Utility-Grade Core Network Services
Total Page:16
File Type:pdf, Size:1020Kb
WHITEPAPER Utility-Grade Core Network Services The infoblox appliance-based platform integrates distributes, and manages DNS, DHCP, IPAM, TFTP, NTP and more to drive networks and applications Executive Summary Networks and applications have become highly dependent on a collection of essential core network services that are not always “visible” or on the forefront of IT project lists. For example, virtually all applications, including web, e-mail, ERP, CRM, and Microsoft’s Active Directory require the Domain Name System (DNS) for their basic operation. Most IP-based devices, including laptops and desktops, require Dynamic Host Configuration Protocol (DHCP) to obtain an IP address. Newer devices such as IP phones, RFID readers, and cameras that are network-connected require file transfer services (via TFTP or HTTP) to receive configuration information and firmware updates. If core network services are compromised, networks and applications fail. These failures often manifest themselves as “network” or “application” issues but are often caused by failure of the underlying core network services themselves. A majority of enterprises still use an “ad-hoc” collection of disparate systems to deploy core network services and are, therefore, experiencing growing problems with availability, security, audit-ability, and real-time data integration that threaten current and future applications. For more than a decade, the focus of networking professionals has been on physical network architectures with high levels of redundancy and fault-tolerance. From the endpoint inward, enterprise networks are designed to provide high availability with device redundancy and multiple paths among users and data. One of the key components of these architectures has been the network appliance, purpose-built devices that are designed to perform a specific function such as routing, switching, or gateway applications. In fact, today it is very difficult to find an enterprise network using general-purpose hardware running an off-the-shelf operating system for network infrastructure functions like routing, because appliances have proven to be far superior in terms of reliability, availability, and serviceability. Interestingly, core network services—like DNS, DHCP, IPAM, RADIUS, NTP, and file distribution—are deployed primarily using the same architectural design approaches that network designers abandoned a decade ago. Most core network services “infrastructures” are built on general-purpose servers running common operating systems with off-the-shelf or open-source software. Managing and coordinating these disparate servers is difficult, especially when they are administered by different departments and functional areas. The need to integrate these services is a challenge that will only grow in the future as new devices and applications are added to IP networks. Since current and future service delivery architectures are dependent on core network services, it makes sense to design and deploy these services to the same “utility-grade” standards that enterprises currently use for their physical networks and mission-critical applications. This paper presents a review of core network services and their functions and presents key considerations for achieving and maintaining utility-grade service levels. 1 WHITEPAPER Utility-Grade Core Network Services MSFT AD Web CRM E-Commerce IP Tel ERP Messaging Applications NAMING ADDRESSING IP ADDRESS MGMNT Core Network (DNS) (DHCP) (IPAM) Services FILE DELIVERY AUTHENTICATION TIME (TFTP/HTTP) (RADIUS) (NTP) Network Infrastructure Routing IDS WAN Switching Wireless Firewalls Figure 1: Core network services provide the “glue” between networks and applications. What are Core Network Services? Enterprises make significant investments in key elements of their IT infrastructure. Major network components such as routing and firewalls, major application components such as databases, middleware, and ERP are treated as “infrastructure,” which means that they have clear accountability, service metrics, strategies, and roadmaps. As a result, organizations focus resources on building highly available and fully redundant physical networks and business applications. However, core network services—the “glue” between networks and applications—are typically not accorded the same level of attention as the networks and applications that depend upon them. Core network services include: • DNS or the Domain Name System is the protocol that translates a server name or other resource into an IP address. It’s unacceptable to require users or application designers to know the IP addresses of every device in an infrastructure—hence the value of DNS. If an enterprise uses Windows Active Directory, e-mail, extranet services, or builds Service-Oriented-Architecture-based applications, DNS is a requirement if users are to access servers and data. If DNS fails, the user cannot access applications even if the network is available. In fact, DNS issues are often reported as “network” or “application” problems. If an end user cannot resolve a web-site URL or find their Windows domain controller to log in, it appears as if the network is not working. • DHCP or Dynamic Host Configuration Protocol is how network users typically acquire an IP address on a given network. There are dozens of options and configuration variables available to a DHCP environment that can fine tune how a user acquires a specific address on a network. DHCP should also be considered the foundation for controlling user access to the network. Most companies allow “anonymous networks” in which anybody with an Ethernet connection can get an IP address and, therefore, security measures such as network access control (NAC) depend upon control over DHCP to support functions such as guest access and network quarantine. Without DHCP, IP address assignment is nearly impossible in all but the smallest networks because assigning addresses manually is very labor intensive and difficult to track. If DHCP fails, all but the most sophisticated users are unable to access the network. 2 • RADIUS, used to provide authentication, authorization and accounting (AAA) services, is essential for controlling access to wireless and wired networks. Sarbanes-Oxley and other regulatory requirements are moving enterprise networks from the anonymous network access model currently in use at most enterprises to a user/device/location model where users have to be correlated with IP addresses in real-time. RADIUS is increasingly required in distributed locations, such as schools, factories, warehouses, hospitals and retail stores that are deploying wireless networks for access by computers as well as by devices such as bar code scanners and other hand-held devices. • IPAM or IP Address Management can quickly become a major administrative burden, especially if it is not integrated into the DNS and DHCP infrastructure. Many administrators use spreadsheets, text files, disconnected databases, and other techniques to manage their IP address space. In large networks, this simply becomes too complex and inefficient—especially as the addition of IP phones and other devices rapidly increases the number of IP-based devices in use. A fully integrated IPAM capability streamlines change management and the addition and removal of network resources, and also ensures that changes are auditable for compliance purposes. • TFTP and HTTP for file transfer are critical services for the smooth functioning of IP phones and other devices that require periodic updates to their configuration or firmware. Frequent configuration and firmware updates are required to assure a highly reliable IP telephony system. As phone images are increasing in size and IP Telephony becomes more widely deployed, availability and local survivability requirements for file delivery services are increasing. Integrating this functionality into a core network services infrastructure (as opposed to an extension of the VoIP system) assures local survivability, WAN bandwidth optimization, and security. • NTP or Network Time Protocol provides a consistent and highly accurate basis for recording and auditing network activity. Accurate and reliable delivery of time is essential for accurate event logging, security analysis, and forensics. Together, these core services represent the “glue” that links users, networks, and applications. When core network services aren’t designed and built to the same standards as network and application infrastructure, users will experience latencies and outages that appear as problems with the network or the applications. Given their essential role, core network services need to be treated as critical IT infrastructure and designed accordingly. The following sections cover key design, integration, management, and security considerations. Designing Core Network Services to Physical Network Standards Many, in fact most, core network services architectures are built to different reliability standards than physical networks. Nearly all physical networks are designed with high levels of capacity, redundancy, and failover, and networking products—including routers, switches, gateways, and firewalls—have long been manufactured on purpose- built hardware with highly integrated firmware that is optimized for performance, reliability, and fault tolerance. 3 WHITEPAPER Utility-Grade Core Network Services Conversely, most core network services are deployed on general-purpose hardware using general-purpose operating systems and open source or “free” software.