SlideShare a Scribd company logo
1 of 12
Download to read offline
WHITE PAPER




AN INTEgRATEd SECuRITy
SoluTIoN foR THE VIRTuAl
dATA CENTER ANd Cloud
Protecting Physical and Virtual Workloads




Copyright © 2011, Juniper Networks, Inc.	             1
WHITE PAPER - An Integrated Security Solution for the Virtual data Center and Cloud



                        Table	of	Contents
                        Executive Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

                        Introduction—The Implications of Virtualized Workloads . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

                        An Integrated Security Solution for the Virtualized data Center and Cloud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

                        The Juniper Solution: SRX Series Services gateways—Protecting Physical Workloads . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

                            SRX Series Zones—Segmenting and Isolating Traffic Among Physical Workloads . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

                        vgW Virtual gateway—Protecting Virtualized Workloads . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

                        The SRX Series and vgW—Integrated Zone Enforcement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

                            Why SRX Series Zone Synchronization in the Virtualized Network? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

                        use Cases: Multi-Tenancy and Regulatory Compliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

                            SRX Series/vgW Integration for Multi-Tenancy Management and Isolation Enforcement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

                            SRX Series/vgW Integration for Policy Compliance Enforcement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

                        Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12

                        About Juniper Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12




                        Table	of	Figures
                        figure 1: Security implications of virtualizing workloads . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

                        figure 2: Packet processing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

                        figure 3: vgW Virtual gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

                        figure 4: Integrated zone enforcement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

                        figure 5: SRX Series configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

                        figure 6: Zone selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

                        figure 7: Policy groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

                        figure 8: Multi-tenancy management and isolation enforcement. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

                        figure 9: Policy compliance enforcement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11




2                                                                                                                                                                                                         Copyright © 2011, Juniper Networks, Inc.
WHITE PAPER - An Integrated Security Solution for the Virtual data Center and Cloud



                         Executive	Summary
                         As momentum behind cloud computing continues to build at a rapid pace, IT leaders and stakeholders are sifting through
                         vast amounts of information to best understand what advantages this new type of network holds for their environment.
                         Their challenge is to adjust expectations for exaggeration and “hype” so that the true value and return on investment are
                         understood. This means accounting for all dependencies in the cloud computing architecture, including the sourcing and
                         provisioning of security.

                         At its simplest, the cloud is an Internet-based environment of computing resources comprised of servers, software, and
                         applications within a data center that can be accessed by any individual or business with Internet connectivity. Cloud
                         computing offers significant benefits to organizations by maximizing compute resource utilization and reduction in power
                         requirements.

                         It is estimated that, by 2015, cloud-based services will grow to become a $35.6 billion market1 and that virtualization as a
                         technology will be the near de facto architecture for clouds. The growth of cloud-based computing is outpacing even the
                         most optimistic predictions based on its compelling value proposition of enabling:

                         • The rapid development and deployment of services

                         • Highly scalable compute power

                         • Adoption of the pay-for-use model of cloud services (i.e., lower CapEx)

                         Even with the undeniable cost and scalability benefits of virtualization and cloud computing, the evolution of the data
                         center brings a new set of challenges to IT professionals. While the need for physical network security will continue to exist
                         in data centers, organizations will continue to adopt cloud computing in phases, resulting in a mix of physical and virtualized
                         data center workloads. This data center model will result in some workloads like those on physical servers being secured by
                         physical firewalls, while others such as those running on virtual machines (VMs) will likely face security concerns because
                         traditional security methods provide zero visibility into VM traffic.

                         Security, however, need not be an impediment to adopting cloud computing or taking advantage of the significant cost
                         savings it promises. This paper outlines Juniper Networks’ approach to providing pervasive and consistent protection for the
                         entirety of the evolving data center.

                         Introduction—The	Implications	of	Virtualized	Workloads
                         Virtualization stands to bring enormous cost savings to organizations by significantly reducing the space and electrical power
                         required to run data centers and clouds, and by streamlining the management of an ever growing number of servers. It is no
                         wonder, then, that adoption of virtualization is proceeding at a very rapid rate, and being accelerated by tough economic times
                         and cost cutting mandates. In fact, gartner estimates that 50 percent of the world’s workloads will be virtualized by 2012.2

                         further, says Neil Macdonald, vice president and fellow at gartner, “As organizations continue to virtualize their data centers
                         and clouds, workloads of higher sensitivity will be virtualized and the workloads themselves will become more mobile,
                         challenging traditional data center security architectures which rely solely on physical appliance-based enforcement.”

                         With security and compliance concerns being top of mind in virtualization and cloud deployments, some organizations
                         are struggling with how to reconcile competing priorities to virtualize their environments, while still ensuring that existing
                         requirements for protection and visibility are maintained. Collapsing multiple servers into a single one comprised of several
                         VMs significantly impacts all of the firewall, intrusion detection, and other physical network protections in use prior to the
                         virtualization of workloads. Physical security measures literally become “blind” to traffic between VMs, since they are no
                         longer in the data path (figure 1). Consequently, they cannot enforce protections and maintain control.




                         Source: Analysys Mason, 2010
                         1


                         Source: gartner, 2010
                         2




Copyright © 2011, Juniper Networks, Inc.	                                                                                                                              3
WHITE PAPER - An Integrated Security Solution for the Virtual data Center and Cloud




                                                Physical Network                                               Virtual Network


                                                                                                         VM1         VM2           VM3




                                                                                                                                                    ESX Host
                                                                                                                           Virtual
                                                                                                                           Switch




                                                                                                                  Hypervisor




                                           Firewall/IPS sees/protects all                            Physical security is “blind” to tra c
                                               tra c between servers                                     between virtual machines



                                                             Figure	1:	Security	implications	of	virtualizing	workloads
                        Making the virtualization security challenge even more acute is the highly dynamic nature of VMs. for instance, VMware, the
                        leader in virtualization and cloud infrastructure, provides features like VMotion and distributed Resource Scheduling (dRS),
                        which allow for hardware and capacity pooling by enabling VMs to move from physical host to physical host as performance
                        needs dictate. VM provisioning is also very quick and easy. IT operations personnel and department administrators can create
                        new VMs using templates or cloning existing ones. So, while virtual environments can scale in a flash, the security policies
                        that control access and suppress malware proliferation cannot—unless the process for doing so is equally automated and
                        scalable. Consequently, the contents of VMs and the applications they host are at high risk from inappropriate access,
                        malicious traffic, and weak (in some cases inherited) security posture. looking at the implications of virtualized workloads on
                        the evolving data center, it is becoming clear that organizations would greatly benefit from a solution that scales as part of
                        the virtual environment.

                        An	Integrated	Security	Solution	for	the	Virtualized	Data	Center	and	Cloud
                        Today, we know that technologies to monitor and protect inter-VM traffic for virtualized workloads exist and are in broad use
                        worldwide. We also know that firewalls in the data center will continue to provide valuable security for physical workloads.
                        And with security and compliance concerns being top of mind for IT professionals, what organizations need is an integrated
                        security solution that provides consistent application of security policy throughout the physical and virtualized network.

                        The	Juniper	Solution:	SRX	Series	Services	Gateways—Protecting	Physical	Workloads
                        Juniper Networks® SRX Series Services gateways are high-performance security, routing, and network solutions for
                        the enterprise and service provider. The SRX Series platform provides high port density, advanced security, and flexible
                        connectivity in a single, easily managed platform that supports fast, secure, and highly available data center operations.
                        The SRX Series is based on Juniper Networks Junos® operating system, the proven oS that delivers security and advanced
                        protection services and is the foundation of the world’s largest networks.




4                                                                                                                        Copyright © 2011, Juniper Networks, Inc.
WHITE PAPER - An Integrated Security Solution for the Virtual data Center and Cloud



                         SRX	Series	Zones—Segmenting	and	Isolating	Traffic	Among	Physical	Workloads	
                         A security zone is a collection of interfaces with similar security requirements that define a security boundary. Internal
                         network interfaces may be assigned to a security zone named “trust,” and external network interfaces may be assigned to
                         a security zone named “untrust.” Security policies, which are associated with zones, are then used to control transit traffic
                         between security zones. A packet’s incoming zone, as determined by the interface through which it arrived, and its outgoing
                         zone, as determined by the forwarding lookup, together determine which policy is used for packets in a flow. The SRX Series,
                         a zone-based firewall, offers great efficiencies in three key areas:

                         • Packet processing

                         • Security policy management

                         • Reporting

                         Packet	Processing: If we think about how a “traditional” or non-zone-based firewall works, the firewall contains lists of
                         policies and the policies are processed from top to bottom, in sequential order. once the firewall obtains a match for the
                         packet, the firewall then applies the policy. for a small policy base, this is a nonissue but as security policies grow, this
                         introduces more and more latency to the packet. With a zone-based firewall, policies are separated based on the source and
                         destination zones. Policies are still processed from top to bottom, but only a subset of the policy base is assessed.

                         As an example, let’s take a look at a basic, non-zoned-based (“traditional”) firewall installation with trust, untrust, and dMZ
                         zones. for simplicity purposes, we will use 300 policies. With a traditional firewall, as each packet comes into an interface,
                         it is potentially assessed against all 300 policies until it finds a match to the source, destination, and service, and then an
                         action is taken on the packet. In contrast, with a zone-based firewall, policies are segregated based on zone structures—trust,
                         untrust, and dMZ. In this example (figure 2), we will assume that there is an even distribution of policies between all three
                         interfaces. This means that there are six available flows, equating to 50 policies per possible flow.




                                                                                  Untrust                 6
                                                              1




                                                                                                                 5




                                                                                                                          DMZ




                                                                          SRX5800                                    3
                                                                                        SRX5800


                                                                  2



                                                                                   Trust
                                                                                                         4




                                                                          Figure	2:	Packet	processing




Copyright © 2011, Juniper Networks, Inc.	                                                                                                                              5
WHITE PAPER - An Integrated Security Solution for the Virtual data Center and Cloud



                        As a packet comes in, the firewall will convert the source and destination interfaces into zones. furthermore, as the packet is
                        assessed, it will only be assessed against 50 policies, compared to 300 policies in the non-zone-based firewall example. for
                        smaller implementations, the impact is not as great, but as the number of policies increase, the impact grows.

                        Security	Policy	Management: When looking at a traditional firewall, the policy is written based on host-to-host information.
                        With this limited information, it can be tough to tell much about the flow other than names and numbers (source,
                        destination, service). Now, in contrast, we have added a new layer—zones—that introduce clarity to the flow. Not only will you
                        see the names and numbers, but you will also see the expected flow of the packet. In the above example, (figure 2), you can
                        determine that the packet is expected to flow from the untrust zone to the dMZ, or the trust zone to the untrust zone. Being
                        able to easily visualize this information greatly increases policy management. More importantly, by combining this visual
                        aspect with the subset of policies available for a given flow, managing policies also becomes much easier.

                        Reporting: The visibility and availability of zone data greatly increases the reporting of information and, as a result, zones
                        have become an invaluable tool for compliance reporting like Payment Card Industry data Security Standard (PCI dSS),
                        Health Industry Portability and Accountability Act (HIPPA), Sarbanes-oxley Act (SoX), etc. for example, if the firewall
                        receives an http request flowing from A to B, the administrator would first need to understand what A and B are in order
                        to determine if the packet should be allowed to pass. However, if the administrator sees the same request flowing from
                        the untrust zone to the finance zone, the administrator would not have to know what A and B are in order to make the
                        determination that such a packet should not be allowed to flow in this direction, and at the same time could track down the
                        policy that is allowing the packet to pass or write a policy to specifically deny the packet.

                        vGW	Virtual	Gateway—Protecting	Virtualized	Workloads
                        The vgW Series is technology based on a four-tiered architecture comprised of a hypervisor-based module, a security virtual
                        machine, a management server, and a Web interface. The hypervisor-based module resides within the hypervisor of each
                        virtual machine host and performs security functions, including packet inspection and security policy enforcement.

                        The security VM facilitates communication between the vgW management server where security policy information and
                        detail about VMs is stored, and the hypervisor module. The vgW management server stays in constant communication with
                        the VMware vCenter so that as changes to VMs occur, they are synchronized to the vgW management server.


                                                                                  Security
                                                            Virtual
                                                                                 Design for       VM
                                                            Center                                          VM1         VM2          VM3
                                                                                   vGW




                                                                    Partner Server
                                                             (IPS, SIM, Syslog, Netflow)



                                                                                                                                                           ESX Host
                                                                                                              vGW Series
                                                                                  Packet Data

                                • Enterprise-grade
                                   - VMware “VMsafe Certified”
                                                                                                                                              ESX Kernel




                                  - Protects each VM and the hypervisor
                                                                                                         VMWare DVFilter
                                   - Fault-tolerant architecture (i.e. HA)
                                • Virtualization Aware                                                 VMWare VSwitch or
                                  - “Secure VMotion” scales to 1,000+ ESX                                Virtual Swiitch
                                  - “Auto Secure” detects/protects new VMs
                                • Granular, Tiered Defense
                                • Stateful firewall and integrated IPS
                                • Flexible Policy Enforcement – Zone, VM group,
                                  VM, Application, Port, Protocol, Security state
                                                                                                               Hypervisor




                                                                              Figure	3:	vGW	Virtual	Gateway




6                                                                                                                           Copyright © 2011, Juniper Networks, Inc.
WHITE PAPER - An Integrated Security Solution for the Virtual data Center and Cloud



                         The web-based interface is the window to all vgW functionality, with virtualization security policy editors that follow well
                         established conventions for a highly intuitive user experience. furthermore, vgW provides features that automate security
                         and compliance enforcement within virtual networks and clouds, while tightly integrating with existing Juniper security
                         technologies that include intrusion prevent system (IPS), Juniper Networks STRM Series Security Threat Response Managers
                         for logging and reporting, and vgW security design for policy management

                         The	SRX	Series	and	vGW—Integrated	Zone	Enforcement
                         Juniper understands that the keys to effective security are pervasiveness and consistency. To that end, the security that is
                         applied in a collaborative way on physical and virtualized workloads are designed to ensure that security policies applied to
                         workloads are consistent with their logical use, regardless of the platform on which they are deployed (figure 4). To do this,
                         Juniper has integrated the SRX Series zone concept with the vgW VM enforcement engine such that the zone information is
                         synchronized to and used by vgW within the virtualized environment.

                         Here is a synopsis of how this works. The SRX Series delivers zone-based segregation at the data center perimeter, while
                         vgW integrates knowledge of SRX Series zones to ensure that zone integrity is enforced on the hypervisor using automated
                         security features like Smart groups and VM Introspection. The Smart groups feature allows for the creation of a group of
                         VMs that changes based on administratively defined criteria. VMs that suddenly have a configuration change that meets
                         predefined criteria can be added to or removed from groups within seconds. for example, if a VM administrator associates
                         the virtual network interface of a VM to the corporate production network, you can immediately apply a set of firewall rules
                         to protect that system. Moreover, VM Introspection provides rich detail about the applications and services that are installed
                         on a VM, as well as its configuration. It is possible, then, to construct security policies on the basis of VM Introspection
                         parameters. An example of such a policy might be to not allow a new virtual machine to join a VM group or cluster unless it
                         has a specific oS configuration and hot fix installed.

                         Thanks to this integrated approach, security administrators can confidently guarantee consistent security enforcement from
                         the data center perimeter to the server VM. The role of zone synchronization between the SRX Series and vgW provides
                         an automated way to link the vgW virtual security layer with the SRX Series physical device and network security. The SRX
                         Series zone feature simplifies VM-to-zone mapping by importing zones configured on SRX Series Services gateways into the
                         virtual environment.


                                       VM1          VM2     VM3        vGW
                                                                                                                     vGW Security Design for
                                                                                                                       Policy Management




                                                                                         Policies

                                                                                                                               Centralized Switching
                                                                                                                           Configuration and Management
                                                  vGW Virtual Gateway

                                                     VMware vSphere
                                                                                                                   Firewall Event Syslogs
                                                                                                                 Netflow for Inter-VM Tra c

                                                              Zone Synchronization
                                                            and Tra c Mirroring to IPS                                                            Ethernet Design
                                                                                                                                                   Virtual Control

                                                                                                                           STRM
                                                                                                                           Series



                                                                                                    Network


                                             EX Series             SRX Series
                                                                    with IPS



                                                                     Figure	4:	Integrated	zone	enforcement




Copyright © 2011, Juniper Networks, Inc.	                                                                                                                                    7
WHITE PAPER - An Integrated Security Solution for the Virtual data Center and Cloud



                        Why	SRX	Series	Zone	Synchronization	in	the	Virtualized	Network?
                        The SRX Series zone synchronization feature provides an automated way to link the vgW virtual security layer with SRX Series
                        physical security. This means that traffic isolation policies flow through to the virtualization layer and are enforced there as
                        well as for end-to-end security (e.g., from data center perimeter to the VM). By importing the zones defined within the SRX
                        Series devices, VM-to-zone mapping is simplified. The zone assignments can be used to apply inter-VM zone policies as well
                        as to integrate zones into compliance checking to ensure that VMs are only attached to authorized zones.

                        Zone synchronization between the SRX Series and vgW Virtual gateway is as easy as 1-2-3.

                            1. vgW pulls zone definitions from the SRX Series device, mapping zones to the SRX Series interface and associated
                                VlANs or network ranges for each zone. In the “Settings” module (figure 5), select SRX Series zones in the Security
                                Settings section. Select Add to create a new SRX Series instance. The configuration parameters are Name,	Host,	
                                and	Port.




                                                                            Figure	5:	SRX	Series	configuration
                                Name: Name to represent this SRX Series gateway. Note that this name will be used within the VM zone labels, so a
                                short descriptive name is best.

                                Host: Enter the SRX Series management IP address, where vgW Security design (i.e., vgW management server) will
                                connect to the SRX Series gateway.

                                Port: The TCP port used to connect the SRX Series via the Junoscript interface.

                            2. vgW defines zones as a Policy group based on the VlANs and networks associated with each zone. once an SRX
                                Series object has been saved, select load Zones to initiate zone synchronization. you will be shown the list of all
                                retrieved zones to select what you would like to import into vgW as VM zone groupings. Within the load Zones dialog,
                                the zone synchronization can be configured to automatically poll the SRX Series for zone updates. The configuration
                                parameters for scheduled updates are:

                                Update	Frequency: How often to query the SRX Series for updates.

                                Relevant	Interfaces: If only a subset of the SRX Series interfaces are protecting the virtual network, those interfaces
                                should be selected here, so that only zones related to the virtual network are updated.




8                                                                                                                          Copyright © 2011, Juniper Networks, Inc.
WHITE PAPER - An Integrated Security Solution for the Virtual data Center and Cloud




                                                                             Figure	6:	Zone	selection

                              3. vgW Policy groups dynamically associate each VM to its zone, which can be used for inter-VM policy enforcement and
                                  zone compliance validations. The SRX Series zones are created in vgW as VM Policy groups. using zone information
                                  from SRX Series devices, a Policy group is created based on the following parameters:

                                  VLANs: VlANs associated with the SRX Series interface.

                                  IP	Ranges: Subnet defined on the SRX Series interface, as well as routes defined within a zone.

                                  VM	Scope: If the zone sync configuration includes a “VMs associated” selection, the chosen group will be included in
                                  the Policy group.

                                  The vgW zones synchronization feature also allows VM records to be populated within the address book for the zone
                                  to which the VM belongs. This allows the VM-to-zone mapping validation to also be performed from the context of
                                  SRX Series management.

                                  When a VM record is added to the SRX Series, it is created with the name of the VM as defined in vCenter. To make it
                                  clear that these are auto-generated VM records, a string is prepended to the name of the VM in its address book entry.
                                  By default, this string is “VM-”, but this can be modified within the synchronization dialog.




                                                                              Figure	7:	Policy	groups
                         Benefits of zone synchronization between the SRX Series and vgW provide guaranteed zone integrity on the hypervisor (i.e.,
                         virtualization operating system), automation and verification that a VM policy violation has not occurred, and visibility for the
                         SRX Series gateways.




Copyright © 2011, Juniper Networks, Inc.	                                                                                                                               9
WHITE PAPER - An Integrated Security Solution for the Virtual data Center and Cloud



                        Use	Cases:	Multi-Tenancy	and	Regulatory	Compliance	

                        SRX	Series/vGW	Integration	for	Multi-Tenancy	Management	and	Isolation	Enforcement
                        Multi-tenancy, or many tenants sharing resources, is fundamental to cloud computing. Cloud service providers are able to
                        build network infrastructures and data centers that are computationally very efficient, highly scalable, and easily incremented
                        to serve the many customers that share them. Key to ensuring that cloud service providers can meet their security service-
                        level agreements (SlAs) for their customers is the proper isolation of customer resources and virtualized workloads (e.g.,
                        Coca-Cola VMs are kept separate from Pepsi VMs). Tenants or customers of public cloud and VM hosting services need
                        written proof that communication and access to their hosted VMs is limited to the appropriate entities and not accessible by
                        other customers of the same public cloud.

                        Juniper’s security suite of SRX Series and vgW gateways accomplishes this by isolating customer traffic flows to the right
                        physical network segments or zones, and by wrapping customer VMs within those zones in a customer-specific security
                        policy that limits access to only that which is business appropriate for that tenant. In the public cloud diagram depicted
                        in figure 8, customer A traffic flows through the data center edge router to the SRX Series device where customer A zone
                        policy is enforced, limiting traffic for customer A to VlAN 110. The vgW, for its part, will identify the green VMs belonging to
                        zone/customer A and ensure that those VMs are never assigned in error to VlAN 210. Also, any customer A to customer B
                        communication will be blocked by both SRX Series and vgW zone policies.

                        The benefit to the service provider is maximum use of virtualization infrastructure (note that both hosts have the maximum
                        number of VMs resident), while customer resource isolation is enforced at the logical layer (e.g., customer A VMs will be
                        isolated from customer B, even if they reside on the same host.).

                                                                 SRX Series

                                                                                                                                  Customer A
                                                                                      IPsec VPN                     MPLS VPN
                                                                                                                                   Customer B



                                                                                                       MX Series



                                                  Customer A = VLAN 110
                                                                                                                   • Customer data centers linked
                                                                  Customer B = VLAN 210
                                                                                                                     to public cloud via MPLS and
                                                                                                                     IPsec VPNs
                                                                                                                   • SRX Series ties customer VPN
                                      EX4200                                                           EX4200
                                                                    Trunk Port                                       tunnel to VM network VLANs=
                                                              ESX-1               ESX-11
                                                                                                                     Zones
                                                                                                                   • vGW enforces Zone integrity on
                                                                                                                     the hypervisor
                                                                                                                   • vGW also enables micro-
                                                     Distributed Virtual Switch - DVS                                segmentation within
                                                                                                                     customer’s Zone/VLAN
                                                           vGW Virtual Gateway



                                        VM      VM       VM      VM              VM     VM        VM      VM




                                                      Figure	8:	Multi-tenancy	management	and	isolation	enforcement




10                                                                                                                                Copyright © 2011, Juniper Networks, Inc.
WHITE PAPER - An Integrated Security Solution for the Virtual data Center and Cloud



                         SRX	Series/vGW	Integration	for	Policy	Compliance	Enforcement
                         Private clouds are defined as those cloud computing environments that are entirely owned by, controlled by, and
                         provide service to a single organization. The business or government agency cloud may serve many departments or sub-
                         organizational segments and, in that way, is similar to the public cloud service provider. This means that VM and VM group
                         isolation by department or function is key both for security policy compliance, as well as to ensure that risky data behaviors
                         from one department don’t put the VMs of another department at risk as well. Imagine, as examples, the university that has
                         an engineering department doing computer virus research sharing a cloud with the medical school that has VMs with patient
                         data; or the business with customer relationship management (CRM) VMs sharing a host with Web servers.

                         These mixed-mode deployments are typical because businesses want to compress as many VMs onto a host for cost
                         savings. Security best practice, however, requires that the VMs be isolated from one another such that connectivity from an
                         infected Web server to a customer database is not possible. Consider the diagram below (figure 9) to understand how this is
                         enforced. Zone policies on the SRX Series will ensure that physical servers in zone preproduction will not be able to connect
                         to Web servers and vice versa. All bidirectional traffic flows between those zones will be “denied” by the SRX Series gateway.
                         In the case where the physical servers in those zones actually contain VMs, vgW will step in and enforce the same policy.
                         So VMs belonging to zone preproduction will not communicate with Web VMs. Should an administrator accidentally assign
                         a new preproduction VM to the wrong zone (VlAN)—an action which is all too likely and common given the scale of these
                         networks—vgW will quarantine that VM and alert the administrator of the policy violation.


                                                                                                                                             Zone/VLAN Policy
                                                                 SRX Series
                                                                                                                                             Tra c               Application   Action




                                                                                                                    1. Set Policy
                                                 VLANS                                                                                       Direction
                                                 WEB
                                                 CRM                                                                                         WEB-to-CRM          TCP/88        ACCEPT
                                                 PRE-PROD
                                                                                                                                             PRE-PROD-
                                                                                                                                             to-WEB              ANY           DENY

                                                                                                                                             PRE-PROD-
                                                                                                                                             to-CRM              ANY           DENY

                                                   Data Center Inter-Connect                                                                 NEW VM – PRE-PROD VM VLAN=120
                                                                                                                    2. Inspect and Compare




                               EX4200                                                              EX4200
                                                                 Trunk Port


                                                         ESX-1                ESX-11




                                                 Distributed Virtual Switch - DVS
                                                                                                             New
                                                                                                             VM


                                 VM         VM      VM      VM                VM       VM     VM    VM
                                                                                                                    3. Detect and Notify




                                       VLAN=121      VLAN=110                      VLAN=120
                                         WEB           CRM                         PRE-PROD

                                                                                                                                                         VLAN 121 instead of 120
                                                                                                                                                         POLICY VIOLATION!!!




                                                                              Figure	9:	Policy	compliance	enforcement




Copyright © 2011, Juniper Networks, Inc.	                                                                                                                                               11
WHITE PAPER - An Integrated Security Solution for the Virtual data Center and Cloud



                         Conclusion
                         Cloud computing and virtualization are two major catalysts in the evolving data center design. Though both present
                         compelling cost saving opportunities for customers, there are still significant security concerns that stand to diminish their
                         overall value proposition. organizations that act early to implement an integrated best-of-breed security—such as Juniper
                         offers with SRX Series and vgW—will be best positioned to scale their cloud both in terms of secure cloud infrastructure
                         and in-house cloud security expertise. Since cloud computing and virtualization adoption are usually implemented in
                         phases, the typical data center will, for the foreseeable future, be a mix of physical and virtualized workloads. Therefore, a
                         security framework that is independent of the underlying workload platform is key to ensuring protections for all workloads
                         throughout the migration to and implementation of virtualization and cloud computing. With the right security solution,
                         organizations will be able to derive the most value from their virtualization and cloud computing infrastructure without
                         sacrificing security breadth and effectiveness.

                         About	Juniper	Networks
                         Juniper Networks is in the business of network innovation. from devices to data centers, from consumers to cloud providers,
                         Juniper Networks delivers the software, silicon and systems that transform the experience and economics of networking.
                         The company serves customers and partners worldwide. Additional information can be found at www.juniper.net.




Corporate	and	Sales	Headquarters                    APAC	Headquarters                        EMEA	Headquarters                To purchase Juniper Networks solutions,
Juniper Networks, Inc.                              Juniper Networks (Hong Kong)             Juniper Networks Ireland         please contact your Juniper Networks
1194 North Mathilda Avenue                          26/f, Cityplaza one                      Airside Business Park            representative at 1-866-298-6428 or
Sunnyvale, CA 94089 uSA                             1111 King’s Road                         Swords, County dublin, Ireland
                                                                                                                              authorized reseller.
Phone: 888.JuNIPER (888.586.4737)                   Taikoo Shing, Hong Kong                  Phone: 35.31.8903.600
or 408.745.2000                                     Phone: 852.2332.3636                     EMEA Sales: 00800.4586.4737
fax: 408.745.2100                                   fax: 852.2574.7803                       fax: 35.31.8903.601
www.juniper.net

Copyright 2011 Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper Networks logo, Junos,
NetScreen, and ScreenoS are registered trademarks of Juniper Networks, Inc. in the united States and other
countries. All other trademarks, service marks, registered marks, or registered service marks are the property of
their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper
Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice.

2000431-001-EN        Aug 2011                         Printed on recycled paper



12                                                                                                                                        Copyright © 2011, Juniper Networks, Inc.

More Related Content

What's hot

EMC Enterprise Hybrid Cloud 2.5.1, Federation SDDC Edition: Backup Solution G...
EMC Enterprise Hybrid Cloud 2.5.1, Federation SDDC Edition: Backup Solution G...EMC Enterprise Hybrid Cloud 2.5.1, Federation SDDC Edition: Backup Solution G...
EMC Enterprise Hybrid Cloud 2.5.1, Federation SDDC Edition: Backup Solution G...EMC
 
HCLT Whitepaper : ITSM Approach for Clouds
HCLT Whitepaper : ITSM Approach for CloudsHCLT Whitepaper : ITSM Approach for Clouds
HCLT Whitepaper : ITSM Approach for CloudsHCL Technologies
 
Juniper Networks: Q Fabric Architecture
Juniper Networks: Q Fabric ArchitectureJuniper Networks: Q Fabric Architecture
Juniper Networks: Q Fabric ArchitectureTechnologyBIZ
 
White Paper: Backup and Recovery of the EMC Greenplum Data Computing Applianc...
White Paper: Backup and Recovery of the EMC Greenplum Data Computing Applianc...White Paper: Backup and Recovery of the EMC Greenplum Data Computing Applianc...
White Paper: Backup and Recovery of the EMC Greenplum Data Computing Applianc...EMC
 
EMC Enterprise Hybrid Cloud 2.5.1, Federation SDDC Edition: Foundation Infras...
EMC Enterprise Hybrid Cloud 2.5.1, Federation SDDC Edition: Foundation Infras...EMC Enterprise Hybrid Cloud 2.5.1, Federation SDDC Edition: Foundation Infras...
EMC Enterprise Hybrid Cloud 2.5.1, Federation SDDC Edition: Foundation Infras...EMC
 
Cloud Computing Made Easy
Cloud Computing Made EasyCloud Computing Made Easy
Cloud Computing Made Easycloudipedia
 
DATA COMMUNICATION AND NETWORKING
DATA COMMUNICATION AND NETWORKINGDATA COMMUNICATION AND NETWORKING
DATA COMMUNICATION AND NETWORKINGsaravana prasanth
 
Privacy preserving back up and recovery of emergency data
Privacy preserving back up and recovery of emergency dataPrivacy preserving back up and recovery of emergency data
Privacy preserving back up and recovery of emergency dataZdravko Danailov
 
Backup of Microsoft SQL Server in EMC Symmetrix Environments ...
Backup of Microsoft SQL Server in EMC Symmetrix Environments ...Backup of Microsoft SQL Server in EMC Symmetrix Environments ...
Backup of Microsoft SQL Server in EMC Symmetrix Environments ...webhostingguy
 
StruxureWare for data centers
StruxureWare for data centersStruxureWare for data centers
StruxureWare for data centersRogier den Boer
 
Dw guide 11 g r2
Dw guide 11 g r2Dw guide 11 g r2
Dw guide 11 g r2sgyazuddin
 

What's hot (16)

EMC Enterprise Hybrid Cloud 2.5.1, Federation SDDC Edition: Backup Solution G...
EMC Enterprise Hybrid Cloud 2.5.1, Federation SDDC Edition: Backup Solution G...EMC Enterprise Hybrid Cloud 2.5.1, Federation SDDC Edition: Backup Solution G...
EMC Enterprise Hybrid Cloud 2.5.1, Federation SDDC Edition: Backup Solution G...
 
Storage Area Networks and Wireless Applications
Storage Area Networks and Wireless ApplicationsStorage Area Networks and Wireless Applications
Storage Area Networks and Wireless Applications
 
HCLT Whitepaper : ITSM Approach for Clouds
HCLT Whitepaper : ITSM Approach for CloudsHCLT Whitepaper : ITSM Approach for Clouds
HCLT Whitepaper : ITSM Approach for Clouds
 
ITSM Approach for Clouds
 ITSM Approach for Clouds ITSM Approach for Clouds
ITSM Approach for Clouds
 
Juniper Networks: Q Fabric Architecture
Juniper Networks: Q Fabric ArchitectureJuniper Networks: Q Fabric Architecture
Juniper Networks: Q Fabric Architecture
 
White Paper: Backup and Recovery of the EMC Greenplum Data Computing Applianc...
White Paper: Backup and Recovery of the EMC Greenplum Data Computing Applianc...White Paper: Backup and Recovery of the EMC Greenplum Data Computing Applianc...
White Paper: Backup and Recovery of the EMC Greenplum Data Computing Applianc...
 
Memory Pools for C and C++
Memory Pools for C and C++Memory Pools for C and C++
Memory Pools for C and C++
 
EMC Enterprise Hybrid Cloud 2.5.1, Federation SDDC Edition: Foundation Infras...
EMC Enterprise Hybrid Cloud 2.5.1, Federation SDDC Edition: Foundation Infras...EMC Enterprise Hybrid Cloud 2.5.1, Federation SDDC Edition: Foundation Infras...
EMC Enterprise Hybrid Cloud 2.5.1, Federation SDDC Edition: Foundation Infras...
 
Cloud Computing Made Easy
Cloud Computing Made EasyCloud Computing Made Easy
Cloud Computing Made Easy
 
DATA COMMUNICATION AND NETWORKING
DATA COMMUNICATION AND NETWORKINGDATA COMMUNICATION AND NETWORKING
DATA COMMUNICATION AND NETWORKING
 
NEWCDMISPECIFICATION
NEWCDMISPECIFICATIONNEWCDMISPECIFICATION
NEWCDMISPECIFICATION
 
Privacy preserving back up and recovery of emergency data
Privacy preserving back up and recovery of emergency dataPrivacy preserving back up and recovery of emergency data
Privacy preserving back up and recovery of emergency data
 
Backup of Microsoft SQL Server in EMC Symmetrix Environments ...
Backup of Microsoft SQL Server in EMC Symmetrix Environments ...Backup of Microsoft SQL Server in EMC Symmetrix Environments ...
Backup of Microsoft SQL Server in EMC Symmetrix Environments ...
 
Data guard
Data guardData guard
Data guard
 
StruxureWare for data centers
StruxureWare for data centersStruxureWare for data centers
StruxureWare for data centers
 
Dw guide 11 g r2
Dw guide 11 g r2Dw guide 11 g r2
Dw guide 11 g r2
 

Similar to Juniper Networks: Security for cloud

Integrated-Security-Solution-for-the-virtual-data-center-and-cloud
Integrated-Security-Solution-for-the-virtual-data-center-and-cloudIntegrated-Security-Solution-for-the-virtual-data-center-and-cloud
Integrated-Security-Solution-for-the-virtual-data-center-and-cloudJohn Atchison
 
Juniper Networks Solutions for VMware NSX
Juniper Networks Solutions for VMware NSXJuniper Networks Solutions for VMware NSX
Juniper Networks Solutions for VMware NSXJuniper Networks
 
Integrating SDN into the Data Center
Integrating SDN into the Data CenterIntegrating SDN into the Data Center
Integrating SDN into the Data CenterJuniper Networks
 
Business and Economic Benefits of VMware NSX
Business and Economic Benefits of VMware NSXBusiness and Economic Benefits of VMware NSX
Business and Economic Benefits of VMware NSXAngel Villar Garea
 
Network Virtualization and Security with VMware NSX - Business Case White Pap...
Network Virtualization and Security with VMware NSX - Business Case White Pap...Network Virtualization and Security with VMware NSX - Business Case White Pap...
Network Virtualization and Security with VMware NSX - Business Case White Pap...Błażej Matusik
 
Vmware nsx network virtualization platform white paper
Vmware nsx network virtualization platform white paperVmware nsx network virtualization platform white paper
Vmware nsx network virtualization platform white paperCloudSyntrix
 
Everything You Need To Know About Cloud Computing
Everything You Need To Know About Cloud ComputingEverything You Need To Know About Cloud Computing
Everything You Need To Know About Cloud ComputingDarrell Jordan-Smith
 
NSX Reference Design version 3.0
NSX Reference Design version 3.0NSX Reference Design version 3.0
NSX Reference Design version 3.0Doddi Priyambodo
 
Enhancing intelligence with the Internet of Things
Enhancing intelligence with the Internet of ThingsEnhancing intelligence with the Internet of Things
Enhancing intelligence with the Internet of ThingsThe Marketing Distillery
 
VMware Network Virtualization Design Guide
VMware Network Virtualization Design GuideVMware Network Virtualization Design Guide
VMware Network Virtualization Design GuideEMC
 
V mware architecting-v-cloud-wp
V mware architecting-v-cloud-wpV mware architecting-v-cloud-wp
V mware architecting-v-cloud-wpraghav8055
 
Set Up Security and Integration with DataPower XI50z
Set Up Security and Integration with DataPower XI50zSet Up Security and Integration with DataPower XI50z
Set Up Security and Integration with DataPower XI50zSarah Duffy
 
CloudAnalyst: A CloudSim-based Tool for Modelling and Analysis of Large Scale...
CloudAnalyst: A CloudSim-based Tool for Modelling and Analysis of Large Scale...CloudAnalyst: A CloudSim-based Tool for Modelling and Analysis of Large Scale...
CloudAnalyst: A CloudSim-based Tool for Modelling and Analysis of Large Scale...ambitlick
 
White Paper: EMC Compute-as-a-Service
White Paper: EMC Compute-as-a-Service   White Paper: EMC Compute-as-a-Service
White Paper: EMC Compute-as-a-Service EMC
 
Alternatives for-securing-virtual-networks
Alternatives for-securing-virtual-networksAlternatives for-securing-virtual-networks
Alternatives for-securing-virtual-networksJustin Cletus
 
USING SOFTWARE-DEFINED DATA CENTERS TO ENABLE CLOUD BUILDERS
USING SOFTWARE-DEFINED DATA CENTERS TO ENABLE CLOUD BUILDERSUSING SOFTWARE-DEFINED DATA CENTERS TO ENABLE CLOUD BUILDERS
USING SOFTWARE-DEFINED DATA CENTERS TO ENABLE CLOUD BUILDERSJuniper Networks
 
White Paper: Best Practices for Data Replication with EMC Isilon SyncIQ
White Paper: Best Practices for Data Replication with EMC Isilon SyncIQ   White Paper: Best Practices for Data Replication with EMC Isilon SyncIQ
White Paper: Best Practices for Data Replication with EMC Isilon SyncIQ EMC
 
Mohan_Dissertation (1)
Mohan_Dissertation (1)Mohan_Dissertation (1)
Mohan_Dissertation (1)Mohan Bhargav
 

Similar to Juniper Networks: Security for cloud (20)

Integrated-Security-Solution-for-the-virtual-data-center-and-cloud
Integrated-Security-Solution-for-the-virtual-data-center-and-cloudIntegrated-Security-Solution-for-the-virtual-data-center-and-cloud
Integrated-Security-Solution-for-the-virtual-data-center-and-cloud
 
Juniper Networks Solutions for VMware NSX
Juniper Networks Solutions for VMware NSXJuniper Networks Solutions for VMware NSX
Juniper Networks Solutions for VMware NSX
 
2000330 en
2000330 en2000330 en
2000330 en
 
Integrating SDN into the Data Center
Integrating SDN into the Data CenterIntegrating SDN into the Data Center
Integrating SDN into the Data Center
 
Business and Economic Benefits of VMware NSX
Business and Economic Benefits of VMware NSXBusiness and Economic Benefits of VMware NSX
Business and Economic Benefits of VMware NSX
 
Network Virtualization and Security with VMware NSX - Business Case White Pap...
Network Virtualization and Security with VMware NSX - Business Case White Pap...Network Virtualization and Security with VMware NSX - Business Case White Pap...
Network Virtualization and Security with VMware NSX - Business Case White Pap...
 
Vmware nsx network virtualization platform white paper
Vmware nsx network virtualization platform white paperVmware nsx network virtualization platform white paper
Vmware nsx network virtualization platform white paper
 
04367a
04367a04367a
04367a
 
Everything You Need To Know About Cloud Computing
Everything You Need To Know About Cloud ComputingEverything You Need To Know About Cloud Computing
Everything You Need To Know About Cloud Computing
 
NSX Reference Design version 3.0
NSX Reference Design version 3.0NSX Reference Design version 3.0
NSX Reference Design version 3.0
 
Enhancing intelligence with the Internet of Things
Enhancing intelligence with the Internet of ThingsEnhancing intelligence with the Internet of Things
Enhancing intelligence with the Internet of Things
 
VMware Network Virtualization Design Guide
VMware Network Virtualization Design GuideVMware Network Virtualization Design Guide
VMware Network Virtualization Design Guide
 
V mware architecting-v-cloud-wp
V mware architecting-v-cloud-wpV mware architecting-v-cloud-wp
V mware architecting-v-cloud-wp
 
Set Up Security and Integration with DataPower XI50z
Set Up Security and Integration with DataPower XI50zSet Up Security and Integration with DataPower XI50z
Set Up Security and Integration with DataPower XI50z
 
CloudAnalyst: A CloudSim-based Tool for Modelling and Analysis of Large Scale...
CloudAnalyst: A CloudSim-based Tool for Modelling and Analysis of Large Scale...CloudAnalyst: A CloudSim-based Tool for Modelling and Analysis of Large Scale...
CloudAnalyst: A CloudSim-based Tool for Modelling and Analysis of Large Scale...
 
White Paper: EMC Compute-as-a-Service
White Paper: EMC Compute-as-a-Service   White Paper: EMC Compute-as-a-Service
White Paper: EMC Compute-as-a-Service
 
Alternatives for-securing-virtual-networks
Alternatives for-securing-virtual-networksAlternatives for-securing-virtual-networks
Alternatives for-securing-virtual-networks
 
USING SOFTWARE-DEFINED DATA CENTERS TO ENABLE CLOUD BUILDERS
USING SOFTWARE-DEFINED DATA CENTERS TO ENABLE CLOUD BUILDERSUSING SOFTWARE-DEFINED DATA CENTERS TO ENABLE CLOUD BUILDERS
USING SOFTWARE-DEFINED DATA CENTERS TO ENABLE CLOUD BUILDERS
 
White Paper: Best Practices for Data Replication with EMC Isilon SyncIQ
White Paper: Best Practices for Data Replication with EMC Isilon SyncIQ   White Paper: Best Practices for Data Replication with EMC Isilon SyncIQ
White Paper: Best Practices for Data Replication with EMC Isilon SyncIQ
 
Mohan_Dissertation (1)
Mohan_Dissertation (1)Mohan_Dissertation (1)
Mohan_Dissertation (1)
 

More from TechnologyBIZ

Tutto in una sera: TBIZ Conference 2015
Tutto in una sera: TBIZ Conference 2015Tutto in una sera: TBIZ Conference 2015
Tutto in una sera: TBIZ Conference 2015TechnologyBIZ
 
Agenda - Innovazione Tecnologica e Opportunità per la Ricerca e le Imprese
Agenda - Innovazione Tecnologica e Opportunità per la Ricerca e le ImpreseAgenda - Innovazione Tecnologica e Opportunità per la Ricerca e le Imprese
Agenda - Innovazione Tecnologica e Opportunità per la Ricerca e le ImpreseTechnologyBIZ
 
Invitalia a TBIZConference2014
Invitalia a TBIZConference2014Invitalia a TBIZConference2014
Invitalia a TBIZConference2014TechnologyBIZ
 
TechnologyBIZ 6_anteprima_V1
TechnologyBIZ 6_anteprima_V1TechnologyBIZ 6_anteprima_V1
TechnologyBIZ 6_anteprima_V1TechnologyBIZ
 
Diversity perchè? I dati della ricerca sulla sentiment analysis della rete e...
Diversity  perchè? I dati della ricerca sulla sentiment analysis della rete e...Diversity  perchè? I dati della ricerca sulla sentiment analysis della rete e...
Diversity perchè? I dati della ricerca sulla sentiment analysis della rete e...TechnologyBIZ
 
TBIZ 2013 - Progetto Orchestra
TBIZ 2013 - Progetto OrchestraTBIZ 2013 - Progetto Orchestra
TBIZ 2013 - Progetto OrchestraTechnologyBIZ
 
TBIZ 2013- GDG Campania - Google App Engine in a few words
TBIZ 2013- GDG Campania -  Google App Engine in a few words TBIZ 2013- GDG Campania -  Google App Engine in a few words
TBIZ 2013- GDG Campania - Google App Engine in a few words TechnologyBIZ
 
TBIZ 2013 - Smart & Start di Invitalia a TBIZ
TBIZ 2013 - Smart & Start di Invitalia a TBIZTBIZ 2013 - Smart & Start di Invitalia a TBIZ
TBIZ 2013 - Smart & Start di Invitalia a TBIZTechnologyBIZ
 
Anteprima TechnologyBiz 2013 (con aggiornamento continuo)
Anteprima TechnologyBiz 2013 (con aggiornamento continuo)Anteprima TechnologyBiz 2013 (con aggiornamento continuo)
Anteprima TechnologyBiz 2013 (con aggiornamento continuo)TechnologyBIZ
 
Banco Popolare - Banca di Novara presentazione La Campania e le reti di imprese
Banco Popolare - Banca di Novara presentazione La Campania e le reti di impreseBanco Popolare - Banca di Novara presentazione La Campania e le reti di imprese
Banco Popolare - Banca di Novara presentazione La Campania e le reti di impreseTechnologyBIZ
 
Rete per il Packaging Sostenibile: 100%Campania
Rete per il Packaging Sostenibile: 100%CampaniaRete per il Packaging Sostenibile: 100%Campania
Rete per il Packaging Sostenibile: 100%CampaniaTechnologyBIZ
 
Assoreti pmi slideshow
Assoreti pmi slideshowAssoreti pmi slideshow
Assoreti pmi slideshowTechnologyBIZ
 
Liliana Speranza, ODCEC Napoli, consigliere delegato
 Liliana Speranza, ODCEC Napoli, consigliere delegato Liliana Speranza, ODCEC Napoli, consigliere delegato
Liliana Speranza, ODCEC Napoli, consigliere delegatoTechnologyBIZ
 
Massimiliano Guerrini, Rete Almax filiera della pelle Gucci
Massimiliano Guerrini, Rete Almax filiera della pelle GucciMassimiliano Guerrini, Rete Almax filiera della pelle Gucci
Massimiliano Guerrini, Rete Almax filiera della pelle GucciTechnologyBIZ
 
Andrea Cortellazzo, Rete Menocarta.net, conservazione per professionisti
Andrea Cortellazzo, Rete Menocarta.net, conservazione per professionistiAndrea Cortellazzo, Rete Menocarta.net, conservazione per professionisti
Andrea Cortellazzo, Rete Menocarta.net, conservazione per professionistiTechnologyBIZ
 
Massimo Varrone La programmazione regionale per le reti di imprese
Massimo Varrone  La programmazione regionale per le reti di imprese Massimo Varrone  La programmazione regionale per le reti di imprese
Massimo Varrone La programmazione regionale per le reti di imprese TechnologyBIZ
 
TechnologyBIZ: Napoli Shoes è la prima Rete di imprese del settore calzaturie...
TechnologyBIZ: Napoli Shoes è la prima Rete di imprese del settore calzaturie...TechnologyBIZ: Napoli Shoes è la prima Rete di imprese del settore calzaturie...
TechnologyBIZ: Napoli Shoes è la prima Rete di imprese del settore calzaturie...TechnologyBIZ
 
TBIZ 2012- APC by Schneider Electric. Struxure ware for data centers-v1
TBIZ 2012- APC by Schneider Electric. Struxure ware for data centers-v1TBIZ 2012- APC by Schneider Electric. Struxure ware for data centers-v1
TBIZ 2012- APC by Schneider Electric. Struxure ware for data centers-v1TechnologyBIZ
 
TBIZ 2012 - Panduit
TBIZ 2012 - Panduit TBIZ 2012 - Panduit
TBIZ 2012 - Panduit TechnologyBIZ
 

More from TechnologyBIZ (20)

Tutto in una sera: TBIZ Conference 2015
Tutto in una sera: TBIZ Conference 2015Tutto in una sera: TBIZ Conference 2015
Tutto in una sera: TBIZ Conference 2015
 
Agenda - Innovazione Tecnologica e Opportunità per la Ricerca e le Imprese
Agenda - Innovazione Tecnologica e Opportunità per la Ricerca e le ImpreseAgenda - Innovazione Tecnologica e Opportunità per la Ricerca e le Imprese
Agenda - Innovazione Tecnologica e Opportunità per la Ricerca e le Imprese
 
Invitalia a TBIZConference2014
Invitalia a TBIZConference2014Invitalia a TBIZConference2014
Invitalia a TBIZConference2014
 
TechnologyBIZ 6_anteprima_V1
TechnologyBIZ 6_anteprima_V1TechnologyBIZ 6_anteprima_V1
TechnologyBIZ 6_anteprima_V1
 
Diversity perchè? I dati della ricerca sulla sentiment analysis della rete e...
Diversity  perchè? I dati della ricerca sulla sentiment analysis della rete e...Diversity  perchè? I dati della ricerca sulla sentiment analysis della rete e...
Diversity perchè? I dati della ricerca sulla sentiment analysis della rete e...
 
TBIZ 2013 - Progetto Orchestra
TBIZ 2013 - Progetto OrchestraTBIZ 2013 - Progetto Orchestra
TBIZ 2013 - Progetto Orchestra
 
TBIZ 2013 - AICTT
TBIZ 2013 - AICTT TBIZ 2013 - AICTT
TBIZ 2013 - AICTT
 
TBIZ 2013- GDG Campania - Google App Engine in a few words
TBIZ 2013- GDG Campania -  Google App Engine in a few words TBIZ 2013- GDG Campania -  Google App Engine in a few words
TBIZ 2013- GDG Campania - Google App Engine in a few words
 
TBIZ 2013 - Smart & Start di Invitalia a TBIZ
TBIZ 2013 - Smart & Start di Invitalia a TBIZTBIZ 2013 - Smart & Start di Invitalia a TBIZ
TBIZ 2013 - Smart & Start di Invitalia a TBIZ
 
Anteprima TechnologyBiz 2013 (con aggiornamento continuo)
Anteprima TechnologyBiz 2013 (con aggiornamento continuo)Anteprima TechnologyBiz 2013 (con aggiornamento continuo)
Anteprima TechnologyBiz 2013 (con aggiornamento continuo)
 
Banco Popolare - Banca di Novara presentazione La Campania e le reti di imprese
Banco Popolare - Banca di Novara presentazione La Campania e le reti di impreseBanco Popolare - Banca di Novara presentazione La Campania e le reti di imprese
Banco Popolare - Banca di Novara presentazione La Campania e le reti di imprese
 
Rete per il Packaging Sostenibile: 100%Campania
Rete per il Packaging Sostenibile: 100%CampaniaRete per il Packaging Sostenibile: 100%Campania
Rete per il Packaging Sostenibile: 100%Campania
 
Assoreti pmi slideshow
Assoreti pmi slideshowAssoreti pmi slideshow
Assoreti pmi slideshow
 
Liliana Speranza, ODCEC Napoli, consigliere delegato
 Liliana Speranza, ODCEC Napoli, consigliere delegato Liliana Speranza, ODCEC Napoli, consigliere delegato
Liliana Speranza, ODCEC Napoli, consigliere delegato
 
Massimiliano Guerrini, Rete Almax filiera della pelle Gucci
Massimiliano Guerrini, Rete Almax filiera della pelle GucciMassimiliano Guerrini, Rete Almax filiera della pelle Gucci
Massimiliano Guerrini, Rete Almax filiera della pelle Gucci
 
Andrea Cortellazzo, Rete Menocarta.net, conservazione per professionisti
Andrea Cortellazzo, Rete Menocarta.net, conservazione per professionistiAndrea Cortellazzo, Rete Menocarta.net, conservazione per professionisti
Andrea Cortellazzo, Rete Menocarta.net, conservazione per professionisti
 
Massimo Varrone La programmazione regionale per le reti di imprese
Massimo Varrone  La programmazione regionale per le reti di imprese Massimo Varrone  La programmazione regionale per le reti di imprese
Massimo Varrone La programmazione regionale per le reti di imprese
 
TechnologyBIZ: Napoli Shoes è la prima Rete di imprese del settore calzaturie...
TechnologyBIZ: Napoli Shoes è la prima Rete di imprese del settore calzaturie...TechnologyBIZ: Napoli Shoes è la prima Rete di imprese del settore calzaturie...
TechnologyBIZ: Napoli Shoes è la prima Rete di imprese del settore calzaturie...
 
TBIZ 2012- APC by Schneider Electric. Struxure ware for data centers-v1
TBIZ 2012- APC by Schneider Electric. Struxure ware for data centers-v1TBIZ 2012- APC by Schneider Electric. Struxure ware for data centers-v1
TBIZ 2012- APC by Schneider Electric. Struxure ware for data centers-v1
 
TBIZ 2012 - Panduit
TBIZ 2012 - Panduit TBIZ 2012 - Panduit
TBIZ 2012 - Panduit
 

Recently uploaded

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Recently uploaded (20)

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

Juniper Networks: Security for cloud

  • 1. WHITE PAPER AN INTEgRATEd SECuRITy SoluTIoN foR THE VIRTuAl dATA CENTER ANd Cloud Protecting Physical and Virtual Workloads Copyright © 2011, Juniper Networks, Inc. 1
  • 2. WHITE PAPER - An Integrated Security Solution for the Virtual data Center and Cloud Table of Contents Executive Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Introduction—The Implications of Virtualized Workloads . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 An Integrated Security Solution for the Virtualized data Center and Cloud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 The Juniper Solution: SRX Series Services gateways—Protecting Physical Workloads . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 SRX Series Zones—Segmenting and Isolating Traffic Among Physical Workloads . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 vgW Virtual gateway—Protecting Virtualized Workloads . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 The SRX Series and vgW—Integrated Zone Enforcement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Why SRX Series Zone Synchronization in the Virtualized Network? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 use Cases: Multi-Tenancy and Regulatory Compliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 SRX Series/vgW Integration for Multi-Tenancy Management and Isolation Enforcement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 SRX Series/vgW Integration for Policy Compliance Enforcement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 About Juniper Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Table of Figures figure 1: Security implications of virtualizing workloads . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 figure 2: Packet processing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 figure 3: vgW Virtual gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 figure 4: Integrated zone enforcement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 figure 5: SRX Series configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 figure 6: Zone selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 figure 7: Policy groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 figure 8: Multi-tenancy management and isolation enforcement. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 figure 9: Policy compliance enforcement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 2 Copyright © 2011, Juniper Networks, Inc.
  • 3. WHITE PAPER - An Integrated Security Solution for the Virtual data Center and Cloud Executive Summary As momentum behind cloud computing continues to build at a rapid pace, IT leaders and stakeholders are sifting through vast amounts of information to best understand what advantages this new type of network holds for their environment. Their challenge is to adjust expectations for exaggeration and “hype” so that the true value and return on investment are understood. This means accounting for all dependencies in the cloud computing architecture, including the sourcing and provisioning of security. At its simplest, the cloud is an Internet-based environment of computing resources comprised of servers, software, and applications within a data center that can be accessed by any individual or business with Internet connectivity. Cloud computing offers significant benefits to organizations by maximizing compute resource utilization and reduction in power requirements. It is estimated that, by 2015, cloud-based services will grow to become a $35.6 billion market1 and that virtualization as a technology will be the near de facto architecture for clouds. The growth of cloud-based computing is outpacing even the most optimistic predictions based on its compelling value proposition of enabling: • The rapid development and deployment of services • Highly scalable compute power • Adoption of the pay-for-use model of cloud services (i.e., lower CapEx) Even with the undeniable cost and scalability benefits of virtualization and cloud computing, the evolution of the data center brings a new set of challenges to IT professionals. While the need for physical network security will continue to exist in data centers, organizations will continue to adopt cloud computing in phases, resulting in a mix of physical and virtualized data center workloads. This data center model will result in some workloads like those on physical servers being secured by physical firewalls, while others such as those running on virtual machines (VMs) will likely face security concerns because traditional security methods provide zero visibility into VM traffic. Security, however, need not be an impediment to adopting cloud computing or taking advantage of the significant cost savings it promises. This paper outlines Juniper Networks’ approach to providing pervasive and consistent protection for the entirety of the evolving data center. Introduction—The Implications of Virtualized Workloads Virtualization stands to bring enormous cost savings to organizations by significantly reducing the space and electrical power required to run data centers and clouds, and by streamlining the management of an ever growing number of servers. It is no wonder, then, that adoption of virtualization is proceeding at a very rapid rate, and being accelerated by tough economic times and cost cutting mandates. In fact, gartner estimates that 50 percent of the world’s workloads will be virtualized by 2012.2 further, says Neil Macdonald, vice president and fellow at gartner, “As organizations continue to virtualize their data centers and clouds, workloads of higher sensitivity will be virtualized and the workloads themselves will become more mobile, challenging traditional data center security architectures which rely solely on physical appliance-based enforcement.” With security and compliance concerns being top of mind in virtualization and cloud deployments, some organizations are struggling with how to reconcile competing priorities to virtualize their environments, while still ensuring that existing requirements for protection and visibility are maintained. Collapsing multiple servers into a single one comprised of several VMs significantly impacts all of the firewall, intrusion detection, and other physical network protections in use prior to the virtualization of workloads. Physical security measures literally become “blind” to traffic between VMs, since they are no longer in the data path (figure 1). Consequently, they cannot enforce protections and maintain control. Source: Analysys Mason, 2010 1 Source: gartner, 2010 2 Copyright © 2011, Juniper Networks, Inc. 3
  • 4. WHITE PAPER - An Integrated Security Solution for the Virtual data Center and Cloud Physical Network Virtual Network VM1 VM2 VM3 ESX Host Virtual Switch Hypervisor Firewall/IPS sees/protects all Physical security is “blind” to tra c tra c between servers between virtual machines Figure 1: Security implications of virtualizing workloads Making the virtualization security challenge even more acute is the highly dynamic nature of VMs. for instance, VMware, the leader in virtualization and cloud infrastructure, provides features like VMotion and distributed Resource Scheduling (dRS), which allow for hardware and capacity pooling by enabling VMs to move from physical host to physical host as performance needs dictate. VM provisioning is also very quick and easy. IT operations personnel and department administrators can create new VMs using templates or cloning existing ones. So, while virtual environments can scale in a flash, the security policies that control access and suppress malware proliferation cannot—unless the process for doing so is equally automated and scalable. Consequently, the contents of VMs and the applications they host are at high risk from inappropriate access, malicious traffic, and weak (in some cases inherited) security posture. looking at the implications of virtualized workloads on the evolving data center, it is becoming clear that organizations would greatly benefit from a solution that scales as part of the virtual environment. An Integrated Security Solution for the Virtualized Data Center and Cloud Today, we know that technologies to monitor and protect inter-VM traffic for virtualized workloads exist and are in broad use worldwide. We also know that firewalls in the data center will continue to provide valuable security for physical workloads. And with security and compliance concerns being top of mind for IT professionals, what organizations need is an integrated security solution that provides consistent application of security policy throughout the physical and virtualized network. The Juniper Solution: SRX Series Services Gateways—Protecting Physical Workloads Juniper Networks® SRX Series Services gateways are high-performance security, routing, and network solutions for the enterprise and service provider. The SRX Series platform provides high port density, advanced security, and flexible connectivity in a single, easily managed platform that supports fast, secure, and highly available data center operations. The SRX Series is based on Juniper Networks Junos® operating system, the proven oS that delivers security and advanced protection services and is the foundation of the world’s largest networks. 4 Copyright © 2011, Juniper Networks, Inc.
  • 5. WHITE PAPER - An Integrated Security Solution for the Virtual data Center and Cloud SRX Series Zones—Segmenting and Isolating Traffic Among Physical Workloads A security zone is a collection of interfaces with similar security requirements that define a security boundary. Internal network interfaces may be assigned to a security zone named “trust,” and external network interfaces may be assigned to a security zone named “untrust.” Security policies, which are associated with zones, are then used to control transit traffic between security zones. A packet’s incoming zone, as determined by the interface through which it arrived, and its outgoing zone, as determined by the forwarding lookup, together determine which policy is used for packets in a flow. The SRX Series, a zone-based firewall, offers great efficiencies in three key areas: • Packet processing • Security policy management • Reporting Packet Processing: If we think about how a “traditional” or non-zone-based firewall works, the firewall contains lists of policies and the policies are processed from top to bottom, in sequential order. once the firewall obtains a match for the packet, the firewall then applies the policy. for a small policy base, this is a nonissue but as security policies grow, this introduces more and more latency to the packet. With a zone-based firewall, policies are separated based on the source and destination zones. Policies are still processed from top to bottom, but only a subset of the policy base is assessed. As an example, let’s take a look at a basic, non-zoned-based (“traditional”) firewall installation with trust, untrust, and dMZ zones. for simplicity purposes, we will use 300 policies. With a traditional firewall, as each packet comes into an interface, it is potentially assessed against all 300 policies until it finds a match to the source, destination, and service, and then an action is taken on the packet. In contrast, with a zone-based firewall, policies are segregated based on zone structures—trust, untrust, and dMZ. In this example (figure 2), we will assume that there is an even distribution of policies between all three interfaces. This means that there are six available flows, equating to 50 policies per possible flow. Untrust 6 1 5 DMZ SRX5800 3 SRX5800 2 Trust 4 Figure 2: Packet processing Copyright © 2011, Juniper Networks, Inc. 5
  • 6. WHITE PAPER - An Integrated Security Solution for the Virtual data Center and Cloud As a packet comes in, the firewall will convert the source and destination interfaces into zones. furthermore, as the packet is assessed, it will only be assessed against 50 policies, compared to 300 policies in the non-zone-based firewall example. for smaller implementations, the impact is not as great, but as the number of policies increase, the impact grows. Security Policy Management: When looking at a traditional firewall, the policy is written based on host-to-host information. With this limited information, it can be tough to tell much about the flow other than names and numbers (source, destination, service). Now, in contrast, we have added a new layer—zones—that introduce clarity to the flow. Not only will you see the names and numbers, but you will also see the expected flow of the packet. In the above example, (figure 2), you can determine that the packet is expected to flow from the untrust zone to the dMZ, or the trust zone to the untrust zone. Being able to easily visualize this information greatly increases policy management. More importantly, by combining this visual aspect with the subset of policies available for a given flow, managing policies also becomes much easier. Reporting: The visibility and availability of zone data greatly increases the reporting of information and, as a result, zones have become an invaluable tool for compliance reporting like Payment Card Industry data Security Standard (PCI dSS), Health Industry Portability and Accountability Act (HIPPA), Sarbanes-oxley Act (SoX), etc. for example, if the firewall receives an http request flowing from A to B, the administrator would first need to understand what A and B are in order to determine if the packet should be allowed to pass. However, if the administrator sees the same request flowing from the untrust zone to the finance zone, the administrator would not have to know what A and B are in order to make the determination that such a packet should not be allowed to flow in this direction, and at the same time could track down the policy that is allowing the packet to pass or write a policy to specifically deny the packet. vGW Virtual Gateway—Protecting Virtualized Workloads The vgW Series is technology based on a four-tiered architecture comprised of a hypervisor-based module, a security virtual machine, a management server, and a Web interface. The hypervisor-based module resides within the hypervisor of each virtual machine host and performs security functions, including packet inspection and security policy enforcement. The security VM facilitates communication between the vgW management server where security policy information and detail about VMs is stored, and the hypervisor module. The vgW management server stays in constant communication with the VMware vCenter so that as changes to VMs occur, they are synchronized to the vgW management server. Security Virtual Design for VM Center VM1 VM2 VM3 vGW Partner Server (IPS, SIM, Syslog, Netflow) ESX Host vGW Series Packet Data • Enterprise-grade - VMware “VMsafe Certified” ESX Kernel - Protects each VM and the hypervisor VMWare DVFilter - Fault-tolerant architecture (i.e. HA) • Virtualization Aware VMWare VSwitch or - “Secure VMotion” scales to 1,000+ ESX Virtual Swiitch - “Auto Secure” detects/protects new VMs • Granular, Tiered Defense • Stateful firewall and integrated IPS • Flexible Policy Enforcement – Zone, VM group, VM, Application, Port, Protocol, Security state Hypervisor Figure 3: vGW Virtual Gateway 6 Copyright © 2011, Juniper Networks, Inc.
  • 7. WHITE PAPER - An Integrated Security Solution for the Virtual data Center and Cloud The web-based interface is the window to all vgW functionality, with virtualization security policy editors that follow well established conventions for a highly intuitive user experience. furthermore, vgW provides features that automate security and compliance enforcement within virtual networks and clouds, while tightly integrating with existing Juniper security technologies that include intrusion prevent system (IPS), Juniper Networks STRM Series Security Threat Response Managers for logging and reporting, and vgW security design for policy management The SRX Series and vGW—Integrated Zone Enforcement Juniper understands that the keys to effective security are pervasiveness and consistency. To that end, the security that is applied in a collaborative way on physical and virtualized workloads are designed to ensure that security policies applied to workloads are consistent with their logical use, regardless of the platform on which they are deployed (figure 4). To do this, Juniper has integrated the SRX Series zone concept with the vgW VM enforcement engine such that the zone information is synchronized to and used by vgW within the virtualized environment. Here is a synopsis of how this works. The SRX Series delivers zone-based segregation at the data center perimeter, while vgW integrates knowledge of SRX Series zones to ensure that zone integrity is enforced on the hypervisor using automated security features like Smart groups and VM Introspection. The Smart groups feature allows for the creation of a group of VMs that changes based on administratively defined criteria. VMs that suddenly have a configuration change that meets predefined criteria can be added to or removed from groups within seconds. for example, if a VM administrator associates the virtual network interface of a VM to the corporate production network, you can immediately apply a set of firewall rules to protect that system. Moreover, VM Introspection provides rich detail about the applications and services that are installed on a VM, as well as its configuration. It is possible, then, to construct security policies on the basis of VM Introspection parameters. An example of such a policy might be to not allow a new virtual machine to join a VM group or cluster unless it has a specific oS configuration and hot fix installed. Thanks to this integrated approach, security administrators can confidently guarantee consistent security enforcement from the data center perimeter to the server VM. The role of zone synchronization between the SRX Series and vgW provides an automated way to link the vgW virtual security layer with the SRX Series physical device and network security. The SRX Series zone feature simplifies VM-to-zone mapping by importing zones configured on SRX Series Services gateways into the virtual environment. VM1 VM2 VM3 vGW vGW Security Design for Policy Management Policies Centralized Switching Configuration and Management vGW Virtual Gateway VMware vSphere Firewall Event Syslogs Netflow for Inter-VM Tra c Zone Synchronization and Tra c Mirroring to IPS Ethernet Design Virtual Control STRM Series Network EX Series SRX Series with IPS Figure 4: Integrated zone enforcement Copyright © 2011, Juniper Networks, Inc. 7
  • 8. WHITE PAPER - An Integrated Security Solution for the Virtual data Center and Cloud Why SRX Series Zone Synchronization in the Virtualized Network? The SRX Series zone synchronization feature provides an automated way to link the vgW virtual security layer with SRX Series physical security. This means that traffic isolation policies flow through to the virtualization layer and are enforced there as well as for end-to-end security (e.g., from data center perimeter to the VM). By importing the zones defined within the SRX Series devices, VM-to-zone mapping is simplified. The zone assignments can be used to apply inter-VM zone policies as well as to integrate zones into compliance checking to ensure that VMs are only attached to authorized zones. Zone synchronization between the SRX Series and vgW Virtual gateway is as easy as 1-2-3. 1. vgW pulls zone definitions from the SRX Series device, mapping zones to the SRX Series interface and associated VlANs or network ranges for each zone. In the “Settings” module (figure 5), select SRX Series zones in the Security Settings section. Select Add to create a new SRX Series instance. The configuration parameters are Name, Host, and Port. Figure 5: SRX Series configuration Name: Name to represent this SRX Series gateway. Note that this name will be used within the VM zone labels, so a short descriptive name is best. Host: Enter the SRX Series management IP address, where vgW Security design (i.e., vgW management server) will connect to the SRX Series gateway. Port: The TCP port used to connect the SRX Series via the Junoscript interface. 2. vgW defines zones as a Policy group based on the VlANs and networks associated with each zone. once an SRX Series object has been saved, select load Zones to initiate zone synchronization. you will be shown the list of all retrieved zones to select what you would like to import into vgW as VM zone groupings. Within the load Zones dialog, the zone synchronization can be configured to automatically poll the SRX Series for zone updates. The configuration parameters for scheduled updates are: Update Frequency: How often to query the SRX Series for updates. Relevant Interfaces: If only a subset of the SRX Series interfaces are protecting the virtual network, those interfaces should be selected here, so that only zones related to the virtual network are updated. 8 Copyright © 2011, Juniper Networks, Inc.
  • 9. WHITE PAPER - An Integrated Security Solution for the Virtual data Center and Cloud Figure 6: Zone selection 3. vgW Policy groups dynamically associate each VM to its zone, which can be used for inter-VM policy enforcement and zone compliance validations. The SRX Series zones are created in vgW as VM Policy groups. using zone information from SRX Series devices, a Policy group is created based on the following parameters: VLANs: VlANs associated with the SRX Series interface. IP Ranges: Subnet defined on the SRX Series interface, as well as routes defined within a zone. VM Scope: If the zone sync configuration includes a “VMs associated” selection, the chosen group will be included in the Policy group. The vgW zones synchronization feature also allows VM records to be populated within the address book for the zone to which the VM belongs. This allows the VM-to-zone mapping validation to also be performed from the context of SRX Series management. When a VM record is added to the SRX Series, it is created with the name of the VM as defined in vCenter. To make it clear that these are auto-generated VM records, a string is prepended to the name of the VM in its address book entry. By default, this string is “VM-”, but this can be modified within the synchronization dialog. Figure 7: Policy groups Benefits of zone synchronization between the SRX Series and vgW provide guaranteed zone integrity on the hypervisor (i.e., virtualization operating system), automation and verification that a VM policy violation has not occurred, and visibility for the SRX Series gateways. Copyright © 2011, Juniper Networks, Inc. 9
  • 10. WHITE PAPER - An Integrated Security Solution for the Virtual data Center and Cloud Use Cases: Multi-Tenancy and Regulatory Compliance SRX Series/vGW Integration for Multi-Tenancy Management and Isolation Enforcement Multi-tenancy, or many tenants sharing resources, is fundamental to cloud computing. Cloud service providers are able to build network infrastructures and data centers that are computationally very efficient, highly scalable, and easily incremented to serve the many customers that share them. Key to ensuring that cloud service providers can meet their security service- level agreements (SlAs) for their customers is the proper isolation of customer resources and virtualized workloads (e.g., Coca-Cola VMs are kept separate from Pepsi VMs). Tenants or customers of public cloud and VM hosting services need written proof that communication and access to their hosted VMs is limited to the appropriate entities and not accessible by other customers of the same public cloud. Juniper’s security suite of SRX Series and vgW gateways accomplishes this by isolating customer traffic flows to the right physical network segments or zones, and by wrapping customer VMs within those zones in a customer-specific security policy that limits access to only that which is business appropriate for that tenant. In the public cloud diagram depicted in figure 8, customer A traffic flows through the data center edge router to the SRX Series device where customer A zone policy is enforced, limiting traffic for customer A to VlAN 110. The vgW, for its part, will identify the green VMs belonging to zone/customer A and ensure that those VMs are never assigned in error to VlAN 210. Also, any customer A to customer B communication will be blocked by both SRX Series and vgW zone policies. The benefit to the service provider is maximum use of virtualization infrastructure (note that both hosts have the maximum number of VMs resident), while customer resource isolation is enforced at the logical layer (e.g., customer A VMs will be isolated from customer B, even if they reside on the same host.). SRX Series Customer A IPsec VPN MPLS VPN Customer B MX Series Customer A = VLAN 110 • Customer data centers linked Customer B = VLAN 210 to public cloud via MPLS and IPsec VPNs • SRX Series ties customer VPN EX4200 EX4200 Trunk Port tunnel to VM network VLANs= ESX-1 ESX-11 Zones • vGW enforces Zone integrity on the hypervisor • vGW also enables micro- Distributed Virtual Switch - DVS segmentation within customer’s Zone/VLAN vGW Virtual Gateway VM VM VM VM VM VM VM VM Figure 8: Multi-tenancy management and isolation enforcement 10 Copyright © 2011, Juniper Networks, Inc.
  • 11. WHITE PAPER - An Integrated Security Solution for the Virtual data Center and Cloud SRX Series/vGW Integration for Policy Compliance Enforcement Private clouds are defined as those cloud computing environments that are entirely owned by, controlled by, and provide service to a single organization. The business or government agency cloud may serve many departments or sub- organizational segments and, in that way, is similar to the public cloud service provider. This means that VM and VM group isolation by department or function is key both for security policy compliance, as well as to ensure that risky data behaviors from one department don’t put the VMs of another department at risk as well. Imagine, as examples, the university that has an engineering department doing computer virus research sharing a cloud with the medical school that has VMs with patient data; or the business with customer relationship management (CRM) VMs sharing a host with Web servers. These mixed-mode deployments are typical because businesses want to compress as many VMs onto a host for cost savings. Security best practice, however, requires that the VMs be isolated from one another such that connectivity from an infected Web server to a customer database is not possible. Consider the diagram below (figure 9) to understand how this is enforced. Zone policies on the SRX Series will ensure that physical servers in zone preproduction will not be able to connect to Web servers and vice versa. All bidirectional traffic flows between those zones will be “denied” by the SRX Series gateway. In the case where the physical servers in those zones actually contain VMs, vgW will step in and enforce the same policy. So VMs belonging to zone preproduction will not communicate with Web VMs. Should an administrator accidentally assign a new preproduction VM to the wrong zone (VlAN)—an action which is all too likely and common given the scale of these networks—vgW will quarantine that VM and alert the administrator of the policy violation. Zone/VLAN Policy SRX Series Tra c Application Action 1. Set Policy VLANS Direction WEB CRM WEB-to-CRM TCP/88 ACCEPT PRE-PROD PRE-PROD- to-WEB ANY DENY PRE-PROD- to-CRM ANY DENY Data Center Inter-Connect NEW VM – PRE-PROD VM VLAN=120 2. Inspect and Compare EX4200 EX4200 Trunk Port ESX-1 ESX-11 Distributed Virtual Switch - DVS New VM VM VM VM VM VM VM VM VM 3. Detect and Notify VLAN=121 VLAN=110 VLAN=120 WEB CRM PRE-PROD VLAN 121 instead of 120 POLICY VIOLATION!!! Figure 9: Policy compliance enforcement Copyright © 2011, Juniper Networks, Inc. 11
  • 12. WHITE PAPER - An Integrated Security Solution for the Virtual data Center and Cloud Conclusion Cloud computing and virtualization are two major catalysts in the evolving data center design. Though both present compelling cost saving opportunities for customers, there are still significant security concerns that stand to diminish their overall value proposition. organizations that act early to implement an integrated best-of-breed security—such as Juniper offers with SRX Series and vgW—will be best positioned to scale their cloud both in terms of secure cloud infrastructure and in-house cloud security expertise. Since cloud computing and virtualization adoption are usually implemented in phases, the typical data center will, for the foreseeable future, be a mix of physical and virtualized workloads. Therefore, a security framework that is independent of the underlying workload platform is key to ensuring protections for all workloads throughout the migration to and implementation of virtualization and cloud computing. With the right security solution, organizations will be able to derive the most value from their virtualization and cloud computing infrastructure without sacrificing security breadth and effectiveness. About Juniper Networks Juniper Networks is in the business of network innovation. from devices to data centers, from consumers to cloud providers, Juniper Networks delivers the software, silicon and systems that transform the experience and economics of networking. The company serves customers and partners worldwide. Additional information can be found at www.juniper.net. Corporate and Sales Headquarters APAC Headquarters EMEA Headquarters To purchase Juniper Networks solutions, Juniper Networks, Inc. Juniper Networks (Hong Kong) Juniper Networks Ireland please contact your Juniper Networks 1194 North Mathilda Avenue 26/f, Cityplaza one Airside Business Park representative at 1-866-298-6428 or Sunnyvale, CA 94089 uSA 1111 King’s Road Swords, County dublin, Ireland authorized reseller. Phone: 888.JuNIPER (888.586.4737) Taikoo Shing, Hong Kong Phone: 35.31.8903.600 or 408.745.2000 Phone: 852.2332.3636 EMEA Sales: 00800.4586.4737 fax: 408.745.2100 fax: 852.2574.7803 fax: 35.31.8903.601 www.juniper.net Copyright 2011 Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper Networks logo, Junos, NetScreen, and ScreenoS are registered trademarks of Juniper Networks, Inc. in the united States and other countries. All other trademarks, service marks, registered marks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. 2000431-001-EN Aug 2011 Printed on recycled paper 12 Copyright © 2011, Juniper Networks, Inc.