Utilizing OpenStack Network Service Function Chaining for Network Security.
Switch branches/tags
Nothing to show
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Permalink
Failed to load latest commit information.
Packer/modsec
Terraform
AboutThisWorkshop.md
LICENSE
Lab0-create.sh
Lab0-delete.sh
Lab0.md
Lab1-Answers.sh
Lab1.md
Lab1.template
Lab2.md
Lab2.template
Lab3-answers.md
Lab3.md
Lab3.template
Lab4-answers.sh
Lab4.md
README.md
Virtualized Security Functions in Layer 2.pptx
_config.yml

README.md

ServiceChains

Overview

This workshop will teach you how to use network rule chains to push traffic through security functions. This allows security functions, such as network monitors, IDS/IPS, web filters and web proxies, to be placed inline with the network traffic without having to route traffic through layer 3 IPs.

To learn a little more about this workshop, how it came about, why it makes sense to run layer 2 service chains and how the lab is configured, please read:

Cloud Assignments

Each workshop attendee is provided an OpenStack cloud preconfigured with the required networking plugins to support service chains. When you arrive at the workshop, you'll be assigned a lab (IP address) and a password.

As part of this workshop, each attendee will be assigned a physical server running their own private OpenStack cloud. This physical server can be access via SSH and the Horizon GUI. Each physical server has 32 GB of RAM and 6 floating IP addresses. This allows six virtual machines to run comfortably in the cloud. The floating IP addresses allow remote network access to the virtual machines.

Workshop Exercises

This workshop consists of a number of exercises going from the basics through more advanced configurations. Once you've completed the steps below to familiarize your self and configure the lab, please proceed to the exercises.

Answers

If you get stuck, the "answers" to the lab are available as a list of command lines.