{"id":11847,"date":"2011-10-11T18:22:44","date_gmt":"2011-10-11T17:22:44","guid":{"rendered":"https:\/\/aidanfinn.com\/?p=11847"},"modified":"2011-10-11T18:22:44","modified_gmt":"2011-10-11T17:22:44","slug":"can-i-mix-lan-and-dmzinternet-vms-on-a-hyper-v-hostcluster","status":"publish","type":"post","link":"https:\/\/aidanfinn.com\/?p=11847","title":{"rendered":"Can I Mix LAN and DMZ\/Internet VMs On A Hyper-V Host\/Cluster?"},"content":{"rendered":"<p>The question of mixing internal and edge network virtual machines on a single Hyper-V host or cluster has popped up a number of times over the past few years.&#160; Businesses are under pressure to reduce costs, but there is that old issue of security.&#160; It\u2019s something I\u2019ve given consideration to over the past few weeks and I have a few answers.<\/p>\n<p>I\u2019ll start with the simplest answer: Yes, you can, and you can do it securely.<\/p>\n<p>Firstly, the Hyper-V virtual switch, without third party network add-ins (like NIC teaming) is secure.&#160; You can\u2019t bounce from one VLAN to another.&#160; In the below example, we have a simple scenario where VLAN 101 is in the LAN and VLAN 102 is an edge network.&#160; The physical network firewall isolates the two VMs from each other and they cannot eavesdrop on each other.&#160; <\/p>\n<p><a href=\"https:\/\/aidanfinn.com\/wp-content\/uploads\/2011\/10\/image3.png\"><img loading=\"lazy\" decoding=\"async\" style=\"background-image: none; border-right-width: 0px; padding-left: 0px; padding-right: 0px; display: block; float: none; border-top-width: 0px; border-bottom-width: 0px; margin-left: auto; border-left-width: 0px; margin-right: auto; padding-top: 0px\" title=\"image\" border=\"0\" alt=\"image\" src=\"https:\/\/aidanfinn.com\/wp-content\/uploads\/2011\/10\/image_thumb3.png\" width=\"404\" height=\"379\" \/><\/a><\/p>\n<p>NIC teaming can change things quite a bit if you have 2 pNICs for virtual switch traffic on the host (read the OEM\u2019s guidance).&#160; In the case of the HP Network Configuration Utility, you need to do something like this to maintain security:<\/p>\n<p><a href=\"https:\/\/aidanfinn.com\/wp-content\/uploads\/2011\/10\/image4.png\"><img loading=\"lazy\" decoding=\"async\" style=\"background-image: none; border-right-width: 0px; padding-left: 0px; padding-right: 0px; display: block; float: none; border-top-width: 0px; border-bottom-width: 0px; margin-left: auto; border-left-width: 0px; margin-right: auto; padding-top: 0px\" title=\"image\" border=\"0\" alt=\"image\" src=\"https:\/\/aidanfinn.com\/wp-content\/uploads\/2011\/10\/image_thumb4.png\" width=\"404\" height=\"482\" \/><\/a><\/p>\n<p>Both of those deal with traditional firewall and network isolation.&#160; But is that enough?&#160; The <a href=\"https:\/\/aidanfinn.com\/?p=11237\" target=\"_blank\">virtualisation guidance for Forefront Threat Management Gateway<\/a> (TMG &#8211; Microsoft\u2019s firewall solution) indicates that we have more thinking to do.&#160; Firewall and network isolation is not enough.<\/p>\n<p>A distributed denial of service (DDOS) attack aims to disrupt or bring down an online service by flooding it with traffic of some kind.&#160; I\u2019ve seen one in action (against a small company in Ireland).&#160; They really are more common than you would think, small companies do get targeted (not just the big guys\/government), and you rarely hear about them.&#160; <\/p>\n<p>The one I saw succeeded in bringing down the edge network devices, first one, and then the next in line when the defence\/attack were adjusted.&#160; That attack brought down dedicated network appliances.&#160; What if the appliances hadn\u2019t gone down.&#160; What was next in line?&#160; With the above two designs the next network device is either the pNICs in the host or the virtual switch in the host.&#160; The pNICs share traffic for internal (LAN) VMs and external (DMZ) VMs.&#160; If the NIC fails \u2013 everything loses communication and therefore the DDOS hits not just the online presence but the LAN VMs too.&#160; If the virtual switch is hit then we\u2019re looking at the CPU and RAM of the parent partition being stressed, and DMZ <em>and<\/em> LAN traffic\/VMs experiencing downtime.&#160; We need physical isolation of LAN and DMZ in some fashion.<\/p>\n<p>The cheapest solution would be to have dedicated NICs in the hosts: one for LAN traffic and one for DMZ traffic.&#160; This would allow a single host\/cluster to still run internal and external VMs but to isolate the impact of traffic at the NIC level (as below).&#160; At least now, if the online presence is hit by a DDOS attack then we\u2019ve limited the impact of the damage.&#160; In the below example, pNIC2 is the last physical device that can fail or be flooded.&#160; The VMs on pNIC1 are physically isolated from the DMZ and should be unaffected \u2026 of course that assumes that the virtual switch for the DMZ (on pNIC2) doesn\u2019t spike the CPU\/RAM of the parent partition \u2013 I actually have no idea what would happen in this case to be honest \u2013 my guess is that an edge network or the WAN connection would suffer first but I really do not know.<\/p>\n<p><a href=\"https:\/\/aidanfinn.com\/wp-content\/uploads\/2011\/10\/image5.png\"><img loading=\"lazy\" decoding=\"async\" style=\"background-image: none; border-right-width: 0px; padding-left: 0px; padding-right: 0px; display: block; float: none; border-top-width: 0px; border-bottom-width: 0px; margin-left: auto; border-left-width: 0px; margin-right: auto; padding-top: 0px\" title=\"image\" border=\"0\" alt=\"image\" src=\"https:\/\/aidanfinn.com\/wp-content\/uploads\/2011\/10\/image_thumb5.png\" width=\"404\" height=\"344\" \/><\/a><\/p>\n<p>If your web presence is large enough, then maybe you can justify a dedicate Hyper-V host\/cluster for the edge network.&#160; The design would be something like below.&#160; This design is a take-no-chances solution that completely isolates everything.&#160; If the online presence in the DMZ is hit by a DDOS attack then there is not a single physical connection to the LAN Hyper-V hosts that should impact their normal operations within the LAN.<\/p>\n<p><a href=\"https:\/\/aidanfinn.com\/wp-content\/uploads\/2011\/10\/image6.png\"><img loading=\"lazy\" decoding=\"async\" style=\"background-image: none; border-right-width: 0px; padding-left: 0px; padding-right: 0px; display: block; float: none; border-top-width: 0px; border-bottom-width: 0px; margin-left: auto; border-left-width: 0px; margin-right: auto; padding-top: 0px\" title=\"image\" border=\"0\" alt=\"image\" src=\"https:\/\/aidanfinn.com\/wp-content\/uploads\/2011\/10\/image_thumb6.png\" width=\"404\" height=\"582\" \/><\/a><\/p>\n<p>There is another benefit to this design approach too.&#160; The handful of security fixes for Hyper-V have been related to DDOS attacks from <em>within<\/em> a compromised VM on a host.&#160; In other words, if a VM is compromised (for example, a hacker gains admin rights on a VM via a SQL injection attack or a WordPress website compromise), they can use their local log on in the VM to DDOS attack the host that the VM is on <em>if<\/em> the relevant Hyper-V security fixes (as shared by MSFT via Windows Update) have not been applied.&#160; If you aren\u2019t quick about your updates you <em>might<\/em> get hit by a zero day attack if you have the really bad luck of (a) not having the update deployed and (b) a hacker gaining logon rights on a VM.&#160; If that\u2019s the case \u2013 you know at least that all that the hacker can DDOS attack are the DMZ VMs that are on that particular DMZ host.&#160; And hopefully you\u2019ve been good with your network isolation, password rules, etc, to slow down the hacker, and maybe you have an IDS to detect their attempts to break out from that VM via the network.<\/p>\n<p>Anyway, there\u2019s a few thoughts to keep you thinking.<\/p>\n<div style=\"padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px\" id=\"scid:0767317B-992E-4b12-91E0-4F059A8CECA8:a4949626-b5cc-498e-9402-df381a220b98\" class=\"wlWriterEditableSmartContent\">Technorati Tags: <a href=\"http:\/\/technorati.com\/tags\/Hyper-V\" rel=\"tag\">Hyper-V<\/a>,<a href=\"http:\/\/technorati.com\/tags\/Virtualisation\" rel=\"tag\">Virtualisation<\/a>,<a href=\"http:\/\/technorati.com\/tags\/Security\" rel=\"tag\">Security<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The question of mixing internal and edge network virtual machines on a single Hyper-V host or cluster has popped up a number of times over the past few years.&#160; Businesses are under pressure to reduce costs, but there is that old issue of security.&#160; It\u2019s something I\u2019ve given consideration to over the past few weeks &hellip; <a href=\"https:\/\/aidanfinn.com\/?p=11847\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Can I Mix LAN and DMZ\/Internet VMs On A Hyper-V Host\/Cluster?&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[20],"tags":[181,190,195,117],"class_list":["post-11847","post","type-post","status-publish","format-standard","hentry","category-hyper-v","tag-hyper-v","tag-security","tag-virtualisation","tag-windows-server-2008-r2"],"aioseo_notices":[],"jetpack_featured_media_url":"","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/aidanfinn.com\/index.php?rest_route=\/wp\/v2\/posts\/11847","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aidanfinn.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aidanfinn.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aidanfinn.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/aidanfinn.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=11847"}],"version-history":[{"count":0,"href":"https:\/\/aidanfinn.com\/index.php?rest_route=\/wp\/v2\/posts\/11847\/revisions"}],"wp:attachment":[{"href":"https:\/\/aidanfinn.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=11847"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aidanfinn.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=11847"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aidanfinn.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=11847"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}