Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

update for pro #633

Merged
merged 2 commits into from
Dec 12, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
12 changes: 6 additions & 6 deletions ace_pro/docs/lab5.md
Original file line number Diff line number Diff line change
Expand Up @@ -198,8 +198,8 @@ Begin
```

After having enabled the DCF, two Rules will get generated, automatically:
- `Greendfield-Rule`
- `DefaultDenyAll` = EXPLICIT DENY
- `Greendfield-Rule` = ALLOW EVERYTHING
- `DefaultDenyAll` = it's an EXPLICIT deny

The first rule essentially allows all kind of traffic.

Expand Down Expand Up @@ -452,7 +452,7 @@ The purpose of this **WebGroup** is to authorize traffic only towards both the D
```

## 6. Edit the Egress-Rule
### 6.1 Create a new rule
### 6.1 Apply a change on an existing rule

Go to **CoPilot > Security > Distributed Cloud Firewall > Rules**, click on the **pencil** button on the right-hand side of the `Egress-Rule`.

Expand All @@ -477,8 +477,8 @@ Commit the changes
```

```{important}
- **Anywhere (0.0.0.0/0)** = Default Route
- **Publlic Internet** = NON-RFC1918 routes
- **Anywhere (0.0.0.0/0)** = Represents all CIDR ranges or IP addresses.
- **Publlic Internet** = Represents non-RFC 1918 IP ranges, or the public Internet
```

Now you have effectively activated the **ZTNA** approach.
Expand All @@ -495,7 +495,7 @@ align: center
ZTNA
```

### 6.1.1 Test the new rule
### 6.1.1 Test the modified rule

Go to **CoPilot > Security > Egress > Monitor** and select the **_Live View_** from the `"Time Period"` field, then select the **_aws-us-east-2-spoke1_** VPC from the `"VPC/VNets"` drop-down window.

Expand Down
12 changes: 6 additions & 6 deletions docs/ace-pro/_sources/docs/lab5.md
Original file line number Diff line number Diff line change
Expand Up @@ -198,8 +198,8 @@ Begin
```

After having enabled the DCF, two Rules will get generated, automatically:
- `Greendfield-Rule`
- `DefaultDenyAll` = EXPLICIT DENY
- `Greendfield-Rule` = ALLOW EVERYTHING
- `DefaultDenyAll` = it's an EXPLICIT deny

The first rule essentially allows all kind of traffic.

Expand Down Expand Up @@ -452,7 +452,7 @@ The purpose of this **WebGroup** is to authorize traffic only towards both the D
```

## 6. Edit the Egress-Rule
### 6.1 Create a new rule
### 6.1 Apply a change on an existing rule

Go to **CoPilot > Security > Distributed Cloud Firewall > Rules**, click on the **pencil** button on the right-hand side of the `Egress-Rule`.

Expand All @@ -477,8 +477,8 @@ Commit the changes
```

```{important}
- **Anywhere (0.0.0.0/0)** = Default Route
- **Publlic Internet** = NON-RFC1918 routes
- **Anywhere (0.0.0.0/0)** = Represents all CIDR ranges or IP addresses.
- **Publlic Internet** = Represents non-RFC 1918 IP ranges, or the public Internet
```

Now you have effectively activated the **ZTNA** approach.
Expand All @@ -495,7 +495,7 @@ align: center
ZTNA
```

### 6.1.1 Test the new rule
### 6.1.1 Test the modified rule

Go to **CoPilot > Security > Egress > Monitor** and select the **_Live View_** from the `"Time Period"` field, then select the **_aws-us-east-2-spoke1_** VPC from the `"VPC/VNets"` drop-down window.

Expand Down
Loading