After the generated Security Intelligence recommendation reaches the Ready to Publish status, you can review the recommendation, modify it if necessary, and decide whether to publish it.

Conditions préalables

Procédure

  1. From your browser, log in with the required privileges to an NSX Manager at https://<nsx-manager-ip-address>.
  2. Click Plan & Troubleshoot > Recommendations.
  3. (Facultatif) To help narrow down the list of recommendations being displayed, click Filter on the top right of the UI. Click Apply Filter, and select one or more filters from the drop-down menu.

    For example, after you click Apply Filter, select Basic Details > Monitoring > On to display only the recommendations that have monitoring parameter set to on.

  4. (Facultatif) If you decide not to use the generated recommendation, click Actions menu and select Delete.
  5. To begin reviewing and managing the details of the recommendation that has the status of Ready To Publish, click the Recommendation name's link, or click Actions menu and select Review & Publish.

    The Recommendations wizard is displayed, similar to the following image. In the Review Recommendations pane, the details for the recommendations are displayed in a split view. The top half of the pane shows a visualization of the recommendations in a graphical format. The bottom half of the pane lists the recommendations in a tabular format.


    Review Recommendations pane described by surrounding content.

  6. Use the top half of the pane to examine the graphical visualization of the recommendations.

    You can click specific nodes and flow arrows to see the details for the recommendations. You can point to the flow arrow between two group nodes to see which policy rules have been applied between groups or what services have been created. Right-click the flow arrow to filter the recommendation by the corresponding policy rules.

    Nodes with the recommended group icon icon on the edge indicate that the node represents a recommended group. You can right-click the node for a recommended group, rename the group, or edit the compute entity members that belong in that group. You can also right-click a group node and select Filter By to use the current group as the filter used to display details about the generated recommendation.

    Changes made using the graphical view of the recommendations are reflected in the table in the bottom half of the pane. Similarly, changes made to the recommendations info in the table are reflected in the graphical visualization.

  7. In the bottom half of the Review Recommendations pane, you can use the tabular view of the recommendations to see the details about the rules, groups, and services that are included in the recommendation. Use the Flows Used for Recommendations tab to see the unprotected traffic flows that were used to generate the recommendations.

    You can examine and modify any of the recommendation details, by clicking the Rules, Groups, or Services tab.

    In the Recommended Policies section, there are numbers displayed on the Rules, Groups, and Services tabs. These numbers indicate the number of new rules, groups, and services that are being recommended. They did not exist in the NSX inventory at the time the recommendation was generated. For example, in the screenshot above, the recommendation Services tab shows zero services being recommended. The services used by the groups existed in the NSX inventory at the time the recommendation was generated. So, there are no new services being recommended.

    Any changes that are applied to the rules in the Rules tab (such as adding, deleting, or editing a rule or section) are reflected immediately in both the Rules table and in the graphical visualization pane. In the Rules table, rules that have the New badge to the left of their name indicate that the rule is a newly generated rule, instead of an already existing DFW rule associated with the selected entities. If an existing rule was used, but there were no changes made to it, the row for the rule appears dimmed. If the Recommendation engine modified an existing rule, the row for that rule does not appear dimmed and it does not have the New badge next to it.

    1. To edit the details in the Sources, Destinations, or Applied To columns, point to the corresponding column and click the edit icon edit icon.

      In the resulting dialog box (for example, Set Source Groups), review the newly recommended groups or existing groups that the recommendation engine generated. If you add or remove groups, click Save.

    2. If you want to rename a recommended group, click the link for the group name in the Groups tab. In the Group Detail dialog box, click Group Definition, and in the Name text box, type a new name for the recommended group. Click Save.
    3. To define how the packets are to be handled when encountering the DFW rule, select Allow, Drop, or Reject in the Action column.
    4. To activate or deactivate the DFW rule, toggle the button on the right-side of the Action column. By default the rule that was generated is set to Activated when the recommendation was published.
    5. To review the details about the groups in the recommendation, click the Groups tab.

      Before you delete a group, make sure that there are no rules using the group.

    6. Click the link in the Members column to review the details about the VMs, IPs, and physical servers that were set for the group recommendation.
    7. Click Actions menu next to the group's name and select Edit to modify the group recommendation.
    8. Click the Services tab and review the details.
    9. Click Actions menu next to the service's name and select Edit to modify the name or description.

      Before you delete a service, make sure that there are no rules that are using the service.

    10. Click the gear icon gear icon on the far right of the row to review and manage the settings used to generate the recommendation.
  8. To continue publishing the recommendation, click Proceed.

    Alternatively, click Continue Later to save any changes you have made and exit the recommendation review session.

  9. In the Sequence & Publish pane, define the order in which the newly recommended security policies are to be applied in relation to the existing DFW rules.
    Note :

    If you selected to reuse a firewall section, you cannot move and reorder the recommended policy. You can only reorder new recommended policies.

    1. Select the row for the new security policy recommendation.
    2. Click the Actions menu icon Actions menu on the leftmost side of the row for the newly recommended security policies listed.
    3. To move the selected row for the newly recommended security policy to a location above or below the row for the existing security policy, select Move selected policies above this policy or Move selected policies below this policy from the displayed menu.

      Alternatively, you can drag the currently selected new policy recommendation row up or down to the order location that you prefer.

  10. Click Publish.

    To discontinue reviewing the recommendation, click Cancel.

  11. In the Publish Recommendations dialog box, click Yes.
  12. In the Policies published dialog box, click Dismiss to close the dialog box, or click View in Distributed Firewall Table to view the security policies that were just published in the Security > Distributed Firewall > All Rules tab.

    Back in the Plan & Troubleshoot > Recommendations pane, the Status column for the recommendation you just published is changed to Published in the Recommendations table.

Résultats

After the security policy recommendations have been published successfully, they are in read-only mode in the Plan & Troubleshoot > Recommendations tab. To view and manage the published rule recommendations, go to Security > Distributed Firewall.

Important :

After you have published the rule recommendations, the visualization continues to display the affected flows between the compute entities as red-hued arrows (Unprotected Flows) until new flows are generated between the affected compute entities. The visualization only reports traffic flows based on the time when they occurred on the host and does not reflect the rule set published after the traffic flows occurred. After the rule set is published and new traffic flows are generated, the new flows are displayed as green-hued arrows (allowed flows).