Installing Intercloud Fabric Firewall



Similar documents
Cisco Intercloud Fabric Getting Started Guide, Release 2.3.1

Understanding Cisco Cloud Fundamentals CLDFND v1.0; 5 Days; Instructor-led

Implementing and Troubleshooting the Cisco Cloud Infrastructure **Part of CCNP Cloud Certification Track**

Installation Guide Avi Networks Cloud Application Delivery Platform Integration with Cisco Application Policy Infrastructure

Installing and Configuring vcloud Connector

TechNote. Configuring SonicOS for Amazon VPC

Using the Advanced GUI

Installing and Configuring vcloud Connector

Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide. Revised February 28, :32 pm Pacific

Cisco Virtual Security Gateway for Nexus 1000V Series Switch

Setting the Management IP Address

Installing the Cisco Nexus 1000V for Microsoft Hyper-V

Direct Attached Storage

Cisco Prime Network Services Controller. Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems

vshield Quick Start Guide

Cisco - Configure the 1721 Router for VLANs Using a Switch Module (WIC-4ESW)

Installing and Configuring vcenter Support Assistant

Virtual Data Centre. User Guide

Installing and Using the vnios Trial

Cisco Hybrid Cloud Solution: Deploy an E-Business Application with Cisco Intercloud Fabric for Business Reference Architecture

Guide to the LBaaS plugin ver for Fuel

CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC

vsphere Networking ESXi 5.0 vcenter Server 5.0 EN

App Orchestration 2.5

TechNote. Configuring SonicOS for MS Windows Azure

vsphere Networking vsphere 5.5 ESXi 5.5 vcenter Server 5.5 EN

Reference to common tasks

VMware vcloud Air Networking Guide

vcloud Air - Virtual Private Cloud OnDemand Networking Guide

Network Load Balancing

Configuring Global Protect SSL VPN with a user-defined port

How to Create a Virtual Switch in VMware ESXi

Biznet GIO Cloud Connecting VM via Windows Remote Desktop

CCNA DATA CENTER BOOT CAMP: DCICN + DCICT

F-Secure Messaging Security Gateway. Deployment Guide

StarWind Virtual SAN Installation and Configuration of Hyper-Converged 2 Nodes with Hyper-V Cluster

Administration Guide for the System Center Cloud Services Process Pack

Cisco Intercloud Fabric Security Features: Technical Overview

Cisco Nexus 1000V Switch for Microsoft Hyper-V

VX 9000E WiNG Express Manager INSTALLATION GUIDE

vshield Quick Start Guide vshield Manager 4.1 vshield Edge 1.0 vshield App 1.0 vshield Endpoint 1.0

vsphere Replication for Disaster Recovery to Cloud

How to Create VLANs Within a Virtual Switch in VMware ESXi

HP Intelligent Management Center v7.1 Virtualization Monitor Administrator Guide

Building a Penetration Testing Virtual Computer Laboratory

vsphere Replication for Disaster Recovery to Cloud

Installing and Setting up Microsoft DNS Server

Deployment Guide AX Series for Palo Alto Networks Firewall Load Balancing

vcloud Director User's Guide

Citrix XenServer Workload Balancing Quick Start. Published February Edition

About the VM-Series Firewall

Configuring Virtual Switches for Use with PVS. February 7, 2014 (Revision 1)

Bosch Video Management System High availability with VMware

VMware for Bosch VMS. en Software Manual

Lab Configuring Access Policies and DMZ Settings

Monitoring Traffic. Traffic Monitoring. This chapter includes the following sections:

VM-Series Firewall Deployment Tech Note PAN-OS 5.0

Implementing Microsoft Windows Server Failover Clustering (WSFC) and SQL Server 2012 AlwaysOn Availability Groups in the AWS Cloud

VMware Quick Start Guide

IaaS Configuration for Cloud Platforms

Adding Traffic Sources to a Monitoring Session, page 7 Activating a Traffic Monitoring Session, page 8 Deleting a Traffic Monitoring Session, page 9

vshield Quick Start Guide

Juniper Networks Management Pack Documentation

INTEGRATING RECOVERPOINT FOR VIRTUAL MACHINES AND CISCO ACI

Virtualizing your Datacenter

Getting Started with Database Provisioning

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches

uh6 efolder BDR Guide for Veeam Page 1 of 36

This How To guide will take you through configuring Network Load Balancing and deploying MOSS 2007 in SharePoint Farm.

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services

Deployment and Configuration Guide

Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM

Integrating CoroSoft Datacenter Automation Suite with F5 Networks BIG-IP

KeyControl Installation on Amazon Web Services

RealPresence Platform Director

CTERA Cloud Onramp for IBM Tivoli Storage Manager

Altor Virtual Network Security Analyzer v1.0 Installation Guide

ESX Configuration Guide

GCloud 7 Hybrid Cloud Management Service- Service Description Issue 1

How To Create A Virtual Private Cloud On Amazon.Com

Set Up a VM-Series Firewall on the Citrix SDX Server

Configuring IPsec VPN with a FortiGate and a Cisco ASA

Virtualization, SDN and NFV

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch

Index C, D. Background Intelligent Transfer Service (BITS), 174, 191

Introduction to Mobile Access Gateway Installation

vshield Administration Guide

Network Agent Quick Start

vrealize Air Compliance OVA Installation and Deployment Guide

Configuring MassTransit Server to listen on ports less than 1024 using WaterRoof on Macintosh Workstations

Active Directory integration with CloudByte ElastiStor

Lab Configuring Access Policies and DMZ Settings

ESXi Configuration Guide

Scenario: Remote-Access VPN Configuration

Expert Reference Series of White Papers. vcloud Director 5.1 Networking Concepts

VMware vsphere Data Protection

In order to upload a VM you need to have a VM image in one of the following formats:

Acronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide

Using Cisco UC320W with Windows Small Business Server

Transcription:

This chapter contains the following sections: Information About the Intercloud Fabric Firewall, page 1 Prerequisites, page 1 Guidelines and Limitations, page 2 Basic Topology, page 2 Intercloud Fabric Firewall Installation Workflow, page 2 Information About the Intercloud Fabric Firewall The Intercloud Fabric Firewall (VSG) is a virtual appliance that provides trusted access to secure virtualized data centers in provider cloud environments while meeting the requirements of dynamic policy-based operations, mobility-transparent enforcement, and scale-out deployment for dense multi-tenancy. The Intercloud Fabric Firewall helps ensure that access to trust zones is controlled and monitored through established security policies. The Intercloud Fabric Firewall offers the benefits of workload virtualization, enhanced compliance with corporate security policies and industry regulations, and simplified security audits. It provides protection to virtual machines in cloud environments from potentially harmful network traffic, including unauthorized Internet users trying to access virtual machines through the public interface of an Intercloud Fabric Router (CSR) or a cloud virtual machine and from unauthorized internal users trying to access through a site-to-site secure tunnel. Deploying the Intercloud Fabric Firewall can help customers extend their private cloud security policy to protect their application workloads running at provider clouds. The Intercloud Fabric Firewall also provides logical isolations between virtual machine groups through support for three-tiered applications in an Intercloud Fabric environment. Based on security requirements, virtual machines can be defined as part of logical groups and the Intercloud Fabric Firewall can be applied on the virtual machine groups. Prerequisites Intercloud Fabric Director is installed. 1

Guidelines and Limitations Infrastructure setup and Intercloud Fabric Cloud setup is complete. Promiscuous mode is enabled on the Intercloud Fabric Extender trunk port if a port group is used for the Intercloud Fabric Extender trunk interface. The complete VLAN range is enabled in the port group that is bound to the trunk interface in the Intercloud Fabric Extender. Guidelines and Limitations You can also add the Intercloud Fabric Firewall service after you create the Intercloud Fabric Cloud instance. See Managing Services Basic Topology The following figure displays the basic topology for the Intercloud Fabric Firewall. Figure 1: Intercloud Fabric Firewall Basic Topology Intercloud Fabric Firewall Installation Workflow The installation workflow for the Intercloud Fabric Firewall includes these steps: 2

Creating an Intercloud Fabric Cloud Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Create the Intercloud Fabric Firewall template and service interface from Intercloud Fabric. See Creating an Intercloud Fabric Cloud, if you plan to enable the service, while creating an Intercloud Fabric Cloud. See Managing Services if you have not enabled the service while creating an Intercloud Fabric Cloud. Instantiate Intercloud Fabric Firewall See Instantiating Intercloud Fabric Firewall, on page 12. Configure compute security profiles. See Configuring Compute Security Profiles, on page 14. Create a service path. See Creating a Service Path, on page 15. Bind the service path to the port profile. See Binding a Service Path to a Port Profile. Edit the port profile for the cloud virtual machine to enable firewall services. See Editing Port Profiles for the Intercloud Fabric Firewall, on page 17. Verify the installation. See Verifying the Installation of Intercloud Fabric Firewall, on page 18. Creating an Intercloud Fabric Cloud Use this procedure to create an Intercloud Fabric Cloud. Before You Begin You have created a provider account. You know the credentials for the cloud provider. You have created a tunnel network with the name icftunnelnet. This is applicable only for Intercloud Fabric in OpenStack environments. You have installed the infrastructure components. You have configured the port profiles for the Distributed Virtual Switch such as Cisco Nexus 1000V, VMware vswitch, or VMware VDS, or Microsoft Hyper-V switch in the private cloud. You have created Intercloud Fabric infrastructure policies such as the MAC pool, tunnel profile, and static IP pool. Optionally, you can configure Native VLAN as the VLAN used for your VM Network in vcenter. Native VLAN is useful in flat network environments where only one VLAN is present in the network. 3

Creating an Intercloud Fabric Cloud If you are using Cisco Nexus 1000V in the private cloud, you have added the Cisco Nexus 1000V switch to Intercloud Fabric. See Adding a Network Element. Configure the required VLANs for the networks that needs to be extended into the Intercloud Fabric Extender trunk port profile. You have uploaded the services bundle to manage services. Choose Intercloud > Infrastructure > Upload Services Bundle to upload the services bundle. Note It is not required to upload the services bundle to manage Intercloud Fabric Router (Integrated). Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Log in to the Intercloud Fabric. Choose Intercloud > IcfCloud. In the IcfCloud window, choose the IcfCloud tab. In the IcfCloud tab, click the Setup button. The Cloud Setup wizard appears. Complete the following fields for Account Credentials: Note Many of the fields in the following table are displayed only if you choose to create a new provider account. In addition, the fields that are displayed are specific to the provider. Cloud field The name of the virtual account that you are creating in Intercloud Fabric Director. This name can contain from 1 to 16 alphanumeric characters, including hyphens, underscores, periods, and colons. You cannot change this name after the object has been saved. Cloud Type drop-down list Sub Type drop-down list Provider Account drop-down list Provider Account field Access ID field Choose the provider cloud type. Choose the sub type (Classic or VPC) for Amazon Web Services. Choose an existing provider or choose to create a new provider account. Based on the selected provider account, the appropriate fields are displayed. The name of the provider account. The alphanumeric text string that identifies the account owner. 4

Creating an Intercloud Fabric Cloud Access Key field URI field Username field Password field Validate Credentials button Location drop-down list Provider VPC drop-down list Provider Private Subnet drop-down list The unique key for the account. The unique resource identifier for the account. The username. The password. Click to validate credentials. You must validate the credentials to populate the remaining fields. Choose the location of the provider cloud. Choose the provider VPC for the provider cloud. Choose the provider private subnet for the provider cloud. Step 6 Step 7 Click Next. Complete the following fields for Configuration Details: Network Configuration MAC Pool drop-down list Tunnel Profile drop-down list IP Group drop-down list Private Subnet drop-down list Check the Advanced check box to create new polices or click Next to proceed with the default values. Choose a default or existing MAC pool, or choose to create a new MAC pool. See Adding a MAC Address Pool to create a new MAC pool. Choose a default or existing tunnel profile, or choose to create a new tunnel profile. See Configuring a Tunnel Profile to create a new tunnel profile. Choose a default or existing IP group, or choose to create a new IP group. See Adding an IP Group to create a new IP group. Choose a default or existing private subnet, or choose to create a private subnet. See Adding a Private Subnet to create a new private subnet. Services 5

Creating an Intercloud Fabric Cloud ICF Firewall (VSG) check box ICF Router (Integrated) check box ICF Router (CSR) check box Cloud Services Router (CSR) Management VLAN field Check the ICF Firewall check box to create an Intercloud Fabric Firewall (VSG) template. Selecting the service results in the service template being made available for this cloud. To configure the service, use PNSC. See, on page 1. Supported on Azure clouds only. Check the ICF Router (Integrated) check box to create an ICF Router (Integrated) instance on the associated Intercloud Fabric Cloud instance. After the ICF Router (Integrated) is instantiated, you can configure it in Prime Network Services Controller as described in Installing and Configuring Intercloud Fabric Router (Integrated) Workflow. Check the ICF Router (CSR) check box to create an Intercloud Fabric Router (CSR ) template. Selecting the service results in the service template being made available for this cloud. To configure the service, use PNSC. See Installing and Configuring Intercloud Fabric Router (CSR). Enter the management VLAN ID for the Intercloud Fabric Router (CSR). This VLAN is used to manage Intercloud Fabric Router (CSR) To be able to select this property, you must check the ICF Router (CSR) check box. Step 8 Step 9 Click Next. Complete the following fields for Secure Cloud Extension: Intercloud Extender Network VM Manager drop-down list Complete the following fields for the Intercloud Fabric Extender. Choose a VM manager for the Intercloud Fabric Extender. 6

Creating an Intercloud Fabric Cloud Datacenter drop-down list Data Trunk Network drop-down list Management Interface Network drop-down list Management VLAN field Management IP Pool Policy drop-down list Separate Mgmt and Tunnel Interface check box Tunnel Interface Network drop-down list Choose a datacenter to deploy the Intercloud Fabric Extender. Choose the trunk interface on the Intercloud Fabric Extender for data traffic. Choose the management interface on the Intercloud Fabric Extender for data traffic. Choose the VLAN for the management interface. This VLAN must match the VLAN specified in the management IP pool policy. Choose the IP pool policy for the management interface or create a new IP pool policy. See Creating a Static IP Pool Policy to create a new IP pool policy. Check this check box to use different VLANs for the management interface and tunnel interface. If this check box is not checked, then by default, the same VLAN is used for the tunnel interface and the management interface. To be able to select this property, you must check the Advanced check box. Choose the tunnel interface on the Intercloud Fabric Extender for data traffic. This drop-down list displays only if you check the Separate Mgmt and Tunnel Interface check box. 7

Creating an Intercloud Fabric Cloud Tunnel VLAN field Tunnel IP Pool Policy drop-down list Choose the VLAN for the tunnel interface. This field displays only if you check the Separate Mgmt and Tunnel Interface check box. Choose the IP pool policy for the tunnel interface or create a new IP pool policy. See Creating a Static IP Pool Policy to create a new IP pool policy. This drop-down list displays only if you check the Separate Mgmt and Tunnel Interface check box. Intercloud Extender Placement / Association ICX drop-down list Host drop-down list Datastore drop-down list (Microsoft environments only) Select the host for the Intercloud Fabric Extender. To specify the datastore for a Primary Intercloud Extender and Secondary Intercloud Extender, check the Advanced check box and then check the High Availability check box. Select the host for the Intercloud Fabric Extender. For high availability, check the Advanced check box and then check the High-Availability check box to specify the host for the Primary Intercloud Extender and Secondary Intercloud Extender. Select the datastore for the Intercloud Fabric Extender. For high availability, check the Advanced check box and then check the High-Availability check box to specify the datastore for the Primary Intercloud Extender and Secondary Intercloud Extender. To be able to select this property, you must check the Advanced check box. 8

Creating an Intercloud Fabric Cloud Intercloud Switch Network Management VLAN field Management IP Pool Policy drop-down list Complete the following fields for the Intercloud Fabric Switch in the cloud. To be able to select this property, you must check the Advanced check box. Choose the VLAN for the management interface. Choose the IP policy for the management interface or create a new IP pool policy. See Creating a Static IP Pool Policy to create a new IP pool policy. Native VLAN (Optional) Native VLAN field VSG Service Interface VLAN field IP Pool Policy drop-down list VSG Management VSG Management VLAN field Optionally, you can configure Native VLAN as the VLAN used for your VM Network in vcenter. Native VLAN is useful in flat network environments where only one VLAN is present in the network. To be able to select this property, you must check the ICF Firewall (VSG) check box. This service interface is created on the Intercloud Fabric Switch and is used to communicate with the Intercloud Fabric Firewall data interface. Choose the VLAN for the service interface. The VLAN is used to communicate between the Intercloud Fabric Switch and Intercloud Fabric Firewall and can be a private VLAN, completely isolated from other VLANs. Choose the IP policy for the service interface or create a new IP pool policy. To be able to select this property, you must check the ICF Firewall (VSG) check box. Choose the VLAN for the management interface. This VLAN is used to manage Intercloud Fabric Firewall. Step 10 Click Next. The Summary window lists the summary of the Intercloud Fabric Cloud. 9

Managing Services Step 11 Step 12 Step 13 Step 14 Step 15 Click Submit to create the Intercloud Fabric Cloud. To view the status of the task, in the IcfCloud tab, locate the service request number of the task. Choose Organizations > Service Requests. Choose the Service Request tab. Locate your service request number or enter the service request number in the search field. Click View to view detailed information such as workflow status, logs, and input information for the service request. Managing Services Use this procedure to manage services after creating an Intercloud Fabric Cloud. Before You Begin You have created an Intercloud Fabric Cloud. You have uploaded the services bundle to manage services. Choose Intercloud > Infrastructure > Upload Services Bundle to upload the services bundle. Note It is not required to upload the services bundle to manage Intercloud Fabric Router (Integrated). Procedure Step 1 Step 2 Step 3 Step 4 Log in to the Intercloud Fabric. Choose Intercloud > IcfCloud. Select the IcfCloud and click Manage Services. The Manage Services window appears. Complete the following fields for Manage Services: ICF Firewall check box Check the ICF Firewall check box to create an Intercloud Fabric Firewall (VSG) template. 10

Managing Services Service Interface VLAN field Service Interface IP Pool Policy drop-down list VSG Management VLAN field ICF Router (CSR) check box CSR Management VLAN ICF Router (Integrated) check box This service interface is created on the Intercloud Fabric Switch and is used to communicate with the Intercloud Fabric Firewall data interface. The VLAN for the service interface. The VLAN is used to communicate between the Intercloud Fabric Switch and the Intercloud Fabric Firewall and can be a private VLAN, completely isolated from other VLANs. This field displays only if you check the ICF Firewall check box. Choose the IP policy for the service interface or create a new IP pool policy. See Creating a Static IP Pool Policy to create a new IP pool policy. This field displays only if you check the ICF Firewall check box. The VLAN for the management interface. This VLAN is used to manage the Intercloud Fabric Firewall. This field displays only if you check the ICF Firewall check box. Note The firewall management port profile is automatically created when you select the Intercloud Fabric Firewall service while creating an Intercloud Fabric Cloud. The Intercloud Fabric Cloud name is added as a prefix to the name of the port profile and the VLAN ID is added as a suffix to the name of the port profile; for example, icf-amz1_vsg_management_72. Check the ICF Router (CSR) check box to create an Intercloud Fabric Router (CSR) template. Enter the management VLAN ID for the Intercloud Fabric Router (CSR). This field displays only if you check the ICF Router (CSR) check box. Check the ICF Router (Integrated) check box to create an ICF Router (Integrated). Step 5 Click Submit. 11

Instantiating Intercloud Fabric Firewall Instantiating Intercloud Fabric Firewall After you have configured the Intercloud Fabric Cloud and deployed Intercloud Fabric Firewall template, you can instantiate it from PNSC. To instantiate Intercloud Fabric Firewall, complete the following tasks: Before You Begin Ensure that you have: Created and configured Intercloud Fabric Cloud. Deployed the Intercloud Fabric Firewall template. Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Log in to the Intercloud Fabric. Choose Intercloud > Infrastructure. In the Infrastructure tab, click the Launch PNSC button. The PNSC GUI appears. Click Resource Management tab. Navigate the root structure and select the tenant where you plan to instantiate Intercloud Fabric Firewall. In the tenant pane, click the Actions drop-down list and select Add Compute Firewall. In the Add Compute Firewall dialog box, enter the following: field field Host field of the Intercloud Fabric Firewall. for the Intercloud Fabric Firewall. Host for the Intercloud Fabric Firewall. Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Step 14 Step 15 Step 16 Step 17 Click Select to select the device profile and then click OK. Click Next. On the Select Service Device page, select Instantiate in Cloud option. Select a Intercloud Fabric Firewall template from the list. Under the VM Access section, enter and confirm password for the administrator access. Click Next. In the Select Intercloud Link section under the VPC page, navigate and select an appropriate Intercloud Fabric Cloud. Click Next. On the Configure Service VM Interfaces page, click Add Interface. In the Add Interface dialog box, select interface type as Management and enter the following details: 12

Instantiating Intercloud Fabric Firewall IP Address field Subnet field Gateway field Port Group drop-down list IP address for the management interface. Subnet mask for the management interface. Gateway for the management interface. Firewall management port profile that you created from Intercloud Fabric. Note Firewall management port profile is automatically created from Intercloud Fabric. The Intercloud Fabric Cloud name is added as a prefix to the name of the port profile and the VLAN ID is added as an suffix to the name of the port profile. For Example, icf-amz1_vsg_management_72 Step 18 Step 19 Step 20 Click OK to close the Add Interface dialog box. On the Configure Service VM Interfaces page, click Add Interface. In the Add Interface dialog box, Select interface type as Data and enter the following details: IP Address field Subnet field Port Group drop-down list IP address for the data interface. Subnet mask for the data interface. Firewall data port profile that you created from Intercloud Fabric. Note Firewall data port profile is automatically created from Intercloud Fabric. The Intercloud Fabric Cloud name is added as a prefix to the name of the port profile and the VLAN ID is added as an suffix to the name of the port profile. For Example, icf-amz1_vsg_data_710 Step 21 Step 22 Step 23 Click OK. Click Next. On the Summary page, verify the details and click Finish to instantiate the Intercloud Fabric Firewall. 13

Configuring Compute Security Profiles Configuring Compute Security Profiles Cisco Prime Network Services Controller (PNSC) lets you create compute security profiles at the tenant level. Procedure Step 1 Step 2 Step 3 Log in to the Intercloud Fabric. Choose Intercloud > Infrastructure. In the Infrastructure tab, click the Launch PNSC button. The PNSC GUI appears. Step 4 In the PNSC GUI, choose Policy Management > Service Profiles > root > tenant > Compute Firewall > Compute Security Profiles. Step 5 Step 6 In the General tab, click Add Compute Security Profile. Complete the following fields for Add Compute Security Profile: Note Only the following attributes are supported for Intercloud Fabric: VM name Port profile name Operating system name User-defined (custom) Table 1: General Tab Field Policy Set Add ACL Policy Set Resolved Policy Set Profile name, which can be between 2 and 32 identifier characters. You can use alphanumeric characters including hyphens, underscores, periods, and colons. You cannot change this name after it is saved. Brief profile description, which can be between 1 and 256 identifier characters. You can use alphanumeric characters including hyphens, underscores, periods, and colons. Drop-down list of policy sets. Click the link to add an ACL policy set. Click the link to edit the resolved policy set. Resolved Policies Area (Un)assign Policy Click the link to assign or unassign a policy. Rule name. 14

Creating a Service Path Field Source Condition Destination Condition Service/Protocol EtherType Action Source condition for the rule. Destination condition for the rule. Service or protocol to which the rule applies. Encapsulated protocol to which the rule applies. Action to take if the rule conditions are met. Rule description. Table 2: Attributes Tab Field Add User Defined Attribute Value Opens a dialog box for adding an attribute. Attribute name. Attribute value. Step 7 Click OK. Creating a Service Path Use this procedure to create a service path. Note You cannot use a service node more than once in a service path. Procedure Step 1 Step 2 Step 3 Log in to the Intercloud Fabric. Choose Intercloud > Infrastructure. In the Infrastructure tab, click the Launch PNSC button. The PNSC GUI appears. 15

Binding a Service Path to a Port Profile Step 4 Step 5 Step 6 In the PNSC GUI, choose Policy Management > Service Policies > root > tenant > Policies > Service Path, and then click Add Service Path. In the Add Service Path dialog box, enter a name and description for the service path, and then click Add Service Entry. Complete the following details: Service Type radio button Service Node drop-down list field Service Type radio button Network Service drop-down list Fail Mode radio button Adjacency Type radio button Service Profile drop-down list Choose the service type. Choose an existing service node or create a new one. of the service node. This field displays only if you create a new service node. Choose the service type. This field displays only if you create a new service node. of the logical service device. This field displays only if you create a new service node. Action to take if the service node loses connectivity. This field displays only if you create a new service node. Choose the Layer 3 adjacency type. This field displays only if you create a new service node. Choose the service profile. The service profile identifies the policies that apply to the traffic using the service path. Step 7 Add additional service entries as needed for the service path and click OK. Binding a Service Path to a Port Profile Binding a service path to a port profile ensures that all traffic using that port profile follows the configured service path. Before You Begin Confirm that a service path exists. 16

Editing Port Profiles for the Intercloud Fabric Firewall Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Log in to the Intercloud Fabric. Choose Intercloud > Infrastructure. In the Infrastructure tab, click the Launch PNSC button. The PNSC GUI appears. In the PNSC GUI, choose Resource Management > Resources > VSMs > vsm > Edit. In the Port Profiles table, select the port profile to which you want to bind the service path, then click Edit. In the Service Path field, click Select. In the Select Service Path dialog box, select the required service path, then click OK. In the Edit Port Profile dialog box, click Apply and then OK to apply and save the change. Editing Port Profiles for the Intercloud Fabric Firewall Use the following procedure to edit port profiles for the Intercloud Fabric Firewall. Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Log in to the Intercloud Fabric. Choose Intercloud > Network. Select the cloud from the All Clouds drop-down list. In the Port Profile tab, select the port profile. Click the Edit button. The Edit Port Profile window appears. Complete the following fields for the port profile: VLAN ID field Enable for Services check box The VLAN ID of the port profile. Check the check box to enable the port profile for services. Note Do not select this option if you are creating a management or data port profile. This option is applicable only for enabling firewall services on a cloud VM. 17

Verifying the Installation of Intercloud Fabric Firewall Org drop-down list New Org field Choose an existing org or create a new one. An org is a structure to store IP binding information. You can enable IP binding learning on the Intercloud Fabric Switch (VEM) by using the org org_name command. When IP bindings are learned on VEM, the information is synchronized to PNSC and Intercloud Fabric Firewall. This field displays only if you check the Enable for Services check box. The name of the org. This field displays only if you check the Enable for Services check box. Step 7 Click Submit. Verifying the Installation of Intercloud Fabric Firewall Use this procedure to verify the installation of Intercloud Fabric Firewall. Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Log in to the Intercloud Fabric. Choose Intercloud > Infrastructure. In the Infrastructure tab, click the Launch PNSC button. The PNSC GUI appears. In the PNSC GUI, choose Resource Management > Managed Resources. Select the icfcloud and choose Network Services. You can view the status of the Intercloud Fabric Firewall installation in the table. 18