VMware Cloud Community
Kerseub
Contributor
Contributor

Need Advice about ESX in DMZ

Hi everyone.

My company is scheduling to host a website on 2 ESX 3.01 Server, puts in DMZ whith an HA configuration.

(Lets says that my LAN is 192.168.0.0/24 and my DMZ is 172.10.0.0/16 )

From that point I see 2 way to do this :

  • I put my esx in the DMZ with a "service console" IP as 172.10.0.1/172.10.0.2 AND a "VKERNEL" IP as 172.10.0.10/172.10.0.11 adress.I open the ports 902/903/8000/27000/27010 from my Lan to the DMZ. And I also open my LAN DNS to the ESX.

  • Or I put the ESX on my LAN with a "service console" IP as 192.168.0.1/192.168.0.2 AND a "VKERNEL" IP as 172.10.0.10/172.10.0.1. Playing with severals VSwitch. It means that my ESX will have a "leg" in my LAN and another in the DMZ.

I would like to know what would be the best and what are the VMware suggestions about this. If you have any litterature about this i'm also intrested

Regards

Kerseub

Tags (3)
0 Kudos
6 Replies
forbes
Enthusiast
Enthusiast

It realy depends on how strict your security team policies are Smiley Wink

The first solution is certainly the most secure.

The second solution is secure, but some would argue there is a chance of a misconfiguration on the server or a possible VLAN hopping risk

My security team dictates that there must be physical separation between devices (both servers and switches).

The second solution is the easiest to set-up and gives you the most flexibility.

Forbes Guthrie http://www.vReference.com vExpert
oreeh
Immortal
Immortal

You forgot the third option.

Service Console and VMkernel in the LAN segment and the VMs on a separate vSwitch in the DMZ.

Again your security policy decides.

Kerseub
Contributor
Contributor

I see...I think that my network team will prefer the first option : even if its need to open local DNS to the DMZ, it would be safe even with an ESX misconfiguration...

But from your experience, do you qualified as "secure" the ESX's network management: I mean does every virtual network are unreachable to others?

0 Kudos
TCronin
Expert
Expert

Technically it is secure in the way you are asking in that all the virtual switches are isolated from each other. But, Information Security engineers are paid to think of the what ifs and every once and awhile someone says they've exploited a guest to access the host's network. So far it has always turned out that the host was running VMware Server or Workstation, not ESX.

Our DMZ's are setup using your first method, everything is in the DMZ and everything is in only one DMZ. We have multiple DMZ's but every host that is in a DMZ is set so that all the nics are in the DMZ. Maybe it's overkill, but isn't that what DMZ's are about?

The other reason the Service Console ports are inside the DMZ are to allow for access restrictions, only authorized workstations are allowed to access the host for management purposes which further secures the host.

Tom Cronin, VCP, VMware vExpert 2009 - 2021, Co-Leader Buffalo, NY VMUG
0 Kudos
benny_hauk
Enthusiast
Enthusiast

Concerning oreeh's 3rd option in which you deploy "DMZ" VMs on the same VI3 infrastructure in which you deploy "LAN" VMs:

Each ESX server has a dedicated NIC going straight to the DMZ and thus each ESX server has a DMZ vSwitch cooresponding to that physical nic. The only difference between a DMZ VM and a LAN VM is that the DMZ VMs have NICs only bound to that DMZ vSwitch and none others. This is not akin to putting the same traditional server across both the LAN and the DMZ. That would be if you had a VM with 2 nics, one on the LAN vSwitch and one on the DMZ vSwitch. That would break anyone's security policy, and rightly so.

The risk, of course, is that there might potentially be a way to attack a VM one day in a way that attacks the ESX host running it, at which point one or more LAN computers have now been compromised from the Internet. This risk might be mitigated by 2 factors:

1) Having a DMZ ESX host communicating with a LAN VirtualCenter server and other LAN ESX hosts doesn't seem inherently any more secure than what' described above. It sounds much more complex but not really more secure. I think the only way to make it more secure is to have 2 totally disparate VI3 envionrments. The cost of totally reproducing your VI3 environment in the DMZ entails procuring multiple SAN-attached ESX servers w/ dual HBAs, a new SAN, SAN switch(es), VI3 Enter. Ed licensing, another VirtualCenter Mgmt server, etc. This likely makes virutalization in any form in the DMZ no longer make sense for all but the largest enterprises. It may be that the benefits of virtualization in the DMZ outweighs the small added security risk you assume when implementing oreeh's 3rd option. For example, the ONLY cost incurred in deployed DMZ VMs in the existing LAN VI3 environment is the cost of a few extra GBit Nics (don't forget, SANs aren't network devices so there is no such thing as "LAN SANs" and "DMZ SANs" from a security point-of-view; there are just "SANs"). Kind of a no brainer when it comes to cost.

2) It is likely that the enterprise can have enough other layers in the security onion so that ultimately this added risk is so incredibly minuate that it is seen as a much smaller risk than opening just about any hole in the firewall, which of course you have to do from time to time to conduct any business at all. For instance: database vulnerabilities hold a much higher risk, both in potential loss and in likeihood of attack (future code-red-ish attacks, SQL Injection attacks, cross-site-scripting attacks, etc) but yet we still have backend databases connected directly to our DMZ servers through tightly controlled firewall holes. We all recognize the risks of connecting web servers to database servers by opening firewall ports, yet every company does it. Likewise, we all recognize the risks of the future possibility that someone might find a zero-day exploit that connects DMZ VMs to their LAN ESX hosts.

My argument is that this risk is minimal compared to other risks security-folks put up with on a daily basis. This is because of the complexity of the attack vector, the no-frills ESX architecture, good VMWare patch mgmt, and all the other security infrastructure protecting the DMZ VMs in the first place (anti-virus clients, firewalls, good code review, patch mgmt, etc). Plus the HUGE cost savings realized by doing it oreeh's method may very well outweigh the potential damage a successful attack would likely incur in the first place.

Personally I think this is an education issue in which the security-policy-making people of the world need to better understand the truth of what is happening here within ESX Server. It is inheriently different than anything Microsoft, Sun, Apple, RedHat, etc produces. This is not a general-purpose operating system. Perhaps once the industry fully moves toward and implements ESX 3i and gets rid of that suspicious-looking Linux console, the security-policy folks finally will be left with no excuses.

Benny Hauk Systems Admin, VCP3/VCP4 LifeWay Chrstian Resources
0 Kudos