After you deploy
PowerProtect Data Manager, create network firewall rules to match your use cases.
About this task
The
PowerProtect Data Manager Security Configuration Guide describes the required ports for each component.
NOTE
By default, all inbound traffic from outside the network is blocked, and all outbound traffic from inside the network is blocked.
GCP uses the terms
ingress and
egress, respectively, for inbound and outbound traffic.
CAUTION
When configuring network firewall rules, do not allow IP addresses that belong to the 172.24.0.192/26 subnet. IP addresses in the 172.24.0.192–172.24.0.255 range are used for Docker network configuration, and unexpected results can occur if they are also used by
PowerProtect Data Manager.
For more information, see the
PowerProtect Data Manager Security Configuration Guide
The following example describes the procedure to allow inbound TCP traffic on port 9000 for a
PowerProtect Data Manager instance.
Steps
From the Google Cloud Console, navigate to
VPC network > Firewall, and click
CREATE FIREWALL RULE.
Under
Direction of traffic, select
Ingress.
Under
Action on match, select
Allow.
Under
Targets select
Specified target tags.
Under
Target tags, enter the name of the network firewall rule.
Under
Source IP ranges, enter the subnet of the allowed inbound traffic..
Under
Protocols and ports, select
Specified protocols and ports, select
tcp, and enter
9000.
Navigate to
Compute Engine > VM Instances, select the
PowerProtect Data Manager instance, and click
EDIT.
Under
Network tags, add the network firewall rule you created in step 5.
Data is not available for the Topic
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please select whether the article was helpful or not.
Comments cannot contain these special characters: <>()\