To use the container firewall feature of Security Center, you must create a source network object and a destination network object. This topic describes how to create a network object.
Only Security Center Ultimate supports this feature. If you do not use the Ultimate edition, you must upgrade Security Center to the Ultimate edition before you can use this feature. For more information about how to purchase and upgrade Security Center, see Purchase Security Center and Upgrade and downgrade Security Center. For more information about the features that each edition supports, see Features.
- Log on to the Security Center console.
- In the left-side navigation pane, choose .
- On the Container Firewall page, click the Object tab.
- On the Object tab, click Add Network Object.
- In the Add Network Object panel, configure the following parameters.
Parameter Description Object name Enter the name of the network object. NameSpace Select or enter the namespace to which the network object belongs.Note You can enter the namespace of a cluster. Fuzzy match is supported. Example: a*. AppName Select or enter the name of the application to which the network object belongs.Note You can enter the label value of a pod whose label key is app. Fuzzy match by suffix is supported. Example: abc*. Image Select or enter the image of the network object. Label Select or enter the label of the pod that you want to protect. You can select one or more labels.
- Click OK. The new network object appears on the Object tab.
- You can click Edit or Delete in the Operation column of the network object to modify or delete the network object.
- You can also select multiple network objects and click Batch delete below the network object list to delete the network objects at a time.
Note You can delete a network object only when the network object is not added to a defense rule.
What to do next
After you create a source network object and a destination network object, you can create a defense rule to control traffic from the source network object to the destination network object. The defense rule can be used to allow, block, or generate alerts for unusual traffic from the source network object to the destination network object. For more information about how to create a defense rule, see Create a defense rule.