I2NSF Data Center Use Cases draft-zarny-i2nsf-data-center-use-cases-00 M. Zarny: Goldman Sachs S....

6
I2NSF Data Center Use Cases draft-zarny-i2nsf-data-center-use-cases-00 M. Zarny: Goldman Sachs S. Magee: F5 networks N. Leymann: Deutsche Telecom L. Dunbar: Huawei

description

Client Specific Security Policies App 1=IP11 App 2=IP12 App 3=IP13 App 4=IP14 … App 3 App 2 App 1 App 4 App 1=IP1 App 2=IP2 App 3=IP3 App 4=IP4 … App 3 App 2 App 1 App 4 Config 2: Config 1 : Policies for Firewall IP1===>IP3 IP1===>IP4 IP2=X=>IP3 IP2===>IP4 IP3 ===>IP1 IP3 ===>IP2 IP4=X=>IP1 IP4 ===>IP2 Change of the policies : IP11===>IP12 IP11===>IP14 IP13===>IP12 IP13===>IP14 … IP12=X=>IP11 IP12=X=>IP13 IP14=X=>I1P1 IP14 =X=>IP13 … Zones : Yellow zone Green zone … Security Policy : Yellow===>Yellow, Green Green ===> Green Prohibited Green=X=>Yellow

Transcript of I2NSF Data Center Use Cases draft-zarny-i2nsf-data-center-use-cases-00 M. Zarny: Goldman Sachs S....

Page 1: I2NSF Data Center Use Cases draft-zarny-i2nsf-data-center-use-cases-00 M. Zarny: Goldman Sachs S. Magee: F5 networks N. Leymann: Deutsche Telecom L. Dunbar:

I2NSF Data Center Use Casesdraft-zarny-i2nsf-data-center-use-cases-00

M. Zarny: Goldman SachsS. Magee: F5 networks

N. Leymann: Deutsche TelecomL. Dunbar: Huawei

Page 2: I2NSF Data Center Use Cases draft-zarny-i2nsf-data-center-use-cases-00 M. Zarny: Goldman Sachs S. Magee: F5 networks N. Leymann: Deutsche Telecom L. Dunbar:

On-demand, elastic FWs

Different types of customers/clients, e.g.• residential with (very) limited/no control• business with full control on fw• Internal/infrastructure driven, e.g. automatic

updates driven by information from probes

Page 3: I2NSF Data Center Use Cases draft-zarny-i2nsf-data-center-use-cases-00 M. Zarny: Goldman Sachs S. Magee: F5 networks N. Leymann: Deutsche Telecom L. Dunbar:

Client Specific Security Policies

App 1=IP11App 2=IP12App 3=IP13App 4=IP14…

App 3

App 2

App 1

App 4

App 1=IP1App 2=IP2App 3=IP3App 4=IP4…

App 3

App 2

App 1

App 4

Config 2:

Config 1: Policies for Firewall

IP1===>IP3IP1===>IP4IP2=X=>IP3IP2===>IP4

IP3 ===>IP1IP3 ===>IP2IP4=X=>IP1IP4 ===>IP2

Change of the policies:IP11===>IP12IP11===>IP14IP13===>IP12IP13===>IP14…

IP12=X=>IP11IP12=X=>IP13IP14=X=>I1P1IP14 =X=>IP13…

Zones:Yellow zoneGreen zone…

Security Policy:Yellow===>Yellow, GreenGreen ===> Green•ProhibitedGreen=X=>Yellow

Page 4: I2NSF Data Center Use Cases draft-zarny-i2nsf-data-center-use-cases-00 M. Zarny: Goldman Sachs S. Magee: F5 networks N. Leymann: Deutsche Telecom L. Dunbar:

Role of I2NSF

• Intent Driven Network Security policies for clients

Third party Apps

DC Clients

I2NSF Intent based Policies

Controller (Translation)

Physical Resource

Vendor Specific Setting

Page 5: I2NSF Data Center Use Cases draft-zarny-i2nsf-data-center-use-cases-00 M. Zarny: Goldman Sachs S. Magee: F5 networks N. Leymann: Deutsche Telecom L. Dunbar:

Key Requirement (1 of 2)

• Dynamic creation, enablement, disablement, and removal of network security applications;

• Policy-driven placement of new service instances in the right administrative domain;

• Attachment of appropriate security and traffic policies to the service instances

• Management of deployed instances in terms of fault monitoring, utilization monitoring, event logging, inventory, etc.

• Support of distributed architectures/deployments

Page 6: I2NSF Data Center Use Cases draft-zarny-i2nsf-data-center-use-cases-00 M. Zarny: Goldman Sachs S. Magee: F5 networks N. Leymann: Deutsche Telecom L. Dunbar:

Key Requirement (2 of 2) • Translation of security policies into functional tasks.

– Security policies may be carried out by one or more security service functions. For example, a security policy may be translated into an IDS/IPS policy and a firewall policy for a given application type.

• Translation of functional tasks into vendor-specific configuration sets. – For example, a firewall policy needs to be converted to vendor-specific

configurations.• Retrieval of information such as configuration, utilization, status,

etc. – Such information may be used for monitoring, auditing, troubleshooting

purposes. The above functions should be available in single- or multi-tenant environments as well as on premise or off-premise clouds.