SlideShare a Scribd company logo
Group Discussion: Migrating from a Hardware Based Firewall to NSX to
Improve Performance and Compliance, with Iain Leiter
Iain Leiter, ATSU
NET10706-GD
#NET10706
Introduction
Who are you and what is A.T. Still University?
iain leiter
Network Engineer
10+ years of IT networking experience – Certified VMware VCIX6-NV
Responsibilities include LAN, WAN, Wireless, Network Security, plus
lots more in a technologically diverse medical university environment
www.linkedin.com/in/iainleiter
Agenda
• Technical and business challenges
• Technology evaluation process
• The advantages of NSX as a firewall solution
• Our microsegmentation design
• Our deployment process
• Discoveries we’ve made along the way
Technical and Business Challenges
• Need to separate sensitive clinical, academic, and business systems
• Firewall sizing risks - possible future scalability issues
• Performance Requirements
• High Resolution Histology Imaging application
• Academic classroom video capture and VOD
• Ongoing firewall bandwidth constraints
• Reduce costs
Firewall Segmentation Goals
Firewall Technologies Considered or Evaluated
• More physical firewalls
• OS-based software firewalls
• Windows Firewall
• Linux Firewalls
• AV Firewalls
• Virtualized firewalls from other vendors
• Cisco ASAv
• Cisco ASA1000V
• Cisco VSG
• SDN/SDDC solutions
• ACI + hardware
• NSX
The advantages of NSX (DFW) as a firewall solution
• Distributed firewalling provides high performance and scalability
• Security Policies applied to the VM’s vNIC
• Firewall bandwidth capacity grows as server hardware is added
The advantages of NSX (DFW) as a firewall solution
• Pay as you grow flexibility
• Buy what you need
• No firewall sizing risk
The advantages of NSX (DFW) as a firewall solution
• Firewall capacity mobility – move firewall capacity between sites (licenses)
The advantages of NSX (DFW) as a firewall solution
• Additional visibility for improved compliance
Monitor firewalling between VMs on the same segment
The advantages of NSX (DFW) as a firewall solution
• Advanced Security Features – Microsegmentation & Automation!
• Security Benefit - Firewall policy is enforced at the VM’s vNIC
• Independent of the guest OS or underlying network hardware
• BONUS – Additional NSX Features (*VXLAN, Routing, Load-Balancing)
• SIDENOTE: *NSX Distributed Firewall is not dependent on VXLAN
• Simplified incremental migration
• Enable Security Policy one application or VM at a time
Our microsegmentation design
• Use Service Composer
• Application X and Y are
isolated from each
other even though
they are on the same
subnet.
• The Security Policies of
the tiers of each
application only permit
the necessary ports
required for inter-tier
communication
Our deployment process (“brown field”)
• Install NSX Manager Virtual Appliance ova & register with VCenter
• Deploy the firewall VIB bundles to hosts
• Change Security Policy ”Default Applied To” value: Security Groups
• Use centralized logging (Log Insight or Splunk)
• Create ”COMMON-SERVICES” Security Policy
• With last rule of DENY ANY-ANY
• Define Security Groups and their members
• Build Security Policy for each Security Group (based on Syslog)
• Final Step – Apply “COMMON-SERVICES” Security Policy to the SG
Set Security Policy to apply to Security Groups
1 2
Use centralized logging (Log Insight or Splunk)
CRITICAL STEP!
• Visibility
• Troubleshooting
Create ”COMMON-SERVICES” Security Policy
With last rule of DENY ANY-ANY
Ports required by all
• NTP-OUT
• DNS-OUT
• SYSLOG-OUT
• SNMP-IN
• DHCP-OUT?
• WINDOWS UPDATES
• AV-OUT
• ADMIN-PORTS-IN
• LAST RULE
• ANY-ANY DENY
(enable logging)
Brown Field Firewall Policy Assumptions
• Default allow all traffic any-any out of the box (don’t kill the environment!)
• Incremental migration to zero-trust (whitelist) for all applications
• Use “recon rules” with Splunk to build policy for brown field systems
(this process could also be used to troubleshoot green field deployment)
Rule creation process using ”Recon Rules” & Splunk
• Create a new Security Group & Security Policy for the Application
• Assign SP to the SG and create two firewall “recon” rules
• ANY-OUT (allow and LOG)
• ANY-IN (allow and LOG)
• Monitor Splunk and use the log data to build new rules for valid traffic
• Each new permit rule should be created ABOVE the recon rules (no logging)
• Once all valid traffic is defined, remove the recon rules and assign the
”COMMON-SERVICES” Security Policy
(any traffic not matching a rule will ultimately be dropped by implicit deny).
Security Groups and Security Policies
1. Define Security Groups for each Application
and Application Tier
(Add VMs or Create Dynamic Membership Rule)
2. Build Security Policy & apply to Security Group
(Create rules for traffic based on Syslog data)
3. Final Step – Apply “COMMON-SERVICES” Security
Policy to the SG
(FIREWALL IS NOW ACTIVE – Drops will be logged)
Discoveries we’ve made along the way
• Prevalence of vendor installed remote support backdoors
• Identification and mitigation of internal application architecture security issues
• The profound security implications of a microsegmented design
• (VM) Monitor > Service Composer > Firewall Rules (See ALL rules assigned to the VM!)
• Centralized Syslog provides great visibility for troubleshooting and auditing
• Self-cleaning Firewall Policies – Less stale ACLs to pick through!
• Basic firewall policy automation – Not difficult
Firewall Policy Automation .. Dynamic SG Membership
Firewall Policy Automation .. for mere mortals
Key Feature: View all rules applied to a VM
Recommended Resources
NSX Hands on Labs (HOL)
http://labs.hol.vmware.com/
• HOL-SDC-1603 VMware NSX Introduction
• HOL-SDC-1625 VMware NSX Advanced
VMworld Sessions
• SEC8348 Deploying Security in a Brownfield Environment
• NET7944 NSX Brownfield Deployment Best Practice
LucidChart.com – 100% Web-based diagramming tool with live collaboration
Splunk or LogInsight
Questions?
iain leiter
Network Engineer
10+ years of IT networking experience – Certified VMware VCIX6-NV
Responsibilities include LAN, WAN, Wireless, Network Security, plus
lots more in a diverse medical university environment
www.linkedin.com/in/iainleiter
CONFIDENTIAL26
VMworld 2016: Migrating from a hardware based firewall to NSX to improve performance and compliance, with iain leiter
Group Discussion: Migrating from a Hardware Based Firewall to NSX to
Improve Performance and Compliance, with Iain Leiter
Iain Leiter, ATSU
NET10706-GD
#NET10706

More Related Content

PDF
Mejores prácticas de IAM
PPTX
HITRUST Certification
PPTX
Giới thiệu và triển khai private cloud
PDF
Unit I Role of Mathematical Model in BI and BI Cycle.pdf
PPTX
VIRTUAL CLUSTERS AND RESOURCE MANAGEMENT
PPTX
Virtual machine security
PDF
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
PPTX
Oracle 23c New Features For DBAs and Developers.pptx
Mejores prácticas de IAM
HITRUST Certification
Giới thiệu và triển khai private cloud
Unit I Role of Mathematical Model in BI and BI Cycle.pdf
VIRTUAL CLUSTERS AND RESOURCE MANAGEMENT
Virtual machine security
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Oracle 23c New Features For DBAs and Developers.pptx

What's hot (20)

PDF
management of distributed transactions
PPTX
5. IO virtualization
PDF
Logical Network Perimeter in Cloud Computing
PPTX
vm provisioning
PDF
Microservices Design Patterns
PDF
Huda plots scheme Pataudi sector 5 Deen dayal yojna
PDF
The Potential of Blockchain Technology
PPTX
Scheduling in Cloud Computing
PPT
chapter5-file system implementation.ppt
PPT
Cloud computing PPT
PPTX
DISTRIBUTED COMPUTTING (snapshot).pptx
PPTX
Desktop virtualization
PDF
Multitenancy in cloud computing architecture
PPT
Virtualization in cloud
PPT
Security Issues of Cloud Computing
PDF
Introduction to Cloud Computing
PPTX
Presentation on the topic of association rule mining
PPTX
5 BENEFITS OF HYBRID CLOUD
PDF
Virtualization for Cloud Environment
PPTX
What is Multi-Tenant Architecture ?
management of distributed transactions
5. IO virtualization
Logical Network Perimeter in Cloud Computing
vm provisioning
Microservices Design Patterns
Huda plots scheme Pataudi sector 5 Deen dayal yojna
The Potential of Blockchain Technology
Scheduling in Cloud Computing
chapter5-file system implementation.ppt
Cloud computing PPT
DISTRIBUTED COMPUTTING (snapshot).pptx
Desktop virtualization
Multitenancy in cloud computing architecture
Virtualization in cloud
Security Issues of Cloud Computing
Introduction to Cloud Computing
Presentation on the topic of association rule mining
5 BENEFITS OF HYBRID CLOUD
Virtualization for Cloud Environment
What is Multi-Tenant Architecture ?
Ad

Viewers also liked (20)

PPTX
VMworld 2016: Advanced Network Services with NSX
PPTX
VMworld 2016: How to Deploy VMware NSX with Cisco Infrastructure
PPTX
VMworld 2016: vSphere 6.x Host Resource Deep Dive
PPTX
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI Automation
PPTX
VMworld 2016: What's New with Horizon 7
PPTX
VMworld 2015: VMware NSX Deep Dive
PPTX
NSX for vSphere Logical Routing Deep Dive
PDF
VMworld 2015: The Future of Network Virtualization with VMware NSX
PPTX
VMworld 2016: Virtual Volumes Technical Deep Dive
PPTX
VMworld 2016: Troubleshooting 101 for Horizon
PDF
VMware NSX - Lessons Learned from real project
PPTX
VMworld 2016: Virtualize Active Directory, the Right Way!
PDF
Network Virtualization with VMware NSX
PDF
An Introduction to VMware NSX
PPTX
VMworld 2016: Ask the vCenter Server Exerts Panel
PPTX
VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...
PPTX
VMworld 2016: The KISS of vRealize Operations!
PPTX
Reference design for v mware nsx
PPTX
Nsx security deep dive
PPTX
VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...
VMworld 2016: Advanced Network Services with NSX
VMworld 2016: How to Deploy VMware NSX with Cisco Infrastructure
VMworld 2016: vSphere 6.x Host Resource Deep Dive
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI Automation
VMworld 2016: What's New with Horizon 7
VMworld 2015: VMware NSX Deep Dive
NSX for vSphere Logical Routing Deep Dive
VMworld 2015: The Future of Network Virtualization with VMware NSX
VMworld 2016: Virtual Volumes Technical Deep Dive
VMworld 2016: Troubleshooting 101 for Horizon
VMware NSX - Lessons Learned from real project
VMworld 2016: Virtualize Active Directory, the Right Way!
Network Virtualization with VMware NSX
An Introduction to VMware NSX
VMworld 2016: Ask the vCenter Server Exerts Panel
VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...
VMworld 2016: The KISS of vRealize Operations!
Reference design for v mware nsx
Nsx security deep dive
VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...
Ad

Similar to VMworld 2016: Migrating from a hardware based firewall to NSX to improve performance and compliance, with iain leiter (20)

PDF
CCNP Security-Firewall
PDF
VMworld 2013: VMware NSX: A Customer’s Perspective
PDF
VMworld 2014: Introduction to NSX
PPTX
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
PPTX
New Threats, New Approaches in Modern Data Centers
PPTX
Self service it with v realizeautomation and nsx
PDF
VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...
PPTX
Reston Virtualization Group 9-18-2014
PPTX
VMware vRealize Network Insight 3.5 - Whats New
PPTX
tcp cloud in AVG
PPTX
Security and Compliance for Enterprise Cloud Infrastructure
PPTX
Design and Deploy Secure Clouds for Financial Services Use Cases
PPTX
VMware vShield - Overview
PDF
VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...
PDF
OVNC 2015-Software-Defined Networking: Where Are We Today?
PDF
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
PDF
Azure 101: Shared responsibility in the Azure Cloud
PPTX
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...
PPTX
VMware-vShield-Presentation-pp-en-Dec10.pptx
PPTX
Simplifying SDN Networking Across Private and Public Clouds
CCNP Security-Firewall
VMworld 2013: VMware NSX: A Customer’s Perspective
VMworld 2014: Introduction to NSX
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
New Threats, New Approaches in Modern Data Centers
Self service it with v realizeautomation and nsx
VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...
Reston Virtualization Group 9-18-2014
VMware vRealize Network Insight 3.5 - Whats New
tcp cloud in AVG
Security and Compliance for Enterprise Cloud Infrastructure
Design and Deploy Secure Clouds for Financial Services Use Cases
VMware vShield - Overview
VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...
OVNC 2015-Software-Defined Networking: Where Are We Today?
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
Azure 101: Shared responsibility in the Azure Cloud
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...
VMware-vShield-Presentation-pp-en-Dec10.pptx
Simplifying SDN Networking Across Private and Public Clouds

More from VMworld (18)

PPTX
VMworld 2015: Troubleshooting for vSphere 6
PPTX
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
PPTX
VMworld 2015: Advanced SQL Server on vSphere
PPTX
VMworld 2015: Virtualize Active Directory, the Right Way!
PPTX
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
PPTX
VMworld 2015: Building a Business Case for Virtual SAN
PPTX
VMworld 2015: Explaining Advanced Virtual Volumes Configurations
PPTX
VMworld 2015: Virtual Volumes Technical Deep Dive
PPTX
VMworld 2015: Networking Virtual SAN's Backbone
PPTX
VMworld 2015: The Best SDDC!
PPTX
VMworld 2015: Conversation with the VMware CIO Suggestions on being an IT Leader
PPTX
VMware 2015: Next Horizon for Cloud Networking and Security
PPTX
VMworld 2015: VMware NSX Deep Dive
PPTX
VMworld 2015: vSphere Distributed Switch 6 –Technical Deep Dive
PPTX
VMworld 2015: Introducing Application Self service with Networking and Security
PPTX
VMworld 2015: How To Troubleshoot Using vRealize Operations Manager (Deep Liv...
PPTX
VMworld 2015: Extreme Performance Series - vSphere Compute & Memory
PPTX
VMworld 2015: Extreme Performance Series - vCenter Performance Best Practices
VMworld 2015: Troubleshooting for vSphere 6
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
VMworld 2015: Advanced SQL Server on vSphere
VMworld 2015: Virtualize Active Directory, the Right Way!
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
VMworld 2015: Building a Business Case for Virtual SAN
VMworld 2015: Explaining Advanced Virtual Volumes Configurations
VMworld 2015: Virtual Volumes Technical Deep Dive
VMworld 2015: Networking Virtual SAN's Backbone
VMworld 2015: The Best SDDC!
VMworld 2015: Conversation with the VMware CIO Suggestions on being an IT Leader
VMware 2015: Next Horizon for Cloud Networking and Security
VMworld 2015: VMware NSX Deep Dive
VMworld 2015: vSphere Distributed Switch 6 –Technical Deep Dive
VMworld 2015: Introducing Application Self service with Networking and Security
VMworld 2015: How To Troubleshoot Using vRealize Operations Manager (Deep Liv...
VMworld 2015: Extreme Performance Series - vSphere Compute & Memory
VMworld 2015: Extreme Performance Series - vCenter Performance Best Practices

Recently uploaded (20)

PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Approach and Philosophy of On baking technology
PDF
Encapsulation theory and applications.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
KodekX | Application Modernization Development
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
Unlocking AI with Model Context Protocol (MCP)
NewMind AI Weekly Chronicles - August'25 Week I
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Per capita expenditure prediction using model stacking based on satellite ima...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Understanding_Digital_Forensics_Presentation.pptx
Approach and Philosophy of On baking technology
Encapsulation theory and applications.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Dropbox Q2 2025 Financial Results & Investor Presentation
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
KodekX | Application Modernization Development
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Machine learning based COVID-19 study performance prediction
Advanced methodologies resolving dimensionality complications for autism neur...

VMworld 2016: Migrating from a hardware based firewall to NSX to improve performance and compliance, with iain leiter

  • 1. Group Discussion: Migrating from a Hardware Based Firewall to NSX to Improve Performance and Compliance, with Iain Leiter Iain Leiter, ATSU NET10706-GD #NET10706
  • 2. Introduction Who are you and what is A.T. Still University? iain leiter Network Engineer 10+ years of IT networking experience – Certified VMware VCIX6-NV Responsibilities include LAN, WAN, Wireless, Network Security, plus lots more in a technologically diverse medical university environment www.linkedin.com/in/iainleiter
  • 3. Agenda • Technical and business challenges • Technology evaluation process • The advantages of NSX as a firewall solution • Our microsegmentation design • Our deployment process • Discoveries we’ve made along the way
  • 4. Technical and Business Challenges • Need to separate sensitive clinical, academic, and business systems • Firewall sizing risks - possible future scalability issues • Performance Requirements • High Resolution Histology Imaging application • Academic classroom video capture and VOD • Ongoing firewall bandwidth constraints • Reduce costs
  • 6. Firewall Technologies Considered or Evaluated • More physical firewalls • OS-based software firewalls • Windows Firewall • Linux Firewalls • AV Firewalls • Virtualized firewalls from other vendors • Cisco ASAv • Cisco ASA1000V • Cisco VSG • SDN/SDDC solutions • ACI + hardware • NSX
  • 7. The advantages of NSX (DFW) as a firewall solution • Distributed firewalling provides high performance and scalability • Security Policies applied to the VM’s vNIC • Firewall bandwidth capacity grows as server hardware is added
  • 8. The advantages of NSX (DFW) as a firewall solution • Pay as you grow flexibility • Buy what you need • No firewall sizing risk
  • 9. The advantages of NSX (DFW) as a firewall solution • Firewall capacity mobility – move firewall capacity between sites (licenses)
  • 10. The advantages of NSX (DFW) as a firewall solution • Additional visibility for improved compliance Monitor firewalling between VMs on the same segment
  • 11. The advantages of NSX (DFW) as a firewall solution • Advanced Security Features – Microsegmentation & Automation! • Security Benefit - Firewall policy is enforced at the VM’s vNIC • Independent of the guest OS or underlying network hardware • BONUS – Additional NSX Features (*VXLAN, Routing, Load-Balancing) • SIDENOTE: *NSX Distributed Firewall is not dependent on VXLAN • Simplified incremental migration • Enable Security Policy one application or VM at a time
  • 12. Our microsegmentation design • Use Service Composer • Application X and Y are isolated from each other even though they are on the same subnet. • The Security Policies of the tiers of each application only permit the necessary ports required for inter-tier communication
  • 13. Our deployment process (“brown field”) • Install NSX Manager Virtual Appliance ova & register with VCenter • Deploy the firewall VIB bundles to hosts • Change Security Policy ”Default Applied To” value: Security Groups • Use centralized logging (Log Insight or Splunk) • Create ”COMMON-SERVICES” Security Policy • With last rule of DENY ANY-ANY • Define Security Groups and their members • Build Security Policy for each Security Group (based on Syslog) • Final Step – Apply “COMMON-SERVICES” Security Policy to the SG
  • 14. Set Security Policy to apply to Security Groups 1 2
  • 15. Use centralized logging (Log Insight or Splunk) CRITICAL STEP! • Visibility • Troubleshooting
  • 16. Create ”COMMON-SERVICES” Security Policy With last rule of DENY ANY-ANY Ports required by all • NTP-OUT • DNS-OUT • SYSLOG-OUT • SNMP-IN • DHCP-OUT? • WINDOWS UPDATES • AV-OUT • ADMIN-PORTS-IN • LAST RULE • ANY-ANY DENY (enable logging)
  • 17. Brown Field Firewall Policy Assumptions • Default allow all traffic any-any out of the box (don’t kill the environment!) • Incremental migration to zero-trust (whitelist) for all applications • Use “recon rules” with Splunk to build policy for brown field systems (this process could also be used to troubleshoot green field deployment)
  • 18. Rule creation process using ”Recon Rules” & Splunk • Create a new Security Group & Security Policy for the Application • Assign SP to the SG and create two firewall “recon” rules • ANY-OUT (allow and LOG) • ANY-IN (allow and LOG) • Monitor Splunk and use the log data to build new rules for valid traffic • Each new permit rule should be created ABOVE the recon rules (no logging) • Once all valid traffic is defined, remove the recon rules and assign the ”COMMON-SERVICES” Security Policy (any traffic not matching a rule will ultimately be dropped by implicit deny).
  • 19. Security Groups and Security Policies 1. Define Security Groups for each Application and Application Tier (Add VMs or Create Dynamic Membership Rule) 2. Build Security Policy & apply to Security Group (Create rules for traffic based on Syslog data) 3. Final Step – Apply “COMMON-SERVICES” Security Policy to the SG (FIREWALL IS NOW ACTIVE – Drops will be logged)
  • 20. Discoveries we’ve made along the way • Prevalence of vendor installed remote support backdoors • Identification and mitigation of internal application architecture security issues • The profound security implications of a microsegmented design • (VM) Monitor > Service Composer > Firewall Rules (See ALL rules assigned to the VM!) • Centralized Syslog provides great visibility for troubleshooting and auditing • Self-cleaning Firewall Policies – Less stale ACLs to pick through! • Basic firewall policy automation – Not difficult
  • 21. Firewall Policy Automation .. Dynamic SG Membership
  • 22. Firewall Policy Automation .. for mere mortals
  • 23. Key Feature: View all rules applied to a VM
  • 24. Recommended Resources NSX Hands on Labs (HOL) http://labs.hol.vmware.com/ • HOL-SDC-1603 VMware NSX Introduction • HOL-SDC-1625 VMware NSX Advanced VMworld Sessions • SEC8348 Deploying Security in a Brownfield Environment • NET7944 NSX Brownfield Deployment Best Practice LucidChart.com – 100% Web-based diagramming tool with live collaboration Splunk or LogInsight
  • 25. Questions? iain leiter Network Engineer 10+ years of IT networking experience – Certified VMware VCIX6-NV Responsibilities include LAN, WAN, Wireless, Network Security, plus lots more in a diverse medical university environment www.linkedin.com/in/iainleiter
  • 28. Group Discussion: Migrating from a Hardware Based Firewall to NSX to Improve Performance and Compliance, with Iain Leiter Iain Leiter, ATSU NET10706-GD #NET10706