After the generated NSX Intelligence recommendation reaches the Ready to Publish status, you can review the recommendation, modify it if necessary, and decide whether to publish it.
Procedure
- From your browser, log in with enterprise administrator privileges to an NSX Manager at https://<nsx-manager-ip-address>.
- Click .
- To help narrow down the list of recommendations being displayed, click Filter by Name, Path or more on the top right of the screen, and specify the filter criteria to be used.
- If you decide not to use the recommendation, click the three-dot menu icon and select Delete.
- To view the summary for a recommendation, click the arrowhead next to the recommendation's name to expand the row.
You see the number of rules generated and the number of groups affected.
- Review and manage the details of the recommendation.
- Click the recommendation's name.
The
Recommendations wizard is displayed, similar to the following image.
- In the Recommended FW Rules tab, review the firewall rule details. To modify any of the details, click the value in the appropriate column and select the edit (pencil) icon.
- To define how the packets are to be handled, select Allow, Drop, or Reject in the Action column.
- Toggle the button on the right-side to enable or disable the rule. By default the rule that was generated is set to be enabled when published, as shown in the image in the previous step.
- Click Recommended Groups.
- Click the link in the Members column to review the details about the VMs and IPs that were set for the group recommendation.
- Click the menu icon (three-dots) next to the group's name and select Edit to modify the group recommendation.
- Click Recommended Services and review the details.
- Click the menu icon (three-dots) next to the service's name and select Edit to modify the name or description. Before you delete a service, make sure that there are no rules using the service.
- Click Next.
- In the Place rules in FW context pane, you can change the order in which the rule recommendation is to be applied with the existing firewall rules. Drag the highlighted section, or click the three-dot menu icon and select Move Above selected section or Move Below selected section.
- Click Publish.
- In the Publish Recommendations dialog box, click Yes.
- In the Enforcement Summary page, verify that the security policies have been published successfully and click Close.
The Status column for the recommendation is changed to Published in the table of Recommendations.
Results
Once the security policy recommendations have been published successfully, they are in read-only mode in the
tab. To view and manage the published rule recommendations, go to
.
Important: After you have published the rule recommendations, the visualization continues to display the affected flows between the VMs as orange-hued arrows (Unprotected Flows) until new flows are generated between the affected VMs. The visualization only reports traffic flows based on the time when they occurred on the host and does not reflect the rule set published after those traffic flows occurred. After the rule set is published and new traffic flows are generated, the new flows are displayed as green-hued arrows (Allowed Flows).