CLOUDSTACK-4569 review comments on egress firewall and multiple ip per nic

This commit is contained in:
radhikap 2013-08-30 15:44:18 +05:30
parent 7a0cd10f85
commit 5275618bcc
2 changed files with 9 additions and 9 deletions

View File

@ -108,12 +108,12 @@
</orderedlist>
</section>
<section id="default-egress-policy">
<title>Changing the Default Egress Policy</title>
<para>You can configure the default policy of egress firewall rules in Isolated Advanced
networks. Use the create network offering option to determine whether the default policy
should be block or allow all the traffic to the public network from a guest network. If no
policy is specified, by default all the traffic is allowed from the guest network that you
create by using this network offering.</para>
<title>Configuring the Default Egress Policy</title>
<para>The default egress policy for Isolated guest network is configured by using Network
offering. Use the create network offering option to determine whether the default policy
should be block or allow all the traffic to the public network from a guest network. Use this
network offering to create the network. If no policy is specified, by default all the traffic
is allowed from the guest network that you create by using this network offering.</para>
<para>You have two options: Allow and Deny.</para>
<formalpara>
<title>Allow</title>

View File

@ -75,9 +75,9 @@
</listitem>
<listitem>
<para>Click Acquire New Secondary IP, and click Yes in the confirmation dialog.</para>
<para>You need to specify the secondary IP address on the guest VM. &PRODUCT; will not
automatically configure the acquired IP address on the VM. Ensure that you assign IPs to
NIC each time the VM reboots.</para>
<para>You need to configure the IP on the guest VM NIC manually. &PRODUCT; will not
automatically configure the acquired IP address on the VM. Ensure that the IP address
configuration persist on VM reboot.</para>
<para>Within a few moments, the new IP address should appear with the state Allocated. You
can now use the IP address in Port Forwarding or StaticNAT rules.</para>
</listitem>