Network Virtualization in The Hybrid Cloud Stanislav Zhelyazkov Microsoft MVP 21/11/2013.

Slides:



Advertisements
Similar presentations
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 4: Configuring Site to Site VPN with Pre-shared keys.
Advertisements

Internet Protocol Security (IP Sec)
And many others…. Deliver networking as part of pooled, automated infrastructure Ensure multitenant isolation, scale and performance Expand.
CS470, A.SelcukIPsec – AH & ESP1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Kako uklopiti oblak u svoju postojeću infrastrukturu? Tomica Kaniški CITUS d.o.o.
Red Corp Blue Subnet1 Blue Subnet3Blue Subnet2 Blue Subnet5 Blue Subnet4 Red Subnet2 Red Subnet1 Blue Sales Net Red HR Net Multitenant.
1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
Agenda Virtual Private Networks (VPNs) Motivation and Basics Deployment Topologies IPSEC (IP Security) Authentication Header (AH) Encapsulating Security.
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
1 Lecture 15: IPsec AH and ESP IPsec introduction: uses and modes IPsec concepts –security association –security policy database IPsec headers –authentication.
IPsec: Internet Protocol Security Chong, Luon, Prins, Trotter.
Agenda VPN tunnels Configuration of basic core network components Maintenance of Cisco devices Exercises & troubleshooting.
Must have static IP address pool and VLANs for Provider Address (PA) network – network on which NVGRE encapsulated packets are sent All subnets.
VIRTUAL PRIVATE NETWORKS (VPN). GROUP MEMBERS ERVAND AKOPYAN ORLANDO CANTON JR. JUAN DAVID OROZCO.
1 IP VPN Nikolay Scarbnik. 2 Agenda Introduction………………………………………………………….3 VPN concept definition……………………………………………..4 VPN advantages……………...…………………………………….5.
Configuration of a Site-to-Site IPsec Virtual Private Network Anuradha Kallury CS 580 Special Project August 23, 2005.
VPN TUNNELING PROTOCOLS PPTP, L2TP, L2TP/IPsec Ashkan Yousefpour Amirkabir University of Technology.
Blue CorpRed Corp Blue Subnet1 Blue Subnet3Blue Subnet2 Blue Subnet5 Blue Subnet4 Red Subnet2 Red Subnet1 Blue R&D Net Blue Sales Net.
Flat or shrinking IT budgets even as business expectations increase. Efficient datacenter operations across entire customer base. Enterprise- class.
NetComm Wireless VPN Functionality Feature Spotlight.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Creating an IPsec VPN using IOS command syntax. What is IPSec IPsec, Internet Protocol Security, is a set of protocols defined by the IETF, Internet Engineering.
VPN Wireless Security at Penn State Rich Cropp Senior Systems Engineer Information Technology Services The Pennsylvania State University © All rights.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
Data Center Network Redesign using SDN
Windows Azure Virtual Networks. Agenda LB VIP: Input Endpoint Internal Endpoint foo.cloudapp.net  VIP.
Глибоке занурення у System Center 2012 SP1 Михайло Комаров Газпром-информ MVP Virtual Machine.
PSeries Technical Conference L19 Brian Dolan-Goecke Atlanta, GeorgiaOctober 8-12, 2001 Linux VPN.
RE © 2003, Cisco Systems, Inc. All rights reserved.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 3: VPN and Encryption Technology.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Implementing VPN Solutions Laurel Boyer, CCIE 4918 Presented, June 2003.
© 2003, Cisco Systems, Inc. All rights reserved. FNS 1.0— © 2003, Cisco Systems, Inc. All rights reserved.
Page 1 NAT & VPN Lecture 8 Hassan Shuja 05/02/2006.
CustomerSegment and workloads Your Datacenter Active Directory SharePoint SQL Server.
Infrastructure as a Service
MDC-B350: Part 1 Room: You are in it Time: Now What we introduced in SP1 recap How to setup your datacenter networking from scratch What’s new in R2.
Advanced Unix 25 Oct 2005 An Introduction to IPsec.
MDC417 Follow me on Working as Practice Manager for Insight, he is a subject matter expert in cloud, virtualization and management.
From Virtualization Management to Private Cloud with SCVMM 2012 Dan Stolts Sr. IT Pro Evangelist Microsoft Corporation
C3 confidentiality classificationIntegrated M2M Terminals Introduction Vodafone MachineLink 3G v1.0 1 Vodafone MachineLink 3G VPN functionality Feature.
Cloud Scale Performance & Diagnosability Comprehensive SDN Core Infrastructure Enhancements vRSS Remote Live Monitoring NIC Teaming Hyper-V Network.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 Module 3 City College of San.
Page 1 TCP/IP Networking and Remote Access Lecture 9 Hassan Shuja 11/23/2004.
Generic Routing Encapsulation GRE  GRE is an OSI Layer 3 tunneling protocol: Encapsulates a wide variety of protocol packet types inside.
1 Network Layer Lecture 13 Imran Ahmed University of Management & Technology.
Cyber Security for Energy Delivery Systems NSTB What’s an ICP ? And why is it Useful for Utilities ? Dave Teumim, CISSP Teumim Technical, LLC.
21 July 2004Bill Nickless / IPSec1 IPSec Internet Protocol Security And You.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 4: Configuring Site to Site VPN with Pre-shared keys.
18 July 2004Bill Nickless / IPSec1 IPSec Internet Protocol Security And You.
Virtual Private Network(VPN) Presented By Aparna Chilukuri.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW) Module 3.1.
Create a dynamic datacenter with software-defined networking
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
Internet Key Exchange IKE ● RFC 2409 ● Services – Constructs shared authenticated keys – Establishes shared security parameters – Common SAs between IPSec.
Virtual Private Network Chapter 4. Lecturer : Trần Thị Ngọc Hoa2 Objectives  VPN Overview  Tunneling Protocol  Deployment models  Lab Demo.
V IRTUAL P RIVATE N ETWORKS K ARTHIK M OHANASUNDARAM W RIGHT S TATE U NIVERSITY.
Benefits For hoster or private cloud: Multi-tenant gateway reduces cost Enhanced Reliability with Clustering Works Seamlessly with Hyper-V network.
Virtual Private Network Configuration
Name Title Microsoft Windows Azure Virtual Networks.
| Basel Fabric Management with Virtual Machine Manager Philipp Witschi – Cloud Architect & Microsoft vTSP Thomas Maurer – Cloud Architect & Microsoft MVP.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 27 November 23, 2004.
Going Hybrid – part 1 Moving to Hybrid Cloud with Windows Azure Virtual Machines & System Center 2012 R2.
Level 300 Windows Server 2012 Networking Marin Franković, Visoko učilište Algebra.
Confidential New OnCell Features VPN & GuaranLink.
Module 4: Configuring Site to Site VPN with Pre-shared keys
Microsoft Virtual Academy
Remote Access Services RAS Routing and Remote Access Services RRAS Remote Desktop Terminal Services Virtual Private Networking VPN.
TechReady 16 1/12/2019 MDC-B351 How to Design and Configure Networking in Microsoft System Center Part 2 of 2 Greg Cusanza Senior Program Manager, Microsoft.
Presentation transcript:

Network Virtualization in The Hybrid Cloud Stanislav Zhelyazkov Microsoft MVP 21/11/2013

* VMM 2012 SP1 and R2 only supports creation of isolated PVLAN VMs

Load balancer back end and internet facing

Different subnets   GRE Key 5001 MAC CA  GRE Key 6001 MAC CA   VSIDProvider AddressCustomer Address NVGRE Packet

Contoso VM Network Northwind VM Network Fabrikam VM Network Internet Hoster

Contoso VM Network Northwind VM Network Fabrikam VM Network Internet Hoster BGP

TCP/IP VM

TCP/IP VM

IKE Phase 1 Setup PropertySetting IKE VersionIKEv2 Diffie-Hellman GroupGroup 2 (1024 bit) Authentication MethodPre-Shared Key Encryption Algorithms AES256 3DES Hashing AlgorithmSHA1(SHA128) Phase 1 Security Association (SA) Lifetime (Time) 28,800 seconds IKE Phase 2 Setup PropertySetting IKE VersionIKEv2 Hashing AlgorithmSHA1(SHA128) Phase 2 Security Association (SA) Lifetime (Time) - Phase 2 Security Association (SA) Lifetime (Throughput) - IPsec SA Encryption & Authentication Offers (in the order of preference) See Dynamic Routing Gateway IPsec Security Association (SA) OffersDynamic Routing Gateway IPsec Security Association (SA) Offers Perfect Forward Secrecy (PFS)No Dead Peer DetectionSupported

Vendor Device FamilyMinimum OS Version Configuration Template CiscoASRIOS 15.2Cisco ASR templates CiscoISRIOS 15.1Cisco ISR templates JuniperSRXJunOS 11.4Juniper SRX templates JuniperJ-SeriesJunOS 11.4Juniper J-series templates JuniperISGScreenOS 6.3Juniper ISG templates JuniperISGScreenOS 6.3Juniper SSG templates Microsoft Routing and Remote Access Service Windows Server 2012Routing and Remote Access Service templates