Register now for better personalized quote!

Cisco Cyber Vision: Under the hood

Nov, 18, 2024 Hi-network.com

It's an exciting time for organizationsthat are migrating to Industry 4.0. Over the last few decades, industrial control systems (ICS)haveenabled modern industrialautomation.Today,Industrial Internet of Things (IIoT) technologies present new opportunities toincrease operational efficiency and launch a new generation of industrial products and services.  

But first, organizationsmust address security.Last week at Cisco Live in Barcelona we announced the first release of Cisco Cyber Vision, a solution designedtoaddress these security challenges so thatorganizations cancontrol cybersecurity risks andcapture the benefits ofIndustry 4.0. 

Protecting industrial operations is a very specific challenge that can't be addressed with traditional IT security tools. Industrial processes can't come to a halt toinstalla patchDisruption can have a devastating impact on human lives and/or the environment. To further complicate matters, attacks can be difficult to detect because they are often custom made and look like legitimateprocessinstructions. 

Cisco Cyber Vision isspecificallydesigned for industrial organizationsto ensure continuity, resilience,and safety of their operations. It provides full visibility into theICS

 

Before we get into pod-to-pod communication, we should first look at how the addresses and interfaces of our environment have been configured.

  • In this environment there are two worker nodes, worker 1 and worker 2, where the pods from the Guestbook application will run.
  • Each node receives it's own /24 subnet, worker 1 is 192.168.1.0/24 and worker 2 is 192.168.2.0/24.
  • These addresses are internal to the nodes; they are not routable in the lab.

 

*** IMPORTANT POINT: ***  Every Kubernetes pod receives its own unique IP address. As we previously saw, you can have multiple containers per pod. This means that all containers in a pod share the same network namespace, IP address and interfaces.

Network Namespaces

Kubernetes and containers rely heavily on Linux namespaces to separate resources (processes, networking, mounts, users etc) on a machine.

"Namespaces are a feature of the Linux kernel that partitions kernel resources such that one set of processes sees one set of resources while another set of processes sees a different set of resources."

"Network namespaces virtualize the network stack.

Each network interface (physical or virtual) is present in exactly 1 namespace and can be moved between namespaces.

Each namespace will have a private set of IP addresses, its own routing table, socket listing, conn

tag-icon Hot Tags : Cybersecurity Networking Internet of Things (IoT) #Security IT Cisco Industrial IoT (IIoT) OT Industry 4.0 Cisco Secure Industrial Networking

Copyright © 2014-2024 Hi-Network.com | HAILIAN TECHNOLOGY CO., LIMITED | All Rights Reserved.