VMware Networking Community
vmware3222
Enthusiast
Enthusiast

Client isolation FW rules

Hi everyone,

i wont isolate my clients .

for example: client 1 can to connect to tenant 1 but not tenant 2

client2 can to connect to tenant 2 but not 1

Now i put FW Edge rules . but it based on client IP address

how i can put a generic rule

Thank you

6 Replies
cnrz
Expert
Expert

By Generic Rule is it that if additional IP Subnets or Logical Switches added, the FW Rule will apply automatically (dynamically)?

vmware3222
Enthusiast
Enthusiast

In fact, now i test NSX with 2 clients then i put its ip addresses

for example

source: 129.194.184.90   dest: 10.1.0.1 Block

but when i have 1000 clients, how i allow access only to their tenants

client1to tenant1 only

client n to tenant n only

thank you

0 Kudos
cnrz
Expert
Expert

One solution may be as this article:

http://blog.ipcraft.net/a-multi-tenant-topology-in-vmware-nsx/

Basically the recommendation is to make each Tenant a Seperate Security Group by Dynamically Grouping the objects. This may be as Logical Switches, Security Tags or AD Groups that would separate.  If tenant applications are similar,  Generic Service Groups may be used, and the Firewall Rules may be applied to the ESG dedicated for this Tenant.  For a big Cloud Service Provider, manually entering these rules would bring Administrative overhead, so there may be Cloud Management  or Automation, Orchestration solutions that automatically provides the Tenant Isolation.  If the tenants are not many and the applications are similar, then using Service Composer would be sufficient.

vmware3222
Enthusiast
Enthusiast

and if i have one ESG

what i can put in place of the ip client address for example?

0 Kudos
cnrz
Expert
Expert

Having one ESG for a Multitenant Environment may have following Limitations:

  • Total 10Gbps Aggregate Throughput passing traffic through ESG
  • Redundancy of the ESG
  • No Support for Overlapping IP Addresses between Tenants. IPAM (IP  Address Management should be handled centrally)
  • Total Number of DLRs that may be connected is 9 (If Trunking feature of ESG is used, 200x9)
  • If MPLS is used on the Upstream Physical Network, Seperate Tenant ESG's may not be connected to VRFs dedicated to the Tenant

The 2 Tier ESG Design has  many scalability and IP address Management benefits.

Instead of  IP Addresses dFW has many dynamic grouping properties, the choice may differ according to Design considerations:

  • Grouping Tenants as Security Groups  with their Logical Switches
  • Security Tagging of Tenant VMs
  • Identity-Based  Firewall AD Domain Groups
  • Name of the VM, Operating System
  • Resource Pool
  • Cluster
  • VM
  • Entity

One NAT Based design recommandation for Tenant Isolation providing Scalability and Overlapping IP Support is following:

https://www.youtube.com/watch?v=VJMxcO8twWc

These articles may be helpful:

http://www.virtuallymike.com/268/nsx-and-securing-multi-tenancy-policy

https://networkinferno.net/implementing-a-zero-trust-security-architecture

vmware3222
Enthusiast
Enthusiast

Thank you very much

your responsponse helps me

0 Kudos