Use this tab to proactively track changes on the Virtual Machines (VMs) deployed on any of these sources—VMware ESXi server, VMware vCenter server or the Amazon Web Services, Virtual Private Cloud (AWS-VPC).
When monitoring ESXi hosts that are part of the VM-Series NSX edition solution, use Dynamic Address Groups instead of using VM Information Sources to learn about changes in the virtual environment. For the VM-Series NSX edition solution, the NSX Manager provides Panorama with information on the NSX security group to which an IP address belongs. The information from the NSX Manager provides the full context for defining the match criteria in a Dynamic Address Group because it uses the service profile ID as a distinguishing attribute and allows you to properly enforce policy when you have overlapping IP addresses across different NSX security groups. A maximum of 32 tags (from vCenter server and NSX Manager) can be registered to an IP address.
There are two ways to monitor VM Information Sources:
The firewall can monitor the VMware ESXi server, VMware vCenter server and the AWS-VPC environments and retrieve changes as you provision or modify the guests configured on the monitored sources. For each firewall or for each virtual system on a multiple virtual systems capable firewall, you can configure up to 10 sources.
If your firewalls are configured in a high availability configuration:
in an active/passive setup, only the active firewall monitors the VM information sources. in an active/active setup, only the firewall with the priority value of primary monitors the VM information sources.
For information on how VM Information Sources and Dynamic Address Groups can work synchronously and enable you to monitor changes in the virtual environment, refer to the VM-Series Deployment Guide .
For IP address to user mapping, you can either configure the VM Information Sources on the Windows User-ID agent or on the firewall to monitor the VMware ESXi and vCenter server and retrieve changes as you provision or modify the guests configured on the server. Up to 100 sources are supported on the Windows User-ID agent; support for AWS is not available for the User-ID agent.
Each VM on a monitored ESXi or vCenter server must have VMware Tools installed and running. VMware Tools provide the capability to glean the IP address(es) and other values assigned to each VM.
To collect the values assigned to the monitored VMs, the firewall monitors the following attributes.
Attributes Monitored on a VMware Source Attributes Monitored on the AWS-VPC
UUID Name Guest OS VM State — the power state can be poweredOff, poweredOn, standBy, and unknown. Annotation Version Network — Virtual Switch Name, Port Group Name, and VLAN ID Container Name —vCenter Name, Data Center Object Name, Resource Pool Name, Cluster Name, Host, Host IP address. Architecture Guest OS Image ID Instance ID Instance State Instance Type Key Name Placement—Tenancy, Group Name, Availability Zone Private DNS Name Public DNS Name Subnet ID Tag (key, value) (up to5 tags supported per instance VPC ID
Add —To add a new source for VM Monitoring, click Add and then fill in the details based on the source being monitored:
For VMware ESXi or vCenter Server, see Settings to Enable VM Information Sources for VMware ESXi and vCenter Servers . For AWS-VPC, see Settings to Enable VM Information Sources for AWS VPC.
Refresh Connected —Click to refresh the connection status; it refreshes the onscreen display. This option does not refresh the connection between the firewall and the monitored sources.
Delete—Select a configured VM Information source and click to remove the configured source.
Settings to Enable VM Information Sources for VMware ESXi and vCenter Servers
The following table describes settings you can configure to enable VM information sources for VMware ESXi and vCenter servers.
Setting to Enable VM Information Sources for VMware ESXi and vCenter Servers Description
Name Enter a name to identify the monitored source (up to 31 characters). The name is case-sensitive and must be unique. Use only letters, numbers, spaces, hyphens, and underscores.
Type Select whether the host/source being monitored is an ESXi server or vCenter server.
Description (Optional) Add a label to identify the location or function of the source.
Port Specify the port on which the host/source is listening (default port 443).
Enabled By default the communication between the firewall and the configured source is enabled. The connection status between the monitored source and the firewall displays in the interface as follows: —Connected —Disconnected —Pending (The connection status may also display as yellow when the monitored source is disabled.) Clear the Enabled option to disable communication between the host and the firewall.
Timeout Enter the interval in hours after which the connection to the monitored source is closed, if the host does not respond (range is 2–10; default is 2). (Optional) To change the default value, select this option to Enable timeout when the source is disconnected and specify the value. When the specified limit is reached or if the host is inaccessible or the host does not respond, the firewall will close the connection to the source.
Source Enter the FQDN or the IP address of the host/source being monitored.
Username Specify the username required to authenticate to the source.
Password Enter the password and confirm your entry.
Update Interval Specify the interval, in seconds, at which the firewall retrieves information from the source (range is 5–600; default is 5).
Settings to Enable VM Information Sources for AWS VPC
The following table describes the setting you configure to enable VM information sources for an AWS VPC.
Setting to Enable VM Information Sources for an AWS VPC Description
Name Enter a name to identify the monitored source (up to 31 characters). The name is case-sensitive and must be unique. Use only letters, numbers, spaces, hyphens, and underscores.
Type Select AWS VPC.
Description (Optional) Add a label to identify the location or function of the source.
Enabled By default the communication between the firewall and the configured source is enabled. The connection status between the monitored source and the firewall displays in the interface as follows: —Connected —Disconnected —Pending (The connection status may also display as yellow when the monitored source is disabled.) Clear the Enabled option to disable communication between the host and the firewall.
Source Add the URI in which the Virtual Private Cloud resides in the following format: ec2.<your_AWS_region>.amazonaws.com. For example, ec2.us-west-1.amazonaws.com .
Access Key ID Enter the alphanumeric text string that uniquely identifies the user who owns or is authorized to access the AWS account. This information is a part of the AWS Security Credentials. The firewall requires the credentials—Access Key ID and the Secret Access Key—to digitally sign API calls made to the AWS services.
Secret Access Key Enter the password and confirm your entry.
Update Interval Specify the interval, in seconds, at which the firewall retrieves information from the source (range is 60–1,200; default is 60).
Timeout The interval in hours after which the connection to the monitored source is closed, if the host does not respond (default is 2) (Optional) Select this option to Enable timeout when the source is disconnected. When the specified limit is reached or if the source is inaccessible or the source does not respond, the firewall will close the connection to the source.
VPC ID Enter the ID of the AWS-VPC to monitor, for example, vpc-1a2b3c4d. Only EC2 instances that are deployed within this VPC are monitored. If your account is configured to use a default VPC, the default VPC ID will be listed under AWS Account Attributes.

Related Documentation