Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

Virtualized Security

Services
DATASHEET

Nuage Networks Virtualized Security security, visibility, and automation solution.


Services (VSS) is a software-defined VSS extends Nuage Networks VSP, a
security solution for data centers and wide software-defined networking (SDN)
area network (WAN) environments. It is platform, with value-added security
Nuage Networks based on the Nuage Networks Virtualized capabilities that provide contextual traffic
VSS Highlights Services Platform (VSP) to help address visibility and security monitoring, as well as
protection, detection, and operational dynamic security automation for rapid
End-to-End security
security challenges in cloud environments incident response. VSS delivers these
across enterprise
driven by emerging security threats and features in addition to inherent VSP
minimizes risks
multi-tenancy. VSS is the industry’s first capabilities to provide secure
- Security spanning
distributed, end-to-end (cloud, datacenter, microsegmentation, policy automation,
branch, datacenter
and branch) software-defined network and policy enforcement.
and cloud

Unified policy and


visibility provides Security needs to evolve with SD-WAN
better security and
manageability Existing security models cannot effectively address the new security requirements driven by
- Security across move to cloud and the evolving threat landscape.
branch containers,
multi-hypervisor VMs First, due to SD-WAN allowing the use of broadband internet as a transport mechanism, the
and bare-metal internet, which is traditionally not a guaranteed secured link, the access to it needs to be
made secure.
Dynamic security
automation enables Second, current protection model in Enterprise branch is basic and not enough to secure
faster response to local internet breakout to cloud as all traffic is steered over MPLS to DC sites where security
mitigate threats is applied. Also, there is not much end to end micro-segmentation between branch and
- Automates policy DC/cloud applications across the enterprise.
action in the network
based on analytics Third, with the increasing attack sophistication and evolving threat landscape we cannot
assume that all attacks can be prevented by protective controls. Currently there is not much
visibility to branch user traffic. Visibility and security analytics are key to help detect attacks.

7850 Network Services Gateway (Virtualized Security Services) 1


Lack of sufficient network segmentation inside Lack of automation - Current network security
the datacenter, as well as between remote branch operations are largely manual and device-centric. It can
sites and datacenters - Current perimeter-centric take weeks to provision or modify security policies,
approaches to securing datacenters are proving to be including configuring network devices, firewalls, and
insufficient to prevent new and emerging attacks that security protocols for a new application or branch
move laterally between workloads within a datacenter. In service. Incident response to suspected or identified
addition, a lack of sufficient end-to-end segmentation attacks is manual and slow. The lack of automation for
across the WAN poses additional security risks where an security tasks makes it difficult to deploy new
attacker can use the branch as an entry point to access applications and services on-demand, in minutes, on
applications and data inside the datacenter. the most efficient resources as cloud architectures
strive for.

Location-independent security policies and cloud Lack of visibility of traffic inside the datacenter
mobility - A key requirement for cloud architectures is and across the WAN - Organizations lack the visibility
that applications and services be completely location and tools to detect advanced security threats across
independent, able to migrate freely to the most efficient the datacenter, cloud, and branch networks. Based on a
resources on any server at any site in the cloud, without recent security survey, it takes, on average, several
introducing dependencies in the application. Traditional months from initial compromise to when an attack is
security approaches cannot easily support location actually detected.
independent workloads because security policies are
defined by location of security devices or rigid network
topologies. The traditional perimeter-centric network
security model cannot effectively address security and
visibility for east-west traffic inside the datacenter or
traffic from WAN networks.

7850 Network Services Gateway (Virtualized Security Services) 2


To align with each of these security phases, the three-pronged VSS
architecture comprises VSS Prevent, VSS Detect, and VSS Respond.
Key VSS features
As described above, security concerns
can be a major challenge to cloud- VSS Prevent: Segmentation, distributed security policy
readiness and the adoption of cloud enforcement and centralized security policy management
architectures. The multi-tenant VSS Prevent capabilities enable software-defined, end-to-end network
nature of cloud on shared or public segmentation. This minimizes the attack surface and prevents the spread of
cloud resources, coupled with manual lateral malware by enabling microsegmentation for any workload (virtual
security processes hinder on-demand machines, containers, and bare-metal workloads) within the datacenter, as
deployments and scalability. well as by controlling user access from branch or WAN locations.

VSS supports a three-pronged Please note that some the features are licensable as add-ons for VNS as
security methodology with separate part of the NSG add-on licenses. Those features have (add-on) next to
components and features to address their description.
each step in the security lifecycle:
Threat Prevention with IPS/IDS policies can be defined
Prevent security incidents by
native IDS/IPS (add-on) - and managed centrally via the GUI
minimizing the attack surface with
Intrusion Detection System (IDS) or APIs. The signatures are
software-defined
and Intrusion Prevention System updated dynamically from cloud
microsegmentation and policy
(IPS) are important to detect and and applied to NSG.
enforcement across the cloud,
prevent the known attacks by
datacenter, and WAN.
recognizing the virus signatures. Statistics and reports are provided
Detect security threats and
Threat prevention component on intrusion event details and rule
monitor compliance with
prevents malware from hit count.
contextual network visibility and
penetrating the network,
security analytics in real-time.
regardless of application traffic in The IDP reports provide:
Respond faster to security
which they are hiding. It is • Reports per NSG and per domain
incidents and breaches by
important to note that the • Intrusion attempts over time
automating remediation processes,
IDS/IPS functionality is • Top threats by signature
such as quarantining suspicious
implemented natively on • Top source IP (attackers)
applications or engaging deeper
the NSG. • Top destination IP (targets)
analysis tools.
• IDP event details
It uses signatures of known
attacks to match traffic that
passes through the NSG in order
to prevent attacks and these
signatures have been divided into
groups of relevant signatures.

7850 Network Services Gateway (Virtualized Security Services) 3


Threat Prevention (IDP) Reports

L7 Application and SaaS Enterprises can define access classifies URLs by topic and by
Control - One of the prime rules and policies to allow or deny "blocked" or "allowed" status.
benefits of SD-WAN is its ability traffic to/from the application –
to allow a direct access for a for example the administrator can URL filtering can block individual
branch user to the cloud and define a policy to deny access to URLs or categories of URLs. By
SaaS applications. A good secure cloud storage app that is not in blacklisting individual URLs, users
SD-WAN must have the ability to the corporate IT’s management can block specific webpages that
restrict user access to a specific domain. There could be a policy are known to be dangerous or
application, be able to set allowing access to an application inappropriate. Meanwhile
application-based policies and like say, Office365. blocking URL categories allows to
monitor and log application more efficiently restrict the type
usage. For this, it needs to have a Web/URL Filtering (add-on) - of content accessed over their
layer-7 DPI engine to recognize URL filtering restricts branch networks by blocking large
thousands of application types. user access to inappropriate or groups of URLs at once instead
malicious internet content. It of having to list hundreds of
Nuage SD-WAN security supports restricts local internet access to individual URLs.
a powerful Layer-7 DPI that cloud services/whitelisted
recognizes thousands of websites. Within Nuage URL/Web filtering
applications. It also supports function, we support 1800+ web
pre-defined SaaS services – URL filtering also helps mitigate categories and millions of
Office365, WebEx, Salesforce, malware and phishing attacks by websites. Each attempt of the
GitHub, JIRA, Azure, AWS, Google blocking malicious webpages. blocked website access is logged
among others for easy access as URL filtering bases its filtering for reporting which can be used
well as monitoring. policies on a database that

7850 Network Services Gateway (Virtualized Security Services) 4


for auditing and compliance. Beyond the datacenter, VSS also quickly and automatically
DPI engine to recognize provides software defined propagates to all relevant
thousands of application types. end-to-end segmentation and application or overlay networks,
policy enforcement based on a as needed.compliance
Nuage SD-WAN security supports common policy model across the enforcement based on ACL
a powerful Layer-7 DPI that enterprise WAN and datacenters. templates. Security
recognizes thousands of Layer 4 stateful ACLs can be administrators can centrally
applications. It also supports used for better security at the define and manage network-wide
pre-defined SaaS services – branch perimeter to restrict user security policies based on a
Office365, WebEx, Salesforce, access to cloud applications. For template defined for specific
GitHub, JIRA, Azure, AWS, Google example, access to the corporate applications or tenants.
among others for easy access as network can be restricted to guest
well as monitoring. users. Multi-layer security policy
management - The multi-layer
The Nuage Networks Layer 4 security policy management
Software-defined distributed firewall, using Layer 4 capability enables multiple
segmentation & distributed statefulACLs, has also been teams, (such as the network
security policy enforcement validated by independent PCI security and application teams)
- Within the datacenter, VSS auditors for network to manage different aspects of
provides enforcement of segmentation in a PCI-compliant the overall security policy.
fine-grained, applicationspecific environment across datacenter
security policies, also known as and branch locations. To ensure compliance, the
microsegmentation, for any network security team can
workload. Microsegmentation Organizations can trust that VSS control network-wide security
effectively provides a “whitelist” can be an effective tool to help policies, while providing
approach to all traffic within meet compliance requirements in application teams the ability to
the cloud network, blocking all a payment card environment. specify application-specific
connections between all whitelist policies for micro-
applications except those that Simplified security segmentation between
are explicitly allowed. This much management based on application tiers as dictated by
more thorough approach to templates - VSS enables the application design.
security policy management has network security administrators This is achieved using an ACL
been called a “Zero Trust” policy to simplify security policy sandwich, which is composed of
by Forrester Research, and is a management across multiple the top, middle,and bottom
rapidly emerging requirement for virtual networks and automate layers of ACL entries. Network
multi-tenant cloud networks compliance enforcement based security teams can define the top
on ACL templates. Security and bottom layers as a part of
VSS includes a Layer 4 administrators can centrally the ACL template to specify all
distributed firewall and enforces define and manage network-wide traffic that shouldnever reach any
Layer 4 stateful Access Control security policies based on a of the end-points or deny traffic
Lists (ACL), as well as forwarding template defined for specific that isn’t explicitly allowed by a
and service chaining policies for applications or tenants. matching ACL.
re-directing traffic to
advanced security appliances, For example, the network Top and bottom layer ACLs from
such as next generation firewalls security team can block the the template are combined with
(NGFWs) and intrusion spread of a new worm or virus applicationspecific whitelist
prevention systems (IPS). Layer 4 across enterprise networks. This policies. ACLs, defined per
ingress/egress ACLs can be can be done by making a domain instance in the middle
centrally defined based template-level ACL change to layer to form an ACL sandwich,
on flexible groupings of block network communication provide fine-grained policy for
end-points based on policy based on a specific port or microsegmentation while
groups in Nuage Networks VSP. protocol used by the worm or ensuring compliance with overall
virus. The resulting policy change network security policies.

7850 Network Services Gateway (Virtualized Security Services) 5


VSS Detect: Visibility, security monitoring and
analytics (requires VSS license for full functionality
in addition to the Nuage Networks VSP)
VSS Detect provides security operations and auditors with
contextual visibility of traffic flows, near real-time security
alerts, and a dashboard of their virtual network across the
datacenter and WAN.

Contextual flow visualization - For compliance


validation, network security administrators and
auditors can visualize traffic flows with context
(e.g., policy group, and domain), both within the
datacenter as well as between datacenters and
branch networks. In addition, application flow
mapping based on contextual flow visualization
(e.g., Layer 4 protocol/ports information used by
flows between application components or policy
groups) enables auditing and definition of whitelist
security policies for microsegmentation.

Threat Intelligence based on IP Reputation


(add-on) - Threat Intelligence feature enables near
real-time detection of security threats based on
reputation of source or destination public IP
address in the flow records collected by VSS to
known risky public IP addresses based on IP
reputation data. When the Threat Intelligence
feature is enabled, VSS uses a periodically updated
IP reputation database of high risk IP addresses to
detect communications with the risky IP address
and enriches the flow record information with IP
reputation and additional meta-data (for example,
high risk IP, botnet security category, IP
geo-location data) to provide additional context for
security analytics and threat hunting In addition,
new security events of type “Risky IP Access” are
generated near real-time and stored by VSS in
Elasticsearch security event index.

Threshold Crossing Alerts (TCA) - Generate real


time alerts based on traffic metrics. The metrics
include - Packets in/out, Bytes in/out, Dropped
packets in/out, Anti-spoof packets count, Portscan
port count and port sweep IP count, ACL deny event
count, and Anti-spoof event count.

7850 Network Services Gateway (Virtualized Security Services) 6


Virtualized network monitoring and security Figure 2. VSS Enterprise ACL Deny vs Time
analytics - Network security and operations teams
can get insight into network security events with 1,000,000

near real-time security alerts, security dashboards, 1,000,000


1,000,000
and reports based on ACL allow/deny hits and 1,000,000

security events, as well as traffic analytics. 1,000,000


1,000,000
Examples of security reports include: 1,000,000
- ACL deny/allow count vs. time within a domain or 1,000,000

the entire enterprise 1,000,000


1,000,000
-View security events (e.g, ACL deny event, port
09 AM 12 PM 03 PM 06 PM 05 PM Wed 28 03AM 06 AM
scan, port sweep, risky IP access, spoofing, IDP
events, TCA alerts) and associated details per
Enterprise and L3/L2 domain

Policy-based mirroring - Policy-based mirroring


enables select traffic that matches an ACL entry to
be mirrored to security analytics/traffic analyzers
for more advanced threat analytics, business
intelligence, or troubleshooting.

Only traffic that matches a defined policy will be


mirrored, so users can be selective about what they
choose to analyze and not overwhelm the system.
For example, users can choose to mirror suspicious
traffic based on anomalous behavior that matches
unusual ingress/egress ACL policies.

Please note that Policy-based mirroring is only


available for VCS and not for VNS.

7850 Network Services Gateway (Virtualized Security Services) 7


VSS Respond: Dynamic Security - Mirroring select traffic from such as a SIEM (security incident event
Automation (requires VSS license suspicious end points manager) as a part of the incident
for full functionality, in addition response workflow.
to relevant VSP licenses) Alerts with automated actions can
VSS Respond enables rapid response to a be defined based on various
security event or an incident by metrics at particular vPort/policy VSS solution components
dynamically automating security policies group/zone /subnet levels,
and remediation steps to mitigate the VSS requires the Nuage Networks
including Packets in/out, Bytes
attack in near real-time. VSP solution, (including the VSD
in/out, Dropped packets in/out,
and VSC SDN controller
Anti-spoof packet count, ACL deny
Alarm filtering with deeper components). In addition, the
event count, and Anti-spoof
analytics - For example, a VSS solution requires VRS for
event count.
threshold crossing alert can be policy enforcement and flow
defined based on a metric, such visibility in the datacenter or
as ACL deny count (at the zone, private clouds, as well as NSG for
Automated quarantine of
policy group, vPort or subnet level). branch environment.
affected end points - Another
If the ACL deny count exceeds a use case is to quarantine an
threshold, the end point can be put infected end-point by dynamically
into a suspect category and be reassigning the infected end-point
more closely monitored by: to a quarantine policy group to
enforce a more stringent security
- Inserting advanced security policy and restrict communication
services for traffic from suspicious from the quarantined endpoint.
end points (e.g., sending traffic to This can be triggered by a security
an NGFW or IPS) analysis from an external system

Key features and benefits summary

Category Feature Feature Description Benefits

VSS Layer 4 stateful, Layer 4 ingress/egress ACLs can be Minimizes attack surface with
Prevent distributed firewall centrally defined based on flexible microsegmentation and policy
grouping of end points at the Policy enforcement for east-west traffic
Group, Zone, Subnet levels. inside the datacenter, as well as
perimeter security in WAN
Layer 4 forwarding ACLs can be defined environments.
to selectively steer traffic to re-
direction targets such as NGFW or IPS. Service chaining for advanced
insertion of external security
Layer 4 security policies can be appliances (e.g., NGFW, IPS) inside
enforced using Nuage VRS as host for the datacenter, as well as at branch
VM, containers as well as bare-metal, locations.
and at branch with the Nuage NSG.
Protects bare-metal, virtual
Layer 4 distributed firewall was machine, and container workloads
validated by independent PCI auditors seamlessly.
for network segmentation in a PCI
compliant environment.

7850 Network Services Gateway (Virtualized Security Services) 8


Key features and benefits summary (cont.)

Category Feature Feature Description Benefits

VSS Threat Prevention Embedded security capability in NSG IDS/IPS are important to detect and
Prevent with native IDS/IPS prevent the known attacks by
Uses signatures of known attacks to recognizing the virus signatures.
match traffic that passes through the Prevents malware from penetrating
NSG in order to prevent attacks the network, regardless of
Signatures have been divided into application traffic in which they are
different groups that contain relevant hiding.
signatures - based on use case - Reputation-managed protection -
corresponding groups can be applied. IPS subscribes to reputation-based
IDS/IPS policies defined and managed list of known malicious sites and
centrally domains, that is used to protect the
Stats/Reports on intrusion event details users.
and rule hit count Fewer Security Incidents – IPS
Support targeted for NSG E-20* and ensures less disruption
above Since IDS/IPS is implemented
Signatures updated dynamically from natively on NSG, there is no need to
cloud and applied to NSG install any external IDS/IPS
appliance.

VSS L7 Application and Restricts branch user access to specific Enterprises can define access rules
Prevent SaaS Control applications using L7 DPI and policies to allow or deny traffic
Supports thousands of application to/from the application
signatures Define application based security
Visibility and logging of L7 application policies
information
Supports pre-defined SaaS services –
Office365, Webex, Salesforce, Github,
JIRA, Azure, AWS, Google

VSS Web/URL Filtering URL filtering restricts branch user URL filtering helps mitigate
Prevent access to inappropriate or malicious malware and phishing attacks by
internet content. blocking malicious webpages.
URL filtering can block individual URLs
or categories of URLs.
Within Nuage URL/Web filtering
function, we support 1800+ web
categories and thousands of websites.
Each attempt of the blocked website
access is logged for reporting which can
be used for auditing and compliance.

VSS Simplified security Layer 4 stateful security policies Enables network security admin to
Prevent management (ingress/egress/ forwarding ACLs) can be automate compliance enforcement.
based on ACL defined as a part of the template and Admins can centrally define and
templates automatically inherited for any domain automate enforcement of Layer 4
that is instantiated based on security policies enterprise/tenant-
the template. wide across multiple virtual networks.

7850 Network Services Gateway (Virtualized Security Services) 9


Key features and benefits summary (cont.)

Category Feature Feature Description Benefits

VSS Multi-layer security Top and bottom ACLs can be defined as Multi-layer security policy
Prevent policy management a part of the template to specify all management capability using ACL
using ACL sandwich traffic that should never reach any of sandwich feature enables multiple
the end points or deny traffic that isn’t teams (network security and
explicitly allowed by a matching application team) to manage different
instance ACL. aspects of security policies.

Top and bottom ACLs are combined It enables network security team to
with application-specific whitelist control network-wide security policies
policies/ACLs defined per domain to ensure compliance while providing
instance in the middle layer to form an application teams the ability to specify
ACL sandwich that is both fine-grained application-specific whitelist policies
policy for microsegmentation and for microsegmentation.
compliant with overall network
security policy.

VSS Contextual Visualize traffic flows between groups Provides contextual visibility to
Detect flow of end points (policy groups) within a east-west traffic between VMs,
visualization domain. containers and bare-metal workloads
inside the datacenter, as well as traffic
Select a flow between policy groups and crossing the branch perimeter to
get details on flow (src ip/dst ip/src validate compliance with policy.
port/dst port/ proto, bytes/packets) for
each collection time-interval.

Threat Intelligence Reports on access the branch to high Near real time detection of malicious
based on IP risk and medium risk IP address communication between botnet/
Reputation Uses IP reputation data for high / phishing /malware sites and
medium risk IPs that are updated daily branch/DC endpoints.
from cloud
Top branch IPs communicating with
risky IPs in the Internet
IP reputation, security category (e.g.,
botnet/phishing) and geo location for
each flow is enriched by stats collector
and stored in flow index
Security events (event index) generated
for risky IP access

Threshold Crossing Generate real time alerts based on traffic Detect and alert policy violation, port
Alerts (TCA) metrics. The metrics include - Packets scan, port sweep and DoS attacks.
in/out, Bytes in/out, Dropped packets
in/out, Anti-spoof packets count, Portscan
port count and port sweep IP count, ACL
deny event count, and Anti-spoof
event count.

7850 Network Services Gateway (Virtualized Security Services) 10


Key features and benefits summary (cont.)

Category Feature Feature Description Benefits

ACL analytics Reports based on: Monitor and alert on ACL policy
and alerts ACL allow/deny hits vs. time violations for compliance and early
ACL allow/deny hits by destination PG threat detection.
Top ACLs by # of hits and information
on Flows matching an ACL entry

Traffic analytics Reports based on: Enables detection of security attacks


and alerts TCP conn vs. time based on abnormal spike in network
UDP traffic vs. time traffic (e.g., during DDoS attack).
ICMP vs. time
Ability to define alerts based on traffic
metrics (bytes) at G/zone/subnet
/vPort level

Security event Reports based on: Provides a dashboard view into various
analytics Security events by event type (ACL security events happening in the
Deny, TCA alert event) SDN/SD-WAN environment for
Security events details (source, time, compliance monitoring.
type, context).

Policy based Policy based mirroring provides mirroring Enables detection of advanced
mirroring of select allowed traffic matching an security attacks by selectively
(VCS only) ACL entry. mirroring traffic to security analyzer
for traffic that requires full
packet inspection.

7850 Network Services Gateway (Virtualized Security Services) 11


Key features and benefits summary (cont.)

Category Feature Feature Description Benefits

VSS Alerts with Threshold crossing alerts can be Provides contextual visibility to
Respond automated defined based on metric (average or east-west traffic between VMs,
action absolute) exceeding a specific containers and bare-metal workloads
threshold value over a time period. inside the datacenter, as well as traffic
crossing the branch perimeter to
An automated action can be associated validate compliance with policy.
on a TCA event to moveor add the end
point/vPort to a new policy group.

Metrics include: Packets in/out, Bytes


in/out, Dropped packets in/out,
Anti-spoof packets count, ACL deny
event count, Port Scan port count, Port
Sweep IP countand Anti-spoof
event count.

APIs to automate Incident response systems can automate Shortens remediation process
incident response quarantine of an infected end point by
using VSP APIs.

VSS licensing VSS license per VRS and NSG VSS license per VSD Analytics
enables VRS and NSG to function /Stats node enables Layer 4 flow
VSS capabilities are enabled with a as a securityevent and flow data collection, security analytics, as
feature license on existing VSD, VRS, source, providing near real-time well as alerts with automated
and NSG components for software- information on Layer-4 flows, as policy action.
defined security across datacenter well as security events.
and branch deployments.

www.nuagenetworks.net Nuage Networks and the Nuage Networks logo are trademarks of the Nokia group of companies. Nokia is
a registered trademark of Nokia Corporation. Other product and company names mentioned herein may be trademarks or trade
names of their respective owners. © 2020 Nokia.

Document Code: SR2006044711EN (June) CID200839

You might also like