SlideShare a Scribd company logo
1 of 64
www.5nine.com
Tips, Tricks and Proven Methodologies to Simplify
Software-Defined Networking (SDN)Across
Private and Public Clouds
5nineUnified CloudManagement andSecurity Platform
We simplify, centralize and secure the Microsoft Cloud – public, private and hybrid – so both enterprise IT and Service
Provider customers can focus on accelerating their business.
Certified for Windows Server 2016, 2012 R2, 2012, Microsoft Hyper-V, Microsoft Azure
1,000+
Customers
100+
Countries
100K+
Cloud & Virtualization
Administrators
5M+
Virtual Machines Managed &
Protected
ReduceSDNCosts.Accelerate SDNTimelines.
Agenda
Software Defined Networking (SDN) 101
• What is SDN?
• Who’s Responsible for SDN?
• Why Choose SDN?
• Potential SDN Challenges
Best Practices for SDN Configuration
• Planning
• Implementation
SDN Management Made Easy (HINT: Monitoring)
• Traditional Network Management vs. SDN
• SDN Management Best Practices
3 SDN Misconfigurations You Don’t Want to Make
• Common SDN Threats
• Common SDN Security Mistakes
• SDN Security Best Practices
How 5nine Can Save You Thousands of Hours Configuring
and Managing SDN
• What Sets 5nine Apart for SDN
• 5nine Demonstration
Closing Comments and Next Steps
• Q&A
• Next Steps
• Amazon Gift Card Giveaways
Traditional Networking Software Defined Networking
Functionality implemented through a
dedicated hardware appliance
Decouples hardware from software
(separates the control plane from the data plane)
Traditional Networking Software Defined Networking
Functionality implemented through a
dedicated hardware appliance
Decouples hardware from software
(separates the control plane from the data plane)
Uses routers, switches, firewalls or
application controllers
Control plane determines were to send traffic and how
the network is administered
Traditional Networking Software Defined Networking
Functionality implemented through a
dedicated hardware appliance
Decouples hardware from software
(separates the control plane from the data plane)
Uses routers, switches, firewalls or
application controllers
Control plane determines were to send traffic and how
the network is administered
Each appliance must be manually configured
or updated by an IT admin
Data plane carries out decisions made in the control
plane/console and forwards traffic
Traditional Networking Software Defined Networking
Functionality implemented through a
dedicated hardware appliance
Decouples hardware from software
(separates the control plane from the data plane)
Uses routers, switches, firewalls or
application controllers
Control plane determines were to send traffic and how
the network is administered
Each appliance must be manually configured
or updated by an IT admin
Data plane carries out decisions made in the control
plane/console and forwards traffic
100%
Centrally Managed
Who is Responsible for Network
Configuration?
Virtualization Admin
Hardware Defined Model
Storage Admin
Who is Responsible for Network
Configuration?
Virtualization Admin
Hardware Defined Model
Storage Admin
Who is Responsible for Network
Configuration?
Virtualization Admin
Hardware Defined Model
Network Admin
Who is Responsible for Network
Configuration?
Virtualization Admin
Software Defined Model
Higher
ROI
Who is Responsible for Network
Configuration?
Virtualization Admin
Software Defined Model
Knows how to bring up servers and virtual machines
Higher
ROI
Who is Responsible for Network
Configuration?
Virtualization Admin
Software Defined Model
Knows how to bring up servers and virtual machines
Knows how to bring in storage (which is essentially on the network now)
Higher
ROI
Virtualization Admin
Software Defined Model
Knows how to bring up servers and virtual machines
Knows how to bring in storage (which is essentially on the network now)
Know how to interact with physical hardware
Higher
ROI
Who is Responsible for Network
Configuration?
Who is Responsible for Network
Configuration?
Virtualization Admin
Software Defined Model
Knows how to bring up servers and virtual machines
Knows how to bring in storage (which is essentially on the network now)
Know how to interact with physical hardware
Know how to interact with open standards and protocols such as BGP
Higher
ROI
Who is Responsible for Network
Configuration?
Virtualization Admin
Software Defined Model
Knows how to bring up servers and virtual machines
Knows how to bring in storage (which is essentially on the network now)
Know how to interact with physical hardware
Know how to interact with open standards and protocols such as BGP
Higher
ROI
Advantages of SDN
 Increase operational agility and scalability
• More efficiently manage network resources
• Add bandwidth “on demand”
• Program directly into the software layer
Advantages of SDN
 Increase operational agility and scalability
• More efficiently manage network resources
• Add bandwidth “on demand”
• Program directly into the software layer
 Centralize network management
• Manage entire network as a single unit
• Enterprise-wide optimization and planning, including dynamic network reconfiguration
• Provides a single place for apps to interact (auth, etc.)
• Provides a centralized security control point where security information can be distributed evenly through
business networks across multiple sites
Advantages of SDN
 Increase operational agility and scalability
• More efficiently manage network resources
• Add bandwidth “on demand”
• Program directly into the software layer
 Centralize network management
• Manage entire network as a single unit
• Enterprise-wide optimization and planning, including dynamic network reconfiguration
• Provides a single place for apps to interact (auth, etc.)
• Provides a centralized security control point where security information can be distributed evenly through
business networks across multiple sites
 Exert external control
• Enables network apps
• Provides easy integration to leverage existing knowledge, experience and tools
Advantages of SDN
 Vendor neutral with an open-standards base
• Reduces risk of getting locked in on the technical side because of vendor-specific hardware requirements
• Can interface with NetFlow’s, OpenFlow’s and others from switch manufacturers
Advantages of SDN
 Vendor neutral with an open-standards base
• Reduces risk of getting locked in on the technical side because of vendor-specific hardware requirements
• Can interface with NetFlow’s, OpenFlow’s and others from switch manufacturers
 Easier to maintain
• Reduces the need for hardware refreshes and manual updates
Advantages of SDN
 Vendor neutral with an open-standards base
• Reduces risk of getting locked in on the technical side because of vendor-specific hardware requirements
• Can interface with NetFlow’s, OpenFlow’s and others from switch manufacturers
 Easier to maintain
• Reduces the need for hardware refreshes and manual updates
 Lowers barrier of entry
• Network hardware becomes a commodity, driving down costs
Challenges of SDN
 Controller reliability and stability
Challenges of SDN
 Controller reliability and stability
 Unexpected interactions between features
Challenges of SDN
 Controller reliability and stability
 Unexpected interactions between features
 Controller security (runs on a general purpose computer and OS)
Challenges of SDN
 Controller reliability and stability
 Unexpected interactions between features
 Controller security (runs on a general purpose computer and OS)
 Network sprawl
• SDNs virtual nature can make it tempting to create countless network segments, but each new network
segment introduces its own risk and security requirements
Challenges of SDN
 Controller reliability and stability
 Unexpected interactions between features
 Controller security (runs on a general purpose computer and OS)
 Network sprawl
• SDNs virtual nature can make it tempting to create countless network segments, but each new network
segment introduces its own risk and security requirements
 Service or application sprawl
• New services can introduce security threats as programmers and network administrators may unwittingly
introduce at-risk code
• The introduction of new services can extend the threat network wide through a centralized or partially
distributed controller
How to Plan for SDN
1
Determine if your environment will match hardware
and software prerequisites
How to Plan for SDN
1
2
Determine if your environment will match hardware
and software prerequisites
Map out your proposed network
How to Plan for SDN
1
3
2
Determine if your environment will match hardware
and software prerequisites
Map out your proposed network
Plan routing between networks
How to Plan for SDN
1
3
2
4
Determine if your environment will match hardware
and software prerequisites
Map out your proposed network
Determine vland or subject access
Plan routing between networks
How to Plan for SDN
1
3
5
2
4
Determine if your environment will match hardware
and software prerequisites
Map out your proposed network
Determine vland or subject access
Plan routing between networks
Map out access controls (including roles)
How to Plan for SDN
1
3
5
2
4
6
Determine if your environment will match hardware
and software prerequisites
Map out your proposed network
Determine vland or subject access
Address spaces on the vnet
Plan routing between networks
Map out access controls (including roles)
How to Plan for SDN
1
3
5
7
2
4
6
Determine if your environment will match hardware
and software prerequisites
Map out your proposed network
Determine vland or subject access
Address spaces on the vnet
Plan routing between networks
Map out access controls (including roles)
Determine peering
How to Plan for SDN
1
3
5
7
2
4
6
8
Determine if your environment will match hardware
and software prerequisites
Map out your proposed network
Determine vland or subject access
Address spaces on the vnet
Analyze projected traffic
Plan routing between networks
Map out access controls (including roles)
Determine peering
SDN Implementation
 Build out your software-defined networks
SDN Implementation
 Build out your software-defined networks
 Build resource groups (applications, etc.)
SDN Implementation
 Build out your software-defined networks
 Build resource groups (applications, etc.)
 Build out your vnet(s)
SDN Implementation
 Build out your software-defined networks
 Build resource groups (applications, etc.)
 Build out your vnet(s)
 Perform comprehensive testing
• Sample methods (note: vnets lack built-in testing tools)
 Build a VM for testing purposes
• Put the VM on the network
• Use Apache and open port 80
• Create a new VM and use it to ping the original VM
• Open SSH (secure shell) and use port 22
• Use the Azure Serial Console (currently in preview), especially for Linux VMs
 Compare VM to historical stats
• Look at stats such as data disks, max IPS, local SSD, and load balancing
Traditional Networking Management SDN Management
Set up well-known protocol parameters and
track configuration changes
Configure customized and ever-evolving software, setup data
and control plane
Management: Traditional vs. SDN
Traditional Networking Management SDN Management
Set up well-known protocol parameters and
track configuration changes
Configure customized and ever-evolving software, setup data
and control plane
Set up alternate routs in case of failure Configure alternate forwarding device behavior in case
of failure
Management: Traditional vs. SDN
Traditional Networking Management SDN Management
Set up well-known protocol parameters and
track configuration changes
Configure customized and ever-evolving software, setup data
and control plane
Set up alternate routs in case of failure Configure alternate forwarding device behavior in case
of failure
Assign and reserve bandwidth. Enforce quality of
service configuration
Monitor performance of network applications and adjust
connection quality between data plane and control
plane
Management: Traditional vs. SDN
Traditional Networking Management SDN Management
Control network access and prevent intrusion,
spoofing and DoS attacks
Use cloud security components, such as virtual firewalls, to
grant isolation to network applications, prevent
eavesdropping and capture of traffic
Management: Traditional vs. SDN
SDN Monitoring Tips
 Monitoring
• Important metrics to monitor:
 Ingress and egress of vnets
SDN Monitoring Tips
 Monitoring
• Important metrics to monitor:
 Ingress and egress of vnets
 Ingress and egress of your nics
SDN Monitoring Tips
 Monitoring
• Important metrics to monitor:
 Ingress and egress of vnets
 Ingress and egress of your nics
 Load balance network w/ a load balancer (Microsoft or 3rd party)
• Ensure the load matches your policy
• Easy to misconfigure
SDN Monitoring Tips
 Monitoring
• Important metrics to monitor:
 Ingress and egress of vnets
 Ingress and egress of your nics
 Load balance network w/ a load balancer (Microsoft or 3rd party)
• Ensure the load matches your policy
• Easy to misconfigure
 Monitor uptime of solutions/ services
• Ensure it is functioning at the application level and all the way down to the network layer
Common SDN Threats
 SDN specific threats (implement general security best practices and use cloud security solutions)
• Manipulation of information (data forging)
• Software, firmware, and API exploits
• Remote SDN app exploits
• Malicious software like viruses and malware
• Unauthorized access
• Traffic sniffing and diversion
Common SDN Threats
 SDN specific threats (implement general security best practices and use cloud security solutions)
• Manipulation of information (data forging)
• Software, firmware, and API exploits
• Remote SDN app exploits
• Malicious software like viruses and malware
• Unauthorized access
• Traffic sniffing and diversion
 General network virtualization threats (implement general security best practices)
• Virtualized host abuse
• Network virtualization bypassing
Common SDN Threats
 General network infrastructure threats (generally covered by cloud provider)
• Physical threats
• Damage/ loss
• Failures/ malfunctions
• Outages
• Disasters
• Legal
Common SDN Security Mistakes
 Using public IPs in your network
Common SDN Security Mistakes
 Using public IPs in your network
 Opening up network rules to the world
Common SDN Security Mistakes
 Using public IPs in your network
 Opening up network rules to the world
 Over-relying on open source packages without researching known or suspected vulnerabilities
SDN Security Best Practices
 Secure your own data
• By default, protect access to your VMs
SDN Security Best Practices
 Secure your own data
• By default, protect access to your VMs
 Use network security groups in Azure
• Control what objects and ports can ingress and egress
• Second layer
SDN Security Best Practices
 Secure your own data
• By default, protect access to your VMs
 Use network security groups in Azure
• Control what objects and ports can ingress and egress
• Second layer
 Control routing behavior
SDN Security Best Practices
 Secure your own data
• By default, protect access to your VMs
 Use network security groups in Azure
• Control what objects and ports can ingress and egress
• Second layer
 Control routing behavior
 Enable forced tunneling
SDN Security Best Practices
 Deploy virtual network appliances and DMZs
• Use built-in virtual firewalls or 3rd-party firewalls
• Use a security solution that includes capabilities such as:
 Intrusion detection
 Vulnerability management
 Application control
 Network-based anomaly detection
 Web filtering
 Agentless Antivirus
 Botnet protection
SDN Security Best Practices
 Deploy virtual network appliances and DMZs
• Use built-in virtual firewalls or 3rd-party firewalls
• Use a security solution that includes capabilities such as:
 Intrusion detection
 Vulnerability management
 Application control
 Network-based anomaly detection
 Web filtering
 Agentless Antivirus
 Botnet protection
 Avoid exposure to the Internet with dedicated WAN links
SDN Security Best Practices
 Deploy virtual network appliances and DMZs
• Use built-in virtual firewalls or 3rd-party firewalls
• Use a security solution that includes capabilities such as:
 Intrusion detection
 Vulnerability management
 Application control
 Network-based anomaly detection
 Web filtering
 Agentless Antivirus
 Botnet protection
 Avoid exposure to the Internet with dedicated WAN links
 Optimize uptime and performance
• Use load balancing
SDN Security Best Practices
 Disable RDP access to Azure VMs
SDN Security Best Practices
 Disable RDP access to Azure VMs
 Manage VM security posture and consistently monitor VM performance
How 5nine Simplifies SDN Management
Demo!
THANK YOU!
Questions?
Contact us:
sales@5nine.com
Learn more:
https://www.5nine.com/5nine-
manager-datacenter/

More Related Content

What's hot

System center 2012 configurations manager
System center 2012 configurations managerSystem center 2012 configurations manager
System center 2012 configurations managerBelarmino Tomicha
 
Security of software defined networking (sdn) and cognitive radio network (crn)
Security of software defined networking (sdn) and  cognitive radio network (crn)Security of software defined networking (sdn) and  cognitive radio network (crn)
Security of software defined networking (sdn) and cognitive radio network (crn)Ameer Sameer
 
VMworld 2013: VMware NSX: A Customer’s Perspective
VMworld 2013: VMware NSX: A Customer’s Perspective VMworld 2013: VMware NSX: A Customer’s Perspective
VMworld 2013: VMware NSX: A Customer’s Perspective VMworld
 
Top 5 Reasons To Consider SolarWinds IPAM Over Infoblox
Top 5 Reasons To Consider SolarWinds IPAM Over InfobloxTop 5 Reasons To Consider SolarWinds IPAM Over Infoblox
Top 5 Reasons To Consider SolarWinds IPAM Over InfobloxSolarWinds
 
Cloud Computing security Challenges for Defense Forces
Cloud Computing security Challenges for Defense ForcesCloud Computing security Challenges for Defense Forces
Cloud Computing security Challenges for Defense Forcescommandersaini
 
Cross selling 5
Cross selling 5Cross selling 5
Cross selling 5Sen Nathan
 
Network Troubleshooting - Part 2
Network Troubleshooting - Part 2Network Troubleshooting - Part 2
Network Troubleshooting - Part 2SolarWinds
 
Windows Service Hardening
Windows Service HardeningWindows Service Hardening
Windows Service HardeningDigital Bond
 
Migrating To Cloud & Security @ FOBE 2011
Migrating To Cloud & Security @ FOBE 2011Migrating To Cloud & Security @ FOBE 2011
Migrating To Cloud & Security @ FOBE 2011commandersaini
 
Telco Cloud 03 - Introduction to SDN
Telco Cloud 03 - Introduction to SDNTelco Cloud 03 - Introduction to SDN
Telco Cloud 03 - Introduction to SDNVikas Shokeen
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportDell EMC World
 
ANS Solution Portfolio
ANS Solution PortfolioANS Solution Portfolio
ANS Solution Portfoliojclauer
 
Big Events Cause Network Mayhem
Big Events Cause Network MayhemBig Events Cause Network Mayhem
Big Events Cause Network MayhemPacketTrap Msp
 
DEVNET-1114 Automated Management Using SDN/NFV
DEVNET-1114	Automated Management Using SDN/NFVDEVNET-1114	Automated Management Using SDN/NFV
DEVNET-1114 Automated Management Using SDN/NFVCisco DevNet
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementNovell
 
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview VMworld
 
SDN - a new security paradigm?
SDN - a new security paradigm?SDN - a new security paradigm?
SDN - a new security paradigm?Sophos Benelux
 

What's hot (20)

Cloud computing
Cloud computingCloud computing
Cloud computing
 
System center 2012 configurations manager
System center 2012 configurations managerSystem center 2012 configurations manager
System center 2012 configurations manager
 
ETS Services Outline
ETS Services OutlineETS Services Outline
ETS Services Outline
 
Security of software defined networking (sdn) and cognitive radio network (crn)
Security of software defined networking (sdn) and  cognitive radio network (crn)Security of software defined networking (sdn) and  cognitive radio network (crn)
Security of software defined networking (sdn) and cognitive radio network (crn)
 
VMworld 2013: VMware NSX: A Customer’s Perspective
VMworld 2013: VMware NSX: A Customer’s Perspective VMworld 2013: VMware NSX: A Customer’s Perspective
VMworld 2013: VMware NSX: A Customer’s Perspective
 
Top 5 Reasons To Consider SolarWinds IPAM Over Infoblox
Top 5 Reasons To Consider SolarWinds IPAM Over InfobloxTop 5 Reasons To Consider SolarWinds IPAM Over Infoblox
Top 5 Reasons To Consider SolarWinds IPAM Over Infoblox
 
Cloud Computing security Challenges for Defense Forces
Cloud Computing security Challenges for Defense ForcesCloud Computing security Challenges for Defense Forces
Cloud Computing security Challenges for Defense Forces
 
Cross selling 5
Cross selling 5Cross selling 5
Cross selling 5
 
Network Troubleshooting - Part 2
Network Troubleshooting - Part 2Network Troubleshooting - Part 2
Network Troubleshooting - Part 2
 
Windows Service Hardening
Windows Service HardeningWindows Service Hardening
Windows Service Hardening
 
Migrating To Cloud & Security @ FOBE 2011
Migrating To Cloud & Security @ FOBE 2011Migrating To Cloud & Security @ FOBE 2011
Migrating To Cloud & Security @ FOBE 2011
 
Telco Cloud 03 - Introduction to SDN
Telco Cloud 03 - Introduction to SDNTelco Cloud 03 - Introduction to SDN
Telco Cloud 03 - Introduction to SDN
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
 
ANS Solution Portfolio
ANS Solution PortfolioANS Solution Portfolio
ANS Solution Portfolio
 
Big Events Cause Network Mayhem
Big Events Cause Network MayhemBig Events Cause Network Mayhem
Big Events Cause Network Mayhem
 
DEVNET-1114 Automated Management Using SDN/NFV
DEVNET-1114	Automated Management Using SDN/NFVDEVNET-1114	Automated Management Using SDN/NFV
DEVNET-1114 Automated Management Using SDN/NFV
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
 
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
 
SDN - a new security paradigm?
SDN - a new security paradigm?SDN - a new security paradigm?
SDN - a new security paradigm?
 
Fore scout nac-datasheet
Fore scout nac-datasheetFore scout nac-datasheet
Fore scout nac-datasheet
 

Similar to Simplifying SDN Networking Across Private and Public Clouds

Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Srinivasa Addepalli
 
Introduction to SDN and NFV
Introduction to SDN and NFVIntroduction to SDN and NFV
Introduction to SDN and NFVCoreStack
 
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...
Visualizing Your Network Health -  Driving Visibility in Increasingly Complex...Visualizing Your Network Health -  Driving Visibility in Increasingly Complex...
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...DellNMS
 
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014SAMeh Zaghloul
 
Future Proofing your Data Center Network
Future Proofing your Data Center NetworkFuture Proofing your Data Center Network
Future Proofing your Data Center NetworkInnoTech
 
VMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesVMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesAngel Villar Garea
 
Software_Defined_Networking.pptx
Software_Defined_Networking.pptxSoftware_Defined_Networking.pptx
Software_Defined_Networking.pptxAsfawGedamu
 
OVNC 2015-Software-Defined Networking: Where Are We Today?
OVNC 2015-Software-Defined Networking: Where Are We Today?OVNC 2015-Software-Defined Networking: Where Are We Today?
OVNC 2015-Software-Defined Networking: Where Are We Today?NAIM Networks, Inc.
 
Software Defined Networks - Unit -1- class lecture notes.pdf
Software Defined Networks - Unit -1- class lecture notes.pdfSoftware Defined Networks - Unit -1- class lecture notes.pdf
Software Defined Networks - Unit -1- class lecture notes.pdfsoftwaretrainer2elys
 
VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...
VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...
VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...VMworld
 
[OpenStack Day in Korea 2015] Track 2-3 - 오픈스택 클라우드에 최적화된 네트워크 가상화 '누아지(Nuage)'
[OpenStack Day in Korea 2015] Track 2-3 - 오픈스택 클라우드에 최적화된 네트워크 가상화 '누아지(Nuage)'[OpenStack Day in Korea 2015] Track 2-3 - 오픈스택 클라우드에 최적화된 네트워크 가상화 '누아지(Nuage)'
[OpenStack Day in Korea 2015] Track 2-3 - 오픈스택 클라우드에 최적화된 네트워크 가상화 '누아지(Nuage)'OpenStack Korea Community
 
Visualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your NetworkVisualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your NetworkDellNMS
 
Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges SolarWinds
 
WWT Software-Defined Networking Guide
WWT Software-Defined Networking GuideWWT Software-Defined Networking Guide
WWT Software-Defined Networking GuideJoel W. King
 
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...Cisco Enterprise Networks
 
Software defined network-- SDN
Software defined network-- SDNSoftware defined network-- SDN
Software defined network-- SDNAadarsh Sharma
 

Similar to Simplifying SDN Networking Across Private and Public Clouds (20)

Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2
 
Introduction to SDN and NFV
Introduction to SDN and NFVIntroduction to SDN and NFV
Introduction to SDN and NFV
 
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...
Visualizing Your Network Health -  Driving Visibility in Increasingly Complex...Visualizing Your Network Health -  Driving Visibility in Increasingly Complex...
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...
 
Sdn
SdnSdn
Sdn
 
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
 
Future Proofing your Data Center Network
Future Proofing your Data Center NetworkFuture Proofing your Data Center Network
Future Proofing your Data Center Network
 
VMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesVMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use cases
 
Sdn primer pdf
Sdn primer pdfSdn primer pdf
Sdn primer pdf
 
Software_Defined_Networking.pptx
Software_Defined_Networking.pptxSoftware_Defined_Networking.pptx
Software_Defined_Networking.pptx
 
OVNC 2015-Software-Defined Networking: Where Are We Today?
OVNC 2015-Software-Defined Networking: Where Are We Today?OVNC 2015-Software-Defined Networking: Where Are We Today?
OVNC 2015-Software-Defined Networking: Where Are We Today?
 
Software Defined Networks - Unit -1- class lecture notes.pdf
Software Defined Networks - Unit -1- class lecture notes.pdfSoftware Defined Networks - Unit -1- class lecture notes.pdf
Software Defined Networks - Unit -1- class lecture notes.pdf
 
VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...
VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...
VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...
 
Evolve v2.3 data_sheet
Evolve v2.3 data_sheetEvolve v2.3 data_sheet
Evolve v2.3 data_sheet
 
[OpenStack Day in Korea 2015] Track 2-3 - 오픈스택 클라우드에 최적화된 네트워크 가상화 '누아지(Nuage)'
[OpenStack Day in Korea 2015] Track 2-3 - 오픈스택 클라우드에 최적화된 네트워크 가상화 '누아지(Nuage)'[OpenStack Day in Korea 2015] Track 2-3 - 오픈스택 클라우드에 최적화된 네트워크 가상화 '누아지(Nuage)'
[OpenStack Day in Korea 2015] Track 2-3 - 오픈스택 클라우드에 최적화된 네트워크 가상화 '누아지(Nuage)'
 
Visualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your NetworkVisualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your Network
 
Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
WWT Software-Defined Networking Guide
WWT Software-Defined Networking GuideWWT Software-Defined Networking Guide
WWT Software-Defined Networking Guide
 
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
 
Software defined network-- SDN
Software defined network-- SDNSoftware defined network-- SDN
Software defined network-- SDN
 

Recently uploaded

What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningVitsRangannavar
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 

Recently uploaded (20)

What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learning
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 

Simplifying SDN Networking Across Private and Public Clouds

  • 1. www.5nine.com Tips, Tricks and Proven Methodologies to Simplify Software-Defined Networking (SDN)Across Private and Public Clouds
  • 2. 5nineUnified CloudManagement andSecurity Platform We simplify, centralize and secure the Microsoft Cloud – public, private and hybrid – so both enterprise IT and Service Provider customers can focus on accelerating their business. Certified for Windows Server 2016, 2012 R2, 2012, Microsoft Hyper-V, Microsoft Azure 1,000+ Customers 100+ Countries 100K+ Cloud & Virtualization Administrators 5M+ Virtual Machines Managed & Protected ReduceSDNCosts.Accelerate SDNTimelines.
  • 3. Agenda Software Defined Networking (SDN) 101 • What is SDN? • Who’s Responsible for SDN? • Why Choose SDN? • Potential SDN Challenges Best Practices for SDN Configuration • Planning • Implementation SDN Management Made Easy (HINT: Monitoring) • Traditional Network Management vs. SDN • SDN Management Best Practices 3 SDN Misconfigurations You Don’t Want to Make • Common SDN Threats • Common SDN Security Mistakes • SDN Security Best Practices How 5nine Can Save You Thousands of Hours Configuring and Managing SDN • What Sets 5nine Apart for SDN • 5nine Demonstration Closing Comments and Next Steps • Q&A • Next Steps • Amazon Gift Card Giveaways
  • 4. Traditional Networking Software Defined Networking Functionality implemented through a dedicated hardware appliance Decouples hardware from software (separates the control plane from the data plane)
  • 5. Traditional Networking Software Defined Networking Functionality implemented through a dedicated hardware appliance Decouples hardware from software (separates the control plane from the data plane) Uses routers, switches, firewalls or application controllers Control plane determines were to send traffic and how the network is administered
  • 6. Traditional Networking Software Defined Networking Functionality implemented through a dedicated hardware appliance Decouples hardware from software (separates the control plane from the data plane) Uses routers, switches, firewalls or application controllers Control plane determines were to send traffic and how the network is administered Each appliance must be manually configured or updated by an IT admin Data plane carries out decisions made in the control plane/console and forwards traffic
  • 7. Traditional Networking Software Defined Networking Functionality implemented through a dedicated hardware appliance Decouples hardware from software (separates the control plane from the data plane) Uses routers, switches, firewalls or application controllers Control plane determines were to send traffic and how the network is administered Each appliance must be manually configured or updated by an IT admin Data plane carries out decisions made in the control plane/console and forwards traffic 100% Centrally Managed
  • 8. Who is Responsible for Network Configuration? Virtualization Admin Hardware Defined Model
  • 9. Storage Admin Who is Responsible for Network Configuration? Virtualization Admin Hardware Defined Model
  • 10. Storage Admin Who is Responsible for Network Configuration? Virtualization Admin Hardware Defined Model Network Admin
  • 11. Who is Responsible for Network Configuration? Virtualization Admin Software Defined Model Higher ROI
  • 12. Who is Responsible for Network Configuration? Virtualization Admin Software Defined Model Knows how to bring up servers and virtual machines Higher ROI
  • 13. Who is Responsible for Network Configuration? Virtualization Admin Software Defined Model Knows how to bring up servers and virtual machines Knows how to bring in storage (which is essentially on the network now) Higher ROI
  • 14. Virtualization Admin Software Defined Model Knows how to bring up servers and virtual machines Knows how to bring in storage (which is essentially on the network now) Know how to interact with physical hardware Higher ROI Who is Responsible for Network Configuration?
  • 15. Who is Responsible for Network Configuration? Virtualization Admin Software Defined Model Knows how to bring up servers and virtual machines Knows how to bring in storage (which is essentially on the network now) Know how to interact with physical hardware Know how to interact with open standards and protocols such as BGP Higher ROI
  • 16. Who is Responsible for Network Configuration? Virtualization Admin Software Defined Model Knows how to bring up servers and virtual machines Knows how to bring in storage (which is essentially on the network now) Know how to interact with physical hardware Know how to interact with open standards and protocols such as BGP Higher ROI
  • 17. Advantages of SDN  Increase operational agility and scalability • More efficiently manage network resources • Add bandwidth “on demand” • Program directly into the software layer
  • 18. Advantages of SDN  Increase operational agility and scalability • More efficiently manage network resources • Add bandwidth “on demand” • Program directly into the software layer  Centralize network management • Manage entire network as a single unit • Enterprise-wide optimization and planning, including dynamic network reconfiguration • Provides a single place for apps to interact (auth, etc.) • Provides a centralized security control point where security information can be distributed evenly through business networks across multiple sites
  • 19. Advantages of SDN  Increase operational agility and scalability • More efficiently manage network resources • Add bandwidth “on demand” • Program directly into the software layer  Centralize network management • Manage entire network as a single unit • Enterprise-wide optimization and planning, including dynamic network reconfiguration • Provides a single place for apps to interact (auth, etc.) • Provides a centralized security control point where security information can be distributed evenly through business networks across multiple sites  Exert external control • Enables network apps • Provides easy integration to leverage existing knowledge, experience and tools
  • 20. Advantages of SDN  Vendor neutral with an open-standards base • Reduces risk of getting locked in on the technical side because of vendor-specific hardware requirements • Can interface with NetFlow’s, OpenFlow’s and others from switch manufacturers
  • 21. Advantages of SDN  Vendor neutral with an open-standards base • Reduces risk of getting locked in on the technical side because of vendor-specific hardware requirements • Can interface with NetFlow’s, OpenFlow’s and others from switch manufacturers  Easier to maintain • Reduces the need for hardware refreshes and manual updates
  • 22. Advantages of SDN  Vendor neutral with an open-standards base • Reduces risk of getting locked in on the technical side because of vendor-specific hardware requirements • Can interface with NetFlow’s, OpenFlow’s and others from switch manufacturers  Easier to maintain • Reduces the need for hardware refreshes and manual updates  Lowers barrier of entry • Network hardware becomes a commodity, driving down costs
  • 23. Challenges of SDN  Controller reliability and stability
  • 24. Challenges of SDN  Controller reliability and stability  Unexpected interactions between features
  • 25. Challenges of SDN  Controller reliability and stability  Unexpected interactions between features  Controller security (runs on a general purpose computer and OS)
  • 26. Challenges of SDN  Controller reliability and stability  Unexpected interactions between features  Controller security (runs on a general purpose computer and OS)  Network sprawl • SDNs virtual nature can make it tempting to create countless network segments, but each new network segment introduces its own risk and security requirements
  • 27. Challenges of SDN  Controller reliability and stability  Unexpected interactions between features  Controller security (runs on a general purpose computer and OS)  Network sprawl • SDNs virtual nature can make it tempting to create countless network segments, but each new network segment introduces its own risk and security requirements  Service or application sprawl • New services can introduce security threats as programmers and network administrators may unwittingly introduce at-risk code • The introduction of new services can extend the threat network wide through a centralized or partially distributed controller
  • 28. How to Plan for SDN 1 Determine if your environment will match hardware and software prerequisites
  • 29. How to Plan for SDN 1 2 Determine if your environment will match hardware and software prerequisites Map out your proposed network
  • 30. How to Plan for SDN 1 3 2 Determine if your environment will match hardware and software prerequisites Map out your proposed network Plan routing between networks
  • 31. How to Plan for SDN 1 3 2 4 Determine if your environment will match hardware and software prerequisites Map out your proposed network Determine vland or subject access Plan routing between networks
  • 32. How to Plan for SDN 1 3 5 2 4 Determine if your environment will match hardware and software prerequisites Map out your proposed network Determine vland or subject access Plan routing between networks Map out access controls (including roles)
  • 33. How to Plan for SDN 1 3 5 2 4 6 Determine if your environment will match hardware and software prerequisites Map out your proposed network Determine vland or subject access Address spaces on the vnet Plan routing between networks Map out access controls (including roles)
  • 34. How to Plan for SDN 1 3 5 7 2 4 6 Determine if your environment will match hardware and software prerequisites Map out your proposed network Determine vland or subject access Address spaces on the vnet Plan routing between networks Map out access controls (including roles) Determine peering
  • 35. How to Plan for SDN 1 3 5 7 2 4 6 8 Determine if your environment will match hardware and software prerequisites Map out your proposed network Determine vland or subject access Address spaces on the vnet Analyze projected traffic Plan routing between networks Map out access controls (including roles) Determine peering
  • 36. SDN Implementation  Build out your software-defined networks
  • 37. SDN Implementation  Build out your software-defined networks  Build resource groups (applications, etc.)
  • 38. SDN Implementation  Build out your software-defined networks  Build resource groups (applications, etc.)  Build out your vnet(s)
  • 39. SDN Implementation  Build out your software-defined networks  Build resource groups (applications, etc.)  Build out your vnet(s)  Perform comprehensive testing • Sample methods (note: vnets lack built-in testing tools)  Build a VM for testing purposes • Put the VM on the network • Use Apache and open port 80 • Create a new VM and use it to ping the original VM • Open SSH (secure shell) and use port 22 • Use the Azure Serial Console (currently in preview), especially for Linux VMs  Compare VM to historical stats • Look at stats such as data disks, max IPS, local SSD, and load balancing
  • 40. Traditional Networking Management SDN Management Set up well-known protocol parameters and track configuration changes Configure customized and ever-evolving software, setup data and control plane Management: Traditional vs. SDN
  • 41. Traditional Networking Management SDN Management Set up well-known protocol parameters and track configuration changes Configure customized and ever-evolving software, setup data and control plane Set up alternate routs in case of failure Configure alternate forwarding device behavior in case of failure Management: Traditional vs. SDN
  • 42. Traditional Networking Management SDN Management Set up well-known protocol parameters and track configuration changes Configure customized and ever-evolving software, setup data and control plane Set up alternate routs in case of failure Configure alternate forwarding device behavior in case of failure Assign and reserve bandwidth. Enforce quality of service configuration Monitor performance of network applications and adjust connection quality between data plane and control plane Management: Traditional vs. SDN
  • 43. Traditional Networking Management SDN Management Control network access and prevent intrusion, spoofing and DoS attacks Use cloud security components, such as virtual firewalls, to grant isolation to network applications, prevent eavesdropping and capture of traffic Management: Traditional vs. SDN
  • 44. SDN Monitoring Tips  Monitoring • Important metrics to monitor:  Ingress and egress of vnets
  • 45. SDN Monitoring Tips  Monitoring • Important metrics to monitor:  Ingress and egress of vnets  Ingress and egress of your nics
  • 46. SDN Monitoring Tips  Monitoring • Important metrics to monitor:  Ingress and egress of vnets  Ingress and egress of your nics  Load balance network w/ a load balancer (Microsoft or 3rd party) • Ensure the load matches your policy • Easy to misconfigure
  • 47. SDN Monitoring Tips  Monitoring • Important metrics to monitor:  Ingress and egress of vnets  Ingress and egress of your nics  Load balance network w/ a load balancer (Microsoft or 3rd party) • Ensure the load matches your policy • Easy to misconfigure  Monitor uptime of solutions/ services • Ensure it is functioning at the application level and all the way down to the network layer
  • 48. Common SDN Threats  SDN specific threats (implement general security best practices and use cloud security solutions) • Manipulation of information (data forging) • Software, firmware, and API exploits • Remote SDN app exploits • Malicious software like viruses and malware • Unauthorized access • Traffic sniffing and diversion
  • 49. Common SDN Threats  SDN specific threats (implement general security best practices and use cloud security solutions) • Manipulation of information (data forging) • Software, firmware, and API exploits • Remote SDN app exploits • Malicious software like viruses and malware • Unauthorized access • Traffic sniffing and diversion  General network virtualization threats (implement general security best practices) • Virtualized host abuse • Network virtualization bypassing
  • 50. Common SDN Threats  General network infrastructure threats (generally covered by cloud provider) • Physical threats • Damage/ loss • Failures/ malfunctions • Outages • Disasters • Legal
  • 51. Common SDN Security Mistakes  Using public IPs in your network
  • 52. Common SDN Security Mistakes  Using public IPs in your network  Opening up network rules to the world
  • 53. Common SDN Security Mistakes  Using public IPs in your network  Opening up network rules to the world  Over-relying on open source packages without researching known or suspected vulnerabilities
  • 54. SDN Security Best Practices  Secure your own data • By default, protect access to your VMs
  • 55. SDN Security Best Practices  Secure your own data • By default, protect access to your VMs  Use network security groups in Azure • Control what objects and ports can ingress and egress • Second layer
  • 56. SDN Security Best Practices  Secure your own data • By default, protect access to your VMs  Use network security groups in Azure • Control what objects and ports can ingress and egress • Second layer  Control routing behavior
  • 57. SDN Security Best Practices  Secure your own data • By default, protect access to your VMs  Use network security groups in Azure • Control what objects and ports can ingress and egress • Second layer  Control routing behavior  Enable forced tunneling
  • 58. SDN Security Best Practices  Deploy virtual network appliances and DMZs • Use built-in virtual firewalls or 3rd-party firewalls • Use a security solution that includes capabilities such as:  Intrusion detection  Vulnerability management  Application control  Network-based anomaly detection  Web filtering  Agentless Antivirus  Botnet protection
  • 59. SDN Security Best Practices  Deploy virtual network appliances and DMZs • Use built-in virtual firewalls or 3rd-party firewalls • Use a security solution that includes capabilities such as:  Intrusion detection  Vulnerability management  Application control  Network-based anomaly detection  Web filtering  Agentless Antivirus  Botnet protection  Avoid exposure to the Internet with dedicated WAN links
  • 60. SDN Security Best Practices  Deploy virtual network appliances and DMZs • Use built-in virtual firewalls or 3rd-party firewalls • Use a security solution that includes capabilities such as:  Intrusion detection  Vulnerability management  Application control  Network-based anomaly detection  Web filtering  Agentless Antivirus  Botnet protection  Avoid exposure to the Internet with dedicated WAN links  Optimize uptime and performance • Use load balancing
  • 61. SDN Security Best Practices  Disable RDP access to Azure VMs
  • 62. SDN Security Best Practices  Disable RDP access to Azure VMs  Manage VM security posture and consistently monitor VM performance
  • 63. How 5nine Simplifies SDN Management Demo!
  • 64. THANK YOU! Questions? Contact us: sales@5nine.com Learn more: https://www.5nine.com/5nine- manager-datacenter/

Editor's Notes

  1. Traditional Networking Functionality implemented through a dedicated hardware appliance Involves routers, switches, firewalls or application controllers Each appliance must be manually configured or updated by an IT admin Software-Defined Networking Decouples hardware from software (separates the control plane from the data plane) Control plane: Administration of the network, including setting up packet processing rules, which determines where to send traffic Data plane: Carries out decisions made in the control plane/console and forwards traffic (packet processing) SDN enables hardware to be controlled and managed from a centralized software application
  2. Traditional Networking Functionality implemented through a dedicated hardware appliance Involves routers, switches, firewalls or application controllers Each appliance must be manually configured or updated by an IT admin Software-Defined Networking Decouples hardware from software (separates the control plane from the data plane) Control plane: Administration of the network, including setting up packet processing rules, which determines where to send traffic Data plane: Carries out decisions made in the control plane/console and forwards traffic (packet processing) SDN enables hardware to be controlled and managed from a centralized software application
  3. Traditional Networking Functionality implemented through a dedicated hardware appliance Involves routers, switches, firewalls or application controllers Each appliance must be manually configured or updated by an IT admin Software-Defined Networking Decouples hardware from software (separates the control plane from the data plane) Control plane: Administration of the network, including setting up packet processing rules, which determines where to send traffic Data plane: Carries out decisions made in the control plane/console and forwards traffic (packet processing) SDN enables hardware to be controlled and managed from a centralized software application
  4. Traditional Networking Functionality implemented through a dedicated hardware appliance Involves routers, switches, firewalls or application controllers Each appliance must be manually configured or updated by an IT admin Software-Defined Networking Decouples hardware from software (separates the control plane from the data plane) Control plane: Administration of the network, including setting up packet processing rules, which determines where to send traffic Data plane: Carries out decisions made in the control plane/console and forwards traffic (packet processing) SDN enables hardware to be controlled and managed from a centralized software application
  5. Determine if your environment will match hardware and software prerequisites Physical network Ensure you have access to your physical network devices to configure VLANs, Routing, BGP, Data Center Bridging (ETS) if using an RDMA technology, and Data Center Bridging (PFC) if using a RoCE based RDMA technology Physical compute hosts Review your Network Interface Cards (NICs) and switches to make sure they support certain capabilities, IETF standards and tagging protocol Ensure you have Windows Server 2016 installed, Hyper-V enabled, and an external Hyper-V virtual switch created with at least one physical adapter connected to the Management logical network Map out your proposed network How many subnets will you create? Will you use shield subnets, end user subnets, product subnets, or others? Plan routing between networks Map out connections between networks Determine vland or subject access Always ask yourself the who, what, when and where of access Map out access controls (including roles) Address spaces on the vnet Determine peering Will your network be vnet to vnet? Will you use other networks for peering? Analyze projected traffic Will any traffic or data ingress or egress from the internet? Will I be using only VPN access to Azure?
  6. Determine if your environment will match hardware and software prerequisites Physical network Ensure you have access to your physical network devices to configure VLANs, Routing, BGP, Data Center Bridging (ETS) if using an RDMA technology, and Data Center Bridging (PFC) if using a RoCE based RDMA technology Physical compute hosts Review your Network Interface Cards (NICs) and switches to make sure they support certain capabilities, IETF standards and tagging protocol Ensure you have Windows Server 2016 installed, Hyper-V enabled, and an external Hyper-V virtual switch created with at least one physical adapter connected to the Management logical network Map out your proposed network How many subnets will you create? Will you use shield subnets, end user subnets, product subnets, or others? Plan routing between networks Map out connections between networks Determine vland or subject access Always ask yourself the who, what, when and where of access Map out access controls (including roles) Address spaces on the vnet Determine peering Will your network be vnet to vnet? Will you use other networks for peering? Analyze projected traffic Will any traffic or data ingress or egress from the internet? Will I be using only VPN access to Azure?
  7. Determine if your environment will match hardware and software prerequisites Physical network Ensure you have access to your physical network devices to configure VLANs, Routing, BGP, Data Center Bridging (ETS) if using an RDMA technology, and Data Center Bridging (PFC) if using a RoCE based RDMA technology Physical compute hosts Review your Network Interface Cards (NICs) and switches to make sure they support certain capabilities, IETF standards and tagging protocol Ensure you have Windows Server 2016 installed, Hyper-V enabled, and an external Hyper-V virtual switch created with at least one physical adapter connected to the Management logical network Map out your proposed network How many subnets will you create? Will you use shield subnets, end user subnets, product subnets, or others? Plan routing between networks Map out connections between networks Determine vland or subject access Always ask yourself the who, what, when and where of access Map out access controls (including roles) Address spaces on the vnet Determine peering Will your network be vnet to vnet? Will you use other networks for peering? Analyze projected traffic Will any traffic or data ingress or egress from the internet? Will I be using only VPN access to Azure?
  8. Determine if your environment will match hardware and software prerequisites Physical network Ensure you have access to your physical network devices to configure VLANs, Routing, BGP, Data Center Bridging (ETS) if using an RDMA technology, and Data Center Bridging (PFC) if using a RoCE based RDMA technology Physical compute hosts Review your Network Interface Cards (NICs) and switches to make sure they support certain capabilities, IETF standards and tagging protocol Ensure you have Windows Server 2016 installed, Hyper-V enabled, and an external Hyper-V virtual switch created with at least one physical adapter connected to the Management logical network Map out your proposed network How many subnets will you create? Will you use shield subnets, end user subnets, product subnets, or others? Plan routing between networks Map out connections between networks Determine vland or subject access Always ask yourself the who, what, when and where of access Map out access controls (including roles) Address spaces on the vnet Determine peering Will your network be vnet to vnet? Will you use other networks for peering? Analyze projected traffic Will any traffic or data ingress or egress from the internet? Will I be using only VPN access to Azure?
  9. Determine if your environment will match hardware and software prerequisites Physical network Ensure you have access to your physical network devices to configure VLANs, Routing, BGP, Data Center Bridging (ETS) if using an RDMA technology, and Data Center Bridging (PFC) if using a RoCE based RDMA technology Physical compute hosts Review your Network Interface Cards (NICs) and switches to make sure they support certain capabilities, IETF standards and tagging protocol Ensure you have Windows Server 2016 installed, Hyper-V enabled, and an external Hyper-V virtual switch created with at least one physical adapter connected to the Management logical network Map out your proposed network How many subnets will you create? Will you use shield subnets, end user subnets, product subnets, or others? Plan routing between networks Map out connections between networks Determine vland or subject access Always ask yourself the who, what, when and where of access Map out access controls (including roles) Address spaces on the vnet Determine peering Will your network be vnet to vnet? Will you use other networks for peering? Analyze projected traffic Will any traffic or data ingress or egress from the internet? Will I be using only VPN access to Azure?
  10. Determine if your environment will match hardware and software prerequisites Physical network Ensure you have access to your physical network devices to configure VLANs, Routing, BGP, Data Center Bridging (ETS) if using an RDMA technology, and Data Center Bridging (PFC) if using a RoCE based RDMA technology Physical compute hosts Review your Network Interface Cards (NICs) and switches to make sure they support certain capabilities, IETF standards and tagging protocol Ensure you have Windows Server 2016 installed, Hyper-V enabled, and an external Hyper-V virtual switch created with at least one physical adapter connected to the Management logical network Map out your proposed network How many subnets will you create? Will you use shield subnets, end user subnets, product subnets, or others? Plan routing between networks Map out connections between networks Determine vland or subject access Always ask yourself the who, what, when and where of access Map out access controls (including roles) Address spaces on the vnet Determine peering Will your network be vnet to vnet? Will you use other networks for peering? Analyze projected traffic Will any traffic or data ingress or egress from the internet? Will I be using only VPN access to Azure?
  11. Determine if your environment will match hardware and software prerequisites Physical network Ensure you have access to your physical network devices to configure VLANs, Routing, BGP, Data Center Bridging (ETS) if using an RDMA technology, and Data Center Bridging (PFC) if using a RoCE based RDMA technology Physical compute hosts Review your Network Interface Cards (NICs) and switches to make sure they support certain capabilities, IETF standards and tagging protocol Ensure you have Windows Server 2016 installed, Hyper-V enabled, and an external Hyper-V virtual switch created with at least one physical adapter connected to the Management logical network Map out your proposed network How many subnets will you create? Will you use shield subnets, end user subnets, product subnets, or others? Plan routing between networks Map out connections between networks Determine vland or subject access Always ask yourself the who, what, when and where of access Map out access controls (including roles) Address spaces on the vnet Determine peering Will your network be vnet to vnet? Will you use other networks for peering? Analyze projected traffic Will any traffic or data ingress or egress from the internet? Will I be using only VPN access to Azure?
  12. Determine if your environment will match hardware and software prerequisites Physical network Ensure you have access to your physical network devices to configure VLANs, Routing, BGP, Data Center Bridging (ETS) if using an RDMA technology, and Data Center Bridging (PFC) if using a RoCE based RDMA technology Physical compute hosts Review your Network Interface Cards (NICs) and switches to make sure they support certain capabilities, IETF standards and tagging protocol Ensure you have Windows Server 2016 installed, Hyper-V enabled, and an external Hyper-V virtual switch created with at least one physical adapter connected to the Management logical network Map out your proposed network How many subnets will you create? Will you use shield subnets, end user subnets, product subnets, or others? Plan routing between networks Map out connections between networks Determine vland or subject access Always ask yourself the who, what, when and where of access Map out access controls (including roles) Address spaces on the vnet Determine peering Will your network be vnet to vnet? Will you use other networks for peering? Analyze projected traffic Will any traffic or data ingress or egress from the internet? Will I be using only VPN access to Azure?
  13. Configuration Traditional: Set up well-known protocol parameters and track configuration changes SDN: Configure customized and ever-evolving software, setup data and control plane Availability Traditional: Set up alternate routs in case of failure SDN: Configure alternate forwarding device behavior in case of failure Performance Traditional: Assign and reserve bandwidth. Enforce quality of service configuration SDN: Monitor performance of network applications and adjust connection quality between data plane and control plane Isolation and Security Traditional: Control network access and prevent intrusion, spoofing and DoS attacks SDN: Use cloud security components, such as virtual firewalls, to grant isolation to network applications, prevent eavesdropping and capture of traffic Bottom Line = SDN solves classical network management problems, but also creates new ones
  14. Configuration Traditional: Set up well-known protocol parameters and track configuration changes SDN: Configure customized and ever-evolving software, setup data and control plane Availability Traditional: Set up alternate routs in case of failure SDN: Configure alternate forwarding device behavior in case of failure Performance Traditional: Assign and reserve bandwidth. Enforce quality of service configuration SDN: Monitor performance of network applications and adjust connection quality between data plane and control plane Isolation and Security Traditional: Control network access and prevent intrusion, spoofing and DoS attacks SDN: Use cloud security components, such as virtual firewalls, to grant isolation to network applications, prevent eavesdropping and capture of traffic Bottom Line = SDN solves classical network management problems, but also creates new ones
  15. Configuration Traditional: Set up well-known protocol parameters and track configuration changes SDN: Configure customized and ever-evolving software, setup data and control plane Availability Traditional: Set up alternate routs in case of failure SDN: Configure alternate forwarding device behavior in case of failure Performance Traditional: Assign and reserve bandwidth. Enforce quality of service configuration SDN: Monitor performance of network applications and adjust connection quality between data plane and control plane Isolation and Security Traditional: Control network access and prevent intrusion, spoofing and DoS attacks SDN: Use cloud security components, such as virtual firewalls, to grant isolation to network applications, prevent eavesdropping and capture of traffic Bottom Line = SDN solves classical network management problems, but also creates new ones
  16. Configuration Traditional: Set up well-known protocol parameters and track configuration changes SDN: Configure customized and ever-evolving software, setup data and control plane Availability Traditional: Set up alternate routs in case of failure SDN: Configure alternate forwarding device behavior in case of failure Performance Traditional: Assign and reserve bandwidth. Enforce quality of service configuration SDN: Monitor performance of network applications and adjust connection quality between data plane and control plane Isolation and Security Traditional: Control network access and prevent intrusion, spoofing and DoS attacks SDN: Use cloud security components, such as virtual firewalls, to grant isolation to network applications, prevent eavesdropping and capture of traffic Bottom Line = SDN solves classical network management problems, but also creates new ones