...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
Note |
---|
For invited users: Before your account was created, your account administrator decided the proper roles and permissions for your account. Consult with your account administrator to understand what permissions you have and how you should configure your account. You can use this document to complete the account signup process and review high-level action items to complete. |
Expand | ||
---|---|---|
| ||
|
Expand | ||
---|---|---|
| ||
|
Expand | |||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| |||||||||||||||||||
excerpt-include
| ESLP:Workloads and tiers (snippet) | nopanel | true
are visual tools used in the Armor Management Portal (AMP) to help you organize your virtual machines and corresponding resources. Workload refers to a container of virtual machines that live inside the Armor data center. Tiers are levels within workloads. |
In the Armor Management Portal, in the left-side navigation,
click Infrastructure.
Click Virtual Machines.
Hover over the plus ( + ) icon, and then click
the Virtual Machine
icon.
If you do not have any virtual machines listed, then click
Deploy
New, and then select
Virtual Machine.
Locate and select the desired operating system and operating system version.
On the right side, use
the Region
drop-down menu to select
the data center to host your virtual machine.
Select the desired virtual machine based on your CPU and memory needs (GB).
You can
click High CPU
or High
Memory
to filter the list of virtual machines. You can also
click Show All
Options
to see every virtual machine offering.
Armor labels virtual machines by CPU and memory features. For instance,
2x4
indicates that the virtual machine has 2 CPU and 4 GB of memory.
In Name, enter a descriptive name for your virtual machine.
In Workload,
select New Workload.
In New
Workload
Name, enter a descriptive name.
In New
Tier
Name, enter a descriptive name.
In Location, select and verify the data center to host your virtual machine.
Under Access
Credentials, note your username to access the virtual machine.
In Password, enter a secure password to use to access the virtual machine.
Your password must contain:
An upper-case letter
A lower-case letter
A number
A special character: ! @ # $ % ^ * ( ) { } [ ]
You can also
click Generate Password to allow Armor to create a password.
(Optional) For additional storage,
under Storage Substrate
and Disk Size, select your desired storage, and then
click Add
Disk.
On the right-side menu, review the pricing information, and then
click Purchase.
When you order a virtual machine, you are also ordering Intelligence Security Model (ISM) for the virtual machine. Prices for ISM will vary based on the number of virtual machines you have ordered. IMS pricing is based on the following tiered structure:
Tier
Number of Virtual Machines 1 1 - 10 2 11 - 25 3 26 - 100 4 101 - 250 5 251 - 500 6 500 +
To view the status of your newly created virtual machine, in the left-side navigation,
title | Step 4: Download and Install Your SSL/VPN |
---|
If you run Ubuntu 16.x, then please review Install SSL VPN for Ubuntu 16.x ( decommission).
If you run Ubuntu 18.x, then please review Install SSL VPN for Ubuntu 18.x.
If you run Mac OS 10.11 or higher, then please review Install SSL VPN for Mac OS 10.11+.click Infrastructure, click Virtual Machines, and then search for your newly created virtual machine.
Expand | ||||
---|---|---|---|---|
| ||||
|
Expand | |||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| |||||||||||||||||||
Step 1: Create an IP GroupIn the the Firewall screen screen, each entry in the table represents a single firewall rule; however, each firewall rule can contain several IP addresses or just a single IP address. You can combine related IP addresses into a single single IP Group. For example, if you want to block traffic from three separate IP address, you do not have to create three separate firewall rules. Instead, you can combine the three separate IP addresses into a single, configurable configurable IP Group. Then, when you create a firewall rule, you can pick the newly created created IP Group as your Source or Destination IP as your Source or Destination IP addresses.
Step 2: Create a Service GroupIn the the Firewall screen screen, each entry in the table represents a single firewall rule; however, each firewall rule can contain several protocols (and ports). You can combine related protocols related protocols (and ports) into a a Service Group. For example, if you want to create a firewall rule to block three types of traffic, you do not have to create three separate firewall rules. Instead, you can combine the three types of traffic (protocols and ports) into a single, configurable Service Groupconfigurable Service Group. Then, when you create a firewall rule, you can pick the newly created Service Groupcreated Service Group.
Step 3: Create a Firewall Rule Rule
Disable a rule:
|
Expand | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||
|
Expand | ||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||||||||||||||||||||||||||||
Armor recommends that you configure your account to receive notifications for for Account, BillingBilling, and Technical Technical events.
|
...