How Traffic Managed with NSX Microsegmentation

Microsegmentation is a method of creating different landing zone to separate the workloads. This method brings the security by isolating the workloads and secure them individually. In traditional segmentation model we have always aligned with security policies with the environment rather than with applications.

With the traditional segmentation process the shared services can transverse tier boundaries without being checked, which brings major threat. Usually the attackers target low-priority systems often and gives them the path to attack other systems in the environment. You will see in this blog how traffic is managed and protected with NSX microsegmentation

Application Micro-segmentation
Application Micro-segmentation

Microsegmentations vs. VLAN’s, Firewalls and ACLs

Well microsegmentation isn’t new in most of the environment it has been implemented either with the help of separating the workloads based on L3 subnet, VLAN. Furthermore, these entity is being used to write the respective rules on firewall or as an access-list. Based on application type the polices may vary. In short, using VLAN you can achieve segmentation but micro-segmentation helps you to do a granular segmentation, Ex: isolating endpoints

How traffic is managed in Traditional Data Center

How Traffic Managed with NSX Microsegmentation
Traffic management in traditional Data Center

Indeed, in any traditional infra usually you could find firewalls protecting External and Internal traffic. Moreover Internal firewall are pretend to segment the East-West traffic.

Additionally, modern workloads are in the form of virtual machine and containers which sits on the any of the virtualised solutions. But to accomplish segmentation of traffic we need to send it right from workloads to firewall. This kind of hair-pinning will cause more complex traffic management and gives hard time to troubleshoot.

How Traffic Managed with NSX Microsegmentation

VMware NSX uses distributed firewall (DFW), with the help of DFW it logically divides a data center into distinct security segments down to the individual workload/VM level. This gives power to distinct controls and security services based on applications. Therefore, specific application will have their respective rules which can be managed and operated centrally and applies the rule to each VM’s vnic level.

Zero Trust Architecture
Zero Trust Architecture

Regarding traffic pinning we will see that it won’t require to send the traffic to physical firewall, therefore, reducing traffic reaching the upstream network or firewall. Furthermore, for detailed use case and benefits you can refer VMware published whitepaper on microsegmention

And for key features on NSX 3.0.0 version please refer this blog

Summary

Finally, this article described the microsegmentation and how it is implemented in VMware NSX. Part 2 of this blog series will be published and will explain the detailed configuration steps.

2 Comments

Add a Comment

Your email address will not be published. Required fields are marked *