NSX Basics – Creating Firewall Rules Based on Active Directory User ID

Posted

by

Estimated reading time:
1 minute
Home » Define Tomorrow Blog Posts » NSX Basics – Creating Firewall Rules Based on Active Directory User ID

NSX Manager can be integrated with Active Directory to allow Distributed Firewall (DFW) rules to be applied based on the used identity. In this video I will demonstrate how AD based security groups can be used with the DFW to allow access for the SSH protocol.

NSX Manager can be integrated with Active Directory to allow Distributed Firewall (DFW) rules to be applied based on the used identity. In this video Ben will demonstrate how AD based security groups can be used with the DFW to allow access for the SSH protocol.

This functionality can be very useful within VDI environments where you may wish to apply more restrictive access to a set of users who login, for example external contractors. If you would like to know more about VMware NSX then please get in touch.

For more information on VMware NSX and how it can help your business, click here.

Take a look at the other videos within this series:

1. Creating security groups   

2. Creating a firewall rule to block ping traffic

3. Creating firewall rules to control RDP Access

5. Introducing Service Composer

6. Creating networks using logical switches

Leave a Reply

Your email address will not be published. Required fields are marked *

Are you ready for
Define Tomorrow 2025?

We’re putting the finishing touches to this year’s events – to stay updated sign-up below or view see highlights of the 2023 event.