brkaci-2504 -...

105

Upload: hoangduong

Post on 02-May-2018

238 views

Category:

Documents


10 download

TRANSCRIPT

Page 1: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction
Page 2: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

BRKACI-2504 Cisco Security on ACI,

MicroSegmentation, ASA,FirePower

Brenden Buresh – DC Technical Solutions Architect

Page 3: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

• Introduction – Data Center Security

• ACI Fundamental Building Blocks

• ACI Tenant Whitelist Security

• ACI Fabric Infrastructure Security

• ACI Fabric Micro-Segmentation

• Extending ACI Security Outside DC

• Conclusion – ACI=Advanced Security

Agenda

Page 4: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Introduction: Data Center Security

Page 5: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Security Threats are Trending Higher Cisco Annual Security Report 2016

Page 6: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Organizational Security – Confidence SlippingCisco Annual Security Report 2016

Page 7: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

What is the Problem Facing IT Organizations?Complexity of Traditional Infrastructure

Fragile

Network Complexity Dictates

App Deployment/Operation

InsecureRigid

• Logical-Physical Tightly Coupled

• 1 Intentional Change Yields Many

Unintended Changes

• Org Silos—Language Translation

• “Don’t Touch It!”

• Code Upgrades, Config Changes,

New Devices

• Stifles Innovation

• Box by Box Configuration

• Error Prone

• Compliance Challenges

Page 8: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

POLICY

Operational

Simplicity

Application

Centricity

Security and

Compliance

Multi-Vendor

Innovation

Compute

Network

Storage

L4-7 Services

Security

Orchestration

Management

UCS

Service

Profile

Application

Network

Profile

Security

Profile

Why Policy Has Become Table Stakes?Policy Driven Infrastructure Delivers Network Simplification via Policy Automation

Page 9: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Policy: Links Application Language to Infrastructure

99

Network Language

Compute/Storage

Language

Security Language

Application Language

• Application tier policy and

dependencies

• Security requirements

• Service level agreement

• Application performance

• Compliance

• Geo dependencies

Decouple Application and

policy from Underlying

infrastructure

Infrastructure

Common Policy

App

Network

Profile

USC

Service

ProfilePolicy-Driven

Infrastructure

Page 10: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

ACI Fundamental Building Blocks

Page 11: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Application Centric InfrastructureAutomating IT by Making Applications the Focal Point

Business

Requirements

STORAGE

POLICY POLICY

SECURITYCOMPUTEL4-7 SERVICES

Applications Policy Integrated Physical and Virtual

Agile, Open and Secure

Page 12: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

ACI Solution: Agile, Open, and Secure

14

Open

App Requirements Drive

Network Deployment/Operation

Secure

• Speed through Automation

• Physical and Virtual Endpoints with

Consistent Policy

• Application Health Monitoring

• H/W Based VXLAN Gateway

Agile

• Whitelist Approach

• Multitenant Aware

• Simplified Compliance

• Open APIs, Open Source and Open

Standards

• Customer Choice And Interoperability

• Drives Innovation

Policy

Automation

Visibility Scale and

Performance

Open

API’s

Partner

Ecosystem

Multi-Tenant

Security

Compliance

Page 13: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Building Blocks (Pillars) of ACIRapid Application Deployment via Open Networks with Scale, Security, Full Visibility

Application Centric Policy Open EcosystemACI Fabric/Nexus 9000

Industry Leading

Technology

Partnerships

Application Centric Infrastructure

Page 14: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Cisco ACI Fabric

16

ProgrammabilityPower EfficiencyPort DensityPerformance

Innovations in Cisco® NX-OS Software

Nexus 9500 Modular Switches Nexus 9300 Fixed Switches

Innovations in Hardware and System Design

Price

Integrated Overlay

CapabilitiesImproved Application

Performance

Programmability

and Automation

Page 15: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

ACI Policy Driven NetworkApplication Network Profiles

SYSTEM CONFIGURES HARDWARE

AUTOMATICALLY

SecuritySME

Network SME

Application SME

SYSTEM CONFIGURES HARDWARE

AUTOMATICALLY

Application Profiles

Virtualization Policy

Bare-Metal Policy

Network Policy

Security Policy

END POINT GROUPS, CONTRACTS, AND SERVICE GRAPHS TO CREATE ANPS

POLICIES USED TO CREATE A POLICY DRIVEN NETWORK

Leaf Node Name

VLAN, IP Pools

Switch Profiles

Interface Policies

Attachable Access Entity Profile

Bridge Domains

EPGs

Layer 4-7 Service Graphs

WEB EPG

End Point Groups, Provider Contract to App, Firewalls,

Load Balancers, IPS, IDS

APP EPG

End Point Groups, Consumer and Provider

Contracts, Firewalls, Load Balancers

Database EPG

End Point Groups, Consumer

Contracts, Firewalls

Page 16: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

ACI – A Policy Based IP Network

PayloadIPVXLANVTEP

AVS

VTEP

APIC - Policy Controller &

Distributed Management

Information Tree (DMIT)

Physical and Virtual L4-7

Service Nodes

Physical and Virtual VTEP’s

(Policy & Forwarding Edge

Nodes)

Proxy (Directory)

Services

Physical and Virtual Endpoints

(Servers) & VMM (Hypervisor vSwitch)

VTEP

IP Network & Integrated

VXLAN

WAN/DCI

Services

VTEP

VTEP

AVS

VTEP

Page 17: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

“Users”“Files”

ACI Fabric

Define Endpoint Groups

Any endpoints anywhere within the

fabric, virtual or physical

Enforce Ingress Fabric Rules

Hardware rules on each port, security in

depth, embedded QoS

Single Point of Orchestration

Different administrative groups

use same interface, high level

of object sharing

Application Policy Infrastructure

Controller (APIC)Create Contracts Between Endpoint

Groups

Port-level rules: drop, prioritize, push to

service chain; reusable templates

Service Graph

Single Pass Services

Security administrator defines

generic templates in APIC,

availed to contract creation

All TCP/UDP: Accept, Redirect

UDP/16384-32767: Prioritize

All Other: Drop

Policy Contract “Users → Files”

ACI is a Robust Network Fabric Provides a New Communication Abstraction Model

Page 18: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

“Users”“Files”

ACI Fabric

Logical Endpoint Groups by

Role

Heterogeneous clients, servers,

external clouds; fabric controls

communication

Every device is one hop away, microsecond

latency, no power or port availability

constraints, ease of scaling

Flexible Insertion

ACI Controller manages all

participating devices, change control

and audit capabilities

Unified Management and Visibility

Fabric Port Services

Hardware filtering and bridging; default

gateway; seamless service insertion,

“service farm” aggregation

Flat Hardware Accelerated

Network

Full abstraction, de-coupled from

VLANs and Dynamic Routing, low

latency, built-in QoS

Application Centric Infrastructure Fabric

Page 19: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

ACI Policy InstantiationLogical Network Provisioning of Stateless Hardware

ACI Fabric

Application Policy

Infrastructure Controller

Integrated GBP VXLAN Overlay

APIC

ADCAPP DBF/W

ADCWEB

ACI Policy

Page 20: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Application Policy Infrastructure ControllerCentralized Automation and Fabric Management

Layer 4..7 System

Management

Storage

Management

Orchestration

Management

Storage SME Server SME Network SME

Security SME App. SME OS SME

Open RESTful API

Policy-Based

Provisioning

APIC

• Unified point of Data Center network

automation and management:

• Data Model based declarative

provisioning

• Application, Topology Monitoring, &

Troubleshooting

• 3rd party Integration (L4-L7 Services,

Storage, Compute, WAN, …)

• Image Management (Spine / Leaf)

• Fabric Inventory

• Centralized Access to ‘all’ Fabric information

- GUI, CLI and RESTful API’s

• Extensible to compute and storage

management

Page 21: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Application Centric Infrastructure VisionOpen Ecosystem, Open API’s

Application

Network Profile

Hypervisor Management

Systems Management

Centralized Policy Management

Open APIs, Open Source,

Open StandardsAPIC

Fabric

Automation Enterprise Monitoring

Physical Networking

Hypervisors and Virtual Networking

Compute L4–L7Services

Storage

Orchestration Frameworks

Page 22: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Cisco ACI Built on Open Architectures

24

OPEN STANDARDS

OPEN ECOSYSTEM

OPEN SOURCE

OpFlexNSHVXLAN

UCS ACIInter

cloudSecurity

OPEN INTERFACES

RESTful APIs (XML)

IoT

DevOps

Page 23: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

ACI TenantWhitelist Security

Page 24: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

APPLICATION

SECURITY

Web

Tier

App

Tier

DB

Tier

Trusted

ZoneDB

Tier

DMZ

External

Zone

Cloud

Application Admin

Security Admin

Network Admin

Cloud Admin

ACI Goal: Common Policy and Operations Framework

26

Page 25: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Application Admin

Security Admin

Network Admin

SECURITY

Trusted

ZoneDB

Tier

DMZ

External Zone

APPLICATION

COMMON POOL OF RESOURCES

Cloud Admin

Cloud

ACI Goal: Common Policy and Operations Framework

27

Page 26: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

ACI Policy Model Brings Concept of End-Point Group

28

HTTPS

Service

HTTPS

Service

HTTPS

Service

HTTPS

Service

HTTP

Service

HTTP

Service

HTTP

Service

HTTP

Service

EPG - Web

EPGs are a grouping of end-points representing application or

application components independent of other network constructs.

POLICY MODEL

Page 27: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

End-Points and EPG membership

Device connected to network directly or indirectly

Has address (identity), location, attributes (version, patch level)

Can be physical or virtual or container

• Examples:

• End Point Group (EPG) membership defined by:• Ingress physical port (leaf or FEX)

• Ingress logical port (VM port group)

• VLAN ID

• VXLAN (VNID)

• IP address (so far only applicable to external/border leaf connectivity)

• IP Prefix/Subnet (so far only applicable to external/border leaf connectivity)

• NVGRE (VSID) (future)

• VM-based attributes (future)

• Layer 4 ports (future)

Server

Virtual Machines & Containers

Storage

Client

Page 28: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

EPGs, Subnets, and Policy

30

EPGs separate the addressing of an application

from it’s mapping and policy enforcement on the network.

10.10.10.x

10.10.11.xPolicy/Security

enforcement occurs

at the EPG level

HTTPS

Service

HTTPS

Service

HTTPS

Service

HTTPS

Service

HTTP

Service

HTTP

Service

HTTP

Service

HTTP

Service

EPG WEB-1 EPG WEB-2

Page 29: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

ACI Enables Segmentation Based on Business Needs

Level of Segmentation/Isolation/Visibility

VLAN 1 VXLAN 2

VLAN 3

Network centric

Segmentation

DEV

TEST

PROD

Segment by Application

Lifecycle

PRODUCTION

PODDMZ

SHARED

SERVICES

Basic DC Network

Segmentation

Per Application-tier /

Service Level

Micro-Segmentation

WEB

APP

DB

Intra-EPG

Micro-Segmentation

WEB

WEB

Container Security

VM

OVS/OpFlex

New

Page 30: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

P P P

App DBWeb

Outside

Client(s)

QoS

Filter

QoS

Service

QoS

Filter

Could be many VMs or containers

Could be mix of physical/virtual machines/containers

Mostly physical

resources

App

Network

Profile

P = Defined Policy

“The Application”

ACI and Today’s 3-Tier applications

Page 31: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Application Network Profiles (ANP)

33

Inbound/Outbound

PoliciesInbound/Outbound

Policies

Application Network Profile

Application Network profiles are a group of EPGs and the policies

that define the communication between them.

POLICY

MODEL

=

EPG - WEB EPG - APP EPG - DB

Page 32: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Applying Policy between EPGs: ACI Contracts

34

EPG A

EPGB

EPG CContract 02

The policy model allows for both unidirectional and bidirectional policies.

Contracts define the way in which EPGs interact

Unidirectional

Communication

Bidirectional

CommunicationContract 01

Ex: ACI Logical Model applied to the “3-Tier App” ANP

Page 33: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Building ACI Contracts

Subjects are a combination of A filter, an action and a label

Contracts define communication

between source and destination EPGs

Contracts are groups of subjects which define communication between EPGs

Filter | Action | LabelSubject

TCP Port 80

Filter

Permit

Action

Web Access

Label

Contract 1

Subject 1

Subject 2

Subject 3

Page 34: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Policy Options: Actions

36

Permit Deny

RedirectLog

……

CopyPacke

t

Mark Packet DSCP

There are six policy options supported: Permit the traffic Block the traffic Redirect the traffic Log the traffic Copy the traffic Mark the traffic (DSCP/CoS)

Policy encompasses traffic handling, quality of service, security monitoring and logging

Page 35: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

ADCAPP DBF/W

ADCWEB

HYPERVISORHYPERVISOR HYPERVISOR

CONNECTIVIT

Y POLICY

SECURITY

POLICIESQOS

STORAGE

AND

COMPUTE

APPLICATION

L4..7

SERVICES

SLA

QoS

Security

Load

Balancing

APP PROFILE

Application Network Profiles(ANP) & ACI: How it Works?

37

Page 36: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Example of an Application Mapped to ACI

Page 37: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

ACI Embedded Tools – Endpoint Tracker

Application that reads all of the Endpoints from APIC

Registers for Endpoint add/delete

“Punch clock” for Endpoints

• Who (MAC, IP )

• What (Tenant, App, EPG)

• Where (Interface)

• When (Timestamps)

Determine what was on network at any time

SQL or GUI frontend

SQL

Web1

Web2

Web3

App1

App2

App3

DB1

DB2

DB3

Page 38: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

ACI Embedded Tools – Diagrams

• A whiteboard diagram of an applications deployed security policy

• http://blog.esquilax.org/2015/01/14/generating-aci-diagrams-with-acitoolkit/

• https://github.com/cgascoig/aci-diagram

Page 39: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Automating InfrastructureDynamic Endpoint Attachment

ACI Policy

Allow HR-EPG Inbound to

HR-Web EPG

ASA and F5 Object-Group:

Automatically update

ASA and F5 with new

endpoints connecting

to network for HR-

EPG. Remove

endpoints when they

disconnect from

network.

Web servers

immediately available

when added to DNS

Keep policies up

to date without

manual configuration

1.1.1.1

1.1.1.2

2.1.1.1

ACI Fabric

Page 40: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Dynamic Update to EPG Object-Group

APIC dynamically detect new endpoint, ASA subscribes to attach/detach event, and ASA automatically adds to object-group

webConsumer

appProvider

ACE

192.168.10.200192.168.20.200

Object-group

192.168.10.101

New

192.168.10.102

New

object-group network __$EPG$_podA-myapps-app

network-object host 192.168.10.101

network-object host 192.168.10.102

access-list access-list-inbound extended permit tcp any object-group __$EPG$_podA-myapps-app eq www

2: APIC create object-group for the EPG.

1: Enable “Attachment Notification”

on function connector internal.

3: APIC add new endpoints to object-group

(192.168.10.101, 192.168.102)

Page 41: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

ACI Fabric Infrastructure Security

Page 42: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

APIC Communicating to the Network

• Infra VRF – Used for inband APIC to switch node communication, non routable outside the fabric

currently (Multi-Fabric, Remote Leaf will both allow extension of the Infra VRF - Future)

• Inband Management Network – ‘tenant’ VRF created for inband access to switch nodes

• OOB Management Network – APIC and switch node dedicated mgmt ports

OOB Management Network

APIC will have:

1. 2 attached to fabric for data

2. 2 for mgmt (OOB)

3. 1 console ethernet port (can be only used

for direct laptop hookup)

4. CIMC/IPMI ports

Inband Management VRF

Infrastructure VRF

Switch nodes will have:

1. Inband access to Infra & Mgmt VRF

2. Mgmt Port (OOB)

3. Console port

APIC APIC APIC

Page 43: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

APIC First Time Setup

• APIC one time setup is via UCS console access

• Cluster configuration

• Fabric Name

• Number of controllers [1..9]

• Controller ID [1..9]

• TEP Address pool [10.0.0.1/16]

• Infra VLAN ID [4093]

• Out-of-band management configuration

• Management IP address [192.168.10.1/254]

• Default gateway [192.168.10.254]

• Admin user configuration

• Enable strong passwords (Y/N)

• Password

After first time setup, APIC UI is

accessible via URL

https://<APIC-mgmt-IP>

APIC

Page 44: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

APIC Fabric Login Screen

Page 45: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

APIC & ACI – System Security

APIC

Same SSL Certificate

presented by all APICs to

External HTTPS

connections• Two modes of access to the REST

interface

• Web-Token

• X.509 based certs

• X.509 REST requests are signed with the user private key

• RSA keys of 1024, 1536 or 2048 bits

• Two Factor Authentication

Cisco Signed Certificates

(shipped with switch and APIC)SSL

SSL

Page 46: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Chain of Trust for ACI Nodes (APIC to Switch)

APIC

SSL

1. Establish SSL connection and exchange public key certificates

2. For additional security, shared secret or device serial number can be optionally exchanged (Post FCS)

3. After successful validation, connection is ready

4. Messages are authenticated with HMAC digest

Page 47: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Chain of Trust for ACI Nodes (APIC)

• Secure Container Based for BASH (iShell)

• No root access for customers (TAC only)

• APIC ISO is encrypted and keys are stored on APIC TPM

• RPM’s are not visible

• Secure Trusted Executable

• Secure Mode Installer

APIC

SSL

Page 48: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Chain of Trust for ACI Nodes (Switches)

• Chain of Trust for images on Switch Nodes

• Anti Counterfeit Technology-2 Hardware Security Module (ACT2 HSM)

• Validates the FPGA software, ROMMON software, switch preboot image and the switch

full image

SwitchImage

Generate Hash (SHA512)

Create Signature (RSA-2048 bit)

Using Insieme RSA 2048 Private Key

Signed Hash

FIPS-140-3 compliant build systemThis standard requires software to be digitally signed and beverified for authenticity and integrity prior to load and execution.Cisco maintains the Abraxas build system which keeps privatekeys secure and provides signing services via ssh/https APIs

Page 49: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Fabric Initialization & Maintenance

• ACI Fabric supports discovery, boot, inventory and systems maintenance processes via the

APIC

• Fabric Discovery and Addressing

• Image Management

• Topology validation through wiring diagram and systems checks

Loopback and VTEP IP Addresses

allocated from “Infra VRF” via DHCP from

APIC

APIC Cluster

Topology Discovery via LLDP

using ACI specific TLV’s (ACI

OUI)

APICAPICAPIC

Page 50: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Fabric Initialization & Maintenance

APIC bootstrap configuration

1) APIC Cluster Configuration

2) Fabric Name

3) TEP Address space (Infra-VRF)

4) …

Leaf switch discovers attached

APIC via LLDP, requests TEP

address and boot file via DHCP

2

1

Spine switch discovers attached

Leaf via LLDP, requests TEP

address and boot file via DHCP

3

All nodes in the same APIC cluster should

contain same bootstrap information if they are

intended to form a cluster

4

Fabric can be discovered and initialized

from multiple sources concurrently

5

6 Fabric will self assemble starting from

multiple APIC sources

APIC Cluster

7

APIC Cluster will form when members

discovery each other via Appliance

Vector (AV)APIC APIC APIC

Page 51: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Fabric Initialization & MaintenanceNode Identity Policy

• Assigns ID/Name to switches based on serial number

• Controls which switches can join the fabric

• Allows zero touch provisioning of switches

POST: https://192.168.10.1/api/node/mo/uni/controller.xml

<fabricNodeIdentPol>

<fabricNodeIdentP serial=”TNAX234ZA"

name="leaf1" nodeId=”101"/>

<fabricNodeIdentP serial=” JNAX234ZZ"

name="leaf2" nodeId=”102"/>

<fabricNodeIdentP serial=“KLAX234ZZ”

name="spine1" nodeId=”103"/>

</fabricNodeIdentPol>

Page 52: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

APIC Image Management

• Covers multiple items like:

• Compatibility Catalog• Checks at upgrade /

downgrade events such as configuration

• Switch image management• Leaf and Spine switches

• APIC image management• Policy controller cluster

• Image repository on APIC

Admin Firmware Fabric Node Firmware

Page 53: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Fabric Initialization & Maintenance

• ACI Fabric leverages the same Global Catalogue methodology as UCS, the supported HW/SW matrix, image

versioning, …

• APIC and switch node image management controlled via APIC policies

• Policies control which images should be on which groupings of devices, when the images should be

upgraded/downgraded

• Also control the upgrade process, automatic, manual step by step, …

“All-APICs”APIC Cluster

“All-Leafs”

“All-Spines”

APIC APIC APIC

Page 54: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

ACI Fabric Micro-Segmentation Security

Page 55: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Spectrum of Micro-Segmentation

Segmentation

Micro-SegmentationPer EPG

Per vNIC

Page 56: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

ACI SecurityAutomated Security with Built-In Multi-Tenancy

Distributed Stateless Firewall

Line Rate Security Enforcement

Open: Integrate Any Security Device

ACI Services

Graph

Embedded Security

• White-list Firewall Policy Model

• Authenticated Northbound API (X.509)

• Encrypted Management Plane (TLS

1.2)

Micro-Segmentation

• VMware AVS, VDS*, Microsoft Hyper-

V, and Bare-metal workloads

• Intra End Point Group Isolation

• Attribute Based Isolation and

Quarantine

Security Automation

• Dynamic Service Insertion and

Chaining

• Security Policy Follows Workloads

• Centralized Security Provisioning and

Visibility

* Note: Available: 1H CY 2016

Page 57: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Cisco ACI Delivers Micro-SegmentationFlexible, Granular, Consistent

Attributes Based Intra-EPG BasedEPG Based

ACI Benefits

PROD

PODDMZ

SHARED

SERVICES

Basic DC Segmentation

DEV

TEST

PROD

Application Lifecycle

Segmentation

WEB

APP

DB

Service Level

Segmentation

Network-Centric

Segmentation

VLAN 1 VXLAN 2

VLAN 3

FW

OS

‘Linux’

IP

‘1.1.1.1’

FW

Name

‘Video’

Intra-EPG Isolation

All Workloads Can Communicate

Application Tier Policy

Group

Isolate Workloads within Application

Tier

Application Tier Policy

Group

Quarantine Compromised Workloads

Isolate

VMware VDS Microsoft Hyper-V KVM* Cisco AVS

Policy Driven Micro-Segmentation for Any Workload

Physical*Future

Page 58: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Cisco ACI Security OptionsPolicy Driven Micro-Segmentation and Intra-EPG Isolation

PROD

PODDMZ

SHARED

SERVICES

Basic DC Segmentation

Flexible Segmentation

DEV

TEST

PROD

Application Lifecycle

Segmentation

WEB

APP

DB

Service Level

Segmentation

Network-Centric

Segmentation

VLAN 1 VXLAN 2

VLAN 3

Hypervisor Agnostic Micro-segmentation

For Any Virtual Workload

Quarantine Infected VMs With Guest OS = Linux

Hypervisor

Virtual Switch

Attributes Based Micro-Segments

(DVS, AVS, Hyper-V Switch, KVM*)

FW

OS = Linux Name = Video-*IP = 1.1.1.x

FW

* Note - Futures

Intra-EPG Isolation + Micro-segmentation

For Any Workload (Physical, Virtual)

Intra-EPG Isolation

Local switching

Micro-Segmentation

Web EPG DB EPG

Web EPG DB EPG

Quarantine VM

DB EPG

Local switching

Intra-EPG IsolationIntra-EPG Isolation

FW

Intra-EPG Isolation +

Micro-Segmentation

Page 59: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Intra-EPG Isolation

• 1.2.2x/11.2.2x release added Intra-EPG Isolation Support:1.VMware DVS (ie. AVS not required)

2.Bare Metal

• When Intra-EPG Isolation is enabled “ALL” endpoints in

EPG are isolated(All Intra-EPG Isolation endpoints must be in the same EPG)

• Can isolate Physical and Virtual endpoints in same EPG

• Partial Intra-EPG isolation of endpoints is not supported

Page 60: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Micro-Segmentation

• Micro-Segmentation = Attributes based EPG + contract (optional)

• Attributes = VM attributes or Networking attributes such as IP, MAC

• 2 main use-cases:

• 1. Quarantine (ie. no EPG contract),

• 2. Micro-Segments (with contract policy)

• 1.2.1x/11.2.1x release Adds Micro-Segmentation for: Microsoft Hyper-V

• 1.2.2x/11.2.2x release Adds Micro-Segmentation for – see table below:

• VMware DVS * (ie. AVS not required)

• * Note: L4 State and Connection Inspection requires ASA

Micro-Segmentation ACI

Release

VMWare + AVS 1.1.1x/11.1.1x

Microsoft Hyper-V 1.2.1x/11.2.1x

Multi-Hypervisor 1.2.1x/11.2.1x

VMWare DVS 1.2.2x/11.2.2x

Intra-EPG Isolation 1.2.2x/11.2.2x

Intra-EPG Isolation + Micro-Segmentation 1.2.2x/11.2.2x

Page 61: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Intra-EPG DVS Micro-SegmentationASA-5500-X Joint Solution Proposal

ASA 5500-X w/ FP Service NW Only

Stitching

1. Intra-EPG Micro-Segmentation • DVS: VM isolation with PVLAN gets traffic to Leaf Switch

• ACI Leaf: MAC/IP-EPG to re-classify traffic, Service Node NW Stitching

2. Stateful Firewall with ASA 5500-X• Stateful Inspection & ASA Security Features

• FirePOWER Services 50k-1M IPS sessions

Page 62: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

ACI Security Certifications

Complete

Target Complete Jan 16

Target Complete Jan/Feb 16

Complete Dec 15

Planning

Page 63: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Landscape of ACI Security Partners

Automation

Security &

Governance

Big Data &

Analytics

Security &

Services

Open Infra.

Northbound Partners

Operations

Orchestration

Analytics

Southbound Partners

Enterprise Monitoring

L4-L7 Services

Fabric Attached Devices

Cloud Orchestration and Management

SecurityADC

Security

PaaS

Page 64: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

EPG (End Point) Classification

Server

Virtual Machines & Containers

Storage

Client

• Endpoint == Workload unit connected to network directly

or indirectly

• An endpoint has address (identity), location, attributes

(version, patch level)

• Can be physical or virtual or container

• End Point Group (EPG) membership defined by:

• Ingress physical port (Leaf or FEX)

• Ingress logical port (VM port group)

• VLAN ID (EPG1, vlan 10 Permit port dest = 80 => epg2, vlan 20)

• VXLAN (VNID)

• IP Prefix/Subnet (so far only applicable to external/border leaf

connectivity)

• VM-based attributes - 11.1 release

• IP address and subnet – 1.2.1x/11.2.1x release (/32, /n)

• MAC address - Radar

Page 65: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

IP Based EPGsSupport for IP Based EPG on PhysDom, L2Out, and L3Out

• 1.2.1x/11.2.1x release: supports IP-EPG classification:

• Physical Leaf only

• Physical Domain (ie. no VMM domain)

• IP-EPG are very flexible and granular, can be defined for

any IPv4 host (/32) or prefix (/n mask)

• IP-EPG derivation is based on longest-prefix match in HW

• Each IP-EPG gets its own class-id which is used as

source-group or destination-group when a security policy

(contract) is applied

• Only Inter-EPG policy contracts supported

• Note: L3 BD only, L2 BD cannot do IP-Learning

• IP-EPG will require ‘E’ version of 93xx (Donner-C HW)

10.10.10.32 = EPG_Filer_1

10.10.10.33 = EPG_Filer_2

10.10.10.56 = EPG_Filer_3

L3Out

10.10.20.32 = LXC_Web

10.10.20.33 = LXC_App

10.10.20.56 = LXC_App2

10.20.30.45 == EPG_DNS

L2Out

Page 66: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

IP Based EPG: Use Case 1 Shared Storage for Each Customer

Storage

Servers for Customer A

ESXi ESXi

Servers for Customer B

ESXi ESXi

Different security policy is needed for

logical storages which use same VLAN

and same MAC, but different IP.

VLAN 10

Storage for customer A

192.168.1.1Storage for customer B

192.168.1.2

Page 67: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

IP Based EPG: Use Case 2 Docker Containers

10.10.20.32 = LXC_Web

10.10.20.33 = LXC_App

10.10.20.56 = LXC_App2

Different security policy is needed for

containers which use same VLAN, but

different IP.

VLAN 10

Page 68: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Microsoft Hyper-V Attribute Based EPG and Micro-Segmentation

Feature DescriptionThis feature allows granular EPG derivation based on various VM attributes such as

VM Name, Guest OS, MAC, IP etc.

Prior to 1.2.1x/11.2.1x release, this feature is available for virtual endpoints attached

with Cisco AVS

Distributed Virtual Switch (B-release). It’s not available with VMware DVS

In 1.2.1x/11.2.1x release, we add this feature for ACI + SCVMM integration also.

Note: This doesn’t provide an Intra EPG security policy

Use-caseIsolate Malicious VM

Create Security across Zones

BenefitsWithout changing the port-group association of servers, extra security and segmentation

can be provided

Page 69: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Microsoft Hyper-V: Use Case 1 Isolate a Malicious VM

Win EPG

• Problem: Vulnerability is detected in a particular type of operating system (e.g. Windows). Network security administrator would like to isolate all Windows VM.

• Solution: Define Security EPG with criterion as “Operating System = Windows”. No contracts are provided or consumed by this EPG. It will stop all inter-EPG communication for the matching VMs.

• No VM attach/detach or placement of VM to a different port-group is needed.

WebWeb01Linux

Web02Linux

Web03Win

AppApp01Linux

App02Linux

App03Win

DBDB01Linux

DB02Linux

DB03Win

XCriterion

Attribute

(OS = Windows)

Web03Win

Page 70: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Microsoft Hyper-V: Use Case 2 Security Across Zones

HR-Web

Sales-Web

• Problem: VMs belonging to different departments (e.g. HR, Sales) or different roles (Production, Test) are placed in the port-group. But isolation across departments are required. (e.g. HR-Web-VM should not be able to talk to Sales-Web-VM)

• Solution: Define EPGs, which match if the VM Name contains a matching string (e.g. HR, Sales etc).

• Each Attribute based EPG can have their own security policies.

WebWeb01

HR-Web01

Sales-Web01

AppApp01 App02 App03

DBDB01 DB02 DB03

Criterion

Attribute

(VM name contains HR)

Criterion

Attribute

(VM name contains Sales)

X

Page 71: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Create useg EPG

Page 72: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

L4-L7 Service Automation – Support for all Devices Any Device and Cluster Manager Support

L4-7 Services

ACI Services Graph

L4-7 Service Automation

Full L4-L7 Centralized Service Automation (With Device Package)

Large Ecosystem and Investment Protection

FuturesAvailable

Now

Centralized Network Automation (With NO Device Package)

New support for L4-L7 Cluster Managers

L4- L7 Device

Package

No Device

Package

Service Cluster

Manager

Page 73: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Network Only Stitching Mode

Insert Node between consumer EPG and provider EPG.

Managed mode and un-managed mode can be combined into a single service graph.

• Insert Node between consumer EPG and provider EPG

• Managed mode and un-managed mode can be combined into a single

service graph

Page 74: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

2.1.1x/12.1.1x: PBR Support for Service Graph Routed Mode with Policy Based Routing

EPG A EPG B

FWExternal Internal

Single VRF

EPG C

10.0.0.27 20.0.0.22

20.0.0.26

Policy Redirect for

EPG A to EPG C

Direct Forwarding for

EPG A to EPG B

Page 75: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Cisco ACI + OpFlex SecurityOpenStack APIC ML2 Driver

OpenStack Controller

Hypervisor

vm1

Project 1 Project 2 Project 3

vm2vm5

vm4

vm3

OpFlex

Agent

APIC ML2 Driver

V(X)LAN

Open

vSwitch

OpFlex

Proxy

Security Group Enforcement

in OVS using IP-Tables

Security policy enforcement in OVS using IP-

Tables by OpenStack (outside of APIC)

L2/L3 forwarding in fabric

Floating IP / NAT support

APIC GUI integration / VMM Domain for

OpenStack

Statistics

Service redirection

OpFlex Agent Offers:

Available

1.2.1x/11.2.1x

Neutron Object APIC Object (ML2 Driver Mapping)

Project Tenant

Network EPG + BD

Subnet Subnet

Security Group + Rule IP Tables (outside of APIC by OpenStack)

Router Contract

Network:external L3Out / Outside EPG

Page 76: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

APIC GBP Driver Security ImplementationOVS via OpFlex and ACI Fabric

Security policy enforcement in OVS

via OF action and ACI Fabric via

whitelist policy simultaneously

Floating IP / NAT support

APIC GUI integration / VMM

Domain for OpenStack

Statistics

Service redirection

OpFlex Agent Offers:OpenStack Controller

Hypervisor

vm1

Project 1 Project 2 Project 3

vm2vm5

vm4

vm3

OpFlex

Agent

V(X)LAN

Open

vSwitch

GBP APIC Driver

OpFlex

Proxy

Fabric Traffic Security

Enforcement using ACI

Whitelist Policy

Local traffic in Hypervisor:

Security Group Enforcement

in OVS using Open Flow• gbp policy-classiifer-create

• gbp policy-rule-create blah --actions allow

Group Based Policy Available

1.2.1x/11.2.1x

Page 77: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

ASA Multiple-Context in Service Graphs - Shipping

ASA1 Active ASA2 Standby

Leaf2Leaf1

FO

PO2 PO2

• Register ASA1 Active Contexts with APIC via MGMT IPs

• ASA2 Standby Admin context registers to APIC, which applies HA config to allow a sync of full configuration, so it can take over MAC/IP on Active failure

• Define a Port-Channel as a single logical interface connecting to multiple Leafs

• APIC creates sub-interfaces based on dynamically allocated VLAN from a pool, and in the System context it assigns Port-channel sub-interfaces to appropriate user context, Contexts A, B, and C

• IPs, Interface and ACLs names, can now overlap between contexts

interface Port-channel2.500

VLAN 500

context A

allocate-interface Port-channel2.500

change-to context A

interface Port-channel2.500

nameif consumer_internalA

ip address 10.1.1.1 255.255.255.0

security-level 100

APIC programs interfaces for user Context via CLI:

Context AMGMT IP1pre-config

Context B MGMT IP2pre-config

Context C MGMT IP3pre-config

System Context

User Context

vPC2 vPC3

MGMT IP0pre-config

Context Admin

Page 78: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Device Manager Package

Cisco APIC – Policy Element

Device Model

Device-Specific Python Scripts

Script Engine

APIC Node

• Device Manager Package is used to

configure the controller of the

Service Device (eg, FireSIGHT)

instead of configuring the Service

Device

• 1.2.2x/11.2.2x release target for

FirePOWER appliance

• FirePOWER Device Manager

Package:

• FireSight Credentials

• Internal/External Interfaces

• Virtual Inline Pair

• (more parameters possible)

Cisco APIC Script Interface

Device Interface: REST/CLI

Service automation

requires a vendor device

package. It is a zip file

containing

Device specification

(XML file)

Device scripts (Python)

Service

InstancesCluster Service

Instances

Device ManagerE.g.

FireSIGHT

Page 79: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Operational Model with Device Manager

1. Create Security Policy

for Application

4. Assign security policy to firewall

2. Create Application Networking

and assign NGFW Service

Network

Admin

Security

Admin

Panorama

3. Network Configuration

Hostname

IP Address

VLAN

Security Zone

5. Security Configuration

Security Policies

Profiles

Address Objects

• Insert firewall services between two EPGs All firewall security features can be applied

E.g.

FireSIGHT

Page 80: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

“Chassis” Device PackageVirtual Service Instances

Cisco APIC – Policy Element

Device Model

Device-Specific Python Scripts

Script Engine

APIC Node

Cisco APIC Script Interface

Device Interface: REST/CLI

Script Engine

Service automation

requires a vendor device

package. It is a zip file

containing

Device specification

(XML file)

Device scripts (Python)

Virtual Service

Instances

Chassis

Cluster Service

Instances

• In order to manage ‘virtual services’

running on a single device the device

package framework has been

extended to define a ‘chassis’

(1.2.1x/11.2.1x release)

• A chassis defines the device that

contains the virtual service instances

• Specific attributes are associated with

the chassis (VLAN id’s on ports) and

others with the service instance

Page 81: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

The Attack ContinuumConsistent Protection for ANY Workload 24x7

Scope

Contain

Remediate

Continuous

Solution

Discover

Enforce

Harden

Detect

Block

Defend

86© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Threat Centric

Visibility

Compliance

Secure Multi-Tenancy with Whitelisting

Per-Application Micro Segmentation

Centralized Policy Orchestration and

Distributed Sensors

Deep Traffic inspection

Forensic Analysis

Dynamic Workload Quarantine

Remediation and Return to Production

Threat-Centric Protection

Real-Time Threat Intelligence

Page 82: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Firepower Services for ACIIntelligent Threat Defense

EPG

“Internet”

ACI Fabric

EPG

“Web”

FireSIGHT Management

CenterAlerts

Network Visibility

Policy Management

Analytics

Remediation

Application Policy Infrastructure

Controller (APIC)

Service GraphContracts

NGIPS/NGFW

Advanced Malware Protection

Policy and events

Basic configuration

and health

Intelligent Remediation

Page 83: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Security Feedback Loop

UNTPUBLIC

Trusted – No GraphCORP

APIC172.28.199.30

Move IP to Quarantine

FireSIGHT Management

Center

FWNGIPS

10.1.0.234

Relaxed

REST calls to

APIC NB API

ACI Fabric

N9K Leaf SwitchFirePOWER Appliance 10.0.1.30

SPAN Traffic

AttackESXi – 10.1.0.44

1.1.1.6 1.1.1.7

FWQUA

Strict

REM

1.1.1.3

Page 84: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Firepower

Cisco Security in ACI Integration Models

89© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Data Plane to ACI Fabric Data Plane to ACI Fabric

Threat Policy Configuration

Visibility and

Real-Time Alerts

Firepower Device Manager Package

ASA with Firepower

ASA Device Package

Access Policy ConfigurationService Graph Segmentation

Fully Managed ASA Device Partially Managed Firepower Device

Netflow and Syslogs

Firepower Services

Embedded Module

Page 85: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

ASA and Firepower Advantages for Cisco ACI

90© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Maintain similar high performance for

all clients, applications, and protocols;

ease of future expansion

Consistency Across Platforms and Protocols

Cisco® ACI Fabric

Policy Contract

Identify and block malicious traffic; Remediate infected EPs; Allow monitor-only and reduced inline

inspection where most applications are known, to optimize on use of resources

while provide necessary visibility

Balance Security and Performance

Cisco ACI only performs stateless

load-balancing; firewall cluster scales

with state, HA, elasticity, and

embedded threat protection

Stateful Capacity Scaling

Link aggregation with LACP; VLAN

insertion into Cisco ACI; full

interoperability with fabric leaf nodes

Universal Attachment

Same feature set in both physical and

virtual form factors; consistent

performance across platforms

Portable Architecture

Page 86: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Cisco ACI and Cisco Advanced Security Better Together – Protection Across the Entire Continuum

NGIPS/NGFW

Advanced Malware Protection

Cisco Advanced Security – ASA / FirePOWER / AMP

Full APIC integration

Highest Rated Breach

Detection**

World’s Most Deployed NGFW

APIC

Real-time Threat Intelligence

Highest Rated NGIPS*

Native ACI Security

Centralized Policy Automation

Secure Multi-Tenancy with Whitelisting

Context-aware Segmentation

Virtual and Physical

Industry Compliance

Standards (PCI)

Group Policy

vm vm phy

Addresses Data Center Challenges: Threat-centric, Visibility, Compliance

Page 87: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

ACI Provides Secure Path to Authenticate Endpoints

ACI Fabric

Bank

Authentication

Server

Base EPG

ESXi

Hyper-V

Bare-

Metal

Servers

1. ACI isolates all endpoints in Base EPG

2. Fabric implements whitelist policy

3. Base EPG only provides uni-directional access to JPMC Authentication Server

1

Bank-x IP-EPG

1. If endpoint authentication fails, it remains in base=EPG

2. If endpoint authentication passes, JPMC server makes REST API call to APIC

3. Provides attributes of the endpoint APIC and Target EPG membership

2

3 1. REST API call to APIC

2. Provide endpoint IP attribute for JPMC IP-EPG membership

4

1. ACI moves authenticated endpoints out of Base EPG

2. Installs endpoints into JPMC IP-EPG

Based EPG Pre-Authenticated Endpoints

IP-EPG Authenticated Endpoints

Page 88: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Dot1x Endpoint Authentication Solution

ESXi

Bare-

Metal

Servers

ACI

LeafHyper-V

Bank EPG

Dot1x Authentication Fails

ESXi

Bare-

Metal

Servers

ACI

LeafHyper-V

Bank EPG

Dot1x Authentication Pass

Just added to

Roadmap

Page 89: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Extending ACI Fabric Outside DC

Page 90: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

1.2.1x/11.2.1x ASA Device Package EnhancementACI and TrustSec Leveraging ASA +SXP

DB EPG

ISE

ACI Fabric

Corp EPG

Marketing

Engineering

Corp→DB : Allow, Redirect to ASA

All Other : Drop

APIC Policy Contract

Source Destination Action

Engineering Any Allow

Any Any Deny

[SGT 333]

SXP

1. Corporate users on

traditional Nexus 7000 in Corp

EPG get assigned SGT values

by ISE

2. ASA learns SGT

mappings OOB through

SXP

3. Coarse filtering: ACI Policy Contract

allows all traffic from corporate

network to database, redirects to ASA

4. Fine filtering: ASA permits

only Engineering to access

database from corporate based

on SGT

Page 91: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

ACI + TrustSec Policy Plane IntegrationISE Policy Domain APIC Policy Domain

Co

ntr

oll

er

La

ye

r 1. Exchange SG/EPG Names

2. Exchange IP->SG/EPG Bindings

Server IP-> EPG bindingsUser IP->SGT Bindings

ISE

ACI Border Leaf

iVXLAN

SXP S

Enterprise CoreCMD/SGT

SXPv4

Netw

ork

La

ye

r

SGT not propagated in data plane

iVXLAN

Server

classificationUser

classification Propagation

DC

EnforcementPropagationCampus

Enforcement

Page 92: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Add a New Host IP/SGT in ISE

New IP Address

BYOD SGT

Assigned

(Could also be

learned over SXP)

Page 93: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

BYOD EPG Now Contains Our New HostAvailable for Use in ACI Policies

Page 94: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

ACI + TrustSec Phase 2 (release 2.1.1x/12.1.1x)

• Dataplane Integration with Trustsec Switch/Router (eg. ASR1k)

• ASR implements ACI and Trustsec Policy and Data Plane Integration

1. ASR maps SGT to EPG

2. ASR instantiates an EPG and adds IVXLAN dataplane

3. Sends packet to ACI fabric for contract enforcement

Page 95: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Conclusion: ACI=Advanced Security

Page 96: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

ACI Addresses the Security Challenge in the DCStrategic Security Imperatives Addressed by ACI

Automate

Compliance,

Centralized

Auditing &

Logging

Visibility,

Analytics,

Forensics,

Threat

Mitigation

Simplified Policy

Based Multi-

Tenancy &

Micro-

Segmentation

Network

Services

Automation,

Open Eco-

System

Security

Expressed in

Application

Constructs &

Language

Centralized Security Across Physical and VirtualEndpoint Network Virtual Cloud

Page 97: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Cisco ACI Takeaways

102

SECURITY

INHERENT Security and INTEGRATION

TELEMETRY

Rich TELEMETRY & Application HEALTH

SCORE

SPEED

NETWORK and SERVICES Delivered in

minutes

POLICY

Policy-based deployment/governance

Physical & virtual

Cisco Application Centric Infrastructure – Physical & Virtual

Fixed Workloads Variable Workloads

OPEN and AGNOSTIC

Page 98: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Cisco Data Center Security

103

Embedded L4 Security

Embedded Sensors

Firewall at Each

Leaf switchServers (Physical, Virtual, Containers, Micro

Services)

L4-7 Security Services

(physical or virtual,

location independent)

Next Gen Stateful L4-7

Visibility and Control

Network Analytics:

Multi-Tier Sensor Data

Gathering (hardware

and software)

App1 DBWeb1

QoS

Filter

QoSServi

ce

QoS

Filter

Branch Policy Driven

Security

Architecture

Identity and Policy

Federation

Page 99: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Differentiation for Nexus/ACI Solutions - Contiv

104

ACI: Automated Networking, Policies, Prioritization, network uniformity for various workloads

Network SLAs for Applications: App to App with physical infrastructure integration

</code>

APPWEB DB

Native Apps: Better Visibility, Diagnostics, Analytics, Interoperable Standards Based

App1 App2

App1 App2

Page 100: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Contiv Provides Policy-Rich Container NetworkingIntegrates with Cisco Nexus and ACI

Application Composition+

Policy Intent

Node 1 Node2 Node-n

Contiv Master

Docker | Kubernetes |

Mesos Plugin Agents

• Contiv.io is an open-source project that creates a

policy framework in different domains of containers

• Network Policies: Policies for Application Security,

Prioritization, and Network Resource Allocation

• Network Services for Apps (Virtual or Physical

Service appliances)

• Analytics/Diagnostics

• Integrates with Cisco ACI, Nexus, and UCS

Solutions

• Status: Beta

Page 101: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Hypervisors, Isolation, Segmentation - Unikernels

106

Unikernels, also know as “virtual library operating system”

Microsoft Drawbridge architecture (Image Credit: Microsoft Research)

Page 102: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Why ACI is Best for Micro-Segmentation

107

Micro Segmentation works for all workloads (bare metal, virtual, containers, management, backup …)

Same policy-model for vSphere, Hyper-V, OpenStack, Containers and Bare Metal.

With ACI 1.2 support for up to 10 vCenter (supports 5.1, 5.5 and 6.0) and up to 10,000 servers.

Works with standard virtual switch offerings, including VMware VDS, OVS, MSFT vSwitch (AVS is optional for vSphere)

Stateful firewall when using Cisco AVS on vSphere at no extra cost with better performance at the VMware environment

Page 103: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Complete Your Online Session Evaluation

Learn online with Cisco Live!

Visit us online after the conference

for full access to session videos and

presentations.

www.CiscoLiveAPAC.com

Give us your feedback and receive a

Cisco 2016 T-Shirt by completing the

Overall Event Survey and 5 Session

Evaluations.– Directly from your mobile device on the Cisco Live

Mobile App

– By visiting the Cisco Live Mobile Site http://showcase.genie-connect.com/ciscolivemelbourne2016/

– Visit any Cisco Live Internet Station located

throughout the venue

T-Shirts can be collected Friday 11 March

at Registration

Page 104: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction

Thank you

Page 105: BRKACI-2504 - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKACI-2504.pdf · BRKACI-2504 Cisco Security on ... Provides a New Communication Abstraction