VMware NSX for Identity Firewall Use Case

Identity firewall IDFW enables one to configure distributed firewall rules based on Active Directory user group.

Identity firewall can be utilized for virtual desktops, remote desktop sessions RDSH and also for physical machines.

VMware NSX will control access to the target/destination servers based on the user logged in to the source VM. In this case, IDFW processing is done at the source.

Identity firewall rule is configured based on Active Directory user group.

IDFW must know which virtual desktop an Active Directory user logs onto in order to apply firewall rules.

There are two methods for logon detection:

Guest Introspection (GI) and/or

Event log scraping.

With RDSH, administrators create security groups with different users in Active Directory (AD), and allow or deny those users access to an application server based on their role. For example, Application Team and Database Team can connect to the same RDSH server, and have access to their own set of applications from that RDSH server.

Identity firewall supported configurations are documented here.

IDFW workflow:

1. Enable NSX File Introspection driver and NSX Network Introspection driver (VMware Tools full installation adds these by default).

2. Enable Identity firewall on DFW

Enable IDFW on the vSphere Cluster

3. Configure Identity firewall active directory

Configure IDFW AD Under System – Identity Firewall AD – Add

4. Synchronize Active Directory

Selective sync allows you to selectively choose organizational units for sync. Only the selected organization units which are created and changed since the last delta sync will be updated during a selective sync.

Sync IDFW Active Directory

5. Create a group named ‘NSX’ with Active Directory Group members

Create Active Directory Group by navigating to Inventory – Groups

5. Create a dynamic security group ‘Web’ based on VM name as a criteria

Security group definition for NSX security group ‘Web’ based on VM name criteria
Viewing effective members for the NSX security group ‘Web’

6. Create firewall rule under NSX DFW

Notice that the first firewall rule is being applied to the VM where user logs in. ‘Applied To’ field is important here. This firewall rule is not being applied to members of the group ‘Web’. Remember IDFW user context is processed at the source.

One can secure members of ‘Web’ security group using additional DFW rules, you can refer this blog post of mine for this.

Validation:

I will log into a virtual desktop using my AD user which is a member of the AD group ‘NSXGroup’ and open web pages of Web servers

I will also assign log label to the firewall rule to ensure that initiated traffic does hit the IDFW rule.

Log label being assigned to IDFW allow rule
Traffic on VMware Aria Operations for Logs

Leave a comment