Showing posts with label Arista lawsuit. Show all posts
Showing posts with label Arista lawsuit. Show all posts

Saturday, 7 December 2019

Configuring Cisco Security with Amazon VPC Ingress Routing

Today, Amazon Web Services (AWS) announced a new capability in Virtual Private Cloud (VPC) networking that is designed to make it easier and more efficient for Cisco Security customers to deploy advanced security controls in the cloud. This new capability is called Amazon VPC Ingress Routing. It allows users to specify routes for traffic flowing between a VPC and the internet or from a VPN connection, such as a private datacenter.

Amazon VPC Ingress Routing is a service that helps customers simplify the integration of network and security appliances within their network topology. With Amazon VPC Ingress Routing, customers can define routing rules at the Internet Gateway (IGW) and Virtual Private Gateway (VGW) to redirect ingress traffic to third-party appliances, before it reaches the final destination. This makes it easier for customers to deploy production-grade applications with the networking and security services they require within their Amazon VPC.

While the remainder of this post focuses on Cisco’s NGFWv and ASAv products, this capability can also be used to deploy a number of other network-based security solutions into the AWS traffic path. This includes services such as the following:

◉ Firewall policy enforcement
◉ Network traffic visibility
◉ Malware detection
◉ URL filtering
◉ Intrusion Prevention
◉ DNS security

This is a big win for Cisco customers deploying our security products in AWS, and we are pleased to have been an early adopter and Integration Partner with AWS on this launch.

How to Use Amazon VPC Ingress Routing with Cisco Firewalls


The configuration is achieved by creating a custom route table and associating subnet routes with the private Elastic Network Interface (ENI) of the security appliance, and then associating the public ENI with an IGW and VGW. A single firewall instance can protect multiple subnets; however, a separate instance is needed per VPC. Below are some details on the testing we performed as well as sample use cases and configuration guidance.

Use Cases / Deployment Scenarios


Cisco NGFWv/ASAv can be deployed in a VPC to protect the following traffic flows:

◉ Traffic Traversing an Internet Gateway (IGW) To/From the Internet
◉ Traffic Traversing a VPN Gateway (VGW) To/From a Remote VPN Peer

Benefits of Using Amazon VPC Ingress Routing with Cisco’s NGFWv and ASAv


◉ Offload NAT from the firewall to AWS network address translation (NAT) gateway or instance
◉ Simplify protection of multi-tier applications spanning subnets and VPCs
◉ The scalable design makes it easy to add new subnets, and more of them
◉ Enables bi-directional, threat-centric protection for traffic bound for private networks and the internet

POC Deployment Scenario


Enable outbound Internet connectivity and offload NAT function to AWS NAT gateway

In this scenario, the Cisco Firewall (NGFWv or ASAv) is deployed between internal services in the AWS VPC and the internet. The route table for the Internet Gateway (igw-rt) has a specific route for the Inside subnet which directs inbound traffic to the Cisco Firewall for inspection. Prior to this enhancement, the users had to NAT egress traffic on the firewall to bring back the reply packet to the same virtual appliance. This new configuration eliminates the need for an ENI on the firewall and removes the requirement to perform NAT on the firewall, thus improving performance.

Cisco Security, Cisco Learning, Cisco Tutorial and Material, Cisco Guides, Cisco Online Exam

Cisco NGFW/ASA with AWS IGW (routable attached to IGW) and AWS NGW to NAT outbound traffic

Cisco NGFW/ASA with Multiple Subnets, Three-tier Architecture Using IGW and Amazon VPC Ingress Routing

This topology expands on the previous​, demonstrating how multiple subnets can be protected by a single firewall. By utilizing the AWS NAT Gateway service, the number of protected subnets behind a single firewall can be scaled significantly beyond what was previously possible.

As with the previous architecture, the ​Cisco Firewall is deployed at the edge in routed mode, forwarding outbound traffic to the IGW. Multiple routes are configured in the IGW’s route table to direct the traffic back to the appropriate subnet while the protected subnets forward their traffic to the internal firewall interface via the NAT gateway.

Cisco Security, Cisco Learning, Cisco Tutorial and Material, Cisco Guides, Cisco Online Exam

Cisco NGFW/ASA three-tier Architecture with AWS IGW and VPC Ingress Routing

Cisco NGFW/ASA with Multiple Subnets, Three-tier Architecture Using VGW and Amazon VPC Ingress Routing 

Cisco Firewalls can also be deployed in an Amazon VPC to inspect traffic flowing through a VPN tunnel. In this case, the ​Cisco Firewall is deployed at the edge in routed mode, forwarding outbound traffic to the to a VGW. In this example, the local and remote networks are routable; therefore, the NAT gateway can be eliminated, further improving efficiency and reducing cost.

Cisco Security, Cisco Learning, Cisco Tutorial and Material, Cisco Guides, Cisco Online Exam

Cisco NGFW/ASA three-tier Architecture with AWS IGW and VPC Ingress Routing

In Addition to Support for Amazon Ingress Routing, we are adding AWS Security Group management to Cisco Defense Orchestrator (CDO). We are also extending the existing ACI policy-based automation for L4-7 services insertion to the AWS cloud by leveraging Amazon VPC ingress routing. These integrations will make deploying L4-7 services in a hybrid cloud as well as Cisco Security at scale in AWS easier than ever.

Thursday, 5 December 2019

Automated Cloud Infrastructure: Extending ACI and AWS integration

It’s the time of the year – AWS re:invent 2019 is happening this week. Cisco and AWS customers deploy workloads and applications in both their own data centers and the AWS cloud today and look forward to even better integration to achieve their infrastructure automation goals while maintaining a consistent operational model.

Cisco and AWS are extending their partnership across multiple domains such as campus, WAN, branch, data center and cloud using a policy based, automated approach. This blog will focus on how customers can leverage the new AWS capabilities and enhancements to build a better Automated Cloud Infrastructure for their data centers.

Our customers started to deploy Application Centric Infrastructure in their own data centers using Nexus 9000 fabrics 5 years ago. Key tenets of the ACI operation model have been:

1. Intent based/ policy driven automation
2. Define policy once – deploy automatically when and where needed
3. Flexible and scalable multi-tenancy
4. Automated service insertion and traffic redirection
5. Open APIs to provide network connectivity between baremetal, hypervisor, container, and cloud environments

AWS announced multiple innovations and enhancements this week:

1. AWS Outposts – provide AWS services on-premises
2. AWS VPC Ingress Routing – Inbound routing control for more efficient service insertion
3. AWS Transit Gateway – Simple and high performance connectivity between AWS VPC’s

These innovation and enhancements map very well to the ACI operational model our customers have deployed today.

ACI extension to AWS Outposts


AWS Outposts are Amazon’s on-premise services for running applications that require the lowest possible latency or that have local data-processing requirements. Earlier this year, we announced availability of Cisco Cloud ACI on AWS for hybrid clouds. Therefore, extending ACI enterprise-grade networking to AWS Outposts becomes very easy. As Figure 1 shows customers can now leverage Cisco Multi-Site Orchestrator to manage ACI fabrics on premises, Cloud ACI instances in the AWS cloud, as well as AWS Outposts instances connected to ACI or NX-OS Nexus fabrics all at the same time.

Key benefits of using ACI with AWS Outposts for our customers are:

• Enterprise-grade network connectivity
• Consistent segmentation (e.g. zones, tenants)
• Automated service insertion and service chaining (more on this below)
• End-to-end visibility and troubleshooting

Data Center, Cisco Study Materials, Cisco Tutorial and Materials, Cisco Online Exam

Figure 1: ACI extension to AWS hybrid cloud and AWS Outposts
A more detailed solution brief discussing how to connect AWS Outposts to existing Cisco Nexus data center fabrics is available here.

ACI integration with AWS VPC Ingress Routing


Amazon VPC Ingress Routing is a service that helps customers simplify the integration of virtual network and security appliances within their AWS VPC network topology. ACI enables customers today to define policies for automated service insertion and chaining. Many customers are using that functionality in their on-premises data centers. With the availability of AWS VPC Ingress Routing they will be able to use the same policy based approach for their AWS network designs as well.

Key benefits of using ACI with AWS VPC Ingress Steering

• Enterprise-grade service chain functionality for hybrid cloud
• Consistent service insertion for cloud native and 3rd party L4-& service appliances in AWS cloud and on-premises
• Automated service insertion and service chaining

Data Center, Cisco Study Materials, Cisco Tutorial and Materials, Cisco Online Exam

Figure 2: ACI Automated Service Insertion in Hybrid Cloud

ACI Integration with AWS Transit Gateway


AWS Transit Gateway provides efficient and high performance interconnect between multiple AWS VPCs. The integration with Cisco ACI will provide customers the ability to maintain and manage their multi-tenant on-prem data center environment while automating connectivity to multiple AWS VPC instances in the cloud connected through AWS TGW.

Data Center, Cisco Study Materials, Cisco Tutorial and Materials, Cisco Online Exam
Figure 3: ACI Integration with AWS Transit Gateway

Key benefits of using ACI with AWS Transit Gateway

• Enterprise grade segmentation and multi-tenancy
• Enable higher inter-VPC throughput provided by AWS TGW
• Secure automated connectivity from on-premises to AWS TG

Cisco ACI and AWS integrations enable customers to also simplify their day2operations by providing a single pane of glass (Multi-Site Orchestrator) for visibility, troubleshooting their network connectivity and segmentation across on-premises and cloud environments.

In addition to enabling the above innovations, we are also helping customers to accelerate their automated cloud infrastructure deployments through a ‘Cisco Cloud ACI’ promotional offer.

Data Center, Cisco Study Materials, Cisco Tutorial and Materials, Cisco Online Exam

Thursday, 6 April 2017

Protecting Innovation: Update on ITC Enforcement Action

Opening statements for the ITC ‘944 investigation enforcement hearing began this afternoon, and the full evidentiary hearing should be complete tomorrow. In the ITC’s final decision last summer, Arista was found to infringe three Cisco patents, including our SysDB patent. While Arista claims to have redesigned its products to avoid Cisco’s SysDB patent, they declined to present the redesign to the Commission for review. The ITC now will determine in the enforcement proceeding whether Arista’s redesign continues to infringe Cisco’s SysDB patent and, if so, what the penalty should be for the ongoing infringement.