Configuring Distributed Firewall(Micro-segmentation) - NSX-T
Distributed Firewall
VMware Cloud Director supports a distributed firewall service for data center groups with an NSX-T Data Center network provider type. When you enable a distributed firewall for a data center group with a NSX-T Data Center network provider type, you create a single default security policy that is applied to the data center group. As an organization administrator, you can create and modify additional distributed firewall rules which are associated with the data center group's default security policy. By using distributed firewall, you can apply a set of level 3 firewall rules across a single data center group.
Activate distributed firewall to a Data Center Group
The distributed firewall service is not enabled by default. After enabling the distributed firewall, you can create IP sets and security groups to facilitate the creation of distributed firewall rules. The distributed firewall rules that you create apply only to the workloads that are attached to the data center group networks.
Be careful, activation of the Distributed Firewall feature incurs additional cost to your vDC.
Add a Distributed Firewall Rule to a Data Center Group
To create distributed firewall rules and add them to a data center group, you must first create IP sets, Static Group or Dynamic Group.
IP sets are groups of IP addresses and networks to which the distributed firewall rules apply. Combining multiple objects into IP sets helps you to reduce the total number of distributed firewall rules to be created.
Static security groups are static groups of data center group networks to which distributed firewall rules apply.
Dynamic security group are dynamic groups of data center group networks to which distributed firewall rules apply. Criterion for inclusion in the group, add up to four rules that apply either to a VM name or to a VM security tag.
The distributed firewall rules that you create apply only to workloads that are attached to the data center group networks. During creating this fields must be specified:
Option | Description |
---|---|
Name | Enter a name for the rule. |
State | To enable the rule upon creation, toggle on the State option. |
Applications | (Optional) To select a specific port profile to which the rule applies, turn on the Applications toggle and click Save. |
Context | (Optional) Select an NSX-T Data Center context profile for the rule. |
Source | Select the source traffic and click Keep.
|
Destination | Select the destination traffic and click Keep.
|
Action | From the Action drop-down menu, select whether to allow or deny traffic from or to specific sources.
|
IP Protocol | Select whether to apply the rule to IPv4 or IPv6 traffic. |
Enable logging. | To have the address translation performed by this rule logged, turn on the Enable logging toggle. |
Â