Cisco Services Cisco Service Provider Architecture Applications
Total Page:16
File Type:pdf, Size:1020Kb
Security at the Speed of the Network: Automating and Accelerating Security Through SDN and NfV BRKSEC-2760 Hantzley Tauckoor – CISSP #472723, CCDE #2015::43 Consulting Systems Engineer – MANO & Programmability Global Virtual Engineering, Cisco Systems ./about_me Hantzley Tauckoor Consulting Systems Engineer – MANO & Programmability Global Virtual Engineering, Cisco Systems linkedin.com/in/hantzley Twitter: @hantzley [email protected] Agenda • Security from the Service Provider perspective • Putting SDN/NFV to work – DDoS • Automating Security in the SP Data Centre • Generating new revenue streams with hosted security services • SDN & NFV Infrastructure Security • Summary Agenda • Security from the Service Provider perspective • Putting SDN/NFV to work - DDoS • Automating Security in the SP Data Centre • Generating new revenue streams with hosted security services • SDN & NFV Infrastructure Security • Summary Security from the Service Provider Perspective Trends: New Opportunities … The world has gone mobile Traffic growth, driven by video 120,000 Other (43%, 25%) 10XDynamic Mobile Traffic Growth Threat100,000 LandscapeInternet Video (57%, 75%) From 2013-2019 80,000 Changing 23% Global Customer 60,000 CAGR 40,000 2013- 2018 Expectations Ubiquitous Access to Apps & Services 20,000 Petabytes Petabytes per Month 0 2013 2014 2015 2016 2017 2018 Rise of cloud computingIncreasing ThreatMachine Sophistication-to-Machine Risks to Service ProvidersEmergence of the Internet of Everything Soon to and Their Customers Change SP Architectures/ Changing Enterprise Service Delivery Business Models Efficiency & Capacity People Process Data Things Your Customers Are Being Attacked By DDoS 2015 Verizon Data Breach Investigations Report ~ 84% of initial ~ 65% of initial compromises compromises completed within undetected for hours months Compromise Detection Legacy Security: Costly & Complex Limited integration, security gaps Siloed Hinders realization of Manual Hard-coded processes open and programmable networks Inefficient Over-provisioned, static, and slow SDN Automation: The Speed of The Network DURING AFTER Threat Analytics BEFORE Control Visibility How Automated Are You Today? DURING AFTER Threat Analytics Automated Manual BEFORE Control Visibility Managing The Threat Lifecycle Protecting the Infrastructure and Offering Elastic Managed Services Attack Continuum BEFORE DURING AFTER Control Detect Scope Enforce Block Contain Harden Defend Remediate Firewall VPN NGIPS Advanced Malware Protection NGFW UTM Web Security Network Behaviour Analysis NAC + Identity Services Email Security Forensic Analytics DDoS Visibility/Mitigation Services Visibility, Context, Autonomics and BCPs Orchestration VMS Quantum WAVE HSS Cloud Services Orchestration WAN Orchestration UBIqube – MS Activator Real Time application of the right Real time topology and service service, in the right place, at the right Security Domain Management health information time Anatomy of the SP network Aggregation/ Access Service Edge Data Center Video Dist Core Transport Mobile Cell Site Router Residential CMTS, DSLAM Enterprise WAN Business FW, VPN, FW, VPN, MACsec Security CGNAT, NGIPS, MACsec, FW, NGIPS, AMP, Volumetric DDoS Features AMP VPN, NGIPS, AMP Volumetric DDoS VPN Mobile Inspection App DDoS App DDoS SP Security Best Practices - http://tools.cisco.com/security/center/serviceProviders.x?i=76 Security for Open & Programmable Networks Cisco Services Cisco Service Provider Architecture Applications & Services OPEN APIs OPEN APIs Service Broker Benefits: Evolved Services Catalog Service Orchestration Platform of Virtual • New Revenue StreamsProfile Engine SMART Functions SERVICE CAPABILITIES • Increased Business Agility OPEN APIs OPEN APIs • Lower OperatingEvolved Costs Programmable Network Compute Storage Network Security Network Programmability Network Bandwidth Load Monitoring Management Balancing Programmatic Interface Controller Topological awareness CLI Policy resolution Netconf : - OpenFlow ) REST APIs Programmability Across Multiple Controllers Threat Defense Security Policy Service Orchestrator Campus / WAN Data Centre APIC-EM / WAE Controller APIC Controller App App A Plethora of Controllers Open Source Data Center Campus WAN Projects APIC WAE SDN Controller Under Linux Foundation Security extensions Common vendor supported framework Service Chaining User/Things Network Application Network Profile Traffic Optimization Flow Profile QoS, Security, SLA, SLA, Security, QoS, Monitor for path Load Balancing Device, Location, Role Cloud Orchestration constraint violations Objective: Extend OpenStack Neutron’s networking model with new policy APIs Automate network VTS changes to ensure Openstack “Sister-project” to group based policy in OpenDaylight path compliance Overlay Automation Transition to All-virtualised Services? All SP services are virtualising … Drivers: Some services move straight to Scansafe SAAS Webex2 • Reducing total Service SDVPN SP OpEx and CapEx Video HCS • Increased service Can be leveraged to velocity and System HCS offer SAAS agility Offering L2 / L3 SP • Increasing VPN VideoVideo GWs Mobile SP infrastructure revenue services services transitioning to Product Ent CPE Managed NFV Services IAAS HW Appliance Virtualise existing functions SAAS-based solutions Implementation Network Function Virtualization • Movement of Network functions to the cloud • Control, services and data plane components • NFV is not applicable to all network applications • However most service functions are in the frame • High performance plumbing is not at the moment • NFV is an architecture rather than simply virtualizing functions • Virtual services, compute • service chaining, overlays • Orchestration and redirection • Covered a number of use cases See also: http://www.etsi.org/deliver/etsi_gs/NFV/001_099/002/01.01.01_60/gs_NFV002v010101p.pdf Evolving The Network Software Stack Application Unified Evolved VPN: Custom CCS … Software Communications CloudVPN,… Apps Orchestration: Management: Optimization: … NSO, .. Prime, .. WAE, .. Infrastructure Software Base Control Infrastructure Network OS: Plugins: Embedded IOS-XE, NX-OS, … Puppet, Guest shell,… Software virtual physical Base OS: Protocols: Linux, … IETF, IEEE, … Summary: The Building Blocks Service Orchestration Orchestration Automation, provisioning and interworking of physical and virtual resources NFV SDN NFV Network functions and software running on any open standards-based hardware SDN Separation of control and data plane, controllers Traditional Traditional Distributed control plane components, physical entities Agenda • Security from the Service Provider perspective • Putting SDN/NFV to work - DDoS • Automating Security in the SP Data Centre • Generating new revenue streams with hosted security services • SDN & NFV Infrastructure Security • Summary Putting SDN/NFV to Work: Security Services Virtualization & SDN DDoS Mitigation Distributed Denial of Service Attack Mitigation Controller Distributed Denial of Service Attack Mitigation Controller Traffic Statistics Distributed Denial of Service Attack Mitigation DoS Controller Traffic Statistics Distributed Denial of Service Attack Mitigation DoS Controller Traffic Statistics Traffic Redirection Distributed Denial of Service Attack Mitigation DoS Controller Traffic Statistics Traffic Redirection Cisco ASR 9000 vDDoS Protection Arbor Networks ASR 9000 with Cisco ASR 9000 Threat Management System (TMS) Virtual Services Module (VSM) vDDoS Protection “Powered By Arbor Networks” Architectural Unified Scalable Reduced Flexible Superiority Management Performance OPEX Deployment ASR 9000 vDDoS Solution Components • Virtualized Peakflow SP Collects Flow records Detects abnormal network behavior DDoS and trigger alerts DDoS Mitigation Can influence the routing, injecting Detection BGP routes in the network Supports BGP FlowSpec as a Controller Virtualized Arbor Peakflow Sets up and monitors the TMS SP remotely ASR 9000 • Virtual DDoS SW (running on A9K VSM)ASR Configured by SP, receives diverted9000 traffic and proceeds to in-depth packet analysis VSM running Discards the attack packets and vDDoS SW transmits the legit ones Licenses Provides real-time monitoring info to operators How Peakflow works? 1 – Anomaly detection 2 – Volumetric DDoS: ACL, BGP FlowSpec 3 – L4-L7 DDoS: redirect to ASR 9K for intelligent mitigation Enterprise A Peering Point ASR 9K ACL PE Arbor Peakflow SP6000 ACL Core Router Peering Enterprise C Point PE 5 – Forward 4 – Identify and filter the legitimate traffic: the malicious GRE, MPLS, … requests Enterprise B Integrated Security Services “at Scale” Legacy Security: Siloed, Inefficient & Expensive 1001 1001 0001011 1001 0001011 1001 0001011 1100010 Data 0001011 1100010 1110 1100010 1110 1100010 1110 Packet 1110 DDoS WAF Sandbo 1001 x 1001 0001011 1001 0001011 0001011 1100010 1100010 1110 1100010 1110 1110 Sandbox DDoS Platform WAF Platform Platform SSL FW IPS / SSL Platform FW Platform IPS Platform Reduced Effectiveness Increased Latency Slows Network Static & Manual Cisco Transforms Security Service Integration Data Packet Siloed Sandbo DDoS WAF x Key: Cisco Service DDoS Platform WAF Platform Sandbox 3rd Party Service 1001 Data SSL000101 FW IPS 111000 SSL DDoS FW WAF NGIPS AMP Packet 101110 1001 0001011 1100010 SSL Platform FW Platform IPS Platform 1110 Integrated Limited effectiveness Increased latencyUnified PlatformSlows network Static & Manual Maximum protection Highly efficient Scalable processing Dynamic Firepower 9300 Platform NEW High-Speed,