Once you have some VMs on your vCloud network you will need to allow them access to the internet.
Outbound access is configured on the Edge gateway using a firewall and a Source NAT rule
The firewall rule will allow the internal traffic to reach the external network and the NAT rule will map the internal IP to an external public IP.
To create the rule follow the seps below.
Click on Edges in the Networking section to display a list of Edge gateways in the current vDC
Click on the Edge gateway to get the general configuration menus. Select Gateway Interfaces and make a note of the Primary IP. This is the Edges external IP. We will need that for creating rules.
Now go back to the list of Edge gateways and select the edge we want to edit the firewall rules on. Select the SERVICES link.
The Edge config widow will open and show firewall rules.
To allow outbound access we need a firewall rule and a SNAT rule.
I always click the Show only user defined rules slider to hide the default rules. Then click the Plus button to add a rule.
A blank rule is created.
Double click the New rule box to enter a new name for the rule.
Hover the mouse over the Source box and two icons will appear. Click the Plus and a window with select-able objects will pop up
Click on the Internal object, then click the right arrow to move it to the selected list on the right. Then click Keep.
Back at the rule, hover the mouse over the Destination box and click the Plus.
Now we select and keep the External object.
Now the rule is complete. We could lock it down to specific traffic but for this example allowing any traffic out is fine. Now click the Save changes link on the top right to commit the rule.
Now click the NAT tab to be taken to the NAT rule page.
Click the SNAT RULE button under NAT 44 Rules (IPv4)
The create SNAT rule window pops up.
here we enter the original source (Internal) IP range.
The Translated Source IP/Range is the external IP of the edge (that we looked up in the fist step).
Add a description if you want to.
Click Keep when finished.
Now click Save changes to commit the rule
With the rule saved we now have now alowed outbound traffic. Now we can point our VMs at what ever update portal is available to them, down load applications and prep them for there final job.
Other posts in this series