Ethane: Taking Control of the Enterprise Presenter: KyoungSoo Park Department of Electrical Engineering KAIST.

Slides:



Advertisements
Similar presentations
New Directions in Enterprise Network Management Aditya Akella University of Wisconsin, Madison MSR Networking Summit June 2006.
Advertisements

Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
1 Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
1 Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
Communication Networks Recitation 3 Bridges & Spanning trees.
Logically Centralized Control Class 2. Types of Networks ISP Networks – Entity only owns the switches – Throughput: 100GB-10TB – Heterogeneous devices:
PortLand: A Scalable Fault-Tolerant Layer 2 Data Center Network Fabric
Cs/ee 143 Communication Networks Chapter 6 Internetworking Text: Walrand & Parekh, 2010 Steven Low CMS, EE, Caltech.
IUT– Network Security Course 1 Network Security Firewalls.
Ethane: Taking Control of the Enterprise
May, 2006 EdgeNet 2006 The Protection Problem in Enterprise Networks Martin Casado PhD Student in Computer Science, Stanford University
Scalable Flow-Based Networking with DIFANE 1 Minlan Yu Princeton University Joint work with Mike Freedman, Jennifer Rexford and Jia Wang.
Flowspace revisited OpenFlow Basics Flow Table Entries Switch Port MAC src MAC dst Eth type VLAN ID IP Src IP Dst IP Prot L4 sport L4 dport Rule Action.
Wireless and Switch Security NETS David Mitchell.
SANE: A Protection Architecture for Enterprise Networks Authors: Martin Casado, Tal Garfinkel, Aditya Akella, Michael J. Freedman Dan Boneh, Nick McKeown,
SANE: A Protection Architecture for Enterprise Networks Offense by: Amit Mondal Bert Gonzalez.
June, 2006 Stanford 2006 Ethane: Addressing the Protection Problem in Enterprise Networks Martin Casado Michael Freedman Glen Gibb Lew Glendenning Dan.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) SriramGopinath( )
15-744: Computer Networking
Module 8: Concepts of a Network Load Balancing Cluster
Security Awareness: Applying Practical Security in Your World
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
August, 2006 Usenix Security 2006 SANE: Addressing the Protection Problem in Enterprise Networks Martin Casado Tal Garfinkel Michael Freedman Aditya Akaella.
Routing and Routing Protocols
Tesseract A 4D Network Control Plane
Lesson 1: Configuring Network Load Balancing
COS 461: Computer Networks
Institute of Technology, Sligo Dept of Computing Semester 3, version Semester 3 Chapter 3 VLANs.
1 Network-wide Decision Making: Toward a Wafer-thin Control Plane Jennifer Rexford, Albert Greenberg, Gisli Hjalmtysson ATT Labs Research David A. Maltz,
A Scalable, Commodity Data Center Network Architecture.
Jennifer Rexford Fall 2010 (TTh 1:30-2:50 in COS 302) COS 561: Advanced Computer Networks Network.
Layer 2 Switch  Layer 2 Switching is hardware based.  Uses the host's Media Access Control (MAC) address.  Uses Application Specific Integrated Circuits.
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
Connecting LANs, Backbone Networks, and Virtual LANs
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
Chapter 1: Hierarchical Network Design
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
1 Introducing Routing 1. Dynamic routing - information is learned from other routers, and routing protocols adjust routes automatically. 2. Static routing.
Common Devices Used In Computer Networks
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
SANE: A Protection Architecture for Enterprise Networks
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) Sriram Gopinath( )
 Network Segments  NICs  Repeaters  Hubs  Bridges  Switches  Routers and Brouters  Gateways 2.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
1 Next Few Classes Networking basics Protection & Security.
June, 2006 Stanford 2006 Ethane. June, 2006 Stanford 2006 Security and You  What does security mean to you?  Data on personal PC?  Data on family PC?
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Introducing Network Design Concepts Designing and Supporting Computer Networks.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
Class 11 Enterprise Network Protection CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNP 1 v3.0 Module 1 Overview of Scalable Internetworks.
Cisco S3C3 Virtual LANS. Why VLANs? You can define groupings of workstations even if separated by switches and on different LAN segments –They are one.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introducing Network Design Concepts Designing and Supporting Computer Networks.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
Lesson 2a © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1 Firewall Technologies and the Cisco Security Appliance.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Computer Communication and Networking Lecture # 4 by Zainab Malik 1.
Preliminaries: EE807 Software-defined Networked Computing KyoungSoo Park Department of Electrical Engineering KAIST.
Routing and Routing Protocols CCNA 2 v3 – Module 6.
Lab A: Planning an Installation
15-744: Computer Networking
The DPIaaS Controller Prototype
ETHANE: TAKING CONTROL OF THE ENTERPRISE
NOX: Towards an Operating System for Networks
Overview of SDN Controller Design
Introduction to Networking
* Essential Network Security Book Slides.
Software Defined Networking (SDN)
Chapter 3 VLANs Chaffee County Academy
Ethane: Addressing the Protection Problem in Enterprise Networks
Ethane: Addressing the Protection Problem in Enterprise Networks
Presentation transcript:

Ethane: Taking Control of the Enterprise Presenter: KyoungSoo Park Department of Electrical Engineering KAIST

Managing Enterprise Networks Challenging to manage enterprise networks – Often large networks – Diverse applications – Strict reliability and security Current practice: error-prone & expensive – 62% of downtime due to human errors – 80% IT budgets on maintenance and operations 2

Current Best Practices Deploy middleboxes at network choke-points Add functionality to networks – User isolation: VLAN, ACL, filters, etc. – Better connectivity management: instrument routing and spanning tree algorithms Problem: hide complexity, but not reduce it! 3

Goals “Change the enterprise network architecture for better manageability” Guiding Principles 1.Policy declared by high-level names 2.Policy should determine the paths 3.Strong binding between a packet and origin 4

Policy by High-level Names Users, hosts, groups access points as names – Rather than IP or MAC addresses – KyoungSoo talk to EE807 students via IM – Marketing can use http via Web proxy Why? addresses are dynamically changing – Policy based on addresses could be unclear 5

Policy Determines the Paths Policy determines intermediate middleboxes – “Guest should use a proxy to access Web” – “Users on unpatched OS should go to IDS first before contacting other hosts” Traffic receive more appropriate service – “Real-time communication should be on lightly- loaded path” – “Important traffic should be over redundant paths” – “Private communication should be on trusted path” 6

Binding of Packets and Origin Addresses are dynamically managed – Difficult to figure out who (user/host) sent packets Tight binding of packets to their origin – Fine-grain control of entire packets 7

Ethane Design Centralized Controller (smart) – Enforces global network policy – Decides the fate of a new flow (packets) ‘Allow or deny’ and ‘which route to take’ – Replicated for redundancy & performance Ethane Switch (simple & dumb) – Flow table and a secure channel to Controller – Simply forward packets as directed by Controller – Not every switch need to be Ethane switch 8

Host authenticate hi, I ’ m host B, my password is … Can I have an IP? Send tcp SYN packet to host A port 2525 User Authentication “ hi, I ’ m martin, my password is ” High-Level Operation Domain Controller Host A Host Authentication “ hi, I ’ m host A, my password is … can I have an IP address? ” Host B User authentication hi, I ’ m Nick, my password is ? Permission check Route computation Secure Binding State ICQ → 2525/tcp IP switch3 port 4 Host A IP switch 1 port 2 HostB Network Policy “Nick can access Martin using ICQ” Host A → IP → Martin → Host B → IP → Nick → Borrowed from Martin Casado’s slides 9

Component Overview Domain Controller Switches End-Hosts Authenticates users/switches/end-hosts Manages secure bindings Contains network topology Does permissions checking Computes routes Send topology information to the DC Provide default connectivity to the DC Enforce paths created by DC Handle flow revocation Specify access controls Request access to services Borrowed from Martin Casado’s slides 10

Don’t have to maintain consistency of distributed access control lists DC picks route for every flow – Can interpose middleboxes on route – Can isolate flow to be within physical boundaries – Can isolate two sets of flows to traverse different switches – Can load balance requests over different routes DC determines how a switch processes a flow – Different queue, priority classes, QoS, etc. – Rate limit a flow Amount of flow state is not a function of the network policy Forwarding complexity is not a function of the network policy Anti-mobility: can limit machines to particular physical ports Can apply policy to network diagnostics Some Cool Consequences Borrowed from Martin Casado’s slides 11

Controller Name registration – Needs to know all entities in a network – Any given global entry: LDAP or AD Authentication – Host: MAC address authentication, user: Kerberos – Switch: SSL-based client/server-side certificates Tracking all bindings – Host to IP, IP to MAC address, User to Host Permission check/access granting Enforce resource limits – Easy to enforce limits on flow rates, # of IP addresses, etc. – Useful to defend against attacks (blocking after K trials) 12

Controller Replication Fault tolerance and scalability – What happens if a controller fails? – Scale the performance of request handling Three models – Cold standby – Warm standby – Fully-replicated 13

Pol-Eth Policy Language Domain-specific language for Ethane policy – Conditions: action – Actions: allow, deny, waypoints, outbound-only Examples: – “Phones” and “computers” don’t communicate – “Laptops” are protected from inbound flows Implementation – Policy to C++ compiler 14

Deployment Prototype ran 4 months at Stanford – 300 registered machines Switches and Controller – 19 switches of 3 different types – A single PC-based Controller Hosts: laptops, printers, VoIP phones, desktops, work stations, etc. 15

Evaluation Controller capacity Impact of failures – Controller failure – Link failure Flow table size 16

How Many Controllers are Needed? LBL trace (8,000 hosts): max 1,200 new flows /sec Stanford trace (22,000 hosts): max 9,000 new flows /sec Suggestion: a single controller should handle 20,000 hosts 17 Flow creation time as a function of load

Impact of Controller Failure How long does it take to reinstall flows? – Measured completion time of 275 HTTP requests – Intentionally crashed and restarted Controller 18 10% increase in completion time per failure – Due to the model of cold-standby (learn routes again) – Mitigated by warm-standby or fully-replicated Controllers

Impact of Link Failures Link failure: switch reports to Controller – All flows on the link should be rerouted by Controller 19 Packet RTT during link failure (diamond topology) ~ 1+ sec of delay Path reconverges in under 40ms

Flow Table Size 8K to 16K entries for university-sized network – 1MB (64B per entry) – 4MB (two-way hashing) Typical Ethernet switch memory size – 1 million Ethernet addresses (6MB or larger) – 1 million IP addresses (4MB of TCAM) – 1-2 million of counters (8MB of SRAM) – Several thousands of ACLs (TCAM) 20

Ethane’s Shortcomings Broadcast traffic – ARP, OSPF neighbor discovery Application layer routing – A -> B, B ->C, but A !-> C: A->B->C Knowing what the user is doing – What if port 80 is used for bypassing firewalls? Spoofing Ethernet addresses – One port shared by multiple hosts? 21

Ethane Summary Centralized control by Ethane – Separate the control and data plane – Tightly manage Enterprise networks Operations – Centralized name bindings and authentication – Dumb switch + Controller adopting new features Deployment experience – Easier to mange a network – Easily identify network problems (errant machines, malicious flows) – Hold users accountable for their traffic 22

Discussion Points Trade-offs of centralization – What to gain, and what to lose? Scalability beyond 10K machines – How to distribute the load but centrally handle it? Higher performance switch – 10G or higher, how many concurrent flows? Apply it to cellular networks? – Base stations or beyond? 23

Goal of 4D Architecture “Place control and management plane into a logically-centralized server” Design principles – Network-level objectives – Network-wide view – Direct control Results in 4 planes 24

4D Architecture Decision plane: all decisions in network control – Reachability, access control, load balancing, security, etc. Dissemination plane – Connects routers/switches with decision elements Discovery plane – Discover physical components and create logical identifiers to represent them Data plane – Handles individual packets by forwarding table, packet filters, link weights, queue management params, etc. 25