FWaaS German EichbergerSridar KandaswamyVishwanath Jayaraman.

Slides:



Advertisements
Similar presentations
Network Security Essentials Chapter 11
Advertisements

5.1 Overview of Network Access Protection What is Network Access Protection NAP Scenarios NAP Enforcement Methods NAP Platform Architecture NAP Architecture.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Ipchains and Iptables Linux operating system natively supports packet-filtering rules: Kernel versions 2.2 and earlier support the ipchains command. Kernel.
1 Routing and Remote Access Service (Week 15, Friday 4/21/2006) © Abdou Illia, Spring 2006.
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
Omniran OmniRAN Wi-Fi Hotspot Roaming Use Case Date: Authors: NameAffiliationPhone Max RiegelNSN
Ethernet and switches selected topics 1. Agenda Scaling ethernet infrastructure VLANs 2.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
1 Enabling Secure Internet Access with ISA Server.
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
Firewalls Marin Stamov. Introduction Technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Technical Training: DAP-1360 Wireless N Access Point DAP-1360.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
Omniran OmniRAN Wi-Fi Hotspot Roaming Use Case Date: Authors: NameAffiliationPhone Max RiegelNSN
Networking Components
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Sales Kickoff - ARCserve
Chapter 20: Getting from the Office to the Road: VPNs BAI617.
Introduction to Networking Concepts. Introducing TCP/IP Addressing Network address – common portion of the IP address shared by all hosts on a subnet/network.
Network Configuration Charles (Cal) Loomis & Mohammed Airaj LAL, Univ. Paris-Sud, CNRS/IN2P October 2013.
Threat Management Gateway 2010 Questo sconosciuto? …ancora per poco! Manuela Polcaro Security Advisor.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Honeypot and Intrusion Detection System
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Chapter 8: Virtual LAN (VLAN)
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Cisco 3 - LAN Perrine. J Page 110/20/2015 Chapter 8 VLAN VLAN: is a logical grouping grouped by: function department application VLAN configuration is.
NETWORK SECURITY USING IPTABLES. TOPICS OF DISCUSSION NETWORK TRAFFIC IN PRESENT SCENARIO !! WHY WE NEED SECURITY ? T TYPE OF ATTACKS & WAYS TO TACKLE.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Sudarshan Yadav Sr. Program Manager, Microsoft
1 Quick Overview Overview Network –IPTables –Snort Intrusion Detection –Tripwire –AIDE –Samhain Monitoring & Configuration –Beltaine –Lemon –Prelude Conclusions.
Firewall Security.
Packet Capture and Analysis: An Introduction to Wireshark 1.
Wireless networking Unit objective: Identify wireless networking standards, and install a SOHO network.
Security and Firewalls Ref: Keeping Your Site Comfortably Secure: An Introduction to Firewalls John P. Wack and Lisa J. Carnahan NIST Special Publication.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
Securing Network Communications Using IPSec Chapter Twelve.
WLAN In Disaster and Emergency Response (WIDER) MidTerm Presentation.
Chapter 4: Implementing Firewall Technologies
Firewalls2 By using a firewall: We can disable a service by throwing out packets whose source or destination port is the port number for that service.
DSD Course – Project Status Presentation 2 School of Innovation, Design and Engineering Malardalen University Dec 18 th,
1 An Introduction to Internet Firewalls Dr. Rocky K. C. Chang 12 April 2007.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Cryptography and Network Security
First generation firewalls packets filtering ريماز ابراهيم محمد علي دعاء عادل محمد عسجد سامي عبدالكريم.
Co-ordination & Harmonisation of Advanced e-Infrastructures for Research and Education Data Sharing Grant.
Atrium Router Project Proposal Subhas Mondal, Manoj Nair, Subhash Singh.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
Virtual Local Area Networks or VLANs
Securing the Network Perimeter with ISA 2004
Virtual LANs.
Firewalls Purpose of a Firewall Characteristic of a firewall
OPS235: Configuring a Network Using Virtual Machines – Part 2
POP: Building Automation Around Secure Server Deployment
Requirements for Client-facing Interface to Security controller draft-ietf-i2nsf-client-facing-interface-req-02 Rakesh Kumar Juniper networks.
Firewalls Jiang Long Spring 2002.
Agenda Create certificates for the GlobalProtect Portal, internal gateway, and external gateway. Attach certificates to a SSL-TLS Service Profile. Configure.
Advanced Computer Networks
Calypso Service Architecture
Presentation transcript:

FWaaS German EichbergerSridar KandaswamyVishwanath Jayaraman

Let’s get this started Introduction Team Motivation Objectives for Today There is no demo at the end Core dump of what the team has been doing Connect with deployers and users Roadmap

Where is FWaaS today ? Support for Perimeter N – S Firewalling Issues on DVR interaction for E – W traffic so not applied on namespaces for E – W. Firewall can be associated with Router(s). In retrospect, applying on Router interfaces makes more sense. Not on VM Ports for Firewalling VM – VM traffic Intersect with Security Groups – there is some ongoing discussion. No support to plug in to Service Chains, Containers, Provider Nets …

API Evolution Unified model to apply at different points in the network (Router Port, VM Port) Managing interplay between admin enforcement and user defined rules Grouping mechanisms (Address groups/Port Groups) SG intersect

DVR interaction E-W Firewalling Model is Routing on the local Node and bridge on the Remote. We have an asymmetric scenario and issues with connection tracking on iptables implementation. Options to go thru on the IR on the remote or other models that can impose a performance cost when FWaaS is configured. Still early and in discussions with DVR team.

Where some clarity is emerging Moving from Routers to Router interfaces for perimeter use cases Grouping models Service Groups Zones

Zone Based Firewalls Ordinary Firewalls: Ordinary firewall rule sets are applied on per-interface basis Acts as a packet filter for the interface. Zone Based firewall Interfaces are grouped into security zones Each interface in a zone has the same security level Packet-filtering policies are applied to traffic flowing between zones. Traffic flowing between interfaces that lie in same zone is not filtered

Zone Based Firewalls Additional points related to Zone Based Firewall By default, all traffic coming into router and originating from router is allowed An interface can be associated with only one zone An interface that belongs to a zone cannot have a per-interface firewall rule set applied to it and conversely Traffic between interfaces that do not belong to any zone flows unfiltered, and per-interface firewall rule sets can be applied to those interfaces.

Some other generic cleanup that is needed L3 Agent interactions for Observer hierarchy More Test Coverage + move test in tree FWaaS Gate setup

Trello Board

Component Design API server (FWaaS) API server (SG) FWaaS Backend Packet Filtering (e.g dropping, rejecting, etc.) Plugin FW insertion Plugin Packet Capture Plugin

FWaaS Api deprecated in Liberty This doesn’t mean it’s going away immediately But signals that this is being changed in the next cycle Likely some Backward compatibility

Roadmap MitakaNO Enhance test coverage API redesign ●Port based ●Can augment SecurityGroups ●IPTables based reference implementation ●Service Groups Improve reference implementation ●Scalability ●HA Zones ●SFC support ●Common classifiers ●Common backend for SG and FWaaS ●Pay off tech debt

How to contribute ●Get a good irc client. You’ll need it ○Join #openstack-fwaas and introduce yourself :-) ●Attend the weekly IRC meetings ○Wednesdays 18:30 UTC alternating with Thursdays 0:00 UTC ○Agenda: ●File a bug/RfE for your idea - Then add it to the agenda… ○It’s ok to only have a rough sketch of the idea and this is actually encouraged in the RfE ●Sign the Contributor’s license agreement (CLA) ○Developer Certificate of Origin has been discussed as replacing the CLA ●Get familiar with Gerrit. Code review, write code, write documentation, help... ●Attend the midcycle!

Q&A Questions?