vSEC

advertisement
CHECK POINT & VMWARE NSX
AUTOMATING ADVANCED SECURITY
FOR THE SOFTWARE-DEFINED DATACENTER
Aleksandr Nosits
Security Engineer, Baltics
©2015
©2015 Check
Check Point
Point Software
Software Technologies
Technologies Ltd.
Ltd.
[Restricted] ONLY for designated groups and individuals
1
DATA CENTERS
are rapidly evolving.
©2015 Check Point Software Technologies Ltd.
2
DATA CENTER EVOLUTION
Virtual
Software
Defined
Datacenter
Datacenter
Private Cloud
•
•
Server (compute) virtualization
Network operation is manual
©2015 Check Point Software Technologies Ltd.
•
•
Network are is also virtualized
Services can be dynamically inserted and
orchestrated via automation
[Restricted] ONLY for designated groups and individuals
3
VMWARE NSX - NETWORK VIRTUALIZATION
Network & Security Services in the
Hypervisor - Programmatic control
s
•
•
•
Virtual Switching and Routing
Virtual Load Balancing
Virtual L2-L4 Firewalling
Centrally and automatically manage network and advanced security
services in the data center
©2015 Check Point Software Technologies Ltd.
[Restricted] ONLY for designated groups and individuals
4
SECURITY CHALLENGES IN THE
CURRENT DATACENTER
©2015 Check Point Software Technologies Ltd.
5
Challenge #1: Increasing Traffic Inside the Datacenter
NORTH
WEST
EAST
SOUTH
Perimeter (north-south) security is
blind to 80% of the east-west data center traffic
©2015 Check Point Software Technologies Ltd.
[Restricted] ONLY for designated groups and individuals
6
Challenge #2: Lateral Threats Inside the Data Center
•
Lack of security control between VMs
•
Threat can easily traverse VLANs
•
Threats attack low-priority service and
then move to critical systems
Modern threats can spread laterally inside the data center, moving
from one application to another
©2015 Check Point Software Technologies Ltd.
[Restricted] ONLY for designated groups and individuals
7
Challenge #3: Security Ignores Data Center Changes
•
New Virtual Machines
•
Virtual Machine movement
•
VM that change IP address
•
Dormant VMs that wakes up
•
VMs move between VLANs
Traditional static controls fail to secure dynamic networks and
highly mobile applications
©2015 Check Point Software Technologies Ltd.
[Restricted] ONLY for designated groups and individuals
8
Challenge #4: Security Inhibits Data Center Agility
How to define secure policy for catalog
applications that have not been
provisioned and still don’t have IP
address?
Lack of security automation impacts business agility in delivering
services, results in security gaps
©2015 Check Point Software Technologies Ltd.
[Restricted] ONLY for designated groups and individuals
9
WHAT IS NEEDED?
©2015 Check Point Software Technologies Ltd.
10
SECURITY REQUIREMENTS INSIDE THE DATA CENTER
1
Automated insertion and deployment of advanced threat prevention to
protect inside the data center
2
Automated security provisioning to keep pace with dynamic data
center changes
3
Security visibility into traffic inside the data center
©2015 Check Point Software Technologies Ltd.
[Restricted] ONLY for designated groups and individuals
11
Introducing:
Check Point Teams with VMware to Automate Advanced Security for the
Software-Defined Data Center
©2015 Check Point Software Technologies Ltd.
[Restricted] ONLY for designated groups and individuals
12
•
Distributed Firewall (DFW) protects East-West L2-L4 traffic.
• Operates at the kernel level and processes packets close to line rate.
•
Check Point vSEC Security Gateway also protects East-West traffic but can operate at
L2-L7. vSEC provides additional L5-L7 capabilities like application identification,
application inspection and user identification to NSX environments.
• vSEC Gateway operates at user space and processes packets up to 2 Gbps (per
instance).
• vSEC Security Gateway uses NET-X API to redirect and inspect traffic.
•
By default, traffic is secured by DFW unless explicit traffic redirection to vSEC Gateway is
defined.
•
Traffic redirection provides capability to steer specific traffic to vSEC Gateway.
•
Traffic redirection policy is expressed by the user through NSX Service Composer.
©2015 Check Point Software Technologies Ltd.
13
CHECK POINT & VMWARE
Automating Security inside the Data Center
+
Virtual Security with Advanced
Threat Prevention
Lateral
Threat
Prevention
©2015 Check Point Software Technologies Ltd.
Next Generation Networking and
security
Automated
Security
Provisioning
[Restricted] ONLY for designated groups and individuals
Security Control
&
Visibility
14
vSEC & NSX DATACENTER SECURITY
100% Software Based: Service, Network & Security
Micro-Segmentation
with advanced threat
prevention
Automation of Virtual
Network & Security
s
Segmented Data Center
©2015 Check Point Software Technologies Ltd.
Security Control for
All Data Center Traffic
s
Security Orchestration
between Virtual Machines
[Protected] Non-confidential content
Consistent security for N-S and
E-W traffic
15
VMWARE CORE PRODUCTS FOR
SOFTWARE DEFINED DATACENTER (SDDC)
©2015 Check Point Software Technologies Ltd.
16
VMWARE PLATFORM
FOR SOFTWARE DEFINED DATACENTER (SDDC)
Virtual Machines
NSX Virtual Network
ESX Hosts
(Cluster)
©2015 Check Point Software Technologies Ltd.
17
vSEC Architecture and Components
Virtual or Physical Appliance
GAIA OS
Check Point
Management Server
vSEC Controller
Check Point Secure
Internal Communication (SIC)
SSL
SSL
SmartConsole
Windows Client
SSL
TCP/443
Check Point Secure
Internal Communication (SIC)
REST API
VMware
NSX
Manager
vSphere API
NetX API
VMware
vCenter
VMware
ESX
©2015 Check Point Software Technologies Ltd.
[Restricted] ONLY for designated groups and individuals
18
vSEC Solution Components
 GAIA OS with Check Point Management Server (R77.30) + Add-On (R77.30) on Virtual or Physical
Appliance
•
For vSEC to work, an Add-On to enable additional functionality must be installed.
•
The Check Point Management Server manages both virtual and physical Check Point Security Gateways. Can be deployed on virtual or
physical appliance.
 vSEC Security Controller Version (R77.30)
•
Installed as a hotfix. The controller learns the Security Groups and specific vCenter inventory
which can be used via security rules.
 vSEC Security Gateway Version (R77.20)
•
Virtual appliance running vSEC firewall and advanced security blades/features; integrates with NSX via NetX API
•
Protects virtualized environments from internal and external threats
.
 Check Point SmartConsole
•
Windows client application, used to manage the security policies.
©2015 Check Point Software Technologies Ltd.
19
vSEC Controller

Resides on the management server and learns information about vCenter and NSX

Communication done between vSEC controller and NSX Manager/vCenter is
via secure SSL connection and REST API and vSphere API

Polling occurs from vSEC Controller every 30 seconds
GAIA OS
What is learned from vCenter:
vCenter inventory: VMs, Clusters, vApp, Resource pool,
Data Center, Host, and Cluster Folder
What is learned from NSX Manager:
- Security Groups
©2015 Check Point Software Technologies Ltd.
Check Point
Management Server
vSEC Controller
REST API
VMware
NSX
Manager
vSphere API
VMware
vCenter
2
0
20
vSEC Security Gateway


Software Blade Architecture
If traffic is redirected to the vSEC gateway, without any policies configured on the vSEC Gateway,
the traffic will be dropped.

Traffic actually comes from the User Mode NetX API into Check Point’s user mode fwk, which is actually the same
program that runs in kernel on hardware appliances.

vSEC GW will be updated only in case of policy installation and changes in the virtual objects used in the policy.
VM User Space:
fwk (firewall engine)
cpd (handles mgmt communication)
fwd (sends log messages)
NetX API SDK
©2015 Check Point Software Technologies Ltd.
21
vSEC Solution Requirements
•
vSphere Requirements:
VMware Component
Validated Build
Notes
ESXi host
5.5 GA update 2 (build 2068190)
Testing for 6.0 in progress
vCenter Server
5.5 GA update 2 (build 2063318)
Testing for 6.0 in progress
NSX Manager
6.1.2 (build 2318232)
6.1.2 or later
* Currently vSEC supports only one NSX and one vCenter instance
GAIA OS with Management Server and VSEC Controller Requirements for VM:
VM Resource
Minimum
Recommended with Reporting
CPU
2
4
RAM
4 GB
8 GB
Disk
50 GB
100 GB
©2015 Check Point Software Technologies Ltd.
22
vSEC Solution Requirements
•
vSEC Gateway Requirements:
VMware Component
Minimum
Recommended
Memory
1 GB
2 GB
Disk Space
32 GB
80 GB
# of Virtual CPUs
1
5
OVF Space
4 GB
4 GB
vSEC Controller Requirements:
•
Installed as a Patch on the Checkpoint Security Management Server
•
At least 1 GB free disk space should be allocated
©2015 Check Point Software Technologies Ltd.
23
Deployment of Check Point vSEC Solution
1.• Install GAIA OS with Check Point Management Server R77.30 + Add-On R77.30 as a virtual
appliance or on hardware appliance or install Add-On onto existing R77.30 Management Server.
2. Install the hotfix: “Check_Point_VSEC_R77_30_HF_MGMT.linux.tgz”. This installs the vSEC
Controller. For the vSEC Controller, Make sure you have 1 GB free disk space on the server.
This
hotfix can also be installed via the Web UI as well.
3. . The Check Point Management Server can be used to manage both virtual and physical
gateways. If physical gateways will also be used, the following hotfix must also be applied
on the physical gateway.
fw1_wrapper_HOTFIX_R77_20_VSEC_HF_GW.tgz
fw1_wrapper_HOTFIX_R77_30_VSEC_HF_GW.tgz
©2015 Check Point Software Technologies Ltd.
24
Deployment of Check Point vSEC Solution
4. Upload vSEC OVF image to Check Point Management Server (or other web server).
•
5. Register the vSEC service using vsec_config client on Check Point Management Server
©2015 Check Point Software Technologies Ltd.
25
Deployment of Check Point vSEC Solution
6. Deploy the service from the vCenter Network & Security under Installation  Service
Deployments
•
©2015 Check Point Software Technologies Ltd.
26
Deployment of Check Point vSEC Solution
7. Configure a policy via SmartConsole and push down to respective hosts. Below two vSEC
Gateways were added as members of a cluster and a rule accepting all traffic is pushed down
•
to both members of the cluster.
©2015 Check Point Software Technologies Ltd.
27
Deployment of Check Point vSEC Solution
8. Configure Security Groups and Security Policy to redirect traffic to Check Point vSEC Gateway.
•
©2015 Check Point Software Technologies Ltd.
28
Deployment of Check Point vSEC Solution
9. Can log directly into a vSEC gateway and confirm traffic is being redirected to it. In this case,
two VMs with IP addresses 10.114.215.11 and 10.114.215.12 are sending ICMP pings to each
•
other. The below console output is from the vSEC gateway where the VM with IP
address 10.114.215.12 resides. The VM with IP address 10.114.215.11 resides on another host.
©2015 Check Point Software Technologies Ltd.
29
Deployment of Check Point vSEC Solution
10. We can easily enable additional blades/features on the vSEC Gateways.
•
©2015 Check Point Software Technologies Ltd.
30
Performance and Guidelines
 vSEC Gateway operates at user space and processes packets up to 2 Gbps (per instance)
 • Enabling additional software blades consumes more CPU and impacts performance
 The vSEC controller polls NSX and vCenter every 30 seconds for updates and communicates any changes
as needed to the vSEC Gateways.
 30 seconds is the maximum update time it can take for a vSEC controller to update the respective vSEC
Gateway(s).
What does this imply?
If a VM is added to a security group it can take up to 30 seconds for the respective vSEC
Gateway(s) to be updated with the correct IP of the VM.
©2015 Check Point Software Technologies Ltd.
31
vSEC - VMotion Scenario

In case of a vMotion event all the traffic which is related to the old connections will be inspected by the new firewall.
Information on old vSEC Gateway won’t pass to the new Gateway.

vMotion is not relevant to vSEC Gateway rules, as rules are applied at a cluster level, and all Gateways in the
cluster will have the same rules applied.


In general, vSEC Gateway clusters should parallel vSphere clusters.
CheckPoint rules are updated only in an Install Policy event. Virtual Objects are updated in the rules as objects
are learned from NSX/vCenter
©2015 Check Point Software Technologies Ltd.
32
vSEC - Controller HA Scenario

The vSEC controllers reside on the Check Point Management Server.

The Check Point Management Server follows an active-standby model; automatic failover is not supported.
* Two vSEC controllers are supported in an Active-Standby mode with only one controller active at any time.
* A synchronization between the servers is triggered every time a policy is installed.
* If manual failover is not initiated by the user, the vSEC controller
will not update the vSEC gateways with virtual objects learned from
NSX/vCenter.
* If the vSEC controller is down, traffic will keep passing based on rules
already installed on the vSEC Gateways, but no new learning from
NSX/vCenter will occur.

HA is supported over both L2 and L3.
©2015 Check Point Software Technologies Ltd.
33
AUTOMATE ADVANCED SECUREITY FOR SOFTWARE
DEFINED DATACENTER (SDDC)
©2015 Check Point Software Technologies Ltd.
34
PERIMETER SECURITY GATEWAY
Use Check Point Appliances with Advanced Threat Prevention for
Datacenter Perimeter Security (North-South traffic)
©2015 Check Point Software Technologies Ltd.
35
VIRTUAL SECURITY GATEWAY
Use Check Point vSEC Gateway for advanced security between Virtual
Machines (East-West traffic)
©2015 Check Point Software Technologies Ltd.
36
MICRO-SEGMENTATION
NSX Security Group
Finance
Legal
Partners
Web
Database
Use NSX to segment Virtual Machines
into different Security Groups using a flat network
©2015 Check Point Software Technologies Ltd.
37
EAST-WEST SECURITY CONTROL
NSX Service Chain Policy
Traffic from Partner to Legal Security
Group must go through Check Point
vSEC Gateway
Use Check Point vSEC to control traffic access between Virtual Machines
©2015 Check Point Software Technologies Ltd.
38
PREVENT LATERAL THREATS
Use vSEC for Advanced Threat Prevention inside data center
©2015 Check Point Software Technologies Ltd.
39
UNIFIED MANAGEMENT
Use Check Point unified management for consistent policy control and
threat visibility across virtual and perimeter gateways
©2015 Check Point Software Technologies Ltd.
40
APPLICATION-AWARE POLICY
Check Point Access Policy
Rule
3
From
To
WEB_VM
Database
(vCenter Object)
(NSX SecGroup)
Service
Action
SQL
Allow
Check Point dynamically
fetches objects from NSX and
vCenter
Use Fine-grained security policies tied to NSX Security Groups and Virtual
Machine identities
©2015 Check Point Software Technologies Ltd.
41
Check Point vSEC Key Features
Feature
Policy
Management
Check Point
Unified management for Virtual and physical Gateways
Datacenter policy segmentation with sub policies*
Fetch vCenter and NSX objects for use in Check Point policy
Threat Prevention with multi-layered defenses for Virtual Data Center
Security
Tag infected VM and update NSX for automatic remediation
Visibility & Forensics
View VM objects in security logs
Comprehensive Datacenter Threat Visibility
Automation &
Orchestration
Granular privilege down to individual rule for trusted integrations*
* Available in R80
©2015 Check Point Software Technologies Ltd.
[Confidential] For designated groups and individuals
42
FAQ
Q: What is the vSEC product version?
A: vSEc Gateway is R77.20 vSEC. vSEC Controller is based on R77.30
Q: Can I buy and use it today?
A: Yes
Q: Will vSEC be supported in R80?
A: Yes
Q: Was it certified by VMWare NSX
A: Yes. It is certified on ESX5.5 and ESX6.0
Q: Where can I learn more about the solution
A: Visit the vSEC wiki & Check Point vSEC webpage
©2015 Check Point Software Technologies Ltd.
43
CHECK POINT & VMWARE
Automating Advanced Securing Inside the Data Center
+
Virtual Security with Advanced
Threat Prevention
Lateral
Threat
Prevention
©2015 Check Point Software Technologies Ltd.
Next Generation Networking and
Security
Automated
Security
Provisioning
[Restricted] ONLY for designated groups and individuals
Security Control
&
Visibility
44
THANK YOU!
©2015 Check Point Software Technologies Ltd.
[Restricted] ONLY for designated groups and individuals
45
Download