Estimated Time to Complete: 30 minutes
Now that we have verified the lab has been deployed correctly, basic NSX networking configuration has been applied and the appropriate vunlerable application VMs have been deployed, we can configure the NSX Distributed IDS/IPS.
Create Groups
- In the NSX Manager UI, navigate to Inventory --> Groups
- Click ADD GROUP
- Create a Group with the below parameters. Click Save when done.
- Create another Group with the below parameters. Click Save when done.
- Confirm previously deployed VMs became a member of appropriate groups due to applied tags. Click View Members for the 2 groups you created and confirm
Note: Tags were applied to the workloads through the Powershell script used to deploy the lab environment.
Enable Intrusion Detection
- In the NSX Manager UI, navigate to Security --> Distributed IDS --> Settings
- Under Enable Intrusion Detection for Cluster(s), set Workload-Cluster to Enabled
NSX can automatically update it’s IDS signatures by checking our cloud-based service. By default, NSX manager will check once per day and we publish new signature update versions every two week (with additional non-scheduled 0-day updates). NSX can also be configured to optionally automatically apply newly updated signatures to all hosts that have IDS enabled.
Enable Automated Signature Update propagation
- Under Intrusion Detection Signatures, select Auto Update new versions (recommended) in order to propagate the latest signature updates from the cloud to the distributed IDS instances
- Optionally, click View and Change Versions and expand one of the signature sets to see what signatures have been added/updated/disabled in this particular release
Note: if a proxy server is configured for NSX Manager to access the internet, click Proxy Settings and complete the configuration
Create IDS Profiles
- In the NSX Manager UI, navigate to Security --> Distributed IDS --> Profiles
- Click ADD IDS PROFILE
- Create an IDS Profile with the below parameters. Click Save when done.
- Name Production
- Signatures to Include: Critical, High, Medium
- Create another IDS Profile with the below parameters. Click Save when done.
- Name Development
- Signatures to Include: Critical, High
Create IDS Rules
- In the NSX Manager UI, navigate to Security --> Distributed IDS --> Rules
- Click ADD POLICY
- Create an IDS Policy named NSX PoV .
- Check the checkbox for the policy you just created and click ADD RULE.
- Add an IDS Rule with the following parameters
- Name Production Applications IDS Policy
- IDS Profile Production
- Applied to Production Applicatons (group)
- Leave other settings to defaults
- Add another IDS Rule with the following parameters
- Name Development Applications IDS Policy
- IDS Profile Development
- Applied to Development Applicatons (group)
- Leave other settings to defaults
- Click Publish
You have now successfully configured the NSX Distributed IDS/IPS ! In the next exercise, we will run through a basic attack scenario to confirm intrusion attemtps are detected and get familair with the NSX IDS/IPS Events view.