VMware NSX Security Solution Analysis

Historically VMware is into virtualization. With the acquisition of Last-line VMware firmly started attacking the $5B security market.  With the ongoing trend of distributed applications and with the growing east-west traffic the traditional approach of physical firewall appliances becomes very inefficient. For example, network changes have to occur to get the traffic funneled in and out of multiple physical appliances. Moreover trying to send all the traffic in a data center to the perimeter leads to performance and scale issues, and visibility becomes a huge challenge

NSX security quick dashboard view

VMware NSX Security Solution Offerings

Distributed Firewall: Complete L2-L7 capabilitiesDistributed IDS/IPSATPNSX Intelligence
Stateful Layer-4 Access Controls – Ability to write group-based policies between source and destinationDistributed & Built-in AnalysisNTA (Network Traffic Analysis) – Monitor east-west traffic and traffic flow records and flag traffic outside the norm as anomaliesTopology and Flow Visualizations – build topology maps, see them at the Data Center level, zoom into the Application level
Layer-7 Controls with AppID – ID-based policies, so you write them not based on port protocol, but on application traffic; can write a policy based on actual traffic you want to allow or deny as opposed to just the port protocolCurated Signature Distribution – Fewer false positives, the lower computational overheadNetwork Sandbox – used for emulating the operating environment, enabling organizations to probe suspicious files and other objectssnipAutomated Policy Recommendation – Discover the whole application, group similar services into a single application
Identity Firewall with UserID – for VDI micro-segmentation, when multiple users on a server with VDI desktop, you can create access policies based on user ID and not server IDContext-Based Threat Detection – Reduce the need for signature tuning, better alert prioritizationNDR( Network Detection and Response) 
 Policy & State Mobility – Simplify operations, eliminate stale/redundant policies  
NSX security offerings a quick overview

Some Technical Considerations

Following are some of the key considerations

DFW and Edge VM:

  • The same traffic can have distributed firewall, l7 app-id rules, and IDS/IPS rules
  • Traffic needs to be allowed by DFW to be passed through to IDS/IPS
  • No network overlay requirement if the customer wants to just use the security solutions
  • NSX Gateway Firewall can now decrypt SSL traffic

IDS and IPS:

  • The IDS/IPS engine is based on Suricata, a well-respected open-source project.
  • IDS/IPS signatures come from Trustwave, a leader in managed security services
  • The signature can be downloaded online to the NSX or can be uploaded offline

ATP (NTA, NDR, and Sandboxing):

  • Sandboxing is based on Last-line solutions

Key Use Cases and Considerations

Regulatory ComplianceVirtual ZonesDiscrete Appliance ConsolidationVirtual patching
Enable software IDS/IPS for critical appsCreate zones in software without the cost/ complexity of air-gapped networks or physical separationReplace discrete centralized appliancesPrevent lateral movement of attackers by blocking vulnerabilities
Easily achieve compliance requirements for PCI DSS, HIPAA, and SOXSecure vendor-partner, provider-tenant trafficLeverage native IDS/IPS implementation in NSX- simply turn it onCombine signature-based detection, anomaly detection, and protocol conformance check
Eliminates blind spots   
NSX Security Key use cases

Licensing types

Following are the stand-alone licenses specific to NSX-T security and there are add-on licenses available with the existing NSX bundle as well

  • NSX Firewall
  • NSX Firewall with Advanced Threat Prevention
  • NSX Firewall with Bare Metal

Scale limits (NSX v4.0.1.1)

FirewallDistributed FirewallRequirements
Logical Ports with Groups Applied25000 
System-Wide Stateful Firewall Rules100000 
Rules per Firewall Section1000 
Rules per Group512 
Firewall Section10000A Firewall Section equates to an
OpenStack Security Group
Rules per Hypervisor Host120000Total rules across virtual NICs on a
Hypervisor Host.
Rules per Virtual NIC4000 
Saved Firewall Rule Configurations100Only for automatically created
drafts configurations
Services8000 
Objects per Firewall Rule128Total configuration objects or
groups that can be used per rule
inclusive of Source, Destination,
Services, Context Profile and Apply
To fields.
FirewallIntrusion DetectionRequirements
Hypervisor Hosts512 
IDS profile25Excluding the default
IDS Rules1000 
Events recorded2000000Up to 14 Days
FirewallMalware ProtectionRequirements
Files Analyzed using Dynamic
Analysis/Sandboxing per Day on
Gateway Firewall
15000Requires an Extra Large Edge Node
Files Analyzed using Static Analysis
per Day on Gateway Firewall
100,000Requires an Extra Large Edge Node
Malware Profles on Gateway
Firewall
50Requires an Extra Large Edge Node
Malware Detection Rules on
Gateway Firewall
500Requires an Extra Large Edge Node
Requires an Extra Large Edge Node100,000Up to 14 days of events stored.
Files Analyzed using Dynamic
Analysis/Sandboxing per Day on
Distributed Firewall
30000 
Files Analyzed using Static Analysis
per Day on Distributed Firewall
10000 
Hypervisor Hosts512 
Malware Profles on Distributed
Firewall
50 
Malware Detection Rules on
Distributed Firewall
1000 
File Events on Distributed Firewall700,000Up to 14 days of events stored.
NSX Security Scale Limits

Competition

The competition for this solution is catered to two different target groups

Firewall VendorsMicrosgementation Vendors
CheckpointIllumio
CiscoCisco Tetration
FortinetGuardicore
NSX Security Competition

Summary

NSX security solution covers several use cases for east-west traffic protection inside your server farm environment and claims to have more than 13K+ customers running this solution. the solution is the best fit if you have more than 95% of your workloads virtualized. For more information please visit the previous blogs on NSX-T

One Comment

Add a Comment

Your email address will not be published. Required fields are marked *