




版權(quán)說(shuō)明:本文檔由用戶(hù)提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
Version:v.0.4DocumentntialLeveloGTIOperatorMembersGTIPartnersWorkingGroupskTaskTPMPJ5GEndogenousSecuritycemembersrtmembersJiaChen(CMCC),LiSu(CMCC),KaiYang(CMCC),PengRan(CMCC),CancanChen(CMCC),YuhangZhao(CMCC),HaiyangSu(CMCC),HaiyanZhao(CMCC),XinmiaoYang(CMCC),DongjieLu(CMCC),YiJiang(CMCC),MingXiaBo(CT),BanglingLi(CMCC) (06-08-2023)ApprovalDate2onfidentialityThisdocumentmaycontaininformationthatisconfidentialandaccesstothisdocumentisrestrictedtothepersonslistedintheConfidentialLevel.Thisdocumentmaynotbeused,disclosedorreproduced,inwholeorinpart,withoutthepriorwrittenauthorizationofGTI,andthosesoauthorizedmayonlyusethisdocumentforthepurposeconsistentwiththeauthorization.GTIdisclaimsanyliabilityfortheaccuracyorcompletenessortimelinessoftheinformationcontainedinthisdocument.Theinformationcontainedinthisdocumentmaybesubjecttochangewithoutpriornotice.機(jī)密性:本文件可能包含機(jī)密信息,而對(duì)該文件的訪問(wèn)權(quán)限僅限于機(jī)密級(jí)別的人員。在TI改,恕不另行通知。ry31SASEOverview42ScenarioRequirementsAnalysis63OperatorSASEFramework84TelecomOperatorsSASEApplicationCases5Outlook6Summary41SASEOverview1.1BackgroundWiththewidespreadadoptionofmobilenetworksandcloudcomputing,enterprisedigitaltransformationisaccelerating.Thecorebusinessandcriticaldataofenterprisesarebeingtransferredfromtraditionaldatacenterstothecloud.Atthesametime,theoperationmodeandworkstylesofenterprisesarebeingchangedsignificantly,withthepopularizationofmulti-pointofficeandremote/mobileoffice.Traditionalnetworksecurityarchitectureisnolongersuitableforthetrendofbusinessdigitizationandcloudization.Forexample,traditionalsecuritystrategiesareprimarilybasedonboundaryprotection,whichsetsupsecuritydevicesatthenetworkboundaryoftheenterprisetoprotectitsnetworkanddata.Howeverbusinessdigitizationandcloudizationhaveblurredtraditionalnetworkboundaries,andstackingmultiplesecuritytechnologiesmayincreasethecomplexityofenterprisesecuritysystems,leadingtooperationaldifficultiesandedefficiencyIntheprocessofbusinessdigitaltransformation,enterprisesneedtoflexiblyconfiguretheirnetworkandsecurityservicestocatertovariousnetworkaccessscenarios,andprovidesecuritythatmeetsexperienceandpolicyrequirements.In2019,GartnerintroducedSASE(SecureAccessServiceEdge)intheirreport"HypeCycleforEnterpriseNetworking2019",whichtheybelievedwasthesolutiontothisproblem.1.2DefinitionAccordingtotheGartnerreport‘TheFutureofNetworkSecurityIsintheCloud’,thesecureaccessserviceedgeisanemergingofferingcombiningcomprehensiveWANcapabilitieswithcomprehensivenetworksecurityfunctions(suchasSWG,CASB,FWaaSandZTNA)tosupportthedynamicsecureaccessneedsofdigitalenterprises.SASEsupportsbranchoffice,remoteworkerandon-premisessecureaccessusecases.SASEisprimarilydeliveredasaserviceandenableszerotrustaccessbasedontheidentityofthedeviceorentity,combinedwithreal-timecontextandsecurityandcompliancepolicies.1.3BenefitsWithSASE,enterprisescaneliminatetheeffortandcostsrequiredtomaintaincomplexandfragmentedinfrastructuremadeofpointsolutions.SASEalsoobtainsmoreflexible,efficient,andsecurenetworkandsecurityservicestobettercopewiththegrowingchallengesofmodernnetworksplicitySASEintegratesnetworksecurityservicesintocloudplatforms,providingidentity-centeredsecurityprotection.Itdeterminesroutingselectionandaccesslevelbasedoncomprehensivetrustevaluationofroles,deviceinformation,userbehavior,location,andother5features,andformulatesaunifiedsecuritypolicyfortheentirenetwork,protectingenterprisenetworksandachievingnetworksecurityanddatasecurityinablurrednetworkboundaryenvironmentwithoutanydeviceorlocationrestrictions.2.EfficiencyTheSASEsecurityframeworkcansinksecurityandnetworkcapabilitiestoPoP,CPEs,orcontrolledterminals.Branchesanduserscanaccessnearbyaccordingtotheirneeds,reducingthemiddlelinkofdatatransmission,therebyreducingnetworklatencyandpacketlossandimprovingnetworkperformanceandefficiency3.SecuritySASEintegratesmultiplesecurityfunctionsononeplatformwithabundantservices.Byusingintelligentproxytechnology,alldataflowsthroughunifiedsecuritycontrolanddetection,therebyimprovingsecurityandreliabilityandreducingtheriskofdataleakageandattacks.4.FlexibilityWithSASE,enterprisescanflexiblyexpandandcustomizecloudoredge-sidesecurityfunctionsaccordingtotheirbusinessscenariostomeetthenetworksecurityneedsofdifferentbusinesses.1.4AdvantagesforTelecomOperatorsAsprovidersofnetworkinfrastructure,telecomoperatorshavesignificantadvantagesinbuildingSASEcomparedtootherindustries,specificallyintermsofthecomprehensivenetworkinfrastructure,thestrongstandardpromotioncapability,andthehighbrandinfluenceadvantageOperatorsalreadyhaveanetworkinfrastructurethatcoverstheworld,providinghigh-reliabilityandhigh-performancenetworkservicesglobally,savingotherindustries'investmentcostsinconstructingandmaintainingthenetworkinfrastructure.Inaddition,operatorshaveyearsofexperienceandresourcesinthesecurityfieldandcanprovidecomprehensivesecuritysolutionsforenterprisestoensuretheirnetworksecurity.Also,SASEPoPscanreusenetworkaccesspointsandcloudresourcepoolsdeployedbyoperatorsinvariouslocations,andSASEedgedevicescanreusenetworkCPEsofoperators,therebyreducingtheimplementationcostofSASE.2.StandardadvantageBypromotingthedevelopmentofenterpriseandindustrystandards,operatorscanintegratethenetworkandsecuritycapabilitiesofvariousmanufacturers,andprovideenterprisecustomerswithafull-stack,optimalnetworkandsecuritycapability.3.BrandadvantageOperatorshaveawiderangeofindustrycustomerbaseandstrongbrandeffect.SASEservicespromotedbyoperatorsaremoreeasilyacceptedbyenterprisecustomers.Inaddition,addingsecuritycapabilitiestoexistingnetworkservicesmakesiteasierforuserstoaccept.6InternetWideAreaNetworkBranch1RemoteUserCustomerCloudDataInternetWideAreaNetworkBranch1RemoteUserCustomerCloudDataCenter2ScenarioRequirementsAnalysis2.1Scenario1:WideAreaNetworkInterconnectThetraditionalenterprisenetworkiscenteredaroundtheheadquarter,withcommunicationbetweenbranchesandaccesstotheinternetgenerallypassingthroughtheheadquarterwhereunifiedsecuritymeasuresaredeployed.Inawideareanetworkscenario,itisnecessarytoachieveflexibleinterconnectionamongmultipleentitiesacrossthenetwork,andthereisagreaterneedforinterconnectionbetweenbranchesandthecloud.Directbranchaccesstotheinternetisalsobecomingmorecommon.Enterprisesshouldstrengthennetworksecurityprotection,performsecuritydetectiononendpoints,andensuredatasecurityinservers.Enterprisesneedtodedicateencryptedtransmissionchannelstopreventdatatheftandtampering.BoundarysecuritydevicesneedtobedeployedtoprotectagainstDDoSattacksandnetworkintrusionsfromtheinternet.Inaddition,topreventunauthorizedaccesstobranches,clouds,andheadquarters,anidentityauthenticationmechanismshouldbedeployedamongbranches,clouds,andheadquarters.BranchBranch2eanetworkinterconnect2.2Scenario2:Mobile/RemoteAccessWhenemployeesworkremotely,andwhencustomersorthirdparties(contractors,partners,etc.)accessenterpriseservices,theyneedseamlessaccesstoenterpriseapplicationslocatedinthecloudanddatacenters,whilealsobeingabletoaccesstheinternet.Enterprisesneedtoprovidesecurityprotectionstrategiesattheendpoints,inthecloud,andattheenterpriseheadquarters.Enterprisesshouldstrengthensecurityprotectionfromtheterminal,network,andserver.Topreventtheaccessterminalfrombeingusedasaspringboardtoattacktheinternalnetworkandapplications,enterprisesshouldprotectthesecurityofemployees'officeterminals,suchaspreventingvirusesandintrusions.Accessfromclientendpointsandthird-partyendpointsshouldberestrictedtopreventingnetworkthreats,suchasdeployingwebprotectionfacilitiesandantivirusfacilities.Afteraterminalaccessesthenetwork,itisessentialforenterprisestoauthorizetheidentityoftheusersandmonitortheirbehaviortoensuresecurity.Moreover,enterprisesalsoneedtomonitorencrypted/non-encrypteddatastreamstoprevententerprisedatafrombeingleakedortampered,anddetectenterprisedatadownloadedbyaccessterminalstopreventdatafromdownloadingorobtainingunauthorized.7InternetWideAreaNetworkBranch1RemoteUserCustomerInternetWideAreaNetworkBranch1RemoteUserCustomerInternetWideAreaNetworkBranch1RemoteUserCustomerInternetWideAreaNetworkBranch1RemoteUserCustomerCCloudDaDataCenterBranchBranch2reMobileremoteaccess2.3Scenario3:BusinessMigratetotheCloudIncertain5GandIoTusecases,lowlatencyandhighreliabilityareessential.Toachievethis,trafficmustbeforwardedtolocaledgecomputingnodesforrapidcomputationandprocessing.Besides,oncethedataisprocessedbytheedgecomputingnodes,theresultscanbeuploadedtothecloudordatacenter.Enterprisesneedtostrengthenendpointsecurityandprotectdatasecurity.Whentheprivatenetworkisconnectedtothepublicnetwork,accessdevicesneedtobeauthenticatedtopreventspoofeddeviceaccess;DDoSattacksandnetworkintrusionfrommassiveprivatenetworkdevicesneedtobeprevented;addressobfuscationforprivatenetworkdevicesisneededtopreventsensitiveinformationleakage.Edgecomputingnodesneedtoimplementsecurestorageofdatatopreventuserdataleakage;toensureedgedevicesfromdifferentindustriescanaccesstotheindependentnetwork,computing,andstorageresources,resourceisolationshouldbeimplemented;encryptionsecurechannelsneedtobeestablishedbetweenprivatenetworkdevicesandedgecomputingnodes,andbetweenedgecomputingnodesandcloud/datacenters,toprotectdatasecurity.Inactualcommercialoperatingenvironments,singleaccessscenarioisgenerallyunabletomeetenterpriseneeds.Enterprisenetworksoftenoperateinmixedscenarioscomposedofmultiplebasicaccessscenarios,forexample,amultinationalcateringcompanyhasbranchesaroundtheworldthataccessthecentraldatacenter,andemployeesorthirdpartiesneedtoaccessitremotely.CCloudDatDataCenterBranchBranch2gurebusinessmigratetothecloud2.4Summary8SD-WANWideAreaInterconnection TLS/IPSec...SD-WANWideAreaInterconnection TLS/IPSec...WGTelecommuting/RemoteAccessZTNARBIPrivateNetworkAccessaSWAF/CASBBasedontheaboveapplicationscenarios,thecorrespondingsecurityrequirementsandcapabilitiesofthescenariosundernewbusinessaresummarizedinFigure2-4.siesAntiDistributedDenialofServiceNetworkNetworkRoutingTrafficEncryptionProvidedifferentQualityofServiceaccordingtothebusinessauditeuser'sonlinebehaviorTerminalTerminalSecurityAccessControlSecurityprotectionforUnmanageddeviceaccessprocessContinuousassessmentoftrustManytypesofcontentfiltering,suchasemail,FTP,IM...AnonymizationofuserandterminalprivacydatainformationleakagepreventionServerprotectapplicationandAPIsTrafficfiltering,intrusiondetectionandpreventionSecuredatastorageDataIsolationinaMultitenantSystemAntivirusandMalwareProtectionFigurerequirementsandcapabilitiesofthescenarios3OperatorSASEFramework3.1SASEKeyCapabilitiesvesfivekeycapabilitiesincludingSDWANZTNASWGCASBand?SD-WANisthefoundationoftheentireSASEarchitecture,providingtrafficorchestration,unifiednetworkmanagement,on-demandnetworkserviceactivation,andtheabilitytointegratenetworkandsecuritytoachievedynamicroutingandsecureaccesscontrol,tomeetnetworkconnectivityandsecurityrequirements.?ZTNAisthemostcriticalsecuritytechnologyinSASE,which,basedonuseridentity,userbehavior,deviceinformation,networkpackets,andapplicationinformation,usesdynamicpermissionmechanismstomeetthedemandforsecureaccess.?SWGisusuallydeployedonthegatewaythatprovidesexternalaccessforinternalusersinacompany,toachievetrafficinspection,filtering,andbehaviorcontrolforinternalemployees,avoidsensitivedataleakage,toprovideprotectionforusers.?CASBisusuallydeployedonthecloudservicesidetomonitorcloudresources,ensuredatasecurity,detectandrespondtomaliciousaccess,andpreventsensitivedataleakage,tomeettheprotectionrequirementsofcloudservices.?FWaaS(includingIPS/IDS)isusuallydeployednearthecriticalnodesthatstoredataresourcesindatacentersandbranchoffices.Basedonuserprotectionpolicies,itfiltersnetworkpacketsandapplicationdata,tomeettheprotectionrequirementsofcriticalpositions.9?Othersecuritycapabilities,suchasWAAP,SDP,RBIandNetworksandbox,areusedtomeetthedemandsforwebapplicationprotection,networkinvisibility,browsersecurity,andotherrequirements.3.2SASEFunctionalFrameworkTomanagetheabovenetworkandsecuritycapabilities,acompleteSASEarchitecturemustincludenetworkandsecuritycapabilitymanagement,orchestrationandconfigurationmanagementfunctions,capabilityconfiguration,datavisualization,andtenantmanagement,aswellasinfrastructuretodeployallfunctions.Therefore,thebasicfunctionalframeworkofSASEisasfollows:TenantmanagementSecurityalertSASETenantmanagementSecurityalertCapaCapabilityconfigurationDatavisualizationNetworksecuritycollaborativeorchestrNetworksecuritycollaborativeorchestrationNetworkfunctionmanagementSecurityfunctionmanagementBBusinessorchestrationSASEkeycapabilitieslayerSD-WANTLS/IPSecSWGZTNAaaSWAF/CASBServerresourcelManServerresourcelManagedendpointCCPEigureSASEFunctionalFramework?TheSASEmanagementpresentationlayeristheinterfacethatSASEpresentstousers,providingfunctionssuchascapabilityconfigurationanddatavisualizationtousers;?TheSASEorchestrationsupportlayerisresponsiblefortheorchestrationandmanagementofnetworkandsecuritycapabilities.Itanalyzesuserbusinessrequirements,collaborativelyorchestratesandmanagesnetworkandsecurityfunctions;?TheSASEkeycapabilitylayerprovidesnetworkandsecuritycapabilitiesforvariousriodemandsintheSASEframeworkASEinfrastructurelayeristhesoftwareandhardwareinfrastructurefordeployment,operationandmaintenancemanagement,keytechnologies,andbasicsupport,includingbutnotlimitedtoCPEs,PoPs,resourcepools,controlledterminals,servers,andotherdevices.3.3OperatorSASEDeploymentArchitectureOperatorscanusetheirexistingnetworkstobuildanoperatorSASE.ThedeploymentarchitectureofoperatorSASEisasfollowsCASBPoPFWaaSSWGFWaaSInternetSASEedgedevices:SD-WANCPEInternet/MPLSSASEedgedevices:UserterminalZTNACASBPoPFWaaSSWGFWaaSInternetSASEedgedevices:SD-WANCPEInternet/MPLSSASEedgedevices:UserterminalZTNA HybridcloudPoPPrivatecloudPoPPPoPSASEcloudecPoPCompanyemployees/BranchDatacenterCustomers/thirdpartiesFigureSASEDeploymentReferenceFrameworkSASEPoPsarepartoftheSASEinfrastructurelayer,controlledbytheSASEorchestrationsupportlayer,andcarrytheSASEkeycapabilitylayer.SASEPoPscandeployvariousnetworkandsecuritycapabilitiesondemandandarethemainimplementationpointsforSASEnetworkandsecurityfunctions.SASEPoPscanreusenetworkaccesspointsandcloudresourcepoolsdeployedbyoperatorsinvariouslocations,therebysavingtheconstructioncostofSASE.SASEcloudisamulti-tenantcloudcomposedofSASEPoPs,whichintegratesvariousnetworkandsecurityfunctionsofoperatorsandprovidesthemtoaccessusersunderthecoordinationandmanagementoftheSASEmanagementplatform.SASEedgedevices,includingcontrolledterminalsandCPEs,arepartoftheSASEinfrastructurelayer,controlledbytheSASEorchestrationsupportlayer,andcarrytheSASEkeycapabilitylayer.SASEedgedevicescanintroduceusertrafficintotheSASEcloudthroughencryptedchannels,andcanalsodeployvariousnetworkandsecuritycapabilitieswithlowerresourcerequirementsondemand,thusensuringtheflexibilityoftheSASEframework.SASEedgedevicescanreusenetworkCPEsofoperatorstosavethecostofSASEconstruction.TheSASEmanagementplatformisaunifiedvisualandmanageablecontrolplatformthatcarriesthemainfunctionsoftheSASEorchestrationsupportlayerandthemanagementpresentationlayer.Itisresponsiblefortheunifiedmanagementofnetworkandsecuritycapabilities,theconfigurationofnetworkandsecuritypolicies,visualization,andoperationandmaintenancefunctions.Customerscansubscribetonetworkandsecurityservicesasneededandselectivelyenableconfigurationservices.TheSASEmanagementplatformcanbeintegratedasapartoftheoperator'snetworkmanagementplatform,reducingthecostofSASEconstructionandusage.WhencarriersbuildtheSASEframework,theyusuallyusethefollowingtwomodes:debasedonpublicnetworktunnelInternetUserSASECloudTargetUserSASECloudreSASEmodelbasedonpublicInternetTheoperatorestablishesatunnelonthepublicnetworktodivertusertraffictoSASECloudfornetworkandsecurityprocessingandthendivertsittothetargetbusiness.Thecommonimplementationmethodisthattheoperatordeployssecurityandnetworkcapabilitiesinpublicclouds,networkclouds,andotherlocationstoestablishmultipleSASEPoPsthroughoutthenetworktoformSASECloud.Then,throughtheSASEmulti-tenantmanagementplatform,theoperatorcancallandmanagethesecapabilities.UsersinstallSASEAgentontheirPCsandmobiledevicestoestablishapublicnetworktunnelwiththenearestSASEPoPtoaccessSASECloud.Whenusersaccessthetargetbusiness,theaccesstrafficisdivertedtoSASECloudthroughthepublicnetworktunnelfornetworkandsecurityprocessing,andfinallydivertedtothetargetbusinesstocompletethesecureaccessprocess.Thismodeltargetssmallandmedium-sizedenterprisesandindividualusers,focusingonprovidingcost-effectivesecurityandnetworkservices,achievingflexiblemobile/remoteaccess,andaccessingtargetbusinessesacrossoperators.TheSASEserviceunderthismodeldoesnotrequireassociationwithleasedlinesorSDWANandothernetworkservices.SASEmodelbasedonleasedline/SD-WANSASECloudTargetbusinessdelbasedonleasedlinesSDWANTheoperatordivertsusertraffictoSASECloudfornetworkandsecurityprocessingughleasedlinesSDWANandthendivertsittothetargetbusinessThecommonimplementationmethodisthattheoperatorcustomizesthedeploymentlocationofnetworkandsecuritycapabilitiesandtheSASEmanagementplatformbasedonuserneeds.Thesecuritycapabilitiesandmanagementplatformcanbedeployedinedgeclouds,userintranetservers,privateclouds,networkclouds,andotherlocationsclosetotheuser.UsersaccesstheleasedlinesthroughCPEdevicesandconnecttoSASECloud.Whenusersaccessthetargetbusiness,theaccesstrafficisdivertedtoSASECloudthroughtheleasedlinefornetworkandsecurityprocessing,andfinallydivertedtothetargetbusinesstocompletethesecureaccessprocess.Thismodeltargetslargeenterprisesorgovernmentagencieswithmultiplebranches,focusingonprovidinghigh-qualityandefficientnetworkandsecurityservices.TheSASEserviceunderthismodelisassociatedwithleasedlinesorSD-WANandothernetworkservices.Therefore,thismodelcandeploynetworkandsecuritycapabilitiesandSASEmanagementplatformslocally,inedgeclouds,privateclouds,etc.,andcustomizeusertrafficpologytomeetuserneedsinsecurityprivacyandnetworkqualityofserviceInspecificimplementations,operatorscanmixtheabovetwomodels.Forexample,theycanusemodel1whenusersworkremotelyormove,andusemodel2whentheyworkwithintheenterpriseoraccesscorebusinessestomeetthedifferentiatedneedsofusersinmultiplescenarios.4TelecomOperatorsSASEApplicationCases4.1Case1:WANInterconnectionofMultinationalCorporationBackground:Duetonationalpolicies,multinationalcorporationneedtoconvergetheirexposureAndtheyneedtofilterandmonitorthetrafficonthedatasinknodetoensureonlinebehaviorcompliance.Requirement:ConstrictaccesstotheInternet.TrafficisaggregatedtounifiedInternetexportsintheregionalcenterthroughaleasedWANlineinalargebranchorheadquarterstomeetthetrafficcollectionrequirements.Protectthecommunicationbetweenbranchesandtheheadquarter.ProtectandregulatetheaccessofbranchesandtheheadquartertotheInternet.Preventmalware,maliciousconnections,anddataleakage,andunauthorizedaccesstoresourcesAndimplementonlinebehaviorcompliance.tionSolutionforWANInterconnectionofMultinationalCorporationThissolutionisbasedonSD-WANtrafficdiversion.TheusertrafficisdivertedtotheSASEservicesystemthroughtheroutingdevicesontheInternetexportsandPoPsinworksecurityprocessingDeployenoughFWaaSsthatmatchtheperformanceoftheInternetexports.RoutingdevicesontheInternetexportsprovidetrafficdiversiontotheFWaaSsbytenants.Usesecuritycapabilities,suchasapplicationfirewall,intrusionprevention,virusfiltering,URLfiltering,andbandwidthmanagement,toensurethesouthboundandnorthboundsecurityoftheFWaaSsDeployenoughFWaaSsthatmatchtheperformanceonPoPs.RoutingdevicesonPoPsprovidetrafficdiversiontotheFWaaSsbytenants.Usesecuritycapabilities,suchasapplicationfirewallandintrusionprevention,toensuretheeastboundandwestboundsecurityoftheFWaaSs.lFWaaSsaremanagedbytenantsinacentralizedmannerOperators’Advantages:Foronething,operatorshaveanationwidewideareanetwork.AndtheyhavetheinfrastructureneededforacompleteSASEsystemandtheinherentadvantagesofworkingwithvarioussecurityvendors.TheycandeployFWaaSsandvarioussecuritycapabilitiesattheInternetexportsandPoPs.Foranotherthing,operatorshaveawidercustomerbaseandaremoretrustedbygovernmentandenterprisecustomerstoprovideenientlyandsecurely4.2Case2:MobileOfficeandRemoteOfficeofInsuranceindustryBackground:Themobile/remoteaccessterminalsoftheemployeemaybecometheentrypointforattackersandthechannelforenterpriseinformationleakage.Requirement:Enterprisesneedtodeployunifiedmanagementandsecurityprotectioncapabilities,suchasmaliciouswebsitefiltering,mailsecuritydetection,andanti-virus,foremployees’terminals.Enterprisesalsoneedtoidentifyemployees,monitortheirbehaviorsandcontinuouslyconductreal-timetrustevaluationsbasedontheirbehaviors.Enterprisesneedtoencrypttransmitteddatatopreventdataleakageandtampering.utionFigureSASESolutionforMobileRemoteOfficeofInsuranceindustryThissolutionisbasedonpublicnetworktunneltrafficdiversion.TheusertrafficisdivertedtotheSASEcloudthroughasecuretunnelonthepublicnetworkfornetworkrityprocessingThecontrolcenterofSASEissetinthecloud,andtheuseredgedeploysmultiplePoPsondemand.OfficeterminalsdeploySASEclientwithdrainagefunction,whichisresponsibleforestablishingasecuretunnelonthepublicnetworkanddivertingemployees'InternettraffictoPoPs.SASEPoPsdeploymultiplesecuritycapabilitiestoensurethesecuritythroughoutthemobile/remoteaccessprocess.PoPsprotectagainstunknownthreatsthroughadvancedthreatdetectionandprotectionmodule,loadEDRmoduletorealizefasteventresponse,loadzerotrustonlinebehaviormanagementmoduleandDLPmoduletoensureenterprisesecurityThetrafficofemployees’mobile/remoteaccessterminalsisdivertedtotheedgePoPsthroughtheSASEclient.TheidentitymanagementmoduleonPoPsverifiesthereal-timeidentityinformationtomaintaintheminimumemployees’accessrightsandpreventthemtoaccessanyunauthorizedresources.atorsAdvantagesOperatorshavethenecessaryinfrastructureforacompleteSASEsystem,andcanprovideenterpriseswithSASEequipmentleasingservicesontheenterpriseside.Userscanrentequipmentfromoperators,anddonotneedtopurchaseenterprise-sidehardwareequipment,whichreducesusercosts.4.3Case3:Multi-CloudDeployedBusinessAccessingBackground:Theenterprisecloudgraduallymovestothehybridmulti-cloudmode,andtheenvironmentdeploymentismoreandmorediversified.Networkboundaryblurringleadstothefailureofsecuritypolicy,whichbringsnewchallengestoenterpriseinformationcurityRequirement:Realizenetworking,cloudandmulti-cloudinterworkingofaccessusers,andindependentnetworkplanning.Realizethenetworkintegrationinvolvingmultipledevicesandmultipleoperators.Establisheffectivesecurityprotectionmeasuresforthebusinesssystems.tionSASESolutionforMultiCloudDeployedBusinessAccessingThissolutionisbasedonoperatorsleasedline/SD-WANtrafficdiversion.TheusertrafficisdivertedtotheSASEcloudthroughtheleasedlineorSD-WANfornetworksecurityprocessing.Operatorsaggregatezero-trustaccessandservicesystemsecurityprotectioncapabilitiesatthePoPsoftheintelligentcloudnetworkandprovideexternalsecurityservicesthroughSAASproducts.Operatorcloudprivatenetwork,basedontheSRv6standard,realizesend-to-endultra-lowlatencythroughFullMeshnetworking.EnterprisescanaccessitthroughlocalPoPsnearby,convenienttoenterthecloud.Anditbuildsedgecloudstocomplementthecentralcloud.Edgecloud
溫馨提示
- 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶(hù)所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶(hù)上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶(hù)上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶(hù)因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 2025年度公司對(duì)公司知識(shí)產(chǎn)權(quán)質(zhì)押借款協(xié)議
- 2025年度公益基金會(huì)災(zāi)害預(yù)防合作框架
- 億渡數(shù)據(jù):中國(guó)康復(fù)行業(yè)短報(bào)告
- 2025年度影視作品演員出演合同樣本
- 2025年度區(qū)塊鏈技術(shù)應(yīng)用增資擴(kuò)股協(xié)議
- 2025年度快遞配送與快遞網(wǎng)點(diǎn)建設(shè)合同
- 2025年度房產(chǎn)過(guò)戶(hù)房地產(chǎn)經(jīng)紀(jì)人服務(wù)協(xié)議
- 2025年度農(nóng)村鄰居土地界限確權(quán)與使用協(xié)議書(shū)
- 二零二五年度礦山股份合作協(xié)議書(shū):礦山生態(tài)環(huán)境保護(hù)與修復(fù)
- 2025年度賓館客房客房服務(wù)員培訓(xùn)與勞務(wù)服務(wù)合同
- DB22T 5167-2024 市政橋梁結(jié)構(gòu)監(jiān)測(cè)系統(tǒng)運(yùn)行維護(hù)與管理標(biāo)準(zhǔn)
- JJF 1375-2024機(jī)動(dòng)車(chē)發(fā)動(dòng)機(jī)轉(zhuǎn)速測(cè)量?jī)x校準(zhǔn)規(guī)范
- 《分類(lèi)加法與分步乘法計(jì)數(shù)原理-習(xí)題課》名師課件
- 常見(jiàn)業(yè)務(wù)場(chǎng)景網(wǎng)絡(luò)安全建設(shè)VISIO圖合集(27個(gè)類(lèi)型)v2023
- 無(wú)人機(jī)通信融合組網(wǎng)
- 七年級(jí)英語(yǔ)閱讀理解55篇(含答案)
- 臨床常見(jiàn)操作-灌腸
- 三年級(jí)下冊(cè) 道德與法治 全冊(cè)教案
- 2024年安徽合肥中考數(shù)學(xué)試題及答案1
- 2024-2025學(xué)年全國(guó)中學(xué)生天文知識(shí)競(jìng)賽備賽試題庫(kù)(含答案)
- 三水高樁碼頭施工組織設(shè)計(jì)方案
評(píng)論
0/150
提交評(píng)論