You perform the procedure in NSX-T Data Center to configure traffic logging for Gateway Firewall rules, publish any firewall policy/rule changes, deny traffic by default, flood protection profile, ingress filters, restrict traffic and disable Internet Control Message Protocol (ICMP) unreachable notifications, mask replies, redirects on the external interfaces. Configure the settings for all NSX-T edge instances in your VMware Cloud Foundation environment.
Procedure
- In a Web browser, log in to the NSX Manager cluster as an administrator by using the user interface.
VMW-NSXT-01428
,VMW-NSXT-01513
Ensure that the NSX-T Gateway Firewall on the tier-0 and tier-1 gateways does not have any unpublished firewall policies or rules.- On the main navigation bar, click Security.
- In the left pane, navigate to North South security > Gateway Firewall/
- Click the Gateway specific rules tab.
- From the Gateway drop-down menu, select the respective gateway.
- For each tier-0 gateway with unpublished changes, review any unpublished changes and click either Revert or Publish.
- Repeat the procedure for each tier-1 gateway with unpublished changes.
VMW-NSXT-01429
,VMW-NSXT-01514
Configure the NSX-T Gateway Firewall on the tier-0 and tier-1 gateways to generate traffic log entries.Note:If the tier-0 gateway is deployed in an active/active high availability mode and no stateless rules exist, this configuration is not applicable.
- On the main navigation bar, click Security.
- In the left pane, navigate to North South security > Gateway Firewall/
- Click the Gateway specific rules tab.
- From the Gateway drop-down menu, select the respective gateway.
- For each tier-0 gateway and for each rule with logging disabled, click the gear icon, activate the Logging toggle, and click Apply.
- On the Gateway Firewall page, click Publish.
- Repeat the procedure for each tier-1 gateway and for each rule with deactivated logging.
VMW-NSXT-01431
,VMW-NSXT-01432
Configure the NSX-T Gateway Firewall on the tier-0 and tier-1 gateways to deny network traffic by default and allow network traffic by exception.- On the main navigation bar, click Security.
- In the left pane, navigate to North South security > Gateway Firewall/
- Click the Gateway specific rules tab.
- From the Gateway drop-down menu, select the respective gateway.
- Expand the default policy, and from the Actions drop-down menu, select Reject.
- On the Gateway Firewall page, click Publish.
- Repeat the procedure for each tier-1 gateway.
VMW-NSXT-01453
,VMW-NSXT-01515
Configure flood protection profiles on the NSX-T Gateway Firewall for the tier-0 and tier-1 gateways to protect against Denial of Service (DDoS) attacks.Note:If the tier-0 gateway is deployed in an active/active high availability mode and no stateless rules exist, this configuration is not applicable.
- On the main navigation bar, click Security.
- In the left pane, navigate to Settings > General Settings.
- Click the Firewall > Flood Protection under General Security Settings tab.
- Fom the Add profile drop-down menu, select Add Edge Gateway profile.
- Enter a name and specify appropriate values for the following: TCP half open connection limit, UDP active flow limit, ICMP active flow limit, and Other active connection limit.
- Activate SYN cache and RST spoofing.
- Configure the Applied to field to contain the tier-0 gateways, and then click Save.
- Repeat this step for the tier-1 gateway and set Applied to to contain the tier-1 gateways.
VMW-NSXT-01455
,VMW-NSXT-01510
Create a spoof guard segment profile with port binding activated and apply the profile to all the segments.- On the main navigation bar, click Networking.
- In the left pane, navigate to Connectivity > Segments.
- Click the Segment profiles tab.
- From the Add segment profile drop-down menu, select Spoof guard.
- Enter a name for the profile, activate Port bindings toggle switch, and click Save.
- Click the Segments tab.
- Next to the segment you want to configure, click the vertical ellipsis and click Edit.
- Expand the Segment profiles section, from the Spoof guard drop-down menu, select the newly created spoof guard segment profile, click Save, and click Close editing.
- Repeat this step for the remaining configured segments.
VMW-NSXT-01456
,VMW-NSXT-01464
Configure ingress filters for inbound traffic through any active external interface on the NSX-T tier-0 and tier-1 Gateway Firewall.Note:If the tier-0 gateway is deployed in an active/active high availability mode and no stateless rules exist, this configuration is not applicable.
- On the main navigation bar, click Security.
- In the left pane, navigate to North South security > Gateway firewall.
- Click the Gateway specific rules tab.
- From the Gateway drop-down menu, select the target NSX-T tier-0 gateway.
- For any rules that have individual interfaces specified in the Applied to field, in the Applied to column, click Edit and deselect the interfaces, leaving only the NSX-T gateway object type selected.
- Click Apply and click Publish.
- Repeat this step for all NSX-T tier-1 gateways.
VMW-NSXT-01460
To protect against route table flooding and prefix de-aggregation attacks, configure the NSX-T tier-0 gateway to use maximum prefixes.- On the main navigation bar, click Networking.
- In the left pane, navigate to Connectivity > Tier-0 gateways.
- Expand the NSX-T tier-0 gateway.
- Expand the BGP section and click BGP neighbors.
- In the Set BGP neighbors dialog box, click the vertical ellipsis and click Edit for the first neighbor.
- Click the number in the Route filter column.
- To configure the maximum routes value, specific to your environment, in the Set route filter dialog box, click the vertical ellipsis menu and click Edit.
- Repeat the step to configure all neighbors.
VMW-NSXT-01493
Configure the NSX-T tier-0 gateway to restrict traffic destined to itself.- On the main navigation bar, click Security.
- In the left pane, navigate to North South security > Gateway Firewall.
- Click the Gateway specific rules tab.
- From the Gateway drop-down menu, select the NSX-T tier-0 gateway.
- Click Add rule and, in the Destination column, click the Edit button.
- On the Set destination dialog box, select all IP addresses for external interfaces, and click Apply.
- On the Gateway Firewall page, in the Action column for the new rule, from the Action drop-down menu, select Drop or Reject.
- Click the Settings icon and, on the Settings dialog box, activate the Logging toggle.
- In the Applied to column, click the Edit icon.
- In the Applied to dialog box, select the target NSX-T tier-0 gateway and click Apply.
- On the Gateway Firewall page, click Publish.
- If necessary, you can configure additional rules to allow traffic to external interface IP addresses and place them above this rule.
VMW-NSXT-01494
,VMW-NSXT-01495
,VMW-NSXT-01496
Configure the NSX-T tier-0 gateway to have Internet Control Message Protocol (ICMP) unreachable notifications, mask replies, and disable redirects on all external interfaces.Note:If the tier-0 gateway is deployed in an active/active high availability mode and no stateless rules exist, this configuration is not applicable.
NSX-T Data Center does not come with a pre-configured service for ICMP mask replies. You may need to create this service.
- On the main navigation bar, click Security.
- In the left pane, navigate to North South security > Gateway Firewall.
- Click the All shared rules tab.
- From the Gateway drop-down menu, select the NSX-T tier-0 gateway.
- Click Add rule and, in the Services column, click the Edit button.
- On the Set services dialog box, on the Services tab, select the ICMP destination unreachable service, and click Apply.
- On the Gateway Firewall page, click the Settings icon and, on the Settings dialog box, activate the Logging toggle.
- In the Applied to column, click the Edit icon.
- In the Applied to dialog box, select the target NSX-T tier-0 gateway and click Apply.
- On the Gateway Firewall page, click Publish.
- Repeat the procedure for the ICMP mask replies and ICMP redirectservices.