{"id":15408,"date":"2022-04-26T08:00:24","date_gmt":"2022-04-26T13:00:24","guid":{"rendered":"https:\/\/sterling.com\/?p=15408"},"modified":"2022-04-26T08:00:24","modified_gmt":"2022-04-26T13:00:24","slug":"distributed-security-with-nsx-t-part-2","status":"publish","type":"post","link":"https:\/\/sterling.com\/stargazer\/?p=15408","title":{"rendered":"Distributed Security with NSX -T, Part 2"},"content":{"rendered":"<p style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 0pt; padding-bottom: 0; line-height: 1;\">By Billy Downing, Sterling Cloud Architect<\/p>\n<p style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 0pt; padding-bottom: 0; line-height: 1;\"><span style=\"display: inline-block; height: 1em;\"><span style=\"display: none;\">.<\/span><\/span><\/p>\n<p style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 0pt; padding-bottom: 0; line-height: 1;\"><em>Make sure to<a href=\"https:\/\/sterling.com\/stargazer\/distributed-security-with-nsx-t-part-1\/\"> read Part 1<\/a> of this blog.<\/em><\/p>\n<p style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 0pt; padding-bottom: 0; line-height: 1;\"><span style=\"display: inline-block; height: 1em;\"><span style=\"display: none;\">.<\/span><\/span><\/p>\n<p style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 0pt; padding-bottom: 0; line-height: 1;\"><span style=\"display: inline-block; height: 1em;\"><span style=\"display: none;\">.<\/span><\/span><\/p>\n<p style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 0pt; padding-bottom: 0; line-height: 1; font-size: 28pt;\"><strong><span style=\"font-size: 14pt;\">NSX-T<\/span> <span style=\"font-size: 14pt;\">Distributed Security Detecting Log4j Attacks<\/span><\/strong><\/p>\n<p style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 0pt; padding-bottom: 0; line-height: 1;\"><span style=\"display: inline-block; height: 1em;\"><span style=\"display: none;\">.<\/span><\/span><\/p>\n<p style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 0pt; padding-bottom: 0; line-height: 1;\">As we discussed previously, there are tremendous benefits to not only defining network policy in software and shifting complexity to centralized controllers for a single point of management, but also to implementing a distributed data-plane security model in our infrastructure via the network. To prove that point, we can walk through the detection of a log4j attack, which occurs between two virtual machines coexisting on the same subnet. This is a difficult task to accomplish for most traditional security appliances, as their point of inspecting typically lives at the layer 3 boundary, which protects traffic flows from subnet to subnet but does nothing to prevent attacks occurring within each subnet itself.<\/p>\n<p style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 0pt; padding-bottom: 0; line-height: 1; text-indent: 36pt;\"><span style=\"display: inline-block; height: 1em;\"><span style=\"display: none;\">.<\/span><\/span><\/p>\n<p style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 0pt; padding-bottom: 0; line-height: 1;\">In this scenario, as pictured in Figure 1, we have two virtual machines on the same subnet.<br \/>\nThe attacker is 10.50.0.101 and the victim 10.50.0.103.<\/p>\n<p style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 0pt; padding-bottom: 0; line-height: 1; text-indent: 36pt;\"><span style=\"display: inline-block; height: 1em;\"><span style=\"display: none;\">.<\/span><\/span><\/p>\n<figure style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 0pt; padding-bottom: 0; line-height: 1; text-indent: 36pt;\"><a href=\"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2022\/04\/Picture-1-242w245h-1-1.png\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone wp-image-15409 size-full\" src=\"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2022\/04\/Picture-1-242w245h-1-1.png\" alt=\"Graphical user interface, application\n\nDescription automatically generated\" width=\"242\" height=\"245\" \/><\/a><figcaption style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 10pt; padding-bottom: 0; line-height: 1; font-style: italic; color: #44546a; font-size: 9pt;\"><span style=\"font-size: 12pt;\">Figure <\/span><span style=\"font-size: 12pt;\">1<\/span><\/figcaption><\/figure>\n<p style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 0pt; padding-bottom: 0; line-height: 1; text-indent: 36pt;\"><span style=\"display: inline-block; height: 1em;\"><span style=\"display: none;\">.<\/span><\/span><\/p>\n<p style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 0pt; padding-bottom: 0; line-height: 1;\">The victim will be running a container with a vulnerable web application, as provided by this log4j-test-suite* found on GitHub, exposing the http service through tcp port 8080, as shown in Figure 2.<\/p>\n<p style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 0pt; padding-bottom: 0; line-height: 1;\"><span style=\"display: inline-block; height: 1em;\"><span style=\"display: none;\">.<\/span><\/span><\/p>\n<figure style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 0pt; padding-bottom: 0; line-height: 1;\"><a href=\"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2022\/04\/Picture-11-624w90h-1-1.png\"><img decoding=\"async\" class=\"alignnone wp-image-15410 size-full\" src=\"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2022\/04\/Picture-11-624w90h-1-1.png\" alt=\"\" width=\"624\" height=\"90\" srcset=\"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2022\/04\/Picture-11-624w90h-1-1.png 624w, https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2022\/04\/Picture-11-624w90h-1-1-300x43.png 300w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/a><figcaption style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 10pt; padding-bottom: 0; line-height: 1; font-style: italic; color: #44546a; font-size: 9pt;\"><span style=\"font-size: 12pt;\">Figure <\/span><span style=\"font-size: 12pt;\">2<\/span><\/figcaption><\/figure>\n<p style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 0pt; padding-bottom: 0; line-height: 1;\"><span style=\"display: inline-block; height: 1em;\"><span style=\"display: none;\">.<\/span><\/span><\/p>\n<p style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 0pt; padding-bottom: 0; line-height: 1;\">Now that we have an exploit available on our network, we can use that same log4j-testing-suite* to execute an attack. Shown in Figure 3, the attacker machine is running malicious software used to generate the string needed to exploit the log4 vulnerability on our victim machine.<\/p>\n<p style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 0pt; padding-bottom: 0; line-height: 1;\"><span style=\"display: inline-block; height: 1em;\"><span style=\"display: none;\">.<\/span><\/span><\/p>\n<figure style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 0pt; padding-bottom: 0; line-height: 1;\"><a href=\"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2022\/04\/Picture-9-624w227h-1-1.png\"><img decoding=\"async\" class=\"alignnone wp-image-15411 size-full\" src=\"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2022\/04\/Picture-9-624w227h-1-1.png\" alt=\"A screenshot of a computer\n\nDescription automatically generated with medium confidence\" width=\"624\" height=\"227\" srcset=\"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2022\/04\/Picture-9-624w227h-1-1.png 624w, https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2022\/04\/Picture-9-624w227h-1-1-300x109.png 300w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/a><figcaption style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 10pt; padding-bottom: 0; line-height: 1; font-style: italic; color: #44546a; font-size: 9pt;\"><span style=\"font-size: 12pt;\">Figure <\/span><span style=\"font-size: 12pt;\">3<\/span><\/figcaption><\/figure>\n<p style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 0pt; padding-bottom: 0; line-height: 1;\">Our next step is to access the victim web application and send out string through the login prompts to execute our attack, as shown in Figure 4, and shown as a normal curl command in Figure 5.<\/p>\n<p style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 0pt; padding-bottom: 0; line-height: 1;\"><span style=\"display: inline-block; height: 1em;\"><span style=\"display: none;\">.<\/span><\/span><\/p>\n<figure style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 0pt; padding-bottom: 0; line-height: 1;\"><a href=\"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2022\/04\/Picture-8-624w321h-1-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-15412 size-full\" src=\"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2022\/04\/Picture-8-624w321h-1-1.png\" alt=\"\" width=\"624\" height=\"321\" srcset=\"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2022\/04\/Picture-8-624w321h-1-1.png 624w, https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2022\/04\/Picture-8-624w321h-1-1-300x154.png 300w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/a><figcaption style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 10pt; padding-bottom: 0; line-height: 1; font-style: italic; color: #44546a; font-size: 9pt;\"><span style=\"font-size: 12pt;\">Figure <\/span><span style=\"font-size: 12pt;\">4<\/span><span style=\"font-size: 12pt;\"><img loading=\"lazy\" decoding=\"async\" width=\"624\" height=\"21\" class=\"wp-image-15413 size-full\" src=\"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2022\/04\/Picture-4-624w21h-1-1.png\" srcset=\"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2022\/04\/Picture-4-624w21h-1-1.png 624w, https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2022\/04\/Picture-4-624w21h-1-1-300x10.png 300w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/span><\/figcaption><\/figure>\n<p><span style=\"font-size: 12pt;\">Figure <\/span><span style=\"font-size: 12pt;\">5<\/span><\/p>\n<p style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 0pt; padding-bottom: 0; line-height: 1;\"><span style=\"display: inline-block; height: 1em;\"><span style=\"display: none;\">.<\/span><\/span><\/p>\n<p style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 0pt; padding-bottom: 0; line-height: 1;\"><span style=\"font-size: 12pt;\">What we\u2019re attempting to do, with the malicious string of text, is force the vulnerable application to redirect access back to our attacker. <\/span>Meanwhile, as shown in Figure 6, our attacker machine is listening on any connection to port 9001 from our victim. Once executed, the vulnerable code allows our attacker machine to establish a root connection in the container running the web application. Again, in Figure 6, we see a connection come in from the vulnerable machine, 10.50.0.103, and allow us to run a few commands such as whoami (root), pwd to see where we sit in the directory, and to check out the IP address of the container itself.<\/p>\n<p style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 0pt; padding-bottom: 0; line-height: 1;\"><span style=\"display: inline-block; height: 1em;\"><span style=\"display: none;\">.<\/span><\/span><\/p>\n<p style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 0pt; padding-bottom: 0; line-height: 1;\">\u00a0\u00a0<span style=\"display: inline-block; height: 1em;\"><span style=\"display: none;\">.<\/span><\/span><\/p>\n<figure style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 0pt; padding-bottom: 0; line-height: 1;\"><a href=\"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2022\/04\/Picture-7-624w321h-1-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-15414 size-full\" src=\"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2022\/04\/Picture-7-624w321h-1-1.png\" alt=\"Text\n\nDescription automatically generated\" width=\"624\" height=\"321\" srcset=\"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2022\/04\/Picture-7-624w321h-1-1.png 624w, https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2022\/04\/Picture-7-624w321h-1-1-300x154.png 300w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/a><figcaption style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 10pt; padding-bottom: 0; line-height: 1; font-style: italic; color: #44546a; font-size: 9pt;\"><span style=\"font-size: 12pt;\">Figure <\/span><span style=\"font-size: 12pt;\">6<\/span><\/figcaption><\/figure>\n<p style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 0pt; padding-bottom: 0; line-height: 1;\"><span style=\"display: inline-block; height: 1em;\"><span style=\"display: none;\">.<\/span><\/span><\/p>\n<p style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 0pt; padding-bottom: 0; line-height: 1;\">To summarize, we have successfully exploited the log4j vulnerability to gain root access of a victim machine where both virtual machines were running on the same subnet, same logical segment, and potentially, the same host. Typically, in this scenario, traffic does not even leave the esxi host, and without some sort of traffic injection, would never be seen by any centralized security appliance. However, since we\u2019re using NSX-T and, as such, a distributed security data plane to enforce policy, we have visibility <em>all the way down<\/em> \u2014 directly to the virtual machine vmnic itself. As shown in Figure 7, we can see that NSX-T was able to pick up the exploit and log it for tracking. In this case, I have the policy set to only create an alert for critical exploit signatures, rather than to alert and prevent.<\/p>\n<p>&nbsp;<\/p>\n<figure style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 0pt; padding-bottom: 0; line-height: 1;\"><a href=\"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2022\/04\/Picture-3-624w316h-1-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-15415 size-full\" src=\"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2022\/04\/Picture-3-624w316h-1-1.png\" alt=\"\" width=\"624\" height=\"316\" srcset=\"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2022\/04\/Picture-3-624w316h-1-1.png 624w, https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2022\/04\/Picture-3-624w316h-1-1-300x152.png 300w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/a><figcaption style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 10pt; padding-bottom: 0; line-height: 1; font-style: italic; color: #44546a; font-size: 9pt;\"><span style=\"font-size: 12pt;\">Figure <\/span><span style=\"font-size: 12pt;\">7<\/span><\/figcaption><\/figure>\n<p style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 0pt; padding-bottom: 0; line-height: 1;\"><span style=\"display: inline-block; height: 1em;\"><span style=\"display: none;\">.<\/span><\/span><\/p>\n<p style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 0pt; padding-bottom: 0; line-height: 1;\">Looking deeper into our insights, we can expand the exploit detection and inspect each traffic flow that triggered it. In Figure 8, we can see the entire history for the context of the intrusion-detection event. Looking through, we see this is a detection on the distributed policy engine impacting virtual machines that NSX-T knows the names of (attacker\/victim). We also see the specific rule in our policy that matches the source and destination traffic we wanted to inspect, and the profile containing the signature that matches our exploit.<\/p>\n<p style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 0pt; padding-bottom: 0; line-height: 1;\"><span style=\"display: inline-block; height: 1em;\"><span style=\"display: none;\">.<\/span><\/span><\/p>\n<p style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 0pt; padding-bottom: 0; line-height: 1;\"><span style=\"display: inline-block; height: 1em;\"><span style=\"display: none;\">.<\/span><\/span><\/p>\n<p style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 0pt; padding-bottom: 0; line-height: 1;\"><a href=\"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2022\/04\/Picture-12-624w375h-1-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-15416 size-full\" src=\"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2022\/04\/Picture-12-624w375h-1-1.png\" alt=\"\" width=\"624\" height=\"375\" srcset=\"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2022\/04\/Picture-12-624w375h-1-1.png 624w, https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2022\/04\/Picture-12-624w375h-1-1-300x180.png 300w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/a><\/p>\n<p style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 0pt; padding-bottom: 0; line-height: 1;\"><span style=\"display: inline-block; height: 1em;\"><span style=\"display: none;\">.<\/span><\/span><\/p>\n<p style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 0pt; padding-bottom: 0; line-height: 1;\"><span style=\"display: inline-block; height: 1em;\"><span style=\"display: none;\">.<\/span><\/span><\/p>\n<figure style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 0pt; padding-bottom: 0; line-height: 1;\"><span style=\"display: inline-block; height: 1em;\"><span style=\"display: none;\">.<\/span><\/span><figcaption style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 10pt; padding-bottom: 0; line-height: 1; font-style: italic; color: #44546a; font-size: 9pt;\"><span style=\"font-size: 12pt;\">Figure <\/span><span style=\"font-size: 12pt;\">8<\/span><\/figcaption><\/figure>\n<p style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 0pt; padding-bottom: 0; line-height: 1;\">Finally, now that we know this attack is occurring, we can take manual or automated steps to mitigate any potential loss of data or to prevent future exploits from taking place.<\/p>\n<p style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 0pt; padding-bottom: 0; line-height: 1;\"><span style=\"display: inline-block; height: 1em;\"><span style=\"display: none;\">.<\/span><\/span><\/p>\n<p style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 0pt; padding-bottom: 0; line-height: 1;\">We can\u2019t protect something if we don\u2019t have insight into it. By using NSX-T, with its distributed data plane inspecting traffic closest to the workload, we\u2019re afforded that critical insight.<\/p>\n<p style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 0pt; padding-bottom: 0; line-height: 1;\"><span style=\"display: inline-block; height: 1em;\"><span style=\"display: none;\">.<\/span><\/span><\/p>\n<p style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 0pt; padding-bottom: 0; line-height: 1;\">Overall, demonstrating how NSX-T can be used to detect and subsequently prevent attacks based on malicious signatures in a distributed manner spotlights how important it is that security is directly embedded in our environment\u2019s core services, and how NSX-T can add essential layers to our overall security posture.<\/p>\n<p style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 0pt; padding-bottom: 0; line-height: 1;\"><span style=\"display: inline-block; height: 1em;\"><span style=\"display: none;\">.<\/span><\/span><\/p>\n<p style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 0pt; padding-bottom: 0; line-height: 1;\"><strong>Sterling focuses on a security-first approach to ensure the appropriate posture is considered as early as possible in the design process for any architecture. We can provide demonstrations, workshops, or assessments based on your intended outcome incorporated with whatever constraints or requirements you may be facing. <\/strong><\/p>\n<p style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 0pt; padding-bottom: 0; line-height: 1;\"><span style=\"display: inline-block; height: 1em;\"><span style=\"display: none;\">.<\/span><\/span><\/p>\n<p style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 0pt; padding-bottom: 0; line-height: 1;\"><span style=\"display: inline-block; height: 1em;\"><span style=\"display: none;\">.<\/span><\/span><\/p>\n<p style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 0pt; padding-bottom: 0; line-height: 1;\">*Source for log4j testing suite: <a href=\"https:\/\/github.com\/kozmer\/log4j-shell-poc\">https:\/\/github.com\/kozmer\/log4j-shell-poc<\/a><\/p>\n<p style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 0pt; padding-bottom: 0; line-height: 1;\"><span style=\"display: inline-block; height: 1em;\"><span style=\"display: none;\">.<\/span><\/span><\/p>\n<p style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 0pt; padding-bottom: 0; line-height: 1;\"><span style=\"display: inline-block; height: 1em;\"><span style=\"display: none;\">.<\/span><\/span><\/p>\n<p style=\"margin-top: 0pt; padding-top: 0; margin-bottom: 0pt; padding-bottom: 0; line-height: 1;\"><span style=\"display: inline-block; height: 1em;\"><span style=\"display: none;\">.<\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Billy Downing, Sterling Cloud Architect . Make sure to read Part 1 of this blog. . . NSX-T Distributed Security Detecting Log4j Attacks . As we discussed previously, there [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":15417,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,32,15,16],"tags":[],"class_list":["post-15408","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-client","category-data-center","category-managed-services"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Distributed Security with NSX -T, Part 2 - Sterling<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Distributed Security with NSX -T, Part 2 - Sterling\" \/>\n<meta property=\"og:description\" content=\"By Billy Downing, Sterling Cloud Architect . Make sure to read Part 1 of this blog. . . NSX-T Distributed Security Detecting Log4j Attacks . As we discussed previously, there [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sterling.com\/stargazer\/?p=15408\" \/>\n<meta property=\"og:site_name\" content=\"Sterling\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/facebook.com\/SterlingComp\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-26T13:00:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2022\/04\/nsx-t-part2-featured.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sterling\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sterlingcomp\" \/>\n<meta name=\"twitter:site\" content=\"@sterlingcomp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sterling\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=15408#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=15408\"},\"author\":{\"name\":\"Sterling\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#\\\/schema\\\/person\\\/b812a18f3a1e77cd0925429d1546e49d\"},\"headline\":\"Distributed Security with NSX -T, Part 2\",\"datePublished\":\"2022-04-26T13:00:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=15408\"},\"wordCount\":788,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=15408#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/nsx-t-part2-featured.jpg\",\"articleSection\":[\"Blog\",\"Client\",\"Data Center\",\"Managed Services\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=15408\",\"url\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=15408\",\"name\":\"Distributed Security with NSX -T, Part 2 - Sterling\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=15408#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=15408#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/nsx-t-part2-featured.jpg\",\"datePublished\":\"2022-04-26T13:00:24+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=15408#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=15408\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=15408#primaryimage\",\"url\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/nsx-t-part2-featured.jpg\",\"contentUrl\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/nsx-t-part2-featured.jpg\",\"width\":1200,\"height\":627},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=15408#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Distributed Security with NSX -T, Part 2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#website\",\"url\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/\",\"name\":\"Sterling\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#organization\",\"name\":\"Sterling\",\"url\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Sterling-Computers-Logo-TM.png\",\"contentUrl\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Sterling-Computers-Logo-TM.png\",\"width\":399,\"height\":145,\"caption\":\"Sterling\"},\"image\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"http:\\\/\\\/facebook.com\\\/SterlingComp\\\/\",\"https:\\\/\\\/x.com\\\/sterlingcomp\",\"https:\\\/\\\/www.instagram.com\\\/sterlingcomputers\\\/\",\"http:\\\/\\\/youtube.com\\\/@sterlingcomp\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/sterling-computers\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#\\\/schema\\\/person\\\/b812a18f3a1e77cd0925429d1546e49d\",\"name\":\"Sterling\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49107847cab9312fecfc9475e27da24373a491ca9faf45408ea019ad846f2c44?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49107847cab9312fecfc9475e27da24373a491ca9faf45408ea019ad846f2c44?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49107847cab9312fecfc9475e27da24373a491ca9faf45408ea019ad846f2c44?s=96&d=mm&r=g\",\"caption\":\"Sterling\"},\"url\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?author=2\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Distributed Security with NSX -T, Part 2 - Sterling","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Distributed Security with NSX -T, Part 2 - Sterling","og_description":"By Billy Downing, Sterling Cloud Architect . Make sure to read Part 1 of this blog. . . NSX-T Distributed Security Detecting Log4j Attacks . As we discussed previously, there [&hellip;]","og_url":"https:\/\/sterling.com\/stargazer\/?p=15408","og_site_name":"Sterling","article_publisher":"http:\/\/facebook.com\/SterlingComp\/","article_published_time":"2022-04-26T13:00:24+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2022\/04\/nsx-t-part2-featured.jpg","type":"image\/jpeg"}],"author":"Sterling","twitter_card":"summary_large_image","twitter_creator":"@sterlingcomp","twitter_site":"@sterlingcomp","twitter_misc":{"Written by":"Sterling","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sterling.com\/stargazer\/?p=15408#article","isPartOf":{"@id":"https:\/\/sterling.com\/stargazer\/?p=15408"},"author":{"name":"Sterling","@id":"https:\/\/sterling.com\/stargazer\/#\/schema\/person\/b812a18f3a1e77cd0925429d1546e49d"},"headline":"Distributed Security with NSX -T, Part 2","datePublished":"2022-04-26T13:00:24+00:00","mainEntityOfPage":{"@id":"https:\/\/sterling.com\/stargazer\/?p=15408"},"wordCount":788,"commentCount":0,"publisher":{"@id":"https:\/\/sterling.com\/stargazer\/#organization"},"image":{"@id":"https:\/\/sterling.com\/stargazer\/?p=15408#primaryimage"},"thumbnailUrl":"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2022\/04\/nsx-t-part2-featured.jpg","articleSection":["Blog","Client","Data Center","Managed Services"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sterling.com\/stargazer\/?p=15408","url":"https:\/\/sterling.com\/stargazer\/?p=15408","name":"Distributed Security with NSX -T, Part 2 - Sterling","isPartOf":{"@id":"https:\/\/sterling.com\/stargazer\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sterling.com\/stargazer\/?p=15408#primaryimage"},"image":{"@id":"https:\/\/sterling.com\/stargazer\/?p=15408#primaryimage"},"thumbnailUrl":"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2022\/04\/nsx-t-part2-featured.jpg","datePublished":"2022-04-26T13:00:24+00:00","breadcrumb":{"@id":"https:\/\/sterling.com\/stargazer\/?p=15408#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sterling.com\/stargazer\/?p=15408"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sterling.com\/stargazer\/?p=15408#primaryimage","url":"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2022\/04\/nsx-t-part2-featured.jpg","contentUrl":"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2022\/04\/nsx-t-part2-featured.jpg","width":1200,"height":627},{"@type":"BreadcrumbList","@id":"https:\/\/sterling.com\/stargazer\/?p=15408#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sterling.com\/stargazer\/"},{"@type":"ListItem","position":2,"name":"Distributed Security with NSX -T, Part 2"}]},{"@type":"WebSite","@id":"https:\/\/sterling.com\/stargazer\/#website","url":"https:\/\/sterling.com\/stargazer\/","name":"Sterling","description":"","publisher":{"@id":"https:\/\/sterling.com\/stargazer\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sterling.com\/stargazer\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sterling.com\/stargazer\/#organization","name":"Sterling","url":"https:\/\/sterling.com\/stargazer\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sterling.com\/stargazer\/#\/schema\/logo\/image\/","url":"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2023\/03\/Sterling-Computers-Logo-TM.png","contentUrl":"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2023\/03\/Sterling-Computers-Logo-TM.png","width":399,"height":145,"caption":"Sterling"},"image":{"@id":"https:\/\/sterling.com\/stargazer\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/facebook.com\/SterlingComp\/","https:\/\/x.com\/sterlingcomp","https:\/\/www.instagram.com\/sterlingcomputers\/","http:\/\/youtube.com\/@sterlingcomp","https:\/\/www.linkedin.com\/company\/sterling-computers"]},{"@type":"Person","@id":"https:\/\/sterling.com\/stargazer\/#\/schema\/person\/b812a18f3a1e77cd0925429d1546e49d","name":"Sterling","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/49107847cab9312fecfc9475e27da24373a491ca9faf45408ea019ad846f2c44?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/49107847cab9312fecfc9475e27da24373a491ca9faf45408ea019ad846f2c44?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/49107847cab9312fecfc9475e27da24373a491ca9faf45408ea019ad846f2c44?s=96&d=mm&r=g","caption":"Sterling"},"url":"https:\/\/sterling.com\/stargazer\/?author=2"}]}},"_links":{"self":[{"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=\/wp\/v2\/posts\/15408","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=15408"}],"version-history":[{"count":0,"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=\/wp\/v2\/posts\/15408\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=\/wp\/v2\/media\/15417"}],"wp:attachment":[{"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=15408"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=15408"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=15408"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}