About Distributed Firewall
The Distributed Firewall is a hardware-assisted firewall. It supplements—but does not replace—other security features in the Cisco Application Centric Infrastructure (ACI) fabric such as Cisco Adaptive Security Virtual Appliance (ASAv) or secure zones created by Microsegmentation with Cisco ACI Virtual Edge.
No additional software is required for the Distributed Firewall to work. However, you must configure policies in the Cisco Application Policy Infrastructure Controller (APIC) to work with the Distributed Firewall.
The Distributed Firewall is supported on all Virtual Ethernet (vEth) ports but is disabled for kni-opflex, kni-ave-ctrl dpdk interfaces and for all uplink ports.
Key Features of the Distributed Firewall
Feature |
Description |
---|---|
Provides dynamic packet filtering (also known as stateful inspection) |
Tracks the state of TCP and FTP connections and blocks packets unless they match a known active connection. Traffic from the Internet and internal network is filtered based on policies that you configure in the APIC GUI. |
Is distributed |
Tracks connections even if you use vMotion to move virtual machines (VMs) to other servers. |
Prevents SYN-ACK attacks |
When the provider VM initiates SYN-ACK packets, the Distributed Firewall on the provider Cisco ACI Virtual Edge drops these packets because no corresponding flow (connection) is created. |
Supports TCP flow aging |
Connections in ESTABLISHED state are maintained for 2 hours unless the per-port limit reaches the 75% threshold. Once that threshold is reached, any new connection can potentially replace the old connection (which has been inactive for at least 5 minutes). Connections in non-ESTABLISHED TCP state are retained for 5 minutes of idle or inactive time. |
Is implemented at the flow level |
Enables a flow between VMs over the TCP connection, eliminating the need to establish a TCP/IP connection for each packet. |
Not dependent on any particular topology or configuration |
Works with either Local Switching and No Local Switching modes and with either VLAN and VXLAN. |
Is hardware-assisted |
In the ACI fabric, Cisco Nexus 9000 leaf switches store the policies, avoiding impact on performance. |
Bases implementation on 5-tuple values |
Uses the source and destination IP addresses, the source and destination ports, and the protocol in implementing policies. |
Is in learning mode by default |
Facilitates upgrades. Distributed Firewall must be in learning mode if you migrate to Cisco ACI Virtual Edge from Cisco AVS if the version of Cisco AVS is earlier than Release 5.2(1)SV3(1.5). Those versions do not support Distributed Firewall. |