User Guide for JUNIPER NETWORKS models including: cSRX Container Firewall as Contrail HostBased Firewall, cSRX, Container Firewall as Contrail HostBased Firewall, Firewall as Contrail HostBased Firewall, Contrail HostBased Firewall, HostBased Firewall, Firewall

cSRX Container Firewall as Contrail Host-Based Firewall User Guide


File Info : application/pdf, 22 Pages, 452.83KB

PDF preview unavailable. Download the PDF instead.

csrx-contrail-vrouter
cSRX Container Firewall as Contrail HostBased Firewall User Guide
Published
2023-06-19

ii
Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net
Juniper Networks, the Juniper Networks logo, Juniper, and Junos are registered trademarks of Juniper Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered marks, or registered service marks are the property of their respective owners.
Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice.
cSRX Container Firewall as Contrail Host-Based Firewall User Guide Copyright © 2023 Juniper Networks, Inc. All rights reserved.
The information in this document is current as of the date on the title page.
YEAR 2000 NOTICE
Juniper Networks hardware and software products are Year 2000 compliant. Junos OS has no known time-related limitations through the year 2038. However, the NTP application is known to have some difficulty in the year 2036.
END USER LICENSE AGREEMENT
The Juniper Networks product that is the subject of this technical documentation consists of (or is intended for use with) Juniper Networks software. Use of such software is subject to the terms and conditions of the End User License Agreement ("EULA") posted at https://support.juniper.net/support/eula/. By downloading, installing or using such software, you agree to the terms and conditions of that EULA.

iii

Table of Contents

About This Guide | iv

1

Introduction

Understanding cSRX Container Firewall on Contrail Host-Based Firewall | 2

Junos OS Features Supported in cSRX Container Firewall for Contrail HBF | 9

2

Integrating cSRX Container Firewall into a Contrail Networking

Requirements for Deploying cSRX Container Firewall Container on Contrail vRouter | 13

cSRX Container Firewall Virtual Security Solution on Contrail vRouter | 15

Deploying a cSRX Container Firewall POD with Kubernetes | 15

3

Managing cSRX Container Firewall

Debugging and Managing cSRX Container Firewall | 17

Stop a cSRX Container Firewall POD | 17

Verify Network Name | 17

Verify Logs | 18

iv
About This Guide
Use this guide to install the containerized security gateway application on Contrail vRouter.

1 CHAPTER
Introduction
Understanding cSRX Container Firewall on Contrail Host-Based Firewall | 2 Junos OS Features Supported in cSRX Container Firewall for Contrail HBF | 9

2
Understanding cSRX Container Firewall on Contrail Host-Based Firewall
IN THIS SECTION cSRX Container Firewall Overview | 2 cSRX Container Firewall Deployment Modes | 5 Licensing | 8 cSRX Container Firewall Benefits and Uses | 8
Containerized SRX (cSRX Container Firewall) is a virtual security solution, which is integrated into a Contrail networking as distributed host-based firewall (HBF) service. cSRX Container Firewall is built based on Docker container to deliver agile, elastic, and cost-saving security services. The cSRX Container Firewall Container Firewall is a containerized version of the SRX Series Services Gateway with a low-memory footprint. cSRX Container Firewall provides advanced security services, including content security, AppSecure, and Content Security in a container.
cSRX Container Firewall Overview
The cSRX Container Firewall Container Firewall deploys as a single container on a Docker Engine compute node running in a Contrail cluster. It runs on a Linux bare-metal server as the hosting platform for the Docker container environment. The cSRX Container Firewall container packages all the dependent processes (or daemons) and libraries to support the different Linux host distribution methods (Ubuntu, Red Hat Enterprise Linux, or CentOS). When the cSRX Container Firewall container runs, there are several processes (or daemons) inside the Docker container that launch automatically when cSRX Container Firewall becomes active. Some daemons support Linux features, providing the same service as if they are running on a Linux host (for example, sshd, rsyslogd, and monit). Other daemons are compiled and ported from Junos OS to perform configuration and control jobs for security service (for example, MGD, NSD, Content Security, IDP, and AppID). srxpfe is the data plane daemon that receives and sends packets from the revenue ports of a cSRX Container Firewall container. cSRX Container Firewall uses srxpfe for Layer 2 through 3 forwarding functions as well as for Layer 4 through 7 network security services.

3 The distributed software security solution is built on top of Contrail Networking using Contrail Controller and Contrail vRouter to prevent threats in a customer's multi-cloud environment. When cSRX Container Firewall acts as distributed firewall service on Contrail, Kubernetes is used to orchestrate cSRX Container Firewall instances on compute nodes. The Kubernetes API server can respond to Contrail Controller after HBF policies are configured on the Contrail user interface. A cSRX Container Firewall image is pulled from the Docker registry to compute nodes after the instances are provisioned. Figure 1: cSRX Container Firewall on Contrail Host-Based Firewall
Contrail Security includes an integrated virtual router (vRouter) that acts as a distributed element on every host where cSRX Container Firewall application is created. The vRouter enforces security at Layers 4­7 by monitoring traffic flows and redirecting suspicious traffic to next-generation firewalls. After provisioning the cSRX Container Firewall instances: · Three VIFs connect the cSRX Container Firewall instance to vRouter.
· The Management interface is connected to the management virtual network. · Two secure data interfaces are connected to the left and right virtual networks, receiving packets
steered from vRouter and sending packets to vRouter after security check.

4
· Security Director updates L7 security policies and dynamic addresses to cSRX Container Firewall instances.
· cSRX Container Firewall instances send security logs to Security Director.
· Each tenant that needs HBF service will start a private cSRX Container Firewall instance on the compute node.
With Contrail Security, you can define policies and automatically distribute them across all deployments. You can also monitor and troubleshoot traffic flows inside each cSRX Container Firewall instance and across cSRX Container Firewall instances.
In Contrail HBF, the cSRX Container Firewall Container Firewall is supported only in secure-wire mode and enables advanced security at the network edge in a multitenant virtualized environment. cSRX Container Firewall provides Layer 4 through 7 advanced security features such as firewall, IPS, and AppSecure. The cSRX Container Firewall container also provides an additional interface to manage cSRX Container Firewall. When cSRX Container Firewall is operating in Layer 2 mode, incoming Layer 2 frames from one interface go through Layer 4 through 7 processing based on the configured cSRX Container Firewall services. cSRX Container Firewall then sends the frames out of the other interface. The cSRX Container Firewall container either allows the frames to pass through unaltered or drops the frames, based on the configured security policies.
Figure 2 on page 5 illustrates the cSRX Container Firewall operating in secure-wire mode.

5 Figure 2: cSRX Container Firewall in Secure-Wire Mode
cSRX Container Firewall Deployment Modes
Secure Traffic Inside Compute Node When cSRX Container Firewall is securing traffic inside a compute node, vRouter will steer all traffic to cSRX Container Firewall which match HBF filter. Flow sessions are created for the traffic sent from vRouter to cSRX Container Firewall. After L7 security check in cSRX Container Firewall, traffic is sent back to vRouter and forwarded to the destination as shown in Figure 3 on page 6.

6 Figure 3: Secure Traffic Inside Compute Node
· cSRX Container Firewall works in bump-in-the-wire mode with two data interfaces connected to vRouter
· vRouter filter traffic to cSRX Container Firewall VIF which needs L4-7 security check · After L4-7 security check, traffic is sent back to vRouter Secure Traffic Cross Compute Nodes cSRX Container Firewall works the same as when it is securing the traffic inside the compute node. The difference is, vRouter needs to guarantee that traffic is steered to same cSRX Container Firewall instance when traffic is crossing different compute nodes, so cSRX Container Firewall flow sessions are created and matched in same cSRX Container Firewall instance on both directions.

7 Figure 4: Secure Traffic Cross Compute Nodes
Multitenant Support For supporting multitenancy, there is separate cSRX Container Firewall instance started for each tenant on same compute node. Figure 5 on page 8 shows the multitenancy support.

8 Figure 5: Multitenancy Support
Licensing
The cSRX Container Firewall Container Firewall software features require a license to activate the feature. To understand more about cSRX Container Firewall Container Firewall licenses, see cSRX Flex Software Subscription Model.
cSRX Container Firewall Benefits and Uses
The cSRX Container Firewall Container Firewall enables you to quickly introduce new firewall services, deliver customized services to customers, and scale security services based on dynamic needs. The cSRX Container Firewall container differs from VMs in several important ways. It runs with no guest OS overhead, has a notably smaller footprint, and is easier to migrate or download. The cSRX Container Firewall container uses less memory, and its spin-up time measures in subseconds--all leading to higher density at a lower cost. The boot time is reduced from several minutes with a VM-based environment to less than a few seconds for the cSRX Container Firewall container. cSRX Container Firewall is ideal for public, private, and hybrid cloud environments. The virtual solution provides the following capabilities: · Layer 7 security services such as firewall, intrusion prevention system (IPS), and AppSecure

9
· Automated service provisioning and orchestration · Distributed and multitenant traffic securing · Centralized management with Junos Space Security Director, including dynamic policy/address
update, remote log collections, and security events monitoring · Scalable security services with small footprints You can deploy the cSRX Container Firewall Container Firewall in the following scenario: · Contrail microsegmentation­Within a Contrail environment running mixed workloads of VMs and
containers, cSRX Container Firewall can provide security for Layer 4 through 7 traffic, managed by Security Director.

Junos OS Features Supported in cSRX Container Firewall for Contrail HBF

cSRX Container Firewall provides Layer 4 through 7 secure services for a Contrail HBF in a containerized environment.Table 1 on page 9 provides a high-level summary of the security features supported on cSRX Container Firewall.
To determine the Junos OS features supported on cSRX Container Firewall, use the Juniper Networks Feature Explorer, a Web-based application that helps you to explore and compare Junos OS feature information to find the right software release and hardware platform for your network. See Feature Explorer.
Table 1: Security Features Supported on cSRX Container Firewall HBF

Security Features

Considerations

Application Tracking (AppTrack)

Understanding AppTrack

Application Firewall (AppFW)

Application Firewall Overview

Application Identification (AppID)

Understanding Application Identification Techniques

Basic Firewall Policy

Understanding Security Basics

10

Table 1: Security Features Supported on cSRX Container Firewall HBF (Continued)

Security Features

Considerations

Brute force attack mitigation

DoS/DDoS protection

DoS Attack Overview DoS Attack Overview

Intrusion Prevention System (IPS)

For SRX Series IPS configuration details, see:
Understanding Intrusion Detection and Prevention for SRX Series

IPv4

Understanding IPv4 Addressing

Interfaces

Supports two revenue (ge) interfaces. Out-of-band management Interface (eth0 In-band interfaces (ge-0/0/0 to ge-0/0/1)

Jumbo Frames

Understanding Jumbo Frames Support for Ethernet Interfaces

SYN cookie protection

Understanding SYN Cookie Protection

Malformed packet protection

Routing

Supports secure-wire mode forwarding only.

11

Table 1: Security Features Supported on cSRX Container Firewall HBF (Continued)

Security Features

Considerations

Content Security

Includes support for all Content Security functionality on the cSRX Container Firewall platform, such as: · Antispam · Sophos Antivirus · Web filtering · Content filtering For SRX Series Content Security configuration details, see: Unified Threat Management Overview For SRX Series Content Security antispam configuration details, see: Antispam Filtering Overview

User Firewall

Includes support for all user firewall functionality on the cSRX Container Firewall platform, such as: · Policy enforcement with matching source identity criteria · Logging with source identity information · Integrated user firewall with active directory · Local authentication For SRX Series user firewall configuration details, see: Overview of Integrated User Firewall

Zones and Zone based IP spoofing

Understanding IP Spoofing

2 CHAPTER
Integrating cSRX Container Firewall into a Contrail Networking
Requirements for Deploying cSRX Container Firewall Container on Contrail vRouter | 13 cSRX Container Firewall Virtual Security Solution on Contrail vRouter | 15

13
Requirements for Deploying cSRX Container Firewall Container on Contrail vRouter
IN THIS SECTION Contrail Requirements | 13 cSRX Container Firewall Container Interfaces | 14 cSRX Container Firewall Basic Configuration Settings | 14

This topic discusses the requirements for integrating cSRX Container Firewall into Contrail cluster.

Contrail Requirements

Table 2 on page 13 lists the supported platforms and server requirements. Table 2: Supported Platforms and Server Requirements

Component

Specification

Release

Contrail Networking

2005

Ubuntu

14.04 and newer

CentOS

6.5 and newer

Redhat

7.0 and newer

vCPU

2 CPU cores

Memory

8 GB

14

Table 2: Supported Platforms and Server Requirements (Continued)

Component

Specification

Release

Disk space

40 GB

Network Interfaces

2 Revenue Interfaces

cSRX Container Firewall Container Interfaces

Table 3 on page 14 lists the cSRX Container Firewall container interfaces. Table 3: cSRX Container Firewall Container Interfaces

Interfaces

Purpose

Created By

eth0

Management Interface

Orchestrator

eth1

ge-0/0/0

Orchestrator

eth2

ge-0/0/1

Orchestrator

lo

Loopback

Docker Engine

cSRX Container Firewall Basic Configuration Settings
The cSRX Container Firewall container requires the following basic configuration settings: · Interfaces must be bound to security zones. · Policies must be configured between zones to permit or deny traffic.

15
cSRX Container Firewall Virtual Security Solution on Contrail vRouter
IN THIS SECTION Deploying a cSRX Container Firewall POD with Kubernetes | 15
Before you deploy the cSRX Container Firewall Container Firewall as an advanced security service in the Contrail Networking cloud environment, ensure that you: · Review "Requirements for Deploying cSRX Container Firewall Container on Contrail vRouter" on
page 13 for deploying a cSRX Container Firewall container in a compute node.
Deploying a cSRX Container Firewall POD with Kubernetes
Kubernetes is enhanced to support multiple interfaces all supported by a single Contrail Container Network Interface (CNI) (Network Provider). The cSRX Container Firewall container can be orchestrated on compute nodes and attached to multiple virtual networks. For a single cSRX Container Firewall container, those virtual networks are either attached for management purposes or used to collect traffic from vRouter. A cSRX Container Firewall POD can be deployed with a YAML template in Kubernetes. To deploy a cSRX Container Firewall POD, see Host-Based Firewalls on a compute node.

3 CHAPTER
Managing cSRX Container Firewall
Debugging and Managing cSRX Container Firewall | 17

17
Debugging and Managing cSRX Container Firewall
IN THIS SECTION Stop a cSRX Container Firewall POD | 17 Verify Network Name | 17 Verify Logs | 18
Stop a cSRX Container Firewall POD
By default, cSRX Container Firewall will not mount any external volumes from compute node. When a new cSRX Container Firewall instance is started, it will synchronize configuration from Security Director. Any syslog and security logs will be posted to Security Director as well. So cSRX Container Firewall POD can be stopped and destroyed directly by Contrail Service Orchestration (CSO). To stop the cSRX Container Firewall POD: · Run the Docker command to stop cSRX Container Firewall.
# kubectl delete -f <csrx-yaml-file> After the cSRX Container Firewall POD is stopped and destroyed, compute and storage resources of this cSRX Container Firewall POD are released. # kubectl delete -f <csrx-yaml-file>
Verify Network Name
To verify the network name: Run the following command to check the network name: # kubectl get network-attachment-definitions -n

18
Verify Logs
To view and verify logs: 1. Run the following command to access the path for log details:
# cat /var/log/contrail/ 2. Run the following command to view the logs:
# kubectl describe pods -n



References

AH XSL Formatter V6.6 MR1 for Windows (x64) : 6.6.2.35616 (2018/10/15 18:42JST) Antenna House PDF Output Library 6.6.1317 (Windows (x64))