Cisco Virtual Security Gateway Deployment Guide VSG 1.4

Size: px
Start display at page:

Download "Cisco Virtual Security Gateway Deployment Guide VSG 1.4"

Transcription

1 Deployment Guide Cisco Virtual Security Gateway Deployment Guide VSG 1.4 Deployment Guide 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 33

2 Introduction... 3 Benefits... 3 Dynamic (Virtualization-Aware) Operation... 3 Nondisruptive Operating Model... 3 Multitenancy... 4 Solution Architecture... 5 Solution Components... 5 Communication Between Cisco Prime Network Services Controller and VMware vcenter... 5 Communication Between Cisco Prime Network Services Controller and Cisco VSG... 6 Communication Between Cisco Prime Network Services Controller and the VSM... 6 Communication Between Cisco VSG and the VEM (vpath)... 6 Communication Between the VSM and the VEM... 8 Virtual Extensible LAN... 9 Cisco VSG Deployment Considerations... 9 Cisco Nexus 1000V Series Infrastructure... 9 Setup Requirements Installation and Initial Setup Enabling the Firewall License Requirements Network Segmentation Service VLAN Maximum Transmission Unit Size High Availability Tenant Management Security Policy Management Device Policy Management Service Chaining Scalability Cisco VSG Deployment Scenarios and Configuration Tasks Three-Tier Access Control with Virtual Machine Base Policies Tasks for Security Administrators Tasks for Network Administrators Tasks for Server Administrators Three-Tier Access Control with Custom Attribute Base Policies Tasks for Security Administrators Tasks for Network Administrators Tasks for Server Administrators Configuring a Syslog Server Conclusion For More Information Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 2 of 33

3 Introduction This document provides guidelines and best practices for deploying Cisco Virtual Security Gateway (VSG) 1.4 or later and Cisco Prime Network Services Controller 2.0 with Cisco Nexus 1000V Series Switches or later. This document discusses the architecture design components required to build a secure virtual computing environment; the interaction of components such as VMware vcenter, Cisco Nexus 1000V Series Virtual Supervisor Module (VSM), Cisco VSG, and Cisco Prime Network Services Controller; and deployment considerations and design best practices. Cisco VSG is a virtual firewall for Cisco Nexus 1000V Series Switches that delivers security and compliance for virtual computing environments. Cisco VSG uses the virtual network service data path (vpath) technology embedded in the Cisco Nexus 1000V Series Virtual Ethernet Module (VEM), offering transparent insertion and efficient deployment. The Cisco VSG solution allows IT security, network, and server teams to collaborate while helping ensure administrative segregation to meet regulatory and audit requirements. This approach also reduces administrator errors. Cisco VSG also introduces Cisco Prime Network Services Controller, which manages Cisco VSG instances in a multitenant environment. Benefits Cisco VSG provides controls at the virtual machine level, using virtual machine attributes, so that context-based policies can be applied. These policies are VLAN-independent and can be applied to zones of virtual machines, thereby providing topology-invariant, policy-based security controls. Traffic from external sources to the virtual machines and from virtual machine to virtual machine can be protected. The following sections describe some of the main benefits of deploying Cisco VSG in a virtualized environment. Dynamic (Virtualization-Aware) Operation Virtualization can be highly dynamic, with virtual machines frequently added, deleted, and changed. Live migration of virtual machines occurs through manual VMware vmotion or Distributed Resource Scheduler (DRS) events. Cisco VSG, operating in conjunction with the Cisco Nexus 1000V Series (and vpath), supports dynamic virtualization. Trust zones and associated security profiles for each line of business or tenant are created with Cisco VSG and Cisco Prime Network Services Controller. Security profiles are bound to Cisco Nexus 1000V Series port profiles (authored on the Cisco Nexus 1000V VSM and published to VMware vcenter). When a new virtual machine is instantiated, the server administrator assigns the appropriate port profile to the virtual machine s virtual Ethernet port. The port and security profiles and the virtual machine s zone membership are immediately applied. A virtual machine can be repurposed simply by assigning different port and security profiles. Nondisruptive Operating Model With the introduction of the Cisco Nexus 1000V Series, Cisco VSG provides transparent integration with VMware vcenter. The operating model is still intact, in which the system security administrators define the security rules and policies, the network administrators manage those policies and associate them with a particular port profile, and the server administrators select the appropriate port group (the Cisco Nexus 1000V Series equivalent of a port profile) for the particular virtual machine. Figure 1 depicts this operating model Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 3 of 33

4 Figure 1. Administrative Segregation of Server, Network, and Security Administrators The tight integration with VMware vcenter allows transparent and dynamic provisioning of port profiles and security policies to the virtual machines. Multitenancy Cisco Prime Network Services Controller is designed to manage Cisco VSG and security policies in a dense, multitenant environment, so that administrators can rapidly add and delete tenants and update tenant-specific configurations and security policies. Figure 2 depicts the multitenant deployment of Cisco VSG. In the architecture shown in the figure, Tenant A has its own Cisco VSG that provides security policies for its virtual machines. Tenant B has its own, separate Cisco VSG to manage its security policies for its virtual machines. Figure 2. Multitenant Deployment with Cisco VSG Solution 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 4 of 33

5 Independent capacity planning: Cisco VSG can be placed on a dedicated server controlled by the security operations team so that appropriate computing capacity can be allocated to application workloads, capacity planning can occur independently across server and security teams, and operational segregation can be maintained across security, network, and server teams. vpath Intelligence: Cisco VSG leverage Nexus 1000V vpath intelligence for traffic redirection, fast path offload with all policy enforcement of flows offloaded to vpath, and insertion of Cisco VSG along with other virtual network services in the traffic path. vpath is designed for multi-tenancy, providing traffic steering and fast path offload on a per-tenant basis. Solution Architecture Figure 3 shows the overall architecture of the Cisco VSG solution and the integration of the required components in the solution. This section discusses the communication across these components. Figure 3. Cisco VSG Solution Architecture Solution Components The following components are required to set up the Cisco VSG environment: Cisco Prime Network Services Controller: Cisco Prime Network Services Controller is a virtual appliance that provides centralized device and security policy management for Cisco VSG. Cisco Virtual Security Gateway: Cisco VSG operates with the Cisco Nexus 1000V Series distributed virtual switches in the VMware vsphere hypervisor, and it uses the vpath technology embedded in the Cisco Nexus 1000V VEM. Cisco Nexus 1000V Series Switches: Cisco Nexus 1000V Series Switches are virtual machine access switches that are an intelligent software switch implementation for VMware vsphere environments running Cisco NX-OS Software. To support the Cisco VSG solution, the Cisco Nexus 1000V Series must be running Cisco NX-OS Release 1.4 or later. VMware vcenter: The VMware vcenter server manages the VMware vsphere environment and provides unified management of all the hosts and virtual machines in the data center from a single console. Communication Between Cisco Prime Network Services Controller and VMware vcenter Cisco Prime Network Services Controller registers with VMware vcenter for visibility into the VMware environment. This registration allows the security administrator to define policies based on the VMware virtual machine attributes. Cisco Prime Network Services Controller integrates through an XML plug-in. The integration process is similar to that of the Cisco Nexus 1000V VSM with VMware vcenter. Cisco Prime Network Services Controller and VMware vcenter communicate over an SSL connection on port 443 (Figure 4) Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 5 of 33

6 There is no specific network limitation for communications between Cisco Prime Network Services Controller and VMware vcenter, other than that the appropriate ports must be open if there is a firewall between them. Figure 4. Communication Between Cisco Prime Network Services Controller and VMware vcenter Communication Between Cisco Prime Network Services Controller and Cisco VSG Cisco VSG registers with Cisco Prime Network Services Controller through the policy agent configuration performed on Cisco VSG. After registration, Cisco Prime Network Services Controller pushes the security and device polices to Cisco VSG. No policy configuration is performed using the Cisco VSG command-line interface (CLI) after Cisco VSG is registered with Cisco Prime Network Services Controller. The CLI is available to the administrator for monitoring and troubleshooting purposes. Communication between Cisco VSG and Cisco Prime Network Services Controller takes place over an SSL connection on port 443 (Figure 5). Figure 5. Communication Between Cisco Prime Network Services Controller and Cisco VSG Communication Between Cisco Prime Network Services Controller and the VSM The VSM registers with Cisco Prime Network Services Controller through the policy agent configuration performed on the VSM. The steps for registration are similar to those for registering Cisco VSG with Cisco Prime Network Services Controller. After registration, the VSM can send IP-to-virtual machine bindings to Cisco Prime Network Services Controller. IP-to-virtual machine mappings are required by Cisco VSG to evaluate policies that are based on virtual machine attributes. The VSM also resolves the security-profile ID using Cisco Prime Network Services Controller. This security-profile ID is sent in every vpath packet (discussed in the next section) to Cisco VSG and is used to identify the policy for evaluation. Communication between the VSM and Cisco Prime Network Services Controller is supported over an SSL connection on port 443 (Figure 6). Figure 6. Communication Between Cisco Prime Network Services Controller and the VSM Communication Between Cisco VSG and the VEM (vpath) Cisco VSG receives traffic from the VEM when protection is enabled on a port profile. The redirection of the traffic occurs using vpath. vpath encapsulates the original packet and sends it to Cisco VSG. Cisco VSG has a dedicated interface (Data 0) with an IP address for vpath communication Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 6 of 33

7 Cisco VSG can be Layer 2 or Layer 3 adjacent to the VEM: Cisco VSG-L2 adjacent: When configured in Layer 2 mode, VEM obtains Cisco VSG's MAC address through the Address Resolution Protocol (ARP) for that IP address. If Cisco VSG and the VEM are Layer 2 adjacent, communication will be through the Data 0 interface VLAN of Cisco VSG. The following VSM configuration example shows the addition of service node Cisco VSG as Layer 2 adjacent to the VEM. Layer 2 adjacency is recommended having minimal latency in data path. Nexus1000V# vservice node vsg type vsg ip address adjacency l2 vlan 10 fail-mode close Cisco VSG-L3 adjacent: Layer 3 adjacency is applicable when Cisco VSG is not in the same Layer 2 domain and is multiple hops away from the VEM. In this configuration, Layer 3 communication will be through the Cisco VSG Data 0 interface, and a VMkernel interface on the VEM. Each protected VEM needs to have VMkernel communicate with VSG Data Interface. The VMkernel interface can be same as the one used for VSM and VEM (Layer 3 control) communication. The VEM needs IP reachability only to the tenant-specific Cisco VSG to redirect traffic from vpath to Cisco VSG for policy evaluation. VSM configuration example below shows how Cisco VSG Layer 3 adjacency is configured on VSM. For Layer 3 adjacency, a new port profile is defined on the VSM with capability l3-vn-service, and this port profile will be associated with a VMkernel interface on the VEM. Nexus1000V# vservice node VSGL3 type vsg ip address adjacency l3 fail-mode open port-profile type vethernet VSG-Data-interface vmware port-group switchport mode access switchport access vlan 1001 no shutdown capability l3-vn-service state enabled An alternate approach is to use the same VMkernel interface on protected host, that s used for VSM and VEM control traffic, for communication between Cisco VSG and VEM. This is achieved by adding capability l3-vnservice to the same port profile as the one used for VSM and VEM (Layer 3 control) communication. Configuration example below: port-profile type vethernet n1kv-l3 capability l3control capability l3-vn-service 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 7 of 33

8 vmware port-group switchport mode access switchport access vlan 171 no shutdown system vlan 171 state enabled Cisco VSG evaluates policies on the first packet of each flow that is redirected by vpath. Cisco VSG then transmits the policy evaluation results to vpath. vpath maintains the result in the flow table, and subsequent packets of the flow are permitted or denied based on the result cached in the flow table (Figure 7). Figure 7. Communication Between Cisco VSG and the VEM vpath maintains the state of the TCP flows. In the event of a reset (RST) event or a finish (FIN) flag in the TCP flow, vpath purges the entry of that flow from the table. Inactivity in any flow will also cause the entry to be cleared from the flow table. Cisco VSG supports stateful protocols, such as FTP, Trivial File Transfer Protocol (TFTP), and Remote Shell (RSH) Protocol. Communication Between the VSM and the VEM There are two ways of connecting the VSM and the VEM (Figure 8): Over Layer 2: If the VSM and VEM are in the same Layer 2 domain, They can connect using L2 mode. However Layer 3 mode for VSM-VEM is recommended best practice. Over Layer 3: If the VSM and VEM are in different Layer 2 domains, the Layer 3 connectivity mode should be used. The Layer 3 mode will encapsulate the packet of the Layer 2 mode using Generic Routing Encapsulation (GRE). All communication between the VSM and the VEM are encrypted using a 128-bit algorithm. Cisco VSG implementation is independent of VSM-to-VEM communication (whether in Layer 2 or Layer 3 mode) Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 8 of 33

9 Figure 8. Communication Between the VSM and the VEM Virtual Extensible LAN Cisco Nexus 1000V Series supports Virtual Extensible LAN (VXLAN) technology with a 24-bit LAN segment identifier to provide segmentation at cloud scale. Cisco vpath secures virtual machines configured as part of VXLAN. Because the VXLAN header is decapsulated on a VEM, vpath does not need the VXLAN reachability information to make decisions about either rerouting packets to Cisco VSG or permitting or denying traffic based on the configured security policy. Cisco VSG Data interface can be on a VLAN or a VXLAN segment. Cisco VSG Deployment Considerations This section discusses various aspects of Cisco VSG deployment in your network. Cisco Nexus 1000V Series Infrastructure Before installing Cisco VSG, you are required to install Cisco Nexus 1000V Series Software Release 4.2(1) SV1(5.2) in your environment. Cisco VSG 1.4 is supported from Cisco Nexus 1000V Release 4.2(1) SV1(4) and performs the basic configuration of the Cisco Nexus 1000V Series Switch. This will configuration includes: Installing and configuring the VSM Providing access to shared storage Creating the necessary port profiles, including Uplink port profiles VMkernel port profiles Virtual machine data port profiles Registering the VSM with VMware vcenter Installing two or more VEMs Adding the VEMs to the VSM This deployment guide does not discuss the details of installing and deploying the Cisco Nexus 1000V Series. Please refer to the Cisco Nexus 1000V Installation Guide or a Deployment Guide for this information Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 9 of 33

10 Setup Requirements Cisco VSG uses three network interfaces in the following order: 1. Cisco VSG data interface 2. Cisco VSG management interface 3. Cisco VSG high-availability interface Note: During VSG OVA install, installer prompts for configuring VSG management interface, subnet mask, default gateway, Cisco Prime Network Services Controller IP address and Cisco Prime Network Services Controller Shared Secret for secure connectivity with Cisco Prime Network Services Controller. VSG Data Interface is not be configured during initial installation. This is only done via Cisco Prime Network Services Controller when assign VSG to a Compute Firewall, and is covered later in this document. Create additional VLANs for the Cisco VSG data and high-availability interfaces on the VSM and allow the VLANs to forward on the system uplinks. Create these VLANs on the upstream switch. You can have the same VLAN for both the high-availability and data interfaces, depending on the utilization of the data interface. The existing management VLAN in your setup can be used to manage Cisco VSG. The recommend approach is to use VMware Open Virtual Appliance (OVA) for the Cisco VSG installation, which allows simplified installation. Since Cisco Prime Network Services Controller is the central management center for Cisco VSG, it will be located in your management VLAN. There are no specific network requirements for setting up Cisco Prime Network Services Controller. Please refer to the quick start guide at for the steps for deploying Cisco Prime Network Services Controller. Cisco VSG (OVA or ISO) contains respective Cisco Prime Network Services Controller policy-agent image, which is copied to bootflash on installation of VSG. In certain scenarios VSG works with multiple versions of Cisco Prime Network Services Controller, and if need to use non-default Cisco Prime Network Services Controller Policy-Agent image, you would need to manually copy the Cisco Prime Network Services Controller Policy Agent image to boot flash, which is available with Cisco Prime Network Services Controller download. Installation and Initial Setup Please refer to Part 1 of the Cisco VSG and Cisco Prime Network Services Controller Installation Guide to do the following (Figure 9): 1. Install Cisco Prime Network Services Controller as a virtual appliance. 2. Install Cisco VSG as a virtual appliance. 3. Register Cisco VSG with Cisco Prime Network Services Controller 4. Register the VSM with Cisco Prime Network Services Controller. 5. Register Cisco Prime Network Services Controller with VMware vcenter Note: Step 3 is achieved by installing Cisco Prime Network Services Controller-VSG policy agent image on VSG. Cisco VSG is bundled with respective Cisco Prime Network Services Controller Policy Image; It is by default copied to VSG bootflash. If you re deploying VSG in mixed mode deployment where Cisco Prime Network Services Controller version is different, then you need to copy new Cisco Prime Network Services Controller policy agent image bundled in downloaded Cisco Prime Network Services Controller zip file Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 10 of 33

11 Here s an example of installing vsg-policy-agent on Cisco VSG: VSG(config)#vnm-policy-agent VSG(config)#registration-ip VSG(config)# shared-secret ********** VSG(config)# policy-agent-image bootflash:/ Cisco Prime Network Services Controller-vsgpa.2.0.1a.bin VSG# show vnm-pa status VNM Policy-Agent status is - Installed Successfully. Version 2.0(1a)-vsg VSG# Figure 9. Initial Setup of Cisco VSG and Cisco Prime Network Services Controller After completing these tasks, you should be ready to start defining and implementing the policies for Cisco VSG. Figure 10 shows a typical network with all the necessary components in place for the Cisco VSG solution. Figure 10. Network Topology with Cisco Nexus 1000V Series, Cisco VSG, and Cisco Prime Network Services Controller Enabling the Firewall To insert the firewall into the network, you need to attach Firewall security profile to the port profile. All the traffic traversing the virtual ports associated with that port profile is subjected to policy evaluation Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 11 of 33

12 The following commands define the Cisco VSG firewall feature on the VSM: Nexus1000V (config)# vservice node VSG_Node-Name type vsg Nexus1000V(config-vservice-node)# ip address VSG_DATA_IP Nexus1000V(config-vservice-node)# adjacency {l2/l3} vlan VSG_Service_VLAN Nexus1000V(config-vservice-node)# fail-mode {open/close} The first command defines virtual service instance of node type Cisco VSG. The second and third commands provide information for vpath communication with Cisco VSG, including the mode of adjacency, Cisco VSG data interface IP address, and Cisco VSG service VLAN. The following commands turn on the firewall feature under the port profile on the VSM: Nexus1000V (config-port-prof)# org root/atenant Nexus1000V (config-port-prof)# vservice node VSG_Node-Name profile VSG_TenantA_Security_Profile The first command specifies the tenant in which the firewall is enabled. The second command binds a specific Cisco VSG and security profile to the port profile. It enables vpath to redirect the traffic to the Cisco VSG in the service VLAN. The following example shows the port-profile configuration with Cisco VSG firewall protection enabled: port-profile type vethernet Secure-ATenant-VM vmware port-group switchport access vlan 10 switchport mode access vservice node vsg profile Secure-ATenant no shutdown state enabled License Requirements Starting with Cisco Nexus 2.1 Release, Cisco VSG and Cisco Prime Network Services Controller license is bundled with Cisco Nexus 1000V Advanced Edition licenses. A Cisco Nexus 1000V advanced edition license is required for each CPU socket, and VSG licensing follows the same model as licensing for the Cisco Nexus 1000V Series. Each CPU requires one license, and there is no limit on the number of cores per CPU. The main point to note is that the licenses need to be installed on the VSM. Because the licenses are based on physical host sockets, you can instantiate Cisco VSGs in a scale-out model without worrying about licenses. You must purchase enough licensing capacity to cover all installed CPUs. Licenses are not applied to a VEM unless the existing license has the capacity to cover all its CPUs. Please refer to the licensing guide at for the steps you need to take to install the licenses. The Cisco Nexus 1000V Series Release 2.1 software comes with a 60-day evaluation license of Advanced Edition. Network Segmentation Cisco VSG is a transparent firewall inserted at Layer 2 and acts like a bump in the wire ; it is not seen as a Layer 3 hop to connected devices. Insertion of a Cisco VSG into the network does not require any reengineering of the existing network Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 12 of 33

13 Cisco Prime Network Services Controller supports overlapping network spaces for a multitenant environment. Therefore, if network segmentation exists that allows overlapping IP spaces (for example, virtual route forwarding lite (VRF-lite), Cisco Prime Network Services Controller will allow you to build policies for each tenant with overlapping networks. Service VLAN Maximum Transmission Unit Size Starting from Cisco VSG 1.3, Cisco VSG can be either Layer 2 or Layer 3 adjacent to the VEM. vpath intercepts the first packet of the flow and encapsulates the original packet with an additional vpath header. When the connectivity between Cisco VSG and the VEM is Layer 2, the frame size is increased by 74 bytes. With Layer 3 connectivity between Cisco VSG and the VEM, the increase in payload size is 94 bytes. For Layer 2 mode, vpath performs fragmentation if the encapsulated packet exceeds the outgoing interface maximum transmission unit (MTU) value. Typically, this overhead does not affect TCP flows. These flows will not be subject to fragmentation because the first packet of any TCP flow is a SYN packet, which is not subject to fragmentation after vpath encapsulation. You may see fragmentation with User Datagram Protocol (UDP) flows in which the packet is already 1500 bytes when vpath intercepts it. To avoid fragmentation, you can increase the MTU value by 74 bytes on the uplink port profile configured in Cisco Nexus 1000V Series Switches and on the upstream physical switch to which other physical hosts are connected. With Layer 3 connectivity between Cisco VSG and the VEM, the payload increase is 94 bytes. In Layer 3 mode, vpath does not support fragmentation, so if the new packet size after the addition of 94 bytes exceeds the outgoing interface MTU value, the packet will be dropped and an Internet Control Message Protocol (ICMP) error message (error code = 4) will be sent back to source. Note: In Cisco VSG Layer 3 mode, IP fragmentation is not supported on the VEM virtual machine network interface card (vmnic) for traffic leaving the VMware ESX or ESXi host. Hence, after vpath encapsulation, if an IP packet is received by a VEM from a virtual machine with a packet size greater than the outgoing interface MTU value, it will be dropped, and an ICMP error message (error code = 4) will be sent back to the source virtual machine. To avoid packet drops in this scenario, increase the outgoing server port MTU value by 94 bytes. For example, if the MTU values of client and server virtual machines and uplinks are all 1500 bytes, set the uplink MTU value to 1594 bytes. High Availability Table 1 summarizes the high-availability behavior for various components of the solution. Like the VSM, Cisco VSG comes with high availability. It is not recommended that you use the VMware High Availability (HA) feature or the fault-tolerance or VMware DRS feature for Cisco VSG and the VSM. If neither the primary nor the standby Cisco VSG is available to vpath, you can configure the failure mode as Fail Open or Fail Close. You can make this configuration when you enable the security profile with the vn-service command in the port profile. Table 1. High-Availability Behavior for Cisco VSG Solution Components High Availability Behavior Cisco VSG Active standby Standby Cisco VSG takes over in 6 to 8 seconds Cisco Prime Network Services Controller VMware HA Hardware failure backup VSM Active standby Standby VSM takes over in 6 to 8 seconds Note: A Cisco VSG pair shares a high-availability ID that should be unique to the pair, if you have more than one Cisco VSG high-availability pair sharing the same management or high-availability VLAN Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 13 of 33

14 Tenant Management One or more instances of Cisco VSG are deployed on a per-tenant basis, which allows a highly scalable deployment across many tenants. Tenants are isolated from each other, so that no traffic can cross tenant boundaries. A tenant can be further divided to the following levels: Virtual data center Virtual application Virtual tier Each instance in a tenant tree is classified as an organization (org) level. Depending on the use case, you can deploy a Cisco VSG at the tenant level, at the virtual data center (vdc) level, or at the virtual application (vapp) level. Figure 11 shows how a tenant tree structure can be built in Cisco Prime Network Services Controller. Figure 11. Cisco Prime Network Services Controller Tenant Management View Security Policy Management The security policy in Cisco Prime Network Services Controller uses network attributes, VMware virtual machine attributes, and virtual machine custom attributes. You can define multiple policies for a tenant. All the policies are published to the Cisco VSG through a security profile. These policies can be applied at any organization level within a tenant. A general guideline is to apply more generic policies at a higher level in the tenant hierarchy, and to apply more specific policies closer to the organization level within a tenant, where they are more meaningful. In Figure 12, Cisco VSG is placed at the tenant level (Tenant A), but the policies are applied at two different levels within the tenant. Policy P1 is applied at the data center level, which means that the entire data center DC 2, and all the sublevels within DC 2, are subjected to P1 policy evaluation. Policy P2 is specific to App 2 only and is placed at that organization level. The general guideline is to place more generic policies higher in the organization structure, and to place more specific policies closer to the organization level, where they are more meaningful Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 14 of 33

15 Figure 12. Cisco VSG and Policy Placement in Tenant Hierarchy Device Policy Management The general settings for Cisco VSG are also specified through Cisco Prime Network Services Controller. The settings include Simple Network Management Protocol (SNMP), syslog, Network Time Protocol (NTP), and fault logging. All these settings are part of the device policy that is published to Cisco VSG along with the security policy. When assigning a registered firewall to a tenant Cisco VSG, if you do not define a device policy, a default policy is pushed to Cisco VSG for these settings. Service Chaining With Cisco Nexus Release, vpath 2.0 supports enabling multiple services for a network port with its unique intelligent service chaining architecture. Cisco VSG for Compute Firewall, and Cisco ASA 1000V for Edge Security Firewall, can both be enabled for a particular VM Port group. White Paper on vpath Service Chaining has more details. Scalability Cisco VSG is designed to be scalable. As virtualized environments grow to accommodate business needs, you can instantiate more Cisco VSGs and apply the same policies to protect a larger environment. Table 2 can help you understand how you can scale from both the Cisco VSG and Cisco Prime Network Services Controller perspectives. Table 2. Scaling Cisco VSG and Cisco Prime Network Services Controller Feature Scale Cisco VSG 1vCPU Cisco VSG 2vCPU Cisco Prime Network Services Controller Number of Cisco VSG instances Concurrent Connections New Connections Per Second Tenants Zones Security-Profiles Policies Rules Max Number of VSMs Object Groups Number of Hosts Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 15 of 33

16 Currently, if you need to deploy an additional Cisco VSG, you use a manual process in which you bind one port profile to one Cisco VSG and another port profile to another Cisco VSG. In future versions, Cisco VSG will offer a clustering feature that will allow you to perform load balancing with two or more Cisco VSGs dynamically. Cisco VSG Deployment Scenarios and Configuration Tasks This Tables describes the flow and how segregation of duties and ownership is maintained for provisioning Security Firewall. Security Administrator Network Administrator Server Administrator Cisco Prime Network Services Controller GUI: Define Security Profile, Add Rules, Assign and publish policies to Cisco VSG VSM Interface: Define Service node, and bind Security Profile to Port-Profile (available as Port-Group in vcenter) vcenter Interface: Attach Virtual Machines to Firewall enabled port-group to instantly enable security for the VM s Figure 13 depicts the physical topology and network configuration that is used in this document in the sample Cisco VSG deployment. Figure 13. Sample Cisco VSG Deployment Topology Note: Standard practice for the Cisco Nexus 1000V VSM still applies, with a separate VLAN used for management, and dedicated VLAN used for VSM-VEM control traffic. The example here uses this scheme. However, this configuration is not a requirement, and users can choose to have all three traffic types in the same VLAN or to have a separate VLAN for each Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 16 of 33

17 Three-Tier Access Control with Virtual Machine Base Policies Cisco VSG provides the standard 5-tuple network attributes that can be used in the security policies. Table 3 shows the supported attributes. Table 3. Cisco VSG Supported Network Attributes Name Meaning Value Type src.net.ip-address Source IP address IP address src.net.port Source port Integer dst.net.ip-address Destination IP address IP address dst.net.port Destination port Integer net.protocol Protocols specified in IP header (TCP, UDP, etc.) String Here is a sample security policy for Tenant content hosting, which will be applied to this use case: Permit only port 80 (HTTP) for virtual machines in the web zone. Permit port 22 (Secure Shell [SSH]) for virtual machines that belong to the database zone. Allow communication only between web servers and database servers. Allow communication only between application servers and database servers. Explicitly deny all traffic to all zones. Tasks for Security Administrators The security administrator must perform the following high-level steps on the Cisco Prime Network Services Controller to create a policy using conditions based on VM or Network attributes. Let s walk through the flow of provisioning VSG security policies via Cisco Prime Network Services Controller Web Interface. Access Cisco Prime Network Services Controller from your browser session using URL Note: The pnsc-server-ip should be replaced with the IP address of the server where Prime Network Services Controller is installed. In the next few pages, following tasks are illustrated for provisioning Compute Firewall (VSG) policies through Cisco Prime Network Services Controller: Define Tenants, Add Zones, Define Security-Profile, Create Rules, Assign VSG to a Tenant (configure VSG Data Interface), and Verify Security Profile is published to VSG Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 17 of 33

18 Define Tenants Log into Cisco Prime Network Services Controller and select the Tenant Management tab. Right-click the root node and create a tenant (Figure 14). Figure 14. Create a Tenant Add Zones for Tenants A zone is a logical group of virtual machines or hosts. Zones simplify policy writing by allowing users to write policies based on zone attributes using zone names. After you have created the tenant, you can go to the Policy Management tab to define logical Zones (vzones). Navigate to Policy Management > Service Profiles > Tenant > Policy Helpers >vzones (Figure 15). Add three zones: WebZone AppZone DBZone Figure 15. Adding vzone 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 18 of 33

19 After defining the vzones; WebZone as an example, select the Edit tab to classify the zone, as shown in Figure 16. This example will use VM attributes to classify the zones. Figure 16. Adding a Condition for vzone Classification Similarly, define conditions for the other two zones based on VM or Network attributes. All three zones are now displayed in the Summary tab, as shown in Figure 17. Figure 17. Three vzones Defined for the Policy Define the Security Profile You configure security profiles in the Cisco Prime Network Services Controller Policy Management interface. The predefined zones can be used to define the security policy for each tenant. The security profile contains set of policy rules defined for the tenant compute firewall Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 19 of 33

20 Navigate to Policy Management > Service Profiles > Tenant > Compute Firewall > Compute Security Profiles. Select Add to add a new security profile (Figure 18). Figure 18. Adding a Security Profile for a Tenant Define a Policy Set and Create Rules in the Policy Define a policy set in the security profile and add rules to the policy set. Policy specifications outlined in the use case will be implemented by adding rules to this policy. In this example: Allow only HTTP traffic destined to virtual machines in the web zone. Allow all ICMP traffic to virtual machines. Allow only traffic originating from the web server in the database zone. Allow only communication between the web and database servers. Deny all other traffic. Define a new policy set in the security profile, as shown in Figure 19. Figure 19. Adding Policy Set to the Security Profile 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 20 of 33

21 Then click Add Rule to add rules to this policy set, as shown in Figure 20. Figure 20. Adding Rules to the Policy Set Assign Cisco VSG to a Tenant All the registered Cisco VSGs appear in the Resource Management interface. (This step requires that Cisco Prime Network Services Controller policy agent image is successfully installed on Cisco VSG, details in VSG installation tasks) To push configured security profile to a Cisco VSG instance, you need to assign Cisco VSG to a tenant. After this assignment, all the policies (security profiles) are published to that Cisco VSG. The recommended approach is to add the computing firewall object directly at the tenant level. Follow these steps: 1. In the navigation pane, click the Cisco Prime Network Services Controller > Resource Management tab > Managed Resources tab. 2. Expand the root node. 3. Select Compute Firewalls for the Tenant in which you have defined Security Profile and want to add a computing firewall service instance. 4. In the work pane, click the Add Compute Firewall link. In the Add Compute Firewall dialog box, do the following: On the General tab, add a user-defined name and description. In the Firewall Settings area, enter the VSG Data IP address, as shown in Figure 21. This interface IP address/vlan will be used to define VSG as a service node in VSM, and for vpath-vsg communication. Then you Assign that computing firewall object to an available Cisco VSG, as shown in Figure Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 21 of 33

22 Figure 21. Adding a Compute Firewall at the Tenant Level Figure 22. Selecting a Cisco VSG from the Drop-Down Menu 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 22 of 33

23 After you have assigned the computing firewall object to the Cisco VSG, the Cisco VSG configuration status should be applied and association status should be associated as shown in Figure 23. Figure 23. Cisco VSG Assignment Status Verify the Security Policy Configuration Using the CLI Log in to the Cisco VSG CLI and enter command show run policy to verify security policy is being pushed successfully by the Cisco Prime Network Services Controller (Figure 24). This step is optional and only for verification purpose. Figure 24. Verifying the Security Policy Using the Cisco VSG CLI Tasks for Network Administrators The configured security policy is made available to the network administrator through the security profile. This feature makes the network administrator s configuration task much easier because the administrator does not have to deal with security-policy-related details. The network administrator now creates a port profile and can also bind the security policy to this port profile. The definition for the security policy does not require a separate port profile, so a single port profile can be used for all the virtual machines. The sample configuration in Figure 25 shows how this configuration is accomplished Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 23 of 33

24 Figure 25. Binding a Security Profile to the Port Profile Tasks for Server Administrators The server administrator only needs to go to the network settings of the virtual machine and select the port profile that the network administrator created with the security profile (Figure 26).The network profile and security profiles created will be instantiated dynamically when the virtual machine is associated with this network port profile. Figure 26. Selecting a Firewall-Enabled Port Group Three-Tier Access Control with Custom Attribute Base Policies This example discuss how to use custom attributes for the same three-tier server zone use case, follow the steps in this section in addition to the steps in the previous sections using virtual machine. The goal of this use case is to help you gain a better understanding of how you can use custom attributes to build a security policy, based on VMware virtual machine attributes and network attributes Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 24 of 33

25 Tasks for Security Administrators Define a Custom Attribute 1. Choose Cisco Prime Network Services Controller > Policy Management > Service Policies > A-Tenant > Security Profile Dictionary. 2. Right-click and choose Add Security Profile Dictionary (Figures 27 through 29). Figure 27. Adding a Security Profile Dictionary Figure 28. Naming the Security Profile Dictionary 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 25 of 33

26 Figure 29. Adding a Custom Attribute to the Dictionary Define Zones Based on Custom Attributes Add three zones - WebZone, AppZone, and DBZone - as in the previous two examples. The only difference is that here you will use a custom attribute that was added to the security profile dictionary, Server-Type (Figure 30). Figure 30. Adding a Zone Condition Based on a Custom Attribute Follow the same process for AppZone and DBZone. Build the Security Policy The policy rules are exactly the same as in previous two examples, in which zones were added based on network and virtual machine attributes Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 26 of 33

27 Create Security Profiles The process of creating security profiles using custom attributes involves an additional step. You need to create three security profiles, such as the following: Secure-Web Secure-App Secure-DB For each profile, perform the following steps: 1. Select the policy set from the drop-down menu (Figure 31). Figure 31. Adding a Custom Attribute to the Security Profile 2. Give a value to the custom attribute on the Attributes tab (Figure 32). Figure 32. Assigning a Value to the Custom Attribute 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 27 of 33

28 The new profiles will appear in the list of security profiles (Figure 33). Figure 33. List of Newly Created Security Profiles You have created three security profiles with different custom attribute values but the same policy set. The policy evaluation will be different depending on which security profile is enabled for the traffic flow. Tasks for Network Administrators Create three port profiles in the Cisco Nexus 1000V Series Switch: Secure_ATenant_WebServers Secure_ATenant_DBServers Secure_ATenant_AppServers All these port profiles belong to the same tenant and share the same VLAN, but they have different security profiles (Figure 34). Figure 34. Enabling Three Different Security Profiles on Three Port Profiles 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 28 of 33

29 Tasks for Server Administrators The server administrator can select from three port groups depending on whether the virtual machine belongs to the Web, App, or DB port group (Figure 35). Figure 35. Selecting the Port Group Based on Server Type Configuring a Syslog Server Device settings for Cisco VSG are also configured through Cisco Prime Network Services Controller. You can use these settings to configure NTP, syslog, and SNMP options. Please refer to the information about how to configure device policies in the Cisco Prime Network Services Controller GUI Configuration Guide for the options available on the Device Policies tab. After you have defined a device policy, you assign this policy on the Resource Management tab. The following example shows how to add a device policy to set up a syslog server for logging Cisco VSG Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 29 of 33

30 Create a Device Policy 1. Choose Policy Management > Device Configurations > A-Tenant > Policies > Syslog. Right-click (Figure 36). Figure 36. Adding a Syslog Policy 2. Add a syslog policy. Keep the severity level set to Warning, so that applied security policy logging is sent to the syslog server (Figure 37). Figure 37. Adding a Syslog Server 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 30 of 33

31 Assign the Policy to the Device Profile After you create syslog policy, you need to assign this policy to a device profile at the tenant level. 1. Choose Cisco Prime Network Services Controller > Policy Management > Device Configurations > Device Profiles > A-Tenant > Device Profiles, then select - Add Device Profile [Figure 38] 2. Add a firewall device profile. Figure 38. Adding a Firewall Device Profile Assign the syslog policy to the newly created device profile (Figure 39). Figure 39. Syslog Policy Assigned to Device Profile 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 31 of 33

32 Assign the Device Profile to Cisco VSG 1. Choose Cisco Prime Network Services Controller > Resource Management > Managed Resources > Tenant > Compute Firewall > <VSG-Firewall>. 2. On the right side pane, in Firewall Settings, select the device profile that you created for syslog (Figure 40). Then save the configuration. Figure 40. Assigning the Device Profile to Cisco VSG Conclusion Cisco VSG integrates with Cisco Nexus 1000V Series Switches to enforce security policies for your virtualized environment. Cisco Prime Network Services Controller provides policy management for a multitenant environment. One or more Cisco VSG instances are required per tenant. Cisco VSG uses the vpath intelligence in the Cisco Nexus 1000V VEM to provide security policy enforcement. For More Information Nexus 1000V Licensing Guide Nexus 1000V Deployment Guide Enabling Service Chaining with Nexus 1000V White Paper Cisco VSG Installation and Upgrade Guide Cisco vpath and vservices Reference Guide 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 32 of 33

33 Printed in USA C / Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 33 of 33

Virtual Security Gateway Overview

Virtual Security Gateway Overview This chapter contains the following sections: Information About the Cisco Virtual Security Gateway, page 1 Cisco Virtual Security Gateway Configuration for the Network, page 10 Feature History for Overview,

More information

Cisco Virtual Security Gateway (VSG) Mohammad Salaheldin

Cisco Virtual Security Gateway (VSG) Mohammad Salaheldin Cisco Virtual Security Gateway (VSG) Mohammad Salaheldin Virtual Security Gateway (VSG) Overview VSG Packet Flow VSG Policy Model Use Case Example ASA on 1000V Summary 2011 Cisco and/or its affiliates.

More information

Cisco HyperFlex Systems

Cisco HyperFlex Systems White Paper Cisco HyperFlex Systems Converting to Cisco Nexus 1000V Distributed Switches for Cisco HyperFlex Virtual Machine Guest and VMware vmotion Networks Author: Hui Chen October 2016 2016 Cisco and/or

More information

Table of Contents HOL-PRT-1305

Table of Contents HOL-PRT-1305 Table of Contents Lab Overview... 2 - Abstract... 3 Overview of Cisco Nexus 1000V series Enhanced-VXLAN... 5 vcloud Director Networking and Cisco Nexus 1000V... 7 Solution Architecture... 9 Verify Cisco

More information

Securing Containers Using a PNSC and a Cisco VSG

Securing Containers Using a PNSC and a Cisco VSG Securing Containers Using a PNSC and a Cisco VSG This chapter contains the following sections: About Prime Network Service Controllers, page 1 Integrating a VSG into an Application Container, page 4 About

More information

Securing Containers Using a PNSC and a Cisco VSG

Securing Containers Using a PNSC and a Cisco VSG Securing Containers Using a PNSC and a Cisco VSG This chapter contains the following sections: About Prime Network Service Controllers, page 1 Integrating a VSG into an Application Container, page 3 About

More information

Cisco Virtual Application Container Services 2.0 Lab v1

Cisco Virtual Application Container Services 2.0 Lab v1 Cisco Virtual Application Container Services 2.0 Lab v1 Last Updated: 02-SEP-2015 About This Solution Cisco Virtual Application Container Services (VACS) enables simplified deployment of Secure Application

More information

Deploying the Cisco ASA 1000V

Deploying the Cisco ASA 1000V CHAPTER 2 This chapter includes the following sections: Information About the ASA 1000V Deployment, page 2-1 Downloading the ASA 1000V OVA File, page 2-7 Deploying the ASA 1000V Using the VMware vsphere

More information

Cisco Nexus 1000V Switch for Microsoft Hyper-V

Cisco Nexus 1000V Switch for Microsoft Hyper-V Q&A Cisco Nexus 1000V Switch for Microsoft Hyper-V Overview Q. What are Cisco Nexus 1000V Switches? A. Cisco Nexus 1000V Switches provide a comprehensive and extensible architectural platform for virtual

More information

Cisco Virtual Networking Solution Nexus 1000v and Virtual Services. Abhishek Mande Engineer

Cisco Virtual Networking Solution Nexus 1000v and Virtual Services. Abhishek Mande Engineer Cisco Virtual Networking Solution Nexus 1000v and Virtual Services Abhishek Mande Engineer mailme@cisco.com Agenda Application requirements in virtualized DC The Anatomy of Nexus 1000V Virtual Services

More information

Virtuální firewall v ukázkách a příkladech

Virtuální firewall v ukázkách a příkladech Praha, hotel Clarion 10. 11. dubna 2013 Virtuální firewall v ukázkách a příkladech T-SEC3 / L2 Tomáš Michaeli Cisco 2013 2011 Cisco and/or its affiliates. All rights reserved. Cisco Connect 1 Agenda VXLAN

More information

Cisco Virtual Networking Solution for OpenStack

Cisco Virtual Networking Solution for OpenStack Data Sheet Cisco Virtual Networking Solution for OpenStack Product Overview Extend enterprise-class networking features to OpenStack cloud environments. A reliable virtual network infrastructure that provides

More information

Cisco Nexus 1000V InterCloud

Cisco Nexus 1000V InterCloud Deployment Guide Cisco Nexus 1000V InterCloud Deployment Guide (Draft) June 2013 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 49 Contents

More information

Network Services in Virtualized Data Center

Network Services in Virtualized Data Center Network Services in Virtualized Data Center Tomáš Michaeli Consulting Systems Engineer, DCV Central / Czech republic 21 Mar 2012 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 Almost

More information

Upgrading the Cisco VSG and the Cisco Prime NSC

Upgrading the Cisco VSG and the Cisco Prime NSC Upgrading the Cisco VSG and the Cisco Prime NSC This chapter contains the following sections: Complete Upgrade Procedure, page 1 Upgrade Guidelines and Limitations, page 2 VSG Environment Upgrade Matrix

More information

Cisco HyperFlex Systems

Cisco HyperFlex Systems White Paper Cisco HyperFlex Systems Install and Manage Cisco HyperFlex Systems in a Cisco ACI Environment Original Update: January 2017 Updated: March 2018 Note: This document contains material and data

More information

QUICK START GUIDE Cisco Virtual Network Management Center 2.0 Quick Start Guide

QUICK START GUIDE Cisco Virtual Network Management Center 2.0 Quick Start Guide QUICK START GUIDE Cisco Virtual Network Management Center 2.0 Quick Start Guide 1 Preface 2 Installation Prerequisites 3 Installing VNMC 4 Configuring VNMC 5 Troubleshooting VNMC Installation and Configuration

More information

Deploying Cloud Network Services Prime Network Services Controller (formerly VNMC)

Deploying Cloud Network Services Prime Network Services Controller (formerly VNMC) Deploying Cloud Network Services Prime Network Services Controller (formerly VNMC) Dedi Shindler - Sr. Manager Product Management Cloud System Management Technology Group Cisco Agenda Trends Influencing

More information

Cisco Nexus 1100 Series Virtual Services Appliances

Cisco Nexus 1100 Series Virtual Services Appliances Deployment Guide Cisco Nexus 1100 Series Virtual Services Appliances Deployment Guide Version 1.0 June 2013 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.

More information

Cisco Nexus 1000V Series Switches

Cisco Nexus 1000V Series Switches Data Sheet Cisco Nexus 1000V Series Switches Product Overview Cisco Nexus 1000V Series Switches provide a comprehensive and extensible architectural platform for virtual machine and cloud networking. The

More information

Nexus 1000V in Context of SDN. Martin Divis, CSE,

Nexus 1000V in Context of SDN. Martin Divis, CSE, Nexus 1000V in Context of SDN Martin Divis, CSE, mdivis@cisco.com Why Cisco Nexus 1000V Losing the Edge Server Admin Host Host Host Host Server Admin manages virtual switching! vswitch vswitch vswitch

More information

Cisco Application Centric Infrastructure and Microsoft SCVMM and Azure Pack

Cisco Application Centric Infrastructure and Microsoft SCVMM and Azure Pack White Paper Cisco Application Centric Infrastructure and Microsoft SCVMM and Azure Pack Introduction Cisco Application Centric Infrastructure (ACI) is a next-generation data center fabric infrastructure

More information

Cisco Nexus 1000V Series Switches

Cisco Nexus 1000V Series Switches Cisco Nexus 1000V Series Switches Product Overview Cisco Nexus 1000V Series Switches are virtual machine access switches that are an intelligent software switch implementation for VMware vsphere environments

More information

Cisco Nexus 1000V Installation and Upgrade Guide, Release 5.2(1)SV3(1.4)

Cisco Nexus 1000V Installation and Upgrade Guide, Release 5.2(1)SV3(1.4) Cisco Nexus 1000V Installation and Upgrade Guide, Release 5.2(1)SV3(1.4) First Published: April 17, 2015 Last Modified: August 27, 2015 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San

More information

Cisco ACI with Cisco AVS

Cisco ACI with Cisco AVS This chapter includes the following sections: Cisco AVS Overview, page 1 Cisco AVS Installation, page 6 Key Post-Installation Configuration Tasks for the Cisco AVS, page 43 Distributed Firewall, page 62

More information

vshield Administration Guide

vshield Administration Guide vshield Manager 5.1 vshield App 5.1 vshield Edge 5.1 vshield Endpoint 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

Segmentation. Threat Defense. Visibility

Segmentation. Threat Defense. Visibility Segmentation Threat Defense Visibility Establish boundaries: network, compute, virtual Enforce policy by functions, devices, organizations, compliance Control and prevent unauthorized access to networks,

More information

Configuring WCCPv2. Information About WCCPv2. Send document comments to CHAPTER

Configuring WCCPv2. Information About WCCPv2. Send document comments to CHAPTER CHAPTER 5 This chapter describes how to configure the Web Cache Communication Protocol version 2 (WCCPv2) on Cisco NX-OS devices. This chapter includes the following sections: Information About WCCPv2,

More information

Creating Application Containers

Creating Application Containers This chapter contains the following sections: General Application Container Creation Process, page 1 Creating Application Container Policies, page 2 About Application Container Templates, page 5 Creating

More information

Cisco Virtual Security Gateway, Rel. 4.2(1)VSG1(3.1) and Cisco Virtual Network Management Center, Rel. 1.3 Installation and Upgrade Guide

Cisco Virtual Security Gateway, Rel. 4.2(1)VSG1(3.1) and Cisco Virtual Network Management Center, Rel. 1.3 Installation and Upgrade Guide Cisco Virtual Security Gateway, Rel. 4.2(1)VSG1(3.1) and Cisco Virtual Network Management Center, Rel. 1.3 Installation and Upgrade Guide February 16, 2012 Americas Headquarters Cisco Systems, Inc. 170

More information

VMware vfabric Data Director Installation Guide

VMware vfabric Data Director Installation Guide VMware vfabric Data Director Installation Guide vfabric Data Director 2.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

Unify Virtual and Physical Networking with Cisco Virtual Interface Card

Unify Virtual and Physical Networking with Cisco Virtual Interface Card White Paper Unify Virtual and Physical Networking with Cisco Virtual Interface Card Simplicity of Cisco VM-FEX technology and Power of VMware VMDirectPath What You Will Learn Server virtualization has

More information

Creating Application Containers

Creating Application Containers This chapter contains the following sections: General Application Container Creation Process, page 1 Creating Application Container Policies, page 3 About Application Container Templates, page 5 Creating

More information

Installing the Cisco Nexus 1000V Software Using ISO or OVA Files

Installing the Cisco Nexus 1000V Software Using ISO or OVA Files Installing the Cisco Nexus 1000V Software Using ISO or OVA Files This chapter contains the following sections: Installing the VSM Software, page 1 Installing the VSM Software Installing the Software from

More information

VMware vfabric Data Director Installation Guide

VMware vfabric Data Director Installation Guide VMware vfabric Data Director Installation Guide vfabric Data Director 1.0.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

VXLAN Overview: Cisco Nexus 9000 Series Switches

VXLAN Overview: Cisco Nexus 9000 Series Switches White Paper VXLAN Overview: Cisco Nexus 9000 Series Switches What You Will Learn Traditional network segmentation has been provided by VLANs that are standardized under the IEEE 802.1Q group. VLANs provide

More information

vsphere Networking Update 2 VMware vsphere 5.5 VMware ESXi 5.5 vcenter Server 5.5 EN

vsphere Networking Update 2 VMware vsphere 5.5 VMware ESXi 5.5 vcenter Server 5.5 EN Update 2 VMware vsphere 5.5 VMware ESXi 5.5 vcenter Server 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

Cisco Prime Network Services Controller 3.0 User Guide

Cisco Prime Network Services Controller 3.0 User Guide Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Text Part Number: OL-28179-01 Cisco

More information

NETWORK OVERLAYS: AN INTRODUCTION

NETWORK OVERLAYS: AN INTRODUCTION NETWORK OVERLAYS: AN INTRODUCTION Network overlays dramatically increase the number of virtual subnets that can be created on a physical network, which in turn supports multitenancy and virtualization

More information

VMware vsphere 5.5 VXLAN Networking and Emulex OneConnect OCe14000 Ethernet Adapters

VMware vsphere 5.5 VXLAN Networking and Emulex OneConnect OCe14000 Ethernet Adapters VMware vsphere 5.5 VXLAN Networking and Emulex OneConnect OCe14000 Ethernet Adapters Configuring VXLAN with Emulex OneConnect OCe14000 Adapters Emulex OneConnect Network Adapters Table of contents 1.0

More information

Hybrid Clouds: Integrating the Enterprise Data Center and the Public Cloud

Hybrid Clouds: Integrating the Enterprise Data Center and the Public Cloud Hybrid Clouds: Integrating the Enterprise Data Center and the Public Cloud Usha Ramachandran, Technical Marketing Engineer Session Abstract In this session, participants will learn how to create hybrid

More information

Cisco Nexus Data Broker for Network Traffic Monitoring and Visibility

Cisco Nexus Data Broker for Network Traffic Monitoring and Visibility Guide Cisco Nexus Data Broker for Network Traffic Monitoring and Visibility Solution Implementation Guide 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.

More information

Cisco Prime Network Services Controller 3.0 CLI Configuration Guide

Cisco Prime Network Services Controller 3.0 CLI Configuration Guide Cisco Prime Network Services Controller 3.0 Configuration Guide January 29 2014 Chapter 1 Overview... 4 Information About Prime Network Services Controller... 4 Information About the Prime Network Services

More information

vsphere Networking Update 1 ESXi 5.1 vcenter Server 5.1 vsphere 5.1 EN

vsphere Networking Update 1 ESXi 5.1 vcenter Server 5.1 vsphere 5.1 EN Update 1 ESXi 5.1 vcenter Server 5.1 vsphere 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check

More information

VMware vsphere Administration Training. Course Content

VMware vsphere Administration Training. Course Content VMware vsphere Administration Training Course Content Course Duration : 20 Days Class Duration : 3 hours per day (Including LAB Practical) Fast Track Course Duration : 10 Days Class Duration : 8 hours

More information

Service Graph Design with Cisco Application Centric Infrastructure

Service Graph Design with Cisco Application Centric Infrastructure White Paper Service Graph Design with Cisco Application Centric Infrastructure 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 101 Contents Introduction...

More information

vshield Quick Start Guide

vshield Quick Start Guide vshield Manager 4.1.0 Update 1 vshield Zones 4.1.0 Update 1 vshield Edge 1.0.0 Update 1 vshield App 1.0.0 Update 1 vshield Endpoint 1.0.0 Update 1 This document supports the version of each product listed

More information

Configuring Web Cache Services By Using WCCP

Configuring Web Cache Services By Using WCCP CHAPTER 44 Configuring Web Cache Services By Using WCCP This chapter describes how to configure your Catalyst 3560 switch to redirect traffic to wide-area application engines (such as the Cisco Cache Engine

More information

vsphere Replication for Disaster Recovery to Cloud vsphere Replication 6.5

vsphere Replication for Disaster Recovery to Cloud vsphere Replication 6.5 vsphere Replication for Disaster Recovery to Cloud vsphere Replication 6.5 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

Installing the Cisco CSR 1000v in VMware ESXi Environments

Installing the Cisco CSR 1000v in VMware ESXi Environments Installing the Cisco CSR 1000v in VMware ESXi Environments VMware ESXi Support Information, page 1 VMware Requirements Cisco IOS XE Fuji 16.7, page 2 Supported VMware Features and Operations, page 3 Deploying

More information

vsphere Replication for Disaster Recovery to Cloud

vsphere Replication for Disaster Recovery to Cloud vsphere Replication for Disaster Recovery to Cloud vsphere Replication 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

Cisco ACI and Cisco AVS

Cisco ACI and Cisco AVS This chapter includes the following sections: Cisco AVS Overview, page 1 Installing the Cisco AVS, page 5 Key Post-Installation Configuration Tasks for the Cisco AVS, page 14 Distributed Firewall, page

More information

Hypervisors networking: best practices for interconnecting with Cisco switches

Hypervisors networking: best practices for interconnecting with Cisco switches Hypervisors networking: best practices for interconnecting with Cisco switches Ramses Smeyers Customer Support Engineer Agenda What is this session about? Networking virtualization concepts Hypervisor

More information

Architecting Scalable Clouds using VXLAN and Nexus 1000V

Architecting Scalable Clouds using VXLAN and Nexus 1000V Architecting Scalable Clouds using VXLAN and Nexus 1000V Lawrence Kreeger Principal Engineer Agenda Session Is Broken Into 3 Main Parts Part 1: VXLAN Overview What is a VXLAN? Why VXLANs? What is VMware

More information

Cisco Prime Collaboration Deployment

Cisco Prime Collaboration Deployment Install System Requirements for Installation, page 1 Browser Requirements, page 2 IP Address Requirements, page 2 Virtualization Software License Types, page 3 Frequently Asked Questions About the Installation,

More information

Configuring DHCP Snooping

Configuring DHCP Snooping This chapter contains the following sections: Information About DHCP Snooping, page 1 DHCP Overview, page 2 BOOTP Packet Format, page 4 Trusted and Untrusted Sources, page 6 DHCP Snooping Binding Database,

More information

Virtualization Design

Virtualization Design VMM Integration with UCS-B, on page 1 VMM Integration with AVS or VDS, on page 3 VMM Domain Resolution Immediacy, on page 6 OpenStack and Cisco ACI, on page 8 VMM Integration with UCS-B About VMM Integration

More information

Layer 4 to Layer 7 Service Insertion, page 1

Layer 4 to Layer 7 Service Insertion, page 1 This chapter contains the following sections:, page 1 Layer 4 to Layer 7 Policy Model, page 2 About Service Graphs, page 2 About Policy-Based Redirect, page 5 Automated Service Insertion, page 12 About

More information

CCIE Data Center Written Exam ( ) version 1.0

CCIE Data Center Written Exam ( ) version 1.0 CCIE Data Center Written Exam (350-080) version 1.0 Exam Description: The Cisco CCIE Data Center Written Exam (350-080) version 1.0 is a 2-hour test with 80 110 questions that will validate that a data

More information

Configuring Virtual Service Blades

Configuring Virtual Service Blades CHAPTER 4 This chapter describes how to create and configure virtual service blades and includes the following sections: Information About Virtual Service Blades, page 4-1 Guidelines and Limitations, page

More information

Configuring Real Servers and Server Farms

Configuring Real Servers and Server Farms 6 CHAPTER This section provides an overview of server load balancing and procedures for configuring real servers and server farms for load balancing on an ACE appliance. When you use the ACE CLI to configure

More information

Oracle E-Business Suite 11i with Cisco ACE Series Application Control Engine Deployment Guide, Version 1.0

Oracle E-Business Suite 11i with Cisco ACE Series Application Control Engine Deployment Guide, Version 1.0 Design Guide Oracle E-Business Suite 11i with Cisco ACE Series Application Control Engine Deployment Guide, Version 1.0 This design guide describes how to deploy the Cisco Application Control Engine (Cisco

More information

Configuring the Catena Solution

Configuring the Catena Solution This chapter describes how to configure Catena on a Cisco NX-OS device. This chapter includes the following sections: About the Catena Solution, page 1 Licensing Requirements for Catena, page 2 Guidelines

More information

Configuring Cache Services Using the Web Cache Communication Protocol

Configuring Cache Services Using the Web Cache Communication Protocol Configuring Cache Services Using the Web Cache Communication Protocol Finding Feature Information, page 1 Prerequisites for WCCP, page 1 Restrictions for WCCP, page 2 Information About WCCP, page 3 How

More information

Network Virtualization

Network Virtualization Network Virtualization Petr Grygárek 1 Traditional Virtualization Techniques Network Virtualization Implementation of separate logical network environments (Virtual Networks, VNs) for multiple groups on

More information

vcloud Air - Virtual Private Cloud OnDemand Networking Guide

vcloud Air - Virtual Private Cloud OnDemand Networking Guide vcloud Air - Virtual Private Cloud OnDemand Networking Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

NetScaler Analysis and Reporting. Goliath for NetScaler Installation Guide v4.0 For Deployment on VMware ESX/ESXi

NetScaler Analysis and Reporting. Goliath for NetScaler Installation Guide v4.0 For Deployment on VMware ESX/ESXi NetScaler Analysis and Reporting Goliath for NetScaler Installation Guide v4.0 For Deployment on VMware ESX/ESXi (v4.0) Document Date: October 2016 www.goliathtechnologies.com 1 Legal Notices Goliath for

More information

Requirements and Limitations

Requirements and Limitations , page 1 Hardware, page 2 Network Requirements, page 2 Virtual Machine Configuration, page 3 Browser Requirements, page 5 Licensing, page 5 Limitations, page 6 OS Admin Account Required for CLI-Initiated

More information

Configuring Policy-Based Redirect

Configuring Policy-Based Redirect About Policy-Based Redirect, on page 1 About Multi-Node Policy-Based Redirect, on page 3 About Symmetric Policy-Based Redirect, on page 3 Policy Based Redirect and Hashing Algorithms, on page 4 Policy-Based

More information

VMware Integrated OpenStack Quick Start Guide

VMware Integrated OpenStack Quick Start Guide VMware Integrated OpenStack Quick Start Guide VMware Integrated OpenStack 1.0.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

Introduction and Data Center Topology For Your System

Introduction and Data Center Topology For Your System Introduction and Data Center Topology For Your System This chapter provides an introduction, a data center overview, and VMware vcenter requirements for your system. Introducing Cisco WebEx Meetings Server,

More information

Cisco Virtual Network Management Center GUI Configuration Guide, Release 1.3

Cisco Virtual Network Management Center GUI Configuration Guide, Release 1.3 Cisco Virtual Network Management Center GUI Configuration Guide, Release 1.3 First Published: January 31, 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA

More information

Configuring the Software Using the GUI

Configuring the Software Using the GUI CHAPTER 3 This chapter describes how to use the GUI application to complete the Cisco Nexus 1000V configuration, and includes the following sections. GUI Software Configuration Process, page 3-2 Guidelines

More information

Configuring IPv4. Finding Feature Information. This chapter contains the following sections:

Configuring IPv4. Finding Feature Information. This chapter contains the following sections: This chapter contains the following sections: Finding Feature Information, page 1 Information About IPv4, page 2 Virtualization Support for IPv4, page 6 Licensing Requirements for IPv4, page 6 Prerequisites

More information

Tenant Onboarding. Tenant Onboarding Overview. Tenant Onboarding with Virtual Data Centers

Tenant Onboarding. Tenant Onboarding Overview. Tenant Onboarding with Virtual Data Centers Overview, page 1 with Virtual Data Centers, page 1 with Resource Groups, page 5 Overview In Cisco UCS Director, tenants enable you to securely control and allocate the virtual and physical infrastructure

More information

Cisco Nexus 1000V for KVM Security Configuration Guide, Release 5.x

Cisco Nexus 1000V for KVM Security Configuration Guide, Release 5.x Cisco Nexus 1000V for KVM Security Configuration Guide, Release 5.x First Published: August 01, 2014 Last Modified: November 13, 2015 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San

More information

Virtual Private Cloud. User Guide. Issue 03 Date

Virtual Private Cloud. User Guide. Issue 03 Date Issue 03 Date 2016-10-19 Change History Change History Release Date What's New 2016-10-19 This issue is the third official release. Modified the following content: Help Center URL 2016-07-15 This issue

More information

Configure. Background. Register the FTD Appliance

Configure. Background. Register the FTD Appliance Background, page 1 Register the FTD Appliance, page 1 Create a Service Graph, page 9 Apply a Service Graph Template, page 10 Supported Functions, page 13 FTD Deployments, page 18 Background The ACI fabric

More information

Enterprise. Nexus 1000V. L2/L3 Fabric WAN/PE. Customer VRF. MPLS Backbone. Service Provider Data Center-1 Customer VRF WAN/PE OTV OTV.

Enterprise. Nexus 1000V. L2/L3 Fabric WAN/PE. Customer VRF. MPLS Backbone. Service Provider Data Center-1 Customer VRF WAN/PE OTV OTV. 2 CHAPTER Cisco's Disaster Recovery as a Service (DRaaS) architecture supports virtual data centers that consist of a collection of geographically-dispersed data center locations. Since data centers are

More information

Cisco Nexus 1000V Software Upgrade Guide, Release 4.0(4)SV1(3d)

Cisco Nexus 1000V Software Upgrade Guide, Release 4.0(4)SV1(3d) Cisco Nexus 1000V Software Upgrade Guide, Release 4.0(4)SV1(3d) Revised: May 21, 2011 This document describes how to upgrade the Cisco Nexus 1000V software on a Virtual Supervisor Module (VSM) virtual

More information

PrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps

PrepAwayExam.   High-efficient Exam Materials are the best high pass-rate Exam Dumps PrepAwayExam http://www.prepawayexam.com/ High-efficient Exam Materials are the best high pass-rate Exam Dumps Exam : 300-160 Title : Designing Cisco Data Center Unified Computing Vendor : Cisco Version

More information

Configuring System Port Profiles

Configuring System Port Profiles 4 CHAPTER This chapter describes system port profiles and how to configure them. This chapter includes the following sections: Information About System Port Profiles, page 4-1 Guidelines and Limitations

More information

Cisco ACI vcenter Plugin

Cisco ACI vcenter Plugin This chapter contains the following sections: About Cisco ACI with VMware vsphere Web Client, page 1 Getting Started with, page 2 Features and Limitations, page 7 GUI, page 12 Performing ACI Object Configurations,

More information

DEPLOYING A VMWARE VCLOUD DIRECTOR INFRASTRUCTURE-AS-A-SERVICE (IAAS) SOLUTION WITH VMWARE CLOUD FOUNDATION : ARCHITECTURAL GUIDELINES

DEPLOYING A VMWARE VCLOUD DIRECTOR INFRASTRUCTURE-AS-A-SERVICE (IAAS) SOLUTION WITH VMWARE CLOUD FOUNDATION : ARCHITECTURAL GUIDELINES DEPLOYING A VMWARE VCLOUD DIRECTOR INFRASTRUCTURE-AS-A-SERVICE (IAAS) SOLUTION WITH VMWARE CLOUD FOUNDATION : ARCHITECTURAL GUIDELINES WHITE PAPER JULY 2017 Table of Contents 1. Executive Summary 4 2.

More information

Cisco Nexus 1000V Getting Started Guide, Release 4.2(1) SV1(4a)

Cisco Nexus 1000V Getting Started Guide, Release 4.2(1) SV1(4a) Cisco Nexus 1000V Getting Started Guide, Release 4.2(1) SV1(4a) October 18, 2011 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408

More information

Send document comments to Information About Layer 2 Ethernet Switching

Send document comments to Information About Layer 2 Ethernet Switching CHAPTER 8 This chapter describes how to identify and resolve problems that relate to Layer 2 switching. This chapter includes the following sections: Information About Layer 2 Ethernet Switching, page

More information

VSB Backup and Recovery

VSB Backup and Recovery CHAPTER 6 This chapter describes how to backup and recover a VSB, and includes the following sections: Information About, page 6-1 Guidelines and Limitations, page 6-1 Configuring VSB Backup and Restoration,

More information

Nevrijeme u oblacima i kako se zaštititi

Nevrijeme u oblacima i kako se zaštititi Nevrijeme u oblacima i kako se zaštititi Goran Peteh Enterprise Systems Engineer Zagreb, 0.2.20. Agenda Internet trends MorganStanley Identity-aware infrastructure Physical and virtual security Cumulus

More information

New Features in VMware vsphere (ESX 4)

New Features in VMware vsphere (ESX 4) New Features in VMware vsphere (ESX 4) VMware vsphere Fault Tolerance FT VMware Fault Tolerance or FT is a new HA solution from VMware for VMs. It is only available in vsphere 4 and above and provides

More information

Alteon Virtual Appliance (VA) version 29 and

Alteon Virtual Appliance (VA) version 29 and Alteon Virtual Appliance (VA) version 29 and Cisco Unified Computing System (UCS) Implementation Guide - 1 Table of Content Solution Overview... 3 Cisco s Unified Computing System Overview... 3 Radware

More information

vrealize Operations Management Pack for NSX for vsphere 2.0

vrealize Operations Management Pack for NSX for vsphere 2.0 vrealize Operations Management Pack for NSX for vsphere 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

vsphere Replication for Disaster Recovery to Cloud vsphere Replication 8.1

vsphere Replication for Disaster Recovery to Cloud vsphere Replication 8.1 vsphere Replication for Disaster Recovery to Cloud vsphere Replication 8.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Installing and Configuring VXLAN Gateway

Installing and Configuring VXLAN Gateway Installing and Configuring VXLAN Gateway This chapter contains the following sections: Information About the VXLAN Gateway Deployment, page 1 Guidelines and Limitations, page 2 Configuring VSMs, page 3

More information

vsphere Networking 17 APR 2018 VMware vsphere 6.7 VMware ESXi 6.7 vcenter Server 6.7

vsphere Networking 17 APR 2018 VMware vsphere 6.7 VMware ESXi 6.7 vcenter Server 6.7 17 APR 2018 VMware vsphere 6.7 VMware ESXi 6.7 vcenter Server 6.7 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about

More information

Installation of Cisco Business Edition 6000H/M

Installation of Cisco Business Edition 6000H/M Installation Overview, page 1 Installation Task Flow of Cisco Business Edition 6000H/M, page 2 Installation Overview This chapter describes the tasks that you must perform to install software on your Business

More information

Potpuna virtualizacija od servera do desktopa. Saša Hederić Senior Systems Engineer VMware Inc.

Potpuna virtualizacija od servera do desktopa. Saša Hederić Senior Systems Engineer VMware Inc. Potpuna virtualizacija od servera do desktopa Saša Hederić Senior Systems Engineer VMware Inc. VMware ESX: Even More Reliable than a Mainframe! 2 The Problem Where the IT Budget Goes 5% Infrastructure

More information

Higher scalability to address more Layer 2 segments: up to 16 million VXLAN segments.

Higher scalability to address more Layer 2 segments: up to 16 million VXLAN segments. This chapter tells how to configure Virtual extensible LAN (VXLAN) interfaces. VXLANs act as Layer 2 virtual networks over Layer 3 physical networks to stretch Layer 2 networks. About VXLAN Encapsulation

More information

Security and Virtualization in the Data Center. BRKSEC Cisco Systems, Inc. All rights reserved. Cisco Public

Security and Virtualization in the Data Center. BRKSEC Cisco Systems, Inc. All rights reserved. Cisco Public Security and Virtualization in the Data Center 1 What We ll Cover Areas of Interest Security for Data Center Layers Device Virtualization & Security Services Security Considerations for Server Virtualization

More information

VMware vsphere with ESX 6 and vcenter 6

VMware vsphere with ESX 6 and vcenter 6 VMware vsphere with ESX 6 and vcenter 6 Course VM-06 5 Days Instructor-led, Hands-on Course Description This class is a 5-day intense introduction to virtualization using VMware s immensely popular vsphere

More information