If the destination node goes down or becomes inaccessible, another node will replace it, making the policy ineffective. It is effective as long as the IP address does not change. Here’s an example: a security policy configured on the Cisco Secure Firewall allows traffic from one service to another based on their IP addresses. This new reality requires solutions that are as dynamic as the environments they need to automate. In these environments, instances and services can be created and decommissioned as needed, which means keeping track of updates to such components in a fast-changing environment is a challenge for SecOps teams. Today, more organizations are embracing microservices and dynamic infrastructure deployments in cloud environments. This blog is a guest post by Sameer Singh from Cisco Blogs, where it was originally posted.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |