« Version 4.1 - 5.10.c PKI | Main | Version 4.1 - 5.12 Cisco Catalyst 6500 Series ASA Services Modules »

Version 4.1 - 5.11 Virtual Security Gateway

Cisco's Virtual Security Gateway is " is a virtual firewall appliance that provides trusted access to virtual data center and cloud environments. The Cisco VSG enables a broad set of multitenant workloads that have varied security profiles to share a common compute infrastructure in a virtual data center private cloud or in a public cloud. By associating one or more virtual machines (VMs) into distinct trust zones, the Cisco VSG ensures that access to trust zones is controlled and monitored through established security policies."

Integrated with either the Cisco Nexus 1000V Series switch or the Cisco Cloud Service Platform and running on the Cisco NX-OS operating system, the Cisco VSG provides the following benefits:

+ Trusted multitenant access—Zone-based control and monitoring with context-aware security policies in a multitenant (scale-out) environment to strengthen regulatory compliance and simplify audits. Security policies are organized into security profile templates to simplify their management and deployment across many Cisco VSGs.

+ Dynamic operation—On-demand provisioning of security templates and trust zones during VM instantiation and mobility-transparent enforcement and monitoring as live migration of VMs occur across different physical servers.

+ Nondisruptive administration—Administrative segregation across security and server teams that provides collaboration, eliminates administrative errors, and simplifies audits.

So basically, this is a virtual firewall (using a 1000V) for your virtual environments.

"You can transparently insert a Cisco VSG into the VMware vSphere environment where the Cisco Nexus 1000V distributed virtual switch is deployed."

"The Cisco Nexus 1000V Series switch port profile dynamically provisions network parameters for each VM. The same policy provisioning carries the network service configuration information so that each VM is dynamically provisioned with the network service policies when the VM is attached to the port profile."

"The security administrator creates the security profile in the Cisco Prime NSC, and the network administrator associates it to an appropriate port profile in the VSM. The security profile defines custom attributes that can be used to write policies."

"You can use a firewall policy to enforce network traffic on a Cisco VSG. A key component of the Cisco VSG is the policy engine. The policy engine uses the policy as a configuration that filters the network traffic that is received on the Cisco VSG."

"A policy is bound to a Cisco VSG by using a set of indirect associations. The security administrator can configure a security profile and then refer to a policy name within the security profile. The security profile is associated with a port profile that has a reference to a Cisco VSG."

A policy is constructed using the following set of policy objects:

Object Groups
Zones
Rules
Actions

Being relatively new, this may likely show up on the exam. However, if you know and have worked with VMs and know and worked with firewalls, the intersection of the two should not be all that difficult. However, I would check out the VSG site and some of the product literature. There's a tendency to use some of the marketing terms in questions which can be confusing if you're not familiar with Cisco's terms.


Sections

Powered by
Movable Type 3.2