< Back
Set-NsxSecurityPolicyFirewallRule
Post
NAME Set-NsxSecurityPolicyFirewallRule
SYNOPSIS
Modifies the configuration of an existing Security Policy Rule.
SYNTAX
Set-NsxSecurityPolicyFirewallRule [-Rule] <XmlElement> [[-Name] <String>] [[-Description] <String>] [[-Action]
<String>] [[-LoggingEnabled] <Boolean>] [[-Enabled] <Boolean>] [[-Direction] <String>] [-NoConfirm] [[-Connection]
<PSObject>] [<CommonParameters>]
DESCRIPTION
A security policy is a policy construct that can define one or more rules in
several different categories, that can then be applied to an arbitrary
number of Security Groups in order to enforce the defined policy.
The three categories of rules that can be included in a Security Policy are:
- Guest Introspection - data security, anti-virus, and vulnerability
management and rules based on third party Guest Introspection capability.
- Firewall rules - creates appropriate distributed firewall rules when
the policy is applied to a security group.
- Network introspection services - Thirdparty firewall, IPS/IDS etc.
Set-NsxSecurityPolicyRule modifies an existing firewall, guest introspection
or network introspection rule as retrieved by Get-NsxSecurityPolicyRule
It is possible to use Set-NsxSecurityPolicyFirewallRule to modify the
'direction' of a given rule. (From Policies SecurityGroup, To Policies
SecurityGroup, or to and from Policies SecurityGroup )
The concept of 'direction', reflects the way the API represents the firewall
rule definition rather than the UI represendation of Policies Security Group
but is functionality equivalent.
It requires specification of a direction (inbound outbound or intra) and for
inbound/outbound directions, specific securitygroups may be
specified. If no Security Group is specified, the source/destination is
'Any'.
Refer to Get-Help documentation in New-NsxSecurityPolicyFirewallRuleSpec for
more information.
PARAMETERS
-Rule <XmlElement>
Security Policy Rule to reconfigure
Required? true
Position? 1
Default value
Accept pipeline input? true (ByValue)
Accept wildcard characters? false
-Name <String>
Set the name of the specified rule
Required? false
Position? 2
Default value
Accept pipeline input? false
Accept wildcard characters? false
-Description <String>
Set the description of the specified rule
Required? false
Position? 3
Default value
Accept pipeline input? false
Accept wildcard characters? false
-Action <String>
Set the Action of the specified rule
Required? false
Position? 4
Default value
Accept pipeline input? false
Accept wildcard characters? false
-LoggingEnabled <Boolean>
Configure logging behaviour for the specified rule
Required? false
Position? 5
Default value False
Accept pipeline input? false
Accept wildcard characters? false
-Enabled <Boolean>
Enable or disable the specified rule.
Required? false
Position? 6
Default value False
Accept pipeline input? false
Accept wildcard characters? false
-Direction <String>
Modify the 'direction' of the rule. Refer to mode '2' operation of New-NsxSecurityPolicyFirewallRuleSpec for
more information.
Required? false
Position? 7
Default value
Accept pipeline input? false
Accept wildcard characters? false
-NoConfirm [<SwitchParameter>]
Disable confirmation prompt
Required? false
Position? named
Default value False
Accept pipeline input? false
Accept wildcard characters? false
-Connection <PSObject>
PowerNSX Connection object
Required? false
Position? 8
Default value $defaultNSXConnection
Accept pipeline input? false
Accept wildcard characters? false
<CommonParameters>
This cmdlet supports the common parameters: Verbose, Debug,
ErrorAction, ErrorVariable, WarningAction, WarningVariable,
OutBuffer, PipelineVariable, and OutVariable. For more information, see
about_CommonParameters (https:/go.microsoft.com/fwlink/?LinkID=113216).
INPUTS
OUTPUTS
-------------------------- EXAMPLE 1 --------------------------
PS C:\\>Get-NsxSecurityPolicy SecPol01 | Get-NsxSecurityPolicyRule -RuleType Firewall -Name AdminSsh |
Set-NsxSecurityPolicyFirewallRule -Action Allow
Sets the action to allow on the firewall rule called AdminSsh within the security policy SecPol01
-------------------------- EXAMPLE 2 --------------------------
PS C:\\>Get-NsxSecurityPolicy SecPol01 | Get-NsxSecurityPolicyRule -RuleType Firewall -Name AdminSsh |
Set-NsxSecurityPolicyFirewallRule -Logging Enabled
Enables logging on the firewall rule called AdminSsh within the security policy SecPol01
-------------------------- EXAMPLE 3 --------------------------
PS C:\\>Get-NsxSecurityPolicy SecPol01 | Get-NsxSecurityPolicyRule -RuleType Firewall -Name AdminSsh |
Set-NsxSecurityPolicyFirewallRule
RELATED LINKS
CommonParameters : True
WorkflowCommonParameters : False
details : @{name=Set-NsxSslVpn; noun=; verb=}
Syntax : @{syntaxItem=System.Object[]}
parameters : @{parameter=System.Object[]}
inputTypes : @{inputType=}
returnValues : @{returnValue=}
aliases : None
remarks : None
alertSet :
description :
examples :
Synopsis :
Set-NsxSslVpn [-SslVpn] <XmlElement> [-Confirm] [-Enabled] [-EnableCompression]
[-ForceVirtualKeyboard] [-RandomizeVirtualkeys] [-PreventMultipleLogon]
[-ClientNotification <string>] [-EnablePublicUrlAccess] [-ForcedTimeout <int>]
[-SessionIdleTimeout <int>] [-ClientAutoReconnect] [-ClientUpgradeNotification]
[-EnableLogging] [-LogLevel <string>] [-ServerAddress <ipaddress>] [-ServerPort <int>]
[-CertificateID <string>] [-Enable_AES128_SHA] [-Enable_AES256_SHA] [-Enable_DES_CBC3_SHA]
[-Connection <psobject>] [<CommonParameters>]
ModuleName : PowerNSX
nonTerminatingErrors :
xmlns:command : http://schemas.microsoft.com/maml/dev/command/2004/10
xmlns:dev : http://schemas.microsoft.com/maml/dev/2004/10
xmlns:maml : http://schemas.microsoft.com/maml/2004/10
Name : Set-NsxSslVpn
Category : Function
Component :
Role :
Functionality :
SYNOPSIS
Modifies the configuration of an existing Security Policy Rule.
SYNTAX
Set-NsxSecurityPolicyFirewallRule [-Rule] <XmlElement> [[-Name] <String>] [[-Description] <String>] [[-Action]
<String>] [[-LoggingEnabled] <Boolean>] [[-Enabled] <Boolean>] [[-Direction] <String>] [-NoConfirm] [[-Connection]
<PSObject>] [<CommonParameters>]
DESCRIPTION
A security policy is a policy construct that can define one or more rules in
several different categories, that can then be applied to an arbitrary
number of Security Groups in order to enforce the defined policy.
The three categories of rules that can be included in a Security Policy are:
- Guest Introspection - data security, anti-virus, and vulnerability
management and rules based on third party Guest Introspection capability.
- Firewall rules - creates appropriate distributed firewall rules when
the policy is applied to a security group.
- Network introspection services - Thirdparty firewall, IPS/IDS etc.
Set-NsxSecurityPolicyRule modifies an existing firewall, guest introspection
or network introspection rule as retrieved by Get-NsxSecurityPolicyRule
It is possible to use Set-NsxSecurityPolicyFirewallRule to modify the
'direction' of a given rule. (From Policies SecurityGroup, To Policies
SecurityGroup, or to and from Policies SecurityGroup )
The concept of 'direction', reflects the way the API represents the firewall
rule definition rather than the UI represendation of Policies Security Group
but is functionality equivalent.
It requires specification of a direction (inbound outbound or intra) and for
inbound/outbound directions, specific securitygroups may be
specified. If no Security Group is specified, the source/destination is
'Any'.
Refer to Get-Help documentation in New-NsxSecurityPolicyFirewallRuleSpec for
more information.
PARAMETERS
-Rule <XmlElement>
Security Policy Rule to reconfigure
Required? true
Position? 1
Default value
Accept pipeline input? true (ByValue)
Accept wildcard characters? false
-Name <String>
Set the name of the specified rule
Required? false
Position? 2
Default value
Accept pipeline input? false
Accept wildcard characters? false
-Description <String>
Set the description of the specified rule
Required? false
Position? 3
Default value
Accept pipeline input? false
Accept wildcard characters? false
-Action <String>
Set the Action of the specified rule
Required? false
Position? 4
Default value
Accept pipeline input? false
Accept wildcard characters? false
-LoggingEnabled <Boolean>
Configure logging behaviour for the specified rule
Required? false
Position? 5
Default value False
Accept pipeline input? false
Accept wildcard characters? false
-Enabled <Boolean>
Enable or disable the specified rule.
Required? false
Position? 6
Default value False
Accept pipeline input? false
Accept wildcard characters? false
-Direction <String>
Modify the 'direction' of the rule. Refer to mode '2' operation of New-NsxSecurityPolicyFirewallRuleSpec for
more information.
Required? false
Position? 7
Default value
Accept pipeline input? false
Accept wildcard characters? false
-NoConfirm [<SwitchParameter>]
Disable confirmation prompt
Required? false
Position? named
Default value False
Accept pipeline input? false
Accept wildcard characters? false
-Connection <PSObject>
PowerNSX Connection object
Required? false
Position? 8
Default value $defaultNSXConnection
Accept pipeline input? false
Accept wildcard characters? false
<CommonParameters>
This cmdlet supports the common parameters: Verbose, Debug,
ErrorAction, ErrorVariable, WarningAction, WarningVariable,
OutBuffer, PipelineVariable, and OutVariable. For more information, see
about_CommonParameters (https:/go.microsoft.com/fwlink/?LinkID=113216).
INPUTS
OUTPUTS
-------------------------- EXAMPLE 1 --------------------------
PS C:\\>Get-NsxSecurityPolicy SecPol01 | Get-NsxSecurityPolicyRule -RuleType Firewall -Name AdminSsh |
Set-NsxSecurityPolicyFirewallRule -Action Allow
Sets the action to allow on the firewall rule called AdminSsh within the security policy SecPol01
-------------------------- EXAMPLE 2 --------------------------
PS C:\\>Get-NsxSecurityPolicy SecPol01 | Get-NsxSecurityPolicyRule -RuleType Firewall -Name AdminSsh |
Set-NsxSecurityPolicyFirewallRule -Logging Enabled
Enables logging on the firewall rule called AdminSsh within the security policy SecPol01
-------------------------- EXAMPLE 3 --------------------------
PS C:\\>Get-NsxSecurityPolicy SecPol01 | Get-NsxSecurityPolicyRule -RuleType Firewall -Name AdminSsh |
Set-NsxSecurityPolicyFirewallRule
RELATED LINKS
CommonParameters : True
WorkflowCommonParameters : False
details : @{name=Set-NsxSslVpn; noun=; verb=}
Syntax : @{syntaxItem=System.Object[]}
parameters : @{parameter=System.Object[]}
inputTypes : @{inputType=}
returnValues : @{returnValue=}
aliases : None
remarks : None
alertSet :
description :
examples :
Synopsis :
Set-NsxSslVpn [-SslVpn] <XmlElement> [-Confirm] [-Enabled] [-EnableCompression]
[-ForceVirtualKeyboard] [-RandomizeVirtualkeys] [-PreventMultipleLogon]
[-ClientNotification <string>] [-EnablePublicUrlAccess] [-ForcedTimeout <int>]
[-SessionIdleTimeout <int>] [-ClientAutoReconnect] [-ClientUpgradeNotification]
[-EnableLogging] [-LogLevel <string>] [-ServerAddress <ipaddress>] [-ServerPort <int>]
[-CertificateID <string>] [-Enable_AES128_SHA] [-Enable_AES256_SHA] [-Enable_DES_CBC3_SHA]
[-Connection <psobject>] [<CommonParameters>]
ModuleName : PowerNSX
nonTerminatingErrors :
xmlns:command : http://schemas.microsoft.com/maml/dev/command/2004/10
xmlns:dev : http://schemas.microsoft.com/maml/dev/2004/10
xmlns:maml : http://schemas.microsoft.com/maml/2004/10
Name : Set-NsxSslVpn
Category : Function
Component :
Role :
Functionality :