Service Composer offers a canvas view displaying all security groups within the selected NSX Manager. The view also displays details such as members of each security group as well as the security policy applied on it.
This topic introduces Service Composer by walking you through a partially configured system so that you can visualize the mappings between security groups and security policy objects at a high level from the canvas view.
Each rectangular box in the canvas represents a security group and the icons within the box represents security group members and details about the security policy mapped to the security group.
A number next to each icon
indicates the number of instances - for example,
indicates that 1 security policy is mapped to that
security group.
Clicking an icon displays a dialog box with appropriate details.
You can search for security groups by name. For example, if you type PCI in the search field in the top right corner of the canvas view, only the security groups with PCI in their names are displayed.
To see the security group hierarchy, click the
Top
Level () icon at the top left of the window and select the
security group you want to display. If a security group contains nested
security groups, click
to display the nested groups. The top bar displays the
name of the parent security group and the icons in the bar display the total
number of security policies, endpoint services, firewall services, and network
introspection services applicable to the parent group. You can navigate back up
to the top level by clicking the
Go up one
level (
) icon in the top left part of the window.
You can zoom in and out of the canvas view smoothly by moving the zoom slider on the top right corner of the window. The Navigator box shows a zoomed out view of the entire canvas. If the canvas is much bigger than what fits on your screen, it will show a box around the area that is actually visible and you can move it to change the section of the canvas that is being displayed.
Now that we have seen how the mapping between security groups and security policies work, you can begin creating security policies to define the security services you want to apply to your security groups.