Security Implications of the Cisco Nexus 1000V

نویسندگان

  • Benjamin D. Peterson
  • Phillip T. Rawles
  • Michael J. Dyrenfurth
  • Raymond A. Hansen
  • Jeffrey L. Brewer
  • Benjamin D Peterson
چکیده

Peterson, Benjamin D. M.S., Purdue University, May 2012. Security Implications of the Cisco Nexus 1000V. Major Professor: Phillip Rawles. Virtualization is a technology that has become increasingly popular with those wishing to reduce the energy consumption of their datacenters. This is especially true since virtualization technology allows multiple physical servers to be consolidated onto a single physical server in the form of virtual machines. Virtual networking devices have been created to allow these virtual machines to communicate amongst each other and with outside networks. Initially these virtual networking devices were crude; however, partnerships such as the one between Cisco and VMware have led to products such as the Nexus 1000V that have improved this network functionality. Despite the creation of the Nexus 1000V, the security implications of using the virtual switch have remained unclear. This research aimed to solve this. The outcomes of this research included tests of vulnerabilities previously or currently found on physical switches, an analysis of the communications used by the Nexus 1000V to support distributed switching, and an analysis of the effects of the switch existing as a virtual machine.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Livestock Production at the Nexus of Resources Competition and Ethnoreligious Cynicism in Nigeria–Implicative Analysis on Food Security

Nigeria is one of the most malnourished and hunger ridden in the league of developing countries; according to reports of Food and Agricultural Organization (FAO) of United Nations estimated daily animal protein intake for developing countries averaged at 4.5 g/head/day at the beginning of this century which has hardly risen to 10 g/head/day into the second decade of the century in Nigeria. This...

متن کامل

Vulnerability Bandwidth Depletion Attack on Distributed Cloud Computing Network: A QoS Perspective

A previous work on Airport Information Resource Management System (AIRMS) established that sophisticated attacks in the form of Denial of Service (DoS), Distributed DoS (DDoS), and related attacks are becoming the most effective schemes used by cyber terrorists on such enterprise systems. Similarly, a novel Smart Green Energy Management Distributed Cloud Computing Network (SGEM-DCCN) was develo...

متن کامل

Priority Flow Control: Build Reliable Layer 2 Infrastructure

This document describes priority flow control (PFC), one of the functions of IEEE 802.1 Data Center Bridging, introduced to address reliability at Layer 2 on the Ethernet medium. PFC enables lossless semantics for a subset of the Layer 2 flows carried on an Ethernet segment. The subset of flows subject to the lossless semantics is identified by the IEEE 802.1p class of service (CoS) information...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013