Ready to scale your enterprise beyond limits? How about slashing a whole layer of datacenter infrastructure, saving piles of cash in the process? Or perhaps you’re interested in simplifying your enterprise while adding features, or trying to speed things up without spending money. Sound too good to be true? Well, thanks to a new technology from Cisco, you can have your cake and eat it, too.
Cisco Intelligent Traffic Director (ITD) is poised to disrupt data center load balancing. Combined with best-in-class products, such as Imperva SecureSphere, organizations can deploy and manage massively scalable applications securely with unprecedented ease and cost effectiveness.
What is ITD?
Cisco recently released a new feature, Intelligent Traffic Director (ITD) for the Nexus 7k switches that promises to be a disrupting force in the world of load balancing. There has been an exponential growth in data traffic in the recent years leading to a growth in the deployment of network service appliances in enterprise, datacenter and cloud environments. To address the corresponding business needs, network switch and router architecture has evolved to support multi-terabit capacity. However, service appliance capacity remained limited to few gigabits, an order of magnitude far below switch capacity.
Cisco Intelligent Traffic Director (ITD) is an innovative solution that tries to bridge performance gap between the switch and service appliance(s). It allows customers to deploy service appliance(s) from any vendor with no network or topology changes. With a few simple configuration steps on a Cisco Nexus 5k/6k/7k/7700 series switch, customers can create a service appliance cluster and deploy multiple appliance(s) to scale service capacity with ease. The servers or appliance(s) do not have to be directly connected to the Nexus switch.
Application Security Gartner published a paper called Web Application Firewalls are Worth the Investment for Enterprises in Feb, 2014 that makes the case that “Firewalls and intrusion prevention systems don’t provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications.” Gartner advises enterprises to use a Web Application Firewall (WAF) to protect critical external and internal applications from attacks and threats.
Like other service appliances, a WAF appliance benefits from ITD’s ability to manage large scale traffic loads. Imperva SecureSphere WAF works with ITD, and the combination provides highly scalable application security.
Block attacks with laser precision Accuracy is critical with application security. If you have false positives, you block customers; if you have false negatives, you let the bad guys in.
World-renowned application security research
Shut down malicious sources and bots Imperva’s ThreatRadar Reputation Services help detect bad actors using IP reputation feeds of known malicious sources, anonymizing services, phishing URLs, TOR (“The Onion Router”), as well as IP geolocation data.
Stop application DDOS and business logic attacks
Instantly patch website vulnerabilities It takes organizations an average of 6 months to patch an application vulnerability once it’s discovered. SecureSphere integrates with vulnerability scanners to virtually patch applications.
Gain forensics insights with customizable reports Graphical reports enable organizations to quickly analyze security threats and meet compliance requirements.
Speed up deployment without risk SecureSphere protects applications without impacting performance and without requiring extensive network changes.
Scaling Application Security
Using ITD in VIP Mode to load balance provides a fast and economical way for organizations to provide highly scalable and available infrastructure. By leveraging ITD, an enterprise can deploy a single IP address (the VIP), which is then load balanced across many SecureSphere WAFs, with each one protecting the back-end webservers. This is done right from the 7K – There’s no need for an external load balancer in the middle.
Why is this better than other Load Balancers?
By combining Cisco ITD and SecureSphere’s advanced capabilities to monitor and secure HTTP traffic, several key advantages are apparent:
Eliminates the need for external load balancers, freeing up large amounts of budget and resources
You get the advantages of a proxy-type load balancer (1 single VIP represents many webservers), but still get ‘fail-open’ bridges on WAFs
ITD proxies traffic without interfering with the TCP Source IP Address , allowing SecureSphere to leverage the source IP, User and Session details for blocking and alerting.
To work with SecureSphere, ITD requires no modification to HTTP Headers (e.g., X-Forwarded-For), which can break applications and slow down traffic
What does this mean for the future of high performance WAF deployments?
By teaming up the Cisco Nexus 7K with SecureSphere WAFs, organizations can cost effectively deploy scalable, high-availability WAF farms to handle large amounts of traffic to webservers. As the web traffic increases, WAFs can be seamlessly added to the pool to scale up with the enterprise. Since every port on the 7K can be used as a load balancer this provides the potential to scale up to multi-terabits of throughput to a SecureSphere WAF cluster.
In conclusion, ITD and SecureSphere provides simple, cheap, fast, scalable, and reliable security infrastructure. Sort of like having your cake, with icing, and cherries on top – and eating it, too.
Hi, I have an organization which has the roaming client installed on the endpoints, which is being used to protect endpoints remotely from an organization, said organization has another umbrella dashboard in which it is deploying the umbrella branch ...
Hello. We use an ESA for Multi-Tenancy. Is it possible to generate reports per RAT domain ? I'm curious the quantity of mail that went to a specific domain hosted on the ESA, not on the whole appliance. Thanks!
Hello,on an FPR-1010 device (Version FTD 6.6.1), simply managed by FDM, I configured an Anyconnect VPN remote access with certificate based authentication. Cisco support team told me, the only way to configure CRL checking for revoced certificates is the ...
I'm looking at deploying an AC upgrade to our clients, and already have it set up on the ASA using webdeploy, but I'm concerned I wont hit clients that dont use VPN regularly, but who are on the enterprise network.We use Umbrella and I was considering ena...