Tag Archives: Firewall

IMO
1

What Micro Segmentation Is Not…

NSX-vSphere Micro Segmentation Review

NSX for vSphere has a compelling use case around Micro Segmentation –

  1. The ability to orchestrate the provisioning of new Layer 2 and Layer 3 application networks via API in a matter of seconds using VXLAN as the overlay technology allowing networks to be created for each application segment on demand. There are numerous benefits in doing this but the big one is this really simplifies the mobility of applications for BC/DR purposes… Easy to move the application and its dedicated network vs dealing with the complexity of splitting Layer 2 networks that support many applications.
  2. The ability to isolate VM’s from each other using customer defined business attributes or vCenter attributes independent of the network topology using Layer 4 Stateful firewall policy. Even with VM’s on the same network segment as each other, Layer 4 Stateful firewall policy dictates how these VM’s should communicate with each other and to the outside world… If you want complete isolation of VM’s on the same network as each other, this is easily accomplished with Layer 2, 3, or 4 security policies.
  3. The ability to apply static or dynamic policy based on changing security conditions within the infrastructure. As example, a virus is identified or intrusion detected will automatically firewall protect the infrastructure from the compromised VM.
  4. Using 3rd Party extensibility, ability to extend native Layer 4 Stateful inspection to Layer 7 Deep Packet Stateful inspection…
Read More
201
0

NSX vSphere Distributed Firewall and the 80/20 Rule…

A little clarification about the NSX vSphere Distributed Firewall together with 3rd party partner integration… First, NSX as an ecosystem platform and provides extensibility to allow 3rd party partners to interoperate between NSX and their respective technology solutions….

Read More
101
0

NSX Distributed Firewall

My colleague Brad Hedlund has written a great introduction to the NSX Distributed Firewall. I wanted to share this with you before I start to dive into the technical and operational aspects of the NSX Distributed Firewall… http://blogs.vmware.com/networkvirtualization/2013/07/what-is-a-distributed-firewall.html

Read More
201
0

vSphere NSX + Palo Alto Networks + Traffic Steering

Lots of goodness here with the integration of NSX with PAN… Using PAN’s unified interface Panorama deploying security policy into Physical Firewalls, Virtual Firewall Appliances, and into the vSphere NSX in kernel distributed Firewall, you have the best of all worlds…

One of the features of NSX with PAN is the ability to perform traffic steering from the NSX in kernal distributed firewall into the PAN Virtual Appliance to take advantage of the full capabilities of PAN. One gotcha I have seen and recommendation for you is traffic steering should be performed on an exception basis only. Let the NSX in kernel distributed firewall perform the heavy lifting (of firewall policy), and traffic steer only as needed.

 

Read More