Defending the Data Center: Managing Users from the Edge to the Application

Cisco Security
Cisco SecurityFounding Partner at Cisco Security
MANAGING USERS FROM THE EDGE TO THE APPLICATION

Russell Rice
Senior Director Product Management
Dec 5, 2012




© 2012 Cisco and/or its affiliates. All rights reserved.   1
7.7    Billion In next 5 Years
 Accessing Application and Data
         Wi-Fi devices




© 2012 Cisco and/or its affiliates. All rights reserved.   2
• How do I classify so many devices
       coming onto my network every hour?
• Do we have any visibility on those
       devices connecting to our application
       & data in DC?
• Virtual Machine Sprawl! How should
       I manage security for all of those
       VMs we are being asked to provision
       everyday?
• My critical services are still running
       on physical servers. Do I maintain
       separate policies?



© 2012 Cisco and/or its affiliates. All rights reserved.   3
Simplifying network security and engineering
       • Secure
           Embeds security within the infrastructure
           Enforcement based on rich contextual identify of users and systems
           Solution simplicity enables end-to-end approach

       • Efficient
           Simplifies implementation of security policy
           Highly scalable & Inline rate
           Simplifies Data Center network design

       • Demonstrable ROI
           Reduces ACL and VLAN complexity & maintenance
           Can automate Firewall policy administration
           Can improve both performance & availability


© 2012 Cisco and/or its affiliates. All rights reserved.                         4
Translating Business Policy to the Network




                     TrustSec lets you define policy                                         Context Classification
                      in meaningful business terms

                                             Business Policy


                                                                                            TAG      Security Group Tag


         Destination                 HR Database           Prod HRMS   Storage
       Source

   Exec BYOD                                  X               X           X      Distributed Enforcement throughout Network
      Exec PC                                 X                           X
   Prod HRMS                                                              X
                                                                                   Switch         Router   DC FW      DC Switch
  HR Database




© 2012 Cisco and/or its affiliates. All rights reserved.                                                                          5
Device Type: Apple iPAD   Classification Result:
                                            User: Mary
                                            Group: Employee               Personal Asset SGT
                                            Corporate Asset: No




                                                                                                      ISE Profiling
         Along with
         authentication, various data
         is sent to ISE for device
         profiling                                                                                      ISE (Identity Services Engine)



                                                                                                      SGT
                                                                           Profiling Data
                                                                                ID &

                                                                                                            Security Group
                                                                                                                Policy
                                                                                                                                         DC Resource
                                  Company asset                                             NetFlow
                                                                                             DCHP
                                                                                                                                           Access
                                                                                              DNS
                                                                                             HTTP
                                                                                              OUI
                                                                                            RADIUS
                                                                                             NMAP
                                                                                             SNMP
                                                            AP                   Wireless LAN
                                                                                  Controller                                               Restricted
    Employee
                                                                                                                                         Internet Only
                                   Personal asset                                                                       Distributed
                                                                                                                       Enforcement
                                                                                                                        based on
                                                                                                                      Security Group

© 2012 Cisco and/or its affiliates. All rights reserved.                                                                                                 6
Classification         ISE         Directory
                                                                                                           Fin Servers   SGT = 4
          Users, Device                                                                 Enforcement


                                       SGT:5                                                               HR Servers    SGT = 10

                                               Switch               Router      DC FW          DC Switch

                                                                      SGT Propagation




    TrustSec SGA is a context-based firewall or access control solution:
    • Classification of systems/users based on context
          (user role, device, location, access method)

    • The context-based classification propagates using SGT

    • SGT used by firewalls, routers and switches to make intelligent
          forwarding or blocking decisions in the DC

© 2012 Cisco and/or its affiliates. All rights reserved.                                                                            7
Data Center
                                                                                                           Core Layer

       Stateful Firewalling
       Initial filter for all ingress and egress
                                                                                                                     DC
                                                                                                                     Aggregation
                                                                                                                     Layer

        Stateful Firewalling
        Additional Firewall Services for server
                                                                                                                     DC Service
        farm specific protection                                                                                     Layer


                                                                                                           DC Access
                                                                                                           Layer
        Server Segmentation
        IP-Based Access Control Lists
        VLANs, Private VLANs                               Virtual Access


                                                                                        Physical Servers
                                                                      Virtual Servers




© 2012 Cisco and/or its affiliates. All rights reserved.                                                                          8
NY
                                                                    10.2.34.0/24
                                                                    10.2.35.0/24
                                                                    10.2.36.0/24
                                                           NY       10.3.102.0/24                DC-MTV (SRV1)
                                                           VPN      10.3.152.0/24                DC-MTV (SAP1)
                                                           UK       10.4.111.0/24
                                                                                                 DC-RTP (SCM2)
                                                                          ….
                                                           SJC                                   DC-RTP (ESXix)

                                                                               Traditional ACL
                                                                                      or
                                                           Source                                Destination
                                                                                  FW Rules
    permit               NY         to       SRV1 for HTTPS
    deny                 NY         to       SAP2 for SQL
    deny                 NY         to       SCM2 forGlobal bank dedicates 24 global resources
                                                   A SSH
    permit               VPN        to       SRV1 for HTTPS
    deny                 VPN        to       SAP1 for SQL
                                                         to manage for 3 source objects & 3 destination objects
                                                                ACL
                                                                     Firewall rules currently
    deny                 VPN        to       SCM2 for SSH
    permit               UK         to       SRV1 for HTTPS
    deny                 UK         to       SAP1 for SQL
    deny
    Permit
                         UK
                         SJC
                             Complex Task and High OPEX Continues
                                    to
                                    to
                                             SAP for SSH
                                             SRV1 for HTTPS
    deny                 SJC        to       SAP1 for SQL       Adding source Object
    deny                 SJC        to       SCM2
    permit               NY         to       ESXis for RDP
    deny                 VPN        to       ESXis for RDP
                                                                Adding destination Object
    deny                 UK         to       ESXis for RDP
    deny                 SJC        to       ESXis for RDP
© 2012 Cisco and/or its affiliates. All rights reserved.                                                          9
NY                            DC-MTV (SRV1)
                                                           VPN                           DC-MTV (SAP1)
                                                           UK                            DC-RTP (SCM2)
                                                           CA                            DC-RTP (ESXix)

                                                                       Security Group
                                                                          Filtering
                                                        Source SGT:                    Destination SGT:
                                                       Employee (10)                Production Server (50)


                          permit from Employee / Server regardless of topology
                                Policy stays with User   to     Production Server eq HTTPS
                          deny Simpler Auditing Processto Lower OperationalServer eq SQL
                                 from      Employee            Production Cost
                          deny from        Employee      to     Production Server eq SSH
                                Simpler Security Operation  Resource Optimization
                         (e.g. Global bank estimates 6 global resources with SGFW/SGACL)

                                                                 Clear ROI in OPEX

© 2012 Cisco and/or its affiliates. All rights reserved.                                                     10
Legacy                                                  Emerging
      Accidental Architectures                               Data Center and Server Consolidation
      Applications deployed in fixed                         Server Virtualization
       positions (ex. multi-tier deployment)                  “Any workload on any server”
      Predictable traffic flows                              Unpredictable traffic flows as
      Security often deployed                                 workloads migrate
       to each pod or silo




© 2012 Cisco and/or its affiliates. All rights reserved.                                              11
Physical and Virtual Servers SegmentedVLAN? VLAN
                                                                                     App using

                                             Policy Stays with VLAN or IP address, Not with Servers
                                                                                                    Which Policy?
                                  Web
                                 Servers
                                                           Network Ops, Server Ops, and Security Ops are
                                                                  App Servers       Database
                             Web Server VLAN                    App VLAN
                                                                           involved in Operation Cluster
                                                                                 Database VLAN DR




                                                   As the number of server grows…
                                                     Complexity and OPEX follow


© 2012 Cisco and/or its affiliates. All rights reserved.                                                            12
Web Server SGT (10)

                                                                                                    Application Server SGT (20)

                                                                                                    Database Server SGT (30)




                          Server, Network, and Security Team share common security object
                                                      Policy Stays with Servers, Not based on Topology
                                 Web             Web        App   App     DB   DB
                                               Works for both Physical and Virtual Servers
                              Production Server VLAN                       DR Cluster



                                       permit tcp from src Web to dst App eq HTTPS
                                       permit tcp from src App to dst DB eq SQL
                                       deny   any from src Web to dst
                                                                       grows…
                                         As the number of serversDB eq SQL
                           Management complexity and OPEX do not


© 2012 Cisco and/or its affiliates. All rights reserved.                                                                          13
• Supports VXI use case                                                                                     SGACL enabled Device

       with Nexus 1000v                                                                                     SG Firewall enabled Device
                                                                                   VDI Connection
• Common classification                                                                Broker

       and enforcement for                                                                                              Physical Servers
       physical & virtual                                            Campus
                                                                     Network
       environment
                                                           VDI Endpoint
• Simpler security
       management for                                                     Nexus 1000v                                    Virtual Servers
       frequent VM                                                        Virtual Access
                                                                                                 Hosted Virtual
       provisioning                                                                              Desktop (HVD)
                                                                                                                  • SGT assigned to
                                                                                                                    vEthernet port
                                                                                           UCS




© 2012 Cisco and/or its affiliates. All rights reserved.                                                                                   14
Data Center
                                                                                                                     Core Layer

       Security Group Firewalling
       Firewall rule automation
       using Security Group (ASA)                                                                                              DC
                                                                                                                               Aggregation
                                                                                                                               Layer

       Security Group Firewalling
       Firewall rule automation
                                                                                                                               DC Service
       using Security Group (ASA)                                                                                              Layer


                                                                                                                     DC Access
                                                                                                                     Layer
       Security Group ACLs
       • Segmentation defined in a simple policy
         table or matrix                                             Virtual Access
       • Applied across Nexus 7000/5500/2000
         independent of the topology                                                              Physical Servers
                                                                                Virtual Servers
                                        SGACL enabled Device

                                        SG Firewall enabled Device
© 2012 Cisco and/or its affiliates. All rights reserved.                                                                                    15
DEPLOYMENT USE CASES


                                     Healthcare: Ensure Privacy of Patient Data by Enforcing Roles Based
                                     Access and Segmentation Across the Network


                                    Retail: Intra Store Communication for Networked Devices While Ensuring
                                                                      .
                                    That Only Authorized Users and Devices Have Access to PCI Data


                                     Technology: Allowing Approved Employee-Owned Tablets Access to
                                     Internal Portals and Corporate App Store


                                    Manufacturing: Marking Extranet Traffic to Allow PLC Vendor Remote
                                    Access to Specific Manufacturing Zone Only, and Offshore Development
                                    Partners Access to Development Servers Only


© 2012 Cisco and/or its affiliates. All rights reserved.                                                     16
Classification

        Policy
      Management                                            Catalyst 2K    Catalyst 4K      WLC (7.2)     Nexus 7000       Nexus 1000v
                                                            Catalyst 3K    Catalyst 6K                    Nexus 5000        (Q4CY12)


Identity Services Engine                                   Enforcement


                                                             N7K / N5K      Cat6K         Cat3K-X       ASA (SGFW)       ASR1K/ISRG2
WLAN                  LAN             Remote                  (SGACL)      (SGACL)        (SGACL)                          (SGFW)
                                      Access
                                    (roadmap)
                                                           Transport
                                                           Cat 2K-S (SXP)                N7K (SXP/SGT)               ASR1K (SXP/SGT)
                                                           Cat 3K (SXP)                  N5K (SGT)                   ISR G2 (SXP)
         AnyConnect                                        Cat 3K-X (SXP/SGT)            N1Kv (SXP) - Q4CY12         ASA (SXP)
      (Attribute provider)                                 Cat 4K (SXP)
                                                           Cat 6K Sup2T (SXP/SGT)



© 2012 Cisco and/or its affiliates. All rights reserved.                                                                                 17
Secure                                 Efficient               Demonstrable ROI

 Embed security within                                     Simplifies implementation    Reduces ACL and VLAN
  the infra                                                  of security policy            complexity & maintenance
 Enforcement based on                                      Highly scalable              Automates FW policy
  rich context                                               & Inline rate                Improve both performance
 Solution simplicity                                       Simplifies Data Center        & availability
  enables end-to-end                                         network design
  approach




© 2012 Cisco and/or its affiliates. All rights reserved.                                                              18
Thank you.




© 2012 Cisco and/or its affiliates. All rights reserved.   19
1 of 19

Recommended

From Physical to Virtual to Cloud by
From Physical to Virtual to CloudFrom Physical to Virtual to Cloud
From Physical to Virtual to CloudCisco Security
1.7K views36 slides
Data Center Security Now and into the Future by
Data Center Security Now and into the FutureData Center Security Now and into the Future
Data Center Security Now and into the FutureCisco Security
2.4K views18 slides
How SASE can help you move securely from the PSN with VMware and Breeze Networks by
How SASE can help you move securely from the PSN with VMware and Breeze NetworksHow SASE can help you move securely from the PSN with VMware and Breeze Networks
How SASE can help you move securely from the PSN with VMware and Breeze NetworksArticulate Marketing
662 views31 slides
Security as a Service Model for Cloud Environment by
Security as   a Service Model   for   Cloud   EnvironmentSecurity as   a Service Model   for   Cloud   Environment
Security as a Service Model for Cloud EnvironmentKaashivInfoTech Company
947 views6 slides
Security and Virtualization in the Data Center by
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data CenterCisco Canada
12.5K views66 slides
Monetizing the Enterprise: Borderless Networks by
Monetizing the Enterprise: Borderless NetworksMonetizing the Enterprise: Borderless Networks
Monetizing the Enterprise: Borderless NetworksCisco Service Provider Mobility
267 views8 slides

More Related Content

What's hot

Strategy Cloud and Security as a Service by
Strategy Cloud and Security as a ServiceStrategy Cloud and Security as a Service
Strategy Cloud and Security as a ServiceAberla
948 views13 slides
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter... by
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...NetworkCollaborators
351 views21 slides
Cisco Meraki Overview by
Cisco Meraki OverviewCisco Meraki Overview
Cisco Meraki OverviewSSISG
903 views30 slides
Cisco Meraki Portfolio Guide by
Cisco Meraki Portfolio GuideCisco Meraki Portfolio Guide
Cisco Meraki Portfolio GuideMaticmind
7K views49 slides
CCSK, cloud security framework, Indonesia by
CCSK, cloud security framework, IndonesiaCCSK, cloud security framework, Indonesia
CCSK, cloud security framework, IndonesiaWise Pacific Venture
2.9K views41 slides
Netpluz corp presentation 2020 by
Netpluz corp presentation 2020Netpluz corp presentation 2020
Netpluz corp presentation 2020Netpluz Asia Pte Ltd
155 views42 slides

What's hot(20)

Strategy Cloud and Security as a Service by Aberla
Strategy Cloud and Security as a ServiceStrategy Cloud and Security as a Service
Strategy Cloud and Security as a Service
Aberla948 views
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter... by NetworkCollaborators
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...
Cisco Meraki Overview by SSISG
Cisco Meraki OverviewCisco Meraki Overview
Cisco Meraki Overview
SSISG903 views
Cisco Meraki Portfolio Guide by Maticmind
Cisco Meraki Portfolio GuideCisco Meraki Portfolio Guide
Cisco Meraki Portfolio Guide
Maticmind7K views
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa... by F5 Networks
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks1.1K views
Cisco Collaboration-Spark Presentation by Simplex
Cisco Collaboration-Spark PresentationCisco Collaboration-Spark Presentation
Cisco Collaboration-Spark Presentation
Simplex441 views
Vfm palo alto next generation firewall by vfmindia
Vfm palo alto next generation firewallVfm palo alto next generation firewall
Vfm palo alto next generation firewall
vfmindia1.8K views
Where to Store the Cloud Encryption Keys - InterOp 2012 by Trend Micro
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012
Trend Micro1.2K views
The F5 DDoS Protection Reference Architecture (Technical White Paper) by F5 Networks
The F5 DDoS Protection Reference Architecture (Technical White Paper)The F5 DDoS Protection Reference Architecture (Technical White Paper)
The F5 DDoS Protection Reference Architecture (Technical White Paper)
F5 Networks2.6K views
IT Guide for Mobility: Making the case for Security leaders by Cisco Mobility
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leaders
Cisco Mobility894 views
Layer 7: Cloud Security For The Public Sector by CA API Management
Layer 7: Cloud Security For The Public SectorLayer 7: Cloud Security For The Public Sector
Layer 7: Cloud Security For The Public Sector
CA API Management1.7K views
[Cisco Connect 2018 - Vietnam] Rajinder singh cisco sd-wan-next generation ... by Nur Shiqim Chok
[Cisco Connect 2018 - Vietnam] Rajinder singh   cisco sd-wan-next generation ...[Cisco Connect 2018 - Vietnam] Rajinder singh   cisco sd-wan-next generation ...
[Cisco Connect 2018 - Vietnam] Rajinder singh cisco sd-wan-next generation ...
Nur Shiqim Chok81 views
Barracuda ng firewall by Kappa Data
Barracuda ng firewallBarracuda ng firewall
Barracuda ng firewall
Kappa Data 1.9K views
BIG-IP Data Center Firewall Solution by F5 Networks
BIG-IP Data Center Firewall SolutionBIG-IP Data Center Firewall Solution
BIG-IP Data Center Firewall Solution
F5 Networks3.5K views
Safe Net: Cloud Security Solutions by ASBIS SK
Safe Net: Cloud Security SolutionsSafe Net: Cloud Security Solutions
Safe Net: Cloud Security Solutions
ASBIS SK1.2K views
CloudGen Firewall, SD-WAN, WAF security - Protection and Performance in the C... by DATA SECURITY SOLUTIONS
CloudGen Firewall, SD-WAN, WAF security - Protection and Performance in the C...CloudGen Firewall, SD-WAN, WAF security - Protection and Performance in the C...
CloudGen Firewall, SD-WAN, WAF security - Protection and Performance in the C...
Cisco Meraki: Let Simple Work For You by Cisco Canada
Cisco Meraki: Let Simple Work For YouCisco Meraki: Let Simple Work For You
Cisco Meraki: Let Simple Work For You
Cisco Canada203 views
Palo Alto Networks Portfolio & Strategy Overview 2019 by Sean Xie
Palo Alto Networks Portfolio & Strategy Overview 2019Palo Alto Networks Portfolio & Strategy Overview 2019
Palo Alto Networks Portfolio & Strategy Overview 2019
Sean Xie1.2K views

Viewers also liked

2013 Cisco Annual Security Report by
2013 Cisco Annual Security Report2013 Cisco Annual Security Report
2013 Cisco Annual Security ReportCisco Security
2.3K views24 slides
Enterprise Strategy Group: Security Survey by
Enterprise Strategy Group: Security SurveyEnterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security SurveyCisco Security
3.1K views5 slides
Cisco 2015 Midyear Security Report Slide Deck by
Cisco 2015 Midyear Security Report Slide DeckCisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco Security
4.4K views28 slides
Infographic: Security for Mobile Service Providers by
Infographic: Security for Mobile Service ProvidersInfographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service ProvidersCisco Security
4.6K views1 slide
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur... by
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Cisco Security
4.2K views36 slides
Cisco ISE Reduces the Attack Surface by Controlling Access by
Cisco ISE Reduces the Attack Surface by Controlling AccessCisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling AccessCisco Security
4.4K views1 slide

Viewers also liked(19)

2013 Cisco Annual Security Report by Cisco Security
2013 Cisco Annual Security Report2013 Cisco Annual Security Report
2013 Cisco Annual Security Report
Cisco Security2.3K views
Enterprise Strategy Group: Security Survey by Cisco Security
Enterprise Strategy Group: Security SurveyEnterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security Survey
Cisco Security3.1K views
Cisco 2015 Midyear Security Report Slide Deck by Cisco Security
Cisco 2015 Midyear Security Report Slide DeckCisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide Deck
Cisco Security4.4K views
Infographic: Security for Mobile Service Providers by Cisco Security
Infographic: Security for Mobile Service ProvidersInfographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service Providers
Cisco Security4.6K views
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur... by Cisco Security
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Cisco Security4.2K views
Cisco ISE Reduces the Attack Surface by Controlling Access by Cisco Security
Cisco ISE Reduces the Attack Surface by Controlling AccessCisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling Access
Cisco Security4.4K views
Cisco Web and Email Security Overview by Cisco Security
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
Cisco Security26.5K views
McAllen Intermediate School District by Cisco Security
McAllen Intermediate School DistrictMcAllen Intermediate School District
McAllen Intermediate School District
Cisco Security1.3K views
Midsize Business Solutions: Cybersecurity by Cisco Security
Midsize Business Solutions: CybersecurityMidsize Business Solutions: Cybersecurity
Midsize Business Solutions: Cybersecurity
Cisco Security3.4K views
Integrated Network Security Strategies by Cisco Security
Integrated Network Security StrategiesIntegrated Network Security Strategies
Integrated Network Security Strategies
Cisco Security3.5K views
Balance Data Center Security and Performance by Cisco Security
Balance Data Center Security and PerformanceBalance Data Center Security and Performance
Balance Data Center Security and Performance
Cisco Security2.5K views
Data Center Security Challenges by Cisco Security
Data Center Security ChallengesData Center Security Challenges
Data Center Security Challenges
Cisco Security8.5K views
A Reality Check on the State of Cybersecurity by Cisco Security
A Reality Check on the State of CybersecurityA Reality Check on the State of Cybersecurity
A Reality Check on the State of Cybersecurity
Cisco Security3.1K views
Pervasive Security Across Your Extended Network by Cisco Security
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended Network
Cisco Security6.4K views
Malware and the Cost of Inactivity by Cisco Security
Malware and the Cost of InactivityMalware and the Cost of Inactivity
Malware and the Cost of Inactivity
Cisco Security8.8K views
Converged IoT Systems: Bringing the Data Center to the Edge of Everything by Dana Gardner
Converged IoT Systems: Bringing the Data Center to the Edge of EverythingConverged IoT Systems: Bringing the Data Center to the Edge of Everything
Converged IoT Systems: Bringing the Data Center to the Edge of Everything
Dana Gardner566 views
KSDG BaaS Intro by ericpi Bi
KSDG BaaS IntroKSDG BaaS Intro
KSDG BaaS Intro
ericpi Bi2.2K views

Similar to Defending the Data Center: Managing Users from the Edge to the Application

Accel Partners New Data Workshop 7-14-10 by
Accel Partners New Data Workshop 7-14-10Accel Partners New Data Workshop 7-14-10
Accel Partners New Data Workshop 7-14-10keirdo1
242 views127 slides
Ixia anue maximum roi from your existing toolsets by
Ixia anue   maximum roi from your existing toolsetsIxia anue   maximum roi from your existing toolsets
Ixia anue maximum roi from your existing toolsetsresponsedatacomms
847 views11 slides
Ixia anue maximum roi from your existing toolsets by
Ixia anue   maximum roi from your existing toolsetsIxia anue   maximum roi from your existing toolsets
Ixia anue maximum roi from your existing toolsetsresponsedatacomms
566 views11 slides
Guard Era Corp Brochure 2008 by
Guard Era Corp Brochure 2008Guard Era Corp Brochure 2008
Guard Era Corp Brochure 2008GuardEra Access Solutions, Inc.
215 views4 slides
Leveraging IMS for VoLTE and RCS Services in LTE Networks Presented by Adnan ... by
Leveraging IMS for VoLTE and RCS Services in LTE Networks Presented by Adnan ...Leveraging IMS for VoLTE and RCS Services in LTE Networks Presented by Adnan ...
Leveraging IMS for VoLTE and RCS Services in LTE Networks Presented by Adnan ...Radisys Corporation
8K views36 slides
ActionPacked! Networks Hosts Cisco Application Visibility & Control Webinar by
ActionPacked! Networks Hosts Cisco Application Visibility & Control WebinarActionPacked! Networks Hosts Cisco Application Visibility & Control Webinar
ActionPacked! Networks Hosts Cisco Application Visibility & Control WebinarActionPacked Networks
968 views52 slides

Similar to Defending the Data Center: Managing Users from the Edge to the Application(20)

Accel Partners New Data Workshop 7-14-10 by keirdo1
Accel Partners New Data Workshop 7-14-10Accel Partners New Data Workshop 7-14-10
Accel Partners New Data Workshop 7-14-10
keirdo1242 views
Ixia anue maximum roi from your existing toolsets by responsedatacomms
Ixia anue   maximum roi from your existing toolsetsIxia anue   maximum roi from your existing toolsets
Ixia anue maximum roi from your existing toolsets
responsedatacomms847 views
Ixia anue maximum roi from your existing toolsets by responsedatacomms
Ixia anue   maximum roi from your existing toolsetsIxia anue   maximum roi from your existing toolsets
Ixia anue maximum roi from your existing toolsets
responsedatacomms566 views
Leveraging IMS for VoLTE and RCS Services in LTE Networks Presented by Adnan ... by Radisys Corporation
Leveraging IMS for VoLTE and RCS Services in LTE Networks Presented by Adnan ...Leveraging IMS for VoLTE and RCS Services in LTE Networks Presented by Adnan ...
Leveraging IMS for VoLTE and RCS Services in LTE Networks Presented by Adnan ...
ActionPacked! Networks Hosts Cisco Application Visibility & Control Webinar by ActionPacked Networks
ActionPacked! Networks Hosts Cisco Application Visibility & Control WebinarActionPacked! Networks Hosts Cisco Application Visibility & Control Webinar
ActionPacked! Networks Hosts Cisco Application Visibility & Control Webinar
Microsoft Direct Access (Part II)_John Delizo by Quek Lilian
Microsoft Direct Access (Part II)_John DelizoMicrosoft Direct Access (Part II)_John Delizo
Microsoft Direct Access (Part II)_John Delizo
Quek Lilian1.6K views
ReadyCloud Collaboration, a Cisco Powered service by Gen-i
ReadyCloud Collaboration, a Cisco Powered serviceReadyCloud Collaboration, a Cisco Powered service
ReadyCloud Collaboration, a Cisco Powered service
Gen-i633 views
Protect Your Big Data with Intel<sup>®</sup> Xeon<sup>®</sup> Processors a.. by Odinot Stanislas
Protect Your Big Data with Intel<sup>®</sup> Xeon<sup>®</sup> Processors a..Protect Your Big Data with Intel<sup>®</sup> Xeon<sup>®</sup> Processors a..
Protect Your Big Data with Intel<sup>®</sup> Xeon<sup>®</sup> Processors a..
Odinot Stanislas698 views
Express Data - BYOD by Gen-i
Express Data - BYODExpress Data - BYOD
Express Data - BYOD
Gen-i504 views
Express Data - BYOD by Gen-i
Express Data - BYODExpress Data - BYOD
Express Data - BYOD
Gen-i307 views
Core Network Optimization: The Control Plane, Data Plane & Beyond by Radisys Corporation
Core Network Optimization: The Control Plane, Data Plane & BeyondCore Network Optimization: The Control Plane, Data Plane & Beyond
Core Network Optimization: The Control Plane, Data Plane & Beyond
Radisys Corporation4.2K views
Развитие технологий SDN для сетей ЦОД by Cisco Russia
Развитие технологий SDN для сетей ЦОДРазвитие технологий SDN для сетей ЦОД
Развитие технологий SDN для сетей ЦОД
Cisco Russia 588 views
Solving Compliance for Big Data by fbeckett1
Solving Compliance for Big DataSolving Compliance for Big Data
Solving Compliance for Big Data
fbeckett1429 views
Next Gen Data Center Implementing Network Storage with Server Blades, Cluster... by IMEX Research
Next Gen Data Center Implementing Network Storage with Server Blades, Cluster...Next Gen Data Center Implementing Network Storage with Server Blades, Cluster...
Next Gen Data Center Implementing Network Storage with Server Blades, Cluster...
IMEX Research1.1K views
Application-Aware Network Performance Management by Riverbed Technology
Application-Aware Network Performance ManagementApplication-Aware Network Performance Management
Application-Aware Network Performance Management
Riverbed Technology4.2K views
CA Nimsoft xen desktop monitoring by CA Nimsoft
CA Nimsoft xen desktop monitoring CA Nimsoft xen desktop monitoring
CA Nimsoft xen desktop monitoring
CA Nimsoft2.9K views
Technology Disruption Brings New VAS Opportunities by Radisys Corporation
Technology Disruption Brings New VAS OpportunitiesTechnology Disruption Brings New VAS Opportunities
Technology Disruption Brings New VAS Opportunities
Radisys Corporation1.7K views

More from Cisco Security

Incident Response Services Template - Cisco Security by
Incident Response Services Template - Cisco SecurityIncident Response Services Template - Cisco Security
Incident Response Services Template - Cisco SecurityCisco Security
11.2K views2 slides
3 Tips for Choosing a Next Generation Firewall by
3 Tips for Choosing a Next Generation Firewall3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation FirewallCisco Security
2.5K views1 slide
AMP Helps Cisco IT Catch 50% More Malware threats by
AMP Helps Cisco IT Catch 50% More Malware threatsAMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threatsCisco Security
4.9K views1 slide
The Cost of Inactivity: Malware Infographic by
The Cost of Inactivity: Malware InfographicThe Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicCisco Security
1.7K views1 slide
Cisco Addresses the Full Attack Continuum by
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Security
4.4K views21 slides
Infonetics Network and Content Security Vendor Scorecard by
Infonetics Network and Content Security Vendor ScorecardInfonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor ScorecardCisco Security
2.2K views12 slides

More from Cisco Security(15)

Incident Response Services Template - Cisco Security by Cisco Security
Incident Response Services Template - Cisco SecurityIncident Response Services Template - Cisco Security
Incident Response Services Template - Cisco Security
Cisco Security11.2K views
3 Tips for Choosing a Next Generation Firewall by Cisco Security
3 Tips for Choosing a Next Generation Firewall3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall
Cisco Security2.5K views
AMP Helps Cisco IT Catch 50% More Malware threats by Cisco Security
AMP Helps Cisco IT Catch 50% More Malware threatsAMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threats
Cisco Security4.9K views
The Cost of Inactivity: Malware Infographic by Cisco Security
The Cost of Inactivity: Malware InfographicThe Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware Infographic
Cisco Security1.7K views
Cisco Addresses the Full Attack Continuum by Cisco Security
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
Cisco Security4.4K views
Infonetics Network and Content Security Vendor Scorecard by Cisco Security
Infonetics Network and Content Security Vendor ScorecardInfonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor Scorecard
Cisco Security2.2K views
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ... by Cisco Security
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Cisco Security7.3K views
The Evolution of and Need for Secure Network Access by Cisco Security
The Evolution of and Need for Secure Network AccessThe Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network Access
Cisco Security2.6K views
Cisco 2014 Midyear Security Report by Cisco Security
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
Cisco Security2.4K views
String of Paerls Infographic by Cisco Security
String of Paerls InfographicString of Paerls Infographic
String of Paerls Infographic
Cisco Security1.4K views
Midyear Security Report Infographic by Cisco Security
Midyear Security Report InfographicMidyear Security Report Infographic
Midyear Security Report Infographic
Cisco Security478 views
Cisco Annual Security Report Infographic by Cisco Security
Cisco Annual Security Report InfographicCisco Annual Security Report Infographic
Cisco Annual Security Report Infographic
Cisco Security602 views
City of Tomorrow Builds in Next-Generation Security by Cisco Security
City of Tomorrow Builds in Next-Generation SecurityCity of Tomorrow Builds in Next-Generation Security
City of Tomorrow Builds in Next-Generation Security
Cisco Security2.2K views
Laser Pioneer Secures Network End-to-End to Protect Assets by Cisco Security
Laser Pioneer Secures Network End-to-End to Protect AssetsLaser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect Assets
Cisco Security1.1K views
Leveraging Context-Aware Security to Safeguard Patient Data by Cisco Security
Leveraging Context-Aware Security to Safeguard Patient DataLeveraging Context-Aware Security to Safeguard Patient Data
Leveraging Context-Aware Security to Safeguard Patient Data
Cisco Security1.1K views

Recently uploaded

GDSC CTU First Meeting Party by
GDSC CTU First Meeting PartyGDSC CTU First Meeting Party
GDSC CTU First Meeting PartyNational Yang Ming Chiao Tung University
11 views25 slides
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors by
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensorssugiuralab
23 views15 slides
Data Integrity for Banking and Financial Services by
Data Integrity for Banking and Financial ServicesData Integrity for Banking and Financial Services
Data Integrity for Banking and Financial ServicesPrecisely
29 views26 slides
Vertical User Stories by
Vertical User StoriesVertical User Stories
Vertical User StoriesMoisés Armani Ramírez
17 views16 slides
Ransomware is Knocking your Door_Final.pdf by
Ransomware is Knocking your Door_Final.pdfRansomware is Knocking your Door_Final.pdf
Ransomware is Knocking your Door_Final.pdfSecurity Bootcamp
66 views46 slides
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive by
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveNetwork Automation Forum
43 views35 slides

Recently uploaded(20)

TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors by sugiuralab
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
sugiuralab23 views
Data Integrity for Banking and Financial Services by Precisely
Data Integrity for Banking and Financial ServicesData Integrity for Banking and Financial Services
Data Integrity for Banking and Financial Services
Precisely29 views
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive by Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 by IttrainingIttraining
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
Case Study Copenhagen Energy and Business Central.pdf by Aitana
Case Study Copenhagen Energy and Business Central.pdfCase Study Copenhagen Energy and Business Central.pdf
Case Study Copenhagen Energy and Business Central.pdf
Aitana17 views
"Surviving highload with Node.js", Andrii Shumada by Fwdays
"Surviving highload with Node.js", Andrii Shumada "Surviving highload with Node.js", Andrii Shumada
"Surviving highload with Node.js", Andrii Shumada
Fwdays33 views
SAP Automation Using Bar Code and FIORI.pdf by Virendra Rai, PMP
SAP Automation Using Bar Code and FIORI.pdfSAP Automation Using Bar Code and FIORI.pdf
SAP Automation Using Bar Code and FIORI.pdf
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ... by Jasper Oosterveld
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
Business Analyst Series 2023 - Week 3 Session 5 by DianaGray10
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5
DianaGray10345 views
Igniting Next Level Productivity with AI-Infused Data Integration Workflows by Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software317 views

Defending the Data Center: Managing Users from the Edge to the Application

  • 1. MANAGING USERS FROM THE EDGE TO THE APPLICATION Russell Rice Senior Director Product Management Dec 5, 2012 © 2012 Cisco and/or its affiliates. All rights reserved. 1
  • 2. 7.7 Billion In next 5 Years Accessing Application and Data Wi-Fi devices © 2012 Cisco and/or its affiliates. All rights reserved. 2
  • 3. • How do I classify so many devices coming onto my network every hour? • Do we have any visibility on those devices connecting to our application & data in DC? • Virtual Machine Sprawl! How should I manage security for all of those VMs we are being asked to provision everyday? • My critical services are still running on physical servers. Do I maintain separate policies? © 2012 Cisco and/or its affiliates. All rights reserved. 3
  • 4. Simplifying network security and engineering • Secure  Embeds security within the infrastructure  Enforcement based on rich contextual identify of users and systems  Solution simplicity enables end-to-end approach • Efficient  Simplifies implementation of security policy  Highly scalable & Inline rate  Simplifies Data Center network design • Demonstrable ROI  Reduces ACL and VLAN complexity & maintenance  Can automate Firewall policy administration  Can improve both performance & availability © 2012 Cisco and/or its affiliates. All rights reserved. 4
  • 5. Translating Business Policy to the Network TrustSec lets you define policy Context Classification in meaningful business terms Business Policy TAG Security Group Tag Destination HR Database Prod HRMS Storage Source Exec BYOD X X X Distributed Enforcement throughout Network Exec PC X X Prod HRMS X Switch Router DC FW DC Switch HR Database © 2012 Cisco and/or its affiliates. All rights reserved. 5
  • 6. Device Type: Apple iPAD Classification Result: User: Mary Group: Employee Personal Asset SGT Corporate Asset: No ISE Profiling Along with authentication, various data is sent to ISE for device profiling ISE (Identity Services Engine) SGT Profiling Data ID & Security Group Policy DC Resource Company asset NetFlow DCHP Access DNS HTTP OUI RADIUS NMAP SNMP AP Wireless LAN Controller Restricted Employee Internet Only Personal asset Distributed Enforcement based on Security Group © 2012 Cisco and/or its affiliates. All rights reserved. 6
  • 7. Classification ISE Directory Fin Servers SGT = 4 Users, Device Enforcement SGT:5 HR Servers SGT = 10 Switch Router DC FW DC Switch SGT Propagation TrustSec SGA is a context-based firewall or access control solution: • Classification of systems/users based on context (user role, device, location, access method) • The context-based classification propagates using SGT • SGT used by firewalls, routers and switches to make intelligent forwarding or blocking decisions in the DC © 2012 Cisco and/or its affiliates. All rights reserved. 7
  • 8. Data Center Core Layer Stateful Firewalling Initial filter for all ingress and egress DC Aggregation Layer Stateful Firewalling Additional Firewall Services for server DC Service farm specific protection Layer DC Access Layer Server Segmentation IP-Based Access Control Lists VLANs, Private VLANs Virtual Access Physical Servers Virtual Servers © 2012 Cisco and/or its affiliates. All rights reserved. 8
  • 9. NY 10.2.34.0/24 10.2.35.0/24 10.2.36.0/24 NY 10.3.102.0/24 DC-MTV (SRV1) VPN 10.3.152.0/24 DC-MTV (SAP1) UK 10.4.111.0/24 DC-RTP (SCM2) …. SJC DC-RTP (ESXix) Traditional ACL or Source Destination FW Rules permit NY to SRV1 for HTTPS deny NY to SAP2 for SQL deny NY to SCM2 forGlobal bank dedicates 24 global resources A SSH permit VPN to SRV1 for HTTPS deny VPN to SAP1 for SQL to manage for 3 source objects & 3 destination objects ACL Firewall rules currently deny VPN to SCM2 for SSH permit UK to SRV1 for HTTPS deny UK to SAP1 for SQL deny Permit UK SJC Complex Task and High OPEX Continues to to SAP for SSH SRV1 for HTTPS deny SJC to SAP1 for SQL Adding source Object deny SJC to SCM2 permit NY to ESXis for RDP deny VPN to ESXis for RDP Adding destination Object deny UK to ESXis for RDP deny SJC to ESXis for RDP © 2012 Cisco and/or its affiliates. All rights reserved. 9
  • 10. NY DC-MTV (SRV1) VPN DC-MTV (SAP1) UK DC-RTP (SCM2) CA DC-RTP (ESXix) Security Group Filtering Source SGT: Destination SGT: Employee (10) Production Server (50) permit from Employee / Server regardless of topology Policy stays with User to Production Server eq HTTPS deny Simpler Auditing Processto Lower OperationalServer eq SQL from Employee  Production Cost deny from Employee to Production Server eq SSH Simpler Security Operation  Resource Optimization (e.g. Global bank estimates 6 global resources with SGFW/SGACL) Clear ROI in OPEX © 2012 Cisco and/or its affiliates. All rights reserved. 10
  • 11. Legacy Emerging  Accidental Architectures  Data Center and Server Consolidation  Applications deployed in fixed  Server Virtualization positions (ex. multi-tier deployment)  “Any workload on any server”  Predictable traffic flows  Unpredictable traffic flows as  Security often deployed workloads migrate to each pod or silo © 2012 Cisco and/or its affiliates. All rights reserved. 11
  • 12. Physical and Virtual Servers SegmentedVLAN? VLAN App using Policy Stays with VLAN or IP address, Not with Servers Which Policy? Web Servers Network Ops, Server Ops, and Security Ops are App Servers Database Web Server VLAN App VLAN involved in Operation Cluster Database VLAN DR As the number of server grows… Complexity and OPEX follow © 2012 Cisco and/or its affiliates. All rights reserved. 12
  • 13. Web Server SGT (10) Application Server SGT (20) Database Server SGT (30) Server, Network, and Security Team share common security object Policy Stays with Servers, Not based on Topology Web Web App App DB DB Works for both Physical and Virtual Servers Production Server VLAN DR Cluster permit tcp from src Web to dst App eq HTTPS permit tcp from src App to dst DB eq SQL deny any from src Web to dst grows… As the number of serversDB eq SQL Management complexity and OPEX do not © 2012 Cisco and/or its affiliates. All rights reserved. 13
  • 14. • Supports VXI use case SGACL enabled Device with Nexus 1000v SG Firewall enabled Device VDI Connection • Common classification Broker and enforcement for Physical Servers physical & virtual Campus Network environment VDI Endpoint • Simpler security management for Nexus 1000v Virtual Servers frequent VM Virtual Access Hosted Virtual provisioning Desktop (HVD) • SGT assigned to vEthernet port UCS © 2012 Cisco and/or its affiliates. All rights reserved. 14
  • 15. Data Center Core Layer Security Group Firewalling Firewall rule automation using Security Group (ASA) DC Aggregation Layer Security Group Firewalling Firewall rule automation DC Service using Security Group (ASA) Layer DC Access Layer Security Group ACLs • Segmentation defined in a simple policy table or matrix Virtual Access • Applied across Nexus 7000/5500/2000 independent of the topology Physical Servers Virtual Servers SGACL enabled Device SG Firewall enabled Device © 2012 Cisco and/or its affiliates. All rights reserved. 15
  • 16. DEPLOYMENT USE CASES Healthcare: Ensure Privacy of Patient Data by Enforcing Roles Based Access and Segmentation Across the Network Retail: Intra Store Communication for Networked Devices While Ensuring . That Only Authorized Users and Devices Have Access to PCI Data Technology: Allowing Approved Employee-Owned Tablets Access to Internal Portals and Corporate App Store Manufacturing: Marking Extranet Traffic to Allow PLC Vendor Remote Access to Specific Manufacturing Zone Only, and Offshore Development Partners Access to Development Servers Only © 2012 Cisco and/or its affiliates. All rights reserved. 16
  • 17. Classification Policy Management Catalyst 2K Catalyst 4K WLC (7.2) Nexus 7000 Nexus 1000v Catalyst 3K Catalyst 6K Nexus 5000 (Q4CY12) Identity Services Engine Enforcement N7K / N5K Cat6K Cat3K-X ASA (SGFW) ASR1K/ISRG2 WLAN LAN Remote (SGACL) (SGACL) (SGACL) (SGFW) Access (roadmap) Transport Cat 2K-S (SXP) N7K (SXP/SGT) ASR1K (SXP/SGT) Cat 3K (SXP) N5K (SGT) ISR G2 (SXP) AnyConnect Cat 3K-X (SXP/SGT) N1Kv (SXP) - Q4CY12 ASA (SXP) (Attribute provider) Cat 4K (SXP) Cat 6K Sup2T (SXP/SGT) © 2012 Cisco and/or its affiliates. All rights reserved. 17
  • 18. Secure Efficient Demonstrable ROI  Embed security within  Simplifies implementation  Reduces ACL and VLAN the infra of security policy complexity & maintenance  Enforcement based on  Highly scalable  Automates FW policy rich context & Inline rate  Improve both performance  Solution simplicity  Simplifies Data Center & availability enables end-to-end network design approach © 2012 Cisco and/or its affiliates. All rights reserved. 18
  • 19. Thank you. © 2012 Cisco and/or its affiliates. All rights reserved. 19