SlideShare uma empresa Scribd logo
1 de 25
Baixar para ler offline
Network Function Virtualization
AtlSecCon 2015
SECURITY BEST PRACTICES
What is Network Function Virtualization?
 Virtual Core Network Services
 Introduces Concept of Control Plane and Data Plane
 Typical Virtual Network Services
 Core Layer 2 Switching (VLANS)
 Layer 3 Routing (Internal and External Routing Functions- OSPF,
BGP, etc)
 Edge Firewall Services
 VPN Tunneling
 Embedded IPS/IDS
 Automated Service Provisioning
 Automated Threat Response
A means to make the network more flexible and simple by
minimising dependence on HW constraints
v
 Network Functions are SW-based over well-known HW
 Multiple roles over same HW
ORCHESTRATION, AUTOMATION
& REMOTE INSTALL
DPI
BRAS
GGSN/
SGSN
Firewall
CG-NAT
PE Router
VIRTUAL
APPLIANCES
STANDARD
HIGH VOLUME
SERVERS
Virtualised Network Model:
VIRTUAL APPLIANCE APPROACHv
 Network Functions are based on specific HW&SW
 One physical node per role
DPI
BRAS
GGSN/SGSN
Session Border
ControllerFirewall CG-NAT
PE Router
Traditional Network Model:
APPLIANCE APPROACH
Source: Adapted from D. Lopez Telefonica I+D, NFV
INTERNET DataBase
WWW
Enterprise
Services
Users
Fundamental Changes in Architecture
Traditional Infrastructure Virtualized Infrastructure
Physical Servers
INTERNET
Internet
VLAN
Management
VLAN
Enterprise
VM
Virtual
Firewall
WWW
VM
Database
VM
Users
Network Function Virtualization vs.
Software Defined Networks
 Complimentary set of services
 Network Function Virtualization (NFV)
 Originated from the need to scale Network Services (Service Provider World)
 Data plane functions running in VMs on commodity servers
 Software Defined Networking (SDN)
 Originated from API control of Network Features (IT World)
 Also Separating the Control and Data Planes
 Together Allow Scalable Cloud Applications and Services (Apps)
 Applications running on top of the network with transportable network
characteristics.
The ETSI NFV ISG
• Global operators-led Industry
Specification Group (ISG) under the
auspices of ETSI
– ~150 member organisations
• Open membership
– ETSI members sign the “Member
Agreement”
– Non-ETSI members sign the
“Participant Agreement”
– Opening up to academia
• Operates by consensus
– Formal voting only when required
• Deliverables: White papers
addressing challenges and operator
requirements, as input to SDOs
– Not a standardisation body by itself
• Currently, four WGs and two EGs
– Infrastructure
– Software Architecture
– Management & Orchestration
– Reliability & Availability
– Performance & Portability
– Security
Source: Adapted from D. Lopez Telefonica I+D, NFV
ETSI NFV Reference Architecture
Computing
Hardware
Storage
Hardware
Network
Hardware
Hardware resources
Virtualisation Layer
Virtualised
Infrastructure
Manager(s)
VNF
Manager(s)
VNF 2
OrchestratorOSS/BSS
NFVI
VNF 3VNF 1
Execution
reference points
Main NFV
reference points
Other reference
points
Virtual
Computing
Virtual
Storage
Virtual
Network
NFV Management and
Orchestration
EMS 2 EMS 3EMS 1
Service and Infrastructure
Requirements
Or-Vi
Or-Vnfm
Vnfm-Vi
Os-Ma
Se-Or
Ve-Vnfm
Nf-Vi
Vn-Nf
Vi-Ha
Virtualization Layer-Hardware Resources (VI-Ha)
VNF – NFVI (Vn-Nf)
Orchestrator – VNF Manager (Or-Vnfm)
Virtualized Infrastructure Manager – VNF Manager (Vi-Vnfm)
Orchestrator – Virtualized Infrastructure Manager (Or-Vi)
NFVI-Virtualized Infrastructure Manager (Nf-Vi)
Operation Support System (OSS)/Business Support Systems
(BSS) – NFV Management and Orchestration (Os-Ma)
VNF/ Element Management System (EMS) – VNF Manager
(Ve-Vnfm)
Service, VNF and Infrastructure Description – NFV
Management and Orchestration (Se-Ma): VNF Deployment
template, VNF Forwarding Graph, service-related information,
NFV infrastructure information
Ref: ETSI, “Architectural Framework,” Oct 2013,
Integrated Cloud Stacks - VMware
Integrated Cloud Stacks - VMware
Non-Disruptive Deployment
Programmatically Provisioned
Services Distributed to the Virtual Switch
Physical Workloads and Legacy VLANs
Virtual Networks are isolated from each other
(Overlapping IP Addresses)
Virtual Networks are isolated from underlying
physical network (IPv6 over IPv4)
Security – Complete Isolation
Central Policies, Distributed
Enforcement, Move with VMs
Internet
Security Policy
Security Policy
The Power of Distribution
Integrated Cloud Stacks - OpenStack
Source: Openstack.org
OpenStack Neutron Architecture
Management Network
Data Network
External Network API Network
Internet
OpenStack Neutron – Compute Node
OpenStack Neutron – Network Node
To Public Network
To Private Network
NFV Challenges
 Very Quickly Evolving Standards
 Still some industry to do on standardization of transport layer (Data Center
Extension) Services (Ie. MPLS, VXLAN)
 Some very new NFV software stacks require market testing for security
 Initial complexity of deployment and learning curve means a higher risk of
mis-configuration and security exposure
 Must trust the inherent security barriers between the management and
control planes.
 Extreme diligence on security the management plane of a virtualized system for
obvious reasons.
 Cloud Administrators are being thrust into the role of security architects in
many cases.
NFV Opportunities
 Very Rapid Deployment Models
 Allows for significantly quicker recovery from incidents.
 Create new DMZ, redeploy VM’s, Add Firewall in Minutes rather than days
 Allows the addition of extra layers of security with lower costs.
 Many virtualized firewalls are significantly cheaper than traditional H/W based devices
 Flexibility to easily, rapidly, dynamically provision and instantiate new services in various
locations
 Improved operational efficiency
 Software-oriented innovation to rapidly prototype and test new services
 More service differentiation & customization
 Reduced (OPEX) operational costs: reduced power, reduced space, improved network
monitoring
 IT-oriented skillset and talent
 Rapid development of software based virtual security appliances
NFV Security Best Practices
 Stick to traditional best practices
 Defense in depth
 Log management (Including accurate time/date stamps)
 Diligence on software bugs (some NFV stacks have much lower public
scrutiny)
 Don’t assume software teams have network security experience
 Layer 2 Security
 Isolated VLANS for Secure Zones
 Layer 3 Security
 Access Control via Access List and Firewall Rules
 IPS/IDS
NFV Industry Resources
 Cloud Security Alliance
 OpenFlow (Cisco, HP, Juniper, Arita, Alcatel-Lucent, etc)
 OpenDaylight Project (IBM,Cisco,Juniper,VMware,Microsoft,Dell,etc)
 Cisco - Evolved Services Platform
 Juniper - Contrail & vMX 3D Universal Edge Router
 Alcatel-Lucent - CloudBand Platform
 HP - OpenNFV Reference Architecture
 VMware – NSX Virtualization Platform
 F5 - Synthesis Architecture
Winston.Morton@Nuviser.com
@WinstonMorton

Mais conteúdo relacionado

Mais procurados

Attacking SDN infrastructure: Are we ready for the next gen networking
Attacking SDN infrastructure: Are we ready for the next gen networkingAttacking SDN infrastructure: Are we ready for the next gen networking
Attacking SDN infrastructure: Are we ready for the next gen networking
Priyanka Aash
 

Mais procurados (20)

VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...
VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...
VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...
 
VMworld 2013: Advanced VMware NSX Architecture
VMworld 2013: Advanced VMware NSX Architecture VMworld 2013: Advanced VMware NSX Architecture
VMworld 2013: Advanced VMware NSX Architecture
 
Why Security Teams should care about VMware
Why Security Teams should care about VMwareWhy Security Teams should care about VMware
Why Security Teams should care about VMware
 
Cloud Native Security: New Approach for a New Reality
Cloud Native Security: New Approach for a New RealityCloud Native Security: New Approach for a New Reality
Cloud Native Security: New Approach for a New Reality
 
Software Defined Networking (SDN) with VMware NSX
Software Defined Networking (SDN) with VMware NSXSoftware Defined Networking (SDN) with VMware NSX
Software Defined Networking (SDN) with VMware NSX
 
VMworld 2013: Security Automation Workflows with NSX
VMworld 2013: Security Automation Workflows with NSX VMworld 2013: Security Automation Workflows with NSX
VMworld 2013: Security Automation Workflows with NSX
 
VMworld 2013: VMware NSX Extensibility: Network and Security Services from 3r...
VMworld 2013: VMware NSX Extensibility: Network and Security Services from 3r...VMworld 2013: VMware NSX Extensibility: Network and Security Services from 3r...
VMworld 2013: VMware NSX Extensibility: Network and Security Services from 3r...
 
Hope, fear, and the data center time machine
Hope, fear, and the data center time machineHope, fear, and the data center time machine
Hope, fear, and the data center time machine
 
네트워크 가상화 보안현황 및 보안연관성
네트워크 가상화 보안현황 및 보안연관성네트워크 가상화 보안현황 및 보안연관성
네트워크 가상화 보안현황 및 보안연관성
 
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...
 
OWASP Brisbane - SDN Security
OWASP Brisbane - SDN SecurityOWASP Brisbane - SDN Security
OWASP Brisbane - SDN Security
 
Ccnp cursus
Ccnp cursusCcnp cursus
Ccnp cursus
 
Equifax cyber attack contained by containers
Equifax cyber attack contained by containersEquifax cyber attack contained by containers
Equifax cyber attack contained by containers
 
Cisco, Sourcefire and Lancope - Better Together
Cisco, Sourcefire and Lancope - Better TogetherCisco, Sourcefire and Lancope - Better Together
Cisco, Sourcefire and Lancope - Better Together
 
The Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and LancopeThe Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and Lancope
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
 
Attacking SDN infrastructure: Are we ready for the next gen networking
Attacking SDN infrastructure: Are we ready for the next gen networkingAttacking SDN infrastructure: Are we ready for the next gen networking
Attacking SDN infrastructure: Are we ready for the next gen networking
 
TechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSecTechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSec
 
Network engineering surgery - MSER complete network 2 (Slough)
Network engineering surgery - MSER complete network 2 (Slough)Network engineering surgery - MSER complete network 2 (Slough)
Network engineering surgery - MSER complete network 2 (Slough)
 
Scaling Your SDDC Network: Building a Highly Scalable SDDC Infrastructure wit...
Scaling Your SDDC Network: Building a Highly Scalable SDDC Infrastructure wit...Scaling Your SDDC Network: Building a Highly Scalable SDDC Infrastructure wit...
Scaling Your SDDC Network: Building a Highly Scalable SDDC Infrastructure wit...
 

Destaque (7)

Zoura Subscribed 2013 LinkBermuda Metered Cloud Services
Zoura Subscribed 2013 LinkBermuda Metered Cloud ServicesZoura Subscribed 2013 LinkBermuda Metered Cloud Services
Zoura Subscribed 2013 LinkBermuda Metered Cloud Services
 
Why No One Reads Your Annual Report: Data Visualization for Nonprofits
Why No One Reads Your Annual Report: Data Visualization for NonprofitsWhy No One Reads Your Annual Report: Data Visualization for Nonprofits
Why No One Reads Your Annual Report: Data Visualization for Nonprofits
 
Email Security Best Practices
Email Security Best PracticesEmail Security Best Practices
Email Security Best Practices
 
QQ Overview
QQ  OverviewQQ  Overview
QQ Overview
 
An Introduction to Network Theory
An Introduction to Network TheoryAn Introduction to Network Theory
An Introduction to Network Theory
 
2016 open-source-network-softwarization
2016 open-source-network-softwarization2016 open-source-network-softwarization
2016 open-source-network-softwarization
 
Nfv short-course-sbrc14-full
Nfv short-course-sbrc14-fullNfv short-course-sbrc14-full
Nfv short-course-sbrc14-full
 

Semelhante a Network Function Virtualization - Security Best Practices AtlSecCon 2015

Network Function Virtualization : Overview
Network Function Virtualization : OverviewNetwork Function Virtualization : Overview
Network Function Virtualization : Overview
sidneel
 
NFV Linaro Connect Keynote
NFV Linaro Connect KeynoteNFV Linaro Connect Keynote
NFV Linaro Connect Keynote
Linaro
 
Research Challenges and Opportunities in the Era of the Internet of Everythin...
Research Challenges and Opportunities in the Era of the Internet of Everythin...Research Challenges and Opportunities in the Era of the Internet of Everythin...
Research Challenges and Opportunities in the Era of the Internet of Everythin...
Stenio Fernandes
 
New Threats, New Approaches in Modern Data Centers
New Threats, New Approaches in Modern Data CentersNew Threats, New Approaches in Modern Data Centers
New Threats, New Approaches in Modern Data Centers
Iben Rodriguez
 

Semelhante a Network Function Virtualization - Security Best Practices AtlSecCon 2015 (20)

Network Function Virtualization : Overview
Network Function Virtualization : OverviewNetwork Function Virtualization : Overview
Network Function Virtualization : Overview
 
How will virtual networks, controlled by software, impact OSS systems?
How will virtual networks, controlled by software, impact OSS systems?How will virtual networks, controlled by software, impact OSS systems?
How will virtual networks, controlled by software, impact OSS systems?
 
Network Function Virtualization (NFV) BoF
Network Function Virtualization (NFV) BoFNetwork Function Virtualization (NFV) BoF
Network Function Virtualization (NFV) BoF
 
Ottawa e-NFV Session
Ottawa e-NFV Session Ottawa e-NFV Session
Ottawa e-NFV Session
 
Securing NFV and SDN Integrated OpenStack Cloud: Challenges and Solutions
Securing NFV and SDN Integrated OpenStack Cloud: Challenges and SolutionsSecuring NFV and SDN Integrated OpenStack Cloud: Challenges and Solutions
Securing NFV and SDN Integrated OpenStack Cloud: Challenges and Solutions
 
Securing your nfv and sdn integrated open stack cloud- challenges, use-cases ...
Securing your nfv and sdn integrated open stack cloud- challenges, use-cases ...Securing your nfv and sdn integrated open stack cloud- challenges, use-cases ...
Securing your nfv and sdn integrated open stack cloud- challenges, use-cases ...
 
Design Summit - NFV BoF - Dave Neary
Design Summit - NFV BoF - Dave NearyDesign Summit - NFV BoF - Dave Neary
Design Summit - NFV BoF - Dave Neary
 
VMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesVMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use cases
 
Network Functions Virtualization.pptx
Network Functions Virtualization.pptxNetwork Functions Virtualization.pptx
Network Functions Virtualization.pptx
 
NFV Linaro Connect Keynote
NFV Linaro Connect KeynoteNFV Linaro Connect Keynote
NFV Linaro Connect Keynote
 
Software defined networking(sdn) vahid sadri
Software defined networking(sdn) vahid sadriSoftware defined networking(sdn) vahid sadri
Software defined networking(sdn) vahid sadri
 
NSX, un salt natural cap a SDN
NSX, un salt natural cap a SDNNSX, un salt natural cap a SDN
NSX, un salt natural cap a SDN
 
SURF Lego - Architecture - Peter Boers- NWD23
SURF Lego - Architecture - Peter Boers- NWD23SURF Lego - Architecture - Peter Boers- NWD23
SURF Lego - Architecture - Peter Boers- NWD23
 
Research Challenges and Opportunities in the Era of the Internet of Everythin...
Research Challenges and Opportunities in the Era of the Internet of Everythin...Research Challenges and Opportunities in the Era of the Internet of Everythin...
Research Challenges and Opportunities in the Era of the Internet of Everythin...
 
[OpenStack Day in Korea 2015] Track 2-3 - 오픈스택 클라우드에 최적화된 네트워크 가상화 '누아지(Nuage)'
[OpenStack Day in Korea 2015] Track 2-3 - 오픈스택 클라우드에 최적화된 네트워크 가상화 '누아지(Nuage)'[OpenStack Day in Korea 2015] Track 2-3 - 오픈스택 클라우드에 최적화된 네트워크 가상화 '누아지(Nuage)'
[OpenStack Day in Korea 2015] Track 2-3 - 오픈스택 클라우드에 최적화된 네트워크 가상화 '누아지(Nuage)'
 
Network function virtualization
Network function virtualizationNetwork function virtualization
Network function virtualization
 
1303briscoe-sdnrg-nfv.ppt
1303briscoe-sdnrg-nfv.ppt1303briscoe-sdnrg-nfv.ppt
1303briscoe-sdnrg-nfv.ppt
 
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
 
Demystifying OpenStack for NFV
Demystifying OpenStack for NFVDemystifying OpenStack for NFV
Demystifying OpenStack for NFV
 
New Threats, New Approaches in Modern Data Centers
New Threats, New Approaches in Modern Data CentersNew Threats, New Approaches in Modern Data Centers
New Threats, New Approaches in Modern Data Centers
 

Último

6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
@Chandigarh #call #Girls 9053900678 @Call #Girls in @Punjab 9053900678
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
nirzagarg
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Chandigarh Call girls 9053900678 Call girls in Chandigarh
 

Último (20)

Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
 
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
 

Network Function Virtualization - Security Best Practices AtlSecCon 2015

  • 1. Network Function Virtualization AtlSecCon 2015 SECURITY BEST PRACTICES
  • 2. What is Network Function Virtualization?  Virtual Core Network Services  Introduces Concept of Control Plane and Data Plane  Typical Virtual Network Services  Core Layer 2 Switching (VLANS)  Layer 3 Routing (Internal and External Routing Functions- OSPF, BGP, etc)  Edge Firewall Services  VPN Tunneling  Embedded IPS/IDS  Automated Service Provisioning  Automated Threat Response
  • 3. A means to make the network more flexible and simple by minimising dependence on HW constraints v  Network Functions are SW-based over well-known HW  Multiple roles over same HW ORCHESTRATION, AUTOMATION & REMOTE INSTALL DPI BRAS GGSN/ SGSN Firewall CG-NAT PE Router VIRTUAL APPLIANCES STANDARD HIGH VOLUME SERVERS Virtualised Network Model: VIRTUAL APPLIANCE APPROACHv  Network Functions are based on specific HW&SW  One physical node per role DPI BRAS GGSN/SGSN Session Border ControllerFirewall CG-NAT PE Router Traditional Network Model: APPLIANCE APPROACH Source: Adapted from D. Lopez Telefonica I+D, NFV
  • 4. INTERNET DataBase WWW Enterprise Services Users Fundamental Changes in Architecture Traditional Infrastructure Virtualized Infrastructure Physical Servers INTERNET Internet VLAN Management VLAN Enterprise VM Virtual Firewall WWW VM Database VM Users
  • 5. Network Function Virtualization vs. Software Defined Networks  Complimentary set of services  Network Function Virtualization (NFV)  Originated from the need to scale Network Services (Service Provider World)  Data plane functions running in VMs on commodity servers  Software Defined Networking (SDN)  Originated from API control of Network Features (IT World)  Also Separating the Control and Data Planes  Together Allow Scalable Cloud Applications and Services (Apps)  Applications running on top of the network with transportable network characteristics.
  • 6. The ETSI NFV ISG • Global operators-led Industry Specification Group (ISG) under the auspices of ETSI – ~150 member organisations • Open membership – ETSI members sign the “Member Agreement” – Non-ETSI members sign the “Participant Agreement” – Opening up to academia • Operates by consensus – Formal voting only when required • Deliverables: White papers addressing challenges and operator requirements, as input to SDOs – Not a standardisation body by itself • Currently, four WGs and two EGs – Infrastructure – Software Architecture – Management & Orchestration – Reliability & Availability – Performance & Portability – Security Source: Adapted from D. Lopez Telefonica I+D, NFV
  • 7. ETSI NFV Reference Architecture Computing Hardware Storage Hardware Network Hardware Hardware resources Virtualisation Layer Virtualised Infrastructure Manager(s) VNF Manager(s) VNF 2 OrchestratorOSS/BSS NFVI VNF 3VNF 1 Execution reference points Main NFV reference points Other reference points Virtual Computing Virtual Storage Virtual Network NFV Management and Orchestration EMS 2 EMS 3EMS 1 Service and Infrastructure Requirements Or-Vi Or-Vnfm Vnfm-Vi Os-Ma Se-Or Ve-Vnfm Nf-Vi Vn-Nf Vi-Ha Virtualization Layer-Hardware Resources (VI-Ha) VNF – NFVI (Vn-Nf) Orchestrator – VNF Manager (Or-Vnfm) Virtualized Infrastructure Manager – VNF Manager (Vi-Vnfm) Orchestrator – Virtualized Infrastructure Manager (Or-Vi) NFVI-Virtualized Infrastructure Manager (Nf-Vi) Operation Support System (OSS)/Business Support Systems (BSS) – NFV Management and Orchestration (Os-Ma) VNF/ Element Management System (EMS) – VNF Manager (Ve-Vnfm) Service, VNF and Infrastructure Description – NFV Management and Orchestration (Se-Ma): VNF Deployment template, VNF Forwarding Graph, service-related information, NFV infrastructure information Ref: ETSI, “Architectural Framework,” Oct 2013,
  • 12. Services Distributed to the Virtual Switch
  • 13. Physical Workloads and Legacy VLANs
  • 14. Virtual Networks are isolated from each other (Overlapping IP Addresses) Virtual Networks are isolated from underlying physical network (IPv6 over IPv4) Security – Complete Isolation
  • 15. Central Policies, Distributed Enforcement, Move with VMs Internet Security Policy Security Policy
  • 16. The Power of Distribution
  • 17. Integrated Cloud Stacks - OpenStack Source: Openstack.org
  • 18. OpenStack Neutron Architecture Management Network Data Network External Network API Network Internet
  • 19. OpenStack Neutron – Compute Node
  • 20. OpenStack Neutron – Network Node To Public Network To Private Network
  • 21. NFV Challenges  Very Quickly Evolving Standards  Still some industry to do on standardization of transport layer (Data Center Extension) Services (Ie. MPLS, VXLAN)  Some very new NFV software stacks require market testing for security  Initial complexity of deployment and learning curve means a higher risk of mis-configuration and security exposure  Must trust the inherent security barriers between the management and control planes.  Extreme diligence on security the management plane of a virtualized system for obvious reasons.  Cloud Administrators are being thrust into the role of security architects in many cases.
  • 22. NFV Opportunities  Very Rapid Deployment Models  Allows for significantly quicker recovery from incidents.  Create new DMZ, redeploy VM’s, Add Firewall in Minutes rather than days  Allows the addition of extra layers of security with lower costs.  Many virtualized firewalls are significantly cheaper than traditional H/W based devices  Flexibility to easily, rapidly, dynamically provision and instantiate new services in various locations  Improved operational efficiency  Software-oriented innovation to rapidly prototype and test new services  More service differentiation & customization  Reduced (OPEX) operational costs: reduced power, reduced space, improved network monitoring  IT-oriented skillset and talent  Rapid development of software based virtual security appliances
  • 23. NFV Security Best Practices  Stick to traditional best practices  Defense in depth  Log management (Including accurate time/date stamps)  Diligence on software bugs (some NFV stacks have much lower public scrutiny)  Don’t assume software teams have network security experience  Layer 2 Security  Isolated VLANS for Secure Zones  Layer 3 Security  Access Control via Access List and Firewall Rules  IPS/IDS
  • 24. NFV Industry Resources  Cloud Security Alliance  OpenFlow (Cisco, HP, Juniper, Arita, Alcatel-Lucent, etc)  OpenDaylight Project (IBM,Cisco,Juniper,VMware,Microsoft,Dell,etc)  Cisco - Evolved Services Platform  Juniper - Contrail & vMX 3D Universal Edge Router  Alcatel-Lucent - CloudBand Platform  HP - OpenNFV Reference Architecture  VMware – NSX Virtualization Platform  F5 - Synthesis Architecture