From Physical to Virtual to Cloud

Cisco Security
Cisco SecurityFounding Partner at Cisco Security
Mike Nielsen
Senior Director Security
February 7, 2012




© 2012 Cisco and/or its affiliates. All rights reserved.   1
Cisco Data Center Technology
                                                           Physical Deployment Use Cases
                                                           Virtual and Cloud Deployment Use Cases




© 2012 Cisco and/or its affiliates. All rights reserved.                                      2
NEARLY                                    MORE THAN



                2000% 50%
                 increase in application traffic           of business-critical applications
                 and network connections per               will be virtualized by 2013
                 second required for inspection
                 by 2015


             Rapidly losing visibility of business-critical traffic

© 2012 Cisco and/or its affiliates. All rights reserved.                                       3
1. vMotion moves VMs across
                                                                               physical ports—the network
                                                                               policy must follow vMotion
                                                                               (across racks, PODS, DCs)

                                                                            2. Must view or apply
                                                                               network/security policy to
                               Port                                            locally switched traffic
                              Group


                                                                            3. Need to maintain segregation
                                                                               of duties while ensuring
      Security                                                                 non-disruptive operations
      Admin
                                                             Server Admin

                                                           Network Admin




© 2012 Cisco and/or its affiliates. All rights reserved.                                                      4
PHYSICAL                                     VIRTUAL                            CLOUD
                                     WORKLOAD                                    WORKLOAD                           WORKLOAD

                        • One app per server                               • Many apps per server          • Multi-tenant per server
                        • Static                                           • Mobile                        • Elastic
                        • Manual provisioning                              • Dynamic provisioning          • Automated scaling




                                                                              HYPERVISOR
                                                                                                                 VDC-1          VDC-2

                                                             CONSISTENCY: Policy, Features, Security, Management

Switching                    Nexus 7K/5K/3K/2K                                             Nexus 1000V, VM-FEX


 Security                 ASA 5585, ASA SM, IPS                                               VSG, ASA 1000V


Compute                         UCS for Bare Metal                                       UCS for Virtualized Workloads

                                                                                                     * Virtual only, ** Announced
  © 2012 Cisco and/or its affiliates. All rights reserved.                                                                              5
Security needs to scale to the transaction
                      SCALABLE
                                                           or throughput requirements of today’s
                      SECURITY
                                                           applications


                    PHYSICAL &                             Security must provide consistent policy
                     VIRTUAL                               enforcement across hybrid environments


                                                           Security deployments must enable
                        BUSINESS                           business agility through the unification of
                        CONTEXT                            business and technology policies



© 2012 Cisco and/or its affiliates. All rights reserved.                                                 6
Segment resources                                     Ensure maximum
     logically and                                         CPU utilization
     physically by tenant                                  and VM mobility
     or risk class




© 2012 Cisco and/or its affiliates. All rights reserved.                     7
Firewall Segmentation                                                 Fabric Segmentation
                             Stateful/reflective ACL                  UCS Fabric Interconnect
                                       Multi-context
                                                 VPN




                                                           TrustSec

                            Context-Aware
                             Segmentation                             Network Segmentation
       Security Group Tags (SGT)                                      Physical
Security Exchange Protocol (SXP)                                      Virtual (VLAN, VRF)
              Security Group ACL                                      Virtualized (Zones)




© 2012 Cisco and/or its affiliates. All rights reserved.                                        8
© 2012 Cisco and/or its affiliates. All rights reserved.   9
ASA Firewall at Data Center Speeds                                                               ASA 5585-SSP60
                                                                                                 80
                                                                                                 40 Gbps Firewall
                                                                                                 20 MM Connections
                                                                                                 10
                                                                                                 700,000
                                                                                                 350,000 CPS

                                                                              ASA 5585-SSP40

                                                                              40
                                                                              20 Gbps Firewall
                                                           ASA 5585-SSP20     8
                                                                              4 MM Connections
                                                           20
                                                           10 Gbps Firewall   400,000 CPS
                                                                              Connections
                                                           4 MM
                                                           2                  200,000 CPS
          ASA 5585-SSP10                                   Connections
          8
          4 Gbps Firewall                                  250,000
                                                           125,000 CPS
          2
          1 MM
                                                                                                    ASA Services
          Connections                                                                                  Module
          100,000 CPS
          50,000 CPS                                                                             80
                                                                                                 20 Gbps Firewall
                                                                                                 40
                                                                                                 10 MM Connections
                                                                                                 1.2 MM CPS
                                                                                                 300,000CPS

                                                       Campus                             Data Center

© 2012 Cisco and/or its affiliates. All rights reserved.                                                             10
Assured Protection for High-performance Data Centers


                                                                                Next-generation firewall at

                                                           700%
                                                           Higher Performance
                                                                                data center speeds
                                                                                 • Clusters managed as a
                                                                                    single logical device
                                                           Density               • 320 Gbps firewall & 80
                                                                                    Gbps IPS throughput
                                                                                 • 1 million connections per
                                                           84%
                                                           Less Power
                                                                                    second
                                                                                 • 50 million concurrent
                                                                                    sessions
                                                           Consumption           • Pay as you grow
                                                                                Integrated identity, content

                                                           87%
                                                           Percent Less
                                                                                and application security
                                                                                Fully IPv6 compliant for
                                                                                coming wave of mobile
                                                           Rack Space           application access

© 2012 Cisco and/or its affiliates. All rights reserved.                                                       11
Assured Protection for High-performance Data Centers




                                                           400%
                                                                                Highest IPS performance
                                                                                density
                                                                                • 10 Gbps IPS throughput
                                                           Higher Performance
                                                           Density              • 100,000 connections per
                                                                                  second

                                                           75%
                                                           Less Power
                                                                                • Expandable 2RU chassis

                                                                                Context-aware attacker,
                                                           Consumption          victim,
                                                                                and attack visibility

                                                           50%
                                                           Less Rack Space
                                                                                Backed by Cisco Security
                                                                                Intelligence Operation (SIO)
                                                                                for the highest level of attack
                                                                                identification and mitigation
© 2012 Cisco and/or its affiliates. All rights reserved.                                                     12
Cisco® ASA 5585-X v9.0 with Clustering Capability*
 • Two to eight ASAs supported per cluster (same
        model and DRAM)
 •      Both routed (L3) and transparent (L2) firewall
        modes supported
 •      Cluster performance = 60-70 percent of
        combined throughput and connections (traffic-
        dependent)                                                              ASA CLUSTERING AT CONTROL
                                                                                          PLANE
 •      One master syncs configuration to all members
 •      Minimum one cluster control interface for the
        cluster control plane
 •      Site-to-site VPN support

     Not supported in cluster mode: SSL/IPSEC RA VPN, VPN LB, Botnet Traffic
     Filter, DHCP capabilities, WCCP, Unified Communications features, ASA-CX
     SSP, specific applications inspection.

     * Clustering is supported on ASA 5585, 5580 and ASA SM
                                                                                 ASA Clustering at Data Plane
© 2012 Cisco and/or its affiliates. All rights reserved.                                                        13
Cisco Catalyst 6500 as Services Switch
                        ®




• ASA SM for Catalyst 6500

• Etherchannel Integration with
       Cisco Nexus 7K/vPC                           ®




• 6500 supports Link Aggregation
       Control Protocol (LACP), IEEE
       802.3ad standard
• Traffic forwarded using service-
       specific VLANs
• Each port-channel supports up
       to eight active and eight standby
       links


© 2012 Cisco and/or its affiliates. All rights reserved.   14
System Dashboard




© 2012 Cisco and/or its affiliates. All rights reserved.   15
Integrated Identity Security
                                                           Context                  AAA
                                                           Directory           Infrastructure
                                                            Agent



                             Mark




                                                                                                Data Center and Cloud
                AnyConnect

                                                                              IDFW                                      DMZ
                             John
                                                                 ASA Identity Firewall




© 2012 Cisco and/or its affiliates. All rights reserved.                                                                      16
AD/LDAP Identity
                                                                                       • Non-auth-aware apps
                                 NTLM                                                  • Any platform
                                Kerberos                                               • AD/LDAP credential
                                                              TRUSTSEC
                                                              Network Identity
                                                           Secure Group Tags on ASA
            User Authentication                                                       IP Surrogate
            • Auth-Aware Apps                                                           AD Agent
            • Mac, Windows, Linux
            • AD/LDAP user credential




© 2012 Cisco and/or its affiliates. All rights reserved.                                                       17
TrustSec lets you define policy in                                        Context Classification
                  meaningful business terms
                                                           Business Policy


                                                                                        TAG   Security Group Tag


            Destination                 HR Database            Prod CRM      Storage
          Source

     VD HR Users                                                 X              X        Distributed Enforcement in DC

     VPN HR User                                  X              X              X
          IT Ops
                                                                                              ASA        DC Switch
      Test Server                         Test-ACL               X
                                                                                       Filtering Physical and Virtual
                                                                                           Servers in Data Center

© 2012 Cisco and/or its affiliates. All rights reserved.                                                                 18
Integrated Identity Security




                                                SGT (6)    mktg-servers
                                                SGT (9)    HR-servers                  ISE


                                                                          SGT=06      Packet




                                                                          SGT=09      Packet




                                                                             Security Xchange Protocol




© 2012 Cisco and/or its affiliates. All rights reserved.                                                 19
• Users assigned with a
       security group tag
• Contextual access control is
       now possible
• Cisco Nexus® 7000 enforces
       group policy at the DC edge
• Cisco® ASA 5585-X v9.0
       support SXP security group
       tags in policy
• Example usage: access to
       VDI service in DC




© 2012 Cisco and/or its affiliates. All rights reserved.   20
Delivers protections months ahead of the threat



0010 010 10010111001 10 100111 010 000100101 110011 01100111010000110000111000111010011101 1100001110001110             1001 1101 1110011 0110011 101000
0010 010 10010111001 10 100111 010 000100101 110011 01100111010000110000111000111010011101 1100001110001110             1001 1101 1110011 0110011 101000
                                                                                          Cisco SIO
                                                                WWW


                Email                    Devices                Web                                             CWS         IPS      AnyConnect

                                                                          Zero-day detection                                               WWW




                                                                                                      Actions
                                                                            Information
                  IPS                  Networks               Endpoints                                          ESA        ASA          WSA
                                                                          Reputation-based
                                    Visibility                               protection                                  Control
                             1.6M global sensors                                                                    3 to 5 minute updates
                     75TB data received per day                               Consistent                        5,500+ IPS signatures produced
                     150M+ deployed endpoints                                                                          8M+ rules per day
                                                                             enforcement
                     35% worldwide email traffic                                                                   200+ parameters tracked
                               13B web requests                                                                   70+ publications produced


   © 2012 Cisco and/or its affiliates. All rights reserved.                                                                                       21
Proving SIO - Global Correlation White Paper
                 http://www.cisco.com/en/US/products/ps12156/prod_white_papers_list.html




         Figure 4. Sensor at Industrial Supplies Distributor (IND-2)                        Figure 2. Sensor at Bank (BNK-1)




© 2012 Cisco and/or its affiliates. All rights reserved.               Cisco Confidential
© 2012 Cisco and/or its affiliates. All rights reserved.   23
Unified Firewall Policies in Virtual and Cloud Environments


                                                           Unmatched Deployment   Consistent Policies
                                                           Flexibility            • Common ASA configuration
                                                                                    for physical, virtual and
                                                                                    cloud deployments
                                                           Lowest Operational     VM Firewall Scalability
                                                           Complexity             • Single Instance secures up
                                                                                    to 64 ESX hosts
                                                                                  • Limitless VMs for SP and
                                                                                    Enterprise
                                                           Enhanced Network
                                                           Scalability            Unified Fabric Security
                                                                                  • Integrates with the Nexus
                                                                                    1000V Series switch
                                                                                  • Complements zone-based
                                                                                    security capabilities of the
                                                                                    Cisco Virtual Security
                                                                                    Gateway)


© 2012 Cisco and/or its affiliates. All rights reserved.                                                           24
Features and Capabilities


Built using Cisco ASA                                      IPsec VPN (site to site)
infrastructure
                                                           NAT

Interoperability with Cisco VSG                            DHCP
through service chaining

                                                           Default gateway

VXLAN gateway                                              Static routing

                                                           Stateful inspection
Multi-tenant management
Through Cisco VNMC                                         IP audit


© 2012 Cisco and/or its affiliates. All rights reserved.                              25
Zone 1                                      Zone 2
• The zones used define policy
       enforcement
• Unique policies and traffic
       decisions applied to each zone
• Physical infrastructure mapped                                             Steer VM traffic to
                                                                               virtual context
       per zone:
             • VRF
             • Virtual context

• Merging physical and virtual                                  vPath
                                                            Virtual Switch    Segment pools of
                                                                                                       vPath
                                                                                                   Virtual Switch
       infrastructure                                          vSphere       blade resources per
                                                                                                      vSphere
                                                                                     zone




© 2012 Cisco and/or its affiliates. All rights reserved.                                                            26
VSG


                                                                                            Zone-based intratenant
                                                                      Cisco Nexus 1000V
                                                                                  ®         segmentation of VMs

                                                                                          Cisco ASA 1000V
                                                                                                 ®




                            Virtual Service Nodes
                                             vPATH
                                       Nexus 1000V


                                        Hypervisor
                                                                                            Ingress/egress multitenant
                                                                                            edge deployment
                                                           vCenter         Nexus 1 KV     VNMC




                                                             Server           Network       Security
                                                             Admin             Admin         Admin
© 2012 Cisco and/or its affiliates. All rights reserved.                                                                 27
Virtual Security Gateway: Zone Firewall for
Cisco Nexus® 1000V

• Control inter-VM traffic to address new blind
       spot
• Support dynamic VM provisioning
                                                           VM-to-VM traffic   VM-to-VM traffic
• Transparent VM mobility enforcement

• Policy based VLAN-agnostic operation

• Administrative separation of duties;
                                                           App       App      App        App
       server, network, and security`
                                                           OS        OS       OS         OS




© 2012 Cisco and/or its affiliates. All rights reserved.                                         28
SECURING VM-VM TRAFFIC

                                                           Aggregation
                                                                         ERSPAN DST
              IDS                                                ID:2
  Virtual Sensor 1


                  IDS                                            ID:1
      Virtual Sensor 2

                                                                                      Zone B               Zone C
        monitor session 1 type erspan-source                                          VDC                   VDC
        description N1k ERSPAN – session 1                                                                    vApp
        monitor session 3 type erspan-destination
        description N1k ERSPAN to IDS Virtual
        Sensor 1                                                                               VSG
                                                                                                                     VSG
                                                                                                              vApp




        monitor session 2 type erspan-source
        description N1k ERSPAN –session 2
        monitor session 4 type erspan-destination
        description N1k ERSPAN to IDS Virtual
        Sensor 2                                                                                vPath
                                                                                                     Cisco® Nexus 1000V

© 2012 Cisco and/or its affiliates. All rights reserved.
                                                                                               vSphere               29
Tenant A                      Tenant A’ (clone)

                                         VM 1              VM 2       VM 1            VM 1    VM 2      VM 1


                                         VM 3                         VM 1             VM 3             VM 1



                                   ASA 1000V                                                         ASA 1000V
                                                                        Virtualized Servers

                                                                                                        External Network

•        Multizone tenant cloning while keeping overlapping IP addresses
•        Isolate overlap IPs with dynamic Network Address Translation (NAT)
         while connected to the external network


© 2012 Cisco and/or its affiliates. All rights reserved.                                                                   30
Proven Cisco Security…Virtualized                                                vCenter

 • Physical – virtual consistency                             Virtual Network Management Center (VNMC)

                                                                                            Tenant B
Collaborative Security Model                                    Tenant A
                                                                                      VDC                 VDC

 • VSG for intra-tenant secure zones                                                                         vApp


 • ASA 1000V for tenant edge controls
                                                                           VSG               VSG                VSG
                                                                                                            vApp
Seamless Integration
• With Nexus 1000V & vPath                                                                                      VSG

                                                               ASA 1000V                    ASA 1000V
Scales with Cloud Demand
                                                                                  vPath
 • Multi-instance deployment for                                                                        Nexus 1000V
      horizontal scale-out deployment                      Hypervisor




© 2012 Cisco and/or its affiliates. All rights reserved.                                                              31
Tenant A                           Tenant B

                                         VM 1              VM 2       VM 1             VM 1    VM 2      VM 1


                                         VM 3                         VM 1             VM 3              VM 1



                                   ASA 1000V                                                          ASA 1000V
                                                                        Virtualized Servers




•        VMs are quickly brought up and down in virtual environments
•        ASA 1000V DHCP capability used to assigns dynamic IPs to new VMs




© 2012 Cisco and/or its affiliates. All rights reserved.                                                          32
Physical Data Center
                                                           DC Security Cisco
                                                           Validated Designs




                                                           Virtual Data Center
                                                           Virtualized Multiservice
                                                           Data Center (VMDC)




© 2012 Cisco and/or its affiliates. All rights reserved.                              33
End-to-End Security for Hybrid Infrastructure


      Physical                                                                                            Virtual and Cloud
             Physical Appliances and Modules
                                                                                   Cloud Firewall
             Cisco Multi-Scale™ data center-class
                                                                                   Enhanced cloud security
             Cisco® ASA devices




                    Cisco ASA                              Cisco Catalyst® 6500        Cisco VSG        Cisco ASA 1000V
                     5585-X                                Series ASA Services                           Cloud Firewall
                                                                 Module
           • Scalable in-line performance                                         • Proven firewall to secure your cloud
           • Data center-edge security policies                                   • Policies specific to the tenant edge to
                                                                                    the virtual machine
           • Flexible deployment options                                          • Automated, policy-based provisioning

© 2012 Cisco and/or its affiliates. All rights reserved.                                                                      34
• Always-on, security that is
                                                                     integrated into the network fabric
                                                                   • End-to-end security solutions for
                   Physical                                          physical and virtual environments
                                                                   • Context-aware security to
                                                           Cloud     differentiate risk from random
                                                                   • Services to enable pervasive
                                                                     security across the infrastructure,
                                                                     within, and between clouds
                                      Virtual




© 2012 Cisco and/or its affiliates. All rights reserved.                                                   35
Thank you.




© 2012 Cisco and/or its affiliates. All rights reserved.   36
1 of 36

Recommended

Defending the Data Center: Managing Users from the Edge to the Application by
Defending the Data Center:  Managing Users from the Edge to the ApplicationDefending the Data Center:  Managing Users from the Edge to the Application
Defending the Data Center: Managing Users from the Edge to the ApplicationCisco Security
1.1K views19 slides
Data Center Security Now and into the Future by
Data Center Security Now and into the FutureData Center Security Now and into the Future
Data Center Security Now and into the FutureCisco Security
2.4K views18 slides
How SASE can help you move securely from the PSN with VMware and Breeze Networks by
How SASE can help you move securely from the PSN with VMware and Breeze NetworksHow SASE can help you move securely from the PSN with VMware and Breeze Networks
How SASE can help you move securely from the PSN with VMware and Breeze NetworksArticulate Marketing
663 views31 slides
Security as a Service Model for Cloud Environment by
Security as   a Service Model   for   Cloud   EnvironmentSecurity as   a Service Model   for   Cloud   Environment
Security as a Service Model for Cloud EnvironmentKaashivInfoTech Company
947 views6 slides
Security and Virtualization in the Data Center by
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data CenterCisco Canada
12.5K views66 slides
Monetizing the Enterprise: Borderless Networks by
Monetizing the Enterprise: Borderless NetworksMonetizing the Enterprise: Borderless Networks
Monetizing the Enterprise: Borderless NetworksCisco Service Provider Mobility
267 views8 slides

More Related Content

What's hot

Cisco Meraki Overview by
Cisco Meraki OverviewCisco Meraki Overview
Cisco Meraki OverviewSSISG
907 views30 slides
Cisco Meraki Portfolio Guide by
Cisco Meraki Portfolio GuideCisco Meraki Portfolio Guide
Cisco Meraki Portfolio GuideMaticmind
7K views49 slides
CCSK, cloud security framework, Indonesia by
CCSK, cloud security framework, IndonesiaCCSK, cloud security framework, Indonesia
CCSK, cloud security framework, IndonesiaWise Pacific Venture
2.9K views41 slides
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa... by
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...F5 Networks
1.1K views8 slides
Vfm palo alto next generation firewall by
Vfm palo alto next generation firewallVfm palo alto next generation firewall
Vfm palo alto next generation firewallvfmindia
1.8K views16 slides
Safe Net: Cloud Security Solutions by
Safe Net: Cloud Security SolutionsSafe Net: Cloud Security Solutions
Safe Net: Cloud Security SolutionsASBIS SK
1.2K views22 slides

What's hot(20)

Cisco Meraki Overview by SSISG
Cisco Meraki OverviewCisco Meraki Overview
Cisco Meraki Overview
SSISG907 views
Cisco Meraki Portfolio Guide by Maticmind
Cisco Meraki Portfolio GuideCisco Meraki Portfolio Guide
Cisco Meraki Portfolio Guide
Maticmind7K views
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa... by F5 Networks
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks1.1K views
Vfm palo alto next generation firewall by vfmindia
Vfm palo alto next generation firewallVfm palo alto next generation firewall
Vfm palo alto next generation firewall
vfmindia1.8K views
Safe Net: Cloud Security Solutions by ASBIS SK
Safe Net: Cloud Security SolutionsSafe Net: Cloud Security Solutions
Safe Net: Cloud Security Solutions
ASBIS SK1.2K views
Where to Store the Cloud Encryption Keys - InterOp 2012 by Trend Micro
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012
Trend Micro1.2K views
IT Guide for Mobility: Making the case for Security leaders by Cisco Mobility
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leaders
Cisco Mobility894 views
The F5 DDoS Protection Reference Architecture (Technical White Paper) by F5 Networks
The F5 DDoS Protection Reference Architecture (Technical White Paper)The F5 DDoS Protection Reference Architecture (Technical White Paper)
The F5 DDoS Protection Reference Architecture (Technical White Paper)
F5 Networks2.6K views
Palo Alto Networks Portfolio & Strategy Overview 2019 by Sean Xie
Palo Alto Networks Portfolio & Strategy Overview 2019Palo Alto Networks Portfolio & Strategy Overview 2019
Palo Alto Networks Portfolio & Strategy Overview 2019
Sean Xie1.2K views
BIG-IP Data Center Firewall Solution by F5 Networks
BIG-IP Data Center Firewall SolutionBIG-IP Data Center Firewall Solution
BIG-IP Data Center Firewall Solution
F5 Networks3.5K views
Trend micro v2 by JD Sherry
Trend micro v2Trend micro v2
Trend micro v2
JD Sherry2.7K views
Meraki Cloud Wireless Lan by ChikPea
Meraki Cloud Wireless LanMeraki Cloud Wireless Lan
Meraki Cloud Wireless Lan
ChikPea1.1K views
Navigating the Zero Trust Journey for Today's Everywhere Workplace by Ivanti
Navigating the Zero Trust Journey for Today's Everywhere WorkplaceNavigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere Workplace
Ivanti342 views
Trend micro deep security by Trend Micro
Trend micro deep securityTrend micro deep security
Trend micro deep security
Trend Micro3.7K views
Using Security to Build with Confidence in AWS - Trend Micro by Amazon Web Services
Using Security to Build with Confidence in AWS - Trend Micro Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro
Amazon Web Services1.6K views
Cisco Meraki: Let Simple Work For You by Cisco Canada
Cisco Meraki: Let Simple Work For YouCisco Meraki: Let Simple Work For You
Cisco Meraki: Let Simple Work For You
Cisco Canada203 views
[Cisco Connect 2018 - Vietnam] Rajinder singh cisco sd-wan-next generation ... by Nur Shiqim Chok
[Cisco Connect 2018 - Vietnam] Rajinder singh   cisco sd-wan-next generation ...[Cisco Connect 2018 - Vietnam] Rajinder singh   cisco sd-wan-next generation ...
[Cisco Connect 2018 - Vietnam] Rajinder singh cisco sd-wan-next generation ...
Nur Shiqim Chok81 views

Viewers also liked

2013 Cisco Annual Security Report by
2013 Cisco Annual Security Report2013 Cisco Annual Security Report
2013 Cisco Annual Security ReportCisco Security
2.3K views24 slides
Enterprise Strategy Group: Security Survey by
Enterprise Strategy Group: Security SurveyEnterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security SurveyCisco Security
3.1K views5 slides
Cisco 2015 Midyear Security Report Slide Deck by
Cisco 2015 Midyear Security Report Slide DeckCisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco Security
4.4K views28 slides
Infographic: Security for Mobile Service Providers by
Infographic: Security for Mobile Service ProvidersInfographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service ProvidersCisco Security
4.6K views1 slide
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur... by
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Cisco Security
4.2K views36 slides
Cisco ISE Reduces the Attack Surface by Controlling Access by
Cisco ISE Reduces the Attack Surface by Controlling AccessCisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling AccessCisco Security
4.4K views1 slide

Viewers also liked(18)

2013 Cisco Annual Security Report by Cisco Security
2013 Cisco Annual Security Report2013 Cisco Annual Security Report
2013 Cisco Annual Security Report
Cisco Security2.3K views
Enterprise Strategy Group: Security Survey by Cisco Security
Enterprise Strategy Group: Security SurveyEnterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security Survey
Cisco Security3.1K views
Cisco 2015 Midyear Security Report Slide Deck by Cisco Security
Cisco 2015 Midyear Security Report Slide DeckCisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide Deck
Cisco Security4.4K views
Infographic: Security for Mobile Service Providers by Cisco Security
Infographic: Security for Mobile Service ProvidersInfographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service Providers
Cisco Security4.6K views
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur... by Cisco Security
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Cisco Security4.2K views
Cisco ISE Reduces the Attack Surface by Controlling Access by Cisco Security
Cisco ISE Reduces the Attack Surface by Controlling AccessCisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling Access
Cisco Security4.4K views
Cisco Web and Email Security Overview by Cisco Security
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
Cisco Security26.5K views
McAllen Intermediate School District by Cisco Security
McAllen Intermediate School DistrictMcAllen Intermediate School District
McAllen Intermediate School District
Cisco Security1.3K views
Midsize Business Solutions: Cybersecurity by Cisco Security
Midsize Business Solutions: CybersecurityMidsize Business Solutions: Cybersecurity
Midsize Business Solutions: Cybersecurity
Cisco Security3.4K views
Integrated Network Security Strategies by Cisco Security
Integrated Network Security StrategiesIntegrated Network Security Strategies
Integrated Network Security Strategies
Cisco Security3.5K views
Balance Data Center Security and Performance by Cisco Security
Balance Data Center Security and PerformanceBalance Data Center Security and Performance
Balance Data Center Security and Performance
Cisco Security2.5K views
Data Center Security Challenges by Cisco Security
Data Center Security ChallengesData Center Security Challenges
Data Center Security Challenges
Cisco Security8.5K views
A Reality Check on the State of Cybersecurity by Cisco Security
A Reality Check on the State of CybersecurityA Reality Check on the State of Cybersecurity
A Reality Check on the State of Cybersecurity
Cisco Security3.1K views
Pervasive Security Across Your Extended Network by Cisco Security
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended Network
Cisco Security6.4K views
Malware and the Cost of Inactivity by Cisco Security
Malware and the Cost of InactivityMalware and the Cost of Inactivity
Malware and the Cost of Inactivity
Cisco Security8.8K views
Automotive Virtual Sensors - Motorsport Applications by Enrico Busto
Automotive Virtual Sensors - Motorsport ApplicationsAutomotive Virtual Sensors - Motorsport Applications
Automotive Virtual Sensors - Motorsport Applications
Enrico Busto892 views

Similar to From Physical to Virtual to Cloud

Cisco tec rob soderbery - core enterprise networking by
Cisco tec   rob soderbery - core enterprise networkingCisco tec   rob soderbery - core enterprise networking
Cisco tec rob soderbery - core enterprise networkingCisco Public Relations
805 views16 slides
Cisco Dec 6 Toronto VMUG by
Cisco Dec 6 Toronto VMUGCisco Dec 6 Toronto VMUG
Cisco Dec 6 Toronto VMUGtovmug
2.4K views61 slides
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P... by
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...Ixia
427 views13 slides
HyTrust and VMware-Providing a Secure Virtual Infrastructure by
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust
662 views11 slides
Cisco X Factor 9.x Updates & More by
Cisco X Factor 9.x Updates & MoreCisco X Factor 9.x Updates & More
Cisco X Factor 9.x Updates & Moreceriumnetworks
2.9K views139 slides
Tech editors conf tucker yen-jacoby revised final for may 24 2012 by
Tech editors conf tucker yen-jacoby revised final  for may 24 2012Tech editors conf tucker yen-jacoby revised final  for may 24 2012
Tech editors conf tucker yen-jacoby revised final for may 24 2012Cisco Public Relations
302 views27 slides

Similar to From Physical to Virtual to Cloud(20)

Cisco Dec 6 Toronto VMUG by tovmug
Cisco Dec 6 Toronto VMUGCisco Dec 6 Toronto VMUG
Cisco Dec 6 Toronto VMUG
tovmug2.4K views
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P... by Ixia
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
Ixia427 views
HyTrust and VMware-Providing a Secure Virtual Infrastructure by HyTrust
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust662 views
Cisco X Factor 9.x Updates & More by ceriumnetworks
Cisco X Factor 9.x Updates & MoreCisco X Factor 9.x Updates & More
Cisco X Factor 9.x Updates & More
ceriumnetworks2.9K views
Tech editors conf tucker yen-jacoby revised final for may 24 2012 by Cisco Public Relations
Tech editors conf tucker yen-jacoby revised final  for may 24 2012Tech editors conf tucker yen-jacoby revised final  for may 24 2012
Tech editors conf tucker yen-jacoby revised final for may 24 2012
MassTLC Cloud summit keynote presentation from CTO of VMWare, Scott Davis by MassTLC
MassTLC Cloud summit keynote presentation from CTO of VMWare, Scott DavisMassTLC Cloud summit keynote presentation from CTO of VMWare, Scott Davis
MassTLC Cloud summit keynote presentation from CTO of VMWare, Scott Davis
MassTLC616 views
Inter op nyc_mahbubul alam_october 2012 by Mahbubul Alam
Inter op nyc_mahbubul alam_october 2012Inter op nyc_mahbubul alam_october 2012
Inter op nyc_mahbubul alam_october 2012
Mahbubul Alam2.6K views
Express Data - BYOD by Gen-i
Express Data - BYODExpress Data - BYOD
Express Data - BYOD
Gen-i504 views
Express Data - BYOD by Gen-i
Express Data - BYODExpress Data - BYOD
Express Data - BYOD
Gen-i307 views
ReadyCloud Collaboration, a Cisco Powered service by Gen-i
ReadyCloud Collaboration, a Cisco Powered serviceReadyCloud Collaboration, a Cisco Powered service
ReadyCloud Collaboration, a Cisco Powered service
Gen-i633 views
Cisco switching technical by ImranD1
Cisco switching technicalCisco switching technical
Cisco switching technical
ImranD17.1K views
Cisco at v mworld 2015 vmworld-deck-2015-final by ldangelo0772
Cisco at v mworld 2015 vmworld-deck-2015-finalCisco at v mworld 2015 vmworld-deck-2015-final
Cisco at v mworld 2015 vmworld-deck-2015-final
ldangelo0772423 views
Becloud hybrid cloud by Becloud
Becloud hybrid cloudBecloud hybrid cloud
Becloud hybrid cloud
Becloud597 views
Vss Security And Compliance For The Cloud by Graeme Wood
Vss Security And Compliance For The CloudVss Security And Compliance For The Cloud
Vss Security And Compliance For The Cloud
Graeme Wood460 views
Vmware Seminar Security & Compliance for the cloud with Trend Micro by Graeme Wood
Vmware Seminar Security & Compliance for the cloud with Trend MicroVmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Graeme Wood1.2K views
Cloud Computing at Cisco by Cisco Canada
Cloud Computing at CiscoCloud Computing at Cisco
Cloud Computing at Cisco
Cisco Canada1.4K views
Cloud Networking: Network aspects of the cloud by SAIL
Cloud Networking: Network aspects of the cloudCloud Networking: Network aspects of the cloud
Cloud Networking: Network aspects of the cloud
SAIL821 views
Designing Secure Cisco Data Centers by Cisco Russia
Designing Secure Cisco Data CentersDesigning Secure Cisco Data Centers
Designing Secure Cisco Data Centers
Cisco Russia 12.6K views

More from Cisco Security

Incident Response Services Template - Cisco Security by
Incident Response Services Template - Cisco SecurityIncident Response Services Template - Cisco Security
Incident Response Services Template - Cisco SecurityCisco Security
11.2K views2 slides
3 Tips for Choosing a Next Generation Firewall by
3 Tips for Choosing a Next Generation Firewall3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation FirewallCisco Security
2.5K views1 slide
AMP Helps Cisco IT Catch 50% More Malware threats by
AMP Helps Cisco IT Catch 50% More Malware threatsAMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threatsCisco Security
4.9K views1 slide
The Cost of Inactivity: Malware Infographic by
The Cost of Inactivity: Malware InfographicThe Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicCisco Security
1.7K views1 slide
Cisco Addresses the Full Attack Continuum by
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Security
4.4K views21 slides
Infonetics Network and Content Security Vendor Scorecard by
Infonetics Network and Content Security Vendor ScorecardInfonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor ScorecardCisco Security
2.2K views12 slides

More from Cisco Security(15)

Incident Response Services Template - Cisco Security by Cisco Security
Incident Response Services Template - Cisco SecurityIncident Response Services Template - Cisco Security
Incident Response Services Template - Cisco Security
Cisco Security11.2K views
3 Tips for Choosing a Next Generation Firewall by Cisco Security
3 Tips for Choosing a Next Generation Firewall3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall
Cisco Security2.5K views
AMP Helps Cisco IT Catch 50% More Malware threats by Cisco Security
AMP Helps Cisco IT Catch 50% More Malware threatsAMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threats
Cisco Security4.9K views
The Cost of Inactivity: Malware Infographic by Cisco Security
The Cost of Inactivity: Malware InfographicThe Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware Infographic
Cisco Security1.7K views
Cisco Addresses the Full Attack Continuum by Cisco Security
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
Cisco Security4.4K views
Infonetics Network and Content Security Vendor Scorecard by Cisco Security
Infonetics Network and Content Security Vendor ScorecardInfonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor Scorecard
Cisco Security2.2K views
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ... by Cisco Security
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Cisco Security7.3K views
The Evolution of and Need for Secure Network Access by Cisco Security
The Evolution of and Need for Secure Network AccessThe Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network Access
Cisco Security2.6K views
Cisco 2014 Midyear Security Report by Cisco Security
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
Cisco Security2.4K views
String of Paerls Infographic by Cisco Security
String of Paerls InfographicString of Paerls Infographic
String of Paerls Infographic
Cisco Security1.4K views
Midyear Security Report Infographic by Cisco Security
Midyear Security Report InfographicMidyear Security Report Infographic
Midyear Security Report Infographic
Cisco Security478 views
Cisco Annual Security Report Infographic by Cisco Security
Cisco Annual Security Report InfographicCisco Annual Security Report Infographic
Cisco Annual Security Report Infographic
Cisco Security602 views
City of Tomorrow Builds in Next-Generation Security by Cisco Security
City of Tomorrow Builds in Next-Generation SecurityCity of Tomorrow Builds in Next-Generation Security
City of Tomorrow Builds in Next-Generation Security
Cisco Security2.2K views
Laser Pioneer Secures Network End-to-End to Protect Assets by Cisco Security
Laser Pioneer Secures Network End-to-End to Protect AssetsLaser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect Assets
Cisco Security1.1K views
Leveraging Context-Aware Security to Safeguard Patient Data by Cisco Security
Leveraging Context-Aware Security to Safeguard Patient DataLeveraging Context-Aware Security to Safeguard Patient Data
Leveraging Context-Aware Security to Safeguard Patient Data
Cisco Security1.1K views

Recently uploaded

State of the Union - Rohit Yadav - Apache CloudStack by
State of the Union - Rohit Yadav - Apache CloudStackState of the Union - Rohit Yadav - Apache CloudStack
State of the Union - Rohit Yadav - Apache CloudStackShapeBlue
297 views53 slides
"Surviving highload with Node.js", Andrii Shumada by
"Surviving highload with Node.js", Andrii Shumada "Surviving highload with Node.js", Andrii Shumada
"Surviving highload with Node.js", Andrii Shumada Fwdays
56 views29 slides
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue by
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlueElevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlueShapeBlue
222 views7 slides
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... by
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...ShapeBlue
198 views20 slides
"Package management in monorepos", Zoltan Kochan by
"Package management in monorepos", Zoltan Kochan"Package management in monorepos", Zoltan Kochan
"Package management in monorepos", Zoltan KochanFwdays
33 views18 slides
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading... by
Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...The Digital Insurer
90 views52 slides

Recently uploaded(20)

State of the Union - Rohit Yadav - Apache CloudStack by ShapeBlue
State of the Union - Rohit Yadav - Apache CloudStackState of the Union - Rohit Yadav - Apache CloudStack
State of the Union - Rohit Yadav - Apache CloudStack
ShapeBlue297 views
"Surviving highload with Node.js", Andrii Shumada by Fwdays
"Surviving highload with Node.js", Andrii Shumada "Surviving highload with Node.js", Andrii Shumada
"Surviving highload with Node.js", Andrii Shumada
Fwdays56 views
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue by ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlueElevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
ShapeBlue222 views
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... by ShapeBlue
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
ShapeBlue198 views
"Package management in monorepos", Zoltan Kochan by Fwdays
"Package management in monorepos", Zoltan Kochan"Package management in monorepos", Zoltan Kochan
"Package management in monorepos", Zoltan Kochan
Fwdays33 views
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading... by The Digital Insurer
Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...
Initiating and Advancing Your Strategic GIS Governance Strategy by Safe Software
Initiating and Advancing Your Strategic GIS Governance StrategyInitiating and Advancing Your Strategic GIS Governance Strategy
Initiating and Advancing Your Strategic GIS Governance Strategy
Safe Software176 views
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue by ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueVNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
ShapeBlue203 views
Redefining the book supply chain: A glimpse into the future - Tech Forum 2023 by BookNet Canada
Redefining the book supply chain: A glimpse into the future - Tech Forum 2023Redefining the book supply chain: A glimpse into the future - Tech Forum 2023
Redefining the book supply chain: A glimpse into the future - Tech Forum 2023
BookNet Canada44 views
Future of AR - Facebook Presentation by Rob McCarty
Future of AR - Facebook PresentationFuture of AR - Facebook Presentation
Future of AR - Facebook Presentation
Rob McCarty64 views
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R... by ShapeBlue
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
ShapeBlue173 views
Transcript: Redefining the book supply chain: A glimpse into the future - Tec... by BookNet Canada
Transcript: Redefining the book supply chain: A glimpse into the future - Tec...Transcript: Redefining the book supply chain: A glimpse into the future - Tec...
Transcript: Redefining the book supply chain: A glimpse into the future - Tec...
BookNet Canada41 views
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ... by ShapeBlue
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
ShapeBlue166 views
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue by ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlueCloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
ShapeBlue135 views
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online by ShapeBlue
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineKVM Security Groups Under the Hood - Wido den Hollander - Your.Online
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online
ShapeBlue221 views

From Physical to Virtual to Cloud

  • 1. Mike Nielsen Senior Director Security February 7, 2012 © 2012 Cisco and/or its affiliates. All rights reserved. 1
  • 2. Cisco Data Center Technology Physical Deployment Use Cases Virtual and Cloud Deployment Use Cases © 2012 Cisco and/or its affiliates. All rights reserved. 2
  • 3. NEARLY MORE THAN 2000% 50% increase in application traffic of business-critical applications and network connections per will be virtualized by 2013 second required for inspection by 2015 Rapidly losing visibility of business-critical traffic © 2012 Cisco and/or its affiliates. All rights reserved. 3
  • 4. 1. vMotion moves VMs across physical ports—the network policy must follow vMotion (across racks, PODS, DCs) 2. Must view or apply network/security policy to Port locally switched traffic Group 3. Need to maintain segregation of duties while ensuring Security non-disruptive operations Admin Server Admin Network Admin © 2012 Cisco and/or its affiliates. All rights reserved. 4
  • 5. PHYSICAL VIRTUAL CLOUD WORKLOAD WORKLOAD WORKLOAD • One app per server • Many apps per server • Multi-tenant per server • Static • Mobile • Elastic • Manual provisioning • Dynamic provisioning • Automated scaling HYPERVISOR VDC-1 VDC-2 CONSISTENCY: Policy, Features, Security, Management Switching Nexus 7K/5K/3K/2K Nexus 1000V, VM-FEX Security ASA 5585, ASA SM, IPS VSG, ASA 1000V Compute UCS for Bare Metal UCS for Virtualized Workloads * Virtual only, ** Announced © 2012 Cisco and/or its affiliates. All rights reserved. 5
  • 6. Security needs to scale to the transaction SCALABLE or throughput requirements of today’s SECURITY applications PHYSICAL & Security must provide consistent policy VIRTUAL enforcement across hybrid environments Security deployments must enable BUSINESS business agility through the unification of CONTEXT business and technology policies © 2012 Cisco and/or its affiliates. All rights reserved. 6
  • 7. Segment resources Ensure maximum logically and CPU utilization physically by tenant and VM mobility or risk class © 2012 Cisco and/or its affiliates. All rights reserved. 7
  • 8. Firewall Segmentation Fabric Segmentation Stateful/reflective ACL UCS Fabric Interconnect Multi-context VPN TrustSec Context-Aware Segmentation Network Segmentation Security Group Tags (SGT) Physical Security Exchange Protocol (SXP) Virtual (VLAN, VRF) Security Group ACL Virtualized (Zones) © 2012 Cisco and/or its affiliates. All rights reserved. 8
  • 9. © 2012 Cisco and/or its affiliates. All rights reserved. 9
  • 10. ASA Firewall at Data Center Speeds ASA 5585-SSP60 80 40 Gbps Firewall 20 MM Connections 10 700,000 350,000 CPS ASA 5585-SSP40 40 20 Gbps Firewall ASA 5585-SSP20 8 4 MM Connections 20 10 Gbps Firewall 400,000 CPS Connections 4 MM 2 200,000 CPS ASA 5585-SSP10 Connections 8 4 Gbps Firewall 250,000 125,000 CPS 2 1 MM ASA Services Connections Module 100,000 CPS 50,000 CPS 80 20 Gbps Firewall 40 10 MM Connections 1.2 MM CPS 300,000CPS Campus Data Center © 2012 Cisco and/or its affiliates. All rights reserved. 10
  • 11. Assured Protection for High-performance Data Centers Next-generation firewall at 700% Higher Performance data center speeds • Clusters managed as a single logical device Density • 320 Gbps firewall & 80 Gbps IPS throughput • 1 million connections per 84% Less Power second • 50 million concurrent sessions Consumption • Pay as you grow Integrated identity, content 87% Percent Less and application security Fully IPv6 compliant for coming wave of mobile Rack Space application access © 2012 Cisco and/or its affiliates. All rights reserved. 11
  • 12. Assured Protection for High-performance Data Centers 400% Highest IPS performance density • 10 Gbps IPS throughput Higher Performance Density • 100,000 connections per second 75% Less Power • Expandable 2RU chassis Context-aware attacker, Consumption victim, and attack visibility 50% Less Rack Space Backed by Cisco Security Intelligence Operation (SIO) for the highest level of attack identification and mitigation © 2012 Cisco and/or its affiliates. All rights reserved. 12
  • 13. Cisco® ASA 5585-X v9.0 with Clustering Capability* • Two to eight ASAs supported per cluster (same model and DRAM) • Both routed (L3) and transparent (L2) firewall modes supported • Cluster performance = 60-70 percent of combined throughput and connections (traffic- dependent) ASA CLUSTERING AT CONTROL PLANE • One master syncs configuration to all members • Minimum one cluster control interface for the cluster control plane • Site-to-site VPN support Not supported in cluster mode: SSL/IPSEC RA VPN, VPN LB, Botnet Traffic Filter, DHCP capabilities, WCCP, Unified Communications features, ASA-CX SSP, specific applications inspection. * Clustering is supported on ASA 5585, 5580 and ASA SM ASA Clustering at Data Plane © 2012 Cisco and/or its affiliates. All rights reserved. 13
  • 14. Cisco Catalyst 6500 as Services Switch ® • ASA SM for Catalyst 6500 • Etherchannel Integration with Cisco Nexus 7K/vPC ® • 6500 supports Link Aggregation Control Protocol (LACP), IEEE 802.3ad standard • Traffic forwarded using service- specific VLANs • Each port-channel supports up to eight active and eight standby links © 2012 Cisco and/or its affiliates. All rights reserved. 14
  • 15. System Dashboard © 2012 Cisco and/or its affiliates. All rights reserved. 15
  • 16. Integrated Identity Security Context AAA Directory Infrastructure Agent Mark Data Center and Cloud AnyConnect IDFW DMZ John ASA Identity Firewall © 2012 Cisco and/or its affiliates. All rights reserved. 16
  • 17. AD/LDAP Identity • Non-auth-aware apps NTLM • Any platform Kerberos • AD/LDAP credential TRUSTSEC Network Identity Secure Group Tags on ASA User Authentication IP Surrogate • Auth-Aware Apps AD Agent • Mac, Windows, Linux • AD/LDAP user credential © 2012 Cisco and/or its affiliates. All rights reserved. 17
  • 18. TrustSec lets you define policy in Context Classification meaningful business terms Business Policy TAG Security Group Tag Destination HR Database Prod CRM Storage Source VD HR Users X X Distributed Enforcement in DC VPN HR User X X X IT Ops ASA DC Switch Test Server Test-ACL X Filtering Physical and Virtual Servers in Data Center © 2012 Cisco and/or its affiliates. All rights reserved. 18
  • 19. Integrated Identity Security SGT (6) mktg-servers SGT (9) HR-servers ISE SGT=06 Packet SGT=09 Packet Security Xchange Protocol © 2012 Cisco and/or its affiliates. All rights reserved. 19
  • 20. • Users assigned with a security group tag • Contextual access control is now possible • Cisco Nexus® 7000 enforces group policy at the DC edge • Cisco® ASA 5585-X v9.0 support SXP security group tags in policy • Example usage: access to VDI service in DC © 2012 Cisco and/or its affiliates. All rights reserved. 20
  • 21. Delivers protections months ahead of the threat 0010 010 10010111001 10 100111 010 000100101 110011 01100111010000110000111000111010011101 1100001110001110 1001 1101 1110011 0110011 101000 0010 010 10010111001 10 100111 010 000100101 110011 01100111010000110000111000111010011101 1100001110001110 1001 1101 1110011 0110011 101000 Cisco SIO WWW Email Devices Web CWS IPS AnyConnect Zero-day detection WWW Actions Information IPS Networks Endpoints ESA ASA WSA Reputation-based Visibility protection Control 1.6M global sensors 3 to 5 minute updates 75TB data received per day Consistent 5,500+ IPS signatures produced 150M+ deployed endpoints 8M+ rules per day enforcement 35% worldwide email traffic 200+ parameters tracked 13B web requests 70+ publications produced © 2012 Cisco and/or its affiliates. All rights reserved. 21
  • 22. Proving SIO - Global Correlation White Paper http://www.cisco.com/en/US/products/ps12156/prod_white_papers_list.html Figure 4. Sensor at Industrial Supplies Distributor (IND-2) Figure 2. Sensor at Bank (BNK-1) © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
  • 23. © 2012 Cisco and/or its affiliates. All rights reserved. 23
  • 24. Unified Firewall Policies in Virtual and Cloud Environments Unmatched Deployment Consistent Policies Flexibility • Common ASA configuration for physical, virtual and cloud deployments Lowest Operational VM Firewall Scalability Complexity • Single Instance secures up to 64 ESX hosts • Limitless VMs for SP and Enterprise Enhanced Network Scalability Unified Fabric Security • Integrates with the Nexus 1000V Series switch • Complements zone-based security capabilities of the Cisco Virtual Security Gateway) © 2012 Cisco and/or its affiliates. All rights reserved. 24
  • 25. Features and Capabilities Built using Cisco ASA IPsec VPN (site to site) infrastructure NAT Interoperability with Cisco VSG DHCP through service chaining Default gateway VXLAN gateway Static routing Stateful inspection Multi-tenant management Through Cisco VNMC IP audit © 2012 Cisco and/or its affiliates. All rights reserved. 25
  • 26. Zone 1 Zone 2 • The zones used define policy enforcement • Unique policies and traffic decisions applied to each zone • Physical infrastructure mapped Steer VM traffic to virtual context per zone: • VRF • Virtual context • Merging physical and virtual vPath Virtual Switch Segment pools of vPath Virtual Switch infrastructure vSphere blade resources per vSphere zone © 2012 Cisco and/or its affiliates. All rights reserved. 26
  • 27. VSG Zone-based intratenant Cisco Nexus 1000V ® segmentation of VMs Cisco ASA 1000V ® Virtual Service Nodes vPATH Nexus 1000V Hypervisor Ingress/egress multitenant edge deployment vCenter Nexus 1 KV VNMC Server Network Security Admin Admin Admin © 2012 Cisco and/or its affiliates. All rights reserved. 27
  • 28. Virtual Security Gateway: Zone Firewall for Cisco Nexus® 1000V • Control inter-VM traffic to address new blind spot • Support dynamic VM provisioning VM-to-VM traffic VM-to-VM traffic • Transparent VM mobility enforcement • Policy based VLAN-agnostic operation • Administrative separation of duties; App App App App server, network, and security` OS OS OS OS © 2012 Cisco and/or its affiliates. All rights reserved. 28
  • 29. SECURING VM-VM TRAFFIC Aggregation ERSPAN DST IDS ID:2 Virtual Sensor 1 IDS ID:1 Virtual Sensor 2 Zone B Zone C monitor session 1 type erspan-source VDC VDC description N1k ERSPAN – session 1 vApp monitor session 3 type erspan-destination description N1k ERSPAN to IDS Virtual Sensor 1 VSG VSG vApp monitor session 2 type erspan-source description N1k ERSPAN –session 2 monitor session 4 type erspan-destination description N1k ERSPAN to IDS Virtual Sensor 2 vPath Cisco® Nexus 1000V © 2012 Cisco and/or its affiliates. All rights reserved. vSphere 29
  • 30. Tenant A Tenant A’ (clone) VM 1 VM 2 VM 1 VM 1 VM 2 VM 1 VM 3 VM 1 VM 3 VM 1 ASA 1000V ASA 1000V Virtualized Servers External Network • Multizone tenant cloning while keeping overlapping IP addresses • Isolate overlap IPs with dynamic Network Address Translation (NAT) while connected to the external network © 2012 Cisco and/or its affiliates. All rights reserved. 30
  • 31. Proven Cisco Security…Virtualized vCenter • Physical – virtual consistency Virtual Network Management Center (VNMC) Tenant B Collaborative Security Model Tenant A VDC VDC • VSG for intra-tenant secure zones vApp • ASA 1000V for tenant edge controls VSG VSG VSG vApp Seamless Integration • With Nexus 1000V & vPath VSG ASA 1000V ASA 1000V Scales with Cloud Demand vPath • Multi-instance deployment for Nexus 1000V horizontal scale-out deployment Hypervisor © 2012 Cisco and/or its affiliates. All rights reserved. 31
  • 32. Tenant A Tenant B VM 1 VM 2 VM 1 VM 1 VM 2 VM 1 VM 3 VM 1 VM 3 VM 1 ASA 1000V ASA 1000V Virtualized Servers • VMs are quickly brought up and down in virtual environments • ASA 1000V DHCP capability used to assigns dynamic IPs to new VMs © 2012 Cisco and/or its affiliates. All rights reserved. 32
  • 33. Physical Data Center DC Security Cisco Validated Designs Virtual Data Center Virtualized Multiservice Data Center (VMDC) © 2012 Cisco and/or its affiliates. All rights reserved. 33
  • 34. End-to-End Security for Hybrid Infrastructure Physical Virtual and Cloud Physical Appliances and Modules Cloud Firewall Cisco Multi-Scale™ data center-class Enhanced cloud security Cisco® ASA devices Cisco ASA Cisco Catalyst® 6500 Cisco VSG Cisco ASA 1000V 5585-X Series ASA Services Cloud Firewall Module • Scalable in-line performance • Proven firewall to secure your cloud • Data center-edge security policies • Policies specific to the tenant edge to the virtual machine • Flexible deployment options • Automated, policy-based provisioning © 2012 Cisco and/or its affiliates. All rights reserved. 34
  • 35. • Always-on, security that is integrated into the network fabric • End-to-end security solutions for Physical physical and virtual environments • Context-aware security to Cloud differentiate risk from random • Services to enable pervasive security across the infrastructure, within, and between clouds Virtual © 2012 Cisco and/or its affiliates. All rights reserved. 35
  • 36. Thank you. © 2012 Cisco and/or its affiliates. All rights reserved. 36

Editor's Notes

  1. As they grow to the next level, data centers have the following security requirements, to support their changing needs:Scalable Security: The amount of data and transactions moving through most data centers requires ever-increasing levels of performance. Security must have the ability to scale to meet these seemingly insatiable performance requirements, while ensuring the highest levels of security.Physical & Virtual: Modern-day data centers are no longer comprised solely of physical deployments. Instead, they are a mixture of physical, virtual, and cloud infrastructures – built to solve the business’ specific needs. Security policies must have the ability work consistently across hybrid environments.Business Integration: While security is certainly important to data center administrators, it isn’t their only concern. They must also focus on maintaining business/IT alignment and avoiding chokepoints that can degrade performance and jeopardize their SLAs. Security needs to be an integral part of the network architecture, so that it can help maintain business/IT alignment, avoid performance chokepoints, and enable business flexibility.
  2. The ASA 5585-X is available at four performance levels ...
  3. Now for some of the new products we’re announcing today …ASA 9.0 is a major release of our core operating system, which powers the entire line of ASA security appliances.One of the most significant improvements in this release is its ability to cluster up to eight of our highest performing firewall appliances to produce the fastest firewall in the worldIt also integrates Cisco TrustSec security group tags (SGTs); along with Identity Firewall capabilities (for active and passive authentication) introduced in our previous release, we are the only security provider with the ability to deliver next-generation firewall capabilities at data center speedsIntegrates with Cisco Cloud Web Security (formerly ScanSafe) to enable administrators to perform deep content scanning on a subset of traffic, without degrading performanceIPv6 support with a minimal performance degradation from IPv4 traffic (15% vs 80% for competitors)[!-- Explanation of the blue “Data Boxes”: --!]700% Higher Performance Density: ASA 5585-X delivers the performance in 2RU that Juniper requires 16RU to match … the math holds up in a clustered environment as well on the firewall side – and adds 60 Gbps IPS throughput (Juniper is limited to 10 Gbps IPS when colocated with the firewall)84% Less Power Consumption: we require less than 400 watts of power, compared to ~5100 watts with Juniper87% Less Rack Space: this is tied to the first point – we use 1/8 the rack space
  4. The industry’s first IPS that is fit to handle data center workflows10 Gbps in a single blade – expandable to two blades in the near futureIntelligent and context-aware for the most effective, proactive IPS in the industry[!-- Explanation of the blue “Data Boxes”: --!]400% Higher Performance Density: IPS 4520 delivers the IPS throughput in 1 blade that Juniper requires 4 blades to match …75% Less Power Consumption: due to the 1:4 hardware ratio discussed above50% Less Rack Space: due to the fact that we can do it with a 2RU unit, vs4RU
  5. CPU and Memory for any unit within the cluster. When you click on environment status button, you can see exact what has failed on the specific cluster node
  6. Identity repository is AD based at phase 1 and is forward compatible with Identity Services Engine.User Logs into ADAD Agent retrieves IP information from ADASA retrieves IP-User mapping from AD AgentPermit/Deny based on Policy
  7. Technology trends such as cloud computing, proliferation of personal devices, and collaboration are enabling more efficient business practices, but they are also putting a strain on the data center and adding new security risks. As technology becomes more sophisticated, so are targeted attacks, and these security breaches, as a result, are far more costly. Many security breaches are caused by external forces such as hackers, organized crime and cybercriminals, and internally, disgruntled employees pose a threat. Businesses must be protected from these threats. Cisco offers two key threat defense options and then supports these with Cisco’s Security Intelligence Operations (SIO).
  8. The Cisco ASA 1000V Cloud Firewall uses the same base ASA code that runs our physical appliances, but is optimized for virtual and cloud environments. That provides some key advantages over “virtual firewalls”, which negate most of the reasons for virtualizing in the first place!Consistent security across hybrid infrastructures – single policy can span physical, virtual, and cloudFlexibility – can secure multiple ESX hosts and can span multiple virtual datacenters; supports VMOTION, so applications can be moved without breaking security policies [!-- Explanation of the blue “Data Boxes”: --!]Unmatched Deployment Flexibility: ASA code – consistency across hybrid infrastructure. Also, ASA 1000V supports VMOTION, so when applications and workloads are moved, security policies move with them – enabling ongoing infrastructure flexibility, without having to re-work security.Lowest Operational Complexity: Unlike “virtual firewalls”, a single instance of ASA 1000V can secure multiple ESX hosts and span multiple virtual datacenters. Also works in conjunction with Nexus 1000V and VSG (using a common management tool for all three) for an end-to-end virtual/cloud solutionEnhanced Network Scalability: Rather than ~4,000 VLANs that are possible in the physical world, Virtual Extensible LAN (VXLAN) can manage 16 million segments.
  9. For the multi tenant DC sometimes there need to clone a specific set of machines so we want to clone a complete tenant. We will have the same IP address with clone. To avoid overlap and collision we can take advantage of the NAT address translation functionality that’s built into Nexus 1K with ASA 1K
  10. Virtual machines are quickly brought up and down in virtual environments. These virtual machines need dynamic IP address assignment. ASA 1000V acts as a DHCP server and allocates IP addresses when a request is received from any of the virtual machines in the tenant.When new virtual machines are instantiated we need to assign them with the appropriate IP addresses and the ASA 1000V has built in DHCP capability so it will assign the IP and will keep those IP in the right network segments as the policy dictates
  11. In conclusion, Cisco enables consistent security across physical, virtual, and cloud environments – with flexible, comprehensive security solutions that:Maintain business/IT alignmentEnable one layer of security policies to work throughout your hybrid environmentAvoid chokepoints that can degrade performance and jeopardize SLAsDeliver context-aware access control by leveraging the entire network… therefore, we  enable security decisions to be made using the same flexibility and fluidity you employ for your network implementation decisions – for a high level of security with operational consistency