Software Defined Secure Networks: An Interview with Ken O’Kelly, Consulting Engineer, Juniper Networks

Ken O’Kelly has been a key consultant in Juniper Networks; UK and Ireland security business for the past four and a half years. He previously held various roles (latterly as a security architect) during a 14 year stint with Imtech ICT.

Ken tells Axians about Juniper’s latest software defined security network (SDSN) solution and how it will make life easier for  IT departments tasked with controlling network access for thousands of users.

Q: What is Juniper’s software defined security network (SDSN)?

SDSN is all about changing how you build the network. Traditionally organisations have tended to build security into the perimeter and everything outside that perimeter is untrusted and everything inside it is trusted. That is a bit of a challenge these days given that we all take our laptops and smartphones outside of that trusted barrier when we go home, where malware can infect them and vulnerabilities can be compromised. We then bring the device back inside the network perimeter and now it is trusted again and that gives any threat carte blanche to get around the network.

SDSN doesn’t just put enforcement around the perimeter, but puts it right down to the ports inside the network. Not just the switches, but the routers, the WAN infrastructure and the firewalls too.

Q: How does SDSN co-ordinate effective network security?

One of the key SDSN components is the policy enforcer, which ties all those firewalls, switches and routers together into a secure fabric. So if I am a user and I browse a website where I encounter malware, it comes through on the firewall which routes it onto the anti-malware service to get checked.

Q: So how does the Anti Malware work?

The anti-malware service has a number of steps. It looks to see if it has seen that threat before, and if it has it will send it back to the firewall to block it. If it is a threat it has not seen before it will send it off for more detailed analysis. The malware goes into what is effectively a sandbox, but in our sandbox we perform some provocation and interception techniques to try and fool that malware into executing.

Obviously that takes a bit of time, so what happens then is that if we identify the piece of software as malware we will send a message to the policy enforcer which will decide based on the policy the IT department has set up on what actions to take.

Q: How will the SDSN solution develop over the next 12 months?

Though it is not in its first version, the Policy Enforcer will effectively become an ecosystem that allows other vendors to plug into it. We have partnerships with a number of specialist malware detection companies for example, one being ATTIVIO. The ATTIVIO platform can tell the Policy Enforcer it has detected malware coming from a specific machine and gives it the choice again of pushing the policy out onto the switches, the firewalls and/or the routers and either taking that machine or the traffic off the network.

In the second phase of SDSN we will be able to talk to VMware NSX and Juniper Contrail network virtualisation platforms and be able to effect policies within the SDN overlay. So maybe if a virtual machine (VM) is being compromised or is sending out bad traffic, again we can effect policies to move those VMs out or even if necessary spin up containerised or virtual firewall to redirect traffic through isolated parts of network and create a micro-segmented environment.

Q: How is SDSN deployed within the network?

The Policy Enforcer works in conjunction with our Junos Space network management platform and Security Director application to manage Juniper routers, switches and firewalls. Security Director is specifically the application for managing firewalls and that will have the Policy Enforcer components as part of it. It will talk to the firewalls using Security Director, to the switches using a switching micro service and it will have a similar setup for talking to the routers in the near future too. Junos Space can be deployed on a piece of hardware from Juniper or you could try it on a VM.

Most or our beta customers do apply it as a VM, they don’t tend to go for the hardware these days.

Q: Does SDSN favour networks built on Juniper hardware?

The first iteration of SDSN is geared very much towards Juniper products – SRX firewalls and EX/QFX switches now and MX routers later. But it is very much the vision to support third party products in the future – branded equipment from other leading manufacturers in the market. In reality not everybody is an end to end Juniper customer, most are a blend of Juniper and other vendors so we would need to be able to support those vendors. It is becoming easier to do that because most of them support open frameworks like the Yang data modelling language. Using Yang models makes it much easier to communicate with third party equipment. The challenge is that Yang tends to be rolling out on newer network equipment and how many third party vendors we can support will depend on how many of those newer devices are out. We want to make sure it works on our own products first because it is easier to test that way, and worry about third parties at a later stage once we have fully baked the solution.

Q: What industry sectors do you see potential demand for SDSN?

We are not limiting ourselves to one particular area. SDSN is very much applicable to campus and branch networks and enterprise and communication service provider networks. If I was to pick one specifically campus and branch would probably be seen as the sweet spot. We have also discussed the solution with network and content service providers who want to protect their own network, so if suddenly they find customers are downloading massive amounts of malware they may be able to action and isolate routes on their network to control that on a dynamic basis.

Read more about SDSN from Axians Strategic Partnership Page
or Contact us from our website here

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s