Connect firewalls to virtual machines to enable network protection
Firewalls must be attached to VMs to take effect. You can manage these attachments through the firewall management interface.
To attach a firewall to a virtual machine:
Access Attachment Interface
From the firewall card, click the “Attach” button
Select Target VM
Select a VM from the list of available machines:
Confirm Attachment
Click “Attach Firewall” to confirm the attachment
Monitor Attachment Status
Wait for attachment to complete and verify success
Active VM Needed
System Prerequisites
Attachment-Ready States
ACTIVE
Attachment-Ready States
ACTIVE
Cannot Attach Firewalls
HIBERNATED
SHUTOFF
CREATING/DELETING
Problematic VM States
ERROR
UNKNOWN
Firewall Stacking
Multiple Firewall Support
Rule Interaction
How Multiple Firewalls Work Together
Management Strategy
Best Practices for Multiple Firewalls
Functional Separation
Web Tier Firewall:
Application Tier Firewall:
Management Firewall:
Functional Separation
Web Tier Firewall:
Application Tier Firewall:
Management Firewall:
Environment Separation
Production Firewall:
Development Firewall:
Staging Firewall:
To view and manage firewall attachments:
Access Firewall Details
Click “View Details” on any firewall card
Navigate to Attachments
Select the “Attached VMs” tab in the firewall details interface
Review Attachment Information
View comprehensive attachment details:
Manage Attachments
Use available controls to detach or modify attachments as needed
The attachment interface provides detailed information for management:
Essential Information
Essential Information
Operational Status
Attachment Details
To remove firewall protection from a VM:
Access Detachment Interface
Navigate to firewall details and locate the attached VM
Initiate Detachment
Click the detach button for the specific VM
Confirm Detachment
Review the detachment warning and confirm the action
Monitor Detachment
Wait for detachment to complete and verify removal
Detachment Security Warning:
Detaching a firewall immediately removes network protection from the VM. Ensure you have alternative security measures in place or that the VM doesn’t require firewall protection before proceeding.
Security Impact
Protection Removal
Service Continuity
Application Impact
Alternative Protection
Security Alternatives
Assess Security Requirements
Design Firewall Architecture
Test Attachment Strategy
Implement and Monitor
When to Attach Firewalls
Post-Attachment Monitoring
VM Not Eligible
VM Cannot Be Selected
Attachment Fails
Attachment Process Errors
Attachment Shows Error
Error Status After Attachment
Check VM Status
Validate Firewall Configuration
Test Network Connectivity
Contact Support if Needed
When multiple firewalls are attached to the same VM, all rules apply cumulatively. Plan your firewall architecture carefully to avoid conflicts and ensure optimal security coverage.
Always test firewall attachments in a development environment before applying to production VMs. This helps identify potential connectivity issues and rule conflicts before they impact live services.
Connect firewalls to virtual machines to enable network protection
Firewalls must be attached to VMs to take effect. You can manage these attachments through the firewall management interface.
To attach a firewall to a virtual machine:
Access Attachment Interface
From the firewall card, click the “Attach” button
Select Target VM
Select a VM from the list of available machines:
Confirm Attachment
Click “Attach Firewall” to confirm the attachment
Monitor Attachment Status
Wait for attachment to complete and verify success
Active VM Needed
System Prerequisites
Attachment-Ready States
ACTIVE
Attachment-Ready States
ACTIVE
Cannot Attach Firewalls
HIBERNATED
SHUTOFF
CREATING/DELETING
Problematic VM States
ERROR
UNKNOWN
Firewall Stacking
Multiple Firewall Support
Rule Interaction
How Multiple Firewalls Work Together
Management Strategy
Best Practices for Multiple Firewalls
Functional Separation
Web Tier Firewall:
Application Tier Firewall:
Management Firewall:
Functional Separation
Web Tier Firewall:
Application Tier Firewall:
Management Firewall:
Environment Separation
Production Firewall:
Development Firewall:
Staging Firewall:
To view and manage firewall attachments:
Access Firewall Details
Click “View Details” on any firewall card
Navigate to Attachments
Select the “Attached VMs” tab in the firewall details interface
Review Attachment Information
View comprehensive attachment details:
Manage Attachments
Use available controls to detach or modify attachments as needed
The attachment interface provides detailed information for management:
Essential Information
Essential Information
Operational Status
Attachment Details
To remove firewall protection from a VM:
Access Detachment Interface
Navigate to firewall details and locate the attached VM
Initiate Detachment
Click the detach button for the specific VM
Confirm Detachment
Review the detachment warning and confirm the action
Monitor Detachment
Wait for detachment to complete and verify removal
Detachment Security Warning:
Detaching a firewall immediately removes network protection from the VM. Ensure you have alternative security measures in place or that the VM doesn’t require firewall protection before proceeding.
Security Impact
Protection Removal
Service Continuity
Application Impact
Alternative Protection
Security Alternatives
Assess Security Requirements
Design Firewall Architecture
Test Attachment Strategy
Implement and Monitor
When to Attach Firewalls
Post-Attachment Monitoring
VM Not Eligible
VM Cannot Be Selected
Attachment Fails
Attachment Process Errors
Attachment Shows Error
Error Status After Attachment
Check VM Status
Validate Firewall Configuration
Test Network Connectivity
Contact Support if Needed
When multiple firewalls are attached to the same VM, all rules apply cumulatively. Plan your firewall architecture carefully to avoid conflicts and ensure optimal security coverage.
Always test firewall attachments in a development environment before applying to production VMs. This helps identify potential connectivity issues and rule conflicts before they impact live services.