Updated on 2022-03-04 GMT+08:00

Network Isolation and Access Control

Figure 1 shows the SAP production environment security solution.

Figure 1 Production environment security solution

After service characteristics and enterprise security practices are taken into consideration, it is recommended that you divide the cloud-based system (production environment and development and test environment) into zones of different security levels, including the management, application, SAP DB, and demilitarized zone (DMZ) zones. The zones are isolated from each other using subnets.

The DMZ zone is special because it interacts with the Internet and is shared by the production system and the development and test system. It is recommended that you configure specific security policies for each zone to control inter-zone access and access from external networks.

  • DMZ zone: This zone directly interconnects with the Internet. All service system access requests from public network users and SAP support personnel are processed in the zone. The DMZ zone has a low security level and a high security risk.
  • Application zones: SAP applications are deployed in the zones for integrated data center (IDC) users (enterprise internal users) to use and for interconnection with systems including the AD server. The zones have a higher security level than the DMZ zone.
  • SAP DB zones: SAP databases are deployed in the zones. The zones allow limited access from the internal network application and management zones and have the highest security level.
  • Management zones: Operations and maintenance (O&M) bastion hosts are deployed in the zones. The zones are the intermediary areas through which system O&M personnel (in an enterprise) manage, operate, and maintain Elastic Cloud Servers (ECSs) and systems in other zones.

Configure specific security policies for each zone using security groups and network access control lists (ACLs) to control inter-zone access and access from external networks. Configure security policies according to the "deny by default" and "minimum permission" principles, allowing only access from specified sources to required IP addresses and ports.

For example, only administrators in an enterprise are allowed to access the remote access port of the bastion host in management zones. Common users and internal systems are not allowed to access the port. Common users in an enterprise should be allowed to access only SAP service ports in internal network application zones. Network ACLs are used to deny traffic between all zones (isolated using subnets) in the system by default. Necessary services must be allowed by adding ACL rules.

This section describes the access control policies between the zones in a production environment. This section also provides suggestions on network ACL and security group configuration according to the "deny by default" and "minimum permission" principles. (The development and test environment is special. To ensure that IDC users can efficiently access the internal resources and that networking is flexible, looser access control policies are configured for the development and test environment than for the production environment. For details, see Development and Test Environment Security Solution.)

Security Policies

As shown in Figure 2, the production environment has eight subnets. It is recommended that you create an independent network ACL for each subnet. These network ACLs include NACL-DMZ-SAP-Router, NACL-PRD-DMZ, NACL-PRD-APP, NACL-PRD-SAPDB-BUSI, NACL-PRD-SAPDB-INTERNAL, and NACL-PRD-MGMT.

Figure 2 Subnet and network ACL layout in the production environment

Network ACL NACL-DMZ-SAP-Router is associated with the subnet for the DEV&PRD-SAP router shared by the production environment and the development and test environment. Configure outbound rules of network ACL NACL-DMZ-SAP-Router to allow access to specified service ports of the SAP application zone and SAP-DB zone in the production environment through the SAP router. Configure inbound rules of network ACL NACL-DMZ-SAP-Router to allow access to management ports (such as port 22) of servers in the subnet through the bastion host in the management zone.

IP addresses and ports in this section are only used as examples. If there are other management ports, you can add ACL rules as required. This section describes only network ACLs for the production environment.

Table 1 Outbound rules of network ACL NACL-DMZ-SAP-Router

Rule

Destination IP Address

Protocol

Destination Port

Allow or Deny

Description

For the PRD-application zone

172.22.8.0/24

TCP

234

Allow

Allows the SAP-Router server to access service port 234 of servers in the PRD-application zone.

For the PRD-SAP-DB zone

172.22.9.0/24

TCP

345

Allow

Allows the SAP-Router server to access service port 345 of servers in the PRD-SAP-DB zone.

*

0.0.0.0/0

Any

Any

Deny

Denies all inbound traffic that is not processed based on preset rules.

Table 2 Inbound rules of network ACL NACL-DMZ-SAP-Router

Rule

Source IP Address

Protocol

Destination Port

Allow or Deny

Description

For the PRD-management zone

172.22.6.0/24

TCP

22

Allow

Allows the bastion host in the management zone in the production environment to access the SSH ports of servers in the zone.

*

0.0.0.0/0

Any

Any

Deny

Denies all inbound traffic that is not processed based on preset rules.

Network ACL NACL-PRD-MGMT is associated with the subnet for the PRD-management zone in the production environment. Configure outbound rules of network ACL NACL-PRD-MGMT to allow access to management ports (such as port 22) of servers in other zones through the bastion host in the management zone and deny access from other zones to the bastion host in the management zone.

Table 3 Outbound rules of network ACL NACL-PRD-MGMT

Rule

Destination IP Address

Protocol

Destination Port

Allow or Deny

Description

For the PRD-DMZ zone

172.22.7.0/24

TCP

22

Allow

Allows the bastion host in the management zone in the production environment to access the SSH ports of servers in the PRD-DMZ zone.

For the PRD-application zone

172.22.8.0/24

TCP

22

Allow

Allows the bastion host in the management zone in the production environment to access the SSH ports of servers in the PRD-application zone.

For the PRD-SAP-DB zone

172.22.9.0/24

TCP

22

Allow

Allows the bastion host in the management zone in the production environment to access the SSH ports of servers in the PRD-SAP-DB zone.

For the DEV&PRD SAP router

172.22.1.0/24

TCP

22

Allow

Allows the bastion host in the management zone in the production environment to access the SSH port of the DEV&PRD-SAP-Router server.

*

0.0.0.0/0

Any

Any

Deny

Denies all outbound traffic that is not processed based on preset rules.

Table 4 Inbound rules of network ACL NACL-PRD-MGMT

Rule

Source IP Address

Protocol

Destination Port

Allow or Deny

Description

*

0.0.0.0/0

Any

Any

Deny

Denies all inbound traffic that is not processed based on preset rules.

Network ACL NACL-PRD-DMZ is associated with the subnet for the PRD-DMZ zone in the production environment. Configure inbound rules of network ACL NACL-PRD-DMZ to allow access to management ports (such as port 22) of servers in the zone through the bastion host in the management zone. Configure outbound rules of network ACL NACL-PRD-DMZ to allow access to required service ports in the PRD-application zone and PRD-SAP-DB zone through this subnet.

Table 5 Outbound rules of network ACL NACL-PRD-DMZ

Rule

Destination IP Address

Protocol

Destination Port

Allow or Deny

Description

For the PRD-application zone

172.22.8.0/24

TCP

8080

Allow

Allows hosts in the DMZ zone in the production environment to access service port 8080 of servers in the PRD-application zone.

For the PRD-application zone

172.22.8.0/24

TCP

8443

Allow

Allows hosts in the DMZ zone in the production environment to access service port 8443 of servers in the PRD-application zone.

For the PRD-SAP-DB zone

172.22.9.0/24

TCP

345

Allow

Allows hosts in the DMZ zone in the production environment to access service port 345 of servers in the PRD-SAP-DB zone.

*

0.0.0.0/0

Any

Any

Deny

Denies all outbound traffic that is not processed based on preset rules.

Table 6 Inbound rules of network ACL NACL-PRD-DMZ

Rule

Source IP Address

Protocol

Destination Port

Allow or Deny

Description

For the PRD-management zone

172.22.6.0/24

TCP

22

Allow

Allows the bastion host in the management zone in the production environment to access the SSH ports of servers in the zone.

*

0.0.0.0/0

Any

Any

Deny

Denies all inbound traffic that is not processed based on preset rules.

Network ACL NACL-PRD-APP is associated with the subnet for the PRD-application zone in the production environment. Configure inbound rules of network ACL NACL-PRD-APP to allow access to management ports (such as port 22) of servers in the zone through the bastion host in the management zone and allow access to service ports of servers in this subnet through the SAP router and PRD-DMZ zone. Configure outbound rules of network ACL NACL-PRD-APP to allow access to required service ports in the PRD-SAP-DB zone through this subnet.

Table 7 Outbound rules of network ACL NACL-PRD-APP

Rule

Destination IP Address

Protocol

Destination Port

Allow or Deny

Description

For the PRD-SAP-DB zone

172.22.9.0/24

TCP

345

Allow

Allows hosts in the application zone in the production environment to access service port 345 of servers in the PRD-SAP-DB zone.

*

0.0.0.0/0

Any

Any

Deny

Denies all outbound traffic that is not processed based on preset rules.

Table 8 Inbound rules of network ACL NACL-PRD-APP

Rule

Source IP Address

Protocol

Destination Port

Allow or Deny

Description

For the PRD-management zone

172.22.6.0/24

TCP

22

Allow

Allows the bastion host in the management zone in the production environment to access the SSH ports of servers in the zone.

For the DEV&PRD SAP router

172.22.1.0/24

TCP

234

Allow

Allows the SAP-Router server to access service port 234 of servers in the PRD-application zone.

For the PRD-DMZ zone

172.22.7.0/24

TCP

8080

Allow

Allows hosts in the DMZ zone in the production environment to access service port 8080 of servers in the PRD-application zone.

For the PRD-DMZ zone

172.22.7.0/24

TCP

8443

Allow

Allows hosts in the DMZ zone in the production environment to access service port 8443 of servers in the PRD-application zone.

*

0.0.0.0/0

Any

Any

Deny

Denies all inbound traffic that is not processed based on preset rules.

Network ACL NACL-PRD-SAPDB-BUSI is associated with the service subnet (172.22.9.0/24) for the PRD-SAP-DB zone in the production environment. Configure inbound rules of network ACL NACL-PRD-SAPDB-BUSI to allow access to management ports (such as port 22) of servers in the zone through the bastion host in the management zone and allow access to service ports of servers in this subnet through the SAP router, PRD-DMZ zone, and PRD-application zone.

Table 9 Outbound rules of network ACL NACL-PRD-SAPDB-BUSI

Rule

Destination IP Address

Protocol

Destination Port

Allow or Deny

Description

*

0.0.0.0/0

Any

Any

Deny

Denies all outbound traffic that is not processed based on preset rules.

Table 10 Inbound rules of network ACL NACL-PRD-SAPDB-BUSI

Rule

Source IP Address

Protocol

Destination Port

Allow or Deny

Description

For the PRD-management zone

172.22.6.0/24

TCP

22

Allow

Allows the bastion host in the management zone in the production environment to access the SSH ports of servers in the zone.

For the DEV&PRD SAP router

172.22.1.0/24

TCP

345

Allow

Allows the SAP-Router server to access service port 345 of servers in the PRD-SAP-DB zone.

For the PRD-DMZ zone

172.22.7.0/24

TCP

345

Allow

Allows hosts in the DMZ zone in the production environment to access service port 345 of servers in the PRD-SAP-DB zone.

For the PRD-application zone

172.22.8.0/24

TCP

345

Allow

Allows hosts in the application zone in the production environment to access service port 345 of servers in the PRD-SAP-DB zone.

*

0.0.0.0/0

Any

Any

Deny

Denies all inbound traffic that is not processed based on preset rules.

Network ACL NACL-PRD-SAPDB-INTERNAL is associated with the internal communication subnet (172.22.10-12.0/24) for the PRD-SAP-DB zone in the production environment. The internal communication subnet is used for only internal communication within a subnet and requires a network ACL to deny all inbound and outbound traffic.

Table 11 Outbound rules of network ACL NACL-PRD-SAPDB-INTERNAL

Rule

Destination IP Address

Protocol

Destination Port

Allow or Deny

Description

*

0.0.0.0/0

Any

Any

Deny

Denies all outbound traffic that is not processed based on preset rules.

Table 12 Inbound rules of network ACL NACL-PRD-SAPDB-INTERNAL

Rule

Source IP Address

Protocol

Destination Port

Allow or Deny

Description

*

0.0.0.0/0

Any

Any

Deny

Denies all inbound traffic that is not processed based on preset rules.

Security groups, such as SG_PRD_MGMT and SG_PRD_DB (which do not interact with the public network), are associated with Elastic Cloud Servers (ECSs) in the subnets in the production environment. The security groups must be configured according to the "minimum permission" principle so that a minimum number of ECS ports are opened. Figure 3 shows an example for configuring the security groups. You need to configure them based on your own ports. Network ACLs are used for IP address access control. Other security groups in the production environment (for details, see Figure 1) that do not interact with the public network can be configured similarly.

Figure 3 Security group rule example

Security groups, such as SG_SAP_ROUTER (which interacts with the public network), are associated with ECSs in the subnets in the production environment. The security groups must be configured according to the "minimum permission" principle so that a minimum number of ECS ports and source IP addresses are opened. If the public IP address is fixed, you can refer to Figure 3 for configuring the security groups. You need to configure them based on your own ports.

Figure 4 Security group rule example

If the public IP address is not fixed, you can create a security group rule to allow access from a specified public source IP address to meet your service requirements (such as the simulation test or technical support) and then delete the rule when it is not required.

Security groups, such as SG_PRD_SRM and SG_PRD_Hybrids (which interact with the public network), need to open their service ports to the entire network. Figure 5 shows an example for configuring the security groups. You need to configure them based on your own ports. Network ACLs are used for source IP address access control on management ports, such as ports 22 and 3389, so that only access through the bastion host in the management zone is allowed. Service ports, such as port 80, are opened to the entire Internet and will not be configured with source IP address access control. It is recommended that you use proper security products to protect these ports. For details, see Service Border.

Figure 5 Security group rule example