A customer of mine asked me a few days ago: “Is it not possible to get NSX Security features without the network virtualization capabilities?”. I wrote it already in my blog “VMware is Becoming a Leading Cybersecurity Vendor” that you do not NSX’s network virtualization editions or capabilities if you are only interested in “firewalling” or NSX security features.
If you google “nsx security”, you will not find much. But there is a knowledge base article that describes the NSX Security capabilities from the “Distributed Firewall” product line: Product offerings for NSX-T 3.2 Security (87077).
Believe it or not, there are customers that haven’t started their zero-trust or “micro-segmentation” journey yet. Segmentation is about preventing lateral (east-west) movement. The idea is to divide the data center infrastructure into smaller security zones and that the traffic between the zones (and between workloads) is inspected based on the organization’s defined policies.
If you are one of them and want to deliver east-west traffic introspection using distributed firewalls, then these NSX Security editions are relevant for you:
VMware NSX Distributed Firewall
- NSX Distributed Firewall (DFW)
- NSX DFW with Threat Prevention
- NSX DFW with Advanced Threat Prevention
VMware NSX Gateway Firewall
- NSX Gateway Firewall (GFW)
- NSX Gateway Firewall with Threat Prevention
- NSX Gateway Firewall with Advanced Threat Prevention
Network Detection and Response
- Network Detection and Response (standalone on-premises offering)
Note: If you are an existing NSX customer using network virtualization, please have a look at Product offerings for VMware NSX-T Data Center 3.2.x (86095).
VMware NSX Distributed Firewall
The NSX Distributed Firewall is a hypervisor kernel-embedded stateful firewall that lets you create access control policies based on vCenter objects like datacenters and clusters, virtual machine names and tags, IP/VLAN/VXLAN addresses, as well as user group identity from Active Directory.
If a VM gets vMotioned to another physical host, you do not need to rewrite any firewall rules.
The distributed nature of the firewall provides a scale-out architecture that automatically extends firewall capacity when additional hosts are added to a data center.
Should you be interested in “firewalling” only, want to implement access controls for east-west traffic (micro-segmentation) only, but do not need threat prevention (TP) capabilities, then “NSX Distributed Firewall Edition” is perfect for you.
So, which features does the NSX DFW edition include?
The NSX DFW edition comes with these capabilities:
- L2 – L4 firewalling
- L7 Application Identity-based firewalling
- User Identity-based firewalling
- NSX Intelligence (flow visualization and policy recommendation)
- Aria Operations for Logs (formerly known as vRealize Log Insight)
What is the difference between NSX DFW and NSX DFW with TP?
With “NSX DFW with TP”, you would get the following additional features:
- Distributed Intrusion Detection Services (IDS)
- Distributed Behavioral IDS
- Distributed Intrusion Prevention Service (IPS)
- Distributed IDS Event Forwarding to NDR
Where does the NSX Distributed Firewall sit?
This question comes up a lot because customers understand that this is not an agent-based solution but something that is built into the VMware ESXi hypervisor.
The NSX DFW sits in the virtual patch cable, between the VM and the virtual distributed switch (VDS):
Note: Prior to NSX-T Data Center 3.2, VMs must have their vNIC connected to an NSX overlay or VLAN segment to be DFW-protected. In NSX-T Data Center 3.2, distributed firewall protects workloads that are natively connected to a VDS distributed port group (DVPG).
VMware NSX Gateway Firewall
The NSX Gateway Firewall extends the advanced threat prevention (ATP) capabilities of the NSX Distributed Firewall to physical workloads in your private cloud. It is a software-only, L2 – L7 firewall that includes capabilities such as IDS and IPS, URL filtering and malware detection as well as routing and VPN functionality.
If you are not interested in ATP capabilities yet, you can start with the “NSX Gateway Firewall” edition. What is the difference between all NSX GFW editions?
The NSX GFW can be deployed as a virtual machine or with an ISO image that can run on a physical server and it shares the same management console as the NSX Distributed Firewall.