The document discusses current trends and challenges in network virtualization security, particularly concerning Software Defined Networking (SDN) and Network Functions Virtualization (NFV). It aims to introduce ways to enhance security within virtualized environments and outline the pertinent security elements for cloud services. Additionally, it covers software-defined security technologies and includes a comprehensive framework for security measures in cloud environments.
Introduction to network virtualization and SDN aiming to enhance security, address future market issues.
Explains the structure of the presentation covering network virtualization concepts including SDN and NFV.
Defines network virtualization, SDN, and NFV, types of hypervisors, and introduces virtualization fundamentals. Discusses SDN architecture, key vendors, and their solutions in the context of network virtualization. Describes the NFV architecture, working groups related to NFV, and its relevance to the networking domain.
Examines cloud service models and virtual environment security features including user and provider responsibilities.Outlines security policies required for cloud services including network protection and vulnerability management.
Discusses software-defined security, including security controls, checklist for cloud migration, and key companies involved.
Independent
Software Vendors
BRAS
Firewall
DPI
CDN
Tester/QoE
monitor
WAN
Acceleration
Message
Router
Radio Network
Controller
CarrierGrade NAT
Session Border
Controller
Classical Network ApplianceApproach
PE Router
SGSN/GGSN
Generic High Volume
Ethernet Switches
Generic High Volume Servers
Generic High Volume Storage
Orchestrated,
automatic
remote install
Network Functions Virtualisation Approach
hypervisors
I.네트워크가상화개요: NFV
24.
Working Group
Architectureof the Virtualisation
Infrastructure
Steve Wright (AT&T) + Yun Chao Hu (HW)
Managing Editor: Andy Reid (BT)
Working Group
Reliability & Availability
Chair: NaseemKhan (VZ)
Vice Chair: Markus Schoeller(NEC)
Working Group
Management & Orchestration
Diego Lopez (TF) + Raquel Morera(VZ)
Working Group
Software Architecture
Fred Feisullin(Sprint) + Marie-PauleOdini(HP)
Expert Group
Security
Bob Briscoe (BT)
Expert Group
Performance & Portability
Francisco Javier Ramón Salguero(TF)
Technical Steering Committee
Chair: Technical Manager : Don Clarke (BT)
Vice Chair / Assistant Technical Manager : Diego Lopez (TF)
Programme Manager : TBA
NOC Chair (ISG Vice Chair) + WG Chairs + Expert Group Leaders + Others
Additional Expert Groups
can be convened at discretion
of Technical Steering Committee
HW = Huawei
TF = Telefonica
VZ = Verizon
I.네트워크가상화개요: NFV
25.
OSS / BSS
EMS 2
VNF 2
EMS 3
VNF 3
EMS 1
VNF 1
VirtualisationLayer
Virtual Storage
Virtual Network
Virtual Compute
Storage
Hardware
Network
Hardware
Computing Hardware
Service, VNF & Infrastructure Description
VNF(VirtualisedNetwork Function)
Hardware Resources
Orchestrator
VNF
Managers
VirtualisedInfrastructure
Manager
Network Functions Virtualisation–Update White Paper October 15-17, 2013 at the “SDN and OpenFlow World Congress”, Frankfurt-Germany.
A Virtual Network Function (VNF) utilisesthese virtualisedresources, and may use various VMs (Virtual Compute) connected via some Virtual Networks.
I.네트워크가상화개요: NFV
사용자소유
사업자소유
Infrastructureas a Service
Platform
as a Service
Software
as a Service
서비스모델
SaaS
IaaS
PaaS
클라우드계층(Cloud Layer)
데이터(Data)
인터페이스(APIs, GUIs)
애플리케이션(application)
솔루션스택(Programing languages)
운영체제(OS: Operating System)
가상머신(Virtual Machines)
가상네트워크인프라
하이퍼바이저(Hypervisors)
프로세스/메모리
데이터스토리지(DataStorage)
네트워크
물리적환경제공/ 데이터센터
사용자소유
사용자소유
사용자소유사업자소유or 공공클라우드사업자소유or공공클라우드사업자소유or공공클라우드
가상화
II.클라우드서비스와보안
30
31.
Product/
Framework
OpenStack
CloudStack
VMware
vCloud Suite
Microsoft
SCVMM
Licence
Apache 2.0
Apache 2.0
Propritary
Propritary
Primary
hypervisor
KVM
Xen
ESXI
Hyper-V
Secondary
hypervisors
Xen, Hyper-V, vSphere, LXC
KVM, Hyper-V,vSphere, LXC
-
-
Primary
language
Python
Java
Mix of
Mix of
Primary
storage type
Cluster: CEPH,GlusterFS
SAN: iSCSI, NFS
SAN:iSCSI, NFS
SAN:iSCSI, NFS, FC, FCoE
Cluster: vSAN
SAN: iSCSI,FC, FCoE
Cluster: SMB 3.0
Network Virtualization
Open vSwitch, VMwareNSX,
Arista EOS, Cisco Nexus,
Brocade , HP, Mellanox,
NEC OpenFlow Plugin,
OpenDaylight
Open vSwitch
VMware NSX,
Arista EOS, Cisco Nexus,
Brocade , HP
NVGRE virtualswitch
Multi-tenant,
Self Service Portal
Yes, Horizon
Yes
Yes
Yes, Self-Service Portal/SCVMM
HybridCloud
solutions
RackConnect allows
migrate to RackSpace
CitrixCloudPlatform
allows migration
between clouds
vCloudConnector
SCVMM allowsmigrateto Azure
Cost of
implementation
Free, add consultancy
and integration fee
Free, add consultancy
and integration fee
31
II.클라우드서비스와보안
32.
$3002 분
$10,00010주
기업용스토리지
VLAN 네트워크
방화벽, load-balancer
침입탐지, 보안, 모니터링
가용성
현재
과거
+일
32
II.클라우드서비스와보안
•Segmentation based onservice and security requirements
Web services–portals, web-based warehouses
Applications services–ERP
Core service–DNS,DHCP, NTP, FTP, RADIUS
Data base services–MS SQL, Oracle, Sybase
•Benefit from a Service Oriented Architecture (SOA)
Zones can be hosted by different managed service providers.
Borders between application categories, or zones can be easier protected
Distribution of malware or hacker attacks is limited to one zone.
Outages, failures and administration errors are restricted to one zone only.
46
II.클라우드서비스와보안
관리/제어책임(예)
SaaS
IaaS
PaaS
PCI DSS 요구사항
데이터에대한방화벽설치/유지
모두
모두서비스사업자
벤더Default Password/보안설정변경
모두
모두서비스사업자
저장데이터차단
모두
모두서비스사업자
오픈/공중망사용시암호화전송
사용자
모두서비스사업자
안티바이러스소프트웨어주기적업데이트
사용자
모두서비스사업자
보안시스템과애플리케이션의개발/유지
모두
모두
모두
데이터접근제한업무확인
모두
모두
모두
컴퓨터접근을위한개별ID 할당
모두
모두
모두
데이터의물리적접근제한서비스사업자서비스사업자서비스사업자
네트워크자원과데이터접속모니터/추적
모두
모두서비스사업자
보안시스템과프로세스의주기적테스트
모두
모두서비스사업자
모든개인을위한정보보안정책유지
모두
모두
모두
III.소프트웨어정의보안
49
•가상화: 리눅스나하드웨어어플라이언스에탑재한방화벽가상화
•SDN콘트롤러호환성: 하이퍼바이저vs 오케스트레이터
•프로토콜버전: Southbound (OpenFlow vs Netconfor Something)
•콘트롤러내의App 호환: 콘트롤러에공존하는다른App 들의완성도
•목표시장을위한로드맵:1) 성능의개선, 2) 프로토콜,3) SDN 콘트롤러연동, 4) 아키텍처, CMP지원(자동확장, VPN,등등) 추가고려
가상화서버
하이퍼바이저
vSwitch
리눅스
웹서버
vNIC
리눅스
앱서버
vNIC
리눅스
DB서버
vNIC
리눅스방화벽
vNIC
vNIC
vSwitch
NIC
공개SDN Controller
Orchestration 방화벽(Controller)
vSwitch
(방화벽에이전트)
56
III.소프트웨어정의보안
vSwitch
(방화벽에이전트)
vSwitch
(방화벽에이전트)
vSwitch
(방화벽에이전트)
vSwitch
(방화벽에이전트)
57.
OpenFlow Area
DropActions
vSwitch/pSwitch
Data Center
3. Drop or QoSAction
2. Security Event
1. IDS/IPS 또는Snort 나Suricata
OpenFlow/SDN Controller
고려사항
OpenFlow 연동IDS 센서: 차단/제어위치는OpenFlow vSwitch/pSwitch
확장성: 복수의SDN콘트롤러연결을고려
중앙관리
가상화
복수Tenant 감지(IDSaaS)
CMP(OpenStack) 고려
Embedded SDN 환경고려
OpenFlow basedvSwitch
MAC Srce.
MAC Dest.
Srce.
IP
Dest.
IP
Source
TCP Port
Dest. TCP Port
Action
*
*
192.168.10.20
*
*
*
Drop
57
III.소프트웨어정의보안
58.
고려사항
DDoS공격차단TMS (TreatManagementSystem)
분산DDoS탐지센서들을관리하는게이트웨이또는외부서비스시스템을SDN 콘트롤러와연동
중앙관리
SDN 콘트롤러(감지한Target IP 주소트래픽TMS 우회명령Flow) 가상화
복수Tenant 감지
CMP 고려
MAC Srce.
MAC Dest.
Srce.
IP
Dest.
IP
Source
TCP Port
Dest. TCP Port
Action
*
*
*
192.168.10.20
80
*
Port 3
pSwitch/vSwitch
pSwitch/vSwitch
OpenFlow/SDN Controller
TMS
3.DDoS공격Target Host IP주소트래픽을TMS로플로우변경
Target Host
1.DDoS센서또는게이트웨이에서공격감지시Target Host IP주소를SDN 콘트롤러로전달
2.DDoS공격필터링한정상트래픽을전송
58
III.소프트웨어정의보안
59.
•공개SDN 콘트롤러내장보안장비(레가시환경에서TMS, IPS등인라인모드설치가필요한기기)
•오픈가상스위치(Open vSwitch)내장의NIC or 스위치사용
•OpenFlow 프로토콜사용
•위협플로우Redirect 하여TMS로전송
서버
NIC
Open vSwitch
VM 1
IP 주소1
vNIC
VM 2
IP주소2
vNIC
VM 3
IP 주소3
vNIC
SDN/OpenFlow Controller
보안기능Application 4) 위협플로우 3) Flow 카운터기반의위협분석
인라인설치TMS 장비
IP주소2 VM 공격
Open pSwitch
59
III.소프트웨어정의보안