![VMware VSHIELD APP 1.0 - Скачать руководство пользователя страница 77](http://html1.mh-extra.com/html/vmware/vshield-app-1-0/vshield-app-1-0_admin-manual_1043347077.webp)
VMware, Inc.
77
Chapter 13 App Firewall Management
Create a Layer 2/Layer 3 App Firewall Rule
The
Layer
2/Layer
3
firewall
enables
configuration
of
allow
or
deny
rules
for
common
Data
Link
Layer
and
Network
Layer
requests,
such
as
ICMP
pings
and
traceroutes.
You
can
change
the
default
Layer
2/Layer
3
rules
from
allow
to
deny
based
on
your
network
security
policy.
Layer
2/Layer
3
firewall
rules
allow
or
deny
traffic
based
on
the
following
criteria:
To create a Layer 2/Layer 3 firewall rule
1
In
the
vSphere
Client,
go
to
Inventory
>
Hosts
and
Clusters
.
2
Select
a
datacenter
resource
from
the
resource
tree.
3
Click
the
vShield
App
tab.
4
Click
App
Firewall
.
5
Click
L2/L3
Rules
.
6
Click
Add
.
A
new
row
is
added
at
the
bottom
of
the
DataCenter
Rules
section
of
the
table.
7
Double
‐
click
each
cell
in
the
new
row
to
type
or
select
the
appropriate
information.
You
can
type
IP
addresses
in
the
Source
and
Destination
fields
8
(Optional)
Select
the
Log
check
box
to
log
all
sessions
matching
this
rule.
9
Click
Commit
.
Creating and Protecting Security Groups
The
Security
Groups
feature
enables
you
to
create
custom
containers
to
which
you
can
assign
resources,
such
as
virtual
machines
and
network
adapters,
for
App
Firewall
protection.
After
a
security
group
is
defined,
you
add
the
security
group
to
a
firewall
rule
for
protection.
Add a Security Group
In
the
vSphere
Client,
you
can
add
a
security
group
at
the
datacenter
resource
level.
To add a security group by using the vSphere Client
1
Click
a
datacenter
resource
from
the
vSphere
Client.
2
Click
the
vShield
App
tab.
3
Click
Security
Groups
.
4
Click
Add
Group
.
Criteria
Description
Source
(A.B.C.D/nn)
Container,
direction
in
relation
to
container,
or
IP
address
with
netmask
(nn)
from
which
the
communication
originated
Destination
(A.B.C.D/nn)
Container,
direction
in
relation
to
container,
or
IP
address
with
netmask
(nn)
which
the
communication
is
targeting
Protocol
Transport
protocol
used
for
communication
N
OTE
Layer
2/Layer
3
firewall
rules
can
also
be
created
from
the
Flow
Monitoring
report.
See
“Add
an
App
Firewall
Rule
from
the
Flow
Monitoring
Report”
on
page 69.
Содержание VSHIELD APP 1.0 -
Страница 11: ...VMware Inc 11 vShield Manager and vShield Zones...
Страница 12: ...vShield Administration Guide 12 VMware Inc...
Страница 16: ...vShield Administration Guide 16 VMware Inc...
Страница 20: ...vShield Administration Guide 20 VMware Inc...
Страница 26: ...vShield Administration Guide 26 VMware Inc...
Страница 36: ...vShield Administration Guide 36 VMware Inc...
Страница 44: ...vShield Administration Guide 44 VMware Inc...
Страница 48: ...vShield Administration Guide 48 VMware Inc...
Страница 49: ...VMware Inc 49 vShield Edge and Port Group Isolation...
Страница 50: ...vShield Administration Guide 50 VMware Inc...
Страница 60: ...vShield Administration Guide 60 VMware Inc...
Страница 61: ...VMware Inc 61 vShield App and vShield Endpoint...
Страница 62: ...vShield Administration Guide 62 VMware Inc...
Страница 66: ...vShield Administration Guide 66 VMware Inc...
Страница 72: ...vShield Administration Guide 72 VMware Inc...
Страница 80: ...vShield Administration Guide 80 VMware Inc...
Страница 87: ...VMware Inc 87 Appendixes...
Страница 88: ...vShield Administration Guide 88 VMware Inc...
Страница 132: ...vShield Administration Guide 132 VMware Inc...
Страница 146: ...vShield Administration Guide 146 VMware Inc...