Chapter 8. Configuring vShield App

In this chapter, we will cover the following recipes:

  • Installing vShield App
  • Configuring vShield App using the Web Console
  • Configuring vShield App Flow Monitoring
  • Configuring vShield App Firewall
  • Configuring vShield App SpoofGuard

Introduction

In most modern operating systems, there is an option to install a firewall on the host. The rules configured in a host-based firewall manage the traffic at the host level, and provide an additional layer of defense along with network firewalls and intrusion detection systems. Multiple layers of security provide a complete defense-in-depth architecture. As mentioned in Chapter 1, Threat and Vulnerability Overview, the concept of defense-in-depth builds layers of security providing ...

Get VMware vSphere Security Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.