VMware, Inc.
ATTRIBUTE-BASED FIREWALL RULE ENFORCEMENT

Last updated:

Abstract:

Example methods and systems for attribute-based firewall rule enforcement are described. One example method may comprise a computer system obtaining, from a management entity, one or more first firewall rules configured based on first attribute information. The computer system may detect a login event associated with a user operating a user device to log onto a virtualized computing instance. In response to determination that the user is associated with the first attribute information, the one or more first firewall rules may be applied. Otherwise, in response to determination that the user is associated with second attribute information that is different from the first attribute information, the computer system may obtain and apply one or more second firewall rules configured based on the second attribute information.

Status:
Application
Type:

Utility

Filling date:

17 Feb 2021

Issue date:

30 Jun 2022