When you provision a multi-machine service in vCloud Automation Center, you can provision virtualized networks and related services for the vSphere component machines in that multi-machine service based on the vCloud Networking and Security and NSX platforms.

Fabric administrators create network profile templates, external network profiles, and the reservations that determine the available networks and other settings. Tenant administrators and business group managers create NAT, routed, and private network profiles, virtual network adapters, and virtual load balancers, specify applicable security policies, security groups, and security tags to a multi-machine blueprint.

A tenant administrator or business group manager can create NAT, routed, and private network profiles for a multi-machine blueprint, and assign those profiles to virtual network adapters in the same multi-machine blueprint.

A network adapter defines a network connection for a component machine. A tenant administrator or business group manager can configure a network adapter for a multi-machine blueprint, and apply the network adapter to one or more component blueprints in that multi-machine blueprint.

A tenant administrator or business group manager can configure a load balancer for a multi-machine component blueprint. All machines provisioned from the component blueprint are added as members of the load balancer.

From the Security tab the tenant administrator or business group manager can enable the App isolation and assign security groups, security tags, and security policies to a multi-machine blueprint.

A tenant administrator or business group manager can configure reservations for use in provisioning the routed gateway of a multi-machine service.

When App Isolation is enabled for a multi-machine blueprint, the firewall blocks all inbound and outbound traffic to the component machines of the blueprint. The component machines within a multi-machine blueprint can communicate with each other but cannot connect outside the firewall.