Network Policies

Create virtual network security groups and apply security

policies to private and public environments

Frame 7.jpg

Network Policies

Application for creation of security groups and policies for granular control of network traffic based on sources or destinations (IPs, ports, sockets).

Security View (4).jpg

Policies Architecture Diagram

Policies ArchitectureFINAL .jpg

Turning scribbles to prototypes

Wires (4).jpg

Wireframing and finding out Information Architecture

ezgif.com-gif-maker (8).gif

Main flows

Information Architecture and functionalities defined during this phase.

 

UX Solution

The console Virtual Network operations feature allows to locate the endpoints on the user's environment, assign a group name, an icon that represents what is running for, brief description, and identify VMs created in others UIs like OpenStack.

Two types of view were built to facilitate mental models.

 

Main Workflows

 
ezgif.com-gif-maker (9).gif

Creating Virtual Groups

Assign an icon representation and endpoints to send

data.

ezgif.com-gif-maker (10).gif

Assigning rules

According to the traffic, the user can assign a protocol in a granular manner.