VMware NSX-T Reference Design Guide
121
● VM Inventory Collection – Identify and organize a list of all hosted virtualized
workloads on NSX-T transport nodes. This is dynamically collected and saved by NSX-T
Manager as the nodes – ESXi or KVM – are added as NSX-T transport nodes.
● Tag Workload – Use VM inventory collection to organize VMs with one or more tags.
Each designation consists of scope and tag association of the workload to an application,
environment, or tenant. For example, a VM tag could be “Scope = Prod, Tag = web” or
“Scope=tenant-1, Tag = app-1”. Often, these categories will dive several layers deep
including BU, project, environment, and regulatory flags. When following the iterative
approach of segmentation, categories and tags can be added to entities with existing tags.
In the application centric approach, new categories can be added with each application.
● Group Workloads – Use the NSX-T logical grouping construct with dynamic or static
membership criteria based on VM name, tags, segment, segment port, IP’s, or other
attributes. NSX-T allows for thousands of groups based on tags, although rarely are more
than a dozen or so needed.
● Define Security Policy – Using the firewall rule table, define the security policy. Have
categories and policies to separate and identify emergency, infrastructure, environment,
and application-specific policy rules based on the rule model.
The methodology and rule model mentioned earlier would influence how to tag and group the
workloads as well as affect policy definition. The following sections offer more details on
grouping and firewall rule table construction with an example of grouping objects and defining
NSX-T DFW policy.
5.4.3.1 Group Creation Strategies
The most basic grouping strategy is creation of a group around every application which is hosted
in the NSX-T environment. Each 3-tier, 2-tier, or single-tier applications should have its own
security group to enable faster operationalization of micro-segmentation. When combined with a
basic rule restricting inter-application communication to only essential shared services (e.g.,
DNS, AD, DHCP server) this enforces granular security inside the perimeter. Once this basic
micro-segmentation is in place, the writing of per-application rules can begin.
Groups
NSX-T provides collection of referenceable objects represented in a construct called Groups.
The selection of a specific policy methodology approach – application, infrastructure, or network
– will help dictate how grouping construct is used. Groups allow abstraction of workload
grouping from the underlying infrastructure topology. This allows a security policy to be written
for either a workload or zone (e.g., PCI zone, DMZ, or production environment).
A Group is a logical construct that allows grouping into a common container of static (e.g.,
IPSet/NSX objects) and dynamic (e.g., VM names/VM tags) elements. This is a generic
construct which can be leveraged across a variety of NSX-T features where applicable.
Static criteria provide capability to manually include particular objects into the Group. For
dynamic inclusion criteria, Boolean logic can be used to create groups between various criteria.