0% found this document useful (0 votes)
99 views

M05 - SDDC Advanced Security

The document discusses SDDC advanced security features including NSX advanced firewall, identity firewall, and distributed IPS. It describes challenges with traditional network segmentation and how zero trust principles can be applied through micro-segmentation and isolating applications. Key benefits of the NSX advanced firewall add-on are discussed, including east-west protection for workloads, context-based threat detection, and integrated threat intelligence. The workflow for enabling the advanced firewall add-on is also summarized.

Uploaded by

seryeb -
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
99 views

M05 - SDDC Advanced Security

The document discusses SDDC advanced security features including NSX advanced firewall, identity firewall, and distributed IPS. It describes challenges with traditional network segmentation and how zero trust principles can be applied through micro-segmentation and isolating applications. Key benefits of the NSX advanced firewall add-on are discussed, including east-west protection for workloads, context-based threat detection, and integrated threat intelligence. The workflow for enabling the advanced firewall add-on is also summarized.

Uploaded by

seryeb -
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 70

SDDC Advanced Security

L7 Firewall, IDFW, IDPS

May 2023

Confidential │ ©2021 VMware, Inc.


Agenda
1. Security Challenges

2. NSX Advanced Firewall

3. Disabling Add-ons

Confidential │ ©2021 VMware, Inc. 2


Security Challenges

Confidential │ ©2021 VMware, Inc. 3


Confidential │ ©2021 VMware, Inc. 4
Today’s Data Center Security
Traditional Segmentation

Shared
Users
Services

Web Tier
Policies align to the
environment instead
App Tier
of the application

DB Tier

Confidential │ ©2021 VMware, Inc. 5


Fixing Today’s Data Center Security
Zero Trust Through Context

Shared
Users
Services

Web Tier
Identify application
boundaries and
App Tier
determine intended
network traffic
DB Tier

Confidential │ ©2021 VMware, Inc. 6


Fixing Today’s Data Center Security
Zero Trust Through Context

Shared
Users
Services

Web Tier
Isolate the application
and only allow
App Tier
required
communication
DB Tier

Confidential │ ©2021 VMware, Inc. 7


NSX Distributed Firewall
Micro-segmentation Simplifies Network Security

Finance HR Engineering

Perimeter
firewall Zero Trust/Least Privilege
DMZ
Model
Inside
firewall Each VM can now be its own
perimeter
App
Policies align with logical
groups
Prevents threats from
DB
spreading
Network Topology Agnostic
Services

AD NTP DHCP DNS CERT

Confidential │ ©2021 VMware, Inc. 8


NSX Advanced Firewall Overview

Confidential │ ©2021 VMware, Inc. 9


VMware NSX Advanced Firewall for VMware Cloud on AWS
Introducing Advanced Distributed Security features as an Add-on

L7 Distributed Identity Firewall Distributed IDS/ IPS


Firewall
Layer 7 AppID Profiles and Active Directory based User Integrated with NSX Threat
Distributed FQDN Filtering ID Filtering Intelligence Cloud

Confidential │ ©2021 VMware, Inc. 10


Value Prop
Key Benefits for VMC Customers

NSX DFW with L7 AppID and


NSX Distributed IDS/IPS NSX Identity Firewall
Distributed FQDN Filtering

East-West Protection for workloads Deep Packet Inspection for Layer 7 Per User/ session application access
Application control
Detect attempts at exploiting
vulnerabilities in applications Built-in Application IDs for common DFW based enforcement at the
enterprise applications source
Distributed traffic inspection scales
linearly with workloads FQDN based access control –per AD/ LDAP integration to
VM automatically curate access to
Context based threat detection applications
Reduce the attack surface to
Integrated with NSX Threat intended application/ protocols
Intelligence Cloud Service

Confidential │ ©2021 VMware, Inc. 11


Add-On Workflow
1. Cloud Admin has permissions to Add-on features related objects by default.
2. Activating NSX Advanced Firewall will push down license.
3. NSX UI starts showing NSX Advanced Firewall features.
4. Metering and Billing starts.

Confidential │ ©2021 VMware, Inc. 12


Enable Advanced Firewall
“Add Ons” tab UI with NSX Advanced Firewall disabled (default UI)

Confidential │ ©2021 VMware, Inc. 13


Enable Advanced Firewall
Pop up while activating NSX Advanced Firewall

Confidential │ ©2021 VMware, Inc. 14


Enable Advanced Firewall
After activating NSX Advanced Firewall

Confidential │ ©2021 VMware, Inc. 15


L7 – Context Aware Firewall &
FQDN Filtering

Confidential │ ©2021 VMware, Inc. 16


Layer 7 Application Identity
Port Independent Enforcement on the DFW

• Built-in APP-IDs for common


Infrastructure and enterprise app

• Leverages Deep Packet Inspection


Engine with App-ID Signatures

• Protocol Version support for


TLS/CIF

• Cipher suite support for TLS


• Used in Rules via Context-Profiles

• Certain APP-IDs require the use of


Application Layer Gateways

Confidential │ ©2021 VMware, Inc. 17


Layer 7 Application Identity
Use Cases

Port-Independent Micro-
Compliance Zones Reducing the Attack Surface
segmentation

Enforce the use of strong cryptography Only allow the intended Allow APP-owners to run services across
and secure protocols application/protocol to run across a port any port

TLS 1.2 MRS- MRS-


WEB-1 WEB-2

BLAST/22443

HTTP
RDP/3389 RDSH
UAG MRS-
RDP/22443 APP-1

MYSQL
MRS-
DB-1

Confidential │ ©2021 VMware, Inc. 18


NSX DFW Layer7 with Application ID
NSX Distributed Firewall with AppID / Context Profile
1. Pre-configured AppIDs for common enterprise applications
• Microsoft Active Directory
• WINS
• Kerberos
• EPIC (Healthcare Application)
• GitHub
• MySQL
• Many more...

More than 700+ App IDs


https://docs.vmware.com/en/NSX-Application-IDs/index.html

Confidential │ ©2021 VMware, Inc. 19


Context Aware Firewall
Adding new Context Profile

Confidential │ ©2021 VMware, Inc. 20


Context Aware Firewall
Adding new Context Profile

Confidential │ ©2021 VMware, Inc. 21


Context Aware Firewall
App based Context Aware Firewall

Confidential │ ©2021 VMware, Inc. 22


Context Aware Firewall
Using the Context Profile

Confidential │ ©2021 VMware, Inc. 23


Context Aware Firewall
Using the Context Profile

Confidential │ ©2021 VMware, Inc. 24


Distributed FQDN Filtering Security
Permit list and Deny listing based on FQDN

Native Cloud Services Context-Based Cloud Service Access


• Distributed Enforcement on DFW
• DNS snooping to map FQDN to IPs
• FQDN context moves with VM.
• Supports vMotion

User-based FQDN/Service Access

Confidential │ ©2021 VMware, Inc. 25


FQDN based Context Profile
FQDN based Context Profile

Confidential │ ©2021 VMware, Inc. 26


Distributed FQDN filtering
DFW rule based on FQDN rule
Note- DNS rule must come first, and then
Allow/Deny rule follows that.

Confidential │ ©2021 VMware, Inc. 27


Identity Firewall

Confidential │ ©2021 VMware, Inc. 28


Identity Firewall
Per User/User Session Application Access with Identity Firewall (IDFW)

• Enforcement by the DFW at the


Employee Desktop Pool Source

Finance-App-1
• Session-based
• Supported for both VDI and RDSH
• Granular On/Off per Cluster
• Requires VMware Tools/Thin agent
Remote Desktop Session Hosts / Published Apps

HR-App-1
Web App DB

Confidential │ ©2021 VMware, Inc. 29


NSX Identity Firewall
NSX Distributed Firewall with User ID
• Integrates with AD/ LDAP
• Use Case – Protect VDI/ RDSH workloads
• Based on kernel-based Guest Introspection

Confidential │ ©2021 VMware, Inc. 30


Identity Firewall
Enable IDFW

Confidential │ ©2021 VMware, Inc. 31


Identity Firewall
Enable IDFW

Confidential │ ©2021 VMware, Inc. 32


Identity Firewall
This is in disabled state by
default. When a new cluster is
added that is in disabled state
Enable IDFW as well.

Confidential │ ©2021 VMware, Inc. 33


Identity Firewall
Configure Active Directory

Confidential │ ©2021 VMware, Inc. 34


Identity Firewall
Configure LDAP Server

Confidential │ ©2021 VMware, Inc. 35


Identity Firewall
Create Security Group with AD Members

Confidential │ ©2021 VMware, Inc. 36


Identity Firewall
AD Members

Confidential │ ©2021 VMware, Inc. 37


Identity Firewall
Create IDFW Rule with Source as AD based Group

Confidential │ ©2021 VMware, Inc. 38


Distributed IDS/IPS

Confidential │ ©2021 VMware, Inc. 39


Traditional IDS/IPS Approaches Drive up Cost & Complex
Adoption has been limited to critical / regulatory mandated segments of environment

Before NSX IDS & IPS With NSX IDS & IPS

IDPS

Hair-pin traffic
to centralized
appliances

Throughput Selective traffic Lack of vMotion


constraints inspection support, stale policies

Confidential │ ©2021 VMware, Inc. 40


Moving Analysis to Each Workload Breaks Traditional Trade-offs
Operators can achieve scale & coverage, without need for massive throughput appliances

Before NSX IDS & IPS With NSX IDS & IPS

Move Inspection to
each workload

NSX IDS & IPS

NSX IDS & IPS

NSX IDS & IPS

Scale out architecture, Absolute coverage Dynamic policies move


massive throughput with no blind-spots with workloads

Confidential │ ©2021 VMware, Inc. 41


NSX Distributed IDS/IPS
Extending the Intrinsic Security paradigm for internal firewalling
NSX Manager

Distributed & Built-in Analysis – scales


linearly with workloads, no blind-spots

Distributed Firewall + Distributed IDS/IPS Curated Signature Distribution – fewer


NSX Virtual Distributed Switch
false positives, lower computational
overhead on host

Context-based Threat Detection –, better


alert prioritization

Policy & State Mobility - simplify


operations, eliminate stale / redundant
policies

FIREWALL IDS/IPS

Firewall Manager IDS/IPS Manager

Confidential │ ©2021 VMware, Inc. 42


NSX Distributed IDS/IPS
NSX Distributed IDS/IPS
• Integrated with NSX Threat Intelligence Cloud Service
• Default set of signatures

Confidential │ ©2021 VMware, Inc. 43


Enable Advanced Firewall
Distributed IDS/IPS

Confidential │ ©2021 VMware, Inc. 44


Distributed IDS/IPS This is in disabled state by
default. When a new cluster is
added that is in disabled state
Enable D-IDS/IPS as well.

Confidential │ ©2021 VMware, Inc. 45


Distributed IDS/IPS This will ensure signatures are
updated every 20 minutes
from NTICS cloud (explained
D-IDS/IPS Signatures in next slide)

Confidential │ ©2021 VMware, Inc. 46


Distributed IDS/IPS
D-IDS/IPS Signatures (Contd.)

• Signatures are downloaded from NTICS


• NSX Threat Intelligence Cloud (NITCS) - is a SaaS service that is used to update NSX Manager with IDS/IPS
signatures
• NSX Manager in an SDDC would communicate via the SDDC’s Point of Presence (POP) to the service. No
additional configuration is required for the customer.
• Updated signature checks are performed every 0 mins. This is not configurable at this time.
• For customers who do not want the NSX Manager to directly access the service they can download it and
upload it to the NSX Manager via API.
• The signature set contains both Trustwave and Lastline signatures.

Confidential │ ©2021 VMware, Inc. 47


Distributed IDS/IPS
Profiles Select Signature Profile

Confidential │ ©2021 VMware, Inc. 48


Intrusion Detection and Prevention
Behavioral IDS/IPS

172.20.20.12
• Detect unusual behavior and prevent possible
zero day attacks

• I.e. high failure rate in authentication, remote


task scheduling, PsExec interaction

• Enabled by selecting “Suspicious” severity level


Suspicious in an IDPS profile
Account
Enumeration
• Implemented via signatures and Lua scripts

• About 500 behavioral signatures at VMC 1.19


release
Suspicious 172.20.20.4
Remote Task Scheduling
• Suspicious-level events received within a
specific time interval are de-duplicated to avoid
172.20.20.5 too many events on NSX Manager

Confidential │ ©2021 VMware, Inc. 49


Intrusion Detection and Prevention
Behavioral IDS/IPS

• Enabled by selecting “Suspicious” severity level


in an IDPS profile

• Detect unusual behavior and prevent possible


zero day attacks

• I.e. high failure rate in authentication, remote


task scheduling, PsExec interaction

• Implemented via signatures and Lua scripts

• About 500 behavioral signatures at VMC 1.19


release

• Suspicious-level events received within a


specific time interval are de-duplicated to avoid
too many events on NSX Manager

Confidential │ ©2021 VMware, Inc. 50


Intrusion Detection and Prevention
Lua Scripts

Example: Behavioral Signature invoking “intraflow_beacon” Lua script


• Standard IDPS signatures do not offer ability to
alert tcp $HOME_NETWORK any -> !$HOME_NETWORK 443 (msg:"NSX - Detect potential intra-flow beaconing detect complex behavioral activity
behaviour on TCP port 443"; flow:established,to_server; target:src_ip; flowint:intraflow_beacon_disable,notset; app-
layer-protocol:!http; lua:lua/lastline/intraflow_beacon.lua; flowbits:set,LL.verifier_tcp_successful; • This is addressed by allowing for Signatures to
flowbits:set,LL.verifier_tcp_failed; flowbits:set,LL.verifier_tcp_blocked; threshold: type limit, track by_src, seconds be triggered upon matching a custom detection
43200, count 1; metadata:ll_expected_verifier default, flip_endpoints False, server_side False, threat_class_name logic (Lua scripts)
Suspicious Network Interaction, threat_name Beaconing activity, ids_mode INFO, blacklist_mode DISABLED, exploited
None, confidence 65, severity 20, detector_id 99362; reference:url,www.lastline.com; classtype:trojan-activity;
• Scripts keep state across several flows by
sid:1099362; rev:16826; priority:5;)
storing flow attributes

• Lua scripts are bundled with IDPS signature sets

• Signatures using Lua scripts generate


Suspicious – level events (and a number of
other events)

• Not all Suspicious-level signatures leverage Lua

Confidential │ ©2021 VMware, Inc. 51


Intrusion Detection and Prevention
VMware Curated Signatures

Cloud hosted network analysis backed

Trustw • Single bundle/set based on Trustwave


ave
NSX Threat Intel and NSX Threat Intel (LL) signatures and
Signatures Cloud Lua Scripts
Curated Signature Set
NSX • Fast/Automated Signature creation
Threat
Intel NSX Signature Curator based on dynamic Malware analysis of
network behavior

• Curation ensures consistency in meta-


Curated Signature Set data

• Curated sets published to NSX Threat


NSX Manager
Intelligence Cloud for retrieval by NSX
(Manager and Edge)

D-IDPS

Confidential │ ©2021 VMware, Inc. 52


Intrusion Detection and Prevention
VMware Curated Signatures

• Single bundle/set based on Trustwave


and NSX Threat Intel (LL) signatures and
LUA Scripts

• Fast/Automated Signature creation


based on dynamic Malware analysis of
network behavior

• Curation ensures consistency in meta-


data

• “test mode” functionality on Lastline


sensors will be used for curation to
avoid false positives

• Curated sets published to NSX Threat


Intelligence Cloud for retrieval by NSX
(Manager and Edge)

Confidential │ ©2021 VMware, Inc. 53


Distributed IDS/IPS
Profile Signature Management

Confidential │ ©2021 VMware, Inc. 54


Distributed IDS/IPS
Policy

Confidential │ ©2021 VMware, Inc. 55


Distributed IDS/IPS IDS Mode Only

IDPS Rules IDS + IPS Mode (Both)

Confidential │ ©2021 VMware, Inc. 56


Intrusion Detection and Prevention
IDPS Scores (NSX UI)

Confidence Score Risk Score Impact Score Severity

Confidence of the detection being Numeric value indicating Combined Value of Risk Score and 5 Levels indicating “badness” of a
accurate “badness” of a threat confidence score 0-100 threat

0 – 100 Risk score = 0 – 100 Also forms the base score for Critical
events in NDR High
Higher score indicates higher Factor in Impact Score Medium
confidence (lower false positives) New in VMC 1.19 Low
New in VMC 1.19
Lower score indicates increased Suspicious
proneness to false positives Based on signature_severity
Factor in Impact Score value carried in signature, CVSS
or classification type
New in VMC 1.19
Severity also available in VMC
1.16-1.18

Confidential │ ©2021 VMware, Inc. 57


Intrusion Detection and Prevention
Events

• NSX Manager keeps last 14 days of data


(up to 1.5 Million events)

• Context-based event-filtering

• Timeline with dots indicate unique types


of intrusion attempts (can be hidden)

• Event details shown below timeline

• Events are grouped per signature

Confidential │ ©2021 VMware, Inc. 58


Intrusion Detection and Prevention
Event Details

• Impact Score & Severity


• Last Detected Time and details about last
occurrence
• Signature ID/rev + Description/Details
• Users/Workloads Affected
• CVE/CVSS Details (if available)
• Attack Type
• Attack Target (if available)
• Signature Revision
• Product Affected (if available)
• Event Count
• Intrusion History
• Transport Node on which detection
happened
• Mitre Tactic and Technique (if available)

Confidential │ ©2021 VMware, Inc. 59


Aria Operations for Logs Dashboard for IDS/IPS

Two dashboards are available in the NSX Content Pack


• Policy events (creation/deletion)
• Traffic – IDS/IPS network events

Confidential │ ©2021 VMware, Inc. 60


Aria Operations for Logs Dashboard for IDS/IPS
Policy Overview Page
Displays counts on policy creation, deletion and change events
• Clicking 3 button to View Log Query displays details of the logs

Confidential │ ©2021 VMware, Inc. 61


Aria Operations for Logs Dashboard for IDS/IPS
Policy Overview Log Query Details Page
Details contain information on the policy, action and more

Confidential │ ©2021 VMware, Inc. 62


Aria Operations for Logs Dashboard for IDS/IPS
Traffic Overview Page
Displays counts on IDS/IPS events based on multiple options
• Clicking 3 button to View Log Query displays details of the logs

Confidential │ ©2021 VMware, Inc. 63


Disabling Add-Ons

Confidential │ ©2021 VMware, Inc. 64


Disabling
NSX Advanced Firewall – Add-on
1. Customers must deactivate Add-on to stop billing.
*NOTE – Disabling specific features does not stop billing

2. Deactivating Add-on stops users from adding/ updating rules in DFW L7/ IDS.
3. Existing rules continue to persist, but not be enforced, until users delete them.

Confidential │ ©2021 VMware, Inc. 65


Disable Advanced Firewall
Disabling add-ons

Confidential │ ©2021 VMware, Inc. 66


Disable Advanced Firewall
Disabling add-ons

Confidential │ ©2021 VMware, Inc. 67


What happens when the add-on is disabled?
• Configured add-on policy is retained, but the ability to edit them is disabled.
• Add-on policy is no longer enforced.
• If add-on is re-enabled, previously configured policy becomes active.

Note that Edit operation is


disabled.

Confidential │ ©2021 VMware, Inc. 68


LAB
Lab - 5: NSX Advanced Security

SDDC
1. Implement Context-aware
firewalling Demo-Net

2. Configure FQDN Filtering Route Based VPN

CGW
3. Implement Distributes Intrusion BGP Desktop-Net
detection and prevention

Edge NSX
vCenter </> HCX

MGW

Connected VPC

Confidential │ ©2021 VMware, Inc. 69


Thank You

Confidential │ ©2021 VMware, Inc.

You might also like