Architecture Guide For VMware NSX - Rel 2 - Oct 2018
Architecture Guide For VMware NSX - Rel 2 - Oct 2018
Architecture Guide For VMware NSX - Rel 2 - Oct 2018
RELEASE 2.1
OCTOBER 2018
Table of Contents
Table of Contents
Purpose of This Guide......................................................................................................................................................... 1
Audience................................................................................................................................................................................................................. 1
Related Documentation...................................................................................................................................................................................... 1
Introduction.......................................................................................................................................................................... 2
VMware vCenter................................................................................................................................................................................................... 5
Design Model......................................................................................................................................................................17
Summary..............................................................................................................................................................................20
• Provides an architectural overview for using Palo Alto Networks VM-Series Firewall for NSX in order to provide
visibility, control, and protection to your applications built in a VMware NSX SDDC. It links the technical aspects
of the VMware NSX and Palo Alto Networks solutions together before exploring the design model. Use this
guide as a roadmap for architectural discussions between Palo Alto Networks and your organization.
• Is required reading prior to using the Deployment Guide for VMware NSX. The deployment guide provides as pro-
cedures for programming features of the VMware NSX and the Palo Alto Networks VM-Series Firewall for NSX
in order to achieve an integrated design.
AUDIENCE
This architecture guide is written for technical readers, including solution architects and engineers, who want to deploy
the Palo Alto Networks Security Operating Platform in a private cloud data center infrastructure. It assumes the reader
is familiar with the basic concepts of applications, networking, virtualization, security, and high availability, as well as a
basic understanding of virtualized network and data center architectures.
A working knowledge of networking and policy in PAN-OS® is required to be successful. It also assumes a working
knowledge of VMware NSX Manager network configurations.
RELATED DOCUMENTATION
The following documents support this design guide:
• Palo Alto Networks Security Operating Platform Overview—Introduces the various components of the Security
Operating Platform and describes the roles they can serve in various designs
• Deployment Guide for VMware NSX—Describes high-level tasks and then details the configuration steps for de-
ploying the next-generation firewall as part of a VMware NSX-based private data center.
Introduction
Three major building blocks are common in all data center environments: compute, storage, and network. These three
elements are combined in various quantities and topologies to provide data center infrastructure, which provides appli-
cations and data processing to meet business requirements. Configuration and administration of these three elements
in most data center environments require careful coordination between different groups in order to provide network
connectivity and storage resources prior to application deployment. Network security policy configuration or changes
may also be required. This coordination of duties can delay application delivery and business agility.
One approach organizations have taken to minimize coordination bottlenecks is to present all network connectivity to
all compute resources, often by trunking all available VLANs to every server, and application network connectivity is
associated at the time of application creation. This model has implied trust that applications are deployed on the cor-
rect network segment and provides no visibility or separation within network segments. Add server virtualization to the
equation and applying security policy in this highly dynamic environment can be a challenge when virtualized applica-
tions move around the data center.
The ideal goal is to permit network, storage, and security teams to define independent policies that are dynamically
linked to applications and for these characteristics remain associated with applications throughout their lifecycle. This
model permits rapid provisioning and management of applications without advanced coordination of network, storage,
and security teams. This model enables high-level policies such as:
• Application servers can communicate with database servers, without regard for physical or virtual instantiation
of the services.
The policies are maintained when virtualized servers are moved throughout the data center or new servers are created.
This model is referred to as software-defined data center.
• North-south—Refers to data flows that move in and out of the virtualized environment from the host network.
Sometimes traffic between application tiers are also called north-south; for the purposes of this guide, north-
south traffic flows are to and from the virtualized environment. For performance reasons, north-south traffic
is usually secured by one or more physical form factor, perimeter firewalls. The edge firewall is usually a high-
throughput hardware appliance deployed in high availability mode in order to ensure application resiliency.
• East-west—Refers to data flows moving between virtual workloads entirely within your private cloud. East-west
traffic flows within the data center are often less well understood. East-west visibility and security enforcement
can be difficult because the network elements providing transport usually don’t provide the required features,
and the highly dynamic nature of software-defined data centers further complicates applying these services at
the correct network locations. East-west traffic visibility and security policy has long been a goal for many orga-
nizations wanting to enhance internal data center security. The VMware NSX solution was designed to address
the challenges of this highly dynamic environment and bring visibility and security directly to virtualized applica-
tions, regardless of application location or network connectivity. East-west firewalls are inserted transparently
into the application infrastructure and do not necessitate a redesign of the logical topology.
Data centers are centralized repositories of your organization’s most critical asset: the data that drives your business,
which could include very sensitive customer information such as credit card numbers or patient medical records. Your
data is a target for cybercriminals, as evidenced by the number of high-profile data breaches. Historically, organizations
implemented network security to protect traffic flowing north-south. The assumption was that the threats were outside
your network and that east-west visibility was difficult. However, relying on north-south protection alone is insufficient
for protecting your data center. The compromise of a single data center asset could provide cybercriminals the pivot
point they need to further compromise your data. To improve security posture relative to corporate data risk, organiza-
tions have acknowledged that protection from threats across the entire network, both north-south and east-west, has
become a security requirement. Regulatory compliance, such as HIPPA, PCI, and GDPR, often dictate additional data
security policies.
One common practice in data centers is the logical grouping of application functions by trust level. All application func-
tions within a tier are inherently trusted, and only traffic between tiers is inspected. This practice is known as network
segmentation. Network segmentation has traditionally been applied between network segment (VLANS or subnets)
because all traffic entering and leaving the segment must pass through a single network location.
Higher-risk assets may require additional security policy between services within a network segment. Extending the
concept of network segmentation to finer grain and larger scale can be difficult to deploy and manage because the limi-
tations of number of VLANs or IP address subnetting grow rapidly. The ability to provide additional network security,
without the need for network segmentation, can be very useful. Micro-segmentation provides this ability without need
for network topology changes or application server IP address changes.
Logical segmentation of application functions during its lifecycle (development, testing, staging, and production),
without regard for location within the data center, is also very useful. DevOps is becoming a more common practice for
application development, and logical segmentation enables the agility required. Logical segmentation also plays a role
in multitenancy, the ability to support many customers using the same applications while keeping their network traffic
separate from each other.
When security events do occur, your ability to respond to these events in a timely fashion is critical. Automation within
the virtualized data center allows your infrastructure to respond to security events by applying appropriate security
controls to protect the network and notification when these events occur. This automated response provides the
timely protection to all assets within your data center, and the ability to safely remediate impacted resources.
Palo Alto Networks and VMware have partnered to provide a solution that enables the benefits of a software-defined
data center, while also providing automated security services of Palo Alto Networks VM-Series next-generation fire-
walls and advanced threat prevention. The integrated solution is composed of three components: VMWare NSX, the
VM-Series firewall, and Panorama™. The following sections first describe the required VMware NSX components and
then present the required Palo Alto Networks components of this solution.
The following sections describe the required VMware components and features that enable this solution.
The virtual separation of guest functions of vSphere ESXi provides limited visibility into the virtual server containers
and their configuration. To provide visibility to the configuration of virtual guests, an application called VMware Tools
is installed on the guests. VMware Tools can be installed for all supported guest operating systems from vCenter or
vSphere ESXi. Another option for Linux-based guests is the use of open-vm-tools, which provides the same functional-
ity. Beginning with PAN-OS 7.1, VM-series firewalls have open-vm-tools installed as part of the native configuration.
VMWARE VCENTER
A data center might contain hundreds or thousands of virtualized servers. Managing individual vSphere ESXi servers
at this scale would be untenable. VMware vCenter provides the data center management functions of all virtualized
server resources and is the center point of management for your SDDC.
The default web interface for vCenter and ESXi makes use of Adobe Flash. Google Chrome provides built-in Pepper
Flash version 170, which has Shockwave Flash crashes; reverting to version 159 resolves these crashes. Using Adobe
Flash Player version 11.5 with your browser provides the greatest compatibility.
4096 GB
4096 GB
4096 GB
4096 GB
4096 GB
Bl ahbl ah
Bl ahbl ah
Bl ahbl ah
Bl ahbl ah
Bl ahbl ah
Bl ahbl ah
4096 GB
4096 GB
4096 GB
Bl ahbl ah
Bl ahbl ah
Bl ahbl ah
x86 x86
4096 GB
4096 GB
4096 GB
4096 GB
4096 GB
4096 GB
Bl ahbl ah
Bl ahbl ah
Bl ahbl ah
Bl ahbl ah
Bl ahbl ah
Bl ahbl ah
4096 GB
4096 GB
4096 GB
Bl ahbl ah
Bl ahbl ah
Bl ahbl ah
The NSX data plane creates a logical overlay virtual network of Layer 2 switches, Layer 3 routers, and Layer 4 firewalls.
This logical network provides the ability to group application servers on a logical Layer 2 switch, which can span across
arbitrary physical networks. NSX creates this logical networking by tunneling traffic using a protocol called VXLAN. NSX
virtual networking is based on vSphere Distributed Switch, with additional capabilities added by hypervisor extensions
on each physical host within the data center. Distributed Virtual Switch is a required licensed feature with vCenter for
NSX deployments.
NSX control plane is implemented as a set of three guest VMs that maintain the operational status of all the virtual net-
working elements. A cluster of three NSX controllers is required for successful installation; the cluster provides a highly
reliable, distributed state database of all logical network elements within the NSX environment. Examples of network
state include: MAC address tables, ARP tables, Layer 3 routing information, and Layer 4 stateful firewall sessions.
NSX controllers are critical components to continuous functioning of the control plane. To maintain high availability, the
controllers implement a protocol called Paxos among the members. The Paxos protocol enables a collection of unreli-
able members to arrive at a consensus of the current network state, ensuring consistent network state even with the
failure of any single controller.
NSX Manager extends the functionality of ESXi hypervisors, adding kernel modules that provide additional capabilities.
The process of adding these additional hypervisor modules is called host preparation. Host preparation is applied at the
vCenter cluster level, to all hosts within a given cluster.
10.0.0.0/8
Distributed
Logical Router
DB Servers
Web Servers App Servers Logical Switch
Logical Switch Logical Switch
Physical Network
10.0.0.0/8
Distributed firewall uses IO chaining to provide additional security services for third-party solutions (network introspec-
tion). IO chaining identifies traffic for additional inspection by Layer 2 MAC address or Layer 3 IP address. Distributed
firewall maintains two state tables that are attached to each VM:
When VMs are migrated, the rule and connection tracker tables move along with the VM, ensuring consistent network
security and no disruption in current traffic flows. Network flows that were inspected and permitted by network intro-
spection continue to flow, while new flows will be subject to network introspection policy at the VM’s new destination
host.
IP Sets
NSX distributed firewall uses guest VM IP and MAC addresses to apply security policy and redirect traffic to third-party
solutions for additional inspection. Virtual machines communicate their IP addresses to vCenter by using VMware Tools.
For VMs not running VMware tools, you need a mechanism to associate them with distributed firewall security policy.
IP sets provide the ability to assign a group of IP addresses to a security group. IP sets contain a combination of comma
separated list of IP addresses, a range of IP addresses, or CIDR block notation.
SpoofGuard
Ensuring an accurate association of guest VM IP address use is very important to maintaining data center security. After
synchronizing with the vCenter Server, NSX Manager collects the IP addresses of all vCenter guest virtual machines
from VMware Tools on each virtual machine, or from IP discovery if it is enabled. IP discovery uses DHCP snooping and
ARP snooping to dynamically observe VM IP addresses, and to prevent malicious use of otherwise authorized IP ad-
dresses. You also have the option to manually inspect and approve IP address use. SpoofGuard is disabled by default.
Security Tags
Security tags are a VM attribute assigned by an administrator or applied through automation. Security tags provide dy-
namic association of VMs with security policy through security group membership. Security tags can be user-generated
or system-defined. To provide automated response to threats in your data center, Panorama can apply security tagging
based on firewall logging.
Service Manager
Service managers register with NSX Manager to provide network introspection security services. Panorama registers
with NSX Manager as a service manager, providing service definitions and service profiles.
Beginning with PAN-OS version 8.0, most of the VM-series firewalls are supported with NSX. Multiple VM-series
firewalls can be deployed on a single host, as long as the overall CPU cores, memory, and storage requirements are met
for the firewalls. Multiple firewalls can be deployed to meet performance or multitenancy requirements.
The table below provides performance comparison of VMware NSX compatible PAN-OS 8.0 VM-series firewalls using
the maximum number of CPU cores.
VM-100/ VM-300/
VM-200 VM-1000-HV VM-500
Property (2 cores) (4 cores) (8 cores)
Firewall throughput 1 Gbps 1.5 Gbps 3 Gbps
Threat prevention throughput 500 Mbps 1 Gbps 3 Gbps
Maximum sessions 250,000 800,000 2,000,000
Security Groups
Security groups provide a flexible way to group virtual machines to which security policy is applied. Several options
based on VM configuration state can be used to associate security groups. This design uses security tags and IP sets to
assign security groups.
Security groups can also be created by dynamic address objects from Panorama by setting the match criteria
‘_nsx_[security group name]’. The address group name and match criteria for security group name must match exactly
in characters and case; otherwise, the security group will not be creating in NSX.
Security Policy
Security policy identifies the network traffic which is to be allowed or blocked by distributed firewall and optionally
inspected by network introspection. All security policies require a security group for source, destination, or source and
destination. A security policy is created with implicit reference to an unnamed security group, and then the security
policy is applied to a security group; you don’t explicitly identify the security group within a security policy.
Service Definitions
As a service manager, Panorama registers NSX service definitions, which can be used in network introspection of NSX
security policies. Service definitions specify the Panorama device group and template to which newly deployed VM-
series firewalls are to register. The device group identifies the capacity license of VM-series firewall (VM-100, VM-300,
or VM-500) based on its authorization code. Service definitions also specify the URL for the VM-series firewall OVF file
and the notify group.
Figure 11 Panorama Service Manager and service definition name mapping to NSX Manager
Service Profile
NSX service profiles are used in NSX security policies to provide network introspection services. Virtual wire security
zones created in your Panorama templates create these service profiles in NSX Manager. NSX security policy using a
network introspection service profile forwards the traffic to the associated VM-series firewall virtual wire interface for
additional inspection. Multiple service profiles permit you to apply different security policies on the VM-series firewall
for applications such as multitenancy.
VM-series firewalls present a virtual wire interface to NSX Manager, with the same security zone on both sides of the
virtual wire. Security policies in this type of environment should only be intrazone. Only traffic within the data center, to
and from address groups, should be used in security policy. Default firewall policy (source/destination=any) should be
addressed in the perimeter firewall.
NSX firewall doesn’t understand the Panorama service object application-default, nor can you use more specific
service objects in Panorama security policy. They will all be mapped to any in NSX steering rules. To more specifically
target steering rules, you must modify the auto-generated Panorama steering rules to use service object names under-
stood by NSX.
Design Model
In SDDCs, you can steer traffic through a series of software functions that have replaced physical infrastructure service
appliances, such as firewalls and load balancers. In NSX, you can deploy these services with greater granularity by
inserting them into a specific forwarding path. This model is called the service insertion model. When multiple functions
are so combined, it is referred to as service chaining.
As a hypervisor-integrated software platform, NSX uses the workload-centric insertion point of data center infrastruc-
ture services. It involves steering specified traffic via the NSX Distributed Firewall (DFW) through one or more service
virtual machines (SVMs). SVMs bypass the typical network stack and instead receive traffic directly via a messaging
channel that runs at the hypervisor layer. Network traffic designated for redirection to a third-party service is defined
using the traffic steering option of the NSX Distributed Firewall Rules. Traffic permitted by the distributed firewall can
be forwarded for further inspection. Traffic steering rules redirect Layer 3 or Layer 4 traffic to a specific SVM for ad-
ditional inspection.
When deploying the Palo Alto Networks VM-Series firewall on NSX, the firewall is inserted as an SVM following the
workload-centric service insertion model, either as a standalone service insertion or as part of a service chain. NSX dis-
tributes network services into the VM vNIC to form a logical pipeline of services applied to virtual network traffic. The
Palo Alto Networks VM-Series firewall integrates directly into this logical pipeline using virtual wire, enabling visibility
and safe enablement of VM traffic, along with safe enablement of applications and complete threat protection.
• More granular, dynamic security policies based on application, user, content and virtual machine “container”
Separation of data center operational duties from security policy creation and application can be a desirable capability.
Security-oriented security policy separates security functions from data center operations. Desired data center security
policy is created in Panorama, which then configures NSX security policy. Security policies created in Panorama and
pushed to NSX become the authoritative security policy and replace natively configured security policy.
When deploying the VM-Series in the service insertion model, you must determine how to balance operations-orient-
ed vs. security-oriented policies.
Summary
Meeting business demands for faster innovation, and doing so securely, can be a significant challenge. The integrated
solution of Palo Alto Networks Panorama and VM-Series for VMware NSX provides the flexibility to respond to busi-
ness requirements, improve operation efficiency, and raise overall security posture. The automated deployment of
VM-Series firewalls ensures workload-level visibility for user- and application-level policies to enable logical micro-
segmentation of the SDDC traffic in a north-south or east-west fashion while providing advanced threat prevention
capabilities across all flows. Further, this solution ensures that the security policies being enforced stay current with
dynamic nature of both the virtualized network and hypervisor environments.
Headquarters
© 2018 Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark of Palo Alto Networks. A list of our trade-
marks can be found at http://www.paloaltonetworks.com/company/trademarks.html. All other marks mentioned herein may
be trademarks of their respective companies. Palo Alto Networks reserves the right to change, modify, transfer, or other-
wise revise this publication without notice.
B-000180P-1 10/18