Lee H. Marzke on 6 Jul 2017 19:37:14 -0700 |
[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]
Re: [PLUG] Fios Quantum Gateway Router / Cabling type |
See below ----- Original Message ----- > From: "Vossen JP" <jp@jpsdomain.org> > To: "Philadelphia Linux User's Group Discussion List" <plug@lists.phillylinux.org> > Sent: Thursday, July 6, 2017 8:58:31 PM > Subject: Re: [PLUG] Fios Quantum Gateway Router / Cabling type > On 07/06/2017 06:05 PM, Lee H. Marzke wrote: >> I forgot to say, that I now connect FIOS ONT Ethernet directly to a Cisco >> switch, put that ingress >> traffic on a custom VLAN, and send it to the pfSense VM in my server cluster. >> So I have >> no need for any unreliable consumer devices in the network path. > > But you DO have to trust that malicious traffic can't jump out of the > VLAN and/or virtualization on the way to or from your FW! I'll grant > that it's a small risk, but I'd never put guests in different security > classifications on the same VM hypervisor, or trust a VLAN for that. So the traffic can't really jump can it? But a malicious endpoint that intercepted the traffic, could disregard the vLAN. So we are concerned about all the places that external FIOS packet can go, and where malicious or compromised endpoints can get at it. I believe VMware has government certification that verify that. The old days of requiring an air-gap between different security levels is long gone - and VMware NSX provides much more security than air gap. Basically every virtual VM NIC has firewall filtering applied as traffic leaves/enters the virtual nic, and they definitely allow different VM security levels mixed on each Hypervisor by design. The firewall rules on that Nic automatically follow the VM as it live-migrates between hosts. I think initially VMware had to bring in it's own security experts to quite a few PCI and other audits to dispel the old air-gap security methods previously used. In the end 'micro-segmentation' provided by NSX is much more secure. Digressing a bit - NSX firewall rules are written in terms of groups of VM's by name or by tag, and you never have to deal with the actual IP's in the rule - all the lower level IP rules are written automatically on-the-fly even as the VM moves around in the cluster or has it's IP changed. This leads to tremendous simplification of firewall rules you need to write. Now I'll grant you my simple vLAN is not as secure as vxLAN and NSX firewalling each VM nic, but unless my Cisco switch is NSA infected or otherwise compromised, those packets are not blasted out other switchports and only travel to the ESXi host(s) and then to the VM's connected to the firewalls' port on the dvSwitch ( just the FW ) so it's not to easy for packets to jump out as they just are not sent to many places. And yes VMware paid the bucks to verify / certify this. I guess your right that in general , other Hypervisors may not be trusted to this level. FYI - NSX uses vxLan standard for separation which has 4M total networks instead of only 4096 vLAN's, but is basically and advanced form of vLAN's - and mixed security is allowed on the same VM host ( e.g. maybe not government compartmentalized separation but PCI and non-PCI can certainly live right next to each on the same host ). FYI - NSX is VMware's software defined network overlay technology, consisting of distributed routing and firewalling in each hypervisor ( as part of a distributed virtual switch that spans all hosts ), and also edge services such as DHCP, VPN and Load balancer for north/south traffic in/out of the data center. > > My ONT terminates in Ethernet, to a physical firewall (SmallWall) using > physical wires. Wi-fi is another physical segment from the FW, as is > VoIP.ms. I think I have a spare segment for use as a DMZ, if needed,seperated > but it's been a long time since I needed to know that. > > Later, > JP > -- ------------------------------------------------------------------- > JP Vossen, CISSP | http://www.jpsdomain.org/ | http://bashcookbook.com/ > ___________________________________________________________________________ > Philadelphia Linux Users Group -- http://www.phillylinux.org > Announcements - http://lists.phillylinux.org/mailman/listinfo/plug-announce > General Discussion -- http://lists.phillylinux.org/mailman/listinfo/plug -- "Between subtle shading and the absence of light lies the nuance of iqlusion..." - Kryptos Lee Marzke, lee@marzke.net http://marzke.net/lee/ IT Consultant, VMware, VCenter, SAN storage, infrastructure, SW CM ___________________________________________________________________________ Philadelphia Linux Users Group -- http://www.phillylinux.org Announcements - http://lists.phillylinux.org/mailman/listinfo/plug-announce General Discussion -- http://lists.phillylinux.org/mailman/listinfo/plug