Configuring Allowed Servers
Steps to configure allowed servers.
A Data Store is a central concept in the Policy Management. It is another built-in safety mechanism for operating the system securely. Data Stores group the Protector locations and the relevant Policies. Only the allowed servers are able to pull the Policy and enforce it.
If more flexibility is required, you can create a default Data Store that deploys the Policy to any Protector that requests it from ESA. This is a valid strategy for Cloud Protectors, such as serverless functions and containers, that frequently update their IP ranges.
You can create, view, and manage Data Stores by navigating to Policy Management from the main menu, and choosing Data Stores.
Note: The maximum length of the data store name is 55 characters.
You cannot create multiple data stores with the same names. You can create only one default data store for a single instance of ESA.
To create a data store:
On the ESA Web UI, navigate to Policy Management > Data Stores.
The list of all the data stores appear.
Click Add New Data Store.
The New Data Store screen appears.
Enter a unique name identifying the data store in the Name textbox.
Enter the description describing the data store in the Description textbox.
Determine if the new Data Store should be a default Data Store by setting the value to Yes or No.
If a default data store already exists and you are updating another data store as the default data store, then the following message appears.
A default Data Store already exists, Please confirm to make this the new default Data Store.
Click Ok.
Click Save.
A message Data Store has been created successfully appears.
You can use the Policy Management REST API to create Data Stores.
Data Stores can be fully modified after they have been created.
To remove a Data Store:
On the ESA Web UI, navigate to Policy Management > Data Stores.
The Data Stores tab appears.
Select the name of the Data Store from the list, and click the Delete action.
A confirmation dialog box appears.
Click OK.
A message Data Store has been deleted successfully appears.
Steps to configure allowed servers.
You can add Trusted Applications to your Data Stores to limit allowed Policy requests to only authorized Applications.
You add a policy to a data store before deploying it to remote protection points.
Was this page helpful?