Flow Microsegmentation Guide
Flow Microsegmentation Guide
Security Policies................................................................................................4
Types of Policies...............................................................................................5
Requirements.....................................................................................................9
Enabling Microsegmentation......................................................................... 10
Disabling Microsegmentation.................................................................................................................... 10
Services............................................................................................................ 12
Creating a Service.....................................................................................................................................12
Addresses........................................................................................................ 13
Creating an Address................................................................................................................................. 13
ii
Quarantining a VM.................................................................................................................................... 33
Removing a VM from the Quarantine.......................................................................................................33
Copyright..........................................................................................................47
iii
SECURITY POLICIES
Traditional data centers use firewalls to implement security checks at the perimeter—the points at which traffic enters
and leaves the data center network. Such perimeter firewalls are effective at protecting the network from external
threats. However, they offer no protection against threats that originate from within the data center and spread
laterally, from one compromised machine to another.
The problem is compounded by virtualized workloads changing their network configurations and hosts as they start,
stop, and migrate frequently. For example, IP addresses and MAC addresses can change as applications are shut down
on one host and started on another. Manual enforcement of security policies through traditional firewalls, which rely
on network configurations to inspect traffic, cannot keep up with these frequent changes and are error-prone.
Network-centric security policies also require the involvement of network security teams that have intimate
knowledge of network configuration in terms of VLANs, subnets, and other network entities.
Nutanix Flow includes a policy-driven security framework that inspects traffic within the data center. The framework
works as follows:
• Security policies inspect traffic that originates and terminates within a data center and help eliminate the need for
additional firewalls within the data center.
• The framework uses a workload-centric approach instead of a network-centric approach. Therefore, it can
scrutinize traffic to and from VMs no matter how their network configurations change and where they reside
in the data center. The workload-centric, network-agnostic approach also enables the virtualization team to
implement these security policies without having to rely on network security teams.
• Security policies are applied to categories (a logical grouping of VMs) and not to the VMs themselves. Therefore,
it does not matter how many VMs are started up in a given category. Traffic associated with the VMs in a
category is secured without administrative intervention, at any scale.
• Prism Central offers a visualization-based approach to configuring policies and monitoring the traffic to which a
given policy applies.
• Using Prism Central, you can configure syslog monitoring by forwarding Flow logs to an external syslog server.
For details, see Configuring Syslog Monitoring in the Prism Central Admin Center Guide.
Note: Nutanix Flow supports only AHV hypervisor; security policies can not be applied to VMs running on other
hypervisors.
Isolation Environment Policy Use an isolation environment policy when you want
to block all traffic, regardless of direction, between
two groups of VMs identified by their category. VMs
within a group can communicate with each other.
For example, use an isolation environment policy
when you want to block all traffic between VMs in the
category Environment: sandbox and VMs in the
category Environment: production, and you want
to allow all the VMs within each of those categories to
communicate with each other.
For more information, see Isolation Environment
Policy Configuration on page 26.
Enforcement Modes
All policies, whether associated with securing an application, isolating environments, or quarantining VMs, can be
run in the following modes:
Monitor Mode
Allows all traffic, including traffic that is not allowed by the policy. This mode enables you to
visualize both allowed and disallowed traffic and fine-tune the policy before applying it.
Enforce Mode
Blocks all traffic that is not allowed by the policy.
You can switch a policy between these two modes as many times as you want.
Automated Enforcement
A policy uses categories to identify the VMs to which it must apply. This model allows the automatic enforcement
of a policy to VMs regardless of their number and network attributes. Connectivity between Prism Central and
a registered AHV cluster is required only when creating and modifying policies, or when changing the mode
of operation (applied or monitoring) of a policy. Policies are applied to the VMs in a cluster even if the cluster
temporarily loses network connectivity with the Prism Central instance with which it is registered. New policies and
changes are applied to the cluster when connectivity is restored.
• If the isolation environment policy is in the applied mode, it blocks all traffic to the application, including the
traffic that is allowed by the application security policy.
• If the isolation environment policy is in the monitoring mode, it allows all traffic to the application, including any
traffic that is disallowed by the application security policy.
• The feature is supported only on AHV clusters running AOS 5.6 or later and AHV version 20170830.115 or later.
• The Prism Central instance must be hosted on one of the AHV clusters registered with it. The AHV cluster that
hosts the Prism Central instance must be running AOS 5.6 or later.
• The host must have at least 1 GB of additional memory for each Prism Central VM hosted on it.
• If you are running a Prism Central scale-out instance, all the VMs in the Prism Central cluster must be powered
on.
• The AHV hosts must be allowed to communicate with the Prism Central VMs over TCP port 9446. Keeping the
port open enables the hosts to send the Prism Central VMs connection tracking data. Prism Central uses that data
to show network flows.
• Flow supports only TCP, UDP, or ICMP traffic.
Caution:
• When Flow is enabled, a Kafka container is automatically created on the cluster where Prism Central is
hosted. The container is used to store data that is required for flow visualization to work and must not be
deleted.
• Cross cluster live migration of guest VMs that are part of Flow security policy is not supported.
• Security Policies are not supported for VMs that are on the advanced networking stack. An alert is
raised for VMs that are part of both VPC and Flow policy, and Flow policies are not enforced for VMs
on VPCs.
• Overlapping or conflicting policy configuration is not supported and might cause unintended
interruption of network services.
Procedure
2. Click the collapse menu ("hamburger") button on the left of the main menu and then select Prism Central
Settings to display the Settings page.
4. To determine whether the registered clusters are capable of supporting microsegmentation, do the following:
a. Click View Cluster Capability, and then review the results of the capability checks that Prism Central
performed on the registered clusters.
b. Click Back.
6. Click OK.
Disabling Microsegmentation
Prism Central web console provides you the ability to disable the microsegmentation feature.
Procedure
2. Click the gear icon in the main menu and then select Microsegmentation in the Settings page.
Category Description
AppTier Add values for the tiers in your application (such
as web, application_logic, and database) to
this category and use the values to divide the
application into tiers when configuring a security
policy.
AppType Associate the VMs in your application with the
appropriate built-in application type such as
Exchange and Apache_Spark. You can also update
the category to add values for applications not listed
in this category.
Environment Add values for environments that you want to
isolate from each other and then associate VMs
with the values.
Quarantine Add a VM to this category when you want to
quarantine the VM. You cannot modify this
category. The category has the following values:
Strict
Use this value when you want to block all
inbound and outbound traffic.
Forensic
Use this value when you want to block all
inbound and outbound traffic except the
traffic to and from categories that contain
forensic tools.
Flow Network Security (formerly Flow Microsegmentation) | Built-in Categories for Security Policies | 11
SERVICES
Service is a group of protocol-port combination. You can use any of the default services or create a custom service.
The ability to use the service entities in the policy creation workflow reduces any manual configuration error and
enables reusability of available entities.
Creating a Service
About this task
To create a custom service, do the following.
Procedure
2. Click the collapse menu ("hamburger") button on the left of the main menu and go to Network & Security >
Security Policies > Services.
5. Select the Protocol from the drop-down menu and enter the port number or port range in the Port field.
You can add multiple protocol-port combinations in a single service. To add more protocol-port combination,
click Add Row and specify the required values.
Creating an Address
About this task
To create an Address, do the following.
Procedure
2. Click the collapse menu ("hamburger") button on the left of the main menu and go to Network & Security >
Security Policies > Addresses.
Procedure
2. Select Infrastructure application from the Application Switcher Function, and navigate to Network &
Security > Security Policies
The Security Policies page appears.
4. Click Update.
The Update Security Policy page appears.
5. Click Next.
• In the Inbounds > Discovered or Outbounds > Discovered section, hover over the traffic source and
click Allow Traffic.
Show Tiers: Shows a source trying to reach different AppTypes within an AppTier.
You can select more than one traffic source. If a required service is not present in the drop-down, you can create a
new service. See Creating a Service on page 12 for more information.
8. In the Review page, select a policy mode and click Confirm to complete updating the security policy.
• Create the categories you need and associate the VMs that you want to protect with those categories. You might
be required to create categories for the following purposes. Some categories or category values are required while
others are optional:
• Every security policy must be associated with a value in the AppType category, so make sure that you update
the AppType category with appropriate values if the built-in values do not work for you. For information about
this category and its values, see Category Details View in the Prism Central Infrastructure Guide.
• If you need to apply the policy to an application in a specific environment (for example, development, test, or
production) or an application at a specific location, create the category you need and apply it to the application.
Prism Central includes a built-in Environment category that you can use or update with values of your own.
You can also create your own categories.
• If you want to specify categories for traffic sources and destinations instead of allowing all inbound and
outbound traffic, create those categories and apply them to the traffic sources and destinations.
• If you want to divide the application into tiers in a security policy, add tiers to the AppTier category. The
AppTier category has a built-in default value, but you can update the category to add values of your choice.
For information about categories and their values, see Category Management in the Prism Central
Infrastructure Guide.
• Security policy configuration might require more time than the default session timeout allows you. You might
want to increase the session timeout so that you do not lose a configuration that is left unattended while you
perform associated tasks such as referring to this documentation. For more information, see Configuring Prism
Central UI Settings in the Prism Central Admin Center Guide.
Procedure
2. Select Infrastructure application from the Application Switcher Function, and navigate to Network &
Security > Security PoliciesThe Security Policies page appears.
3. In the Security Policies page, click Create Security Policy, and then click Secure an Application.
The Create App Security Policy page is displayed.
Flow Network Security (formerly Flow Microsegmentation) | Application Security Policy Configuration | 17
4. On the Define Policy tab, do the following in the indicated fields, and then click Next:
e. Optionally, in the Advanced Configuration section, select the Allow radio button to allow IPv6 traffic.
The policy rules apply to IPv4 traffic only and all IPv6 traffic is blocked by default.
Note: If you choose to block IPv6 traffic, the IPv6 traffic remains blocked even in the monitoring mode.
f. Optionally, click the toggle button against Policy Hit Logs to log traffic flow hits on the policy rules.
You can configure syslog monitoring for the policy hit logs for Flow. For details, see Configuring Syslog
Monitoring in the Prism Central Admin Center Guide.
Note: Policy hit logs are not generated if both source and destination are in inbound or outbound category.
5. In the Securing an App dialog box, review the schematic that illustrates the flow of traffic through a secured
app, and then click OK, Got it!
The Secure Application tab is displayed. The schematic on this tab can be divided into three areas of
configuration: the Inbound side, (for adding traffic source allowlist), the application at the center (for
Flow Network Security (formerly Flow Microsegmentation) | Application Security Policy Configuration | 18
configuring inbound, outbound, and tier-to-tier rules), and the Outbound side (for adding traffic destination
allowlist).
6. On the Secure Application tab, do the following, and then click Next:
a. On the application at the center of the tab, do the following in the indicated fields:
• If you want to divide the application into tiers (such as a web tier, an application tier, and a database tier)
and configure tier-to-tier rules, first configure the application as described in this step, and then configure
inbound and outbound rules. This approach ensures that the individual tiers are available when you want to
configure inbound and outbound rules at the tier level. Skip this step if you want to treat the application as
a single entity in the security policy.
To divide your application into tiers and create tier-to-tier rules, do the following:
1. On the application, click Set Rules on App Tiers, Instead.
Note: After you click Set Rules on App Tiers, Instead, the link text, Set rules on the whole
app, instead, is displayed in its place. Click Set rules on the whole app, instead if you want to
discard the tiered configuration and return to configuring rules on the application as a whole.
Note: When configuring tier-to-tier rules, two modes are made available to you through the buttons
Set Rules to & from App and Set Rules Within App. The Set Rules to & from App option
enables you to add application tiers and to specify allowed inbound and outbound traffic. The Set
Flow Network Security (formerly Flow Microsegmentation) | Application Security Policy Configuration | 19
Rules Within App option enables you to specify tier-to-tier rules within the application. These buttons
enable you to switch between the two modes.
5. Click each tier in the application and click Yes or No to specify whether or not you want to allow the
VMs in the tier to communicate with each other.
6. Configure a tier-to-tier rule as follows:
1. Click the source tier (for example, if the tiers are WebTier and AppTier and you want to configure a
tier-to-tier rule from WebTier to AppTier, click the source tier, WebTier).
2. Click the plus sign that is displayed on the destination tier (in this example, click the destination tier,
AppTier). The Create Tier to Tier Rule dialog box
3. Enter a description for the rule.
Note: The policy rule description is captured in the policy hitlog data.
4. In Service Details, click Allow all traffic to allow all types of traffic or click Select a service
to choose any default or custom service.
5. Click Save.
Configure tier-to-tier rules for as many source and destination tiers as you want.
b. To add traffic sources, on the Inbound side of the Secure Application tab, do the following:
• Category: Allows traffic only if that traffic originates from entities that are in the selected
category.
• Subnet/IP: Allows traffic only if that traffic originates from entities that are in the selected subnet.
• Addresses: Allows traffic only if the traffic originates from the entities that are in the selected
address.
2. Enter the value in the text box, and then click Add.
When entering the name of a category, a list of matching names is displayed, and you can select the
name you want to specify. The subnet mask must be specified in the CIDR format.
When entering the address, a list of available address group names appears. Select the address group or
you can create a new address group.
3. To add another category, subnet or address, click Add Source. Add as many another category, subnet
or address as you want to allow.
Each entry in this list represents a stream of inbound traffic.
c. To add traffic destinations, on the Outbound side, do the following:
Flow Network Security (formerly Flow Microsegmentation) | Application Security Policy Configuration | 20
• Allow All: Allows traffic to all destinations. This option is the default option.
• Allowed List Only: Allows traffic only if the traffic is destined for entities on the security policy's
destination allowlist. If this option is selected, you must also configure the destination allowlist by
clicking Add Destination.
• Click Add Destination, and then do the following:
1. Select one of the following options from the drop-down list:
• Category: Allows traffic only if that traffic is destined for entities in the selected category.
• Subnet/IP: Allows traffic only if that traffic is destined for entities in the selected subnet.
• Addresses: Allows traffic only if the traffic originates from the entities that are in the selected
address.
2. Enter the value in the text box and then click Add.
When entering the name of a category, a list of matching names is displayed, and you can select the
name you want to specify. The subnet mask must be specified in the CIDR format.
When entering the address, a list of available address group names appears. Select the address group or
you can create a new address group.
3. To add another category, subnet or address, click Add Destination. Add as many categories, subnets
or address as you want to allow.
Each entry in this list represents a stream of outbound traffic.
• To specify the protocols that you want to allow from each stream of inbound and outbound traffic, do the
following:
1. If you added application tiers and configured tier-to-tier rules, first click Set Rules to & from App.
2. Click the traffic source or traffic destination (a category or subnet if you have configured a allowlist or
All Sources if you have chosen to allow all sources) for which you want to create a rule.
3. Click the plus icon that appears on the application (if you are treating the application as a single entity)
or application tier (if you have divided the application into tiers). The Create Inbound Rule or
Create Outbound Rule dialog box appears.
4. Enter a description for the rule.
5. In Service Details, click Allow all traffic to allow all types of traffic or click Select a service to
choose any default or custom service.
6. Click Save.
After you configure a rule, a dotted line appears between the two endpoints of the rule. Point to the dotted line to
show the list of ports that the rule allows.
Flow Network Security (formerly Flow Microsegmentation) | Application Security Policy Configuration | 21
7. On the Review tab, review the security policy configuration, and then do one of the following:
• If you want to apply the configuration, select Enforce and click Apply.
Applying a security policy enforces the security policy on the application, and traffic from entities that are not
defined as sources in the policy is blocked.
• If you want to save the configuration and monitor how the security policy works, select Monitor and click
Save and Monitor.
When a policy is in the monitoring state, the application continues to receive all traffic, but disallowed traffic
is highlighted on the monitoring page. Traffic is not blocked until the policy is enforced.
Note: A policy that you have chosen to save and monitor can be applied from the policy update page.
Figure 5: Review
Procedure
1. In the Security Policies page, select the policy that you want to modify, click Actions, and then click Update.
2. Make the changes you want and then apply or save and monitor the policy.
The update options are the same as those for creating a policy. For information about the options, see Creating an
Application Security Policy on page 17.
Flow Network Security (formerly Flow Microsegmentation) | Application Security Policy Configuration | 22
Procedure
1. In the Security Policies page, select the policy that you want to apply, click Actions, and then click Apply.
2. Confirm by typing Apply in the dialog box, and then click OK.
Procedure
1. In the Security Policies page, select the policy that you want to monitor, click Actions, and then click
Monitor.
2. Confirm by typing Monitor in the dialog box, and then click OK.
Allowed network flows and disallowed network flows are shown on the monitoring page, as shown in the
following figure. Allowed flows are depicted with a blue dotted line and disallowed network flows are depicted
with a red dotted line:
Flow Network Security (formerly Flow Microsegmentation) | Application Security Policy Configuration | 23
3. To show a preview of the network flow in a tooltip, pause over the dotted line that depicts the network flow in the
diagram.
A tooltip similar to the following is displayed. The tooltip shows a graph for each connection:
4. To see a graph of a network flow, click the dotted line that depicts the network flow in the visualization.
A more detailed graph of the network flows is displayed, as shown in the following figure:
5. To block unwanted flows, click Update, and then update the policy. For information about updating an
application security policy, see Modifying an Application Security Policy on page 22.
Flow Network Security (formerly Flow Microsegmentation) | Application Security Policy Configuration | 24
Procedure
1. In the Security Policies page, select the policy that you want to delete.
You can select multiple policies and delete them all at once.
Flow Network Security (formerly Flow Microsegmentation) | Application Security Policy Configuration | 25
ISOLATION ENVIRONMENT POLICY
CONFIGURATION
An isolation environment identifies two groups of VMs by category, and it blocks communications between the
groups.
You can also specify an additional category to restrict the scope of the isolation environment to that category.
For example, consider that you have an application category with values app1 and app2 and that you have
associated some VMs with application: app1 and some VMs with application: app2. Also, consider that
these same VMs are distributed between two sites, and have accordingly been associated with values site1 and site2 in
a category named location (location: site1 and location: site2).
In this example, you might want to block communications between the VMs in the two locations. Additionally, you
might want to restrict the scope of the policy to VMs in category application: app1. In other words, app1 VMs
in site1 cannot communicate with app1 VMs in site2. The following diagram illustrates the desired outcome. The
red connectors illustrate blocked traffic. The green connectors illustrate allowed traffic.
You can configure an isolation policy for this by creating the following categories and isolation policy in Prism
Central:
Entity Values
Categories
• Name: application
• Values: app1 and app2
• Name: location
• Values: site1 and site2
Flow Network Security (formerly Flow Microsegmentation) | Isolation Environment Policy Configuration | 26
Entity Values
Isolation Policy
• Name: eng_isolation_policy_across_sites
• Description: Isolate engineering VMs across sites
• Isolate This Category: location: site1
• From This Category: location: site2
• Apply the isolation only within a subset of
the data center: application: app1
Layer 2 Isolation
Flow supports Layer 2 isolation to enable filtering of the layer 2 packets across all isolated entities. When an isolation
policy is applied between two category-based VM groups, all ingress and egress traffic (broadcast, unknown-unicast,
and multicast traffic) is dropped at the destination VM group.
Note:
• If VMs are part of both isolation policy and quarantine policy, the quarantine policy takes priority of
processing over the isolation policy. For example, if VMs with category app1 are isolated from VMs
with category app2 using an isolation policy, the traffic between these VM groups are not dropped if the
VM groups are also part of a quarantine forensic policy that allows communication between these VMs.
In this case, since the quarantine forensics policy matches the VMs, and this policy allows the traffic,
the isolation policy is not enforced.
• IPv6 traffic between isolated VMs is blocked by default with the introduction of layer 2 isolation.
Procedure
2. Select Infrastructure application from the Application Switcher Function, and navigate to Network &
Security > Security PoliciesThe Security Policies page appears.
Flow Network Security (formerly Flow Microsegmentation) | Isolation Environment Policy Configuration | 27
3. In the Security Policies page, click Create Security Policy, and then click Isolate Environments.
The Create Isolation Policy page appears.
Note: Policy hit logs are not generated if both source and destination are in inbound or outbound category.
Flow Network Security (formerly Flow Microsegmentation) | Isolation Environment Policy Configuration | 28
5. Do one of the following:
Procedure
1. In the Security Policies page, select the isolation policy that you want to modify, click Actions, and then click
Update.
2. Make the changes you want and then apply or save and monitor the policy.
The update options are the same as those for creating a policy. For information about the options, see Creating an
Isolation Environment Policy on page 27.
Note: Changing the state of an isolation environment policy affects the functioning of any conflicting application
security policies. For more information, see Priorities Between Policies on page 8.
Procedure
1. In the Security Policies page, select the policy, click Actions, and then click Apply.
2. Confirm by typing Apply in the dialog box, and then click OK.
Note: Changing the state of an isolation environment policy affects the functioning of any conflicting application
security policies. For more information, see Priorities Between Policies on page 8.
Flow Network Security (formerly Flow Microsegmentation) | Isolation Environment Policy Configuration | 29
Procedure
1. In the Security Policies page, select the policy, click Actions, and then click Monitor.
2. Confirm by typing Monitor in the dialog box, and then click OK.
The monitoring page shows the flows between the two categories.
3. To view information about a particular network flow, pause over the flow.
A tooltip similar to the following is displayed:
Procedure
Flow Network Security (formerly Flow Microsegmentation) | Isolation Environment Policy Configuration | 30
QUARANTINE POLICY CONFIGURATION
Prism Central includes a system-defined quarantine policy that enables you to perform the following tasks:
• Completely isolate an infected VM that must not have any traffic associated with it.
• Isolate an infected VM but specify a set of forensic tools that can communicate with the VM.
For these use cases, Prism Central includes built-in categories that are included in the system-defined quarantine
policy.
Note: You cannot create a quarantine policy. However, you can modify existing (system-defined) quarantine policy.
Prism Central also enables you to monitor the quarantine policy before applying it.
The quarantine policy cannot be deleted.
Procedure
2. Select Infrastructure application from the Application Switcher Function, and navigate to Network &
Security > Security PoliciesThe Security Policies page appears.
3. In the Security Policies page, select Quarantine, and then click Update in the Actions menu.
4. Optionally, in the Advanced Configuration under the Define Policy tab, do the following.
a. Select the Allow radio button to allow IPv6 traffic. The policy rules apply to IPv4 traffic only and all IPv6
traffic is blocked by default. You can configure the allow option for both Forensic and Strict modes.
b. Optionally, click the toggle button against Policy Hit Logs to log traffic flow hits on the policy rules.
You can configure syslog monitoring for the policy hit logs for Flow. For details, see Configuring Syslog
Monitoring in the Prism Central Admin Center Guide . You can enable the policy hit log option for both
Forensic and Strict modes.
Note: Policy hit logs are not generated if both source and destination are in inbound or outbound category.
a. To specify the categories that contain forensic tools, on the Inbound and Outbound sides of the policy
diagram, do the following:
• 1. On the Inbound and Outbound sides of the policy diagram, click a category or subnet (if you have
configured a allowed list) or All Sources (if you have chosen to allow all sources) for which you want
to create a rule.
2. Click the plus icon that appears on the Quarantine: Forensic category. The Create Inbound Rule
or Create Outbound Rule dialog box
3. Enter a description for the rule.
Note: The policy rule description is captured in the policy hitlog data.
4. In Service Details, click Allow all traffic to allow all types of traffic or click Select a service to
choose any default or custom service.
5. Click Save.
After you configure a rule, a dotted line appears between the two endpoints of the rule. Point to the dotted line to
show the list of ports that the rule allows.
Quarantining a VM
You quarantine a VM by adding the VM to a quarantine category.
Procedure
1. In the VMs dashboard List tab (see VMs Summary View in the Prism Central Infrastructure Guide), select the
infected VM, click Actions, and then click Quarantine VMs.
» Strict. Isolates the VM from all traffic. No exceptions can be made for forensics.
» Forensic. Isolates the VM from all traffic except traffic from categories specified in the built-in quarantine
policy. The allowed categories contain forensic tools that enable you to perform forensics on the VM.
For VMs added to the strict quarantine, a red icon is displayed in the name column.
3. Click Quarantine.
Procedure
1. In the VMs dashboard List tab (see VMs Summary View in the Prism Central Infrastructure Guide), select the
VM that you want to remove from the quarantine, click Actions, and then click Unquarantine VMs.
You can select multiple VMs and remove them from the quarantine in a single step.
ID Based Security
ID firewall is an extension to Flow that allows you to write security policies based on users and groups in an Active
Directory domain in which your VDI VMs are attached. When using ID firewall, you can import groups from Active
Directory into Prism Central as categories (in the category key ADGroup), and then write policies around these
categories, just as you would for any other category. A new type of policy has been added for this purpose - the VDI
Policy. ID firewall takes care of automatically placing VDI VMs in the appropriate categories on detecting user
logons into the VM hosted on Nutanix infrastructure associated with Prism Central, thus allowing user and group
based enforcement of Flow policies.
• See Configuring Active Directory Domain Services on page 38 to import user groups for identity-based
security policies.
• See Creating a VDI Policy on page 34 to create a VDI policy.
• See Default VDI Policy on page 38 configuration to define a default VDI policy.
Note:
• It is recommended to disable credential caching on VDI VMs for Flow ID Firewall. The Flow ID
Firewall checks the domain controller events for logon attempts. If the VM connection to the domain
controller is not available, a user is able to logon (if credential caching enabled) but no event is
generated on the domain controller inhibiting the ID Firewall to detect the logon.
• To disable credential caching, see Interactive logon: Number of previous logons to cache (in case
domain controller is not available) on Microsoft documentation website.
• A basic assumption of VDI Policies is that a single end-user is logged on to each desktop VM at a point
in time. As a result, if multiple users log into a single desktop VM at once, the security posture of the
VM may change in unpredictable ways. Please ensure that for predictable behavior, only one user is
logged into the desktop VMs at a time.
Note:
• Flow Network Security does not support LDAPS encrypted connections on port 636. Therefore, to use
VDI policies, configure an unencrypted port 389 for LDAP connection.
• Flow ID firewall is supported only for AHV host compatible with AOS version 5.17 and above and
Prism Central version 5.17 and above.
• If not already available, configure an Active Directory domain that is used for ID firewall, see Configuring
Active Directory Domain Services on page 38.
• Configure a service account with required configuration for the Active Directory domain, see Configure Service
Account for ID Firewall on page 39.
Procedure
2. Select Infrastructure application from the Application Switcher Function, and navigate to Network &
Security > Security PoliciesThe Security Policies page appears.
3. In the Security Policies page, click Create Security Policy. Select Secure VDI Groups (VDI Policy) and
click Create.
You can create only one VDI policy for securing applications through ID Firewall.
The Define Policy page is displayed.
You can use the VDI VM Filter for the following scenarios.
• Include VMs by name - Select Include VMs by name and enter the matching criteria in the VM
Name Contains field. Select the Assign matching VMs to an optional default category
(ADGroup:Default) check-box to apply a default posture to the VMs, see Default VDI Policy on
page 38 for details. Optionally, select the Keep the default category upon user logon check-box to
preserve the default category even after user logon.
Note:
• Assign ADGroup categories only when the VM matches the filter criteria, otherwise ADGroups
apply to all VMs where a logon is detected.
• VMs with an AppType category assigned is never categorized with an ADGroup.
• While updating the VDI policy, if inclusion criteria is changed to exclude and then re-include
previously included VMs (that were previously logged on and categorized), upon re-inclusion the
• Include all VMs - Select Include all VMs to include all the VMs in the AD group in the policy. Note that
non-VDI VMs will also be included in the policy if Include all VMs option is selected.
a. Optionally, in the Advanced Configuration section, select the Allow option to allow IPv6 traffic. The
policy rules apply to IPv4 traffic only and all IPv6 traffic is blocked by default.
Note: If you choose to block IPv6 traffic, the IPv6 traffic remains blocked even in the monitoring mode.
b. Optionally, turn on the Policy Hit Logs option to log traffic flow hits on the policy rules.
You can configure syslog monitoring for the policy hit logs for Flow. For details, see Configuring Syslog
Monitoring in the Prism Central Admin Central Guide.
Note: Policy hit logs are not generated if both source and destination are in inbound or outbound category.
5. In the Secure AD Groups tab, do the following in the indicated fields and click Next.
a. For Inbound Traffic, click + Add Source and enter the category or subnets that the VDI group can receive
the traffic from, as the source.
b. For each VDI ADGroup, click +Add AD Group to select the AD groups (categorized VDI VMs) that you
want to secure. You can click Import all AD Groups to add all imported ADGroup categories to the VDI
policy.
c. For Outbound Traffic, click + Add Destination and enter the category or subnets that the VDI group can
send the traffic to, as the destination.\
Note: If you have not used the default VDI option in Step 2b, ensure that you add all of your Active Directory
domain controllers as part of this step, using either categories or subnets, for each ADGroup.
• To ensure that a VDI VM is secure even before a user logs on to the VDI VM.
• To enable access to common network resources without the need to add the resources to every tier of a VDI
policy.
You can define a default VDI policy at the time of creating a new VDI policy, or by updating any existing VDI
policy. See Step 2b of the VDI Policy Configuration topic for details.
• Microsegmentation must be enabled to be able to use the ID Firewall feature. For more information, see Enabling
Microsegmentation on page 10.
• You must allow WMI access from Prism Central to all the Active Directory Domain Controllers in your network
firewall and Active Directory firewall.
• Active Directory Requirements:
• Minimum supported domain functional level in Active Directory is Windows Server 2008 R2.
• ID Firewall checks the membership of Security Groups only, Distribution Groups are not supported.
• NTP must be configured on Active Directory and Prism Central.
• DNS must be configured on Prism Central if you want to use host name for domain controllers.
Procedure
2. Click the collapse menu ("hamburger") button on the left of the main menu and then select Prism Central
Settings to display the Settings page.
3. Click ID Based Security from the Settings menu (on the left).
The ID Based Security page is displayed. This page allows you to Add New Domain or use an Existing AD.
a. Click the Manually Add Domain Controller button, then click + Domain Controller.
b. Enter the IP Address or Host Name of the domain controllers that you want to monitor for user logons
events. You must add all the domain controllers associated with your Active Directory manually.
Click + and add each domain controller individually, then click the blue check mark icon to save.
Note: DNS must be configured on Prism Central for the host name option to work.
5. If you select Add New Domain in step 3, a set of fields is displayed. Do the following in the indicated fields:
Caution: Do not use the Domain Admin account as the service account considering the security best practices.
Create a new domain user and grant it required permissions as described in Configure Service Account for
ID Firewall on page 39.
A service account is a special user account that an application or service uses to interact with the Active
Directory. Enter your Active Directory service account credentials in this (username) and the following
(password) field.
Note: Ensure that you update the service account credentials here whenever the service account password
changes or when a different service account is used.
6. Select Add Inclusion Criteria under Manage the VM Inclusion Criteria to specify which VMs are assigned
to AD Group categories upon user logon based on VM name.
Note: It is recommend that users add inclusion criteria if at all possible to prevent any unintended categorizations.
Note: The VMs with AppType category assigned cannot be categorized by ID Based Security.
Procedure
1. In the Security Policies page, select the policy, click Actions, and then click Update.
2. Make the changes you want and then apply or save and monitor the policy.
The update options are the same as those for creating a policy. For information about the options, see Creating a
VDI Policy on page 34.
Procedure
1. In the Security Policiespage, select the policy, click Actions, and then click Apply.
2. Confirm by typing Apply in the dialog box, and then click OK.
Procedure
1. In the Security Policiespage, select the policy, click Actions, and then click Monitor.
2. Confirm by typing Monitor in the dialog box, and then click OK.
Procedure
Procedure
2. Click the collapse menu ("hamburger") button on the left of the main menu and go to Policies > Security. The
Policies page is displayed.
3. Click any policy to view the inbound, application, and outbound configuration.
Flow Network Security (formerly Flow Microsegmentation) | Applying Filtering and Grouping to a Security
Policy | 42
4. To view specific rule properties, do one of the following.
» In the Search box, search for the required string using the default All filter.
» Click the filter drop-down menu to search the policy based on any of the following filter types.
Category
search category name and value
Address
search address and subnet IP address
Subnet IP
search subnet IP address
Service
search service name
Rule Description
search rule description
Ports (TCP/UDP)
search TCP/UDP ports and services
ICMP
search ICMP ports and services
Flow Network Security (formerly Flow Microsegmentation) | Applying Filtering and Grouping to a Security
Policy | 43
Figure 14: Filtering Policies
Flow Network Security (formerly Flow Microsegmentation) | Applying Filtering and Grouping to a Security
Policy | 44
5. To group related rule entities together, click the group icon.
The group option organizes related rule attributes like subnet IP, categories, and service in distinct boxes. Also,
the connection flows for all the entities in a group are displayed as a single connection flow. To view all the
entities belonging to a group, click the down-arrow icon to expand the group.
Flow Network Security (formerly Flow Microsegmentation) | Applying Filtering and Grouping to a Security
Policy | 45
EXPORTING AND IMPORTING SECURITY
POLICIES
Prism Central allows you to export and import security policies for the following security administration aspects.
• Have a snapshot of a working security configuration so that system can be restored to the desired state when
needed.
• Ability to apply security policies as templates. This scenario is useful in ROBO environments (disaster recovery
deployments) where the datacenters are being managed by multiple Prism Central instances.
Note: For VDI policy, the inclusion criteria and default VDI category settings are not included in the export process.
You must set these manually after an import if required.
Note: Existing policies are overridden with new policies. Policies that are not part of this import are deleted.
Flow Network Security (formerly Flow Microsegmentation) | Exporting and Importing Security Policies | 46
COPYRIGHT
Copyright 2024 Nutanix, Inc.
Nutanix, Inc.
1740 Technology Drive, Suite 150
San Jose, CA 95110
All rights reserved. This product is protected by U.S. and international copyright and intellectual property
laws. Nutanix and the Nutanix logo are registered trademarks of Nutanix, Inc. in the United States and/or other
jurisdictions. All other brand and product names mentioned herein are for identification purposes only and may be
trademarks of their respective holders.