You can add firewall rules to a vApp network that supports a firewall. You can create rules to allow or deny traffic that matches the rules to pass through the firewall.

About this task

For a firewall rule to be enforced, you must enable the firewall for the vApp network. See Configure the Firewall for a vApp Network.

When you add a new firewall rule to a vApp network, it appears at the end of the firewall rule list. For information about setting the order in which firewall rules are enforced, see Reorder Firewall Rules for a vApp Network.

If a system administrator specified syslog server settings and those settings were applied to the vApp network, then you can log firewall rule events. For information about applying syslog server settings, see Apply Syslog Server Settings to a vApp Network. To view the current syslog server settings, see View Syslog Server Settings for a vApp Network.

Prerequisites

A routed vApp network.

Procedure

  1. Click the My Cloud tab and click vApps in the left pane.
  2. Right-click a vApp and select Open.
  3. On the Networking tab, select Show networking details.
  4. Right-click the vApp network and select Configure Services.
  5. Click the Firewall tab and click Add.
  6. Type a name for the rule.
  7. Type the traffic Source.

    Option

    Description

    IP address

    Type a source IP address to apply this rule on.

    Range of IP addresses

    Type a range of source IP addresses to apply this rule on.

    CIDR

    Type the CIDR notation of traffic to apply this rule on.

    internal

    Apply this rule to all internal traffic.

    external

    Apply this rule to all external traffic.

    any

    Apply this rule to traffic from any source.

  8. Select a Source port to apply this rule on from the drop-down menu.
  9. Type the traffic Destination.

    Option

    Description

    IP address

    Type a destination IP address to apply this rule on.

    Range of IP addresses

    Type a range of destination IP addresses to apply this rule on.

    CIDR

    Type the CIDR notation of traffic to apply this rule on.

    internal

    Apply this rule to all internal traffic.

    external

    Apply this rule to all external traffic.

    any

    Apply this rule to traffic with any destination.

  10. Select the Destination port to apply this rule on from the drop-down menu.
  11. Select the Protocol to apply this rule on from the drop-down menu.
  12. Select the action.

    A firewall rule can allow or deny traffic that matches the rule.

  13. Select the Enabled check box.
  14. (Optional) : Select the Log network traffic for firewall rule check box.

    If you enable this option, vCloud Director sends log events to the syslog server for connections affected by this rule. Each syslog message includes logical network and organization UUIDs.

  15. Click OK and click OK again.
  16. Click Apply.