1 | © 2013 Infoblox Inc. All Rights Reserved. Authoritative IP Address Management (IPAM) and its Security Implications Rick Bylina, Sr. Product Marketing Manager
2 | © 2013 Infoblox Inc. All Rights Reserved. Today’s Agenda What is Authoritative IPAM The three pillars of Authoritative IPAM ̶ The role of discovery data Improving security with powerful solution Security use cases Proactive security measures using the solution All of IT benefits from an Authoritative IAPM solution Summary / Conclusion
3 | © 2013 Infoblox Inc. All Rights Reserved. Authoritative IPAM Requirements Integrated protocol data with centralized management Integrated discovery data for network devices and end-hosts Metadata assignable to all database objects Flexible modeling and deep search-ability Add, move, change & trouble shooting tools Router, switch, and port access from a single UI (No CLI) Granular role based administration and approval processes Historical reporting Real business data related to a network resource helps bind together the logical network construct and the reality of enterprise IT resources
4 | © 2013 Infoblox Inc. All Rights Reserved. Authoritative database of all network data Workflows spanning protocol, infrastructure, and IPAM data Direct access to switch ports enabling monitoring & control Three Pillars of Authoritative IPAM
5 | © 2013 Infoblox Inc. All Rights Reserved. Authoritative Database of All Network Data Real business data related to a network resource helps bind together the logical network construct and the reality of enterprise IT resources Centralized management of all protocol data (DNS, DHCP) ̶ Enriched DHCP data with DHCP fingerprinting Integrated discovery data for all physical and virtual devices ̶ Layer-2 and layer-3 devices, end-hosts, port and connectivity data Automation of virtual and private-cloud infrastructure data ̶ Orchestrator plug-ins for automation Meta data tagging of all objects ̶ Your network / your business
6 | © 2013 Infoblox Inc. All Rights Reserved. Customizable, comprehensive auto-discovery Layer-2 / Layer-3 and end-host devices Connectivity and port data Virtual configuration / VLAN data Integrated Network Discovery Data Key to the accuracy and timeliness of the authoritative database The collection and correlation of this data provides unprecedented visibility, helping network admins easily gather the necessary information to analyze and take the appropriate action.
7 | © 2013 Infoblox Inc. All Rights Reserved. Integrated Work Flows Content-aware workflows traverse protocol, device, port, and IPAM data Scheduling and approval parameters Built-in adjustable discovery parameters Direct port control within the IPAM workflow Efficiency and productivity is vastly improved by having close-loop integrated work flows that span IP management, protocol, and device data all from a single UI.
8 | © 2013 Infoblox Inc. All Rights Reserved. Direct Switch and Port Access Integrated control for truly closed-loop workflows Change port admin status directly from UI Modify port description / write to the switch Assign and configure VLANs Reserve ports / detect reservation conflicts Comprehensive port inventory Leverage direct port status control to ensure ports are turned on only during provisioning and quickly shut ports for infected devices to prevent further disruptions.
9 | © 2013 Infoblox Inc. All Rights Reserved. A Complete Solution Benefiting All of IT Direct access to switch ports enabling monitoring & control Authoritative database of all network-related data Workflows spanning protocol, infrastructure, and IPAM data Authoritative IPAM A WAREHOUSE OF AUTHORITATIVE INFORMATIONSTREAMLINED, SIMPLIFIED OPERATIONSEFFECTIVE RESOURCE UTILIZATION
10 | © 2013 Infoblox Inc. All Rights Reserved. Improve Security with Authoritative IPAM Unprecedented visibility across the network Uncover unmanaged networks and devices Quickly locate infected devices ̶ Improve threat response times ̶ Take immediate action / remediate faster Enforce network access policy at the edge Report on anomalies Security teams require visibility across all of the IT team’s assets and generally are part of the review and approval process for many adds, moves, and changes.
11 | © 2013 Infoblox Inc. All Rights Reserved. Unprecedented Visibility w/ Search-ability Complete device and connectivity data Easily find and patch known issues Search data set for: device type = printer, manufacturer = HP, model = 7000 Shut ports for all HP 7000 printers, distribute patch to all responsible admins Test patch, re-enable ports Example: All HP Model 7000 LaserJet printers need a patch
12 | © 2013 Infoblox Inc. All Rights Reserved. Integrated Protocol and Device Data Quickly find infected devices Compress remediation response times Example: Malware infected Windows 7 machines launch DDoS Search data set for: device type = PC, OS = Windows 7 Generate report of DNS traffic rates for the list of Windows 7 devices found Shut ports for all Windows 7 machines showing out-of bounds DNS rates Remediate all infected machines, re-enable ports
13 | © 2013 Infoblox Inc. All Rights Reserved. You Can’t Manage What You Can’t See Discovery finds unmanaged networks and devices Rogue device detection Example: Exposure to threat from home router use in the office Ran discovery on accounting subnet in attempt to understand service outage An unmanaged device was discovered, a home wireless router with an open DHCP port Close the port. Using port id to correlate the cubicle - make a very nasty phone call to the manager of the individual
14 | © 2013 Infoblox Inc. All Rights Reserved. Using Authoritative IPAM Proactively Reserve ports, set admin status up at time of provisioning ̶ Prevent having open active ports, confirm usage Turn on DHCP Fingerprinting ̶ Access control at the edge, logical subnet assignments Leverage DNS RPZ for malware detection ̶ Use connectivity and device data to quickly shut off infected devices ̶ Get a quality feed for updates Being PROACTIVE means you focus on things you have control over to make things better.
15 | © 2013 Infoblox Inc. All Rights Reserved. Authoritative IPAM Benefits All IT Teams KNOCK DOWN THE SILOS Create and share an authoritative, integrated database BOOST THE TEAM’S POWER Streamline and simplify operations with integrated workflows IMPLEMENT CONTROLS Use built-in controls and leverage automation
16 | © 2013 Infoblox Inc. All Rights Reserved. Authoritative IPAM Benefits All IT Teams Better data means better decisions Collaboration drives efficiency, productivity, and accuracy IT human resources are elevated to more strategic tasks Improved enterprise service delivery = better user experiences Overall OPEX is reduced Not since enterprise wide solutions like ERP and CRM has a solution brought the type of positive change that truly empowers an organization to operate at a new level.
17 | © 2013 Infoblox Inc. All Rights Reserved. Authoritative IPAM Delivers… VISIBILITYEFFICIENCYCONTROL
18 | © 2013 Infoblox Inc. All Rights Reserved. Thank you Please Visit our Booth