SlideShare a Scribd company logo
Integration of Pola Alto and VMware NSX to protect Virtual and Cloud
environments Benefits
• With VMware and Palo Alto Networks coming together with an
integrated solution that enables companies to realize the full
potential of the Software Defined Data Center while providing
protection against potential vulnerabilities.
The joint solution addresses current challenges faced by data centers
including:
• Lack of visibility into East-West (VM-to-VM) traffic
• Manual, process-intensive networking configurations to deploy
security within the virtualized environment
• Security not keeping pace with speed of server provisioning
• Incomplete or irrelevant feature sets within virtualized network
security platforms
• VMware NSX network virtualization platform been the leader in
Software Defined Data Center networking then by Using the VMware
NSX platform’s extensible service insertion and service chaining
capabilities, the virtualized next-generation
firewall from Palo Alto Networks is automatically and transparently
deployed on every ESXi server.
Context is shared between VMware NSX and Palo Alto Networks
centralized management platform, enabling security teams to
dynamically apply security policies to virtualized application creation
and changes. This is accomplished while maintaining the separation
of duty between security and virtualization/cloud IT administrators.
• The integrated solution provides several benefits:
• • Better security – enterprises can automate the delivery of Palo Alto Networks
next-generation security features including visibility, safe application enablement
and protection against known and unknown threats to protect their virtual and
cloud environments. Dynamic network security policies stay in sync with virtual
application
changes.
• • Operational flexibility – next-generation security capabilities are deployed in an
automated, transparent manner without manual, operational complexities.
• • Accelerated deployments of business-critical applications – enterprises can
provision security services faster and utilize capacity of cloud infrastructures—
more efficiently to deploy, move and scale their applications without worrying
about security.
• NSX Distributed Firewall
• VMware NSX Security platform includes distributed kernel-enabled
fire-walling with line-rate performance,virtualization and identity
aware with activity monitoring, among other network security
features native to network virtualization.
• Network Isolation
Isolation is the foundation of most network security, whether for compliance, containment or
simply keeping development, test and production environments from interacting.
• In VMware network virtualization, virtual networks are isolated from any other virtual network
and from the underlying physical network by default, delivering the security principle of least
privilege. Virtual networks are created in isolation and remain isolated unless specifically
connected together.
• No physical subnets, no VLANs, no ACLs, no firewall rules are required to enable this isolation.
Any isolated virtual network can be made up of workloads distributed anywhere in the data
center.
• Workloads in the same virtual network can reside on the same or separate hypervisors.
Additionally, workloads in several
multiple isolated virtual networks can reside on the same hypervisor.
Case in point, isolation between virtual networks allows for overlapping IP addresses, making it
possible to have isolated development, test and
production virtual networks,
• each with different application versions, but with the same IP
addresses, all
operating at the same time, all on the same underlying physical
infrastructure.
• Virtual networks are also isolated from the underlying physical
infrastructure. Because traffic between
hypervisors is encapsulated, physical network devices operate in a
completely different address space than the
workloads connected to the virtual networks.
• Network segmentation
Network isolation is between discrete entities. Network segmentation
applies to homogeneous entities, e.g.
protection within a group or three-tier application as shown below.
• Traditionally, network segmentation has being a function of a
physical firewall or router, designed to allow or deny traffic between
network segments or tiers. For example, segmenting traffic between a
web tier, application tier and database tier. Traditional processes for
defining and configuring
segmentation are time consuming and highly prone to human error,
resulting in many security breaches.
Implementation requires deep and specific expertise in device
configuration syntax, network addressing,
application ports and protocols.
• Network segmentation, like isolation, is a core capability of VMware
NSX network virtualization. A virtual
network can support a multi-tier network environment, meaning
multiple L2 segments with L3 segmentation or
micro-segmentation on a single L2 segment using distributed firewall
rules. In a virtual network, network
services (L2, L3, ACL, Firewall, QoS, etc.) that are provisioned with a
workload are programmatically created and
distributed to the hypervisor vSwitch. Network services, including L3
segmentation and firewalling, are enforced
at the virtual interface.
• Isolation and segmentation requires identifying application flows and
enforcing security policies, which can be created pro-grammatically or
using a template-based process. Integrating the virtual isolation and
segmentation with physical firewall functions and workflow has been
the Achilles’ heel of securing virtual data centers.
• This integration with Palo Alto Networks physical and virtual next-
generation firewall services with the NSX native
security capabilities allows cloud administration a powerful method
to manage the risk associated with integration between physical and
virtual domain.
• Palo Alto Networks Solution Components
• The Palo Alto Networks VM-Series and NSX integrated solution
includes Panorama and the VM-Series nextgeneration
firewall. The following are key elements of the solution:
• • VM-Series Firewall — The VM-Series firewall is a next-generation firewall
in virtual form factor that extends
safe application enablement to virtualized and cloud environments using
the same PAN-OS feature set
available in hardware firewalls. This means when applied to a virtualized
and cloud environment, Palo Alto
Networks can determine the exact identity of the applications traffic
traversing from VM to VM using App-ID
technology. Coordinated threat protection can then be applied to the
allowed traffic, blocking known malware
sites, preventing vulnerability exploits, viruses, spyware and malicious DNS
queries using Content-ID
technology.
• The VM-Series NSX edition firewall is jointly developed by Palo Alto
Networks and VMware. This solution uses the NetX API to integrate
the Palo Alto Networks next-generation firewalls and Panorama with
VMware ESXi servers to provide comprehensive visibility and safe
application enablement of all data-center traffic including intra/inter
host virtual machine communications.
• The VM-1000-HV is deployed as a network introspection service with
VMware NSX and Panorama. This deployment is ideal for east-west
traffic inspection, and it also can secure north-south traffic.
• • Dynamic Address Groups — In a virtualized and cloud environment
where virtual machines often change
functions and can move from server to server, building security
policies based on static IP addresses alone can
have limited value. The Dynamic Address Groups feature in PAN-OS
6.0 allows you to create policies using
tags as an identifier for virtual machines instead of a static object
definition. Multiple tags representing virtual
machine attributes such as IP address and operating system can be
resolved within a Dynamic Address Group,
allowing you to dynamically apply policies to virtual machines as they
are created or travel across the network.
• • Panorama Centralized management — Panorama enables you to
centrally
manage the process of configuring devices, deploying security
policies, performing forensic analysis, and
generating reports across your entire network of next-generation
firewalls. Panorama automatically registers
the Palo Alto Networks VM-Series as a service to NSX. Once the
service is registered, it can be deployed to
one or more clusters. Each host on the cluster will automatically have
a VM-Series firewall deployed, licensed,
registered, and configured.
Below is a high level over view Of the
integration
VMware NSX Distributed Firewall Palo Alto
Integration benefits
• VMware NSX network virtualization platform provides L2-L4 stateful
firewall features to deliver segmentation
within virtual networks. Environments that require advanced,
application-level network security capabilities can
leverage VMware NSX to distribute, enable and enforce advanced
network security services in a virtualized
network context. NSX distributes network services into the VM vNIC
to form a logical pipeline of services applied
to virtual network traffic.
• The Palo Alto Networks VM-Series firewall integrates directly into this
logical pipeline,
enabling visibility and safe enablement of VM traffic, along with safe
enablement of applications and complete
threat protection.
Another powerful benefit of the integrated NSX and Palo Alto
Networks solution is the ability to build policies
that leverage NSX service insertion, chaining and steering to drive
service execution in the logical services
pipeline, based on the result of other services, making it possible to
coordinate otherwise completely unrelated
network security services from multiple vendors.

More Related Content

What's hot

Network Function Virtualization - Security Best Practices AtlSecCon 2015
Network Function Virtualization - Security Best Practices AtlSecCon 2015Network Function Virtualization - Security Best Practices AtlSecCon 2015
Network Function Virtualization - Security Best Practices AtlSecCon 2015
Winston Morton
 
cloudblanket_nms_ds_revb
cloudblanket_nms_ds_revbcloudblanket_nms_ds_revb
cloudblanket_nms_ds_revb
Ori Guez
 

What's hot (19)

Virtualization security threats in cloud computing
Virtualization security threats in cloud computingVirtualization security threats in cloud computing
Virtualization security threats in cloud computing
 
VMworld 2013: Virtualized Network Services Model with VMware NSX
VMworld 2013: Virtualized Network Services Model with VMware NSX VMworld 2013: Virtualized Network Services Model with VMware NSX
VMworld 2013: Virtualized Network Services Model with VMware NSX
 
20150311 NSX update 301
20150311 NSX update 30120150311 NSX update 301
20150311 NSX update 301
 
VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...
VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...
VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...
 
Protect Your End-of-Life Windows Server 2003 Operating System
Protect Your End-of-Life Windows Server 2003 Operating SystemProtect Your End-of-Life Windows Server 2003 Operating System
Protect Your End-of-Life Windows Server 2003 Operating System
 
VMware NSX primer 2014
VMware NSX primer 2014VMware NSX primer 2014
VMware NSX primer 2014
 
VMworld 2013: Advanced VMware NSX Architecture
VMworld 2013: Advanced VMware NSX Architecture VMworld 2013: Advanced VMware NSX Architecture
VMworld 2013: Advanced VMware NSX Architecture
 
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - SegmentationVMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
 
VMworld 2014: Virtualize your Network with VMware NSX
VMworld 2014: Virtualize your Network with VMware NSXVMworld 2014: Virtualize your Network with VMware NSX
VMworld 2014: Virtualize your Network with VMware NSX
 
Security in a Virtualised Environment
Security in a Virtualised EnvironmentSecurity in a Virtualised Environment
Security in a Virtualised Environment
 
Network Function Virtualization - Security Best Practices AtlSecCon 2015
Network Function Virtualization - Security Best Practices AtlSecCon 2015Network Function Virtualization - Security Best Practices AtlSecCon 2015
Network Function Virtualization - Security Best Practices AtlSecCon 2015
 
VMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesVMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use cases
 
Architecting Secure Web Systems
Architecting Secure Web SystemsArchitecting Secure Web Systems
Architecting Secure Web Systems
 
The Future of Cloud Networking is VMware NSX
The Future of Cloud Networking is VMware NSXThe Future of Cloud Networking is VMware NSX
The Future of Cloud Networking is VMware NSX
 
NFV Security PPT
NFV Security PPTNFV Security PPT
NFV Security PPT
 
Gigamon Pervasive Visibility into SDDC/NSX Deployments
Gigamon Pervasive Visibility into SDDC/NSX DeploymentsGigamon Pervasive Visibility into SDDC/NSX Deployments
Gigamon Pervasive Visibility into SDDC/NSX Deployments
 
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...
 
cloudblanket_nms_ds_revb
cloudblanket_nms_ds_revbcloudblanket_nms_ds_revb
cloudblanket_nms_ds_revb
 
IaaS with Software Defined Networking
IaaS with Software Defined NetworkingIaaS with Software Defined Networking
IaaS with Software Defined Networking
 

Similar to Integration of pola alto and v mware nsx to protect virtual and cloud environments benefits

Atf 3 q15-8 - introducing macro-segementation
Atf 3 q15-8 - introducing macro-segementationAtf 3 q15-8 - introducing macro-segementation
Atf 3 q15-8 - introducing macro-segementation
Mason Mei
 
New Threats, New Approaches in Modern Data Centers
New Threats, New Approaches in Modern Data CentersNew Threats, New Approaches in Modern Data Centers
New Threats, New Approaches in Modern Data Centers
Iben Rodriguez
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochure
Baqar Kazmi
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochure
bakar kazmi
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochure
Baqar kazmi
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochure
Maliha Ali
 

Similar to Integration of pola alto and v mware nsx to protect virtual and cloud environments benefits (20)

OneCloud-VMwareNSX
OneCloud-VMwareNSXOneCloud-VMwareNSX
OneCloud-VMwareNSX
 
Self service it with v realizeautomation and nsx
Self service it with v realizeautomation and nsxSelf service it with v realizeautomation and nsx
Self service it with v realizeautomation and nsx
 
Atf 3 q15-8 - introducing macro-segementation
Atf 3 q15-8 - introducing macro-segementationAtf 3 q15-8 - introducing macro-segementation
Atf 3 q15-8 - introducing macro-segementation
 
New Threats, New Approaches in Modern Data Centers
New Threats, New Approaches in Modern Data CentersNew Threats, New Approaches in Modern Data Centers
New Threats, New Approaches in Modern Data Centers
 
VMware vRealize Network Insight 3.4 whats new
VMware vRealize Network Insight 3.4 whats newVMware vRealize Network Insight 3.4 whats new
VMware vRealize Network Insight 3.4 whats new
 
01-235182-105-9455967283-18042022-125731pm.pptx
01-235182-105-9455967283-18042022-125731pm.pptx01-235182-105-9455967283-18042022-125731pm.pptx
01-235182-105-9455967283-18042022-125731pm.pptx
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 
cn-series-container-firewall.pdf
cn-series-container-firewall.pdfcn-series-container-firewall.pdf
cn-series-container-firewall.pdf
 
Vx9000 datasheet
Vx9000 datasheetVx9000 datasheet
Vx9000 datasheet
 
Whitepaper: Network Virtualization - Happiest Minds
Whitepaper: Network Virtualization - Happiest MindsWhitepaper: Network Virtualization - Happiest Minds
Whitepaper: Network Virtualization - Happiest Minds
 
Comparison between Cisco ACI and VMWARE NSX
Comparison between Cisco ACI and VMWARE NSXComparison between Cisco ACI and VMWARE NSX
Comparison between Cisco ACI and VMWARE NSX
 
VMworld 2015: Introducing Application Self service with Networking and Security
VMworld 2015: Introducing Application Self service with Networking and SecurityVMworld 2015: Introducing Application Self service with Networking and Security
VMworld 2015: Introducing Application Self service with Networking and Security
 
Cisco1000v Net Optics Solution Brief
Cisco1000v Net Optics Solution BriefCisco1000v Net Optics Solution Brief
Cisco1000v Net Optics Solution Brief
 
Deployment driven security
Deployment driven securityDeployment driven security
Deployment driven security
 
DEPLOYMENT-DRIVEN SECURITY CONFIGURATION FOR VIRTUAL NETWORKS
DEPLOYMENT-DRIVEN SECURITY CONFIGURATION FOR VIRTUAL NETWORKSDEPLOYMENT-DRIVEN SECURITY CONFIGURATION FOR VIRTUAL NETWORKS
DEPLOYMENT-DRIVEN SECURITY CONFIGURATION FOR VIRTUAL NETWORKS
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochure
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochure
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochure
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochure
 
Azure F5 Solutions
Azure F5 SolutionsAzure F5 Solutions
Azure F5 Solutions
 

More from David kankam

More from David kankam (13)

How to Create an AWS VPC from Beginning to End and deploy a Windows Instance ...
How to Create an AWS VPC from Beginning to End and deploy a Windows Instance ...How to Create an AWS VPC from Beginning to End and deploy a Windows Instance ...
How to Create an AWS VPC from Beginning to End and deploy a Windows Instance ...
 
Palo Alto U turn NAT for inside user's to access Web Server in a different Zo...
Palo Alto U turn NAT for inside user's to access Web Server in a different Zo...Palo Alto U turn NAT for inside user's to access Web Server in a different Zo...
Palo Alto U turn NAT for inside user's to access Web Server in a different Zo...
 
Resolve a Palo Alto firewall blocking oracle application.
Resolve a Palo Alto firewall blocking oracle application.Resolve a Palo Alto firewall blocking oracle application.
Resolve a Palo Alto firewall blocking oracle application.
 
Creating Cisco ACI Fabric Policy
Creating Cisco ACI Fabric PolicyCreating Cisco ACI Fabric Policy
Creating Cisco ACI Fabric Policy
 
Upcoming Topics To Be Covered On NSX Deployment.
Upcoming Topics To Be Covered On NSX Deployment.Upcoming Topics To Be Covered On NSX Deployment.
Upcoming Topics To Be Covered On NSX Deployment.
 
Deploying The NSX Manager Virtual Appliance
Deploying The NSX Manager Virtual ApplianceDeploying The NSX Manager Virtual Appliance
Deploying The NSX Manager Virtual Appliance
 
Converting From Nexus NX-OS Mode to ACI Mode.
Converting From Nexus NX-OS Mode to ACI Mode.Converting From Nexus NX-OS Mode to ACI Mode.
Converting From Nexus NX-OS Mode to ACI Mode.
 
ACI HIGH LEVEL DESIGN OVERVIEW
ACI HIGH LEVEL DESIGN OVERVIEWACI HIGH LEVEL DESIGN OVERVIEW
ACI HIGH LEVEL DESIGN OVERVIEW
 
SDN THE CISCO WAY
SDN THE CISCO WAYSDN THE CISCO WAY
SDN THE CISCO WAY
 
Nexus lan switching configuration
Nexus lan switching configurationNexus lan switching configuration
Nexus lan switching configuration
 
Cisco virtual port channel high level over view
Cisco virtual port channel high level over viewCisco virtual port channel high level over view
Cisco virtual port channel high level over view
 
Nexus Virtual Device Context high Level Explanation.
Nexus Virtual Device Context high Level Explanation.Nexus Virtual Device Context high Level Explanation.
Nexus Virtual Device Context high Level Explanation.
 
Nexus Virtual Device Context high Level Explanation.
Nexus Virtual Device Context high Level Explanation.Nexus Virtual Device Context high Level Explanation.
Nexus Virtual Device Context high Level Explanation.
 

Recently uploaded

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 

Recently uploaded (20)

When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG Evaluation
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 

Integration of pola alto and v mware nsx to protect virtual and cloud environments benefits

  • 1. Integration of Pola Alto and VMware NSX to protect Virtual and Cloud environments Benefits
  • 2. • With VMware and Palo Alto Networks coming together with an integrated solution that enables companies to realize the full potential of the Software Defined Data Center while providing protection against potential vulnerabilities. The joint solution addresses current challenges faced by data centers including: • Lack of visibility into East-West (VM-to-VM) traffic • Manual, process-intensive networking configurations to deploy security within the virtualized environment • Security not keeping pace with speed of server provisioning • Incomplete or irrelevant feature sets within virtualized network security platforms
  • 3. • VMware NSX network virtualization platform been the leader in Software Defined Data Center networking then by Using the VMware NSX platform’s extensible service insertion and service chaining capabilities, the virtualized next-generation firewall from Palo Alto Networks is automatically and transparently deployed on every ESXi server. Context is shared between VMware NSX and Palo Alto Networks centralized management platform, enabling security teams to dynamically apply security policies to virtualized application creation and changes. This is accomplished while maintaining the separation of duty between security and virtualization/cloud IT administrators.
  • 4. • The integrated solution provides several benefits: • • Better security – enterprises can automate the delivery of Palo Alto Networks next-generation security features including visibility, safe application enablement and protection against known and unknown threats to protect their virtual and cloud environments. Dynamic network security policies stay in sync with virtual application changes. • • Operational flexibility – next-generation security capabilities are deployed in an automated, transparent manner without manual, operational complexities. • • Accelerated deployments of business-critical applications – enterprises can provision security services faster and utilize capacity of cloud infrastructures— more efficiently to deploy, move and scale their applications without worrying about security.
  • 5. • NSX Distributed Firewall • VMware NSX Security platform includes distributed kernel-enabled fire-walling with line-rate performance,virtualization and identity aware with activity monitoring, among other network security features native to network virtualization.
  • 6. • Network Isolation Isolation is the foundation of most network security, whether for compliance, containment or simply keeping development, test and production environments from interacting. • In VMware network virtualization, virtual networks are isolated from any other virtual network and from the underlying physical network by default, delivering the security principle of least privilege. Virtual networks are created in isolation and remain isolated unless specifically connected together. • No physical subnets, no VLANs, no ACLs, no firewall rules are required to enable this isolation. Any isolated virtual network can be made up of workloads distributed anywhere in the data center. • Workloads in the same virtual network can reside on the same or separate hypervisors. Additionally, workloads in several multiple isolated virtual networks can reside on the same hypervisor. Case in point, isolation between virtual networks allows for overlapping IP addresses, making it possible to have isolated development, test and production virtual networks,
  • 7.
  • 8. • each with different application versions, but with the same IP addresses, all operating at the same time, all on the same underlying physical infrastructure. • Virtual networks are also isolated from the underlying physical infrastructure. Because traffic between hypervisors is encapsulated, physical network devices operate in a completely different address space than the workloads connected to the virtual networks.
  • 9. • Network segmentation Network isolation is between discrete entities. Network segmentation applies to homogeneous entities, e.g. protection within a group or three-tier application as shown below.
  • 10.
  • 11. • Traditionally, network segmentation has being a function of a physical firewall or router, designed to allow or deny traffic between network segments or tiers. For example, segmenting traffic between a web tier, application tier and database tier. Traditional processes for defining and configuring segmentation are time consuming and highly prone to human error, resulting in many security breaches. Implementation requires deep and specific expertise in device configuration syntax, network addressing, application ports and protocols.
  • 12. • Network segmentation, like isolation, is a core capability of VMware NSX network virtualization. A virtual network can support a multi-tier network environment, meaning multiple L2 segments with L3 segmentation or micro-segmentation on a single L2 segment using distributed firewall rules. In a virtual network, network services (L2, L3, ACL, Firewall, QoS, etc.) that are provisioned with a workload are programmatically created and distributed to the hypervisor vSwitch. Network services, including L3 segmentation and firewalling, are enforced at the virtual interface.
  • 13. • Isolation and segmentation requires identifying application flows and enforcing security policies, which can be created pro-grammatically or using a template-based process. Integrating the virtual isolation and segmentation with physical firewall functions and workflow has been the Achilles’ heel of securing virtual data centers. • This integration with Palo Alto Networks physical and virtual next- generation firewall services with the NSX native security capabilities allows cloud administration a powerful method to manage the risk associated with integration between physical and virtual domain.
  • 14. • Palo Alto Networks Solution Components • The Palo Alto Networks VM-Series and NSX integrated solution includes Panorama and the VM-Series nextgeneration firewall. The following are key elements of the solution:
  • 15. • • VM-Series Firewall — The VM-Series firewall is a next-generation firewall in virtual form factor that extends safe application enablement to virtualized and cloud environments using the same PAN-OS feature set available in hardware firewalls. This means when applied to a virtualized and cloud environment, Palo Alto Networks can determine the exact identity of the applications traffic traversing from VM to VM using App-ID technology. Coordinated threat protection can then be applied to the allowed traffic, blocking known malware sites, preventing vulnerability exploits, viruses, spyware and malicious DNS queries using Content-ID technology.
  • 16. • The VM-Series NSX edition firewall is jointly developed by Palo Alto Networks and VMware. This solution uses the NetX API to integrate the Palo Alto Networks next-generation firewalls and Panorama with VMware ESXi servers to provide comprehensive visibility and safe application enablement of all data-center traffic including intra/inter host virtual machine communications.
  • 17.
  • 18.
  • 19. • The VM-1000-HV is deployed as a network introspection service with VMware NSX and Panorama. This deployment is ideal for east-west traffic inspection, and it also can secure north-south traffic.
  • 20. • • Dynamic Address Groups — In a virtualized and cloud environment where virtual machines often change functions and can move from server to server, building security policies based on static IP addresses alone can have limited value. The Dynamic Address Groups feature in PAN-OS 6.0 allows you to create policies using tags as an identifier for virtual machines instead of a static object definition. Multiple tags representing virtual machine attributes such as IP address and operating system can be resolved within a Dynamic Address Group, allowing you to dynamically apply policies to virtual machines as they are created or travel across the network.
  • 21. • • Panorama Centralized management — Panorama enables you to centrally manage the process of configuring devices, deploying security policies, performing forensic analysis, and generating reports across your entire network of next-generation firewalls. Panorama automatically registers the Palo Alto Networks VM-Series as a service to NSX. Once the service is registered, it can be deployed to one or more clusters. Each host on the cluster will automatically have a VM-Series firewall deployed, licensed, registered, and configured.
  • 22.
  • 23. Below is a high level over view Of the integration
  • 24. VMware NSX Distributed Firewall Palo Alto Integration benefits • VMware NSX network virtualization platform provides L2-L4 stateful firewall features to deliver segmentation within virtual networks. Environments that require advanced, application-level network security capabilities can leverage VMware NSX to distribute, enable and enforce advanced network security services in a virtualized network context. NSX distributes network services into the VM vNIC to form a logical pipeline of services applied to virtual network traffic.
  • 25. • The Palo Alto Networks VM-Series firewall integrates directly into this logical pipeline, enabling visibility and safe enablement of VM traffic, along with safe enablement of applications and complete threat protection. Another powerful benefit of the integrated NSX and Palo Alto Networks solution is the ability to build policies that leverage NSX service insertion, chaining and steering to drive service execution in the logical services pipeline, based on the result of other services, making it possible to coordinate otherwise completely unrelated network security services from multiple vendors.