Part 16 – NSX-V Firewall Service Composer

Loading

Micro-segmentation allows NSX-V to build fine-grained traffic filtering without having to create complex routing rules. The ultimate aim of micro-segmentation is to create application-centric workloads that are easier to manage using software-based security rules and security tags.

Blog Series

Service Composer

Allows us to select multiple objects in our vCenter at once and apply firewall rules, endpoint protection rules and network introspection using Security Groups and Security Policies.

Security Groups

SG’s allows administrators select VM’s based on its properties

eg : Web Security Group, App Security Group

Security Policy

Security Policy determines how security groups are going to be protected and these are typically set of rules.

Rule IDNameTypeSourceDestinationService / ProtocolApplied to
1Rule1UserInternetSG_WebHttps HttpAny
2Rule2UserSG_WebSG_AppMoodle AppAny
3Rule3UserSG_AppSG_DBmySQLAny
4Default ruleDefaultAnyAnyAnyAny

Security Profile

You can contain firewall rules as well contain network and guest introspection rule within a security profile such as which Antivirus to use and how to apply

Define Security Group

Before we apply or define security groups, we will need to block the “Default rule”. This needs to done on ESG and DLR

In this we are going to deny SSH traffic on our Web Server and allow Https traffic to our web server

If we wish to create dynamic membership, such as VM name, you can define it here

Under objects to Include add Web-Servers Logical Switch

Skip the objects to exclude if any

Review and click finish to complete

We will have a similar view as shown below.

Similarly we can add Security Groups for our App and DB servers

Go to Security Policies

Add a Name as “Allow Web Traffic”

We are going to skip Guest Introspection Services

We will need to define firewall rules here and attach our Security Groups to Security Policy

Add Firewall rule and Name it as Allow WebServer Traffic

Go to destination tab and our web security group SG_Web

Under Services tab – Define https and http services

Add http and https service

Ensure State is enabled and Click OK to proceed

Review and click Finish

Skip Network Introspection Services

Click Finish to complete

Once the Security Policies are created we will have an entry as below

We have more step to do here, Click on the Security Policy and Click Apply button as shown

Apply the policy to our Security Group SG_Web

Once its applied under the VM properties we will see our Security membership applied

I’ve also added a rule to block ssh traffic so our entire firewall configuration will look as shown below.

Conclusion

In this next series, we wil look into enabling guest introspection services on NSX-V

(Visited 122 times, 1 visits today)

By Ash Thomas

Ash Thomas is a seasoned IT professional with extensive experience as a technical expert, complemented by a keen interest in blockchain technology.