Creating Intra Data Center Firewall Policies

Updated by Chris Little on Mar 27, 2015

Overview

The CenturyLink Cloud Platform provides self-service tools to connect networks within a particular data center ("intra data center") through the use of configurable firewall policies. This is useful when a customer has multiple networks (vlans) within a particular account, or has a range of sub-accounts with their own vlans, and wants to selectively choose the traffic that can flow among them.

Connecting Networks within a Single Account

  1. Create network VLAN(s) in the respective CenturyLink Cloud Data Center. We recommend applying friendly names to Networks.

  2. Validate the networks are in place in your CenturyLink Cloud account using the Networks menu item and selecting the appropriate Data Center. In the sample below, a Web Services & Database Services VLAN exists in UC1.

    validate networks

  3. Create Virtual Instances within the appropriate network (VLAN). In this example, we have created (2) VM's as follows:

    Web VM (IP 10.120.68.15) in Web Services 10.120.68.50/24 Network (VLAN)

    Web VM

    DB VM (IP 10.120.69.12) in Database Services 10.120.69.0/24 Network (VLAN)

    DB VM

    OPTIONAL: Perform a test ICMP ping between the web server & database server. This test should fail as no Firewall Rule is in place between networks in UC1.

    Ping Test

  4. Using the left side navigation bar, click on Network > Firewall.

    Navigate to Firewall

  5. Select the desired CenturyLink Cloud Data Center node you wish to create an Firewall rule. Next, choose to the Intra Data Center tab. In this example, we used UC1.

    Intra DC Policy

  6. Choose Add Policy, Add Source Address.

    Source Policy

  7. Select the appropriate source network followed by the subnet size. Customers can choose to do an entire network (VLAN), CIDR blocks or individual IPs in the rule set. In this example, we are choosing the Web Services (10.120.68.0/24) network and the individual Web VM (10.120.68.15) for this rule set.

    Source Policy network

    Source Policy end state

  8. Choose Add Destination Address. Select the appropriate destination network followed by the subnet size. Customers can choose to do an entire network (VLAN), CIDR blocks or individual IPs in the rule set. In this example, we are choosing the Database Services (10.120.69.0/24) network and the individual DB VM (10.120.69.12) for this rule set.

    destination network

  9. Select Add Ports. Customers can choose from predefined TCP ports (any, FTP, FTPS, HTTP, HTTPS, PING, SSH, RDP), Custom TCP or UDP ports and Custom TCP or UDP port ranges all within the same rule set. For demonstration purposes, we are simply opening PING. Choose Ok.

    source and destination networks

    ports open

  10. Once complete, press the Save button. Your new Intra Data Center Rule will take less than 60 seconds to process in the Queue. You can review its progress using the Queue Menu item.

    completed policy

  11. Confirm the Intra Data Center Firewall Policy is functional by performing another ICMP Ping test between virtual instances located in the (2) networks. In this example, we are able to ping from the Web VM (10.120.68.15) to the DB VM (10.120.69.12).

    ping test

Connecting Networks Across a Parent & Sub-Account Hierarchy

  1. Create the appropriate Parent & Sub-Account Hierarchy. Refer to the Account Hierarchy Primer for more information.

  2. Create network VLAN(s) in the respective CenturyLink Cloud Data Center and Accounts. We recommend applying friendly names to Networks.

  3. Validate the networks are in place in your CenturyLink Cloud accounts using the Networks menu item and selecting the appropriate Data Center. In the sample below, a Parent Web Services network & a Sub-Account DB VLAN exists in UC1 under unique Accounts.

    Web VLAN

    DB VLAN

  4. Create Virtual Instances within the appropriate network (VLAN). In this example, we have created (2) VMs as follows

    Web VM (IP 10.120.68.15) in Web Services 10.120.68.50/24 Network (VLAN)

    Web VM

    DB VM (IP 10.122.171.12) in Sub-Account DB 10.122.171.0/24 Network (VLAN)

    DB VM

    OPTIONAL: Perform a test ICMP ping between the web server (parent account) & database server (sub-account). This test should fail as no Firewall Rule is in place between these networks in UC1.

  5. Using the left side navigation bar, click on Network > Firewall.

    Navigate to Firewall

  6. Select the desired CenturyLink Cloud Data Center node you wish to create an Firewall rule. Next, choose to the Intra Data Center tab and change the destination account to the appropriate sub-account. In this example, in UC1 we chose a Sandbox Sub Account.

    Destination Account

  7. Choose Add Policy, Add Source Address.

    Add Source Address

  8. Select the appropriate source network followed by the subnet size. Customers can choose to do an entire network (VLAN), CIDR blocks or individual IPs in the rule set. In this example, we are choosing the Web Services (10.120.68.0/24) network and the individual Web VM (10.120.68.15) for this rule set.

    Select Source Network or IP

    Source Network Complete

  9. Choose Add Destination Address. Select the appropriate destination network followed by the subnet size. Customers can choose to do an entire network (VLAN), CIDR blocks or individual IPs in the rule set. In this example, we are choosing the Sub-Account DB (10.122.171.0/24) network and the individual DB VM (10.122.171.12) for this rule set.

    Select Destination Network or IP

  10. Select Add Ports. Customers can choose from predefined TCP ports (any, FTP, FTPS, HTTP, HTTPS, PING, SSH, RDP), Custom TCP or UDP ports and Custom TCP or UDP port ranges all within the same rule set. For demonstration purposes, we are simply opening PING. Choose Ok.

    Source and Destination complete

    Select Ports

  11. Once complete, press the Save button. Your new Intra Data Center Rule will take less than 60 seconds to process in the Queue. You can review its progress using the Queue Menu item.

    Firewall Rule Complete

  12. Confirm the Intra Data Center Firewall Policy is functional by performing another ICMP Ping test between virtual instances located in the (2) networks. In this example, we are able to ping from the Web VM (10.120.68.15) to the DB VM (10.122.171.12).

    Ping Test

Customer Support

Can’t find what you need?
Give us a call.

1.888.638.6771

M – F, 8am to 6pm