intel Reference Design Accelerates Critical Networking and Security Functions User Guide

June 3, 2024
Intel

intel LOGO Reference Design Accelerates Critical
Networking and Security Functions
User Guide

The Intel® NetSec Accelerator Reference Design is a blueprint to commercialize an Intel architecture-based PCIe add-in card for supporting processor intensive workloads.  The card features all of the functionality of a server with the capability to support full orchestration and management capabilities and is ideal for security workloads such as  IPsec, SSL/TLS, firewall, SASE, analytics, and inferencing. This reference design can help improve performance, scale, and efficiency for customers from edge to cloud.

As the transformation toward cloudification continues, trends in edge computing and the increase of employees working from home/anywhere are making enterprise environments more distributed than ever before. Traditional perimeterfocused security models and fixed deployment models no longer apply. Monolithic applications have been replaced by chains of containerized microservices that traverse on-premises and cloud infrastructure, decoupled from the underlying hardware; workloads need to be deployed where they are needed. These dynamic, software-defined environments require new approaches to apply security functions at the per-workload, per-user, and per-device level.

The secure access service edge (SASE) model meets these new distributed security requirements by converging software-defined security and wide-area network (WAN) functions into a cloud-delivered set of services. The virtualized or containerized services enhance efficiency with centralized orchestration and reduce equipment costs by using cloud infrastructure based on commercial off the shelf (COTS) servers in place of legacy, single-purpose hardware.

Most SASE solutions are fully integrated stacks of network and security functions, with licensing models based on enabling specific components. SASE vendors make massive investments to evaluate, obtain, and integrate them. SASE software functions require performance and stability in a server that shares multiple compute intensive workloads and multiple tenants. Integrating a performant solution of software-defined WAN (SD-WAN) together with a security stack that includes NGFW, ZTNA, CASB, SWG, DLP, and more is particularly challenging.

The Intel NetSec Accelerator Reference Design offers an alternative approach to SASE function isolation that can dramatically reduce the infrastructure footprint for network and security workloads. It provides users the full functionality of a server on a PCIe card, including an Intel Atom® processor, Intel Ethernet E810 Network Adapter, and substantial onboard DDR4 memory.

Solution Brief | Reference Design Accelerates Critical Networking and Security Functions

intel Reference Design Accelerates Critical Networking and Security
Functions - fig Figure 1. Intel® NetSec Accelerator Reference Design.

Expanded Processing Horsepower for
Security Workloads
The Intel NetSec Accelerator Reference Design can handle the compute capacity of network and security appliances, providing one or more separate physical execution environments. The accelerator supplements the server’s  primary processor with dedicated acceleration hardware for network and security functions.
Instruction set compatibility and a shared driver architecture between the main CPU and the accelerator CPU helps make the overall solution seamless using standards-based  Intel architecture. The consistency of programming models enables platform commonality between the Intel Atom® processor on the accelerator andIntel® Xeon® Scalable processors or Intel® Xeon® D processors in the host machine.

The Intel Atom processor at the heart of the Intel NetSec Accelerator Reference Design enables inline IPsec.intel Reference Design Accelerates
Critical Networking and Security Functions - fig 1

The autonomous compute resource isolates data and operations from the rest of the system, helping architects overcome incompatibilities among software components from  multiple vendors. The addition of hardware resources based on the reference design enables dramatic gains in solution capability and density. It also provides flexible capacity  on demand for Day 2 upgradeability of in-place solutions.
Original equipment manufacturers (OEMs) and original design manufacturers (ODMs), working with network and security solutions providers, can take advantage of the reference design to bring network security accelerators to market more quickly. Intel is working with a number of partners to develop products, making a choice of technology vendors available to systems vendors, solutions integrators, and end customers.

Reference Design Hardware Specifications
The reference design includes two variations, which are differentiated by processor (and core count), as well as I/O and networking resources.

| 8-Core Reference Design| 16-Core Reference Design
---|---|---
CPU| Intel Atom® P5721 processor| Intel Atom® P5742 processor
Form Factor| Full height, Half length
External Ports| 2x 25GbE SFP28| 1x 100GbE QSFP28
Power Consumption| ~50 to 90 watts| 70 to 115 watts
Memory Capacity| Up to 32 GB @ 2933 MT/s
Host Interface| x8 PCIe Gen4| x16 PCIe Gen4
Storage Capacity| Up to 256 GB eMMC
Throughput Target (Bi-directional Acceleration)| 25 Gbps| 50 Gbps
Throughput Target (Uni-directional Acceleration)| 50 Gbps| 100 Gbps

SASE Acceleration Use Case

Enterprises use WAN and security services through SASE points of presence (POPs) that are geographically dispersed to be in relative proximity to user endpoints and on- prem, edge, and cloud services. POPs act as access gateways that meet service level objectives for latency and throughput in a secure manner. Distributed delivery of cloud- native security services avoids the need to backhaul WAN traffic to centralized locations to apply security policies.
This fundamental shift in topology provides substantial bandwidth cost savings while also improving the user experience by cutting out the transfer latency associated with  backhaul. A cluster of POP servers hosts any or all of the primary SASE components in real time, for all user network traffic:

  • Next-Generation Firewall (NGFW) combines traditional firewall functionality with complementary services such as deep packet inspection, intrusion protection, and threat intelligence.
  • Software-Defined WAN (SD-WAN) dynamically selfoptimizes to connect users to applications, centrally directing traffic across any combination of transport services, such as MPLS, 4G/5G, and cable broadband.
  • Zero Trust Network Access (ZTNA) provides seamless remote access to resources and applications while granting the least privilege possible, regarding all entities as untrusted for all other purposes.
  • Secure Web Gateway (SWG) filters user-initiated traffic to detect and remove malware and other unwanted software, helping enforce corporate security standards and maintain compliance.
  • Data Loss Prevention (DLP) monitors outgoing user traffic to identify sensitive information and prevent unauthorized egress, whether malicious or otherwise.
  • Cloud Access Security Broker (CASB) is an enforcement point between users and cloud services that applies policies such as authentication, encryption, and logging.

A well-designed and constructed SASE ensures delivery of these services with fidelity across locations and endpoint types, such as worker laptops, IoT sensors/actuators, and mobile devices. Quality of service is dependent on the ability to provide adequate POP reach, including both the number of locations and the capacity for each to deliver services. SASE vendors optimize POP servers for the most cost/capacity efficiency.

SASE POP Server Provisioning
In addition to Intel Xeon Scalable processors, Intel Xeon D processors are designed specifically for provisioning dense compute at the network edge, making them a popular choice as the foundation for SASE POP servers. The platform provides energy-efficient performance, hardware-based security and acceleration technologies, and advanced integrated Intel Ethernet connectivity.
Solution architects can expand the service capacity of Intel Xeon Scalable processors and Intel Xeon D-based POP servers with the addition of one or more accelerators based on the reference design. For example, a two-socket POP server based on 20-core Intel Xeon D processors would have a total of 40 cores. Deploying two 16-core accelerator cards in the system makes an additional 32 Intel Atom processor cores available, for an 80 percent increase in core count without increasing the server footprint. Each accelerator can run a separate SASE service, with its own set of compute, memory, and I/O resources; providing further parallelization of the workload to improve deterministic performance.intel Reference Design Accelerates Critical
Networking and Security Functions - fig 2

Accelerator Connection Topology
An accelerator card based on the Intel NetSec Accelerator Reference Design may be connected directly to the external public network, enabling certain SASE functions to be accomplished independently of the main Intel Xeon Scalable processor or Intel Xeon D processor. This connectivity also makes it possible for the card to provide inline capabilities that independently push inbound data to the appropriate compute resource, for increased efficiency. Ethernet- based service chaining can interconnect services directly between accelerators, combining capacity or functionality, as in the example shown of delivering SD-WAN and security stack together as a single service from two distinct accelerators. The built-in switching capability of the Intel Atom processor facilitates resource sharing to improve efficiency, with load balancing between ports without involvement from the Intel cores running on the Intel NetSec Accelerator Reference Design solution.
For some implementations, an accelerator based on the Intel NetSec Accelerator Reference Design may not be connected to the outside world. For example, it may use service chaining to deliver services through another accelerator that is on the public network or provide functionality such as a sandboxing application for deep packet inspection that does not require external connectivity.

Potential for SASE Acceleration in Real World Deployments
The SASE acceleration use case demonstrates some representative usage patterns for devices based on the reference design in SASE POP servers:

  • Increased density and infrastructure efficiency based on deploying added compute capacity with one or more accelerators with the full range of server-on-a-card resources.
  • Multi-vendor integration, instantiated by the SASE POP server providing unified services based on solutions that would otherwise be incompatible on a single system.
  • Advanced traffic control using the integrated network switch in the Intel Atom processor to direct inbound data appropriately, independent of the main processor.
  • Service chaining and delivery of distributed SASE services using multiple accelerators in a single SASE POP server.

By expanding the hardware and making it more capable, these factors help lower cost of operation by reducing the total number of servers required to accomplish a given performance goal.

Building Blocks for Accelerated Networking and Security
The reference design provides an independent, functional compute node that delivers server-class performance and reliability within a conservative power envelope. It  provides integrated Ethernet switching and inline cryptography for IPsec, as well as look-aside operation, which is appropriate for asynchronous bulk encryption workloads.

Intel Atom processor—High Performance per Watt and Inline IPsec
The foundation of the Intel NetSec Accelerator Reference Design is the Intel Atom processor, which provides high throughput for security and networking workloads in an energy-efficient SoC form factor. The highly integrated device incorporates Intel Ethernet, a network switch, and hardware accelerators into the SoC package, which provides low-latency operation and drives significant advantages in reduced equipment cost, space/server requirements, and energy consumption.

  • Network Acceleration Complex (NAC) provides highperformance Ethernet I/O and switching. The integrated eight-port Ethernet switch provides the basis for a sophisticated 100 GbE or 200 GbE packet processing pipeline that is fully programmable using Intel-provided APIs. The processor’s switching capacity provides advanced traffic management using built-in packet classifiers, with full load balancing between ports.
  • Integrated Intel® QuickAssist Technology (Intel QAT) Gen3 accelerates symmetric and asymmetric encryption, driving up to 100 Gbps of throughput. The Intel QAT hardware communicates directly with the onboard Ethernet controller to decide which packets to process and which to pass to the processor, using the platform’s integrated switch. By shortening the data path, this capability enables inline IPsec.

intel Reference Design Accelerates Critical Networking and Security
Functions - fig 3

Intel Ethernet Network Adapter E810—Advanced Networking for Security Functions
The reference design includes an Intel Ethernet Network Adapter E810. The adapter provides throughput of up to 100 Gbps that takes advantage of sophisticated packet processing, traffic shaping, and intelligent acceleration to improve performance. It uses the same high-quality, opensource drivers as the host machine’s network adapters, assisting in smooth solution integration. Additional technology features support the intelligent networking built into the reference design:

  • Dynamic Device Personalization (DDP) enables administrators to establish multiple profiles for different traffic types, specifying packet-handling parameters and optimizations for each. Traffic prioritization based on DDP can be configured dynamically at runtime to enhance flexibility and agility.
  • Application Device Queues (ADQ) provide the mechanism for individual applications to proactively reserve one or multiple dedicated Ethernet hardware queues. ADQ helps ensure deterministic performance for critical data flows.

Conclusion

The Intel NetSec Accelerator Reference Design is a highly efficient blueprint for delivering all the functionality of an independent server in a PCIe form factor for effective  slot-in integration into security appliances and edge platforms. It provides a separate physical compute environment within the server chassis.
The addition of resources including system memory in the reference design enables the accelerator device to run independently of the main server platform. The accelerator runs security services independently to expand server capacity, including support for multi-vendor software stacks that would otherwise not be compatible on a single system.
This capability may help end customers reduce TCO by supporting more services per host.
The pre-validated reference design streamlines the development of new security appliances by OEMs and ODMs, working with network and security solutions providers.
It enhances platform flexibility and reduces design-in requirements for those solution developers, helping them bring new security products to market more quickly and cost-effectively.

To learn more about Intel Atom processors, go to:
www.intel.com/atom
Solution provided by:

Performance varies by use, configuration and other factors. Learn more at www.Intel.com/PerformanceIndex Performance results are based on testing as of dates shown in  configurations and may not reflect all publicly available updates. See backup for configuration details. No product or component  can be absolutely secure.
Intel technologies may require enabled hardware, software or service activation.
No product or component can be absolutely secure.
Your costs and results may vary.
Code names are used by Intel to identify products, technologies, or services that are in development and not publicly available. These a re not “commercial” names and not intended to function astrademarks.
Any forecasts of goods and services needed for Intel’s operations are provided for discussion purposes only. Intel will have no liability to make any purchase in connection with forecasts published in this document.
© Intel Corporation. Intel, the Intel logo, and other Intel marks are trademarks of Intel Corporation or its subsidiaries. Other names and brands may be claimed as the property of others .

0522/HD/MESH/349364-001US

Documents / Resources

| intel Reference Design Accelerates Critical Networking and Security Functions [pdf] User Guide
Reference Design Accelerates Critical Networking and Security Functions, Accelerates Critical Networking and Security Functions, Critical Networking and Security Functions, Security Functions
---|---

Read User Manual Online (PDF format)

Read User Manual Online (PDF format)  >>

Download This Manual (PDF format)

Download this manual  >>

Related Manuals