{{ $t('productDocDetail.guideClickSwitch') }}
{{ $t('productDocDetail.know') }}
{{ $t('productDocDetail.dontRemind') }}
6.11.3
{{sendMatomoQuery("Sangfor Cloud Platform (SCP)","Distributed Firewall")}}

Distributed Firewall

{{ $t('productDocDetail.updateTime') }}: 2025-12-22

HCI offers a distributed firewall (DFW) This enables micro-segmentation between VMs and ensures L3 and L4 security protection for internal traffic, significantly reducing the impact of attacks on the data center.

图形用户界面, 应用程序

AI 生成的内容可能不正确。

Figure 1: DFW Principle

Function Description:

  1. The distributed firewall protects all virtual machines in the data center.\ By creating and configuring distributed firewall policies, network isolation between virtual machines can be achieved, the internal traffic of the data center can be protected, and the impact of malicious attacks on the internal data center can be reduced.
  2. If both VDI and HCI VMs exist on a tenant VPC network, an applicable scope can be configured to make the policy applicable to specified VMs only.

Precautions:

  1. It is forbidden to bypass the SCP to directly execute the distributed firewall operation on the HCI, which may cause the firewall rules to take effect in the wrong scope, resulting in policy rule conflicts.
  2. The distributed firewall supports creating up to 100 policies in the same effective scope.
  3. The distributed firewall supports creating up to 1000 rules in the same policy.
  4. The distributed firewall supports creating up to 50 IP groups in the same effective scope.
  5. The distributed firewall supports creating up to 50 custom services in the same effective scope.

Steps:

Step 1: Log in to the SCP admin platform and navigate Security > Distributed Firewall to enter the distributed firewall configuration page. The Platform Global control policy is the default policy and cannot be edited.

Global control policy: Contains global control rules, which ensure overall traffic is released.

Step 2: Select the resource pool name or tenant’s name on the left list to enter the corresponding page and click the Create Policy button to create a firewall policy for the resource pool or tenant network.

Name: The firewall policy name.

Scope: The effective domain of the firewall policy. It can be the entire resource pool, the tenant's classic, or the VPC.

Priority: The policy priorities can be adjusted manually, above or below one policy.

Click Applicable Scope to set the applicable scope of the policy, which can be a custom of VMs.

Step 3: Create new rules. Click New Rule to create new rules.

Name: The firewall policy name.

Source/Destination condition: Support configuring Any IP Address, IP Group and IP Range, Virtual Machine, and VM Group.

A black and white logo

AI-generated content may be incorrect.

When the source/destination selects a virtual machine, if the virtual machine does not have vmTools installed, the system cannot automatically obtain the virtual machine’s IP, and the underlying firewall rules cannot perform effective IP conversion. As a result, the rules are ineffective for the virtual machine. Therefore, in this case, you need to configure an IP for the virtual machine before using it as the source/destination of firewall rules.

Service: It supports the selection of Predefined Service on the platform and Custom Service based on protocols and port numbers. Multiple rules can share custom services in the same effective scope.

Action: How to handle the traffic of the rule can be set to either allow or drop.

Status: Disable or enable the current rule.

Operation: Delete operation

After clicking a new rule, return to the Create Rule page, and click the Add button to continue adding other rules.

Step 4: After confirming that all rules are added correctly, click OK to create. On the Configure Rules page, select a rule record and click the Move Up or Move Down button to adjust the priority of the created rule. Click Move To to move the rule to another policy group.

Step 5: Create IP Groups. The platform administrator can manage the IP groups in the distributed firewall policy. Click the IP Groups button, click the New button, and enter the Name, Description, and the IP Range to complete the IP groups creation.

Step 6: After configuring the firewall policy, you can configure the Dropped Packet Logging.

  1. Select the resource pool on the left.
  2. Click the Enable Dropped Packet Logging and Passthrough button to enter the dropped packet logging page. Then, you can select all IP or specified IP address.
  3. Select the protocol (All, TCP, UDP, ICMP and Other).
  4. In the Passthrough filed select Enable. Packets will bypass all firewall rules, but logs will still be generated for the to-be-dropped packets. This can be used for troubleshooting. Select Disable the package will not bypass.