Skip to main content
Zero Trust Architecture: Implementing Micro-Segmentation on Cisco Nexus
Tech Brief9 min read

Zero Trust Architecture: Implementing Micro-Segmentation on Cisco Nexus

S
Sarah van der Merwe
Chief Executive Officer

The traditional "castle and moat" security model assumed that everything inside the data center network was trusted. In an era of advanced persistent threats (APTs) and ransomware, this assumption is fatal. Once an attacker breaches the perimeter, they can move laterally (East-West) without restriction.

Enter Zero Trust

Zero Trust assumes breach. It demands that we verify every transaction, even between two servers in the same rack. The technical realization of this is Micro-Segmentation.

The Role of the Network Fabric

Implementing firewalls between every server is unmanageable. Modern data center switches, like the Cisco Nexus 9000 series, move this enforcement into the network fabric itself using VXLAN (Virtual Extensible LAN) and BGP-EVPN.

Implementation Strategy with Cisco ACI

Cisco's Application Centric Infrastructure (ACI) abstracts IP addresses into "Endpoint Groups" (EPGs). You define policies based on intent, not ACLs.

  1. Map Application Dependencies: Use tools like Cisco Tetration to see what talks to what. You can't secure what you don't understand.
  2. Define Contracts: Create a whitelist. "Web Servers" can talk to "App Servers" on Port 443, but NOT on Port 22 (SSH).
  3. Enforce at the Port: The Nexus switch acts as a distributed firewall. If a packet violates the contract, it is dropped at the ingress port—it never traverses the network.

Hardware Requirements

To run ACI or standard VXLAN-EVPN, you need Leaf-Spine topology. We recommend:

  • Spine: Cisco Nexus 9332D-GX2B (High density 400G)
  • Leaf: Cisco Nexus 93108TC-FX3 (48x 10GBASE-T downlink)

By shifting security to the switch, you achieve line-rate filtering without the bottleneck of hair-pinning traffic through a central firewall appliance.

Need advice on this topic?

Our solution architects can help you implement the technologies discussed in this article for your unique environment.

Related Insights