Every MacStadium private cloud deploys with a dedicated Cisco firewall to protect and secure your entire infrastructure. MacStadium dedicated firewalls provide admins with root access to the firewall and the ability to configure settings to their specifications. This guide describes some of the most popular configuration and customization options available to MacStadium customers.
Many customers simply submit a ticket via the MacStadium portal with their firewall configuration requests. However, you can also choose to have as much control and influence over your firewall implementations as you wish.
MacStadium offers Cisco's Adaptive Security Virtual Appliance (ASAv), which runs the same software as physical Cisco ASAs. This means that we are able to deliver full ASA firewall and VPN capabilities to cloud environments that help safeguard traffic and maltitenant architectures. Optimized for data center deployments, the ASAv is designed to work as a virtual machine. The advantage for MacStadium customers of using a virtual firewall comes from faster deployments and easier upgrades. We recommend ASAv firewalls for all use cases that have sustained throughput demands of less than 500 Mbps (125 Mbps Encrypted) as it delivers exceptional security and performance at a great price.
With a Cisco ASAv protecting their MacStadium private cloud, customers can:
Implement uniform security across multiple physical and virtual domains
Accelerate provisioning with predetermined configurations
Simplify management by using representational state transfer (REST) APIs to manage the device, easily introduce Cisco ASAv into software-defined networking (SDN) environments, and incorporate ASAv into custom policy-orchestration systems
The virtual appliance supports the same site-to-site VPN, remote-access VPN, and clientless VPN functionalities that physical ASA devices do. Most of the features that are supported on a physical ASA by Cisco software are also supported on the virtual appliance, with the notable exceptions of Cisco not supporting clustering and multiple contexts support (i.e. having multiple separate (virtual) firewalls on the same hardware) on ASAv implementations.
MacStadium also offers physical ASA hardware devices for customers who require those capabilities or need more throughput than a virtual firewall can handle. The standard appliance MacStadium offers is a Cisco ASA 5500 series firewall, and is for any customer who needs a dedicated, physical security appliance to protect their host environment.
When customers need even more power for inspection and protection, MacStadium also offers Cisco Firepower 2100 NGFW series appliances. The main difference between the two appliances is in an increase of 10 gigs per second in speed, connections and packets per second for the 2100 series.
Both the Cisco 5500 and 2100 series deliver:
Market-proven security capabilities that integrate multiple full-featured, high-performance security services, including application-aware firewall, SSL and IPsec VPN, IPS, antivirus, antispam, anti-phishing, and web filtering services.
Comprehensive management interfaces including the graphical Cisco Adaptive Security Device Manager (ASDM), a comprehensive command line interface (CLI), verbose syslog, and Simple Network Management Protocol (SNMP) support that round out a rich complement of management options.
For more information, please contact MacStadium Support or Sales.
Note: Hardware firewalls are not typically available during free trials or POC periods.
There are several other firewall options for customers who don’t want to leverage Cisco ASA technology.
By default, we give our customers maximum flexibility by leaving all ports open to the internet. Because of this,we highly recommend that if you forego the protection offered by our dedicated Cisco firewalls, you implement another form of defense. You can find a comprehensive list of third party software firewalls, including feature and price comparisons, at Mac Security: Firewalls.
Please be advised that MacStadium does not offer support for third party software firewall solutions. Also, please take the time to understand the potential impacts of enabling a third-party firewall. If errors exist in your configuration, you may unintentionally increase the risk of a breach of your data. Or, you may inadvertently lock yourself out of your environment and need the help of our support agents to get your server back online. As always, please take care to store your credentials in case problems arise.
Apple also includes a serviceable firewall with OSX. Information on its capabilities and how to enable it can be found at OS X: About the application firewall.
Customized and Hybrid Deployments
We understand that many customers have unique security requirements and may wish to host their own firewalls in our data centers. Our engineering team has detailed experience with many other security appliances and can assist your team in implementing your best possible network security configuration.
Firewall add-ons like these are accessible within your customer dashboard under the Add-Ons tab within the details of your subscription(s).
Please contact Sales for more information and to confirm if your needs can be supported.
Once you submit a private cloud request, the MacStadium provisioning team will create a ticket accessible via the MacStadium portal that contains your connection information.
The IP plan contains necessary information including how to gain access to your private cloud, instructions for accessing your vCenter client (unless you requested a bare metal implementation), your IP allocation, and your host assignments.
Setting up Access with a Remote Access Virtual Private Network (VPN)
For security reasons, outside access to your firewall is blocked by default. Our recommended method, and the one most MacStadium customers follow, is to access your private cloud via a Remote Access Virtual Private Network (VPN).
It’s the easiest way to securely connect to your MacStadium private cloud. The recommended method of doing this is via the AnyConnect client. You can find instructions for configuring and connecting to your Cisco AnyConnect Secure Mobility Client here:
Configure Cisco AnyConnect Secure Mobility Client
If your connection information mentions Group Authentication, then you can configure an IPSec VPN connection. Instructions for doing so on macOS and Windows installations follow:
This tutorial (images only) will walk you through deploying a virtual machine using the VMware web client. For more information concerning VMware and the VMware vCenter Server Virtual Appliance (vCSA), see the VMware Quick Start Guide.
MacStadium defines four basic interface types for customer use:
Outside: External firewall management addresses
Inside: /28 range
ESXi-MGMT: Reserved for vCenter & ESXi hosts (should not have public IP addresses)
Private: Random private range assigned for your use – by default no outside access allowed
What interfaces appear in your initial connection information on the MacStadium portal will depend on your private cloud configuration request. For instance, if you chose a bare metal implementation, you won’t have information concerning ESXi management and vCenter.