dave330i wrote: » Local firewall w/out central management doesn't scale.
iBrokeIT wrote: » If you can't implement private vlans or have ISE, why not make use of the host based firewall to prevent lateral movement from your users? Also put your admins on their own vlan and block administrative access to the server vlans from the user vlan.
dave330i wrote: » NSX micro-Segmentation.
MitM wrote: » I was thinking of using windows firewall, since that's the only host based firewall I have. Easy enough to manage through group policy. If I did have ISE, would it be beneficial to utilize it instead of host based fw? I do have some cisco jabber users that use the client on windows OS. I'm no voice guy, but I believe I'd have to poke some holes for that communication
iBrokeIT wrote: » Neither does $5k per socket for NSX for most people's budgets. Also NSX doesn't address lateral movement between client machines.
gespenstern wrote: » I'm architecting a project that is currently being rolled out... For >1 year and is expected to last for ~2 more years. Very, very problematic.
dave330i wrote: » A single Distributed Firewall rule can block all layer 2 communications, so unless OP's workload is all physical, it will work. Layer 2 segmentation is 1 of the major use case for NSX.
MitM wrote: » Yes, all physical. I’m referring to preventing lateral movement between end user client machines. For servers, it would be nsx in the future
MitM wrote: » What exactly is problematic? Do you mind giving details?
gespenstern wrote: » Then, no matter how hard you work at identifying the major communication flows, on day X when you cut off a branch or a certain type of traffic, there will be some obscure communication path that everyone forgot about and that happens once a month or so and yet business-critical. So critical that you wake up to calls at night when you least expect it from your bosses bosses boss who in no ambiguous terms commands you to revert the changes that were happily in place by that moment for 3.5 weeks. Eventually you become the most hated person in the whole company and for what? I tell you, this network segmentation thing is probably the worst project I've been to in my whole life. PS That all said, it's doable. The only thing I'm not sure about is if it's worth the effort... I.e. if an annualized risk of NotPetya ruining everything is 0.01% (once in 5 years, 1 out of 2000 huge world companies) then it might not meet the cost/benefit analysis
gespenstern wrote: » Another problem is "noboby knows anything". Imagine a huge network spanning the whole damn world that was historically flat or close to that. Not a single application owner was able to provide a concise and precise list of communication channels their app utilizes. They don't know it and they don't care (until you break their application, then the CISO has a hard time justifying the need to get this project completed).
fitzlopez wrote: » PS. With NotPetya and such we announced that we were going to disable SMBv1 and that we were going to block the needed ports from the extranet to the intranet, then followed up. Patched all servers for the SMB exploits and started other cleaning up measures. It was horrible, getting someone to fix anything is a pain that's why you have to start right.