A per-VM firewall would be great if properly executed

Posted by virtualization.info Staff   |   Thursday, October 16th, 2008   |  

As virtualization.info reported many times in the last couple of years, the current effort to bring security into the virtual infrastructure leaves much to desire.

The best thing that new and consolidated security vendors can do at the moment is:

  1. moving traditional tools like firewalls, IDS, anti-virus and so on into virtual machines
  2. ask the virtual infrastructure administrator to reconfigure the virtual network so that virtual traffic pass through or pass by the virtualized security tools above
  3. offer support for this uncommon new deployment

and all of them are bad things:

#1 is highly inefficient because the admin has to deploy multiple copies of the same tool (it depends on the virtual networking actually, but think about the anti-virus agent in a VDI environment as the worst case) when he could just deploy one that monitors the entire virtual infrastructure at the hypervisor level. And this wastes physical resources big time.

Unfortunately, until VMware releases its VMsafe APIs (and other vendors follow the trend), there’s not much that can be done.

#2 is highly constraining because it breaks the premise of mobility that virtualization brings. As soon as the administrator invokes a live migration for the protected virtual machine, the virtual networking is messed up and the virtualized security tool could be cut out of the game.

VMware is working to mitigate this issue and VI 4.0 will introduce a thing called vNetwork Distributed Switch, preserving the same virtual network configuration even during a live migration.
The technology is interesting but it certainly is just a partial solution of the problem.

#3 is highly unreliable because no matter how committed the vendor is, it will never be able to forecast how many virtual machines are running at the same time on the same virtualization host, and how this will impact on the performance of its virtualized product.

The just released OVF standard allows to define specific characteristics for each virtual machine through a metadata layer, including service level agreements (SLAs), but we are far away from mainstream adoption.

 

A possible solution (not fully detailed) could be:

  • wrapping each virtual machine in a security layer (something that products like VMware ACE, Kidaro Workspaces and Sentillion vThere already do since a while) where the administrator define a specific security policy
  • having an independent tier (the virtualization management layer doesn’t seem a good candidate) that acts as security coordinator, reading the policy requirements for each VM security wrapper and querying the hypervisor to see if it has any security product connected that can satisfy the requirements
  • having multiple security products that plug into the hypervisor and wait for the a call to action solicited by the security coordinator

Now Altor Networks has just announced what they call Virtual Firewall, which on paper seems to introduce part of the architecture above.

Unfortunately a careful analysis of the most technical brochure available online raises some doubts:

…The Altor VF installs as a virtual appliance on each virtualization host and inspects all traffic to and from each VM guest. Admins use a web-based management console to define and centrally manage traditional firewall rules: allowed and rejected sources, destinations, and protocols; actions to take; etc. Rules can apply to all VMs, a group of VMs with similar connectivity and security needs (such as web servers), or a single VM. Policies built with these rules can also be enforced at the global, group, and per-VM levels…

It really seems that this product, just like any other, requires virtual network reconfiguration (it doesn’t matter if the process is automated by a helpful setup that interacts with VirtualCenter) and that it simply replicates the security policy from one virtual appliance deployed into a virtualization host to another, deployed into a second virtualization host.
In this way the company can claim that virtual machines are protected even during live migrations:

The virtual firewall is “attached” to a VM at all times and travels with it during a VMotion event. This assures continuous security policy enforcement before, during, and after every live migration. Just as importantly, the Altor solution maintains the connected states of all applications within the migrating VM.

Has Altor Networks really found a way to create a security wrapper around ESX virtual machines?



blog comments powered by Disqus


virtualization.info Newest articles
Citrix results for Q3 2014

October 24th, 2014

On October 22, Citrix announced its financial results for the third quarter of fiscal year 2014, ended September 30, 2014.
The revenues for the third quarter were $759 million for…

VMware results for Q3 2014

October 24th, 2014

On October 21, VMware released the financial results for the third quarter of 2014.
The revenues for the third quarter were $1.53 billion for an increase of 18% compared to…

Paper: Reference Architecture – Director and EdgeSight

October 23rd, 2014

Citrix has released a paper titled: “Reference Architecture: Director and EdgeSight“. The paper which contains 32 pages contains a reference architecture for setting up Citrix Director and Citrix Edgesight.
Citrix…

Paper: Cisco UCS C240-M3 Rack Server with NVIDIA GRID GPU cards on Citrix XenServer 6.2 and XenDesktop 7.5

October 21st, 2014

Cisco has released a paper titled: “Cisco UCS C240-M3 Rack Server with NVIDIA GRID GPU cards on Citrix XenServer 6.2 and XenDesktop 7.5“.
The paper which contains 38 pages will…

Microsoft announces updates to its public and private cloud portfolio

October 20th, 2014

Microsoft today announced several upcoming features to both its public Microsoft Azure services, as its private cloud solution based on Windows Server and System Center. CEO Satya Nadella stated that…

OpenStack releases the 10th version of its IaaS platform called Juno

October 20th, 2014

OpenStack, the open source cloud computing project has released its 10th version of its IaaS platform for public, private and hybrid clouds. This version has 342 new features and…

VMware decides to disable TPS in future ESXi releases by default

October 17th, 2014

In a knowledge base article titled: “Security considerations and disallowing inter-Virtual Machine Transparent Page Sharing (2080735)” published on October 16th, VMware states that it will disable the Transparant Page Sharing…

Paper: Citrix Virtual Desktop Handbook 7.x

October 16th, 2014

Based on the recent releases of Citrix XenApp and XenDesktop 7.6, Citrix has updated its design guidance called the "Citrix Virtual Desktop Handbook 7.x". The handbook which contains 202 pages…

VMware announces vRealize Log Insight 2.5

October 16th, 2014

VMware has announced the release of version 2.5 of its log aggregation, management and analysis product Log Insight. This version will be the follow up of version 2.0 which was…

Release: Oracle VM VirtualBox 4.3.18

October 16th, 2014

Oracle has released a new version of its virtualization platform VM Virtualbox. Version 4.3.18 is considered a maintenance release which can be installed on top of version 4.3. The update…

Paper: Performance and Scalability of Microsoft SQL Server on VMware vSphere 5.5

October 16th, 2014

VMware has released a paper titled: "Performance and Scalability of Microsoft SQL Server on VMware vSphere 5.5". The Paper which contains 33 pages demonstrates that large Microsoft SQL Server databases…

Paper: Microsoft Exchange Server Performance on VMware Virtual SAN

October 16th, 2014

VMware has released a paper titled: "Microsoft Exchange Server Performance on VMware Virtual SAN". The paper which contains 9 pages shows the results of performance tests of Microsoft Exchange Server…

Microsoft announces support for Docker container virtualization for next version of Windows Server

October 15th, 2014

Microsoft has announced that it will support for Docker in its next version of Windows Server. Docker which provides a so called container virtualization solution currently receives a lot of…

Paper: Achieving Over 1-Million IOPS from Hyper-V VMs in a Scale-Out File Server Cluster Using Windows Server 2012 R2

October 15th, 2014

Microsoft has released a paper titled:"Achieving Over 1-Million IOPS from Hyper-V VMs in a Scale-Out File Server Cluster Using Windows Server 2012 R2". The paper which contains 24 pages demonstrates…

 
Monthly Archive