Using Istio to Build the Next 5G Platform
Aspen Mesh. All rights reserved. EP EP DDOS DPI Firewall Firewall Crypto Middleboxes in Network Demarc Network Architecture DDOS DPI Firewall DDOS DPI Firewall 17 ©2021 Aspen Mesh. All0 码力 | 18 页 | 3.79 MB | 1 年前3Is Your Virtual Machine Really Ready-to-go with Istio?
smart DNS proxying (yet…) ● Further security middle boxes support ○ Deep packet inspection (DPI) ○ DDoS defense ○ Firewall ● Lack dedicated gateway support (architectural changes) ○ No separating out Ultimate goal ○ Proxyless services (for high performance) ● Offload ○ Traffic management ○ Security (DDoS defense…) ● HW acceleration ○ Crypto ○ Rule matching ● Further isolation w/ host ● CapEx, OpEx0 码力 | 50 页 | 2.19 MB | 1 年前3Service mesh security best practices: from implementation to verification
security policies to control accesses to services. Deploy web application firewall to defend against DDoS, injection, remote execution attacks. Edge security Egress 2. Define egress security policies0 码力 | 29 页 | 1.77 MB | 1 年前3
共 3 条
- 1