- Overview
- GUI Overview
- Configuring Primary Authentication
- Configuring RBAC
- Configuring Trusted Points
- Configuring System Profiles
- Configuring VM Managers
- Configuring Tenants
- Configuring InterCloud Resources
- Configuring Service Policies and Profiles
- Configuring Device Policies and Profiles
- Configuring Managed Resources
- Configuring Administrative Operations
- Resource Management
- Resource Manager
- Virtual Machines
- Virtual Security Gateways
- ASA 1000V Cloud Firewalls
- Importing Service Images
- Managing Compute Firewalls
- Editing a Compute Firewall
- Deleting a Compute Firewall
- Unassigning a VSG
Configuring Managed Resources
This section includes the following topics:
- Resource Management
- Resource Manager
- Virtual Machines
- Virtual Security Gateways
- ASA 1000V Cloud Firewalls
- Importing Service Images
- Managing Compute Firewalls
- Managing Edge Firewalls
- Verifying VM Registration
- Examining Fault Details
- Launching ASDM
- Managing Pools
Resource Management
You manage VMs by discovering those VMs that have at least one network interface configured with a Nexus 1000V port profile.
Resource Manager
Resource Manager manages logical edge and compute firewalls and their association with ASA 1000Vs and VSGs, respectively. When an edge firewall is associated with an ASA 1000V, the device configuration profile information (defined by the edge firewall) is pushed to the ASA 1000V which, in turn, triggers the ASA 1000V to download the security profiles and policies from Policy Manager.
Maintaining an inventory of ASA 1000Vs, VSGs, and VSMs.
With user input, defining compute firewalls and associating them with VSGs for provisioning.
With user input, defining edge firewalls and associating them with ASA 1000Vs for provisioning.
Integrating with hypervisor instances to retrieve VM attributes.
Virtual Machines
Virtualization allows you to create multiple VMs that run in isolation, side by side on the same physical machine. Each VM has virtual RAM, a virtual CPU and NIC, and an operating system and applications. Because of virtualization, the operating system sees a consistent set of hardware regardless of the actual physical hardware components.
VMs are encapsulated in files for rapid saving, copying, and provisioning, which means that you can move full systems, configured applications, operating systems, BIOS, and virtual hardware within seconds, from one physical server to another. Encapsulated files allow for zero-downtime maintenance and continuous workload consolidation.
Instances of Prime Network Services Controller are installed on VMs.
Virtual Security Gateways
Receive traffic from Virtual Network Service Data Path (vPath).
For every new flow, the vPath component encapsulates the first packet and sends it to a VSG as specified in the Nexus 1000V port profiles. It assumes that the VSG is Layer 2 adjacent to vPath. The mechanism used for communication between vPath and the VSG is similar to VEM and Nexus 1000V VSM communication on a packet VLAN.
Perform application fix-up processing such as FTP, TFTP, and RSH.
Evaluate policies by inspecting the packets sent by vPath using network, VM, and custom attributes.
Transmit the policy evaluation results to vPath.
Each vPath component maintains a flow table for caching VSG policy evaluation results.
ASA 1000V Cloud Firewalls
In Prime Network Services Controller, an edge firewall is associated with an ASA 1000V instance. After association, all applicable profile types for the ASA 1000V device type are pushed to the ASA 1000V instance. All edge profile objects that are created at the same organization level as the edge firewall object are pushed to the device.
Importing Service Images
Prime Network Services Controller enables you to import service images that you can then use to instantiate a service device.
After you import an image, Prime Network Services Controller automatically places the file in the correct location and populates the Images table.
![]() Note | For HA-specific configurations, please refer to the appropriate Cisco Virtual Security Gateway (VSG) or Cisco Adaptive Security Appliance 1000V (ASA 1000V) configuration guides for additional information. |
Managing Compute Firewalls
You can add, edit, and delete compute firewalls. In addition, you can assign a VSG to compute firewall, thereby placing the VSG in service. The following topics describe these activities in more detail.
Adding a Compute Firewall
You can add a compute firewall and assign it to a VSG, thereby placing the VSG in service. A wizard walks you through the configuration process, which includes assigning profiles, assigning a VSG or instantiating a VSG service image, and configuring interfaces.
When you add a new compute firewall, the firewall data IP address can be the same as the data IP address of an existing compute firewall in Prime Network Services Controller as long as the firewalls have different organizational paths. That is, as long as the firewalls do not reside in the same organization, including parent and child organizations.
![]() Note |
|
-
To assign a VSG, an available VSG that is registered in Prime Network Services Controller. For more information, see Verifying VM Registration.
-
To assign a VSG pool, a VSG pool with at least one available VSG.
-
To instantiate a VSG service device from an image, an imported service device image and VM Manager must be configured in Prime Network Services Controller.
| Step 1 | Choose Resource Management > Managed Resources > root > tenant > Compute Firewalls. |
| Step 2 | In the General
tab, click
Add
Compute Firewall.
The Add Compute Firewall Wizard opens. |
| Step 3 | In the Properties screen, provide the information as described in Properties Screen, then click Next. |
| Step 4 | In the Service Device screen, select the required VSG service device as described in Service Device Screen, then click Next. |
| Step 5 | (Instantiate option only) If you instantiate a VSG service device from an image, do one or both of the following in the Placement screen, then click Next: |
| Step 6 | In the
Interfaces screen, configure interfaces as follows, then click
Next:
For field-level help when configuring the interfaces, see the online help. |
| Step 7 | In the Summary screen, confirm that the information is correct, then click Finish. |
Field Descriptions
Properties Screen
| Field | Description |
|---|---|
|
Name |
Compute firewall name. This name can contain 1 to 32 identifier characters. You can use alphanumeric characters including hyphen, underscore, dot, and colon. You cannot change this name after it is created. |
|
Description |
Compute firewall description. |
|
Host Name |
Management hostname of the firewall. |
|
Device Configuration Profile |
|
Service Device Screen
| Field | Description |
|---|---|
|
Assign VSG |
Assign a VSG to the compute firewall. In the VSG Device drop-down list, choose the required service device. |
|
Assign VSG Pool |
Assign a VSG pool to the compute firewall. In the VSG Pool field, either choose the required pool from the drop-down list or click Add Pool to add a new pool. |
|
Instantiate |
|
Editing a Compute Firewall
You can edit existing compute firewalls as needed.
Deleting a Compute Firewall
Prime Network Services Controller enables you to delete firewalls that are not needed.
![]() Note | Users with the tenant-admin role cannot add or delete firewalls under a tenant. |
Unassigning a VSG
Managing Edge Firewalls
You can add an edge firewall, associate it with either an existing ASA 1000V instance or instantiate a new ASA 1000V from a service device image. The following topics describe these activities in more detail.
Adding an Edge Firewall
You can add an edge firewall and assign it to an ASA 1000V, thereby placing the ASA 1000V in service. A wizard walks you through the configuration process, which includes assigning configuration and service profiles, assigning an ASA 1000V or instantiating an ASA 1000V service image, and configuring interfaces.
-
To assign an ASA 1000V to the edge firewall, an ASA 1000V must be registered in Prime Network Services Controller and must be available for assignment. For more information about VM registration, see the Cisco Prime Network Services Controller 3.0.2 Quick Start Guide.
-
To instantiate an ASA 1000V service device from an image, an imported service device image and a VM Manager must be configured in Prime Network Services Controller.
| Step 1 | Choose Resource Management > Managed Resources > root > tenant > Edge Firewalls. | ||
| Step 2 | In the General
tab, click
Add
Edge Firewall.
The Add Edge Firewall Wizard opens. | ||
| Step 3 | In the Properties screen, provide the information described in Properties Screen, then click Next. | ||
| Step 4 | In the Service Device screen, do one of the following, then click Next: | ||
| Step 5 | (Instantiate option only) If you instantiate a ASA 1000V service device from an image, do one or both of the following in the Placement screen, then click Next: | ||
| Step 6 | In the
Interfaces screen, add the required interfaces as follows, then click
Next:
| ||
| Step 7 | In the Summary screen, confirm that the information is accurate, then click Finish. | ||
| Step 8 | If you
instantiated the
ASA 1000V from a service image, you must do
the following to ensure registration with
Prime Network Services Controller:
|
Field Descriptions
Properties Screen
| Field | Description |
|---|---|
|
Name |
Edge firewall name. This name can contain 1 to 32 identifier characters. You can use alphanumeric characters including hyphen, underscore, dot, and colon. You cannot change this name after it is created. |
|
Description |
Edge firewall description. |
|
Host Name |
Management hostname of the firewall. |
|
High Availability |
Check the Enable HA check box to enable high availability. |
|
Device Configuration Profile |
|
|
Device Service Profile |
|
Unassigning an ASA 1000V
If required, you can unassign an ASA 1000V from an edge firewall.
Verifying VM Registration
Examining Fault Details
Prime Network Services Controller enables you to examine the faults associated with successfully applied policies and configurations.
Examining Faults for Compute Firewalls
Prime Network Services Controller enables you to examine faults and configuration errors for compute firewalls.
Assign the compute firewall to a VSG instance.
| Step 1 | Choose Resource Management > Managed Resources > root > tenant > Compute Firewalls. The Edit Compute Firewall dialog box is displayed. |
| Step 2 | In the Compute Firewalls table, select the required firewall, then click Edit. |
| Step 3 | In the General tab, in the Status area, check the configuration, association, and reachability status. |
| Step 4 | In the Faults tab, review the displayed faults. To view additional information about an entry, double-click the entry, or select the entry and then click Properties. |
Examining Faults for Edge Firewalls
Prime Network Services Controller enables you to view faults for edge firewalls.
Assign the edge firewall to an ASA 1000V instance or instantiate an ASA 1000V service VM.
| Step 1 | Choose Resource Management > Managed Resources > root > tenant > Edge Firewalls. |
| Step 2 | In the Edge Firewalls table, choose the required edge firewall, then click Edit. |
| Step 3 | In the General tab, in the Status area, check the configuration, association, and reachability status. |
| Step 4 | In the Faults tab, review the displayed faults. To view additional information about an entry, double-click the entry or select the entry and then click Properties. |
Launching ASDM
Prime Network Services Controller enables you to launch Cisco Adaptive Security Device Manager (ASDM) as a Web Start application on your desktop.
You can set up ASDM to be used by the ASA 1000V when it is configured for either Prime Network Services Controller management mode or ASDM management mode. When the ASA 1000V is configured to use Prime Network Services Controller management mode, you can use ASDM to monitor the status of the ASA 1000V, but you cannot use it to manage configurations.
Before You Begin
Do one of the following: If you have not already deployed the ASA 1000V OVA, do so now; during the deployment, provide the ASDM client IP address.
If you have already deployed the ASA 1000V OVA, apply the following configuration by using the VM console in the vSphere client: Add a route on the management interface to the ASDM client subnet by issuing the following command: ASA1000V(config)# route interface ip subnet next-hop-ip
where interface is the management interface to the ASDM client subnet, ip is the IP address of the host that accesses ASDM, subnet is the ASDM client subnet, and next-hop-ip is the IP address of the gateway.

Note
Perform this step only if the next hop gateway IP address was not specified when deploying the ASA 1000V.Allow HTTP access via the management interface for the ASDM client subnet by entering the following command: ASA1000V(config)# http ip subnet interface
where ip is the IP address of the host that accesses ASDM, and interface is the ASDM client interface.

Note
Perform this step only if the ASDM client IP address was not specified when deploying the ASA 1000V.
Confirm the following: Assign the edge firewall to an ASA 1000V instance. If the edge firewall is not assigned to an ASA 1000V instance, the ASDM options are not displayed in the UI.
Confirm that your system is configured to run downloaded Java Web Start applications.
For more information about configuring ASDM, see the Cisco ASA 1000V Cloud Firewall Getting Started Guide.
| Step 1 | Choose Resource Management > Resources > Services Devices > All ASA 1000Vs. | ||
| Step 2 |
In the All ASA 1000Vs table, choose the required ASA 1000V, then click Launch ASDM. The ASDM Launch screen opens. | ||
| Step 3 |
In the ASDM Launch screen, click Run ASDM.
|
Managing Pools
Adding a Pool
| Step 1 | Choose Resource Management > Managed Resources > root > tenant > Pools. | ||||||||||||||||||||
| Step 2 | In the General tab, click Add Pool. | ||||||||||||||||||||
| Step 3 | In the Add Pool dialog box, enter the information as described in the following table, then click OK:
| ||||||||||||||||||||
| Step 4 | (Optional) Assign pool members to the pool by performing the following tasks: | ||||||||||||||||||||
| Step 5 | Click OK. | ||||||||||||||||||||
Assigning a Pool
After you have created a pool, you can assign it to a compute or edge firewall.
| Step 1 | Choose Resource Management > Managed Resources > root > Compute Firewalls or Edge Firewalls. |
| Step 2 | In the list of firewalls, select the required firewall, then click Assign Pool. |
| Step 3 | In the Assign Pool dialog box, either choose a pool from the Name drop-down list or click Add Pool to add a new pool. |
| Step 4 | Click OK. |
Editing a Pool
| Step 1 | Choose Resource Management > Managed Resources > root > tenant > Pools. | ||||||||||||||||||||||||||||
| Step 2 | In the General tab, select the pool that you want to edit, then click Edit. | ||||||||||||||||||||||||||||
| Step 3 | In the Edit Pool dialog box, edit the information as required by using the information in the following table, then click OK.
| ||||||||||||||||||||||||||||
Unassigning a Pool
If required, you can unassign a pool from a compute or edge firewall.
| Step 1 | Choose Resource Management > Managed Resources > root > Compute Firewalls or Edge Firewalls. |
| Step 2 | In the list of firewalls, select the required firewall, then click Unassign object/Pool where object is either ASA 1000V or VSG, depending on whether you selected an edge or compute firewall. |
| Step 3 | When prompted, confirm the deletion. |
Feedback