...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
Note |
---|
For invited users: Before your account was created, your account administrator decided the proper roles and permissions for your account. Consult with your account administrator to understand what permissions you have and how you should configure your account. You can use this document to complete the account signup process and review high-level action items to complete. |
Expand | ||
---|---|---|
| ||
|
Expand | ||
---|---|---|
| ||
|
Expand | |||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| |||||||||||||||||||
excerpt-include
| ESLP:Workloads and tiers (snippet) | nopanel | true
are visual tools used in the Armor Management Portal (AMP) to help you organize your virtual machines and corresponding resources. Workload refers to a container of virtual machines that live inside the Armor data center. Tiers are levels within workloads. |
In the Armor Management Portal, in the left-side navigation, click Infrastructure.
Click Virtual Machines.
Hover over the plus ( + ) icon, and then click the Virtual Machine icon.
If you do not have any virtual machines listed, then click Deploy New, and then select Virtual Machine.
Locate and select the desired operating system and operating system version.
On the right side, use the Region drop-down menu to select the data center to host your virtual machine.
Select the desired virtual machine based on your CPU and memory needs (GB).
You can click High CPU or High Memory to filter the list of virtual machines. You can also click Show All Options to see every virtual machine offering.
Armor labels virtual machines by CPU and memory features. For instance, 2x4 indicates that the virtual machine has 2 CPU and 4 GB of memory.
In Name, enter a descriptive name for your virtual machine.
In Workload, select New Workload.
In New Workload Name, enter a descriptive name.
In New Tier Name, enter a descriptive name.
In Location, select and verify the data center to host your virtual machine.
Under Access Credentials, note your username to access the virtual machine.
In Password, enter a secure password to use to access the virtual machine.
Your password must contain:
An upper-case letter
A lower-case letter
A number
A special character: ! @ # $ % ^ * ( ) { } [ ]
You can also click Generate Password to allow Armor to create a password.
(Optional) For additional storage, under Storage Substrate and Disk Size, select your desired storage, and then click Add Disk.
On the right-side menu, review the pricing information, and then click Purchase.
When you order a virtual machine, you are also ordering Intelligence Security Model (ISM) for the virtual machine. Prices for ISM will vary based on the number of virtual machines you have ordered. IMS pricing is based on the following tiered structure:
Tier
Number of Virtual Machines 1 1 - 10 2 11 - 25 3 26 - 100 4 101 - 250 5 251 - 500 6 500 +
To view the status of your newly created virtual machine, in the left-side navigation, click Infrastructure, click Virtual Machines, and then search for your newly created virtual machine.
Expand | ||||
---|---|---|---|---|
| ||||
|
Expand | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||||||||
Step 1: Create an IP GroupIn the Firewall screen, each entry in the table represents a single firewall rule; however, each firewall rule can contain several IP addresses or just a single IP address. You can combine related IP addresses into a single IP Group. For example, if you want to block traffic from three separate IP address, you do not have to create three separate firewall rules. Instead, you can combine the three separate IP addresses into a single, configurable IP Group. Then, when you create a firewall rule, you can pick the newly created IP Group as your Source or Destination IP addresses.
Step 2: Create a Service GroupIn the Firewall screen, each entry in the table represents a single firewall rule; however, each firewall rule can contain several protocols (and ports). You can combine related protocols (and ports)into a Service Group. For example, if you want to create a firewall rule to block three types of traffic, you do not have to create three separate firewall rules. Instead, you can combine the three types of traffic (protocols and ports) into a single, configurable Service Group. Then, when you create a firewall rule, you can pick the newly created Service Group.
Step 3: Create a Firewall Rule
Disable a rule:
|
Expand | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||
|
Expand | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| |||||||||||||
Armor recommends that you configure your account to receive notifications for Account, Billing, and Technical events.
ing
|
...