Micro-segmentation allows NSX-V to build fine-grained traffic filtering without having to create complex routing rules. The ultimate aim of micro-segmentation is to create application-centric workloads that are easier to manage using software-based security rules and security tags.
Blog Series
- Installing NSX-V 6.4
- Configure Controller Nodes and enable CDO mode in NSX-V 6.4
- One Page View of all NSX-V commands
- Configure VXLAN and Prepare ESX hosts for VXLAN traffic
- Configure the Transport Zone and Logical Switches
- Configure Distributed Logical Router
- Configure Edge Services Router (ESG)
- Verifying VXLAN Connectivity
- Regenerate Self-signed Certificate on NSX-V
- DLR VM SSH Access
- Backup NSX-V Manager
- Dynamic routing with OSPF in DLR
- Dynamic routing with OSPF in ESG
- VMware NSX Edge Load Balancer
- VMware NSX Edge Load Balancer SSL Offloading
- NSX-V Firewall & Microsegmentation
- NSX-V Firewall Service Composer
Service Composer
Allows us to select multiple objects in our vCenter at once and apply firewall rules, endpoint protection rules and network introspection using Security Groups and Security Policies.
Security Groups
SG’s allows administrators select VM’s based on its properties
eg : Web Security Group, App Security Group
Security Policy
Security Policy determines how security groups are going to be protected and these are typically set of rules.
Rule ID | Name | Type | Source | Destination | Service / Protocol | Applied to |
1 | Rule1 | User | Internet | SG_Web | Https Http | Any |
2 | Rule2 | User | SG_Web | SG_App | Moodle App | Any |
3 | Rule3 | User | SG_App | SG_DB | mySQL | Any |
4 | Default rule | Default | Any | Any | Any | Any |
Security Profile
You can contain firewall rules as well contain network and guest introspection rule within a security profile such as which Antivirus to use and how to apply
Define Security Group
Before we apply or define security groups, we will need to block the “Default rule”. This needs to done on ESG and DLR
In this we are going to deny SSH traffic on our Web Server and allow Https traffic to our web server
If we wish to create dynamic membership, such as VM name, you can define it here
Under objects to Include add Web-Servers Logical Switch
Skip the objects to exclude if any
Review and click finish to complete
We will have a similar view as shown below.
Similarly we can add Security Groups for our App and DB servers
Go to Security Policies
Add a Name as “Allow Web Traffic”
We are going to skip Guest Introspection Services
We will need to define firewall rules here and attach our Security Groups to Security Policy
Add Firewall rule and Name it as Allow WebServer Traffic
Go to destination tab and our web security group SG_Web
Under Services tab – Define https and http services
Add http and https service
Ensure State is enabled and Click OK to proceed
Review and click Finish
Skip Network Introspection Services
Click Finish to complete
Once the Security Policies are created we will have an entry as below
We have more step to do here, Click on the Security Policy and Click Apply button as shown
Apply the policy to our Security Group SG_Web
Once its applied under the VM properties we will see our Security membership applied
I’ve also added a rule to block ssh traffic so our entire firewall configuration will look as shown below.
Conclusion
In this next series, we wil look into enabling guest introspection services on NSX-V