Pavel Ignatov - Fotolia
How does security for intent-based networking work?
Monitoring plays an essential role when it comes to security in intent-based networking environments, as it ensures policies are met and detects network anomalies.
Networks are designed and implemented to support the applications on which the business depends. Intent-based networking represents a fundamental change in how those networks are designed and managed. Rather than focusing on the process of selecting switches and other components, the designers now focus on the applications and their requirements.
Network designers use intent-based networking (IBN) tools to identify the network policies required to achieve the necessary level of application performance. Intent-based tools use those specified policies to automate the detailed work of selecting network components and the interconnections between them.
Security for intent-based networking is designed along with other network elements, as the IBN tools determine the security requirements of each application and place them where they're needed. The tools can create a new network design or specify changes to an existing network.
Configuring access control lists, firewalls and virtual LANs has proven to be complicated and prone to error. By automating this process, intent-based networking tools can remove a primary cause of security breaches. Major breaches in the past have occurred because configuration errors allowed malware from vulnerable network components -- such as end-user workstations and Wi-Fi networks -- to penetrate the wider network. Intent-based networking tools can eliminate this risk.
Intent-based networking can quickly accommodate rapidly arising business requirements, such as video conferences. The tools can also shift network resources and make the required protection changes without the need for network managers to make hurried decisions, which could result in errors.
Monitoring aids security for intent-based networking
Continuous feedback is a major element of intent-based networking. Network monitors have been used for many years, but they don't continually report on whether applications are meeting performance requirements -- nor do they constantly monitor protection settings to ensure the specified settings remain in place.
Intent-based tools continuously make sure all the policy requirements are being met. They monitor application performance and detect network problems. As applications start up or shut down, these tools make the necessary changes to support the modified environment.
Making the change to viewing the network as a collection of applications rather than switches and routers can be difficult, but current networks are complex and change rapidly. Intent-based networking has become a necessity as complexity continues to increase, and networks must remain adaptable to shifting requirements.
Dig Deeper on Network management and monitoring
Related Q&A from David Jacobs
Ethernet vs. Carrier Ethernet: How do they differ?
Connectivity over longer distances and higher data rates are some of the major differences that separate Carrier Ethernet from traditional wired ... Continue Reading
Application vs. network load balancing: What's the difference?
Network load balancing and application load balancing both handle traffic requests. But they process and direct those requests with different levels ... Continue Reading
9 most common network issues and how to solve them
Slow network speeds, weak Wi-Fi signals and damaged cabling are just some of the most common network connection issues that IT departments need to ... Continue Reading