Innovations Advance Software-defined Network Lea...Virtual Application Networks Innovations Advance Software-defined Network Lea...
Virtual Application Networks Innovations Advance Software-defined Network Lea...Open Networking Summits
 
Data Center Design Guide 4 1
Data Center Design Guide 4 1Data Center Design Guide 4 1
Data Center Design Guide 4 1Fiyaz Syed
 
F5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облакаF5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облакаBAKOTECH
 
Software Defined Networking
Software Defined Networking Software Defined Networking
Software Defined Networking Kamesh Pemmaraju
 
Better Connections.Better Experiences.For Everyone - Extreme Networks
Better Connections.Better Experiences.For Everyone - Extreme NetworksBetter Connections.Better Experiences.For Everyone - Extreme Networks
Better Connections.Better Experiences.For Everyone - Extreme Networksaliciasyc
 
08 sdn system intelligence short public beijing sdn conference - 130828
08 sdn system intelligence   short public beijing sdn conference - 13082808 sdn system intelligence   short public beijing sdn conference - 130828
08 sdn system intelligence short public beijing sdn conference - 130828Mason Mei
 
Are you ready to be edgy? Bringing applications to the edge of the network
Are you ready to be edgy? Bringing applications to the edge of the networkAre you ready to be edgy? Bringing applications to the edge of the network
Are you ready to be edgy? Bringing applications to the edge of the networkMegan O'Keefe
 
What is Your Edge From the Cloud to the Edge, Extending Your Reach
What is Your Edge From the Cloud to the Edge, Extending Your ReachWhat is Your Edge From the Cloud to the Edge, Extending Your Reach
What is Your Edge From the Cloud to the Edge, Extending Your ReachSUSE
 
Cloud infrastructure and Cloud Services
Cloud infrastructure and Cloud ServicesCloud infrastructure and Cloud Services
Cloud infrastructure and Cloud ServicesIntel Corporation
 
Spider & F5 Round Table - The Flexible Data Center
Spider & F5 Round Table - The Flexible Data CenterSpider & F5 Round Table - The Flexible Data Center
Spider & F5 Round Table - The Flexible Data CenterTzoori Tamam
 
MARLABS - Cloud services CIO Conference
MARLABS - Cloud services CIO ConferenceMARLABS - Cloud services CIO Conference
MARLABS - Cloud services CIO ConferenceMarlabs
 
Managed Cloud Services CIO Conference Oil Gas
Managed Cloud Services CIO Conference Oil GasManaged Cloud Services CIO Conference Oil Gas
Managed Cloud Services CIO Conference Oil GasJeff Holden
 

Similar to Using sdn to secure the campus - Networkshop44 (20)

Simplifying Wired Network Deployments with Software-Defined Networking (SDN)
Simplifying Wired Network Deployments with Software-Defined Networking (SDN)Simplifying Wired Network Deployments with Software-Defined Networking (SDN)
Simplifying Wired Network Deployments with Software-Defined Networking (SDN)
 
Apache Hadoop India Summit 2011 Keynote talk "Exploring the Future IT Infrast...
Apache Hadoop India Summit 2011 Keynote talk "Exploring the Future IT Infrast...Apache Hadoop India Summit 2011 Keynote talk "Exploring the Future IT Infrast...
Apache Hadoop India Summit 2011 Keynote talk "Exploring the Future IT Infrast...
 
Cisco Connect Halifax 2018 Simple IT
Cisco Connect Halifax 2018   Simple ITCisco Connect Halifax 2018   Simple IT
Cisco Connect Halifax 2018 Simple IT
 
Software Defined networking (SDN)
Software Defined networking (SDN)Software Defined networking (SDN)
Software Defined networking (SDN)
 
TFI2014 Session I - State of SDN - Sam K. Aldrin
TFI2014 Session I - State of SDN - Sam K. AldrinTFI2014 Session I - State of SDN - Sam K. Aldrin
TFI2014 Session I - State of SDN - Sam K. Aldrin
 
Virtual Application Networks Innovations Advance Software-defined Network Lea...
Virtual Application Networks Innovations Advance Software-defined Network Lea...Virtual Application Networks Innovations Advance Software-defined Network Lea...
Virtual Application Networks Innovations Advance Software-defined Network Lea...
 
Stephen Wallo
Stephen WalloStephen Wallo
Stephen Wallo
 
Data Center Design Guide 4 1
Data Center Design Guide 4 1Data Center Design Guide 4 1
Data Center Design Guide 4 1
 
F5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облакаF5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облака
 
Software Defined Networking
Software Defined Networking Software Defined Networking
Software Defined Networking
 
Better Connections.Better Experiences.For Everyone - Extreme Networks
Better Connections.Better Experiences.For Everyone - Extreme NetworksBetter Connections.Better Experiences.For Everyone - Extreme Networks
Better Connections.Better Experiences.For Everyone - Extreme Networks
 
08 sdn system intelligence short public beijing sdn conference - 130828
08 sdn system intelligence   short public beijing sdn conference - 13082808 sdn system intelligence   short public beijing sdn conference - 130828
08 sdn system intelligence short public beijing sdn conference - 130828
 
100 ngn workshop-sdn-english-v4
100 ngn workshop-sdn-english-v4100 ngn workshop-sdn-english-v4
100 ngn workshop-sdn-english-v4
 
Are you ready to be edgy? Bringing applications to the edge of the network
Are you ready to be edgy? Bringing applications to the edge of the networkAre you ready to be edgy? Bringing applications to the edge of the network
Are you ready to be edgy? Bringing applications to the edge of the network
 
What is Your Edge From the Cloud to the Edge, Extending Your Reach
What is Your Edge From the Cloud to the Edge, Extending Your ReachWhat is Your Edge From the Cloud to the Edge, Extending Your Reach
What is Your Edge From the Cloud to the Edge, Extending Your Reach
 
Cloud infrastructure and Cloud Services
Cloud infrastructure and Cloud ServicesCloud infrastructure and Cloud Services
Cloud infrastructure and Cloud Services
 
Spider & F5 Round Table - The Flexible Data Center
Spider & F5 Round Table - The Flexible Data CenterSpider & F5 Round Table - The Flexible Data Center
Spider & F5 Round Table - The Flexible Data Center
 
MARLABS - Cloud services CIO Conference
MARLABS - Cloud services CIO ConferenceMARLABS - Cloud services CIO Conference
MARLABS - Cloud services CIO Conference
 
Managed Cloud Services CIO Conference Oil Gas
Managed Cloud Services CIO Conference Oil GasManaged Cloud Services CIO Conference Oil Gas
Managed Cloud Services CIO Conference Oil Gas
 
Evolving the WAN for the Cloud, using SD-WAN & NFV
Evolving the WAN for the Cloud, using SD-WAN & NFV Evolving the WAN for the Cloud, using SD-WAN & NFV
Evolving the WAN for the Cloud, using SD-WAN & NFV
 

More from Jisc

Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...Jisc
 
Digital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxDigital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxJisc
 
Open Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxOpen Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxJisc
 
Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Jisc
 
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...Jisc
 
Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc
 
Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc
 
Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc
 
JISC Presentation.pptx
JISC Presentation.pptxJISC Presentation.pptx
JISC Presentation.pptxJisc
 
Community-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxJisc
 
The Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxThe Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxJisc
 
Are we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxAre we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxJisc
 
JiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJisc
 
UWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxUWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxJisc
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber EssentialsJisc
 
MarkChilds.pptx
MarkChilds.pptxMarkChilds.pptx
MarkChilds.pptxJisc
 
RStrachanOct23.pptx
RStrachanOct23.pptxRStrachanOct23.pptx
RStrachanOct23.pptxJisc
 
ISDX2 Oct 2023 .pptx
ISDX2 Oct 2023 .pptxISDX2 Oct 2023 .pptx
ISDX2 Oct 2023 .pptxJisc
 
FerrellWalker.pptx
FerrellWalker.pptxFerrellWalker.pptx
FerrellWalker.pptxJisc
 

More from Jisc (20)

Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...
 
Digital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxDigital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptx
 
Open Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxOpen Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptx
 
Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...
 
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
 
Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023
 
Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023
 
Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023
 
JISC Presentation.pptx
JISC Presentation.pptxJISC Presentation.pptx
JISC Presentation.pptx
 
Community-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptx
 
The Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxThe Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptx
 
Are we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxAre we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptx
 
JiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptx
 
UWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxUWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptx
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber Essentials
 
MarkChilds.pptx
MarkChilds.pptxMarkChilds.pptx
MarkChilds.pptx
 
RStrachanOct23.pptx
RStrachanOct23.pptxRStrachanOct23.pptx
RStrachanOct23.pptx
 
ISDX2 Oct 2023 .pptx
ISDX2 Oct 2023 .pptxISDX2 Oct 2023 .pptx
ISDX2 Oct 2023 .pptx
 
FerrellWalker.pptx
FerrellWalker.pptxFerrellWalker.pptx
FerrellWalker.pptx
 

Recently uploaded

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 

Recently uploaded (20)

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 

Using sdn to secure the campus - Networkshop44

  • 1. Using SDN to secure the campus Hewlett Packard Enterprise Eugene Berger HPE Aruba CTO, UK&I @Eugatwork
  • 2. Cloud and Datacenter Leader Leadership in both SMB & enterprise networking Leading the Mobility and Campus Enterprise HPE and Aruba – Better Together
  • 3.
  • 4. HPE SDN vision and strategy SDN provides programmable networks that rapidly aligns to business applications Data center, campus & branch automation Open Standards ecosystem Reignite innovation Easily accessible marketplace Agility Alignment Coexist with brownfield Platform for innovation Use case-led Automation & simplicity
  • 5. Journey to Software-defined Networking HP & Stanford collaborate and demo OpenFlow HP Ships 30 Million SDN-Enabled Ports & SDN Controller Software-defined Networking 2007 2011 2015+ Solving the problems of the New Style of IT SDN is Now Security Cloud Big Data Mobility Innovation
  • 6. Defining Software-defined Networking Open standard-based programmatic access to infrastructureInfrastructure Control Application Separate control and data plane; abstract control plane of many devices to one Deliver open programmable interfaces to orchestrate network service automation SDNArchitecture Source: opennetworking.org
  • 7. Delivering the functions of an SDN architecture Software-defined Network components Infrastructure Control Application Separate control and data plane; abstract control plane of many devices to one Deliver open programmable interfaces to orchestrate network service automation SDNArchitecture Open standard-based programmatic access to infrastructure Network Device Network Device Network Device Controller Open Programmable Interface Cloud Orchestration SDN Applications Open Programmable APIs
  • 8. Virtual Application Networks SDN Controller Infrastructure SDNArchitecture Programmable network aligned to business objectives Virtual Application Networks deliver automation, agility Virtual Cloud Network Protector Load Balancing Partner Apps Network Optimizer ConvergedControl Design Implementation and Support Services Over 30 million ports across 50 Switches 10 Routers VAN Network Resource Automation Intelligent ManagementCenter VAN SDN Manager Management Applications Control VAN Server Connect VXLAN, NVGRE
  • 10. Snapshot of Where We are Today 92 Members OptimizationSecurity Orchestration Select SDN Customers 21 SDN Apps
  • 11. Enabling real-time threat protection across enterprise networks HPE Network Protector – Security • Malware/Botnet/ Spyware Protection • IPS as a Service • Security Sensors & Actions TippingPoint
  • 12. HP Network Protector – IPS Integration Core Distribution Edge Threat Management Center (1M+ bad sites) • Reputation(piratesmustdie.com)  Malware • Inspect all User traffic Bad DNS Response IPS SDN Controller & Network Protector
  • 13. South Washington County Network Protector SDN App • Maintain 31-site wired and wireless network serving over 30,000 users with 1 staff member • Deploy in less than 1 hour • Fraction of the cost, $200K vs $2million of hardware
  • 14. Roseville – R&D Protector
  • 15. Roseville – R&D Protector
  • 16. SDN: Knowing the context vs guessing - Clearpass Traditional Network ‘guessing’ User/Application Directed ?? Traffic Classification Identity Inference Context Inference Telemetry Inferred Network Policy Inferred Action AppUser Traffic Classification Telemetry Network Policy Coordinated Action Identity Event Context Service Request CLEARPASS
  • 17. SDN Customer References SDN Customer References Brochure
  • 19. 19CONFIDENTIAL © Copyright 2015. Aruba Networks, an HP company. All rights reserved. Network Optimizer Customers SDN Customer References Brochure
  • 20. HPE VMware Network Virtualization (SDN) collaboration Network virtualization solutions can run over any IP network, but app performance/reliability and service delivery rely on underlying physical network. VN = logical network services L2/3, L4-7 - connected to workloads
  • 21. Problem: Data Center Network Security Perimeter-centric network security has proven insufficient, and micro-segmentation is operationally infeasible Little or no lateral controls inside perimeter Internet Internet Insufficient Operationally Infeasible +
  • 22. Why traditional approaches are operationally infeasible… Internet Perimeter Firewalls • Create firewall rules before provisioning • Update Firewall rules when move or change • Delete firewall rules when app decommissioned • Problem increases with more East-West traffic +
  • 23. VMware NSX makes micro-segmentation possible Internet Security Policy Perimeter Firewalls Cloud Management Platform +

Editor's Notes

  1. Bullets: Our vision for SDN is to create a programmable network that delivers business applications quickly To offer agility for the network As well as alignment for the network It has to include consistent architecture across the enterprise: DC, campus and branch It must be built on open standards that enable an open ecosystem, so that everybody can participate – partners, customers and developers And that open ecosystem will reignite innovation for the networking industry (new apps) And those innovations need to be easily accessible to customers in a new marketplace that enables new business models
  2. Virtual application networks deliver automation and agility. We are the first in the market to have a complete portfolio for each layer of SDN architecture.
  3. Phase 1: SDN Ready Deploy: SDN-enabled networks Benefits : - Investment protection - Open Standards - Low risk Phase 2: Hybrid SDN (now) Deploy: Hybrid Mode SDN Networks Benefits: - Application aware network - Reduced complexity - Non disruptive Phase 3: Native SDN Deploy: End-to-end SDN Networks Benefits: - Fully programmable - Highly automated - Rapid innovation
  4. Ballarat Grammar The Bama Companies Deltion College Faculty of Science and Technology - Universidade Nova de Lisboa Istanbul Kultur University RMIT University South Washington County Schools The Via Group UBM – InteropNet Lancaster University – SDN Symposium
  5. J. R. SIMPLOT LOWNDES COUNTY SCHOOL DISTRICT DREAMWORKS ANIMATION SKG VICTORIA & ALBERT MUSEUM TATA CONSULTANCY SERVICES ADRIENNE CENTER FOR THE PERFOR STICHTING DELTION COLLEGE BDX FÖRETAGEN AB AL MEHBAJ TRADING EST KUWAIT AIRWAYS CORPORATION K.S.C. KÜLTÜR ÜNIVERSITESI TRANS-SYSTEM INC LEVI STRAUSS & CO. ENTEL S.A. UNIVERSITY OF ST.FRANCIS WORLDCOM EXCHANGE INC FACHHOCHSCHULE DÜSSELDORF SMART COMMUNICATIONS, INC.
  6. With NSX, virtual networks are programmatically created, provisioned and managed, utilizing the underlying physical network as a simple packet forwarding backplane. Network and security services in software are distributed to hypervisors and “attached” to individual VMs in accordance with networking and security policies defined for each connected application. When a VM is moved to another host, its networking and security services move with it. And when new VMs are created to scale an application, the necessary policies are dynamically applied to those VMs as well.
  7. It’s important to understand the challenge micro-segmentation solves, because it’s one that has been know but not solvable in reality until now. If we look at all the well publicized attacks over the last couple of years, Target, Home Depot, Sony and more they all were different from a hacker code perspective, but they all had one thing in common…once the threat got through the perimeter defense, whether through the firewall or from the inside…there was little of no lateral controls to keep the threat from moving from server to server until it found what it was looking for and started pumping out credit card numbers or other private information   Nirvana to most security teams is “micro-segmentation” or a “zero-trust” approach. However, even if your company can afford the capital expense for enough firewalls to deliver the throughput capacity required to achieve high availability micro-segmentation for East-West traffic in your data center, the operational complexity of managing changes, VM movement, policy granularity, unsustainable policy table changes across all of these firewalls quickly becomes operationally infeasible.
  8. It’s easy to understand why traditional approaches are operationally infeasible… When packets leave the VM they must traverse the network to be evaluated and enforced at a chokepoint firewall. That means that when the VM was provisioned, someone had to write the rules and put them into the firewall, a time consuming, error prone process that slows down application provisioning...then, if the VM ever moves, the firewall likely needs to be manually updated and if the VM is deleted, the firewall should be manually updated to remove the rules for the deleted VM. All combine to make this operationally infeasible at scale.
  9. So how does an SDDC approach make it feasible? We automate everything, when a VM is provisioned, it’s security policies are provisioned with it, so that when the packet leaves the VM, it is evaluated and enforced, right at the virtual interface Then is the VM ever moves, the rules move with it, and if the VM is ever delete, the rules are deleted with it…no human interaction, it’s all automated.