78
VM-Series
Deployment
Guide
Create Policies
Set Up a VM-Series NSX Edition Firewall
Step 3
Apply the policies to the VM-Series NSX
edition firewalls.
1.
Click
Commit
, and select Commit Type as
Device Groups
.
2.
Select the device group, NSX Device Group in this example and
click
OK
.
3.
Verify that the commit is successful.
Step 4
Validate that the members of the
Dynamic Address Group are populated
on the VM-Series firewall.
You cannot verify the members
(registered IP addresses) for the
Dynamic Address Group on
Panorama. This information can
only be viewed from the
VM-Series firewall that enforces
policy.
1.
From Panorama, switch device context to launch the web
interface of a firewall to which you pushed policies.
2.
On the VM-Series firewall, select
Policies > Security
, and select
a rule.
3.
Select the drop-down arrow next to the address group link, and
select
Inspect
. You can also verify that the match criteria is
accurate.
4.
Click the
more
link and verify that the list of registered IP
addresses is displayed.
Policy will be enforced for all IP addresses that belong to this
address group, and are displayed here.
Step 5
(Optional) Use template to push a base
configuration for network and device
configuration such as DNS server, NTP
server, Syslog server, and login banner.
Refer to the
Panorama Administrator’s Guide
for information on
using templates.
Define Policy on Panorama