Presentation is loading. Please wait.

Presentation is loading. Please wait.

Interface to Network Security Functions Nov 2014 Linda Dunbar Myo Zarny

Similar presentations


Presentation on theme: "Interface to Network Security Functions Nov 2014 Linda Dunbar Myo Zarny"— Presentation transcript:

1 Interface to Network Security Functions Nov 2014 Linda Dunbar (linda.dunbar@huawei.com)linda.dunbar@huawei.com Myo Zarny (Myo.Zarny@gs.com )Myo.Zarny@gs.com Christian Jacquenet (Christian.jacquenet@orange.com)Christian.jacquenet@orange.com Shaibal Chakrabarty (shaibalc@us-ignite.org)shaibalc@us-ignite.org

2 Firewall box configuration: ports & links based

3 Challenges Internet vSwitch VM1 VM vSwitch VM1 VM2 VM Clients needs to control its network security functions for their virtual networks. VM2 Resource & Policies management Resource Pool Key properties: -Clients don’t know how their VMs are mapped in the network. -VMs being moved, which will have different network ports. -Clients can’t easily view/query the FW policies related to their virtual networks.

4 Common Functional components of FW Functional components: – User authentication, user privilege control – Policies, targets, – Configuration, query, validation – Logging, Reporting – Maintenance methods – … Interface to Clients: Restful API: Web Portal Web browser Customer WebPortal Automated Prov Sys

5 Goal: a common interface for client to specify desired network security functions Regardless if the policies are enforced by FW or other devices. Clients' policy stay the same regardless what IP/MAC address are assigned/changed as VMs move around DCs. App 1=IP11 App 2=IP12 App 3=IP13 App 4=IP14 … App 3 App 2 App 1 App 4 App 1=IP1 App 2=IP2 App 3=IP3 App 4=IP4 … App 3 App 2App 1 App 4 Config 2: Config 1 : Policies for Firewall IP1===>IP3 IP1===>IP4 IP2=X=>IP3 IP2===>IP4 IP3 ===>IP1 IP3 ===>IP2 IP4=X=>IP1 IP4 ===>IP2 Change of the policies : IP11===>IP12 IP11===>IP14 IP13===>IP12 IP13===>IP14 … IP12=X=>IP11 IP12=X=>IP13 IP14=X=>I1P1 IP14 =X=>IP13 … Zones : Yellow zone Green zone … Security Policy : Yellow===>Yellow, Green Green ===> Green Prohibited Green=X=>Yellow

6 Security Functions under consideration: The wide acceptance of security functions that are not running on customer premises. For example: – Security as a Service: https://cloudsecurityalliance.org/research/secaas/#_get-involved https://cloudsecurityalliance.org/research/secaas/#_get-involved – Firewall as a Service : http://docs.openstack.org/admin-guide- cloud/content/fwaas.htmlhttp://docs.openstack.org/admin-guide- cloud/content/fwaas.html – Security has the sense of “long lasting services”. So we don’t have to deal with “On-Demand” oscillation issues. Here are the network functions under consideration: – Firewall – IPS/IDS (Intrusion detection system/ Intrusion prevention system) – DDOS/AntiDoS – Access control/Authorization/Authentication – Secure Key management

7 FW as a service: potential attributes

8 Security as a Service: Potential attributes

9 Relevant Industry initiatives: Firewall as a Service by OpenStack – OpenStack completed the Firewall as a Service project and specified the set of APIs for Firewall services: http://docs.openstack.org/admin- guide-cloud/content/fwaas_api_abstractions.htmlhttp://docs.openstack.org/admin- guide-cloud/content/fwaas_api_abstractions.html – OpenStack has defined the APIs for managing Security Groups: http://docs.openstack.org/admin-guide- cloud/content/securitygroup_api_abstractions.html http://docs.openstack.org/admin-guide- cloud/content/securitygroup_api_abstractions.html – Attributes defined by OpenStack Firewall/Security as a Service will be the basis of the information model for the proposed work at VNFOD IETF initiative. Security as a Service by Cloud Security Alliance – SaaS by CSA is at the very initiate stage of defining the scope of work.


Download ppt "Interface to Network Security Functions Nov 2014 Linda Dunbar Myo Zarny"

Similar presentations


Ads by Google