{"id":872,"date":"2021-11-18T19:33:47","date_gmt":"2021-11-18T18:33:47","guid":{"rendered":"https:\/\/vminded.com\/?p=872"},"modified":"2021-12-02T17:59:13","modified_gmt":"2021-12-02T16:59:13","slug":"nsx-advanced-firewall-add-on-for-vmware-cloud-on-aws-part-3","status":"publish","type":"post","link":"https:\/\/vminded.com\/index.php\/2021\/11\/18\/nsx-advanced-firewall-add-on-for-vmware-cloud-on-aws-part-3\/","title":{"rendered":"NSX Advanced Firewall Add On for VMware Cloud on AWS (Part 3)"},"content":{"rendered":"\n<p>In my <a href=\"https:\/\/vminded.com\/index.php\/2021\/10\/21\/nsx-advanced-firewall-add-on-for-vmware-cloud-on-aws-part-2\/\" target=\"_blank\" rel=\"noreferrer noopener\">previous post<\/a>, I talked about the FQDN filtering feature which is one of the new Add-Ons of the Advanced firewall.<\/p>\n\n\n\n<p>In this Part 3 of this multi part blog series, let&#8217;s focus on the latest feature, the <a href=\"https:\/\/www.vmware.com\/products\/nsx-distributed-ids-ips.html?src=WWW_us_VMW_Dgpd3e24NwUcbjYAuPaR&amp;int_cid=70134000001CV21\" target=\"_blank\" rel=\"noreferrer noopener\">Distributed IDS\/IPS<\/a> which is part of the newly announced <a href=\"https:\/\/www.vmware.com\/products\/nsx-advanced-firewall-for-vmc.html\" target=\"_blank\" rel=\"noreferrer noopener\">NSX Advanced Firewall <\/a>for VMware Cloud on AWS.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-introduction-to-distributed-ips-ids\">Introduction to Distributed IPS\/IDS<\/h2>\n\n\n\n<p>With NSX Distributed IDS\/ IPS, customers gain protection against attempts to exploit vulnerabilities in workloads running on VMware Cloud on AWS. <\/p>\n\n\n\n<p>Distributed IDS\/ IPS is an application-aware deep packet inspection engine that can examine and protect traffic inside the SDDC. Customers can detect and prevent lateral threat movement within the SDDC using the intrinsic security capabilities of Distributed IDS\/IPS.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"979\" height=\"591\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/PictureNSX.png\" alt=\"\" class=\"wp-image-898\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/PictureNSX.png 979w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/PictureNSX-300x181.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/PictureNSX-768x464.png 768w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p>Like DFW, Distributed IDS\/IPS is built into the hypervisor and inspection can be performed for all traffic coming into or leaving the VM. Since the inspection is performed on all the hypervisor hosts in a distributed manner, there is no single inspection bottleneck that chokes the traffic flow.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Enabling Distributed IDS\/IPS<\/h2>\n\n\n\n<p>First thing we will do is to activate and configure the Distributed IDS\/IPS feature in VMC on AWS SDDC.<\/p>\n\n\n\n<p>If you don&#8217;t have already activated the NSX Advanced Firewall add-on, please do so otherwise you will get this message:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"436\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-16.54.13-1-1024x436.png\" alt=\"\" class=\"wp-image-882\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-16.54.13-1-1024x436.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-16.54.13-1-300x128.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-16.54.13-1-768x327.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-16.54.13-1-1536x655.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-16.54.13-1-2048x873.png 2048w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-16.54.13-1-1200x511.png 1200w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p>Remember in my <a href=\"https:\/\/vminded.com\/index.php\/2021\/10\/20\/nsx-advanced-firewall-add-on-for-vmware-cloud-on-aws-part-1\/\" target=\"_blank\" rel=\"noreferrer noopener\">first Post<\/a> of this series, I already have shown you how to activate the NSX Advanced Firewall Add On for VMware Cloud on AWS.<\/p>\n\n\n\n<p>Once you have activated the add-on feature, in the browser, Click the <strong>Networking and Security<\/strong> tab. Click&nbsp;<strong>Distributed IDS\/IPS<\/strong>, located in the&nbsp;<strong>Security Section<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"481\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-16.56.19-2-1024x481.png\" alt=\"\" class=\"wp-image-883\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-16.56.19-2-1024x481.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-16.56.19-2-300x141.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-16.56.19-2-768x361.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-16.56.19-2-1536x721.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-16.56.19-2-2048x962.png 2048w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-16.56.19-2-1200x564.png 1200w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>The IDS\/IPS is disabled by default so you have to enable it for the cluster. Here I have only one cluster.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"433\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.02.40-1024x433.png\" alt=\"\" class=\"wp-image-885\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.02.40-1024x433.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.02.40-300x127.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.02.40-768x324.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.02.40-1536x649.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.02.40-2048x865.png 2048w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.02.40-1200x507.png 1200w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p>Just move the slider to enable the feature and confirm that you want to enable the cluster and you are ready to test it!<\/p>\n\n\n\n<p>Once it&#8217;s enabled you can choose to regularly update the <strong>Signatures<\/strong> by selecting the <strong>Auto Update new versions <\/strong>button.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.05.34-1-1024x364.png\" alt=\"\" class=\"wp-image-888\" width=\"630\" height=\"223\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.05.34-1-1024x364.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.05.34-1-300x107.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.05.34-1-768x273.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.05.34-1-1200x427.png 1200w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.05.34-1.png 1428w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 984px) 61vw, (max-width: 1362px) 45vw, 600px\" \/><\/figure>\n\n\n\n<p>NSX Distributed IDS\/IPS utilizes the latest threat signature sets and anomaly detection algorithms to identify attempts at exploiting vulnerabilities in applications. It is integrated with the&nbsp;<strong>NSX Threat Intelligence Cloud Service<\/strong>&nbsp;to always remain up to date on the latest threats identified on the Internet.<\/p>\n\n\n\n<p>You can check the other versions that have been presents in the environment by clicking the <strong>View and change versions<\/strong> link.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"164\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-19-at-09.30.13-1024x164.png\" alt=\"\" class=\"wp-image-953\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-19-at-09.30.13-1024x164.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-19-at-09.30.13-300x48.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-19-at-09.30.13-768x123.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-19-at-09.30.13-1536x246.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-19-at-09.30.13-1200x193.png 1200w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-19-at-09.30.13.png 1820w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>This is launching a new window with historical details. Here we can see that the first Default Signature was installed Jun 17th, 2021 and additional signatures has been pushed Oct 20<sup>th<\/sup> and Nov 12<sup>nd<\/sup>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"687\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-19-at-09.29.46-1024x687.png\" alt=\"\" class=\"wp-image-952\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-19-at-09.29.46-1024x687.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-19-at-09.29.46-300x201.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-19-at-09.29.46-768x515.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-19-at-09.29.46-1536x1031.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-19-at-09.29.46-2048x1374.png 2048w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-19-at-09.29.46-1200x805.png 1200w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><figcaption>By clicking on the <strong>New signatures<\/strong>, I can dive deep into the details of each of them and access really good information on what signatures have been disabled, updated, &#8230;<\/figcaption><\/figure>\n\n\n\n<p>We are gonna go ahead and be using the latest versions.<\/p>\n\n\n\n<p>If you don&#8217;t have access to Internet from your NSX Manager, you also download the IDS\/IPS signatures from the Network Threat Intelligence services page and be able to upload them manually.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"106\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-19-at-17.29.15-1024x106.png\" alt=\"\" class=\"wp-image-992\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-19-at-17.29.15-1024x106.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-19-at-17.29.15-300x31.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-19-at-17.29.15-768x80.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-19-at-17.29.15-1536x159.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-19-at-17.29.15-1200x124.png 1200w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-19-at-17.29.15.png 1774w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>Now it&#8217;s time to finish configuring the feature and launch some real test attacks by leveraging both <a href=\"https:\/\/www.kali.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">Kali Linux<\/a> and the <a href=\"https:\/\/www.guardicore.com\/infectionmonkey\/\" target=\"_blank\" rel=\"noreferrer noopener\">infection Monkey<\/a> tooling to simulate some attacks!<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Configuring Distributed IDS\/IPS profile &amp; rule<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Create a Profile for IDS\/IPS<\/h3>\n\n\n\n<p>In this section, I will create a default profile to use with an IDS\/IPS rule. <\/p>\n\n\n\n<p>NB: We can configure up to <strong>25 profiles.<\/strong><\/p>\n\n\n\n<p>Under the <strong>Profiles <\/strong>tab under Distributed IDS\/IPS within the&nbsp;<strong>Security<\/strong>&nbsp;section, I have clicked <strong>ADD PROFILE&nbsp;<\/strong>and create the <em>ChrisIDSProfile<\/em> profile:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"533\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.21.12-2-1024x533.png\" alt=\"\" class=\"wp-image-893\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.21.12-2-1024x533.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.21.12-2-300x156.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.21.12-2-768x400.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.21.12-2-1536x800.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.21.12-2-2048x1066.png 2048w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.21.12-2-1200x625.png 1200w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p><em>I have accepted the default settings but you can customise the profile to meet your requirements.<\/em> <em>You can for instance only select the Intrusion attack with a level of severity to <\/em><strong><em>Critical<\/em> <\/strong><em>or <strong>High and Critical<\/strong> only<\/em>.<\/p>\n\n\n\n<p>One thing you can do is to tweak it by selecting specific CVSS or Attack types.<\/p>\n\n\n\n<p>I clicked <strong>save<\/strong> to finish creating the Profile. <\/p>\n\n\n\n<p>We can see that the profile has been successfully created.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"198\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.29.21-1024x198.png\" alt=\"\" class=\"wp-image-895\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.29.21-1024x198.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.29.21-300x58.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.29.21-768x148.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.29.21-1536x297.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.29.21-2048x395.png 2048w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.29.21-1200x232.png 1200w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p>After a few seconds it appears in green:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"233\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.30.09-1024x233.png\" alt=\"\" class=\"wp-image-896\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.30.09-1024x233.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.30.09-300x68.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.30.09-768x175.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.30.09-1536x350.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.30.09-2048x467.png 2048w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.30.09-1200x273.png 1200w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Create a Policy with rules for IDS\/IPS<\/h3>\n\n\n\n<p>Now let&#8217;s create a Policy.<\/p>\n\n\n\n<p>For that, I need to go to the <strong>Rules<\/strong> tab and add a specific <strong>IDS\/IPS Policy<\/strong> called <em>ChrisIDS-Policy<\/em>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"390\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.40.53-1-1024x390.png\" alt=\"\" class=\"wp-image-902\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.40.53-1-1024x390.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.40.53-1-300x114.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.40.53-1-768x292.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.40.53-1-1536x584.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.40.53-1-1200x456.png 1200w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.40.53-1.png 1814w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p>I have selected the&nbsp;<strong>check box&nbsp;<\/strong>next to the name of the policy, then click<strong>&nbsp;Add Rule<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"238\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.48.06-1024x238.png\" alt=\"\" class=\"wp-image-903\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.48.06-1024x238.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.48.06-300x70.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.48.06-768x179.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.48.06-1536x358.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.48.06-2048x477.png 2048w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.48.06-1200x279.png 1200w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p>To finish the configuration I have to select the profile previously created. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"666\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.49.51-1024x666.png\" alt=\"\" class=\"wp-image-904\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.49.51-1024x666.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.49.51-300x195.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.49.51-768x500.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.49.51-1536x999.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.49.51-2048x1332.png 2048w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.49.51-1200x781.png 1200w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p>I have also changed the source from Any to my <strong>SDDC subnets<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"244\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.53.55-1024x244.png\" alt=\"\" class=\"wp-image-905\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.53.55-1024x244.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.53.55-300x72.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.53.55-768x183.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.53.55-1536x367.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.53.55-2048x489.png 2048w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-17.53.55-1200x286.png 1200w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p>Please note that I leave the <strong>Sources<\/strong> and <strong>Services<\/strong> columns to <em>Any<\/em> and the <strong>Applied to<\/strong> field set to<em> DFW<\/em>. <\/p>\n\n\n\n<p>I have also left the Mode to&nbsp;<strong>Detect Only<\/strong>. In Production it&#8217;s better to change this setting and switch to Detect &amp; Prevent. <\/p>\n\n\n\n<p>Now that I am done with the setup, I just need to click<strong>\u00a0Publish<\/strong>.<\/p>\n\n\n\n<p>Now it&#8217;s time to go for some tests of attacks and exploits.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Testing the IDS\/IPS<\/h2>\n\n\n\n<p>In order to test the IDS\/IPS feature, I have used<strong> my best security scanning tools<\/strong> to generate some attacks and try to exploit some vulnerabilities in one special server.<\/p>\n\n\n\n<p>Basically I will launch the exploits on a <a href=\"https:\/\/sourceforge.net\/projects\/owaspbwa\/\">OWASP Web Application server<\/a> which is a test server with vulnerabilities that I have deployed in my SDDC. In a nutshell <a href=\"https:\/\/owasp.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">OWASP<\/a> stands for The Open Web Application Security Project<sup>\u00ae<\/sup>\u00a0and it is a nonprofit foundation that works to improve the security of software. It&#8217;s a very good way to test the level of security of your environment.<\/p>\n\n\n\n<p>This OWASP server is going to be the <strong>target<\/strong> for all the vulnerability scanning coming from my two different tools.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Scanning tools<\/h3>\n\n\n\n<p>First one is the <a href=\"https:\/\/www.kali.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">Kali Linux<\/a> distribution in a Virtual Machine which have a multitude of security tools preinstalled in it. I love it!<\/p>\n\n\n\n<p>The second one is the <a href=\"https:\/\/www.guardicore.com\/infectionmonkey\/wt\/vmware.html\" target=\"_blank\" rel=\"noreferrer noopener\">Infection Monkey virtual appliance<\/a> from <a href=\"https:\/\/www.guardicore.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Guardicore<\/a> which is a platform with a graphical interface that you can leverage to launch the exploits. <\/p>\n\n\n\n<p>Infection Monkey is <strong>an open source breach and attack simulation (BAS) platform <\/strong>that allows organisations to discover security gaps and fix them. You can Simply infect a random machine with the Infection Monkey and automatically discover your security risks. Test for different scenarios &#8211; credential theft, compromised machines and other security flaws.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Deploying Kali Linux<\/h3>\n\n\n\n<p>It&#8217;s a simple process as you can install it from a ISO CD or download a virtual image directly from <a href=\"https:\/\/www.kali.org\/get-kali\/#kali-virtual-machines\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a><a href=\"\" target=\"_blank\" rel=\"noreferrer noopener\">.<\/a><\/p>\n\n\n\n<p>I have choose to install it with the ISO CD as it gives more flexibility to tweak your VM settings.<\/p>\n\n\n\n<p>Once the VM is deployed there is nothing more to do.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Deploying Monkey Island VM<\/h3>\n\n\n\n<p>First I have deployed the Monkey Island VM from the OVA downloaded from the Infection Monkey website. This is an Ubuntu Linux VM with a small footprint of only 2 vCPU and 2GB of RAM.<\/p>\n\n\n\n<p>Once it&#8217;s been installed, I have just started the VM.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"361\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-18.11.01-1024x361.png\" alt=\"\" class=\"wp-image-909\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-18.11.01-1024x361.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-18.11.01-300x106.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-18.11.01-768x271.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-18.11.01-1536x542.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-18.11.01-2048x722.png 2048w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-13-at-18.11.01-1200x423.png 1200w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>My VM is up and running very quickly and I can connect to it from the web console on port 5000:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"601\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-18.47.32-1024x601.png\" alt=\"\" class=\"wp-image-930\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-18.47.32-1024x601.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-18.47.32-300x176.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-18.47.32-768x451.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-18.47.32-1536x902.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-18.47.32-2048x1203.png 2048w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-18.47.32-1200x705.png 1200w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p>Once I am logged in with the default username: <strong><em>monkeyuser<\/em><\/strong> and password, I can setup the system.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"644\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-15-at-08.54.16-1024x644.png\" alt=\"\" class=\"wp-image-911\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-15-at-08.54.16-1024x644.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-15-at-08.54.16-300x189.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-15-at-08.54.16-768x483.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-15-at-08.54.16-1200x755.png 1200w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-15-at-08.54.16.png 1235w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p>I start by clicking on <strong>Configure Monkey<\/strong>.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"581\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-18.54.52-1-1024x581.png\" alt=\"\" class=\"wp-image-933\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-18.54.52-1-1024x581.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-18.54.52-1-300x170.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-18.54.52-1-768x436.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-18.54.52-1-1536x872.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-18.54.52-1-2048x1162.png 2048w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-18.54.52-1-1200x681.png 1200w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p>I need to click the <strong>Network <\/strong>tab, and Change the Target list IP address with the IP address of the OWASP VM running in the App segment (172.11.11.115).<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"596\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-18.52.06-1024x596.png\" alt=\"\" class=\"wp-image-931\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-18.52.06-1024x596.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-18.52.06-300x175.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-18.52.06-768x447.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-18.52.06-1536x895.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-18.52.06-1200x699.png 1200w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-18.52.06.png 1892w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p>Then I clicked on the Run Monkey on the left and Select <strong>From Island<\/strong>.<\/p>\n\n\n\n<p>At that moment the tool launches the exploits automatically.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Launching the attacks and exploits<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">With Kali Linux tools<\/h3>\n\n\n\n<p>In my environment, the <a href=\"https:\/\/www.kali.org\/docs\/introduction\/\" target=\"_blank\" rel=\"noreferrer noopener\">Kali Linux<\/a> server address is <strong>172.11.11.107<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"658\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-17.16.53-1024x658.png\" alt=\"\" class=\"wp-image-916\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-17.16.53-1024x658.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-17.16.53-300x193.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-17.16.53-768x494.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-17.16.53-1536x988.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-17.16.53-2048x1317.png 2048w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-17.16.53-1200x772.png 1200w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>And the OWASP Broken Web Application has the following address: <strong>172.11.11.115<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"784\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-17.19.22-1024x784.png\" alt=\"\" class=\"wp-image-917\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-17.19.22-1024x784.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-17.19.22-300x230.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-17.19.22-768x588.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-17.19.22-1536x1177.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-17.19.22-2048x1569.png 2048w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-17.19.22-1200x919.png 1200w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p>In this first stage, I started to use Kali Linux with <em>nmap<\/em> to scan the OWASP Web server. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"840\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-17.22.29-1024x840.png\" alt=\"\" class=\"wp-image-918\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-17.22.29-1024x840.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-17.22.29-300x246.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-17.22.29-768x630.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-17.22.29-1536x1259.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-17.22.29-1200x984.png 1200w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-17.22.29.png 1876w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><figcaption>As you can see, there are 9 opened ports on the machine. The <em>nmap<\/em> command is able to output the name and version of the services that use the ports<\/figcaption><\/figure>\n\n\n\n<p>Is this next step, I have leveraged the <em>nikto<\/em> command to scan for vulnerabilities on the server.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1018\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-17.32.37-1-1024x1018.png\" alt=\"\" class=\"wp-image-923\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-17.32.37-1-1024x1018.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-17.32.37-1-300x298.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-17.32.37-1-150x150.png 150w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-17.32.37-1-768x763.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-17.32.37-1-1536x1527.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-17.32.37-1-1200x1193.png 1200w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-17.32.37-1.png 1622w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><figcaption>Multiple vulnerabilities have been displayed. Mainly affecting the Apache server and also the version of Python which is outdated<\/figcaption><\/figure>\n\n\n\n<p>The result of the exploit is visible now on the CSP Console as you can see on the screen below.  At the top, you can see there is representation of the attempt to compromise the server and they are spread over a time range with a slider that can be changed as needed.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"519\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-19.12.58-1024x519.png\" alt=\"\" class=\"wp-image-939\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-19.12.58-1024x519.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-19.12.58-300x152.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-19.12.58-768x389.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-19.12.58-1536x779.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-19.12.58-2048x1038.png 2048w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-19.12.58-1200x608.png 1200w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p>The attacks have triggered a lot of <strong>Emerging Threats<\/strong> (ET Scan) alerts with <strong>Medium<\/strong>, <strong>High<\/strong> and <strong>Critical<\/strong> severity levels.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"455\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-19.13.13-1-1024x455.png\" alt=\"\" class=\"wp-image-997\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-19.13.13-1-1024x455.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-19.13.13-1-300x133.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-19.13.13-1-768x341.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-19.13.13-1-1536x682.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-19.13.13-1-2048x909.png 2048w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-19.13.13-1-1200x533.png 1200w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><figcaption>Medium alerts inform that the http protocol on the Web-Server is exploitable with vulnerabilities. The response here is just &#8220;Detect&#8221;. You can see the CVE number and CVSS Classification of the vulnerabilities on the right.<\/figcaption><\/figure>\n\n\n\n<p>When I click on the <strong>VMs Affected<\/strong>, a list of the VM that have been affected by the vulnerabilities displays:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1013\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-19-at-17.43.54-1024x1013.png\" alt=\"\" class=\"wp-image-999\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-19-at-17.43.54-1024x1013.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-19-at-17.43.54-300x297.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-19-at-17.43.54-768x760.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-19-at-17.43.54.png 1134w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p>In addition, clicking the purple bar allow for displaying a detail window:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"542\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-19-at-17.40.15-1024x542.png\" alt=\"\" class=\"wp-image-1000\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-19-at-17.40.15-1024x542.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-19-at-17.40.15-300x159.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-19-at-17.40.15-768x406.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-19-at-17.40.15-1536x813.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-19-at-17.40.15-2048x1084.png 2048w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-19-at-17.40.15-1200x635.png 1200w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">With Monkey Island tools<\/h3>\n\n\n\n<p>As I said before the scanner starts automatically after finishing the setup. Once it has finished its scanning operations, Monkey Island shows a map with all the results accessible through a web page.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"612\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-19.05.47-1024x612.png\" alt=\"\" class=\"wp-image-935\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-19.05.47-1024x612.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-19.05.47-300x179.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-19.05.47-768x459.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-19.05.47-1536x918.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-19.05.47-2048x1224.png 2048w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-19.05.47-1200x717.png 1200w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p>It also displays a map of the devices that have been scanned by the tool.<\/p>\n\n\n\n<p>On the right of the page, there is a tab called <strong>ATT&amp;CK report<\/strong> that helps understand the exploits that have successfully been used or tried.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"442\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-19.08.47-1024x442.png\" alt=\"\" class=\"wp-image-936\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-19.08.47-1024x442.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-19.08.47-300x129.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-19.08.47-768x331.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-19.08.47-1536x662.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-19.08.47-2048x883.png 2048w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-19.08.47-1200x518.png 1200w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p>On the VMC on AWS Console, the results are displayed the same way as before with the Kali Linux tool:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"461\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-19.10.23-1024x461.png\" alt=\"\" class=\"wp-image-938\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-19.10.23-1024x461.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-19.10.23-300x135.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-19.10.23-768x346.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-19.10.23-1536x691.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-19.10.23-2048x922.png 2048w, https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-at-19.10.23-1200x540.png 1200w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><figcaption>The Alert displayed here is an apache Struts remote code execution attempt.<\/figcaption><\/figure>\n\n\n\n<h1 class=\"wp-block-heading\">Conclusion<\/h1>\n\n\n\n<p>This new Advanced Firewall Add-on IDS\/IPS feature is really interesting as today it&#8217;s the only way to prevent attacker from exploiting vulnerabilities from inside the SDDC.<\/p>\n\n\n\n<p>That&#8217;s conclude the post, I hope this has given you a better understanding on how this feature is powerful.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In my previous post, I talked about the FQDN filtering feature which is one of the new Add-Ons of the Advanced firewall. In this Part 3 of this multi part blog series, let&#8217;s focus on the latest feature, the Distributed IDS\/IPS which is part of the newly announced NSX Advanced Firewall for VMware Cloud on &hellip; <a href=\"https:\/\/vminded.com\/index.php\/2021\/11\/18\/nsx-advanced-firewall-add-on-for-vmware-cloud-on-aws-part-3\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;NSX Advanced Firewall Add On for VMware Cloud on AWS (Part 3)&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[3],"tags":[],"class_list":["post-872","post","type-post","status-publish","format-standard","hentry","category-vmconaws"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>NSX Advanced Firewall Add On for VMware Cloud on AWS (Part 3) - vminded.com<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/vminded.com\/index.php\/2021\/11\/18\/nsx-advanced-firewall-add-on-for-vmware-cloud-on-aws-part-3\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NSX Advanced Firewall Add On for VMware Cloud on AWS (Part 3) - vminded.com\" \/>\n<meta property=\"og:description\" content=\"In my previous post, I talked about the FQDN filtering feature which is one of the new Add-Ons of the Advanced firewall. In this Part 3 of this multi part blog series, let&#8217;s focus on the latest feature, the Distributed IDS\/IPS which is part of the newly announced NSX Advanced Firewall for VMware Cloud on &hellip; Continue reading &quot;NSX Advanced Firewall Add On for VMware Cloud on AWS (Part 3)&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/vminded.com\/index.php\/2021\/11\/18\/nsx-advanced-firewall-add-on-for-vmware-cloud-on-aws-part-3\/\" \/>\n<meta property=\"og:site_name\" content=\"vminded.com\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-18T18:33:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-12-02T16:59:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/PictureNSX.png\" \/>\n<meta name=\"author\" content=\"Christophe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Christophe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"14 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/vminded.com\/index.php\/2021\/11\/18\/nsx-advanced-firewall-add-on-for-vmware-cloud-on-aws-part-3\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/vminded.com\/index.php\/2021\/11\/18\/nsx-advanced-firewall-add-on-for-vmware-cloud-on-aws-part-3\/\"},\"author\":{\"name\":\"Christophe\",\"@id\":\"https:\/\/vminded.com\/#\/schema\/person\/1800a04c708828d9b5c7b64f8eab3b3a\"},\"headline\":\"NSX Advanced Firewall Add On for VMware Cloud on AWS (Part 3)\",\"datePublished\":\"2021-11-18T18:33:47+00:00\",\"dateModified\":\"2021-12-02T16:59:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/vminded.com\/index.php\/2021\/11\/18\/nsx-advanced-firewall-add-on-for-vmware-cloud-on-aws-part-3\/\"},\"wordCount\":1663,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/vminded.com\/#\/schema\/person\/1800a04c708828d9b5c7b64f8eab3b3a\"},\"image\":{\"@id\":\"https:\/\/vminded.com\/index.php\/2021\/11\/18\/nsx-advanced-firewall-add-on-for-vmware-cloud-on-aws-part-3\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/PictureNSX.png\",\"articleSection\":[\"VMConAWS\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/vminded.com\/index.php\/2021\/11\/18\/nsx-advanced-firewall-add-on-for-vmware-cloud-on-aws-part-3\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/vminded.com\/index.php\/2021\/11\/18\/nsx-advanced-firewall-add-on-for-vmware-cloud-on-aws-part-3\/\",\"url\":\"https:\/\/vminded.com\/index.php\/2021\/11\/18\/nsx-advanced-firewall-add-on-for-vmware-cloud-on-aws-part-3\/\",\"name\":\"NSX Advanced Firewall Add On for VMware Cloud on AWS (Part 3) - vminded.com\",\"isPartOf\":{\"@id\":\"https:\/\/vminded.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/vminded.com\/index.php\/2021\/11\/18\/nsx-advanced-firewall-add-on-for-vmware-cloud-on-aws-part-3\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/vminded.com\/index.php\/2021\/11\/18\/nsx-advanced-firewall-add-on-for-vmware-cloud-on-aws-part-3\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/PictureNSX.png\",\"datePublished\":\"2021-11-18T18:33:47+00:00\",\"dateModified\":\"2021-12-02T16:59:13+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/vminded.com\/index.php\/2021\/11\/18\/nsx-advanced-firewall-add-on-for-vmware-cloud-on-aws-part-3\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/vminded.com\/index.php\/2021\/11\/18\/nsx-advanced-firewall-add-on-for-vmware-cloud-on-aws-part-3\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/vminded.com\/index.php\/2021\/11\/18\/nsx-advanced-firewall-add-on-for-vmware-cloud-on-aws-part-3\/#primaryimage\",\"url\":\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/PictureNSX.png\",\"contentUrl\":\"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/PictureNSX.png\",\"width\":979,\"height\":591},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/vminded.com\/index.php\/2021\/11\/18\/nsx-advanced-firewall-add-on-for-vmware-cloud-on-aws-part-3\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/vminded.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NSX Advanced Firewall Add On for VMware Cloud on AWS (Part 3)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/vminded.com\/#website\",\"url\":\"https:\/\/vminded.com\/\",\"name\":\"vminded.com\",\"description\":\"feed your mind with virtual thoughts\",\"publisher\":{\"@id\":\"https:\/\/vminded.com\/#\/schema\/person\/1800a04c708828d9b5c7b64f8eab3b3a\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/vminded.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/vminded.com\/#\/schema\/person\/1800a04c708828d9b5c7b64f8eab3b3a\",\"name\":\"Christophe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/vminded.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8a35247a893da5c4bd4e7b117047b93859d3def341ac950cf2285f9d9b9220bf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8a35247a893da5c4bd4e7b117047b93859d3def341ac950cf2285f9d9b9220bf?s=96&d=mm&r=g\",\"caption\":\"Christophe\"},\"logo\":{\"@id\":\"https:\/\/vminded.com\/#\/schema\/person\/image\/\"},\"sameAs\":[\"http:\/\/vminded.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NSX Advanced Firewall Add On for VMware Cloud on AWS (Part 3) - vminded.com","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/vminded.com\/index.php\/2021\/11\/18\/nsx-advanced-firewall-add-on-for-vmware-cloud-on-aws-part-3\/","og_locale":"en_US","og_type":"article","og_title":"NSX Advanced Firewall Add On for VMware Cloud on AWS (Part 3) - vminded.com","og_description":"In my previous post, I talked about the FQDN filtering feature which is one of the new Add-Ons of the Advanced firewall. In this Part 3 of this multi part blog series, let&#8217;s focus on the latest feature, the Distributed IDS\/IPS which is part of the newly announced NSX Advanced Firewall for VMware Cloud on &hellip; Continue reading \"NSX Advanced Firewall Add On for VMware Cloud on AWS (Part 3)\"","og_url":"https:\/\/vminded.com\/index.php\/2021\/11\/18\/nsx-advanced-firewall-add-on-for-vmware-cloud-on-aws-part-3\/","og_site_name":"vminded.com","article_published_time":"2021-11-18T18:33:47+00:00","article_modified_time":"2021-12-02T16:59:13+00:00","og_image":[{"url":"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/PictureNSX.png","type":"","width":"","height":""}],"author":"Christophe","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Christophe","Est. reading time":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/vminded.com\/index.php\/2021\/11\/18\/nsx-advanced-firewall-add-on-for-vmware-cloud-on-aws-part-3\/#article","isPartOf":{"@id":"https:\/\/vminded.com\/index.php\/2021\/11\/18\/nsx-advanced-firewall-add-on-for-vmware-cloud-on-aws-part-3\/"},"author":{"name":"Christophe","@id":"https:\/\/vminded.com\/#\/schema\/person\/1800a04c708828d9b5c7b64f8eab3b3a"},"headline":"NSX Advanced Firewall Add On for VMware Cloud on AWS (Part 3)","datePublished":"2021-11-18T18:33:47+00:00","dateModified":"2021-12-02T16:59:13+00:00","mainEntityOfPage":{"@id":"https:\/\/vminded.com\/index.php\/2021\/11\/18\/nsx-advanced-firewall-add-on-for-vmware-cloud-on-aws-part-3\/"},"wordCount":1663,"commentCount":0,"publisher":{"@id":"https:\/\/vminded.com\/#\/schema\/person\/1800a04c708828d9b5c7b64f8eab3b3a"},"image":{"@id":"https:\/\/vminded.com\/index.php\/2021\/11\/18\/nsx-advanced-firewall-add-on-for-vmware-cloud-on-aws-part-3\/#primaryimage"},"thumbnailUrl":"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/PictureNSX.png","articleSection":["VMConAWS"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/vminded.com\/index.php\/2021\/11\/18\/nsx-advanced-firewall-add-on-for-vmware-cloud-on-aws-part-3\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/vminded.com\/index.php\/2021\/11\/18\/nsx-advanced-firewall-add-on-for-vmware-cloud-on-aws-part-3\/","url":"https:\/\/vminded.com\/index.php\/2021\/11\/18\/nsx-advanced-firewall-add-on-for-vmware-cloud-on-aws-part-3\/","name":"NSX Advanced Firewall Add On for VMware Cloud on AWS (Part 3) - vminded.com","isPartOf":{"@id":"https:\/\/vminded.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/vminded.com\/index.php\/2021\/11\/18\/nsx-advanced-firewall-add-on-for-vmware-cloud-on-aws-part-3\/#primaryimage"},"image":{"@id":"https:\/\/vminded.com\/index.php\/2021\/11\/18\/nsx-advanced-firewall-add-on-for-vmware-cloud-on-aws-part-3\/#primaryimage"},"thumbnailUrl":"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/PictureNSX.png","datePublished":"2021-11-18T18:33:47+00:00","dateModified":"2021-12-02T16:59:13+00:00","breadcrumb":{"@id":"https:\/\/vminded.com\/index.php\/2021\/11\/18\/nsx-advanced-firewall-add-on-for-vmware-cloud-on-aws-part-3\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/vminded.com\/index.php\/2021\/11\/18\/nsx-advanced-firewall-add-on-for-vmware-cloud-on-aws-part-3\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/vminded.com\/index.php\/2021\/11\/18\/nsx-advanced-firewall-add-on-for-vmware-cloud-on-aws-part-3\/#primaryimage","url":"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/PictureNSX.png","contentUrl":"https:\/\/vminded.com\/wp-content\/uploads\/2021\/11\/PictureNSX.png","width":979,"height":591},{"@type":"BreadcrumbList","@id":"https:\/\/vminded.com\/index.php\/2021\/11\/18\/nsx-advanced-firewall-add-on-for-vmware-cloud-on-aws-part-3\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/vminded.com\/"},{"@type":"ListItem","position":2,"name":"NSX Advanced Firewall Add On for VMware Cloud on AWS (Part 3)"}]},{"@type":"WebSite","@id":"https:\/\/vminded.com\/#website","url":"https:\/\/vminded.com\/","name":"vminded.com","description":"feed your mind with virtual thoughts","publisher":{"@id":"https:\/\/vminded.com\/#\/schema\/person\/1800a04c708828d9b5c7b64f8eab3b3a"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/vminded.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/vminded.com\/#\/schema\/person\/1800a04c708828d9b5c7b64f8eab3b3a","name":"Christophe","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/vminded.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8a35247a893da5c4bd4e7b117047b93859d3def341ac950cf2285f9d9b9220bf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8a35247a893da5c4bd4e7b117047b93859d3def341ac950cf2285f9d9b9220bf?s=96&d=mm&r=g","caption":"Christophe"},"logo":{"@id":"https:\/\/vminded.com\/#\/schema\/person\/image\/"},"sameAs":["http:\/\/vminded.com"]}]}},"_links":{"self":[{"href":"https:\/\/vminded.com\/index.php\/wp-json\/wp\/v2\/posts\/872","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/vminded.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/vminded.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/vminded.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/vminded.com\/index.php\/wp-json\/wp\/v2\/comments?post=872"}],"version-history":[{"count":47,"href":"https:\/\/vminded.com\/index.php\/wp-json\/wp\/v2\/posts\/872\/revisions"}],"predecessor-version":[{"id":1031,"href":"https:\/\/vminded.com\/index.php\/wp-json\/wp\/v2\/posts\/872\/revisions\/1031"}],"wp:attachment":[{"href":"https:\/\/vminded.com\/index.php\/wp-json\/wp\/v2\/media?parent=872"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/vminded.com\/index.php\/wp-json\/wp\/v2\/categories?post=872"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/vminded.com\/index.php\/wp-json\/wp\/v2\/tags?post=872"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}