It is now common knowledge that micro-segmentation can strongly compliment a good security plan. But with typical IP routed networks this is not an easy thing to do. Route policies and access control list can quickly become unmanageable. It is then that security holes can creep into the network either by misconfiguration or blatant forgetfulness. Such a hole could exist for quite some time before it is discovered either by a security analyst or worse yet a cyber-criminal. Additionally, these methods are complex and very intense from an operational perspective. So many enterprises simply don’t do it or do it in a very limited form.
The combination of these technology traits yields a networking protocol architecture that can under the right design circumstances yield totally black and isolated networks. We refer to this as Stealth Networking. Due to the fact that there is no role that IP provides in the establishment of the network as well as the fact that there is a rather absolute separation of the user access from the network service plane, Fabric Connect can yield what we term as hyper-segmentation.
Unlike normal micro-segmentation or even virtualization overlays which assume the use of an IP routed core, Extreme Networks’ Fabric Connect is based purely on Ethernet with no use of IP underlays. IP as a protocol becomes a ‘service phenomenon’ at the fabric edge. This occurs for VLAN’s as well. The end result is a very strong segmentation environment that is quite difficult to not only penetrate but even simply enumerate. This removes some very important rungs in the ladder for a would-be attacker, the ability to ‘see’ and the ability to ‘move’.
We are holding a Fabric Connect Hack-A-thon to prove the claims that we have made above. We are so confident in the technology that we will be offering a $10,000 prize to anyone who successfully reaches the targets that are provided.
Do you think you have what it takes to win the prize? Well, a little word of warning… many have tried but no one has succeeded yet. Maybe you will win but even if you don’t, more importantly, you will get to know one of the most secure networking technologies on the planet.