SlideShare a Scribd company logo
Submit Search
Upload
Defending the Data Center: Managing Users from the Edge to the Application
Report
Share
Cisco Security
Founding Partner at Cisco Security
Follow
•
0 likes
•
1,088 views
1
of
19
Defending the Data Center: Managing Users from the Edge to the Application
•
0 likes
•
1,088 views
Report
Share
Technology
Simplify your network security and engineering through Cisco’s TrustSec for the Data Center.
Read more
Cisco Security
Founding Partner at Cisco Security
Follow
Recommended
From Physical to Virtual to Cloud by
From Physical to Virtual to Cloud
Cisco Security
1.7K views
•
36 slides
Data Center Security Now and into the Future by
Data Center Security Now and into the Future
Cisco Security
2.4K views
•
18 slides
How SASE can help you move securely from the PSN with VMware and Breeze Networks by
How SASE can help you move securely from the PSN with VMware and Breeze Networks
Articulate Marketing
662 views
•
31 slides
Security as a Service Model for Cloud Environment by
Security as a Service Model for Cloud Environment
KaashivInfoTech Company
947 views
•
6 slides
Security and Virtualization in the Data Center by
Security and Virtualization in the Data Center
Cisco Canada
12.5K views
•
66 slides
Monetizing the Enterprise: Borderless Networks by
Monetizing the Enterprise: Borderless Networks
Cisco Service Provider Mobility
267 views
•
8 slides
More Related Content
What's hot
Strategy Cloud and Security as a Service by
Strategy Cloud and Security as a Service
Aberla
948 views
•
13 slides
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter... by
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...
NetworkCollaborators
351 views
•
21 slides
Cisco Meraki Overview by
Cisco Meraki Overview
SSISG
903 views
•
30 slides
Cisco Meraki Portfolio Guide by
Cisco Meraki Portfolio Guide
Maticmind
7K views
•
49 slides
CCSK, cloud security framework, Indonesia by
CCSK, cloud security framework, Indonesia
Wise Pacific Venture
2.9K views
•
41 slides
Netpluz corp presentation 2020 by
Netpluz corp presentation 2020
Netpluz Asia Pte Ltd
155 views
•
42 slides
What's hot
(20)
Strategy Cloud and Security as a Service by Aberla
Strategy Cloud and Security as a Service
Aberla
•
948 views
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter... by NetworkCollaborators
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...
NetworkCollaborators
•
351 views
Cisco Meraki Overview by SSISG
Cisco Meraki Overview
SSISG
•
903 views
Cisco Meraki Portfolio Guide by Maticmind
Cisco Meraki Portfolio Guide
Maticmind
•
7K views
CCSK, cloud security framework, Indonesia by Wise Pacific Venture
CCSK, cloud security framework, Indonesia
Wise Pacific Venture
•
2.9K views
Netpluz corp presentation 2020 by Netpluz Asia Pte Ltd
Netpluz corp presentation 2020
Netpluz Asia Pte Ltd
•
155 views
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa... by F5 Networks
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks
•
1.1K views
Cisco Collaboration-Spark Presentation by Simplex
Cisco Collaboration-Spark Presentation
Simplex
•
441 views
Vfm palo alto next generation firewall by vfmindia
Vfm palo alto next generation firewall
vfmindia
•
1.8K views
Where to Store the Cloud Encryption Keys - InterOp 2012 by Trend Micro
Where to Store the Cloud Encryption Keys - InterOp 2012
Trend Micro
•
1.2K views
The F5 DDoS Protection Reference Architecture (Technical White Paper) by F5 Networks
The F5 DDoS Protection Reference Architecture (Technical White Paper)
F5 Networks
•
2.6K views
IT Guide for Mobility: Making the case for Security leaders by Cisco Mobility
IT Guide for Mobility: Making the case for Security leaders
Cisco Mobility
•
894 views
Layer 7: Cloud Security For The Public Sector by CA API Management
Layer 7: Cloud Security For The Public Sector
CA API Management
•
1.7K views
[Cisco Connect 2018 - Vietnam] Rajinder singh cisco sd-wan-next generation ... by Nur Shiqim Chok
[Cisco Connect 2018 - Vietnam] Rajinder singh cisco sd-wan-next generation ...
Nur Shiqim Chok
•
81 views
Barracuda ng firewall by Kappa Data
Barracuda ng firewall
Kappa Data
•
1.9K views
BIG-IP Data Center Firewall Solution by F5 Networks
BIG-IP Data Center Firewall Solution
F5 Networks
•
3.5K views
Safe Net: Cloud Security Solutions by ASBIS SK
Safe Net: Cloud Security Solutions
ASBIS SK
•
1.2K views
CloudGen Firewall, SD-WAN, WAF security - Protection and Performance in the C... by DATA SECURITY SOLUTIONS
CloudGen Firewall, SD-WAN, WAF security - Protection and Performance in the C...
DATA SECURITY SOLUTIONS
•
396 views
Cisco Meraki: Let Simple Work For You by Cisco Canada
Cisco Meraki: Let Simple Work For You
Cisco Canada
•
203 views
Palo Alto Networks Portfolio & Strategy Overview 2019 by Sean Xie
Palo Alto Networks Portfolio & Strategy Overview 2019
Sean Xie
•
1.2K views
Viewers also liked
2013 Cisco Annual Security Report by
2013 Cisco Annual Security Report
Cisco Security
2.3K views
•
24 slides
Enterprise Strategy Group: Security Survey by
Enterprise Strategy Group: Security Survey
Cisco Security
3.1K views
•
5 slides
Cisco 2015 Midyear Security Report Slide Deck by
Cisco 2015 Midyear Security Report Slide Deck
Cisco Security
4.4K views
•
28 slides
Infographic: Security for Mobile Service Providers by
Infographic: Security for Mobile Service Providers
Cisco Security
4.6K views
•
1 slide
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur... by
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Cisco Security
4.2K views
•
36 slides
Cisco ISE Reduces the Attack Surface by Controlling Access by
Cisco ISE Reduces the Attack Surface by Controlling Access
Cisco Security
4.4K views
•
1 slide
Viewers also liked
(19)
2013 Cisco Annual Security Report by Cisco Security
2013 Cisco Annual Security Report
Cisco Security
•
2.3K views
Enterprise Strategy Group: Security Survey by Cisco Security
Enterprise Strategy Group: Security Survey
Cisco Security
•
3.1K views
Cisco 2015 Midyear Security Report Slide Deck by Cisco Security
Cisco 2015 Midyear Security Report Slide Deck
Cisco Security
•
4.4K views
Infographic: Security for Mobile Service Providers by Cisco Security
Infographic: Security for Mobile Service Providers
Cisco Security
•
4.6K views
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur... by Cisco Security
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Cisco Security
•
4.2K views
Cisco ISE Reduces the Attack Surface by Controlling Access by Cisco Security
Cisco ISE Reduces the Attack Surface by Controlling Access
Cisco Security
•
4.4K views
Cisco Web and Email Security Overview by Cisco Security
Cisco Web and Email Security Overview
Cisco Security
•
26.5K views
McAllen Intermediate School District by Cisco Security
McAllen Intermediate School District
Cisco Security
•
1.3K views
Midsize Business Solutions: Cybersecurity by Cisco Security
Midsize Business Solutions: Cybersecurity
Cisco Security
•
3.4K views
Integrated Network Security Strategies by Cisco Security
Integrated Network Security Strategies
Cisco Security
•
3.5K views
Balance Data Center Security and Performance by Cisco Security
Balance Data Center Security and Performance
Cisco Security
•
2.5K views
Data Center Security Challenges by Cisco Security
Data Center Security Challenges
Cisco Security
•
8.5K views
A Reality Check on the State of Cybersecurity by Cisco Security
A Reality Check on the State of Cybersecurity
Cisco Security
•
3.1K views
Pervasive Security Across Your Extended Network by Cisco Security
Pervasive Security Across Your Extended Network
Cisco Security
•
6.4K views
Malware and the Cost of Inactivity by Cisco Security
Malware and the Cost of Inactivity
Cisco Security
•
8.8K views
William Paterson University by Cisco Security
William Paterson University
Cisco Security
•
810 views
Smart Data as a Service by Francois Wartelle
Smart Data as a Service
Francois Wartelle
•
317 views
Converged IoT Systems: Bringing the Data Center to the Edge of Everything by Dana Gardner
Converged IoT Systems: Bringing the Data Center to the Edge of Everything
Dana Gardner
•
566 views
KSDG BaaS Intro by ericpi Bi
KSDG BaaS Intro
ericpi Bi
•
2.2K views
Similar to Defending the Data Center: Managing Users from the Edge to the Application
Accel Partners New Data Workshop 7-14-10 by
Accel Partners New Data Workshop 7-14-10
keirdo1
242 views
•
127 slides
Ixia anue maximum roi from your existing toolsets by
Ixia anue maximum roi from your existing toolsets
responsedatacomms
847 views
•
11 slides
Ixia anue maximum roi from your existing toolsets by
Ixia anue maximum roi from your existing toolsets
responsedatacomms
566 views
•
11 slides
Guard Era Corp Brochure 2008 by
Guard Era Corp Brochure 2008
GuardEra Access Solutions, Inc.
215 views
•
4 slides
Leveraging IMS for VoLTE and RCS Services in LTE Networks Presented by Adnan ... by
Leveraging IMS for VoLTE and RCS Services in LTE Networks Presented by Adnan ...
Radisys Corporation
8K views
•
36 slides
ActionPacked! Networks Hosts Cisco Application Visibility & Control Webinar by
ActionPacked! Networks Hosts Cisco Application Visibility & Control Webinar
ActionPacked Networks
968 views
•
52 slides
Similar to Defending the Data Center: Managing Users from the Edge to the Application
(20)
Accel Partners New Data Workshop 7-14-10 by keirdo1
Accel Partners New Data Workshop 7-14-10
keirdo1
•
242 views
Ixia anue maximum roi from your existing toolsets by responsedatacomms
Ixia anue maximum roi from your existing toolsets
responsedatacomms
•
847 views
Ixia anue maximum roi from your existing toolsets by responsedatacomms
Ixia anue maximum roi from your existing toolsets
responsedatacomms
•
566 views
Guard Era Corp Brochure 2008 by GuardEra Access Solutions, Inc.
Guard Era Corp Brochure 2008
GuardEra Access Solutions, Inc.
•
215 views
Leveraging IMS for VoLTE and RCS Services in LTE Networks Presented by Adnan ... by Radisys Corporation
Leveraging IMS for VoLTE and RCS Services in LTE Networks Presented by Adnan ...
Radisys Corporation
•
8K views
ActionPacked! Networks Hosts Cisco Application Visibility & Control Webinar by ActionPacked Networks
ActionPacked! Networks Hosts Cisco Application Visibility & Control Webinar
ActionPacked Networks
•
968 views
Microsoft Direct Access (Part II)_John Delizo by Quek Lilian
Microsoft Direct Access (Part II)_John Delizo
Quek Lilian
•
1.6K views
ReadyCloud Collaboration, a Cisco Powered service by Gen-i
ReadyCloud Collaboration, a Cisco Powered service
Gen-i
•
633 views
Protect Your Big Data with Intel<sup>®</sup> Xeon<sup>®</sup> Processors a.. by Odinot Stanislas
Protect Your Big Data with Intel<sup>®</sup> Xeon<sup>®</sup> Processors a..
Odinot Stanislas
•
698 views
Express Data - BYOD by Gen-i
Express Data - BYOD
Gen-i
•
504 views
Express Data - BYOD by Gen-i
Express Data - BYOD
Gen-i
•
307 views
Core Network Optimization: The Control Plane, Data Plane & Beyond by Radisys Corporation
Core Network Optimization: The Control Plane, Data Plane & Beyond
Radisys Corporation
•
4.2K views
Развитие технологий SDN для сетей ЦОД by Cisco Russia
Развитие технологий SDN для сетей ЦОД
Cisco Russia
•
588 views
Solving Compliance for Big Data by fbeckett1
Solving Compliance for Big Data
fbeckett1
•
429 views
End-to-End QoS in LTE by Radisys Corporation
End-to-End QoS in LTE
Radisys Corporation
•
17.7K views
Next Gen Data Center Implementing Network Storage with Server Blades, Cluster... by IMEX Research
Next Gen Data Center Implementing Network Storage with Server Blades, Cluster...
IMEX Research
•
1.1K views
Application-Aware Network Performance Management by Riverbed Technology
Application-Aware Network Performance Management
Riverbed Technology
•
4.2K views
CA Nimsoft xen desktop monitoring by CA Nimsoft
CA Nimsoft xen desktop monitoring
CA Nimsoft
•
2.9K views
Technology Disruption Brings New VAS Opportunities by Radisys Corporation
Technology Disruption Brings New VAS Opportunities
Radisys Corporation
•
1.7K views
CCCC NetApp Wallace Fung by Cloud Congress
CCCC NetApp Wallace Fung
Cloud Congress
•
727 views
More from Cisco Security
Incident Response Services Template - Cisco Security by
Incident Response Services Template - Cisco Security
Cisco Security
11.2K views
•
2 slides
3 Tips for Choosing a Next Generation Firewall by
3 Tips for Choosing a Next Generation Firewall
Cisco Security
2.5K views
•
1 slide
AMP Helps Cisco IT Catch 50% More Malware threats by
AMP Helps Cisco IT Catch 50% More Malware threats
Cisco Security
4.9K views
•
1 slide
The Cost of Inactivity: Malware Infographic by
The Cost of Inactivity: Malware Infographic
Cisco Security
1.7K views
•
1 slide
Cisco Addresses the Full Attack Continuum by
Cisco Addresses the Full Attack Continuum
Cisco Security
4.4K views
•
21 slides
Infonetics Network and Content Security Vendor Scorecard by
Infonetics Network and Content Security Vendor Scorecard
Cisco Security
2.2K views
•
12 slides
More from Cisco Security
(15)
Incident Response Services Template - Cisco Security by Cisco Security
Incident Response Services Template - Cisco Security
Cisco Security
•
11.2K views
3 Tips for Choosing a Next Generation Firewall by Cisco Security
3 Tips for Choosing a Next Generation Firewall
Cisco Security
•
2.5K views
AMP Helps Cisco IT Catch 50% More Malware threats by Cisco Security
AMP Helps Cisco IT Catch 50% More Malware threats
Cisco Security
•
4.9K views
The Cost of Inactivity: Malware Infographic by Cisco Security
The Cost of Inactivity: Malware Infographic
Cisco Security
•
1.7K views
Cisco Addresses the Full Attack Continuum by Cisco Security
Cisco Addresses the Full Attack Continuum
Cisco Security
•
4.4K views
Infonetics Network and Content Security Vendor Scorecard by Cisco Security
Infonetics Network and Content Security Vendor Scorecard
Cisco Security
•
2.2K views
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ... by Cisco Security
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Cisco Security
•
7.3K views
The Evolution of and Need for Secure Network Access by Cisco Security
The Evolution of and Need for Secure Network Access
Cisco Security
•
2.6K views
Cisco 2014 Midyear Security Report by Cisco Security
Cisco 2014 Midyear Security Report
Cisco Security
•
2.4K views
String of Paerls Infographic by Cisco Security
String of Paerls Infographic
Cisco Security
•
1.4K views
Midyear Security Report Infographic by Cisco Security
Midyear Security Report Infographic
Cisco Security
•
478 views
Cisco Annual Security Report Infographic by Cisco Security
Cisco Annual Security Report Infographic
Cisco Security
•
602 views
City of Tomorrow Builds in Next-Generation Security by Cisco Security
City of Tomorrow Builds in Next-Generation Security
Cisco Security
•
2.2K views
Laser Pioneer Secures Network End-to-End to Protect Assets by Cisco Security
Laser Pioneer Secures Network End-to-End to Protect Assets
Cisco Security
•
1.1K views
Leveraging Context-Aware Security to Safeguard Patient Data by Cisco Security
Leveraging Context-Aware Security to Safeguard Patient Data
Cisco Security
•
1.1K views
Recently uploaded
GDSC CTU First Meeting Party by
GDSC CTU First Meeting Party
National Yang Ming Chiao Tung University
11 views
•
25 slides
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors by
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
sugiuralab
23 views
•
15 slides
Data Integrity for Banking and Financial Services by
Data Integrity for Banking and Financial Services
Precisely
29 views
•
26 slides
Vertical User Stories by
Vertical User Stories
Moisés Armani Ramírez
17 views
•
16 slides
Ransomware is Knocking your Door_Final.pdf by
Ransomware is Knocking your Door_Final.pdf
Security Bootcamp
66 views
•
46 slides
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive by
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Network Automation Forum
43 views
•
35 slides
Recently uploaded
(20)
GDSC CTU First Meeting Party by National Yang Ming Chiao Tung University
GDSC CTU First Meeting Party
National Yang Ming Chiao Tung University
•
11 views
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors by sugiuralab
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
sugiuralab
•
23 views
Data Integrity for Banking and Financial Services by Precisely
Data Integrity for Banking and Financial Services
Precisely
•
29 views
Vertical User Stories by Moisés Armani Ramírez
Vertical User Stories
Moisés Armani Ramírez
•
17 views
Ransomware is Knocking your Door_Final.pdf by Security Bootcamp
Ransomware is Knocking your Door_Final.pdf
Security Bootcamp
•
66 views
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive by Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Network Automation Forum
•
43 views
PRODUCT PRESENTATION.pptx by angelicacueva6
PRODUCT PRESENTATION.pptx
angelicacueva6
•
18 views
The Research Portal of Catalonia: Growing more (information) & more (services) by CSUC - Consorci de Serveis Universitaris de Catalunya
The Research Portal of Catalonia: Growing more (information) & more (services)
CSUC - Consorci de Serveis Universitaris de Catalunya
•
115 views
Zero to Automated in Under a Year by Network Automation Forum
Zero to Automated in Under a Year
Network Automation Forum
•
22 views
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 by IttrainingIttraining
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
IttrainingIttraining
•
69 views
Case Study Copenhagen Energy and Business Central.pdf by Aitana
Case Study Copenhagen Energy and Business Central.pdf
Aitana
•
17 views
SUPPLIER SOURCING.pptx by angelicacueva6
SUPPLIER SOURCING.pptx
angelicacueva6
•
20 views
"Surviving highload with Node.js", Andrii Shumada by Fwdays
"Surviving highload with Node.js", Andrii Shumada
Fwdays
•
33 views
SAP Automation Using Bar Code and FIORI.pdf by Virendra Rai, PMP
SAP Automation Using Bar Code and FIORI.pdf
Virendra Rai, PMP
•
25 views
Kyo - Functional Scala 2023.pdf by Flavio W. Brasil
Kyo - Functional Scala 2023.pdf
Flavio W. Brasil
•
418 views
Uni Systems for Power Platform.pptx by Uni Systems S.M.S.A.
Uni Systems for Power Platform.pptx
Uni Systems S.M.S.A.
•
58 views
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ... by Jasper Oosterveld
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
Jasper Oosterveld
•
27 views
Business Analyst Series 2023 - Week 3 Session 5 by DianaGray10
Business Analyst Series 2023 - Week 3 Session 5
DianaGray10
•
345 views
Igniting Next Level Productivity with AI-Infused Data Integration Workflows by Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software
•
317 views
MVP and prioritization.pdf by rahuldharwal141
MVP and prioritization.pdf
rahuldharwal141
•
37 views
Defending the Data Center: Managing Users from the Edge to the Application
1.
MANAGING USERS FROM
THE EDGE TO THE APPLICATION Russell Rice Senior Director Product Management Dec 5, 2012 © 2012 Cisco and/or its affiliates. All rights reserved. 1
2.
7.7
Billion In next 5 Years Accessing Application and Data Wi-Fi devices © 2012 Cisco and/or its affiliates. All rights reserved. 2
3.
• How do
I classify so many devices coming onto my network every hour? • Do we have any visibility on those devices connecting to our application & data in DC? • Virtual Machine Sprawl! How should I manage security for all of those VMs we are being asked to provision everyday? • My critical services are still running on physical servers. Do I maintain separate policies? © 2012 Cisco and/or its affiliates. All rights reserved. 3
4.
Simplifying network security
and engineering • Secure Embeds security within the infrastructure Enforcement based on rich contextual identify of users and systems Solution simplicity enables end-to-end approach • Efficient Simplifies implementation of security policy Highly scalable & Inline rate Simplifies Data Center network design • Demonstrable ROI Reduces ACL and VLAN complexity & maintenance Can automate Firewall policy administration Can improve both performance & availability © 2012 Cisco and/or its affiliates. All rights reserved. 4
5.
Translating Business Policy
to the Network TrustSec lets you define policy Context Classification in meaningful business terms Business Policy TAG Security Group Tag Destination HR Database Prod HRMS Storage Source Exec BYOD X X X Distributed Enforcement throughout Network Exec PC X X Prod HRMS X Switch Router DC FW DC Switch HR Database © 2012 Cisco and/or its affiliates. All rights reserved. 5
6.
Device Type: Apple
iPAD Classification Result: User: Mary Group: Employee Personal Asset SGT Corporate Asset: No ISE Profiling Along with authentication, various data is sent to ISE for device profiling ISE (Identity Services Engine) SGT Profiling Data ID & Security Group Policy DC Resource Company asset NetFlow DCHP Access DNS HTTP OUI RADIUS NMAP SNMP AP Wireless LAN Controller Restricted Employee Internet Only Personal asset Distributed Enforcement based on Security Group © 2012 Cisco and/or its affiliates. All rights reserved. 6
7.
Classification
ISE Directory Fin Servers SGT = 4 Users, Device Enforcement SGT:5 HR Servers SGT = 10 Switch Router DC FW DC Switch SGT Propagation TrustSec SGA is a context-based firewall or access control solution: • Classification of systems/users based on context (user role, device, location, access method) • The context-based classification propagates using SGT • SGT used by firewalls, routers and switches to make intelligent forwarding or blocking decisions in the DC © 2012 Cisco and/or its affiliates. All rights reserved. 7
8.
Data Center
Core Layer Stateful Firewalling Initial filter for all ingress and egress DC Aggregation Layer Stateful Firewalling Additional Firewall Services for server DC Service farm specific protection Layer DC Access Layer Server Segmentation IP-Based Access Control Lists VLANs, Private VLANs Virtual Access Physical Servers Virtual Servers © 2012 Cisco and/or its affiliates. All rights reserved. 8
9.
NY
10.2.34.0/24 10.2.35.0/24 10.2.36.0/24 NY 10.3.102.0/24 DC-MTV (SRV1) VPN 10.3.152.0/24 DC-MTV (SAP1) UK 10.4.111.0/24 DC-RTP (SCM2) …. SJC DC-RTP (ESXix) Traditional ACL or Source Destination FW Rules permit NY to SRV1 for HTTPS deny NY to SAP2 for SQL deny NY to SCM2 forGlobal bank dedicates 24 global resources A SSH permit VPN to SRV1 for HTTPS deny VPN to SAP1 for SQL to manage for 3 source objects & 3 destination objects ACL Firewall rules currently deny VPN to SCM2 for SSH permit UK to SRV1 for HTTPS deny UK to SAP1 for SQL deny Permit UK SJC Complex Task and High OPEX Continues to to SAP for SSH SRV1 for HTTPS deny SJC to SAP1 for SQL Adding source Object deny SJC to SCM2 permit NY to ESXis for RDP deny VPN to ESXis for RDP Adding destination Object deny UK to ESXis for RDP deny SJC to ESXis for RDP © 2012 Cisco and/or its affiliates. All rights reserved. 9
10.
NY
DC-MTV (SRV1) VPN DC-MTV (SAP1) UK DC-RTP (SCM2) CA DC-RTP (ESXix) Security Group Filtering Source SGT: Destination SGT: Employee (10) Production Server (50) permit from Employee / Server regardless of topology Policy stays with User to Production Server eq HTTPS deny Simpler Auditing Processto Lower OperationalServer eq SQL from Employee Production Cost deny from Employee to Production Server eq SSH Simpler Security Operation Resource Optimization (e.g. Global bank estimates 6 global resources with SGFW/SGACL) Clear ROI in OPEX © 2012 Cisco and/or its affiliates. All rights reserved. 10
11.
Legacy
Emerging Accidental Architectures Data Center and Server Consolidation Applications deployed in fixed Server Virtualization positions (ex. multi-tier deployment) “Any workload on any server” Predictable traffic flows Unpredictable traffic flows as Security often deployed workloads migrate to each pod or silo © 2012 Cisco and/or its affiliates. All rights reserved. 11
12.
Physical and Virtual
Servers SegmentedVLAN? VLAN App using Policy Stays with VLAN or IP address, Not with Servers Which Policy? Web Servers Network Ops, Server Ops, and Security Ops are App Servers Database Web Server VLAN App VLAN involved in Operation Cluster Database VLAN DR As the number of server grows… Complexity and OPEX follow © 2012 Cisco and/or its affiliates. All rights reserved. 12
13.
Web Server SGT
(10) Application Server SGT (20) Database Server SGT (30) Server, Network, and Security Team share common security object Policy Stays with Servers, Not based on Topology Web Web App App DB DB Works for both Physical and Virtual Servers Production Server VLAN DR Cluster permit tcp from src Web to dst App eq HTTPS permit tcp from src App to dst DB eq SQL deny any from src Web to dst grows… As the number of serversDB eq SQL Management complexity and OPEX do not © 2012 Cisco and/or its affiliates. All rights reserved. 13
14.
• Supports VXI
use case SGACL enabled Device with Nexus 1000v SG Firewall enabled Device VDI Connection • Common classification Broker and enforcement for Physical Servers physical & virtual Campus Network environment VDI Endpoint • Simpler security management for Nexus 1000v Virtual Servers frequent VM Virtual Access Hosted Virtual provisioning Desktop (HVD) • SGT assigned to vEthernet port UCS © 2012 Cisco and/or its affiliates. All rights reserved. 14
15.
Data Center
Core Layer Security Group Firewalling Firewall rule automation using Security Group (ASA) DC Aggregation Layer Security Group Firewalling Firewall rule automation DC Service using Security Group (ASA) Layer DC Access Layer Security Group ACLs • Segmentation defined in a simple policy table or matrix Virtual Access • Applied across Nexus 7000/5500/2000 independent of the topology Physical Servers Virtual Servers SGACL enabled Device SG Firewall enabled Device © 2012 Cisco and/or its affiliates. All rights reserved. 15
16.
DEPLOYMENT USE CASES
Healthcare: Ensure Privacy of Patient Data by Enforcing Roles Based Access and Segmentation Across the Network Retail: Intra Store Communication for Networked Devices While Ensuring . That Only Authorized Users and Devices Have Access to PCI Data Technology: Allowing Approved Employee-Owned Tablets Access to Internal Portals and Corporate App Store Manufacturing: Marking Extranet Traffic to Allow PLC Vendor Remote Access to Specific Manufacturing Zone Only, and Offshore Development Partners Access to Development Servers Only © 2012 Cisco and/or its affiliates. All rights reserved. 16
17.
Classification
Policy Management Catalyst 2K Catalyst 4K WLC (7.2) Nexus 7000 Nexus 1000v Catalyst 3K Catalyst 6K Nexus 5000 (Q4CY12) Identity Services Engine Enforcement N7K / N5K Cat6K Cat3K-X ASA (SGFW) ASR1K/ISRG2 WLAN LAN Remote (SGACL) (SGACL) (SGACL) (SGFW) Access (roadmap) Transport Cat 2K-S (SXP) N7K (SXP/SGT) ASR1K (SXP/SGT) Cat 3K (SXP) N5K (SGT) ISR G2 (SXP) AnyConnect Cat 3K-X (SXP/SGT) N1Kv (SXP) - Q4CY12 ASA (SXP) (Attribute provider) Cat 4K (SXP) Cat 6K Sup2T (SXP/SGT) © 2012 Cisco and/or its affiliates. All rights reserved. 17
18.
Secure
Efficient Demonstrable ROI Embed security within Simplifies implementation Reduces ACL and VLAN the infra of security policy complexity & maintenance Enforcement based on Highly scalable Automates FW policy rich context & Inline rate Improve both performance Solution simplicity Simplifies Data Center & availability enables end-to-end network design approach © 2012 Cisco and/or its affiliates. All rights reserved. 18
19.
Thank you. © 2012
Cisco and/or its affiliates. All rights reserved. 19