< Back

Set-NsxSecurityPolicyFirewallRule

Sat Jan 18, 2020 9:29 pm

NAME Set-NsxSecurityPolicyFirewallRule



SYNOPSIS

Modifies the configuration of an existing Security Policy Rule.





SYNTAX

Set-NsxSecurityPolicyFirewallRule [-Rule] <XmlElement> [[-Name] <String>] [[-Description] <String>] [[-Action]

<String>] [[-LoggingEnabled] <Boolean>] [[-Enabled] <Boolean>] [[-Direction] <String>] [-NoConfirm] [[-Connection]

<PSObject>] [<CommonParameters>]





DESCRIPTION

A security policy is a policy construct that can define one or more rules in

several different categories, that can then be applied to an arbitrary

number of Security Groups in order to enforce the defined policy.



The three categories of rules that can be included in a Security Policy are:



- Guest Introspection - data security, anti-virus, and vulnerability

management and rules based on third party Guest Introspection capability.

- Firewall rules - creates appropriate distributed firewall rules when

the policy is applied to a security group.

- Network introspection services - Thirdparty firewall, IPS/IDS etc.



Set-NsxSecurityPolicyRule modifies an existing firewall, guest introspection

or network introspection rule as retrieved by Get-NsxSecurityPolicyRule



It is possible to use Set-NsxSecurityPolicyFirewallRule to modify the

'direction' of a given rule. (From Policies SecurityGroup, To Policies

SecurityGroup, or to and from Policies SecurityGroup )



The concept of 'direction', reflects the way the API represents the firewall

rule definition rather than the UI represendation of Policies Security Group

but is functionality equivalent.



It requires specification of a direction (inbound outbound or intra) and for

inbound/outbound directions, specific securitygroups may be

specified. If no Security Group is specified, the source/destination is

'Any'.



Refer to Get-Help documentation in New-NsxSecurityPolicyFirewallRuleSpec for

more information.





PARAMETERS

-Rule <XmlElement>

Security Policy Rule to reconfigure



Required? true

Position? 1

Default value

Accept pipeline input? true (ByValue)

Accept wildcard characters? false



-Name <String>

Set the name of the specified rule



Required? false

Position? 2

Default value

Accept pipeline input? false

Accept wildcard characters? false



-Description <String>

Set the description of the specified rule



Required? false

Position? 3

Default value

Accept pipeline input? false

Accept wildcard characters? false



-Action <String>

Set the Action of the specified rule



Required? false

Position? 4

Default value

Accept pipeline input? false

Accept wildcard characters? false



-LoggingEnabled <Boolean>

Configure logging behaviour for the specified rule



Required? false

Position? 5

Default value False

Accept pipeline input? false

Accept wildcard characters? false



-Enabled <Boolean>

Enable or disable the specified rule.



Required? false

Position? 6

Default value False

Accept pipeline input? false

Accept wildcard characters? false



-Direction <String>

Modify the 'direction' of the rule. Refer to mode '2' operation of New-NsxSecurityPolicyFirewallRuleSpec for

more information.



Required? false

Position? 7

Default value

Accept pipeline input? false

Accept wildcard characters? false



-NoConfirm [<SwitchParameter>]

Disable confirmation prompt



Required? false

Position? named

Default value False

Accept pipeline input? false

Accept wildcard characters? false



-Connection <PSObject>

PowerNSX Connection object



Required? false

Position? 8

Default value $defaultNSXConnection

Accept pipeline input? false

Accept wildcard characters? false



<CommonParameters>

This cmdlet supports the common parameters: Verbose, Debug,

ErrorAction, ErrorVariable, WarningAction, WarningVariable,

OutBuffer, PipelineVariable, and OutVariable. For more information, see

about_CommonParameters (https:/go.microsoft.com/fwlink/?LinkID=113216).



INPUTS



OUTPUTS



-------------------------- EXAMPLE 1 --------------------------



PS C:\\>Get-NsxSecurityPolicy SecPol01 | Get-NsxSecurityPolicyRule -RuleType Firewall -Name AdminSsh |

Set-NsxSecurityPolicyFirewallRule -Action Allow



Sets the action to allow on the firewall rule called AdminSsh within the security policy SecPol01









-------------------------- EXAMPLE 2 --------------------------



PS C:\\>Get-NsxSecurityPolicy SecPol01 | Get-NsxSecurityPolicyRule -RuleType Firewall -Name AdminSsh |

Set-NsxSecurityPolicyFirewallRule -Logging Enabled



Enables logging on the firewall rule called AdminSsh within the security policy SecPol01









-------------------------- EXAMPLE 3 --------------------------



PS C:\\>Get-NsxSecurityPolicy SecPol01 | Get-NsxSecurityPolicyRule -RuleType Firewall -Name AdminSsh |

Set-NsxSecurityPolicyFirewallRule















RELATED LINKS





CommonParameters : True

WorkflowCommonParameters : False

details : @{name=Set-NsxSslVpn; noun=; verb=}

Syntax : @{syntaxItem=System.Object[]}

parameters : @{parameter=System.Object[]}

inputTypes : @{inputType=}

returnValues : @{returnValue=}

aliases : None



remarks : None

alertSet :

description :

examples :

Synopsis :

Set-NsxSslVpn [-SslVpn] <XmlElement> [-Confirm] [-Enabled] [-EnableCompression]

[-ForceVirtualKeyboard] [-RandomizeVirtualkeys] [-PreventMultipleLogon]

[-ClientNotification <string>] [-EnablePublicUrlAccess] [-ForcedTimeout <int>]

[-SessionIdleTimeout <int>] [-ClientAutoReconnect] [-ClientUpgradeNotification]

[-EnableLogging] [-LogLevel <string>] [-ServerAddress <ipaddress>] [-ServerPort <int>]

[-CertificateID <string>] [-Enable_AES128_SHA] [-Enable_AES256_SHA] [-Enable_DES_CBC3_SHA]

[-Connection <psobject>] [<CommonParameters>]



ModuleName : PowerNSX

nonTerminatingErrors :

xmlns:command : http://schemas.microsoft.com/maml/dev/command/2004/10

xmlns:dev : http://schemas.microsoft.com/maml/dev/2004/10

xmlns:maml : http://schemas.microsoft.com/maml/2004/10

Name : Set-NsxSslVpn

Category : Function

Component :

Role :

Functionality :