Configure network traffic rules to allow inbound and outbound connections with other networks.
About this task
CAUTION:
When configuring network firewall rules, do not allow IP addresses that belong to the 172.24.0.192/26 subnet. IP addresses in the 172.24.0.192–172.24.0.255 range are used for Docker network configuration, and unexpected results can occur if they are also used by
PowerProtect Data Manager.
The following example describes the procedure to allow inbound TCP traffic on a particular port.
NOTE:GCP uses the terms
ingress and
egress for inbound and outbound traffic.
Steps
From the Google Cloud Console, navigate to
VPC network > Firewall, and click
CREATE FIREWALL RULE.
Under
Direction of traffic, select
Ingress.
Under
Action on match, select
Allow.
Under
Targets select
Specified target tags.
Under
Target tags, enter the name of the network firewall rule.
Under
Source IP ranges, enter the subnet of the allowed inbound traffic..
Under
Protocols and ports, select
Specified protocols and ports, select
tcp, and enter the IP address to allow.
Navigate to
Compute Engine > VM Instances, select the
PowerProtect Data Manager instance, and click
EDIT.
Under
Network tags, add the network firewall rule you created in step 5.
Data is not available for the Topic
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please select whether the article was helpful or not.
Comments cannot contain these special characters: <>()\