Table of Contents HOL-PRT-1462

Size: px
Start display at page:

Download "Table of Contents HOL-PRT-1462"

Transcription

1 Table of Contents Lab Overview - - Palo Alto Networks Next-Generation Security Platform with VMware NSX... 3 Lab Guidance... 4 Palo Alto Networks VM-Series and VMware NSX Dynamic Security Policy Configuration.. 5 Module Descriptions... 6 Key Concepts and Terms... 7 Some Components and Concepts of Vmware and Palo Alto Networks...8 Lab Components and Topologies Lab Components Lab Topologies Module 1: Palo Alto Networks VM-Series and VMware NSX dynamic security policy configuration (30 Min) Module 1 Overview: Palo Alto Networks VM-Series and VMware NSX dynamic security policy configuration (30 minutes).` Environment Setup Examining the NSX Security Groups within NSX Manager Examine your Dynamic Address Groups Examine the Security Policies Generate Traffic from your Web Server to the Database Troubleshoot Traffic Steering Problem Prepare to Generate Database Traffic With Logging Generate Database Table Calls App-ID by Palo Alto Networks App-ID for SSH Module 1 Lab 1 - Conclusion Module 2: Deploying Palo Alto Networks VM-Series with VMware NSX to protect a multitier application (45 Min) Module Overview Review Security Tags for Legal Servers Create NSX Security Groups and Configure Traffic Steering Create Steering Policy for all Web Server to Database Server Traffic...73 Create Dynamic Address Groups (DAG) Create a Security Policy within Panorama Review NSX Security Group and DAG Membership Generate Traffic Inspect Panorama Traffic Logs Lab 2 Conclusion Module 3: Using Distributed FireWall (DFW) to Protect Intra-tier Traffic (30 Min) Module Overview Create NSX Security Groups Create NSX DFW Security Policies Enable Flow Collection for NSX DFW Statistics Page 1

2 Checking NSX DFW Policies Conclusion Summary of what we've learned Page 2

3 Lab Overview - HOL- PRT Palo Alto Networks Next- Generation Security Platform with VMware NSX Page 3

4 Lab Guidance How do you accelerate the deployment of business-critical applications without compromising security? How do you define dynamic security policies to protect against advanced threats while keeping pace with data center virtualization? VMware and Palo Alto Networks have partnered to deliver a solution that combines fast provisioning of network and security services with next-generation security in the data center. In this lab, learn how to configure the Palo Alto Networks virtualized next-generation firewall VM-1000-HV with VMware NSX to secure VM to VM communications. Network virtualization provides speed and flexibility when provisioning network and network services in the virtualized datacenter. But what is more important than speed and flexibility when provisioning such virtualized networks? Security and the securing of your virtualized networks! Securing your VMs, your databases, your webservers, your file servers, and your data stores should be of paramount importance to you, and to the reputation of your company. Therefore, here within this hands-on-lab, you will learn how to do just that using the latest in next-generation enterprise security The Palo Alto Networks VM- Series Firewall platform as integrated with VMware NSX. Throughout this lab we will demonstrate how to secure the datacenter using the Palo Alto Networks virtualized next-generation firewall VM-1000-HV with VMware NSX protecting VM to VM communications from today s advanced threats. Page 4

5 Palo Alto Networks VM- Series and VMware NSX Dynamic Security Policy Configuration Page 5

6 Module Descriptions Module 1: Creating Dynamic Next-generation Policy for Securing a Virtualized Data Center (30 Minutes) This module provides an overview of the Palo Alto Networks VM-Series integration with VMware NSX and the configuration of dynamic security policies based on context from VMware NSX. When finished with this module attendees will have learned: How to synchronize VMware NSX within a Palo Alto Networks nextgeneration firewall security policy; How Palo Alto Networks VM-Series automatically maintains state with a VMware virtualized datacenter; How to create Dynamic Address Groups and how to link them to NSX Security Groups to create security policies that protect east-west VM to VM traffic. Module 2: Integrating Palo Alto Networks Next-generation firewalls with NSX Security Groups and Traffic Steering (45 Minutes) In this module the VMware NSX and Palo Alto Networks VM-Series solution will be deployed to secure web-server-to-database-server applications. When finished with this module, attendees will have learned: How to create NSX Security Groups with dynamic membership using VM security tags; How to use Security Groups to create steering policies to direct relevant traffic to the Palo Alto Networks virtual firewall for policy enforcement and inspection; How to configure the VM-Series to securely manage traffic and maintain state with the VMware virtualized datacenter. Module 3: Using Distributed FireWall (DFW) to Protect Intra-tier Traffic (30 Minutes) In this module the VMware NSX DFW will be leveraged to secure intra-tier traffic (web server to web server traffic for both HR and Legal organisations). Module 1 and 2 showed inter-tier traffic (web server to DB server) protection leveraging Palo Alto Networks VM-Series Firewall. NSX DFW and Palo Alto Networks VM- Series Firewall are fully complementary components and are leveraged in the virtual network infrastructure based on advanced inspection or performance criteria. Lab Captains: Warby Warburton/ Francis Guillier Page 6

7 Key Concepts and Terms Page 7

8 Some Components and Concepts of Vmware and Palo Alto Networks Before jumping into either module it will be helpful to learn more about some of the key components, concepts and terms that you will be working with. So at this time let's make sure we understand what these are. VMware NSX VMware NSX is the leading network virtualization platform that delivers the operational model of a virtual machine for the network. Just as server virtualization provides flexible control of virtual machines running on a pool of server hardware, network virtualization with NSX provides a centralized API to provision and configure many isolated logical networks that run on a single physical network. Logical networks decouple virtual machine connectivity and network services from the physical network, giving cloud providers and enterprises the flexibility to place or migrate virtual machines anywhere in the data center while still supporting layer-2 / layer-3 connectivity and layer 4-7 network services. VMware NSX Service Composer When defining a Security Group, a user can select between dynamic inclusion, static inclusion and static exclusion. A Dynamic inclusion provides the capability to automatically include objects based on the VM Name or Security Tag. Page 8

9 A Security Policy (SP) defines the network and security policy to be applied for a particular Security Group (SG). For instance, a Security Policy can be created to define traffic redirection to the Palo Alto Networks VM-Series firewall for all types of traffic (i.e. all TCP or UDP ports) [traffic from a user defined SG to a specific SG]. To make this Security Policy operational, the next and last step is to attach the Security Policy to a Security Group or to a set of Security Groups. VMware NSX Distributed FireWall (DFW) VMware NSX DFW is a distributed L2-L4 firewall component provided within the NSX solution. It provides stateful firewalling capability down to each vnic of a VM and operates at the hypervisor kernel layer delivering near line rate performance. Global management of DFW is performed though the vcenter UI under the NSX Home tab. Security Policy policy rules can be written using vcenter objects like VM, cluster, DVS port-group, logical switch and so on. NSX DFW fully supports vmotion and current active connections remain intact during the workload mobility event. NSX DFW is a key component of micro segmentation. VMware NSX Service Composer is a framework containing 2 major constructs: Security Groups and Security Policy. Security Group (SG) is a container that can include any vcenter objects like VM, cluster, logical switch, vapp, DVS and port group. Page 9

10 Decoupled Logical Networks Decoupled logical networks consist of a physical network and a virtual network. Within each you will find a number of networks, sub-networks, servers and systems. In our case here we are viewing one physical network made up of 3 subnets that is decoupled by VMware NSX from 2 virtual networks. Page 10

11 Palo Alto Networks VM-1000-HV This VM-Series NSX edition firewall is jointly developed by Palo Alto Networks and VMware. This solution uses the NetX API to integrate the Palo Alto Networks nextgeneration firewalls and Panorama with VMware ESXi servers to provide comprehensive visibility and safe application enablement of all datacenter traffic including intra-host virtual machine communications. Logical networks decouple virtual machine connectivity and network services from the physical network, giving cloud providers and enterprises the flexibility to place or migrate virtual machines anywhere in the data center while still supporting layer-2 / layer-3 connectivity and layer 4-7 network services. The VM-1000-HV is deployed as a network introspection service with VMware NSX and Panorama. This deployment is ideal for east-west traffic inspection, and it also can secure north-south traffic. Page 11

12 Panorama by Palo Alto Networks Your Palo Alto Networks Panorama enables you to manage your distributed network of physical and/or virtual Palo Alto Networks firewalls from a centralized location while providing the ability to: View the traffic of each deployed firewall; manage all aspects for device configuration; push global policies; and generate reports on traffic patterns or security incidents, all from one central location. Panorama is available as either a dedicated management appliance or as a virtual machine. Page 12

13 The Palo Alto Networks Operating System (PAN-OS) The PAN-OS by Palo Alto Networks is the software managing the computer hardware and software resources of the Palo Alto Networks Next-generation firewall. In addition, the PAN-OS provides a long list of functions, features, and services to ensure a safe and secure environment. The PAN-OS is the same OS used throughout all Palo Alto Networks firewalls. Dynamic Address Groups Provide the ability to maintain awareness of changes in the virtual machines/ applications and ensures that security policy stays in tandem with the changes in the network. This awareness provides visibility and protection of applications in an agile environment. This is made possible because Dynamic Address Groups are used as a source or destination object within security policies. Additionally, because IP addresses are constantly changing in a datacenter environment, Dynamic Address Groups offer a way to automate the process of referencing source and/or destination addresses within security policies. Unlike static address objects that must be manually updated in configuration and committed whenever there is an address change (addition, deletion, or move), Dynamic Address Groups automatically adapt to these changes. Page 13

14 Lab Components and Topologies Page 14

15 Lab Components Requires VMware NSX Manager 6.0, vcenter and ESXi vsphere 5.5. Requires Palo Alto Networks VM-1000-HV, PAN-OS and Panorama 6.0. Requires specific server pre-configuration. See individual module for details. At times you will need to enter commands, usernames, and passwords using Command Line Interface (CLI) commands. Therefore, a text file named README.txt has been placed on the desktop of the environment so that you can easily reference these commands which will allow you copy and paste complex commands or passwords in the associated utilities CMD, Putty, console, etc., as necessary. This README.txt file is divided into Module Sections and numbered. The manual will have a number associated with every CLI command. That command will be numbered in the README.txt file for you to copy and paste. Certain characters are often not present on keyboards throughout the world. This README.txt file also includes keyboard layouts which do not provide those characters. Thank you and enjoy the labs! Page 15

16 Lab Topologies The following diagrams illustrate physical and logical topologies implemented for this Lab: Physical Topology 2 ESXi clusters will be deployed: Cluster site A and Mgmt Cluster. Cluster site A is a compute cluster where workloads will be instantiated and connected to a logical switch. VMs from HR and Legal organizations will be deployed there. Mgmt Cluster is a management cluster where control plane components of NSX will be instantiated. NSX controller is typically hosted there (NSX controller controls VXLAN operations on compute clusters). Logical Topology for HR Organization 3 VMs from HR organization (2 web servers and 1 DB server) are instantiated and connected to the same logical switch (VXLAN). Traffic protection is enforced as following: Page 16

17 -Inter-tier traffic (web server to DB server) is protected by the Palo Alto Networks VMseries firewall which provides advanced security capabilities with its single pass architecture in the form of App-ID, Content-ID, User-ID. -Intra-tier traffic (web server to web server) is protected by NSX DFW which provides near line rate performance L2-L4 security functions. Page 17

18 Logical Topology for Legal Organization 3 VMs from HR organization (2 web servers and 1 DB server) are instantiated and connected to the same logical switch (VXLAN). Traffic protection is enforced as following: -Inter-tier traffic (web server to DB server) is protected by the Palo Alto Networks VMseries firewall which provides advanced security capabilities with its single pass architecture in the form of App-ID, Content-ID, User-ID. -Intra-tier traffic (web server to web server) is protected by NSX DFW which provides near line rate performance L2-L4 security functions. Page 18

19 Module 1: Palo Alto Networks VM-Series and VMware NSX dynamic security policy configuration (30 Min) Page 19

20 Module 1 Overview: Palo Alto Networks VM-Series and VMware NSX dynamic security policy configuration (30 minutes).m During this first lab you will focus on how to create dynamic security policies on the Palo Alto Networks VM-1000-HV based on context from VMware NSX. Specific tasks will include: Introducing you to Palo Alto Networks Next Generation Firewall policy management Overview of VMware NSX and VM-1000-HV integration Understanding Dynamic Address Groups Creating dynamic security policies based on Dynamic Address Groups To successfully complete this module you will need to identify and correct ill configured settings within your policies, tags, and/or grouping. Let's begin! Page 20

21 Environment Setup vcenter Login: Let's make sure our environment, and all its systems, are up and running by checking within vcenter. To do so launch and login to vcenter. Page 21

22 vsphere Web Client to access vcenter To login into vcenter, find and launch your vcenter desktop icon as identified by the globe icon. When the VMware vsphere Web Client Login box is displayed, login with the credentials: Username = root Password = VMware1! Please note: If this is your first time logging into vcenter for this lab, the login process may take several minutes as modules are initially loaded. During this wait time please be patient. It should also be noted that subsequent logins to vcenter will be much quicker going forward. Page 22

23 vsphere Web Client to access vcenter When logged into the vsphere web client, to view your datacenter 1) click on the Home tab and then select 2) Hosts and Clusters. Page 23

24 vcenter View 1) Expand your tree view on the left side of your screen so that you can see a listing of all of your virtual systems running within your "vcsa-01a" Datacenter Site A. At this time take a moment to check the status of your VMs to make sure each are up and running. Each of the high-lighted systems above should have an illuminated green arrow indicating the specified system is up and running. Please Note: It is very likely that your Tree view listing is slightly different than what you see here. If so, that is ok. The other VMs you are seeing will be used later during the last lab found in Module 3. At this time we are just checking to make sure all of our virtual systems are up and running as reflected by the green arrow preceding the name of each virtual system. Once that is done please continue ignoring the other VMs listed. Page 24

25 Examining the NSX Security Groups within NSX Manager We want to find out what Security Groups already exist and so let's navigate into Networking & Security to check. Networking & Security 1) Go back to the "Home" page and then 2) click on "Network & Security" from either the left menu tree panel, or from the "Inventories" section of the Home tab. Security Groups 1) From the left tree panel click on "Service Composer" and then select "Security Groups" tab in the center. Notice we have two specific Security Groups for our HR Team servers. These are our HR-DB-Servers security group for the database servers and a HR-Web-Servers Security Group for the web servers. We've now confirmed our Security Groups. At this time go ahead and minimize your browser page and proceed to the next step. Page 25

26 Page 26

27 Examine your Dynamic Address Groups It's now time to introduce you to Panorama by Palo Alto Networks. As previously mentioned, Panorama provides centralized management for all of your physical and/or virtual Palo Alto Networks firewalls. Panorama itself is available as either a dedicated management appliance or as a virtual machine. Let's login to Panorama so that we can take a look at our Dynamic Address Groups. To do so go to your desktop to find and launch the Panorama desktop icon. Panorama Login After launching the "Panorama" desktop icon, your browser will display the Panorama login screen. The credentials to login are: Username = admin Password = VMware1! Page 27

28 Panorama Dashboard > Objects Tab Once logged into Panorama you'll be taken to the "Dashboard" view. Among your menu tabs at the top you'll have an "Objects" tab. Click on this tab to view your Address Groups. Address Groups Select "Address Groups" from the left tree panel and then click on "HR-Web-Servers" from under the Name column. After doing so you will launch the settings display box. Page 28

29 Address Group Settings Notice the NSX Security Group name is listed as "HR-Web-Servers-securitygroup-10" within your "Match" value display. Panorama learned this NSX Security Group information automatically from the NSX Manager. Now that we've verified the Address Group settings, click "Cancel" to exit without making any changes. Page 29

30 Examine the Security Policies Security policies play a crucial role on firewalls. As you know, these security policies state what can and cannot traverse the firewall. Applications like ping, SSH, FTP, etc., (among many others), going to and from various zones, while running on various ports, can be permitted or denied. So let's take a look at what security policies we have in place here within our environment. Policies Tab > Security Pre Rules While still logged into Panorama, let's now examine your security policies. To do so click on the 1) Policies tab. Then 2) make sure you're viewing the Pre-Rules of your Security policies from the left tree panel. Then looking to the right under the "Name" column notice you have three policies. Verify you have a policy rule for your HR web-server to HR database server traffic. This rule is called "HR Web to DB". Familiarize yourself with this rule by looking at the field headers for each of the configurations. Notice your Source and Destination Address settings and that this policy allows mysql traffic between the two. Let's now do some testing of these rules by generating some traffic. So without making any changes here please move on to the next step. Page 30

31 Generate Traffic from your Web Server to the Database At this time we're ready to do some testing. We can do so by generating certain types of traffic from our Web server to our Database server. Since we've just checked our security policies, we already know the types of traffic that will be allowed, or denied, between these two servers. So let's generate some traffic, testing to make sure everything works as expected. If so, great! But if not, well then we'll need to troubleshoot to find out why our tests failed, and once we know the reason why we'll need to implement the solution to resolve. Page 31

32 Generating Traffic from hr-web-01 To generate some traffic let's begin by logging into the web server using "putty.exe". You'll notice we already have a desktop icon for you and so simply click on the "hrweb-01" desktop icon to do so. You will be logged in automatically as the username and password have been entered and saved for you. In the event you need to manually enter the username and password to login, please see the README.txt file on the desktop for the credentials. Page 32

33 Generate Traffic - ping Test. Now that we are logged into our HR webserver let's attempt to ping our HR database using the "ping -c 5 hr-db-01" command. Notice our ping to the HR database server is successful. We are now going to check the VM-Series traffic logs to confirm the traffic was steered to the firewall. To check these traffic logs we'll need to go back into Panorama again and so to do so click on your Panorama browser tab again. Checking the Logs within Panorama Access your browser tab again and click on the Panorama tab. If prompted for credentials use "admin" and "VMware1!" for the username and password. Page 33

34 Monitoring the Logs 1) From within Panorama click on the "Monitor" tab followed by the 2) "Traffic" tab under "Logs". 3) Next adjust your log filter to reflect "Last 15 Minutes" by using the circled drop down arrow. This way we will be sure that we are filtering from view any logs older than the previous 15 minutes. Notice our logs are empty even though we generated traffic via our successful PING test. This indicates our traffic was not successfully steered to and through our VM- Series firewall. We ll need to find out why and so let's troubleshoot to find out and then let s implement the resolution. Page 34

35 Troubleshoot Traffic Steering Problem We need to determine what is preventing our VM-Series firewall from seeing the traffic generated by our PING test. So let's start off by checking our Dynamic Address Groups for both the HR web server and the HR database server. Dynamic Address Groups as Listed and Configured within Panorama 1) From within Panorama click on the Objects tab. 2) Then make sure the left tree panel selection is "Address Groups". Note we currently have two Dynamic Address Groups listed. We'll check our HR-Web-Servers group first. Specifically we want to check the IP addresses of the "HR-Web-Servers" Dynamic Address Group (DAG). 3) To see these IP addresses we'll need to click on "more" under the Addresses column. Page 35

36 Address Group for the HR-Web-Servers Notice we have two registered IPv4 addresses. Note these IP addresses then click "Close". Now let's do the same for our HR-DB-Servers Dynamic Address Group (DAG). As before click on "more" under the Addresses column but this time doing so for the "HR-DB-Servers" group. Page 36

37 Address Group for the HR-DB-Servers Notice we have no addresses listed. In fact it's all blank. This is a problem in need of resolution, but first we must do more troubleshooting to see what else we may need to resolve. To proceed, click "Close" without making any changes here. Page 37

38 NSX Manager - Security Groups To continue our troubleshooting let's now move over to our NSX Manager to check the Security Groups listed there. To do so we'll need to go back to our vsphere Client. 1) Click on the vsphere Web Client tab of your browser. Making sure you're still within "Networking & Security". 2) Click on Service Composer and 3) select your Security Groups tab in the middle. At this time notice your Virtual Machines column on the right. Note you have a value of 1 for your HR-Web-Servers which is listed as a Virtual Machine. 4) Let's take a look at that value by clicking on that high-lighted 1. Page 38

39 Virtual Machine Memberships - "HR-Web-Servers". At this point we may need to wait approximately 45 seconds before anything populates. What we're looking for though, is that under the "Virtual Machines" tab we should see our HR web server "hr-web-01" listed as a member of our virtual machine. Now that we ve confirmed the presence of our VM go ahead and close by clicking on the x in the upper right corner of the display box.now let's take a look at our HR-DB-Servers security group by attempting to do the same. Virtual Machine Memberships - "HR-DB-Servers". This time select your HR-DB-Servers Security Group. Then notice the virtual machine membership for this Security Group is zero. In fact, if you click on the blue (0) zero, a display box won't even open for you. This indicates a problem here within our NSX Security Group configurations and something in need of resolution. For now though, we need to investigate further and so let's continue. Page 39

40 Checking NSX Security Group Membership High-light your HR-DB-Servers Security Group. Then click on the "edit" icon. Define Dynamic Membership Click on "Define dynamic membership" and notice the criteria is set to "Security Tag Equals to HR-DB-Server". This is correct and so do not make any changes. Instead just click Cancel to exit and continue to troubleshoot. Page 40

41 Checking Settings and Configurations Continued To continue checking configurations and settings go to the Home tab and then click on Hosts and Clusters. Page 41

42 Security Tag Assignments From the far left tree panel, expand your datacenter view by clicking on the expand arrow to list the VMs of your Data Center. We need to check the settings for the hr-db-01 server and so select it. Note on the right side of your screen under "Security Tags", the wrong Security Tag has been applied. This is the Security Tag for your Legal-DB-Server when it should be for your HR-DB-Server. This is what we must correct. To do so click "Manage". (Repositioning of the Security Tags widget may be necessary). PLEASE NOTE: If you are working from a laptop or a smaller desktop with a limited view, you may not be able to see the step 2) "Manage" option located on the bottom right hand side of the "Security Tags" widget's display box. You'll also notice the lack of a scroll bar to adjust. To resolve this issue simply click on the "Security Tags" widget's menu bar and drag & drop it over to the left side of the panel display as these widget boxes can be moved for positioning and viewing purposes. Page 42

43 Security Tag Assignments To fix the problem un-check the Legal-DB-Server check box and then check the HR-DB- Server check box and click OK. Page 43

44 Security Tag Assignments Notice your Security Tag value has changed and is now specifying your HR-DB-Server which is what it should say at this time. Let's now go back and view your NSX Security Group identification and settings. Page 44

45 Networking & Security Continue by verifying the NSX Security Group Membership. To do so, view the Security Group settings by clicking on Home and then Networking & Security. Page 45

46 Security Group Settings 1) Click on Service Composer and then 2) click on the Security Groups tab and note the number of "Virtual Machines" that are now listed which is 1. Your Security Groups now include a virtual machine for both your HR-DB-Servers and your HR-Web-Servers group as opposed to before when you only had a virtual machine for the HR-Web-Servers security group. To view the server for this virtual machine, click on the high-lighted number 1 for HR-DB- Servers. Virtual Machine Memberships Again you may need to wait approximately 45 seconds for this display box to populate. After it does populate we should see our hr-db-01 server listed as a member of the Security Group "HR-DB-Servers". Now that we ve confirmed the presence of our newly added VM, go ahead and close by clicking on the x in the upper right corner of the display box. Page 46

47 Confirming Registration in Panorama Go back to Panorama via your Panorama browser tab. When back in Panorama, click the Objects tab and then click on "more" under Addresses for the HR-DB-Servers group. Page 47

48 Successful IPv4 Address Registration Confirmed Notice we now have two registered IPv4 addresses for this Dynamic Address Group (DAG). Success! Go ahead and click Close and then proceed on to the re-testing phase. Page 48

49 Generating Traffic Re-Test Once again generate traffic from the HR web server to the HR database server. To do so let's go back to our putty.exe utility for "hr-web-01". From the hr-web-01 web server initiate a ping to the hr-db-01 database server using the "ping -c 5 hr-db-01" command. The output should indicate another successful ping. Now proceed back into Panorama to check the logs. Page 49

50 Panorama Logs After the successful ping we're expecting to see that the traffic did indeed go through our VM-Series Firewall. So check the log file by clicking on the "Monitor" tab and selecting "Traffic" from the Logs tree menu on the left. Then do a manual refresh of the logs. Notice we see the ping logged as expected. This verifies that we correctly resolved the problem and that our groups, policies, and traffic steering rules are all working properly. Great job! Let's now move on to the next portion of this lab. Page 50

51 Prepare to Generate Database Traffic With Logging Logs are an effective tool that can be used not only for reporting purposes, but for also enabling us to track and see what's taking place on our network. Then based upon what we're seeing, we can adjust accordingly to ensure a safe and secure network. Additionally, we can use logs for troubleshooting purposes as well which is what we'll continue to do next. So in preparation for our next set of tests we will want to do some minor maintenance on our logs. This will ensure the logs we are seeing are both current and accurate. Checking Traffic Logs 1) Notice your logs within the last 15 minutes of which you should have very few. Most likely you'll only have two log entries such as you see displayed here. Of the logs listed you should only have entries for the ping test that we ran. Remember, you can always change the filter and you can always do a manual refresh. Here our filter is set to the minimum setting of "Last 15 Minutes" and so set yours to the same if not already done so and then do a "Manual refresh". Now let's continue to generate more log traffic but this time we'll generate some database table calls and so go ahead and proceed to the next step. Page 51

52 Generate Database Table Calls For this step we want to generate more traffic through our firewall via a database table call. To do so we'll run a mysql command from one of our Web servers to our database. Database Query For this step you will want to use the README.txt file located on your desktop. Open this file and under Module 1, look for the high-lighted command circled in red above. Go ahead and copy this command to the clipboard from within the README.txt. Page 52

53 Database Query from "hr-web-01" Using putty go back into the hr-web-01 server and run the command as found within the README.txt file. To do so simply "paste" the command you copied from within the README.txt file into your SSH session at the CLI prompt by "right clicking" to paste the command at the prompt. Within the output notice the table call was successful. Is this what you expected? Why? If you said yes, this is what was expected and the reason why is because your policy is set to allow MySQL traffic, you are correct! In fact we can even see this traffic was logged within the VM-Series firewall as shown in our next step. Page 53

54 Panorama Logs Ensure the VM-Series firewall logged the generated traffic. To do so go back into Panorama and click on the Monitor tab and select Traffic logs. Notice the two entries identifying, and allowing, the mysql application. Before moving further ahead let's take a moment to pause to learn about Application Identification and the ability of your VM-Series firewall to allow or deny various types of traffic between the VMs within your datacenter based upon application type. Page 54

55 App-ID by Palo Alto Networks What is App-ID? App-ID is a patented traffic classification system developed by Palo Alto Networks. App- ID provides the ability to determine what application is traversing through the VM-Series firewall irrespective of the port, protocol, encryption (SSH or SSL) or any other evasive tactic that may be used by a suspect application. How does App-ID work? App-ID applies multiple classification mechanisms, application signatures, application protocol decoding, and heuristics to your network traffic stream to accurately identify applications. All traffic is then matched against policy to check whether this type of traffic is allowed or not on the network or between your VMs. Signatures are then applied to the allowed traffic identifying the application based on its unique application properties and its related transaction characteristics. These signatures also determine if the application is being used on its default port or is using a non-standard port. If the traffic is allowed by policy, the traffic is then scanned for threats and further analyzed for identifying the application more granularly. What if the traffic is encrypted? App-ID has the ability to identify encrypted traffic determining the type of encryption (SSL or SSH) in use. If a decryption policy is in place the session is decrypted and the application signatures are applied again on the decrypted flow. Decoders for known protocols are then used to apply additional context-based signatures to detect other applications that may be tunneling inside of the protocol (e.g., Yahoo! Instant Messenger used across HTTP). Afterwards decoders validate that the traffic conforms to the protocol specification and provide support for NAT traversal and opening dynamic pinholes for applications such as SIP and FTP. Now that we know more about App-ID let s see how it works in action within the last remaining steps of this lab. Page 55

56 App-ID for SSH Within this step you'll see how, and why, ssh is blocked between your two VMs (hrweb-01 and hr-db-01). Policies within Panorama Go back to your browser and select the Panorama tab. If necessary, login into Panorama. 1) Once logged into Panorama review your current policy settings by clicking on the Policies tab. 2) From within the left tree panel view, make sure your looking at the "Pre Rules" of your Security policy. 3) Note your three policies which only allow the ping and mysql applications. Page 56

57 Test App-ID To test App-ID let's try to ssh between your two VM servers. Let's try doing so from the hr-web-01 server and so use your putty desktop icon to access this server. Using the "ssh command attempt to ssh into the hr-db-01 server. After 30 seconds, during which the ssh attempt will fail, go ahead and break out of the command with the "CTL-C" option. Then move on to check your logs within Panorama to see what was captured. Examine Traffic Logs As expected, notice the denied SSH on port 22 attempts that were blocked. This demonstrates successful inter-tier VM protection at the application layer. Page 57

58 Module 1 Lab 1 - Conclusion During this lab we demonstrated how we can protect inter-tier application traffic - also referred to as east-west traffic. To do so we used our VM-Series firewall and Panorama management station to integrate Palo Alto Networks security with VMware NSX. This stateful synchronization is possible through the Palo Alto Networks VM-1000 HV s ability to maintain constant awareness of the changes made within your datacenter in regards to the ever adding, moving, and deleting of virtual machines, their applications AND their dynamic IP addressing. But that s only half of the story. The other half includes the capabilities of the VMware NSX Manager which completes this synchronization between the Palo Alto Networks Dynamic Address Groups, and the VMware NSX Manager s Security Groups, providing a datacenter awareness, and datacenter protection, like no other because it all takes place automatically. In fact, in the next module we ll walk you through a lab where you ll see just how automatic everything is and how easily everything integrates to ensure an ever aware and secure datacenter. Page 58

59 Module 2: Deploying Palo Alto Networks VM-Series with VMware NSX to protect a multi-tier application (45 Min) Page 59

60 Module Overview Within this in-depth module, VMware NSX and the Palo Alto Networks VM-Series platform are configured to secure a multi-tier application with web front-end servers and database back-end servers. Throughout the module itself we will show how to define dynamic security policies on the VM-1000-HV virtual firewalls based on context from VMware NSX. Let's take a look at the learning objectives where we will be focusing on how to deploy the Palo Alto Networks VM-Series platform while walking through each Lesson. These lessons will enable you to gain an understanding of, as well as perform, the following: Understanding Palo Alto Networks next-generation security technologies Security considerations for a multi-tier application deployment Create NSX Security Groups and configure traffic steering Create Dynamic Address Groups Creating security policies for MySQL using Dynamic Address Groups Review NSX Security Group and DAG membership, generate traffic and check logs Let's begin! Page 60

61 Review Security Tags for Legal Servers We need to ensure our security tags for our servers of the Legal department are in order and so let's take a look. vsphere Web Client We'll first need to log into our vsphere Web Client. To do so launch your vcenter desktop icon, or you may simply launch Firefox. You'll be directed to the VMware vsphere Web Client and when prompted for your credentials login with: Username = "root" Password = "VMware1!" Page 61

62 Hosts and Clusters Once logged in, and from the 1) Home screen, click on 2) Hosts and Clusters. Assigned Security Tags 1) Within the Tree panel view at the left we see a listing of all of our connected servers. In this case we want to review both of our legal servers to ensure they're properly registered and assigned to the appropriate Security Tag. So let's start with our Legal Web server, "legal-web-01" first by clicking on "legalweb-01". Then take note that this server is correctly assigned with the "Legal-Web- Server" Security Tag. Next check the Security Tag status of our other Legal server. Page 62

63 PLEASE NOTE: If you are working from a laptop or a smaller desktop with a limited view, you may not be able to see the step 2) "Manage" option located on the bottom right hand side of the "Security Tags" widget's display box. You'll also notice the lack of a scroll bar to adjust. To resolve this issue simply click on the "Security Tags" widget's menu bar and drag & drop it over to the left side of the panel display as these widget boxes can be moved for positioning and viewing purposes. Page 63

64 Assigned Security Tags By selecting the Legal Database server, "legal-db-01" we also see that this server is assigned to the appropriate Security Tag dubbed, "Legal-DB-Server". So now that we know both our Legal Dept. servers have Security Tag assignments, we can now move on to the next step. Note: Within this module we will only be using the these two Legal Servers (legalweb-01 and legal-db-01). Page 64

65 Create NSX Security Groups and Configure Traffic Steering During this stage we need to create and define the additional NSX Security Groups that we will be using. These will include the Web-Servers and Database Servers of our Legal Department. Therefore we'll simply call these Security Groups "Legal-Web-Servers" and "Legal-DB-Servers". Then after these two new Security Groups are created we'll then want to create a traffic steering policy for all of our Web server to Database server traffic. Creating NSX Security Groups Go back to your browser and click on the vsphere Web Client tab. If necessary login again with the credentials "root" and "VMware1!". Once logged and from the Home page of the vsphere Web Client click 1) Home and 2) Networking & Security. Page 65

66 Creating NSX Security Groups From within Networking & Security select Service Composer and then click on the Security Groups tab in the center. Notice we only have Security Groups for our HR Teams and so let's create additional NSX Security Groups for our Legal Teams. To do so we'll need to click on our "Add" icon which is circled and labeled as sub-step 3. Creating NSX Security Groups We will need to name our new security group and so let's call it "Legal-Web-Servers". Page 66

67 Creating NSX Security Groups 1) Next click on Define dynamic membership in order to set the values for this Security Group. NOTE: If after clicking on "Define dynamic membership" from within the left tree panel, you do not see the options listed as reflected within the screenshot, click on the green plus sign that is circled in blue. 2) Define the dynamic membership as a Security Tag. To do so click on the drop down arrow next to "Security Tag" and select Security Tag. Page 67

68 Creating NSX Security Groups 1) Define the value by selecting "Equals to". 2) Then populate by entering the designated name of "Legal-Web-Server" and 3) click Finish. Page 68

69 Creating NSX Security Groups At this stage you'll see the Security Group is being created. NSX Security Groups Created Once created you'll see your "Legal-Web-Servers" Security Group listed. 1) Expand to check the Virtual Machine name this Security Group is applied to by clicking on the high-lighted number 1 under the "Virtual Machines" column. Notice the proper name of "legal-web-01" has been applied. Great job in creating your Legal-Web-Servers" NSX Security Group! To close this display box click on the "x" located in the upper right corner of the display box. 2) Let's now proceed by doing the same for your Legal-DB-Servers NSX Group by clicking on the "New Security Group" icon circled in blue. Page 69

70 Creating NSX Security Groups 1) As before we need to name our new NSX Security Group. We'll call this one "Legal- DB-Servers". 2) Now click on Define dynamic membership. Creating Security Groups 1) Click on Define dynamic membership in order to set the values for this Security Group. NOTE: If after clicking on "Define dynamic membership" from within the left tree panel, you do not see the options listed as reflected, click on the green plus sign that is circled in blue. 2) Define the dynamic membership as a Security Tag. To do so click on the drop down arrow next to "Security Tag" and select Security Tag. Page 70

71 Creating NSX Security Groups Next define the value by selecting "Equals to". Then populate by entering the designated name of "Legal-DB-Server" and click Finish. Page 71

72 NSX Security Groups Created Once created you'll see your "Legal-DB-Servers" Security Group listed. Expand to check the Virtual Machine name this Security Group is applied to by clicking on the highlighted number 2 under the "Virtual Machines" column. Notice the proper name of "legal-db-01" has been applied (you may ignore the "hrdb-01" VM name as this was from the previous lab). Great job in creating your "Legal-DB-Servers" NSX Security Group! Let's continue on to the next step where we'll create some steering policies. Go ahead and close the display box by clicking on the "x" located in the upper right corner. Page 72

73 Create Steering Policy for all Web Server to Database Server Traffic In this step we'll create policies that will steer our traffic from our Web servers to our Database servers through the NSX Manager. Security Policy for Traffic Steering 1) We set our policies via the "Security Policies" tab and so go ahead and click on that tab now. After doing so you'll notice that one entry already exists - a policy that is only for HR. Therefore, we are going to create a broader policy that will steer all Web to DB traffic. Then we'll limit HR versus Legal traffic from within PAN-OS. 2) Let's continue by clicking on the "Create Security Policy" icon that is circled in blue and labeled as sub-step 2. Page 73

74 Security Policy for Traffic Steering After a brief initializing phase it will begin to load the policies in preparation for the new one you'll be creating. 1) Name your new security policy "Module2_Legal-Web-to-DB". 2) Next click on "Network Introspection Services" on the left side of the screen. Page 74

75 Security Policy for Traffic Steering 1) From Network Introspection Services: 2) Click on the green plus sign to add a new service. 3) After doing so a display box will appear where you'll enter the name of the service calling it "Legal-Web-to-DB". 4) Click on Change in order to specify the Source. Page 75

76 Security Policy for Traffic Steering Our "Select Source" display box will appear which will enable us to: 1) Select the radio button option for "Select Security Groups". Of the options displayed check 2) our Legal-Web-Servers and 3) and then click OK. Page 76

77 Security Policy for Traffic Steering Notice that under "Source" you have Legal-Web-Servers. Complete this step by clicking the OK tab at the bottom. Security Policy for Traffic Steering At this step you should have 1 item listed which is the Network Introspection Service that you just created for your Source. Page 77

78 1) Let's now repeat the same process for your Destination by creating another item by clicking on the green plus icon. Security Policy for Traffic Steering 1) Name your new service "Legal-DB-to-Web". 2) Under Destination click Change to specify. Leave all other settings as they are. Page 78

79 Security Policy for Traffic Steering 1) Select the radio button option for Select your Security Groups, and then 2) select the check box for Legal-Web-Servers and then 3) click OK. Page 79

80 Security Policy for Traffic Steering Notice under Destination that you now have your Legal-Web-Servers specified. Click OK to complete this step. Security Policy for Traffic Steering You now should have 2 Network Introspection Services listed. Page 80

81 Go ahead and click Finish after which you'll see your security policies being created. Security Policy for Traffic Steering You should see the two newly created Security Policies. We must now apply our policies to their respective Security Groups and in this case that would be to our database servers. To do so we'll need to click on the "Apply Security Policy" icon (circled in blue) to proceed. Page 81

82 Security Policy for Traffic Steering As we wish to apply to our database group we'll need to select the "Legal-DB-Servers" check box and then OK. You'll then receive a brief display box as the security policy is applied. Security Policy for Traffic Steering At this point you should be able to verify all your actions by seeing 2 Applied policies and 2 Network Introspect Services. If so, great job! You just created your Traffic Steering Security Policies. Please proceed to the next lesson of this module. Page 82

83 Create Dynamic Address Groups (DAG) We learned about Dynamic Address Groups (DAG) and the purpose they serve in Module 1. Here in Module 2 we will actually walk you through the creation of said groups from within Panorama by Palo Alto Networks. Before we get started though, here's a recap on both Dynamic Address Groups (DAG) and Panorama. Dynamic Address Groups (DAG) - Provide the ability to maintain awareness of changes in the virtual machines/applications and ensures that security policy stays in tandem with the changes in the network. This awareness provides visibility and protection of applications in an agile environment. This is made possible because Dynamic Address Groups are used as a source or destination object within security policies. Additionally, because IP addresses are constantly changing in a datacenter environment, Dynamic Address Groups offer a way to automate the process of referencing source and/or destination addresses within security policies. This is unlike static Address Objects that must be manually updated in configuration and committed whenever there is an address change (addition, deletion, or move), Dynamic Address Groups automatically adapt to these changes. Panorama - Enables you to manage your distributed network of physical and/or virtual Palo Alto Networks firewalls from a centralized location while providing the ability to: View the traffic of each deployed firewall; manage all aspects for device configuration; push global policies; and generate reports on traffic patterns or security incidents all from one central location. Panorama is available as either a dedicated management appliance or as a virtual machine. Let's proceed. Back into Panorama If Panorama is still up and running, access Panorama via your browser tabs. If Panorama is no longer running, open your browser and click on the Panorama bookmark. Or you may launch the Panorama desktop icon to launch and login to Panorama. Username = admin Password = VMware1! Page 83

84 Panorama The credentials for Panorama are username = "admin" with password = "VMware1!" Note: The README.txt file on your desktop will reflect the credentials for Panorama as well as all of your servers for this module. Page 84

85 Creating Dynamic Address Groups As soon as you're logged into Panorama go ahead and 1) select the Objects tab, then click on the 2) Add icon at the bottom of the screen to create your Legal team Dynamic Address Groups. Creating Dynamic Address Groups In this portion we're going to have a number of sub-steps, 6 in total, and so please follow along closely. Let's start by: 1) Naming this Dynamic Address Group, "Legal-Web-Servers". 2) Designate the "Type" of DAG by hitting the drop down arrow and selecting "Dynamic". Page 85

86 3) Next click on Add Match Criteria. At this point another display box will appear adjacent and on the left. Here you may need to expand the Name field of the display box to see the full name of the available options. 4) Look for your "Legal-Web-Servers-securitygroup-ID#) and click on the green plus mark to add it. Note: Your Security Group ID number may be different than what you see here. That is ok and so continue. Once you do you'll notice the "Match" within the display box on the right listing your Security Group as indicated by the blue arrow. 5) Next assign a color coded tag to this DAG by clicking on the drop down arrow and selecting the tag, "Legal Web Server". 6) click OK to finish. Page 86

87 Creating Dynamic Address Groups Notice our newly created DAG of Legal-Web-Servers. We'll now need to repeat the same process to create our Legal-DB-Servers DAG. To do so click the Add icon at the bottom of your screen. Creating Dynamic Address Groups Just like before we'll have 6 sub-steps. Begin by: 1) Naming this Dynamic Address Group, "Legal-DB-Servers". 2) Designate the "Type" of DAG by hitting the drop down arrow and selecting "Dynamic". Page 87

88 3) Next click Add Match Criteria. At this point another display box will appear adjacent and on the left. Here you may need to expand the Name portion of the display box to see the full name of the available options. 4) Look for your "Legal-DB-Servers-securitygroup-ID#) and click on the green plus mark to add it. Note: Your Security Group ID number may be different than what you see here. That is ok and so continue. Once you do you'll notice the "Match" within the display box on the right listing your Security Group as indicated by the blue arrow. 5) Now assign a color coded tag to this DAG by clicking on the drop down arrow and selecting the tag, "Legal DB Server". 6) Click OK to finish. Page 88

89 Creating Dynamic Address Groups At this point you should have your two Legal Team Dynamic Address Groups, one for your Web servers and another for your DB servers. Let's now move on to policy creation. Page 89

90 Create a Security Policy within Panorama Here we'll create a security policy that will only allow web-browsing between the Web servers and the Database servers. So back into Panorama we go. Creating Security Policies In Panorama 1) click on the Policies tab. 2) Click on the 2nd policy listed so that the next policy we create will follow immediately. 3) Click on the +Add icon at the bottom left side of your screen. Page 90

91 Creating Security Policies When the Security Policy Rule display box appears we'll have multiple tabs of which we'll need to configure. Let's start on the General Tab by naming our new policy "Legal Web to DB". After entering the name, click on the "Source" tab. Page 91

92 Creating Security Policies 1) After clicking on the Source tab, specify by checking "Any" for Source Zone 2) For the Source Address, click on the green + icon and when the display options appear, choose the "Legal-Web-Servers" address group. Next click the Destination tab. Page 92

93 Creating Security Policies 1) After clicking on the Destination tab specify the Destination Zone by 2) clicking on the drop down arrow and choosing "any". 3) Then again click on the green + plus icon and for Destination Address select "Legal- DB-Servers". The next tab to configure will be the Application tab. Page 93

94 Creating Security Policies After 1) clicking on the "Application tab 2) click on the green + plus sign on the bottom left to Add, or specify your allowed application. You can refine your listing of available applications by typing in "mysql" in the field high-lighted. Then select "mysql" to populate. The next tab will be the Actions tab. Page 94

95 Creating Security Policies From the Actions tab make sure we are 1) set to Allow and 2) under Log Setting we check the option to Log at Session Start and 3) for Log Forwarding we are forwarding to our Panorama Logging Profile. Finally, 4) click OK to finish the creation of this Security Policy. Commit Configurations In order for our configurations to be applied we'll need to do a series of two Commits. First we'll need to Commit to Panorama. To begin doing so click on "Commit" in the upper right hand corner. Page 95

96 Commit to Panorama For Commit Type select the radio button for Panorama and click OK. Your commit will begin of which you'll see the following: Page 96

97 Commit to Panorama After receiving a Commit Pending message you should receive a Configuration committed successfully message. Click Close to proceed with the second commit type. Commit to VM-Series Firewalls Again click on Commit. Page 97

98 Commit to VM-Series Firewalls For the Commit Type: 1) select the Device Group radio button and when 2) presented with your display check the VM-Series-DG check box and the 3) click OK. Page 98

99 Commit to VM-Series Firewalls The commit will begin to our two VM-Series firewalls and may take a few minutes. Please be patient until your Progress bar and status indicate 100% completion. Page 99

100 Commit to VM-Series Firewalls Notice our Progress of 100% and the Status stating our commit succeeded. Please note - ignore the warnings messages as this is expected due to other settings that we have in place for logging purposes. At this stage simply click Close. Page 100

101 Review NSX Security Group and DAG Membership At this point we'll want to review our NSX Security Group and DAG Membership by ensuring successful registration. To do so we'll need to go back into the vsphere Web Client. VSphere Web Client Check your browser and select your vsphere tab. If your session timed-out login again using username = "root" with password = "VMware1!" Page 101

102 vsphere Web Client 1) Click on Home and then go to 2) Hosts and Clusters. Page 102

103 Review NSX Security Group and DAG Membership 1) Let's first check your Legal Web servers and so first select your "legal-web-01" server. 2) Near the center of the screen click on "View all 4 IP addresses" to ensure IP address registration. At this time take notice of the IP Address We will need to look to ensure this IP address is the IP address as found within Panorama and also as listed within the respective Security Group of the NSX Manager. Before advancing to check Panorama and to check our NSX Security Groups, let's check to review our legal-db-01 server. Page 103

104 Review NSX Security Group and DAG Membership Like before, to review your Legal Database servers 1) click on "legal-db-01" from the left hand tree panel and then 2) click on "View all 4 IP addresses". Again take note of the address as we will be checking both Panorama and our NSX Security Groups to ensure this IP address is indeed registered. Review NSX Security Group and DAG Membership Let's first check our settings in Panorama first. 1) From the Objects tab and under Address Groups, look for both Legal servers (Web and DB). Check the Web server by clicking "more" under the Addresses column for "Legal-Web- Servers". Page 104

105 Review NSX Security Group and DAG Membership Notice that our IP Addresses is indeed a registered address for "legalweb-01" verifying our Legal Web Servers. Go ahead and click Close and then repeat doing so for the Database servers. Review NSX Security Group and DAG Membership Like before click "more" under Addresses for your "Legal-DB-Servers". Page 105

106 Review NSX Security Group and DAG Membership For our Legal Database Servers notice that we indeed have the same for this "legal-db-01" server. This verifies successful IP registration for our Legal Database Servers Address Group. Click Close. Page 106

107 Review NSX Security Groups From your browser tab click on your vsphere Web Client tab to verify these same IP addresses are within your Security Groups for these two verified servers. To do so when you're back in vsphere, 1) click Home and then 2) Networking & Security. Review NSX Security Groups First click on Service Composer from the left tree panel and 2) select the Security Groups tab in the middle. 3) Now you can check the registered Virtual Machines and their IP addresses by clicking on the high-lighted for both your Legal Web and Database Servers. Page 107

108 Review NSX Security Groups Let's check our "Legal-Web-Servers" Security Group first of which we see our "legalweb-01" server that is the IP Address. Review NSX Security Groups Next we'll check our "Legal-DB-Servers" Security Group of which we see our "legaldb-01" server which is the IP address. And so we now know both of our Legal servers are registered and recognized as expected. We are now ready to move on. Page 108

109 Generate Traffic To check our work and to ensure all of our groups, policies, and configurations have been correctly configured, we will now generate some traffic through our firewalls. Login to "legal-web-01" Click the "legal-web-01" desktop icon to login to this server. Page 109

110 mysql command from README.txt We will need Module 2 command from the README.txt file on your desktop and so 1) open this file and 2) scroll down to the Module 2 section and copy the first mysql command listed, copying it to your clipboard. Page 110

111 Run the Command from "legal-web-01" Within the SSH session you have "paste" the copied command at the prompt to run the mysql command. Notice the output received. Page 111

112 Inspect Panorama Traffic Logs Checking the Traffic Logs from within Panorama Panorama Traffic Logs Go back into Panorama and 1) click on Monitor and 2) select your Traffic Logs. Notice our Traffic Logs which indicate a successful test as we see our source and destination IP addresses and the mysql application which was properly allowed. Which means SUCCESS! This completes this module. Great job!! Page 112

113 Lab 2 Conclusion Here in this lab we did a lot which hopefully instilled within you an awareness and appreciation of how easy it is to deploy, integrate, and manage this joint solution. Did you notice how quickly and easily you re able to deploy new VMs, and groups of VMs, via VMware NSX? Or how easy it is for VMware NSX to provide traffic steering so that ALL traffic goes through the Palo Alto Networks firewall ensuring an ever aware and secure datacenter? All within a few clicks via a practically seamless integration between the Palo Alto Networks VM-Series firewall and VMware s NSX, and all without having to make any kind of changes to the infrastructure of the datacenter itself. So like in the previous lab, we see the benefits of: ease of deployment, ease of integration, ease of configuration and management, and ease of synchronization between the Dynamic Address Groups within the Palo Alto Networks firewalls, and the Security Groups within the VMware NSX Manager. Both of which provide a stateful synchronization to ensure all changes in the form of VM additions, deletions, moves, and dynamic IP addressing which means no manual changes in the infrastructure and/or reconfiguration on your part required! Reason being, all datacenter changes are automatically recognized and registered within the NSX Manager and so our datacenter is always secure, even when the traffic is intra-datacenter traffic among VMs. On behalf of Palo Alto Networks and VMware, we d like to thank you for sitting our labs. We hope you enjoyed our labs, as much as we enjoyed preparing them for you, and we hope we successfully demonstrated how easy it is to manage and secure your ever changing datacenter! Page 113

114 Module 3: Using Distributed FireWall (DFW) to Protect Intratier Traffic (30 Min) Page 114

115 Module Overview In this module VMware NSX DFW is configured to secure intra-tier traffic between web front-end servers. This module shows you how to define dynamic Security Groups (based on VM name and based on Logical Switch) and then how to use them in DFW policy configuration. During this module (30 minutes) we will be focusing on NSX DFW functionalities. These lessons will enable you to gain an understanding of, as well as perform, the following: Understanding NSX DFW component Security considerations for a multi-tier application deployment (inter-tier and intra-tier traffic protection) Create NSX Security Groups and how to use them in DFW security policies Review NSX Security Group, DFW UI, generate traffic and check stats. OK, now let's begin! Page 115

116 Create NSX Security Groups let's create 2 new NSX Security Groups using dynamic inclusion based on VM name (for Legal web servers) and using static inclusion based on Logical Switch / static exclusion based on VM (for HR web servers). vsphere Web Client We'll first need to log into our vsphere Web Client. To do so launch your vcenter desktop icon, or you may simply launch Firefox. You'll be directed to the VMware vsphere Web Client and when prompted for your credentials login with: Username = "root" Password = "VMware1!" Page 116

117 Networking & Security Once logged in, and from the 1) Home screen, click on 2) Networking & Security. Page 117

118 Service Composer / Security Groups Click on 1) Service Composer and then on 2) Security Groups. Note: if you have previously performed module 1 and module 2 of this LAB, you will have a similar screenshot. If you start module 3 before the other modules, you won't see some of the displayed Security Groups. Create new Security Groups for Legal Web Servers Click on 1) icon to create a new Security Group Page 118

119 Security Group Name Following window appear. in Name field input, enter: Legal-Web-Servers-Module-3 Page 119

120 Security Group Dynamic Inclusion using VM Name Select 1) VM Name and then 2) enter 'legal-web' keyword. Click on 3) Finish to terminate the operation. Page 120

121 Security Group Check Following window should appear. The new Security Group appear at the end of the list. Characteristics of the Security Group like Virtual Machines appear under each corresponding column. Security Group - VM To check which VM are contained inside this new Security Group, click on the link under Virtual Machines column. In our case, both web servers of Legal organization should be displayed. Page 121

122 Create new Security Groups for HR Web Servers Click on 1) icon to create a new Security Group Page 122

123 Security Group Name Following window appear. in Name field input, enter: HR-Web-Servers-Module-3 and then click on 2) Next button. Page 123

124 Security Group Dynamic Inclusion - Skip We are not going to use dynamic membership so click on 1) Next button. Page 124

125 Security Group Static Inclusion - Logical Switch Select 1) Logical Switch and then select 2) LS-HR-01. This is the Logical Switch (VXLAN) where all VM servers of HR organization are connected to. Click on 3) Next. Page 125

126 Security Group Static Exclusion - DB server Click on 1) right arrow to extend the list of filters and then see Virtual Machine. Click on 2) Virtual Machine and then select 3) hr-db-01. Click on 4) Finish to terminate the operation. Page 126

127 Security Group Check Following window should appear. The new Security Group appear in the middle of the list. Characteristics of the Security Group like Virtual Machines appear under each corresponding column. Security Group - VM To check which VM are contained inside this new Security Group, click on the link under Virtual Machines column. In our case, both web servers of HR organization should be displayed. Page 127

128 Create NSX DFW Security Policies Let's use the 2 Security Groups previously created in DFW policy rules to enable or disable intra-tier traffic between web servers of Legal organization (and the same for HR organization). The following security policies will be implemented: Legal: source: Legal Web Servers destination: Legal Web Servers Services: ICMP action: allow source: Legal Web Servers destination: Legal Web Servers Services: ANY action: block HR: source: HR Web Servers destination: HR Web Servers Services: ICMP action: allow source: HR Web Servers destination: HR Web Servers Services: ANY action: block DFW Menu Click on 1) NSX Home and then on 2) Firewall. Create a New Section Click on 1) add section icon and then enter section name: Page 128

129 INTRA-TIER protection Click on OK to terminate the operation. Create new Policy Rule Click on 1) add rule icon and then click on 2) arrow to expand Section in order to see all defined policy rules. Policy Rule Name Click on 1) + icon in the Name column and then enter the following string in Rule Name window: Page 129

130 Legal-Web to Legal-Web ICMP Click on OK. Page 130

131 Policy Rule Source Field Click on 1) + icon in the Source column. A new window will appear. Then select 2) Security Group. All Security Groups will be listed. Look for Legal-Web-Servers-Module-3 and then click on 3) in the associated checkbox and then click on 4) the right arrow so it will transition to Selected list panel. Click on OK to terminate the operation, Page 131

132 Policy Rule Destination Field Click on 1) + icon in the Destination column. A new window will appear. Then select 2) Security Group. All Security Groups will be listed. Look for Legal-Web-Servers- Module-3 and then click on 3) in the associated checkbox and then click on 4) the right arrow so it will transition to Selected list panel. Click on OK to terminate the operation, Page 132

133 Policy Rule Service Field Click on 1) + icon in the Service column. A new window will appear. Click on 2) and enter icmp as keyword. All services related to ICMP will appear at the bottom panel. Find ICMP Echo and ICMP Echo Reply and click on 3) in the associated checkbox. Then click on 4) the right arrow so they will transition to Selected list panel. Click on OK to terminate the operation, Page 133

134 Policy Rule Action Field Click on 1) + icon in the Action column to select desired action for the policy rule. By default, action is set to Allow for a newly created security policy. This is the action we want to enforce for our rule so there is no need to do anything here. Click on Cancel since no change is needed. Page 134

135 Policy Rule Publish Operation You should obtain this window at this stage. Click on 1) Publish Changes button to enforce the new created security policy. Policy Rule Publish Status A message should be displayed at the top of the page showing successful publish operation (note: the message may take some time to arrive depending on the CPU load of the HOL infrastructure). Create Remaining Policy Rules Now that we learnt how to create a DFW policy rule using Security Group, let's go ahead and create these policy rules: Page 135

136 Name: Legal-Web to Legal-Web ANY Source: (Security Group) Legal Web Servers Destination: (Security Group) Legal Web Servers Services: Any Action: Block Name: HR-Web to HR-Web ICMP Source: (Security Group) HR Web Servers Destination: (Security Group) HR Web Servers Services: ICMP Echo, ICMP Reply Action: Allow Name: HR-Web to HR-Web ANY Source: (Security Group) HR Web Servers Destination: (Security Group) HR Web Servers Services: Any Action: Block IMPORTANT NOTE: click on 1) + icon (as shown in the diagram above) to add these new rules, New rules should always be created at the bottom of previously created rules because the order of rule definition is important with DFW (and in fact with any firewall on the market). Rule evaluation is always performed from top to bottom and the first rule that match the packet pattern is used. Page 136

137 Publish Changes to Enforce all Rules You should obtain this window at the end of the configuration. If you ruleset is displayed in different order than shown in this screenshot, you will need to re-order your rules. To perform this operation, select the rule that needs to be reordered and then click on the up or down arrow as shown on the screenshot. Click on 1) Publish Changes to enforce all the rules. Page 137

138 Publish Changes Status A publish operation success message should be displayed at the top of the page (after some short while). Page 138

139 Enable Flow Collection for NSX DFW Statistics To get statistics about NSX DFW operations, we need to turn on global flow collection. Flow Monitoring - Configuration From NSX home, click on 1) Flow Monitoringmenu. Then click on 2) Configuration tab. As you can see, global flow collection is disabled by default. Click on enable to turn it on. Page 139

140 Global Flow Collection Enabled You should obtain the same window once global flow collection has been enabled. Page 140

141 Checking NSX DFW Policies let's check the effects of NSX DFW configuration Testing 1 Legal Web Server to Legal Web Server - ICMP Click on 1) legal-web-01 icon. A new SSH window will appear with automatic login to legal-web-01. 2) Type the following command to check ICMP response from this server: ping legal-web-02 ICMP is allowed on DFW so the ping command should return successful responses. Type Ctl-C to terminate ping command. Legal Web Server to Legal Web Server - SSH on the same ssh window, now issue the following command: Page 141

142 ssh legal-web-02 After few seconds, you should see the error message: connection timed out (type Ctl-C to terminate ssh command if time out is too long). This is expected as NSX DFW does not allow SSH between the 2 web servers. Page 142

143 HR Web Server to HR Web Server - ICMP Click on 1) hr-web-01 icon. A new SSH window will appear with automatic login to hrweb-01. 2) Type the following command to check ICMP response from this server: ping hr-web-02 ICMP is allowed on DFW so the ping command should return successful responses. Type Ctl-C to terminate ping command. Page 143

144 HR Web Server to HR Web Server - SSH on the same ssh window, now issue the following command: ssh hr-web-02 After few seconds, you should see the error message: connection timed out (type Ctl-C to terminate ssh command if time out is too long). This is expected as NSX DFW does not allow SSH between the 2 web servers. Page 144

145 Check NSX DFW per Policy Rule Statistics Go back to vsphere web client and select Networking & Security -> Firewall menu. By default, NSX DFW per policy rule statistics is not displayed. Perform the following action under DFW menu to display it: Click on 1) table arrow icon and then 2) select Stats. Once done, you will see a new column appearing in policy rule window with label Stats. Page 145

146 Statistics for policy rule 1 Click on 1) diagram icon and check flow statistics (number of packets and bytes) processed by NSX DFW rule number 1 (Legal-Web to Legal-Web for ICMP traffic). Statistics for policy rule 2 Click on 1) diagram icon and check flow statistics (number of packets and bytes) processed by NSX DFW rule number 2 (Legal-Web to Legal-Web for ANY traffic). Page 146

147 Statistics for policy rule 3 Click on 1) diagram icon and check flow statistics (number of packets and bytes) processed by NSX DFW rule number 3 (HR-Web to HR-Web for ICMP traffic). Statistics for policy rule 4 Click on 1) diagram icon and check flow statistics (number of packets and bytes) processed by NSX DFW rule number 4 (HR-Web to HR-Web for ANY traffic). Page 147

148 Modify NSX DFW rules to enable SSH SSH is blocked by rule 2 (for Legal organization) and by rule 4 (for HR organization). To enable SSH, let's include the protocol in rule 1 and rule 3. Modify Rule 1 to Include SSH in NSX DFW policy table, select rule number 1. Then click on 1) + icon in the Service Column to modify content of Service field. A new window will appear. On 2) type ssh keyword and then 3) select SSH. Click on 4) right arrow icon to add SSH in the selected list panel. Click OK to complete the operation. Modify Rule 3 to Include SSH in NSX DFW policy table, select rule number 3. Then click on 1) + icon in the Service Column to modify content of Service field. A new window will appear. On 2) type ssh keyword and then 3) select SSH. Click on 4) right arrow icon to add SSH in the selected list panel. Page 148

149 Click OK to complete the operation. Page 149

150 Publish Changes Click on 1) Publish Changes to enforce this new NSX DFW policy configuration. Page 150

151 Publish Changes Status "Last publish operation succeeded" message will appear upon successful operation, Testing 2 Page 151

152 Legal Web Server to Legal Web Server - SSH Click on 1) legal-web-01 icon. A new SSH window will appear with automatic login to legal-web-01. Type 2) ssh legal-web-02. ECDSA key Fingerprint Authenticity message will be displayed. Type yes to continue the connection. Remote system will then ask for a password; enter VMware1! A welcome message on legal-web-02 will be displayed upon successful authentication, HR Web Server to HR Web Server - SSH (Copy) Click on 1) hr-web-01 icon. A new SSH window will appear with automatic login to hrweb-01. Page 152

153 Type 2) ssh hr-web-02. ECDSA key Fingerprint Authenticity message will be displayed. Type yes to continue the connection. Remote system will then ask for a password; enter VMware1! A welcome message on hr-web-02 will be displayed upon successful authentication, Page 153

Set Up a VM-Series NSX Edition Firewall

Set Up a VM-Series NSX Edition Firewall Set Up a VM-Series NSX Edition Firewall Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.1 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA

More information

Microsegmentation Using NSX Distributed Firewall: Getting Started

Microsegmentation Using NSX Distributed Firewall: Getting Started Microsegmentation Using NSX Distributed Firewall: VMware NSX for vsphere, release 6.0x REFERENCE PAPER Table of Contents Microsegmentation using NSX Distributed Firewall:...1 Introduction... 3 Use Case

More information

About the VM-Series Firewall

About the VM-Series Firewall About the VM-Series Firewall Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 http://www.paloaltonetworks.com/contact/contact/

More information

Set Up a VM-Series NSX Edition Firewall

Set Up a VM-Series NSX Edition Firewall Set Up a VM-Series NSX Edition Firewall Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA

More information

Set Up a VM-Series NSX Edition Firewall

Set Up a VM-Series NSX Edition Firewall Set Up a VM-Series NSX Edition Firewall Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.1 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

About the VM-Series Firewall

About the VM-Series Firewall About the VM-Series Firewall Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.1 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 http://www.paloaltonetworks.com/contact/contact/

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

VM-Series for VMware. PALO ALTO NETWORKS: VM-Series for VMware

VM-Series for VMware. PALO ALTO NETWORKS: VM-Series for VMware VM-Series for VMware The VM-Series for VMware supports VMware NSX, ESXI stand-alone and vcloud Air, allowing you to deploy next-generation firewall security and advanced threat prevention within your VMware-based

More information

Palo Alto Networks Cyber Security Platform for the Software Defined Data center. Zekeriya Eskiocak Security Consultant Palo Alto Networks

Palo Alto Networks Cyber Security Platform for the Software Defined Data center. Zekeriya Eskiocak Security Consultant Palo Alto Networks Palo Alto Networks Cyber Security Platform for the Software Defined Data center Zekeriya Eskiocak Security Consultant Palo Alto Networks Evolution towards a software defined data center Server Virtualiza-on

More information

Table of Contents HOL-PRT-1671

Table of Contents HOL-PRT-1671 Table of Contents Lab Overview - - Self-service data protection using the EMC Plugin for vrealize Automation and Avamar... 2 Lab Guidance... 3 Module 1 - Tenant user backup and restore (30 minutes)...

More information

Web Application Firewall

Web Application Firewall Web Application Firewall Getting Started Guide August 3, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks

More information

Deployment Guide for Citrix XenDesktop

Deployment Guide for Citrix XenDesktop Deployment Guide for Citrix XenDesktop Securing and Accelerating Citrix XenDesktop with Palo Alto Networks Next-Generation Firewall and Citrix NetScaler Joint Solution Table of Contents 1. Overview...

More information

Advanced Security Services with Trend Micro Deep Security and VMware NSX Platforms

Advanced Security Services with Trend Micro Deep Security and VMware NSX Platforms A Trend Micro Technical White Paper June 2015 Advanced Security Services with Trend Micro and VMware NSX Platforms >> This document is targeted at virtualization, security, and network architects interested

More information

VMware vcenter Log Insight Getting Started Guide

VMware vcenter Log Insight Getting Started Guide VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

VMware vcloud Air Networking Guide

VMware vcloud Air Networking Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

vcloud Air - Virtual Private Cloud OnDemand Networking Guide

vcloud Air - Virtual Private Cloud OnDemand Networking Guide vcloud Air - Virtual Private Cloud OnDemand Networking Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

VMware vshield Zones R E V I E W E R S G U I D E

VMware vshield Zones R E V I E W E R S G U I D E VMware vshield Zones R E V I E W E R S G U I D E Table of Contents Getting Started..................................................... 3 About This Guide...................................................

More information

Installing and Configuring vcenter Support Assistant

Installing and Configuring vcenter Support Assistant Installing and Configuring vcenter Support Assistant vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

Virtual Data Centre. User Guide

Virtual Data Centre. User Guide Virtual Data Centre User Guide 2 P age Table of Contents Getting Started with vcloud Director... 8 1. Understanding vcloud Director... 8 2. Log In to the Web Console... 9 3. Using vcloud Director... 10

More information

Set Up a VM-Series Firewall on an ESXi Server

Set Up a VM-Series Firewall on an ESXi Server Set Up a VM-Series Firewall on an ESXi Server Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara,

More information

vsphere Replication for Disaster Recovery to Cloud

vsphere Replication for Disaster Recovery to Cloud vsphere Replication for Disaster Recovery to Cloud vsphere Replication 5.8 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

Securing the Virtualized Data Center With Next-Generation Firewalls

Securing the Virtualized Data Center With Next-Generation Firewalls Securing the Virtualized Data Center With Next-Generation Firewalls Data Center Evolution Page 2 Security Hasn t Kept Up with Rate Of Change Configuration of security policies are manual and slow Weeks

More information

vcloud Director User's Guide

vcloud Director User's Guide vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of

More information

Windows Server 2008 R2 Initial Configuration Tasks

Windows Server 2008 R2 Initial Configuration Tasks Windows Server 2008 R2 Initial Configuration Tasks I am not responsible for your actions or their outcomes, in any way, while reading and/or implementing this tutorial. I will not provide support for the

More information

Configuring PA Firewalls for a Layer 3 Deployment

Configuring PA Firewalls for a Layer 3 Deployment Configuring PA Firewalls for a Layer 3 Deployment Configuring PAN Firewalls for a Layer 3 Deployment Configuration Guide January 2009 Introduction The following document provides detailed step-by-step

More information

User Manual. User Manual for Version 4.4.0.8

User Manual. User Manual for Version 4.4.0.8 User Manual User Manual for Version 4.4.0.8 I Endpoint Protector Virtual Appliance User Manual Table of Contents 1. Endpoint Protector Virtual Appliance Formats1 1.1. Available Formats of the Virtual Appliance...

More information

Virtual Appliance Setup Guide

Virtual Appliance Setup Guide The Barracuda SSL VPN Vx Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda SSL VPN hardware appliance. It is designed for easy deployment

More information

CloudCIX Bootcamp. The essential IaaS getting started guide. http://www.cix.ie

CloudCIX Bootcamp. The essential IaaS getting started guide. http://www.cix.ie The essential IaaS getting started guide. http://www.cix.ie Revision Date: 17 th August 2015 Contents Acronyms... 2 Table of Figures... 3 1 Welcome... 4 2 Architecture... 5 3 Getting Started... 6 3.1 Login

More information

vshield Quick Start Guide vshield Manager 4.1 vshield Edge 1.0 vshield App 1.0 vshield Endpoint 1.0

vshield Quick Start Guide vshield Manager 4.1 vshield Edge 1.0 vshield App 1.0 vshield Endpoint 1.0 vshield Manager 4.1 vshield Edge 1.0 vshield App 1.0 vshield Endpoint 1.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

Tunnels and Redirectors

Tunnels and Redirectors Tunnels and Redirectors TUNNELS AND REDIRECTORS...1 Overview... 1 Security Details... 2 Permissions... 2 Starting a Tunnel... 3 Starting a Redirector... 5 HTTP Connect... 8 HTTPS Connect... 10 LabVNC...

More information

UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab

UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab Description The Symantec App Center platform continues to expand it s offering with new enhanced support for native agent based device management

More information

Deployment and Configuration Guide

Deployment and Configuration Guide vcenter Operations Manager 5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions

More information

WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks

WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent spread of the malware to other systems. To ensure immediate alerts to malware discovered on

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

Thinspace deskcloud. Quick Start Guide

Thinspace deskcloud. Quick Start Guide Thinspace deskcloud Quick Start Guide Version 1.2 Published: SEP-2014 Updated: 16-SEP-2014 2014 Thinspace Technology Ltd. All rights reserved. The information contained in this document represents the

More information

vshield Administration Guide vshield Manager 4.1 vshield Edge 1.0 vshield App 1.0 vshield Endpoint Security 1.0

vshield Administration Guide vshield Manager 4.1 vshield Edge 1.0 vshield App 1.0 vshield Endpoint Security 1.0 vshield Administration Guide vshield Manager 4.1 vshield Edge 1.0 vshield App 1.0 vshield Endpoint Security 1.0 This document supports the version of each product listed and supports all subsequent versions

More information

Qvis Security Technical Support Field Manual LX Series

Qvis Security Technical Support Field Manual LX Series Table of Contents Page 1: Motion Detection 1.0 Configuring Motion Detection for LX Apollo / LX Zeus DVRs 2 1.1 Motion Playback on LX Apollo / LX Zeus DVRs 3 1.2 Scheduling Motion and Continuous Recording

More information

vshield Administration Guide

vshield Administration Guide vshield Manager 5.1 vshield App 5.1 vshield Edge 5.1 vshield Endpoint 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

ILTA HANDS ON Securing Windows 7

ILTA HANDS ON Securing Windows 7 Securing Windows 7 8/23/2011 Table of Contents About this lab... 3 About the Laboratory Environment... 4 Lab 1: Restricting Users... 5 Exercise 1. Verify the default rights of users... 5 Exercise 2. Adding

More information

Asterisk SIP Trunk Settings - Vestalink

Asterisk SIP Trunk Settings - Vestalink Asterisk SIP Trunk Settings - Vestalink Vestalink is a new SIP trunk provider that has sprung up as a replacement for Google Voice trunking within Asterisk servers. They offer a very attractive pricing

More information

Networking Guide Redwood Manager 3.0 August 2013

Networking Guide Redwood Manager 3.0 August 2013 Networking Guide Redwood Manager 3.0 August 2013 Table of Contents 1 Introduction... 3 1.1 IP Addresses... 3 1.1.1 Static vs. DHCP... 3 1.2 Required Ports... 4 2 Adding the Redwood Engine to the Network...

More information

Virtual Appliance Setup Guide

Virtual Appliance Setup Guide Virtual Appliance Setup Guide 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective

More information

VMware vcenter Log Insight Getting Started Guide

VMware vcenter Log Insight Getting Started Guide VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

Installation Guide Avi Networks Cloud Application Delivery Platform Integration with Cisco Application Policy Infrastructure

Installation Guide Avi Networks Cloud Application Delivery Platform Integration with Cisco Application Policy Infrastructure Installation Guide Avi Networks Cloud Application Delivery Platform Integration with Cisco Application Policy Infrastructure August 2015 Table of Contents 1 Introduction... 3 Purpose... 3 Products... 3

More information

SonicWALL SRA Virtual Appliance Getting Started Guide

SonicWALL SRA Virtual Appliance Getting Started Guide COMPREHENSIVE INTERNET SECURITY SonicWALL Secure Remote Access Appliances SonicWALL SRA Virtual Appliance Getting Started Guide SonicWALL SRA Virtual Appliance5.0 Getting Started Guide This Getting Started

More information

vshield Quick Start Guide

vshield Quick Start Guide vshield Manager 5.0 vshield App 5.0 vshield Edge 5.0 vshield Endpoint 5.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

VM-Series Firewall Deployment Tech Note PAN-OS 5.0

VM-Series Firewall Deployment Tech Note PAN-OS 5.0 VM-Series Firewall Deployment Tech Note PAN-OS 5.0 Revision A 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Supported Topologies... 3 Prerequisites... 4 Licensing... 5

More information

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 This document supports the version of each product listed and supports all subsequent versions until the document

More information

REPORT & ENFORCE POLICY

REPORT & ENFORCE POLICY App-ID KNOWN PROTOCOL DECODER Start Decryption (SSL or SSH) Decode Signatures Policy IP/Port Policy Application Signatures Policy IDENTIFIED TRAFFIC (NO DECODING) UNKNOWN PROTOCOL DECODER Apply Heuristics

More information

Set Up a VM-Series Firewall on an ESXi Server

Set Up a VM-Series Firewall on an ESXi Server Set Up a VM-Series Firewall on an ESXi Server Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.1 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara,

More information

Plesk 11 Manual. Fasthosts Customer Support

Plesk 11 Manual. Fasthosts Customer Support Fasthosts Customer Support Plesk 11 Manual This guide covers everything you need to know in order to get started with the Parallels Plesk 11 control panel. Contents Introduction... 3 Before you begin...

More information

Virtual Appliances. Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V. Virtual Appliance Setup Guide for Umbrella Page 1

Virtual Appliances. Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V. Virtual Appliance Setup Guide for Umbrella Page 1 Virtual Appliances Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V Virtual Appliance Setup Guide for Umbrella Page 1 Table of Contents Overview... 3 Prerequisites... 4 Virtualized Server

More information

Installing and Using the vnios Trial

Installing and Using the vnios Trial Installing and Using the vnios Trial The vnios Trial is a software package designed for efficient evaluation of the Infoblox vnios appliance platform. Providing the complete suite of DNS, DHCP and IPAM

More information

VX 9000E WiNG Express Manager INSTALLATION GUIDE

VX 9000E WiNG Express Manager INSTALLATION GUIDE VX 9000E WiNG Express Manager INSTALLATION GUIDE 2 VX 9000E WiNG Express Manager Service Information If you have a problem with your equipment, contact support for your region. Support and issue resolution

More information

How to Use vsphere to Connect to and Manage an ESXi Hypervisor Installation

How to Use vsphere to Connect to and Manage an ESXi Hypervisor Installation How to Use vsphere to Connect to and Manage an ESXi Hypervisor Installation I am not responsible for your actions or their outcomes, in any way, while reading and/or implementing this tutorial. I will

More information

User Guide FOR TOSHIBA STORAGE PLACE

User Guide FOR TOSHIBA STORAGE PLACE User Guide FOR TOSHIBA STORAGE PLACE (This page left blank for 2-sided "book" printing.) Table of Contents Overview... 5 System Requirements... 5 Storage Place Interfaces... 5 Getting Started... 6 Using

More information

Monitoring Hybrid Cloud Applications in VMware vcloud Air

Monitoring Hybrid Cloud Applications in VMware vcloud Air Monitoring Hybrid Cloud Applications in ware vcloud Air ware vcenter Hyperic and ware vcenter Operations Manager Installation and Administration Guide for Hybrid Cloud Monitoring TECHNICAL WHITE PAPER

More information

Easy Setup Guide for the Sony Network Camera

Easy Setup Guide for the Sony Network Camera -878-191-11 (1) Easy Setup Guide for the Sony Network Camera For setup, a computer running the Microsoft Windows Operating System is required. For monitoring camera images, Microsoft Internet Explorer

More information

Next-Generation Datacenter Security Implementation Guidelines

Next-Generation Datacenter Security Implementation Guidelines Next-Generation Datacenter Security Implementation Guidelines March 2015 INTRODUCTION 3 DEPLOYMENT OVERVIEW 4 IMPLEMENTATION GUIDELINES 4 PA-7050 Boundary Firewalls to protect north-south traffic 5 Virtual

More information

Configuring Trend Micro Content Security

Configuring Trend Micro Content Security 9 CHAPTER This chapter describes how to configure the CSC SSM using the CSC Setup Wizard in ASDM and the CSC SSM GUI, and includes the following sections: Information About the CSC SSM, page 9-1 Licensing

More information

Setting up VMware ESXi for 2X VirtualDesktopServer Manual

Setting up VMware ESXi for 2X VirtualDesktopServer Manual Setting up VMware ESXi for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

CCNA Discovery 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual

CCNA Discovery 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial

More information

Next Generation Security with VMware NSX and Palo Alto Networks VM-Series TECHNICAL WHITE PAPER

Next Generation Security with VMware NSX and Palo Alto Networks VM-Series TECHNICAL WHITE PAPER Next Generation Security with VMware NSX and Palo Alto Networks VM-Series TECHNICAL WHITE PAPER Summary of Contents Introduction... 3 Intended Audience and purpose of document.... 3 Solution Overview....

More information

Next Generation Security with VMware NSX and Palo Alto Networks VM-Series TECHNICAL WHITE PAPER

Next Generation Security with VMware NSX and Palo Alto Networks VM-Series TECHNICAL WHITE PAPER Next Generation Security with VMware NSX and Palo Alto Networks VM-Series TECHNICAL WHITE PAPER Summary of Contents Introduction... 3 Intended Audience and purpose of document.... 3 Solution Overview....

More information

VMWARE PROTECTION USING VBA WITH NETWORKER 8.1

VMWARE PROTECTION USING VBA WITH NETWORKER 8.1 Technical Note VMWARE PROTECTION USING VBA WITH NETWORKER 8.1 Complete Deployment and Implementation procedure Abstract This technical note describes the integration of EMC NetWorker with VMware vcenter

More information

PHD Virtual Backup for Hyper-V

PHD Virtual Backup for Hyper-V PHD Virtual Backup for Hyper-V version 7.0 Installation & Getting Started Guide Document Release Date: December 18, 2013 www.phdvirtual.com PHDVB v7 for Hyper-V Legal Notices PHD Virtual Backup for Hyper-V

More information

Device Management. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks

Device Management. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks Device Management Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us

More information

Data Center Connector for vsphere 3.0.0

Data Center Connector for vsphere 3.0.0 Product Guide Data Center Connector for vsphere 3.0.0 For use with epolicy Orchestrator 4.6.0, 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

How Network Virtualization can improve your Data Center Security

How Network Virtualization can improve your Data Center Security How Network Virtualization can improve your Data Center Security Gilles Chekroun SDDC, NSX Team EMEA gchekroun@vmware.com 2014 VMware Inc. All rights reserved. Security IT spending Security spending is

More information

Set Up a VM-Series Firewall on the Citrix SDX Server

Set Up a VM-Series Firewall on the Citrix SDX Server Set Up a VM-Series Firewall on the Citrix SDX Server Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.1 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa

More information

SHAREPOINT 2013 IN INFRASTRUCTURE AS A SERVICE

SHAREPOINT 2013 IN INFRASTRUCTURE AS A SERVICE SHAREPOINT 2013 IN INFRASTRUCTURE AS A SERVICE Contents Introduction... 3 Step 1 Create Azure Components... 5 Step 1.1 Virtual Network... 5 Step 1.1.1 Virtual Network Details... 6 Step 1.1.2 DNS Servers

More information

Product Version 1.0 Document Version 1.0-B

Product Version 1.0 Document Version 1.0-B VidyoDashboard Installation Guide Product Version 1.0 Document Version 1.0-B Table of Contents 1. Overview... 3 About This Guide... 3 Prerequisites... 3 2. Installing VidyoDashboard... 5 Installing the

More information

BaseManager & BACnet Manager VM Server Configuration Guide

BaseManager & BACnet Manager VM Server Configuration Guide BaseManager & BACnet Manager VM Server Configuration Guide For Self-Hosted BaseManager & BACnet Manager Servers Deployed as Virtual Machines August 27, 2015 Customer Service 1-866-294-5847 i Baseline Inc.

More information

MFC7840W Windows Network Connection Repair Instructions

MFC7840W Windows Network Connection Repair Instructions Difficulty printing from your PC can occur for various reasons. The most common reason a networked Brother machine may stop printing, is because the connection between the computer and the Brother machine

More information

WildFire Cloud File Analysis

WildFire Cloud File Analysis WildFire 6.1 Administrator s Guide WildFire Cloud File Analysis Palo Alto Networks WildFire Administrator s Guide Version 6.1 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America

More information

STEPfwd Quick Start Guide

STEPfwd Quick Start Guide CERT/Software Engineering Institute June 2016 http://www.sei.cmu.edu Table of Contents Welcome to STEPfwd! 3 Becoming a Registered User of STEPfwd 4 Learning the Home Page Layout 5 Understanding My View

More information

ISERink Installation Guide

ISERink Installation Guide ISERink Installation Guide Version 1.1 January 27, 2015 First developed to support cyber defense competitions (CDCs), ISERink is a virtual laboratory environment that allows students an opportunity to

More information

enicq 5 System Administrator s Guide

enicq 5 System Administrator s Guide Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide

More information

vsphere Replication for Disaster Recovery to Cloud

vsphere Replication for Disaster Recovery to Cloud vsphere Replication for Disaster Recovery to Cloud vsphere Replication 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

How To Set Up A Firewall Enterprise, Multi Firewall Edition And Virtual Firewall

How To Set Up A Firewall Enterprise, Multi Firewall Edition And Virtual Firewall Quick Start Guide McAfee Firewall Enterprise, Multi-Firewall Edition model S7032 This quick start guide provides high-level instructions for setting up McAfee Firewall Enterprise, Multi-Firewall Edition

More information

Background Deployment 3.1 (1003) Installation and Administration Guide

Background Deployment 3.1 (1003) Installation and Administration Guide Background Deployment 3.1 (1003) Installation and Administration Guide 2010 VoIP Integration March 14, 2011 Table of Contents Product Overview... 3 Personalization... 3 Key Press... 3 Requirements... 4

More information

Lab 8.4.2 Configuring Access Policies and DMZ Settings

Lab 8.4.2 Configuring Access Policies and DMZ Settings Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set

More information

GRAVITYZONE HERE. Deployment Guide VLE Environment

GRAVITYZONE HERE. Deployment Guide VLE Environment GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including

More information

Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide. Revised February 28, 2013 2:32 pm Pacific

Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide. Revised February 28, 2013 2:32 pm Pacific Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide Revised February 28, 2013 2:32 pm Pacific Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide

More information

Yottaa Site Optimizer Guide

Yottaa Site Optimizer Guide Yottaa Site Optimizer Guide The Yottaa Site Optimizer automatically accelerates web sites and mobile apps, reducing page load times and improving your visitors ability to interact with every page on your

More information

Getting Started with ESXi Embedded

Getting Started with ESXi Embedded ESXi 4.1 Embedded vcenter Server 4.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent

More information

Cyberoam Virtual Security Appliance - Installation Guide for VMware ESX/ESXi. Version 10

Cyberoam Virtual Security Appliance - Installation Guide for VMware ESX/ESXi. Version 10 Cyberoam Virtual Security Appliance - Installation Guide for VMware ESX/ESXi Version 10 Document Version 10.6.2-16/04/2015 Contents Preface... 4 Base Configuration... 4 Installation Procedure... 4 Cyberoam

More information

How To Use Senior Systems Cloud Services

How To Use Senior Systems Cloud Services Senior Systems Cloud Services In this guide... Senior Systems Cloud Services 1 Cloud Services User Guide 2 Working In Your Cloud Environment 3 Cloud Profile Management Tool 6 How To Save Files 8 How To

More information

Set Up Panorama. Palo Alto Networks. Panorama Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks

Set Up Panorama. Palo Alto Networks. Panorama Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks Set Up Panorama Palo Alto Networks Panorama Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us

More information

Offline Data Transfer to VMWare vcloud Hybrid Service

Offline Data Transfer to VMWare vcloud Hybrid Service Offline Data Transfer to VMWare vcloud Hybrid Service vcloud Connector 2.5.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

SSL-VPN 200 Getting Started Guide

SSL-VPN 200 Getting Started Guide Secure Remote Access Solutions APPLIANCES SonicWALL SSL-VPN Series SSL-VPN 200 Getting Started Guide SonicWALL SSL-VPN 200 Appliance Getting Started Guide Thank you for your purchase of the SonicWALL SSL-VPN

More information

VMware vrealize Operations for Horizon Installation

VMware vrealize Operations for Horizon Installation VMware vrealize Operations for Horizon Installation vrealize Operations for Horizon 6.3 This document supports the version of each product listed and supports all subsequent versions until the document

More information

Fasthosts Internet Parallels Plesk 10 Manual

Fasthosts Internet Parallels Plesk 10 Manual Fasthosts Internet Parallels Plesk 10 Manual Introduction... 2 Before you begin... 2 Logging in to the Plesk control panel... 2 Securing access to the Plesk 10 control panel... 3 Configuring your new server...

More information

JMC Next Generation Web-based Server Install and Setup

JMC Next Generation Web-based Server Install and Setup JMC Next Generation Web-based Server Install and Setup This document will discuss the process to install and setup a JMC Next Generation Web-based Windows Server 2008 R2. These instructions also work for

More information

Acronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide

Acronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide Acronis Backup & Recovery 10 Advanced Server Virtual Edition Quick Start Guide Table of contents 1 Main components...3 2 License server...3 3 Supported operating systems...3 3.1 Agents... 3 3.2 License

More information

Managing Horizon Traffic across Multiple Data Centers with BIG-IP

Managing Horizon Traffic across Multiple Data Centers with BIG-IP Managing Horizon Traffic across Multiple Data Centers with BIG-IP By deploying BIG-IP Global Traffic Manager (GTM), a single namespace (for example, https://desktop.example.com) can be provided to all

More information

How To Set Up A Backupassist For An Raspberry Netbook With A Data Host On A Nsync Server On A Usb 2 (Qnap) On A Netbook (Qnet) On An Usb 2 On A Cdnap (

How To Set Up A Backupassist For An Raspberry Netbook With A Data Host On A Nsync Server On A Usb 2 (Qnap) On A Netbook (Qnet) On An Usb 2 On A Cdnap ( WHITEPAPER BackupAssist Version 5.1 www.backupassist.com Cortex I.T. Labs 2001-2008 2 Contents Introduction... 3 Hardware Setup Instructions... 3 QNAP TS-409... 3 Netgear ReadyNas NV+... 5 Drobo rev1...

More information

Eucalyptus 3.4.2 User Console Guide

Eucalyptus 3.4.2 User Console Guide Eucalyptus 3.4.2 User Console Guide 2014-02-23 Eucalyptus Systems Eucalyptus Contents 2 Contents User Console Overview...4 Install the Eucalyptus User Console...5 Install on Centos / RHEL 6.3...5 Configure

More information

Data Center Automation with the VM-Series

Data Center Automation with the VM-Series Data Center Automation with the VM-Series Tech Note PAN-OS 5.0 Revision A 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Process... 3 Creating the Gold Standard... 3 Initial

More information