Network Security Policy to Enforcement with Aviatrix
December 19, 2023By Susan Hinrichs
Aviatrix provides several mechanisms to enforce network security policy. This is the first in a series of articles about network security policy enforcement mechanisms in the Aviatrix platform. In this article we describe the path from network security policy intent to enforcement. Figure 1 provides an overview of this path.
Figure 2: Overview of network topology. The green arrow connects the two entities addressed in the natural language security policy
The team responsible for network security deployment can configure a number of devices throughout the system to enforce the network security policy mapped to enforceable details. That team can also adjust routing to ensure that all traffic is routed through the appropriate enforcing devices. In a large network topology spread over multiple providers, manually performing this mapping of policy to enforcing devices is tedious and error prone.
In practice, teams will use one or more frameworks to deploy network security policy changes, either frameworks they develop, frameworks from a third party or a combination of third party and self developed logic. Aviatrix as a third party framework provides several mechanisms to simplify deployment of the enforceable network security policy.
Aviatrix Firenet manages routing to ensure that specified traffic passes through virtual third party firewalls also managed by the customer. Figure 3 shows the resulting topology from our example. Aviatrix sets up the routing so traffic to the corporate database is routed through the third party firewall.