
VM-Series
Deployment
Guide
63
The VM-Series NSX Edition Firewall
Deploy the VM-Series NSX Edition Firewall
Do not apply the traffic redirection policies that you created above unless you understand how rules work on
the NSX Manager as well as on the VM-Series firewall and Panorama. The default policy on the VM-Series
firewall is set to
deny all
traffic, which means that all traffic redirected to the VM-Series firewall will be dropped.
To create policies on Panorama and push them to the VM-Series firewall, see
Apply Policies to the VM-Series
Firewall
. To apply the redirection policies, see
Apply the Security Policies on the NSX Manager
.
Apply Policies to the VM-Series Firewall
Now that you have created the security policies on the NSX Manager, the names of the security groups that are
referenced in security policy will be available on Panorama. You can now use Panorama for centrally
administering policies on the VM-Series firewalls.
To manage centralized policy, you must first create Dynamic Address Group(s) that match on the name of the
security group(s) you defined on the NSX Manager. Then, you attach the Dynamic Address Group as a source
or destination address in security policy and push it to the firewalls; the firewalls can dynamically retrieve the IP
addresses of the virtual machines that are included in each security group to enforce compliance for traffic that
originates from or is destined to the virtual machines in the specified group.