VMware, Inc.
69
Chapter 12 Flow Monitoring
7
Select
a
destination
IP
address.
8
Source
a
source
IP
address.
At
the
source
IP
address
level,
you
can
create
an
App
Firewall
rule
based
on
the
specific
source
and
destination
IP
addresses.
To view the Flow Monitoring report
1
In
the
vSphere
Client,
go
to
Inventory
>
Hosts
and
Clusters
.
2
Select
a
datacenter
or
cluster
resource
from
the
resource
tree.
3
Click
the
vShield
App
tab.
4
Click
Flow
Monitoring
.
The
charts
update
to
display
the
most
current
information
for
the
last
seven
days.
This
might
take
several
seconds.
5
Click
Show
Report
.
6
Drill
down
into
the
report.
7
Click
Show
Latest
to
update
the
report
statistics.
Add an App Firewall Rule from the Flow Monitoring Report
By
drilling
down
into
the
traffic
data,
you
can
evaluate
the
use
of
your
resources
and
send
session
information
to
App
Firewall
to
create
a
new
Layer
4
allow
or
deny
rule.
App
Firewall
rule
creation
from
Flow
Monitoring
data
is
available
at
the
datacenter
and
cluster
levels
only.
To add an App Firewall rule from the Flow Monitoring report
1
In
the
vSphere
Client,
go
to
Inventory
>
Hosts
and
Clusters
.
2
Select
a
datacenter
resource
from
the
resource
tree.
3
Click
the
vShield
App
tab.
4
Click
Flow
Monitoring
.
The
charts
update
to
display
the
most
current
information
for
the
last
seven
days.
This
might
take
several
seconds.
5
Click
Show
Report
.
6
Expand
the
firewall
action
list.
7
Expand
the
Layer
4
protocol
list.
8
Expand
the
traffic
direction
list.
9
Expand
the
port
type
list.
10 Expand
the
application
or
port
list.
11 Expand
the
destination
IP
address
list.
12 Review
the
source
IP
addresses.
13 Select
the
Zones
Firewall
column
radio
button
for
a
source
IP
address
to
create
an
App
Firewall
rule.
A
pop
‐
up
window
opens.
Click
Ok
to
proceed.
The
App
Firewall
table
appears.
A
new
table
row
is
displayed
at
the
bottom
of
the
Data
Center
Low
Precedence
Rules
or
Cluster
Level
Rules
section
with
the
session
information
completed.
Содержание VSHIELD APP 1.0 -
Страница 11: ...VMware Inc 11 vShield Manager and vShield Zones...
Страница 12: ...vShield Administration Guide 12 VMware Inc...
Страница 16: ...vShield Administration Guide 16 VMware Inc...
Страница 20: ...vShield Administration Guide 20 VMware Inc...
Страница 26: ...vShield Administration Guide 26 VMware Inc...
Страница 36: ...vShield Administration Guide 36 VMware Inc...
Страница 44: ...vShield Administration Guide 44 VMware Inc...
Страница 48: ...vShield Administration Guide 48 VMware Inc...
Страница 49: ...VMware Inc 49 vShield Edge and Port Group Isolation...
Страница 50: ...vShield Administration Guide 50 VMware Inc...
Страница 60: ...vShield Administration Guide 60 VMware Inc...
Страница 61: ...VMware Inc 61 vShield App and vShield Endpoint...
Страница 62: ...vShield Administration Guide 62 VMware Inc...
Страница 66: ...vShield Administration Guide 66 VMware Inc...
Страница 72: ...vShield Administration Guide 72 VMware Inc...
Страница 80: ...vShield Administration Guide 80 VMware Inc...
Страница 87: ...VMware Inc 87 Appendixes...
Страница 88: ...vShield Administration Guide 88 VMware Inc...
Страница 132: ...vShield Administration Guide 132 VMware Inc...
Страница 146: ...vShield Administration Guide 146 VMware Inc...