iTecs IT Outsourcing and Support Blog
It's easy to forgot the various steps and requirements for setting up a virtual firewall, like the open-source pfSense, Sophos XG-v, and the Cisco Firepower FTDv on a Windows Server Hypervisor. We outline the requirements, initial configuration, and a few tips to ensure you do it right the first time.
You'll need two network cards and make sure that the ones you'll be using are certified compatible with the Hypervisor engine. This is equally and maybe even more important in the VMWare ESXi world, but is still a good idea. Next, you'll need to ensure that you have, at least, Windows 2012 R2 or higher. We've had some troubles getting the new-age NGFWv to work on older version of Windows, and at this point, you shouldn't run anything end-of-life anyway. With that out of the way, you're ready to create your two virtual switches.
Inside the Hypervisor Manager, open the Virtual Switch Manager and create your first virtual switch (VS). We're going to start with the WAN facing interface; make note of the physical network card that you plan on having the WAN or Internet circuit plugged into.
This virtual switch should be configured with the type as EXTERNAL. Make sure that you've selected the right network interface card that will pass traffic to the Internet.
Next you need to create the local area network LAN virtual switch.
We have always gone with the same settings (EXTERNAL connection type) but choosing Internal or External can provide the same results. One the extra step you may need to take is allowing the LAN virtual switch to accept and pass traffic from multiple VLANS.
If the virtual firewall configuration or design that you are installing DOES NOT have multiple VLAN interfaces you can skip the next step. If you do have multiple LAN interfaces (vLANS) then you'll need to run a PowerShell script. But first it's time to install your virtual firewall.
We're not going to walk you through the installation steps to install the virtual firewalls- you can Google "Install <firewall brand> on Hypervisor" for the unique step-by-step instructions. Once you have the virtual appliance installed consider the following section.
Open a CMD prompt in elevated mode.
Run the following command- adjust the VMName to match the name of your virtual firewall, and specify what VLAN IDs you want to allow through the firewall.
PS C:\> Set-VMNetworkAdapterVlan -VMName <nameofyourvm> -Trunk -AllowedVlanIdList 1-100
If you skip this step and have multiple VLANs, your firewall won't be able to accept the tagged packets that originate from your managed switches.
The rate at which new threats are being identified proves the inadequacy of traditional anti-virus software as a singular security measure. Considering its powerful and comprehensive threat-detecting abilities, SentinelOne proves to be a clear winner in any environment.Read More
There are various types of cryptocurrency wallets. The three prominent are offline, online, and those held by a custodian. Before we explain the differences between the three, it's important to note that a custodian, in this context, is an entity that holds your private key. Next, we'll go into what a private key is but first, let's dive deeper into the three types.Read More
The first and most crucial thing any company can do to reduce the likelihood of a cyberattack is to train their employees about cyberthreats and how to recognize them. This may seem obvious and intuitive, but the fact of the matter is that human error accounts for a large percentage of successful cyberattacks.Read More