vShield Administration Guide
78
VMware, Inc.
5
Double
‐
click
the
row
and
type
a
name
for
the
group.
6
Click
Add
.
After
security
group
creation
is
complete,
assign
resources
to
the
group.
Assign Resources to a Security Group
You
can
assign
virtual
machines
and
network
adapters
to
a
security
group.
These
resources
have
associated
IP
addresses
that
define
the
source
or
destination
parameters
for
which
an
App
Firewall
rule
enforces
an
access
policy.
To assign resources to a security group
1
Click
a
datacenter
resource
from
the
vSphere
Client.
2
Click
the
vShield
App
tab.
3
Click
Security
Groups
.
4
Click
the
arrow
next
to
the
name
of
a
security
group
to
expand
the
details
of
the
group.
5
Select
a
vNIC
from
the
drop
‐
down
list
and
click
Add
.
The
selected
vNIC
appears
under
vNIC
Membership.
Repeat
these
steps
for
each
vNIC
you
want
to
place
in
this
security
group.
6
Click
Commit
.
After
assigning
resources,
add
the
security
group
to
a
firewall
rule
as
a
container.
See
“Create
an
App
Firewall
Rule”
on
page 75.
Validating Active Sessions against the Current App Firewall Rules
By
default,
a
vShield
Edge
matches
firewall
rules
against
each
new
session.
After
a
session
has
been
established,
any
firewall
rule
changes
do
not
affect
active
sessions.
The
CLI
command
validate sessions
enables
you
to
validate
active
sessions
that
are
in
violation
of
the
current
rule
set.
You
would
use
this
procedure
for
the
following
scenarios:
You
updated
the
firewall
rule
set.
After
a
firewall
rule
set
update,
you
should
validate
active
sessions
to
purge
any
existing
sessions
that
are
in
violation
of
the
updated
policy.
You
viewed
sessions
in
Flow
Monitoring
and
determined
that
an
existing
or
historical
flow
requires
a
new
access
rule.
After
creating
a
firewall
rule
that
matches
the
offending
session,
you
should
validate
active
sessions
to
purge
any
existing
sessions
that
are
in
violation
of
the
updated
policy.
After
the
App
Firewall
update
is
complete,
issue
the
validate sessions
command
from
the
CLI
of
a
vShield
App
to
purge
sessions
that
are
in
violation
of
current
policy.
To validate active sessions against the current firewall rules
1
Update
and
commit
the
App
Firewall
rule
set
at
the
appropriate
container
level.
2
Open
a
console
session
on
a
vShield
App
issue
the
validate sessions
command.
vShieldApp> enable
Password:
vShieldApp# validate sessions
Содержание VSHIELD APP 1.0 -
Страница 11: ...VMware Inc 11 vShield Manager and vShield Zones...
Страница 12: ...vShield Administration Guide 12 VMware Inc...
Страница 16: ...vShield Administration Guide 16 VMware Inc...
Страница 20: ...vShield Administration Guide 20 VMware Inc...
Страница 26: ...vShield Administration Guide 26 VMware Inc...
Страница 36: ...vShield Administration Guide 36 VMware Inc...
Страница 44: ...vShield Administration Guide 44 VMware Inc...
Страница 48: ...vShield Administration Guide 48 VMware Inc...
Страница 49: ...VMware Inc 49 vShield Edge and Port Group Isolation...
Страница 50: ...vShield Administration Guide 50 VMware Inc...
Страница 60: ...vShield Administration Guide 60 VMware Inc...
Страница 61: ...VMware Inc 61 vShield App and vShield Endpoint...
Страница 62: ...vShield Administration Guide 62 VMware Inc...
Страница 66: ...vShield Administration Guide 66 VMware Inc...
Страница 72: ...vShield Administration Guide 72 VMware Inc...
Страница 80: ...vShield Administration Guide 80 VMware Inc...
Страница 87: ...VMware Inc 87 Appendixes...
Страница 88: ...vShield Administration Guide 88 VMware Inc...
Страница 132: ...vShield Administration Guide 132 VMware Inc...
Страница 146: ...vShield Administration Guide 146 VMware Inc...