VMware NSX for the smallest. Part 1



    If you look at the configuration of any firewall, then most likely we will see a sheet with a bunch of IP addresses, ports, protocols and subnets. This is how classically implemented network security policies for user access to resources. At first, they try to maintain order in the config, but then employees start to move from department to department, servers multiply and change their roles, access for different projects appears where they usually cannot be, and hundreds of unknown goat trails are obtained.

    About any rules, if lucky, the comments are spelled out “I asked Vasya to do it” or “This is a passage in the DMZ”. The network administrator quits and everything becomes completely incomprehensible. Then someone decided to clean the config from Vasya, and SAP fell, because Vasya once asked for this access for the combat SAP operation.



    Today I will talk about the solution of VMware NSX, which helps point-to-point apply the policy of network interaction and security without confusion in the firewall configs. I will show you what new features appeared compared to what VMware used to have in this part.

    VMWare NSX is a platform for virtualizing and securing network services. NSX solves problems of routing, switching, load balancing, firewall and can do many other interesting things.

    NSX is the successor to its own VMware vCloud Networking and Security (vCNS) product and Nicira NVP purchased.

    From vCNS to NSX


    Previously, a client in a cloud built on VMware vCloud had a separate vCNS vShield Edge virtual machine. It served as an edge gateway, where you could configure many network functions: NAT, DHCP, Firewall, VPN, load balancer, etc. vShield Edge limited the interaction of the virtual machine with the outside world according to the rules prescribed in Firewall and NAT. Inside the network, virtual machines communicated freely among themselves within subnets. If you really want to separate and conquer traffic, you can make a separate network for individual parts of applications (different virtual machines) and write the corresponding rules on the firewall according to their network interaction. But it is long, difficult and uninteresting, especially when you have several dozen virtual machines.

    In NSX, VMware implemented the concept of microsegmentation using a distributed firewall (distributed firewall) embedded in the core of the hypervisor. It contains security and network policies not only for IP and MAC addresses, but also for other objects: virtual machines, applications. If NSX is deployed within an organization, then a user or group of users from Active Directory can become such objects. Each such object turns into a microsegment in its security loop, in the required subnet, with its cozy DMZ :).


    Previously, the security perimeter was one for the entire pool of resources, protected by a border switch, and with the NSX you can protect a separate virtual machine from unnecessary interactions even within the same network.

    Security policies and network interactions are adapted if the object moves to another network. For example, if we move a machine with a database to another network segment or even to another related virtual data center, the rules prescribed for this virtual machine will continue to operate regardless of its new position. The application server will still be able to interact with the database.

    The vCNS vShield Edge border gateway itself has been replaced by the NSX Edge. He has the whole gentlemanly set of the old Edge plus some new useful features. About them, and will be discussed further.

    What's new in NSX Edge?


    The functionality of the NSX Edge depends on the edition of the NSX. There are five of them: Standard, Professional, Advanced, Enterprise, Plus Remote Branch Office. All new and interesting can be seen only since Advanced. Including the new interface, which until the full transition of vCloud to HTML5 (VMware promises the summer of 2019) opens in a new tab.

    Firewall You can select IP addresses, networks, gateway interfaces, and virtual machines as objects to which the rules will be applied.





    DHCP. In addition to setting the range of IP addresses that will automatically be issued to the virtual machines of this network, the Binding and Relay functions are now available in NSX Edge .

    In the Bindings tabYou can bind the MAC address of the virtual machine to the IP address if you want the IP address to remain unchanged. The main thing is that this IP address is not included in the DHCP Pool.



    In the Relay tab, you can configure the relay of DHCP messages to DHCP servers that are located outside your organization in vCloud Director, including the physical infrastructure DHCP servers.



    Routing With vShield Edge, you could only configure static routing. This is where dynamic routing appeared, supporting OSPF and BGP protocols. ECMP (Active-active) settings have also become available, and therefore active-active failover to physical routers.


    Configure OSPF


    Configure BGP

    Another of the new - setting up the transfer of routes between different protocols, the
    redistribution of routes (route redistribution).



    L4 / L7 Load Balancer. Appeared X-Forwarded-For for HTTPs header. Without him, everyone cried. For example, you have a website that you are balancing. Without forwarding this header, everything works, but in the web server statistics you did not see the visitors IP, but the balancer IP. Now everything was right.

    Also in the Application Rules tab you can now add scripts that will directly control traffic balancing.



    VPN. In addition to IPSec VPN, NSX Edge supports:

    • L2 VPN, allowing you to stretch the network between geographically separated sites. Such a VPN is needed, for example, so that when moving to another site, the virtual machine remains on the same subnet and stores the IP address.



    • SSL VPN Plus, which allows users to connect remotely to the corporate network. At the vSphere level, such a function was, but for vCloud Director this is an innovation.



    SSL certificates. You can now put certificates on NSX Edge. This is again to the question of who needed a balancer without a certificate for https.



    Grouping Objects. In this tab, groups of objects are defined for which certain network interaction rules will be applied, for example, firewall rules.

    These objects can be IP and MAC addresses.


     


    It also contains a list of services (protocol-port combination) and applications that can be used to compose firewall rules. New services and applications can be added only by the administrator of the vCD portal.


     


    Statistics. Connection statistics: traffic that passes through the gateway, firewall and balancer.

    Status and statistics for each IPSEC VPN and L2 VPN tunnel.



    Logging In the Edge Settings tab, you can set the server for logging. Logging works for DNAT / SNAT, DHCP, Firewall, routing, balancer, IPsec VPN, SSL VPN Plus.
     
    The following types of alerts are available for each object / service:

    - Debug
    - Alert
    - Critical
    - Error
    - Warning
    - Notice
    - Info



    NSX Edge Sizes


    Depending on the tasks and volumes, VMware recommends creating an NSX Edge of the following sizes:
    NSX Edge
    (Compact)

    NSX Edge
    (Large)

    NSX Edge
    (Quad-Large)

    NSX Edge
    (X-Large)

    vCPU
    one
    2
    four
    6
    Memory
    512MB
    1GB
    1GB
    8GB
    Disk
    512MB
    512MB
    512MB
    4.5GB + 4GB
    Purpose
    One
    application, test
    data center
    Small
    or medium
    data center
    Loaded
    firewall
    Load
    balancing at L7 level

    The table below shows the working metrics for network services, depending on the size of the NSX Edge.
    NSX Edge
    (Compact)

    NSX Edge
    (Large)

    NSX Edge
    (Quad-Large)

    NSX Edge
    (X-Large)

    Interfaces
    ten
    ten
    ten
    ten
    Sub Interfaces (Trunk)
    200
    200
    200
    200
    NAT Rules
    2,048
    4,096
    4,096
    8,192
    ARP Entries
    Until Overwrite
    1,024
    2,048
    2,048
    2,048
    FW Rules
    2000
    2000
    2000
    2000
    FW Performance
    3Gbps
    9.7Gbps
    9.7Gbps
    9.7Gbps
    DHCP Pools
    20,000
    20,000
    20,000
    20,000
    ECMP Paths
    eight
    eight
    eight
    eight
    Static routes
    2,048
    2,048
    2,048
    2,048
    Lb pools
    64
    64
    64
    1,024
    LB Virtual Servers
    64
    64
    64
    1,024
    LB Server / Pool
    32
    32
    32
    32
    Lb health checks
    320
    320
    320
    3,072
    LB Application Rules
    4,096
    4,096
    4,096
    4,096
    L2VPN Clients Hub to Spoke
    five
    five
    five
    five
    L2VPN Networks per Client / Server
    200
    200
    200
    200
    IPSec Tunnels
    512
    1,600
    4,096
    6,000
    SSLVPN Tunnels
    50
    100
    100
    1,000
    SSLVPN Private Networks
    sixteen
    sixteen
    sixteen
    sixteen
    Concurrent session
    64,000
    1,000,000
    1,000,000
    1,000,000
    Sessions / Second
    8,000
    50,000
    50,000
    50,000
    LB Throughput L7 Proxy)
    2.2Gbps
    2.2Gbps
    3Gbps
    LB Throughput L4 Mode)
    6Gbps
    6Gbps
    6Gbps
    LB Connections / s (L7 Proxy)
    46,000
    50,000
    50,000
    LB Concurrent Connections (L7 Proxy)
    8,000
    60,000
    60,000
    LB Connections / s (L4 Mode)
    50,000
    50,000
    50,000
    LB Concurrent Connections (L4 Mode)
    600,000
    1,000,000
    1,000,000
    BGP Routes
    20,000
    50,000
    250,000
    250,000
    BGP Neighbors
    ten
    20
    100
    100
    BGP Routes Redistributed
    No limit
    No limit
    No limit
    No limit
    OSPF Routes
    20,000
    50,000
    100,000
    100,000
    OSPF LSA Entries Max 750 Type-1
    20,000
    50,000
    100,000
    100,000
    OSPF Adjacencies
    ten
    20
    40
    40
    OSPF Routes Redistributed
    2000
    5000
    20,000
    20,000
    Total routes
    20,000
    50,000
    250,000
    250,000
    Source

    From the table it can be seen that balancing on NSX Edge for productive scenarios is recommended to be organized only from the Large size.

    Today I have everything. In the following sections, I’ll go through the details of configuring each NSX Edge network service.

    Also popular now: