VACS

Report 19 Downloads 69 Views
Security for shared infrastructure in Cisco ONE Enterprise Cloud Suite Roxana Diaz TSA, CCIE BRKPCA-2040

@roxadiaz2

Agenda •

Introduction



Cisco VACS Overview



VACS Configuration



Security Use-cases



Customers



Conclusion

Agenda •

Introduction



Cisco VACS Overview



VACS Configuration



Security Use-cases



Customers



Conclusion

Introduction

Journey to Cloud Virtualization

Private Cloud

Hybrid Cloud

Enhanced virtual networking

Automation

Segregation of duties

Self Service

Secure DC extension to public cloud

Better visibility

Secure Segmentation

N1KV/VSG

N1KV/VSG/CSR1KV

Standalone

VACS (in CECS)

Ecosystem of public clouds

N1KV Cloud VEM/VSG/CSR1KV (in CECS)

Cloud Services Platform – DC and Cloud Network Function Virtualization Platform CECS – Cisco Enterprise Cloud Suite / VSG – Virtual Security Gateway N1KV – Nexus1000v DVS / CSR1KV – Cloud Services Router 1000v BRKPCA-2040

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

6

Cisco Enterprise Cloud Suite

Automate Compute, Network, ACI, Storage & Virtual (UCSD)

Enterprise Data Center Infrastructure BRKPCA-2040

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

7

Cisco Enterprise Cloud Suite

Automate Compute, Network, ACI, Storage & Virtual (UCSD)

WEB

APP

DB

Enterprise Data Center Infrastructure BRKPCA-2040

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

8

BRKPCA-2040

9

Cisco Enterprise Cloud Suite Self-service Catalog (PSC) Dashboard (UCSD) Secure Application Segmentation (VACS) Automate Compute, Network, ACI, Storage & Virtual (UCSD)

WEB

APP

DB

Enterprise Data Center Infrastructure BRKPCA-2040

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

10

Agenda •

Introduction



Cisco VACS Overview



VACS Configuration



Security Use-cases



Customers



Conclusion

Cisco VACS Overview

Cisco Virtual Application Cloud Segmentation (VACS) Services

Secure segmentation in minutes on shared infrastructure

Simplified virtual networking and security

BRKPCA-2040

Unified virtual services licensing: cost-effective solution

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

13

Secure Segmentation in Minutes on Shared Infrastructure Current physically segmented architecture

Virtual segmentation with VACS Physical segmentation results in longer provisioning time and under-utilized resources

Virtual segmentation – independent of physical topology

Procure, rack, stack and provision individual devices

Enforced by best in class virtual networking and security services

Secure segmentation in mins on shared infrastructure

Simplified virtual networking and security Vcenter

VACS

VACS

Unified virtual services licensing: cost-effective solution Vcenter

BRKPCA-2040

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

14

Simplified Virtual Networking and Security on Shared Infrastructure Current provisioning model

VACS

Provision subnet / NAT / Routing

Provision VIP

Provision FW rules / GW

Vcenter

BRKPCA-2040

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

15

Simplified Virtual Networking and Security on Shared Infrastructure Current provisioning model

Wizard based provisioning model with full life cycle mgmt. of virtual services

No longer have to configure individual components. VACS does it for you. Provision subnet / NAT / Routing

Provision VIP

VACS

VACS

Provision FW rules / GW

Vcenter

Vcenter

BRKPCA-2040

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

16

Unified Virtual Services Licensing – Per Server Based Current pricing schema makes virtual services cost prohibitive •

Every vendor has different licensing schema



Per instance based



Expensive as throughout increases

BRKPCA-2040

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

17

Unified Virtual Services Licensing – Per Server Based Current pricing schema makes virtual services cost prohibitive •

Every vendor has different licensing schema



Per instance based



Expensive as throughout increases

Automated Provisioning and Orchestration Cisco UCS director

Load-balancer HA Proxy

VACS

Routing/Edge FW Cisco CSR 1000V Or Cisco ASAv

Zone based FW Cisco Virtual Security Gateway

Unified Licensing Per Server Based*

Create as many instances as you need with up to 10G throughput!**

Virtual Fabric Cisco Nexus 1000V Platform for Distribute FW

BRKPCA-2040

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

18

VACS Delivering Secure Virtual Network aaS (SvNaaS) Virtual Secure Network aaS with complete Automation and Life-CycleManagement

Load Balancer aaS Out-of-Box HA Proxy Integration

Routing aaS Out-of-Box CSR1000Vor ASAv routes and GW

VACS

Edge Firewall aaS Out-of-Box ASAv or CSR1000V IOS XE FW

Web application Web-1

Public Design App-1 (VM3)

w w w

w w w

Web-1 zone

App-1 zone

Web-2 zone

App-2 zone

Web application Web-2

Micro Segmentation aaS Create Security Group VXLAN or VLAN based

Confidential Design App-2 (VM4)

BRKPCA-2040

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

19

Agenda •

Introduction



Cisco VACS Overview



VACS Configuration



Security Use-cases



Customers



Conclusion

VACS Configuration

Deeper View: VACS Containers – 3-Tier (Internal) Template Upstream Router Routing – EIGRP or Static

CSR 1000V

VACS – 3 Tier App Container (Internal)

VLAN 10/ VXLAN 101

VSG Zone-based FW

HA Proxy HTTP(s) LB

Web Zone

App Zone

DB Zone

BRKPCA-2040

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

22

Deeper View: VACS Containers – 3-Tier (Internal) Template Upstream Router Routing – EIGRP or Static

CSR 1000V

VACS – 3 Tier App Container (Internal)

VLAN 10/ VXLAN 101

Permit

VSG

• • • • •

10G Throughput NAT (Optional) L3 Routing – EIGRP or Static Edge FW Monitoring Features

Deny

Zone-based FW

HA Proxy HTTP(s) LB

Web Zone

App Zone

DB Zone

BRKPCA-2040

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

23

Deeper View: VACS Containers – 3-Tier (External) Template Upstream Router Routing – EIGRP or Static

CSR 1000V

VACS – 3 Tier App Container (External)

VLAN 10/ VXLAN 101

VSG Zone-based FW

HA Proxy HTTP(s) LB

Web Zone

App Zone

DB Zone

BRKPCA-2040

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

24

Deeper View: VACS Containers – 3-Tier (External) Template Upstream Router Routing – EIGRP or Static

CSR 1000V

VACS – 3 Tier App Container (External)

VLAN 10/ VXLAN 101

• • • • •

10G Throughput NAT (Optional) L3 Routing – EIGRP or Static Edge FW Monitoring Features

VSG Zone-based FW

HA Proxy HTTP(s) LB

Web Zone

App Zone

DB Zone

BRKPCA-2040

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

25

Custom VACS Containers Template Upstream Router Routing – EIGRP or OSPF or Static

CSR 1000V

VACS – Custom Container

VLAN 10/ VXLAN 101

• NAT (Optional) • L3 Routing – EIGRP or OSPF (P2) • Edge FW • Monitoring Features

VSG Zone-based FW

HA Proxy Any Zone LB

Zone 1

Zone 2

BRKPCA-2040

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

26

Gateway choices with VACS Flexibility in combining VACS services with user-deployed services

Built-In Virtual GW

V M

V M V M

Physical Gateway

V M

Other Virtual Gateway

V M

V M

V M

VACS

VACS

V M V M

VACS

OR CSR 1000v

ASAv

Physical GW ASA/Checkpoint, PAN

External Virtual GW vPAN, vGW

• Full firewall capabilities via ASAv integration with up to 2Gbps throughput • BYOL license for ASAv BRKPCA-2040

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

27

VACS – Holistic Approach to Workload Segmentation Rich Ecosystem with Simple Setup •

Based on UCS Director (included with Cisco Enterprise Cloud Suite license) • Nexus 1000V, Virtual Security Gateway, ASAv, CSR1000v •

ASA, FirePOWER Threat Defense – roadmap items

1

2

3

BRKPCA-2040

4

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

28

How to Segment the Virtual Switch Wizard Driven with Template Based Policy Definitions

BRKPCA-2040

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

29

How to Segment the Virtual Switch Wizard Driven with Template Based Policy Definitions

BRKPCA-2040

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

30

Completed VACS Template Summary

BRKPCA-2040

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

31

Auto-Documentation Dynamically Track Services and Virtual Machines

Real-time Report of Container Configuration

Organized by Policy, Per VM Mapping/Tracking BRKPCA-2040

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

32

Holistic Environment Control Simplified Day-2 Operations Spin Environment Up/Down

Reclaim Resources

Seamlessly Add VM’s to Tiers

Manage Firewall Rules from Same Console

(Tie VM into Services) BRKPCA-2040

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

33

Agenda •

Introduction



Cisco VACS Overview



VACS Configuration



Security Use-cases



Customers



Conclusion

Security Use-cases

Traditional approach to Security o Traditional firewalls designed to keep threats out of the network

o Virtualization  lateral movement 1

o M&M model  Once across the perimeter firewall, malware is essentially free to propagate across the entire data center o Hackers are increasingly piggybacking malicious payloads atop legitimate traffic.

Public Web application Web-1

Public DB (DB-1)

www

Bob www

Alice

Confidential Web application Web-2

Confidential DB (DB-2)

Physical Infrastructure

o Need for double protection strategy – make security ubiquitous

BRKPCA-2040

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

36

Introducing Micro-segmentation

Web application VM1

Public DB (VM3)

Granular Control

ww w

+ Operationally Simpler

www

Web application VM2

Confidential DB (VM4)

= micro-segmentation strategy

Prevent Lateral (server-server/ VM - VM) threat movement BRKPCA-2040

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

37

Micro-segmentation with VACS Micro-segmentation in a few Clicks Web application Web-1

Public DB DB-1 (VM3)

Define Zones

ww w

www

Web-1 zone

DB-1 zone

Web-2 zone

DB-2 zone

Web application Web-2

Add VMs Apply zone based policies

Confidential DB DB-2 (VM4)

BRKPCA-2040

Source

Destinatio n

Policy

Web-1

DB-1

Allow

Web-2

DB-2

Allow

Web-1

DB-2

Drop

Web-2

DB-1

Allow

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

38

Demo

BRKPCA-2040

40

ASAv Support in VACS Upstream Router VACS – 3 Tier App Container (Custom)

ASAv

• Up to 2G Throughput • L3 Routing • Edge FW

VLAN 10/VXLAN 101

VSG Zone-based FW

HA Proxy HTTP(s) LB

Web Zone

App Zone

DB Zone

• All ASAv Day 0 operations supported with VACS Custom containers • Support for all ASAv license levels (ASAv5, ASAv10, ASAv30) BRKPCA-2040

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

41

CSR1Kv vs ASAv Gateway features CSR1Kv

ASAv

License



Included as part of VACS license



BYOL Smart License, not included as part of VACS

Throughput



10 Gbps



Up to 2Gbps based on ASAv license

Features

• •

All IP features Basic Security featurs : ACL, AAA, RADIUS, and TACACS+, ZBFW, ALG



Full-feature ASAv with complete perimeter firewall functionality

High Availability



Using HSRP



Stateful HA

VACS container support



Internal, External, Custom



Custom

VACS Container Sizing



N/A



Default ALG support

• • •

Depends on ASAv license level o Small – ASAv5 o Medium – ASAv10 o Large – ASAv30

Supported only in non-HA mode • Default : HTTP, HTTPS, FTP, DNS, ICMP Additional : SQLNET, MSSQL, LDAP •

Default : FTP, DNS, SQLNET, H323 H225, H323 RAS, IP-OPTIONS, NETBIOS, RSH, RTSP, SKINNY, ESMTP, SUNRPC, TFTP, SIP, XDMCP Additional : ICMP, HTTP, IPv6, MGCP and more

BRKPCA-2040

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

42

Evolution of truly Secure Segmentation 

VACS domain + physical ( mixed environment) 

Existing customer base with TrustSec (Cisco ISE) focused on Physical Network Elements (NX7k/6k/5k, Catalyst)  Extend the segmentation to virtualized applications 

Why Secure Group Tags are not effective with virtualization 

Physical segmentation will reach to Presentation Tier  Physical segmentation extended across all Application Tiers is NOT secure from folks like “Bob”

BRKPCA-2040

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

46

Extend Cisco TrustSEC to Virtual Infrastructure with VACS Security Group – Combined Virtual & Physical •

Data Center Core Layer

Micro Segmentation defined in a simple policy table or matrix – automated with VACS or ISE



Scalable architecture w/out increase in operational

DC Aggregation Layer

complexity •

Applied across Catalyst (Campus and Branch) and Nexus (Data Center) with VACS independent of the topology



DC Service Layer

Security Firewalling with ASA or ASAv

• Segmentation defined in a simple policy table or matrix VACS Integration with Cisco TrustSEC • Applied across Nexus • VACS can Consume or Create7000/5500/2000/ the SecureGroupTags VACS independent of the topology

DC Access Layer

deployed on the switches through ISE



ASAv is aware of all the zones



Stop attack at the virtual perimeter

Physical Servers SGACL enabled Device SGACL enabled Device

Virtual Enforcement w/ VACS BRKPCA-2040

SG Firewall enabled Device

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

47

Extending micro-segmentation to physical domain 1. VACS creates a container with Web and App Tiers 2. Get the “Zone to IP” mapping for both zones from VSG 3. Program the NX1kV with “IP to SecureGroupTag” mapping 4. Program the Bare Metal DB zone SecureGroupTags on N5K to be granular 5. Program firewall rules (ACLs) on N5K

Web application VM1

App VM3

Public Design DB (DB1)

www

www

Web application VM2

App VM4 Confidential Design DB (DB2)

VACS Nexus 5000 ASAv SXP Cisco ISE ( Identity Services Engine) BRKPCA-2040

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

48

Agenda •

Introduction



Cisco VACS Overview



VACS Configuration



Security Use-cases



Customers



Conclusion

VACS Customers

Cedacri Cloud service provider in Italy

VACS through Cisco Enterprise Cloud Suite enabled Cedacri to onboard new customers 90 percent faster while ensuring security compliance

“ Cisco VACS gives us the speed and agility we need to stay ahead in a competitive cloud market.”

Customer benefits: • Multi-tenancy in minutes • Zero trust security using microsegmentation • Differentiating the service provider cloud

- Alessandro Spigaroli, Head of Architecture & Innovation, Cedacri

http://www.cisco.com/c/dam/en/us/solutions/collateral/data-center-virtualization/one-enterprise-suite/cedacri-voc-case-study.pdf BRKPCA-2040

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

51

Lightedge Solutions IT service provider to businesses in United States

“With UCSD + VACS we were able to take a complex, multi-zone IT platform with over 20 unique security zones and deploy a fully functional replica of this environment in hours. Prior to UCSD+VACS this same deployment, using manual procedures and physical security devices, took well over 60 days to deliver to our customer”

Customer benefits: • Building a custom cloud environment with self-service capabilities • Secure Segmentation for their business customers • Security policy compliance

- Mike McHenry VP Cloud and Cloud Architecture, LightEdge • http://www.cisco.com/c/dam/en/us/solutions/collateral/data-center-virtualization/one-enterprise-suite/lightedge-case-study.pdf • http://www.lightedge.com/cisco-vacs/ BRKPCA-2040

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

52

Agenda •

Introduction



Cisco VACS Overview



VACS Configuration



Security Use-cases



Customers



Conclusion

Conclusion

Summary 

VACS is the security pillar of the Cisco Enterprise Cloud Suite



VACS provides micro-segmentation today across a common hypervisor environment (Cisco NX1kV)



VACS is the most Effective Tool to achieve Secure Segmentation and enhanced automation in a journey to ITaaS



Reach out to your Cisco account team for further assistance! 

Try it out in dCloud (access available to those with a cisco.com login)

BRKPCA-2040

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

55

Q&A

Complete Your Online Session Evaluation •

Please complete your Online Session Evaluations after each session



Complete 4 Session Evaluations & the Overall Conference Evaluation (available from Thursday) to receive your Cisco Live T-shirt



All surveys can be completed via the Cisco Live Mobile App or the Communication Stations

Don’t forget: Cisco Live sessions will be available for viewing on-demand after the event at CiscoLive.com/Online

BRKPCA-2040

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

57

There has never been a better time to effectively segment workloads…

Thankyou