DSS ITSEC 2013 Conference 07.11.2013 - Cadence - ExtremeNetworks

440 views

Published on

Presentation from one of the remarkable IT Security events in the Baltic States organized by “Data Security Solutions” (www.dss.lv ) Event took place in Riga, on 7th of November, 2013 and was visited by more than 400 participants at event place and more than 300 via online live streaming.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
440
On SlideShare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
7
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

DSS ITSEC 2013 Conference 07.11.2013 - Cadence - ExtremeNetworks

  1. 1. Extreme Networks Māris Strazdiņš maris@cadence.lv © 2012 Extreme Networks, Inc. All rights reserved.
  2. 2. Extreme Networks® Product Portfolio Summit X480 E4G 200/400 Only 400 model stacks BlackDiamond® 8800 with 8900-Series Modules BlackDiamond X Series Wireless Single-Radio AP Adaptive AP Wallplate AP Summit X670 8900-40G6X-Xm Summit X460 Summit X650 Summit X450a VIM3-40G4X* Summit® WM BlackDiamond 8800 with C-Series Modules EAS ReachNXT™ Summit X450e Summit X250e Summit X150 Network Management BlackDiamond 8800 with 8500-Series Modules Summit X440 Summit X350 Ridgeline™ 10/100M 1G 10G Fixed 40G SummitStack™ 1/10/40G 10/40/100G Modular © 2012 Extreme Networks, Inc. All rights reserved. Motorola ADSP
  3. 3. Extreme Networks Switches • Cross-series stacking • Hitless failover • Hitless upgrade • Ease of managability • Free management software • EAPS (Ethernet Automatic Protection Switching) © 2012 Extreme Networks, Inc. All rights reserved.
  4. 4. Ethernet Automatic Protection Switching EAPS © 2012 Extreme Networks, Inc. All rights reserved.
  5. 5. © 2012 Extreme Networks, Inc. All rights reserved.
  6. 6. Different and the same - ExtreneXOS Resilient Proven Automated Virtualized © 2012 Extreme Networks, Inc. All rights reserved.
  7. 7. ExtremeXOS – Memory Protected Isolate faults between applications and processes to maintain network uptime. Memory Protected Memory Protected EAPS SNMP Each process memory protected – process halt does not interrupt other processes Self-healing – restart without rebooting switch © 2012 Extreme Networks, Inc. All rights reserved.
  8. 8. ExtremeXOS: CLEAR-Flow CLEAR-Flow technology is ideally suited for a number of traffic management challenges, including: • Network security—Intrusion detection, worm and virus containment, and Denial of Service (DoS) suppression • Network management—Capacity planning, trending analysis, application classification, and Quality of Service (QoS) enforcement • Network billing—Accounting and Service Level Agreement (SLA) enforcement © 2012 Extreme Networks, Inc. All rights reserved.
  9. 9. ExtremeXOS: CLEAR-Flow 1 Attack Launched 1 2 Analyze & Measure CLEAR-Flow Security Rules Engine 3 Take Action • Permit • Deny • QoS Profile • Mirror 2 • SNMP Trap 3 • SYSLOG Summit® X450a, X450e, X480, and X650 • Dynamic CLI Command Continuous Learning Examination Action & Reporting © 2012 Extreme Networks, Inc. All rights reserved.
  10. 10. Identity and Access Management provisioning Intellectual property data IP Manager: John Customer data Sales: Alice Financial resource systems Finance: Bob User Community Network Infrastructure © 2012 Extreme Networks, Inc. All rights reserved. Protected Application / Data Center
  11. 11. Identity and Access Management provisioning IP Manager: John • Increased network availability • Eliminate ―noise‖ traffic and malicious activity within the infrastructure Sales: Alice Intellectual property data Customer data • Network and data access provisioned based on roles and identity • Audit network activity per user Financial resource systems Finance: Bob User Community Protected Network Infrastructure © 2012 Extreme Networks, Inc. All rights reserved. Protected Application / Data Center
  12. 12. Extreme Networks Ridgeline © 2012 Extreme Networks, Inc. All rights reserved.
  13. 13. Today Network has Zero Visibility into VM Lifecycle Server Admin Initiate Virtual Machine Manager Network Admin e.g. Switch Port Config IP: MAC: QoS: ACL: Switch Port Config None or Disabled 1.1.1.2 00:0A QP7 Deny HTTP Result: When a vMotion or Live Migration occurs automatically or initiated by server admin, the network admin has NO visibility into VM location or when the movement occur NIC NIC VM1 IP: 1.1.1.2 MAC: 00:0A Hypervisor Hypervisor © 2012 Extreme Networks, Inc. All rights reserved. The VM moves to a destination switch port that is incorrectly configured to deliver network services to the specific VM
  14. 14. Network Visibility into VM Lifecycle Query Server Admin Location-based VM awareness at the network level for efficient vMotion or Live Migration Initiate Virtual MachineVM info Manager Network Admin e.g. Switch Port SwitchPort Config Virtual Config Port Profile IP: IP: MAC: QoS: 1.2 ACL: MAC: A QoS: ACL: 1.1.1.2 00:0A 1.1. QP7 Deny HTTP 00:0 XNV™-enabled Switch Port Config None or Disabled XNV-enabled QP7 Result: Ridgeline™: Through XML integration Den y •Pull Inventory from HTTP VMware vCenter •Locate VMs on network switches •Show Inventory VM  Switch Port Mapping •Define Virtual Port Profile (VPP) •Assign (VPP) to VMs and Distribute •Respond to VM motion occurrences NIC NIC VM1 IP: 1.1.1.2 MAC: 00:0A Hypervisor Hypervisor © 2012 Extreme Networks, Inc. All rights reserved. Both the VM and the Virtual Port Profile moves to the destination switch port. Networklevel visibility into VM movement is achieved to deliver better SLA.
  15. 15. What’s NEW? © 2012 Extreme Networks, Inc. All rights reserved.
  16. 16. Official Extreme Networks partner in Latvia THANK YOU! Māris Strazdiņš maris@cadence.lv © 2012 Extreme Networks, Inc. All rights reserved.

×