Академический Документы
Профессиональный Документы
Культура Документы
CONFIDENTIAL
25
Insufficient
Little or no
lateral controls
inside perimeter
Internet
Internet
Operationally
Infeasible
Hypervisor-based, in kernel
distributed firewalling
VM
Platform-based automated
provisioning and workload
adds/moves/changes
Cloud
Management
Platform
VM
VM
VM
VM
vSwitch
Hypervisor
Physical Host
Security Policy
Internet
Perimeter
Firewalls
VM
VM
vSwitch
Hypervisor
Physical Host
27
VM
VM
Hypervisor
VM
VM
VM
Hypervisor
VM
VM
VM
Host
Hypervisor
VM
VM
VM
Host
Hypervisor
Host
VM
VM
VM
Physical Firewalls
Traditional Firewall Rule Mgt & Operations
Physical Firewalls (2 100 Gbps)
Distributed Firewalling
Host
Hypervisor
Host
Virtual Firewalls
Traditional Firewall Rule Mgt & Operations
Virtual Firewalls (1 3 Gbps)
28
CONFIDENTIAL
30
VM
VM
VM
NSX
NSX vSwitch
vSwitch
Hypervisor
Platform-based automation
Automated provisioning and workload adds/moves/changes
Accurate firewall policies follow workloads as they move
Physical Host
20 Gbps Firewalling
throughput per host
Isolation
Segmentation
Segmentation with
Advanced Services
Dev
Web
Web
Test
App
App
Production
DB
DB
No
Communication Path
Controlled
Communication Path
32
Security Policy
VM
VM
Traffic
Steering
vSwitch
VM
VM
Internet
vSwitch
Hypervisor
Hypervisor
Physical Host
Physical Host
CONFIDENTIAL
34
W
W
D
A
W
W
A
D
CONFIDENTIAL
35
SecurityGroup=QuarantineZone
Members={Tag=ANTI_VIRUS.VirusFound,L2
IsolatedNetwork}
SecurityGroup=Web
Tier
Policy Definition
Standard
Standard Desktop
Desktop VM
VM Policy
Policy
Anti-Virus
Anti-Virus Scan
Scan
Quarantined
Quarantined VM
VM Policy
Policy
Firewall
Firewall Block
Block all
all except
except security
security tools
tools
Anti-Virus
Anti-Virus Scan
Scan and
and remediate
remediate
Virtual Network
Service Composer
Cloud Management
36
VM
VM
VM
NSX
NSX vSwitch
vSwitch
Hypervisor
Physical Host
37
Thank you
CONFIDENTIAL
38