This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Runing Sophos UTM virtualized or on dedicated hardware?

Hi!
I have a computer with a Core I7 2600K, 32GB ram, 4 Intel nics, and I'm planning to run Sophos UTM on this as my primary firewall (home use with some internal and some public servers behind).

I think it is quite a waste to use the hardware as a firewall only, I don't think Sophos need an I7 with 32GB ram, or am I wrong?

I have a little thought to run ESXI on the machine to have some more vm:s running on it in parallell with Sophos UTM.

I think the hardware can handle a one or two vm:s alongside a Sophos install..?

 

My biggest concern are the security, how secure is it to run the firewall virtualized? For some reason my heart screams a little when I'm thinking to run it virtualized, because
a dedicated approach should be more secure, because you don't expose a virtualization platform to the net as you do with a virtualized approach.

But is it common that hackers find holes on the virtualization platform and can gain access to the internal lans? How safe are virtualization platforms nowadays?

I don't think it is an uncommon approach on companies to run it virtualized, but maybe I'm wrong. This is for personal use in a home environment, but I still want secure networks.

I may run it virtualized if you say that it is safe.. :P

 

For your information: I have a 250/100Mbps fiber connection to my house.

 

Thanks in advance!



This thread was automatically locked due to age.
Parents
  • widdde said:

    Hi!
    I have a computer with a Core I7 2600K, 32GB ram, 4 Intel nics, and I'm planning to run Sophos UTM on this as my primary firewall (home use with some internal and some public servers behind).

    I think it is quite a waste to use the hardware as a firewall only, I don't think Sophos need an I7 with 32GB ram, or am I wrong?

    I have a little thought to run ESXI on the machine to have some more vm:s running on it in parallell with Sophos UTM.

    I think the hardware can handle a one or two vm:s alongside a Sophos install..?

    My biggest concern are the security, how secure is it to run the firewall virtualized? For some reason my heart screams a little when I'm thinking to run it virtualized, because
    a dedicated approach should be more secure, because you don't expose a virtualization platform to the net as you do with a virtualized approach.

    But is it common that hackers find holes on the virtualization platform and can gain access to the internal lans? How safe are virtualization platforms nowadays?

    I don't think it is an uncommon approach on companies to run it virtualized, but maybe I'm wrong. This is for personal use in a home environment, but I still want secure networks.

    I may run it virtualized if you say that it is safe.. :P

    For your information: I have a 250/100Mbps fiber connection to my house.

    Thanks in advance! 

    Widde,

    You can run Sophos SG UTM and XG Firewall virtualized, but in your situation. To do this, you would have to allow the unfiltered traffic onto your network in order to filter it in a virtualized environment.  This is complicated and expensive for most home environments as it requires managed switches for VLANs and robust servers for virtualization.

    For most home settings, all you need to do is deploy the UTM/Firewall on a small firewall appliance in between your fiber gateway and your internal network.  The device required is very simple computer with two or more ethernet ports.  You can purchase a firewall computer with RAM and SSD installed, or you can purchase a barebones systems and add your own RAM/storage.  In most cases, you don't need a more than 8GBs of RAM or 64GB of storage.  If you have an old computer laying around, you can use that too, but be warned that UTM and XG installers wipe the hard drive during installation.

    On your fiber connection, I would recommend a Protectli Vault.  It includes multiple ports for organizing your LAN, virtualization, Wi-Fi, and other networks.  Each port will become an interface.  Each interface can have a default LAN on which you can add layers of VLANs.  In the default Gateway mode, your UTM will be the network router, and through it, you can create, manage, and combine all the interfaces, LANs, or VLANs.  You can do a lot of other things too.  If you prefer to use your existing router as the network manager, you can set the UTM in a Bridge mode.

    I moved from the Sophos SG UTM to the Sophos XG Firewall.  It was easy because they use the same appliances.  My XG Firewall is in a ZBOX CI325 Nano with 4GB RAM and a 32GB SSD connected to an Arris SurfBoard SB6190 cable modem to a on a 350Mbps cable connection.  The Zbox only has two ports WAN and LAN.  The only thing on the LAN is an Apple Time Machine in bridge mode.  This gives me two networks, the default LAN for my internal wired/wireless/backup network and Guest Wi-Fi on a separate VLAN.

  • Hi David and thanks for your response!

    Well, I'm not an ordinary home user, I already have 2x 24 ports managed switches and 4 x 8 ports managed switches.

    I currently run Sophos UTM on hardware where I can't get full speed on my 250/100 Mbps connection with IPS enabled.

    The speed drops about 100Mbps to 150Mbps, this is because snort is single threaded and therefor I planned to beef upp
    the cpu to a Core I7 (but run it in a virtualized environment). 

    I'm already running a couple of vlans in my home and will continue to do this after the change to other hardware.

     

    From my fiber connection I will connect ESXI on a dedicated network card that only the firewall will use and all other network will reside on
    another network card, the lan side, in the virtualized firewall.

    My concern is if ESXI will be a security issue because the firewall isn't the first physical box, but if ESXI doesn't listen on the interface where I plug internet in

    maybe it is a secure solution?

  • darrellr said:

    Virtualization is covered because it sells agents.  FUD sells agents.  Do you have any evidence that virtualization escapes are NOT rare?  What the hell does virtualization have to do with malware/ransomware spreading?  Where are you seeing this as an attack vector?  The MOST likely method of infection will be phishing or drive-bys on websites.  Some consumer gateways have vulnerabilities that leads to c2 infections.  But vm escapes or attacks on the hypervisor from a guest machine just don't happen.  Imagine the fallout if those were common.  Hosting companies would be shutting down en mass.   VMware would be out of business.  Amazon would have to shut down AWS.  Seriously.  This is FUD, pure and simple (at least until it is not).  For a home user, dedicating all that hardware to a UTM is a waste of resources.  They are far more likely to visit a shady p0rn site or get hit with malvertising or have an asteroid fall on their house than they are to be compromised by a vm escape attack these days.

    Again, what you are recommending is solid for large business, but SMB and definitely home, this is good enough.

    Darrel,

    You're describing the exact opposite threat of what Im describing.  Im taking about injections from peripheral device to physical host to host OS to hypervisor to VM.  Im not talking about "virtualization escape" attacks in the opposite direction.  The attack Im describing is more common in home environments than in larger settings because large organizations protect their servers directly from both physical access as well as remote access.

    In your recommended setup, you're only covering a couple of network ports.  You're not covering any other port on the server.  This leaves the host server unprotected, as a whole.  The home user is much more likely to plug something into another port on the server and infect the host.  The host OS, hypervisor, vSphere, vSwitch, and other virtualization organization programs are not virtualized.  They are standard software running in the host OS.  Once the host OS or virtualization control is infected, the VMs are easy prey.  But really... all the malware would need to do in your setup is to shut down your two physical ports or shut down your hypervisor or shut down the server or encrypt it.  The malware would not need to "escape" any virtualization, and your virtualized firewall can't see it nor do anything about it.

    In most virtualization today, the ports between clients and VMs are encrypted.  Your email, banking, social networking, text messaging, and many other common home communications are also encrypted between the internet and home network device.  If your virtual UTM is not scanning encryption connections, your VMs and home network are still at risk of infection.  Yes, the UTM will scan the header information of encrypted packets coming through it, but it's probably not going to flag packets coming from within the network.  How many home users are going to take the time to deal with the necessary settings and certificates to enable encrypted scanning on web, email, and other protocols?  all it would take is a home to get infected from a bad link in an email or social network post.  Then, that device can infect one or more of your VMs as well as other devices on the network.  Now, the home virtualization user has to either go and rebuild that VM form a snapshot they believe is clean or deploy another product to protect their VMs.  The home user must also deploy another product to clean and protect the devices they can access.

    Data centers get hit all the time.  The reason why you don't feel it happening to you is because good data centers and virtualization designers deploy redundancy to immediately replace the current infected/corrupted VM with a clean copy running in parallel or active standby, instead of taking the time to clean the infection/corruption.  Home virtualization users don't commonly employ this simple protection.

    So yes, of course, I agree that a home user deploying the hardware, software, and licensing to host a virtual UTM to protect their network is a waste.  It is simpler, cheaper, and more efficient to deploy a simple firewall appliance for under $500.

  • I do not feel this thread is going to help the OP any more and we are simply more likely to confuse the issue.  You and I will not come to an agreement on this.  I will consider this conversation done.

  • darrellr said:

    I do not feel this thread is going to help the OP any more and we are simply more likely to confuse the issue.  You and I will not come to an agreement on this.  I will consider this conversation done.

    Darrel,

    No, of course not.  We're not going to agree.   These recent replies of yours tell me that you're just trying create an argument and win it.  You're not trying to help make sure Widde or anyone else viewing this issue can learn about options and the pros/cons/issues associated with them.

    Widde understands the difference of running the UTM/Firewall in a physical firewall appliance vs virtualized.  Don't put him down or anyone else by confusing that fact with your argument.   Widde is asking to hear the advantages and disadvantages of both, so are some of the other people coming to view this issue.

    You're stuck on claiming a virus isn't going to escape the VM and get out while being protected by a virtualized UTM.  I'm trying to discuss this with you to understand how the virus got on the VM in the first place while being protected by your virtual UTM, but you're avoiding that explanation.  Is it because that explanation would negate your point of a virtual UTM?

    Im not here just to debate of how viruses got past your virtual UTM the first time but won't "escape" a second time in your design.  Im here discussing overall cost and maintenance over time.  Im discussing how complicated the setup and troubleshooting will be for both.  Im addressing how many products one would need in both setups.  Im also addressing what issues each stops will create or solve.

    I still stand by my recommendation, and Widde understands why:  For less than $500, Sophos SG UTM or XG Firewall can be deployed in Protecli 6-port Vault firewall appliance or something similar at the "head" of the network.  The internet gateway would be connected to the default WAN port, and the internal network on the default LAN port.  If you wanted to scan everything coming in and out of servers too, they can be placed on any of the other ports.  There would be no need to purchase or maintain software and licenses for virtualization as all of the security and virtualization software can be free: Sophos SG UTM, Sophos XG Firewall, Sophos Home, Oracle VM VirtualBox.

  • Yes I understand both of you.

    One question here: You are linking to virtualbox that runs on Windows or Mac, I am talking about VMWare ESXi that is a dedicated virtualization platform.. I would never run UTM in Virtual box in Windows.. That I see as a big security risk because all traffic will go through Windows first..

    As said, I am talking about ESXi which also is free for personal use and the question regarded running UTM on Esxi.

  • Without wading into this too much, you will be fine on ESXi.

    Think along the lines of Ip addressing and routable/non routable ip addresses.

    The only entry from outside is via a router or UTM, not ESXi etc. If they compromise your UTM/router eg via poor configuration etc, effectively they could get on your internal protected resources at which time it doesn't matter whether it's virtual or not.

    You will be fine with vlans or seperate nic's and virtulised. Heck, all my internet/internal traffic runs down the same port channel cable separated by vlans/ACL's. I don't use separate nic's for internet/lan etc.
    Traffic coming from the internet on 8.x.x.x simply ain't going to cross over into 10.1.1.0/24 etc unless I allow it to. Now, if the UTM became compromised eg weak encrypted password for admin etc, then I may have an issue but that lies with the UTM, not the hypervisor, nic's etc

    Been running like this since the dawn of ESXi 4. It's not a problem although I would advise that you do use proper seperation eg your vm's aren't on the same network as your hypervisor.

    Use the usual stuff, eg strong encrypted passwords, UTM admin interface not accessible from internet, lockouts and all the functions the UTM offers etc and you will be fine.

     

    Larger, corporate networks have their own issues eg attacks from within etc and as such need further levels of separation, resilience, monitoring etc
    As mentioned, take a cost/risk based approach to it and for a SOHO, SMB, it's fine. Everybody values their data but there does come a time when the effort/cost may not be worth it.

  • Thank you for your involvement in this hot topic! :D

     

    Of course I will separate utm admin on a separate vlan (my managing vlan) and never ever expose utm admin on the net side.

    I have separated servers from clients as well as IOT-devices, they all have their own vlans and are routed in the UTM.
    Servers can not access clients, some clients can access some servers and so on. :)

    But right now the UTM is on a separate, pretty slow, box and will maybe move it to a virtualized one. Have not decided how to do yet.

  • I think that is what David was missing, that there is no underlying user OS like VirtualBox running under windows or linux with ESXi.  It is, and only is, the hypervisor.

    On another note, though, do keep a watch on the KAISER issue with Intel CPUs.  The more I look at the code the more concerned I am getting about the possibility of vm escape.  I believe patches will be available for platforms like ESXi before public exploits are available, but if that comes to pass, be prepared to patch.  At this time, it appears that reading from ring3 (user space) to ring0 (privileged kernel space) may be possible in some scenarios.  Combined with other attacks, though could be dangerous.  NOT because you are running in a virtualized environment, though, but because of local privilege escalation.  In your case, they would need to compromise some VM on your hypervisor, then read privileged memory long enough to get meaningful information, then potentially use that information to escalate privileges (potentially up to the hypervisor).  Again, though, this is not a malware spreading issue or botnet, this is a hands on keyboard security issue that would require you to be specifically targeted and have other exploitable vulnerabilities exposed (which is kind of what a next gen UTM helps to protect).

    For review:  hxxps://www.theregister.co.uk/2018/01/02/intel_cpu_design_flaw/ and other sites, shouldn't be too hard to find info.

  • The link you posted was very interesting! I have missed this issue during the weekends. Sounds VERY serious.

    I have just ordered an AMD Ryzen 7, thank god for that ;)

    But the UTM is running on a pretty old J1900 celeron and will probably be affected..?  Myabe it is better to switch to my Ubiquiti Edgerouter until this hole is fixed.?

  • I am not making any or even plan on making any changes in my environment at this time.  I would not hesitate to deploy due to the bug, only pointing out that a potentially serious issue is looming.  This is sort of similar to the heartbleed issue, but requires local system access and may be able to get more sensitive information from the system kernel itself.  Build away, IMHO.

  • Well, if it requires local access I'm not worried at all. No one that enteres my house has any kmowledge or interest to touch my servers anyway :)

    I'm only worried about intruders from the net. I don't have any sensitive data, but still I don't want unwanted visitors in my lans.

Reply
  • Well, if it requires local access I'm not worried at all. No one that enteres my house has any kmowledge or interest to touch my servers anyway :)

    I'm only worried about intruders from the net. I don't have any sensitive data, but still I don't want unwanted visitors in my lans.

Children
No Data