Manual Nsxticm30
Manual Nsxticm30
Copyright © 2021 VMware, Inc. All rights reserved. This manual and its accompanying
materials are protected by U.S. and international copyright and intellectual property laws.
VMware products are covered by one or more patents listed at
http://www.vmware.com/go/patents. VMware is a registered trademark or trademark of
VMware, Inc. in the United States and/or other jurisdictions. All other marks and names
mentioned herein may be trademarks of their respective companies. VMware vSphere®
vMotion®, VMware vSphere® Web Client, VMware vSphere® Client™, VMware vSphere®,
VMware vCenter Server®, VMware View®, VMware Horizon® View™, Not a trademarked
name, VMware Verify™, VMware Pivotal Labs® Navigator™, VMware NSX-T™ Data Center,
VMware NSX® Manager™, VMware NSX® Intelligence™, VMware NSX® Edge™, VMware
NSX® Data Center, VMware NSX®, VMware ESXi™ and VMware ACE™ are registered
trademarks or trademarks of VMware, Inc. in the United States and/or other jurisdictions.
The training material is provided “as is,” and all express or implied conditions, representations,
and warranties, including any implied warranty of merchantability, fitness for a particular
purpose or noninfringement, are disclaimed, even if VMware, Inc., has been advised of the
possibility of such claims. This material is designed to be used for reference purposes in
conjunction with a training course.
The training material is not a standalone training tool. Use of the training material for self-
study without class attendance is not recommended. These materials and the computer
programs to which it relates are the property of, and embody trade secrets and confidential
information proprietary to, VMware, Inc., and may not be reproduced, copied, disclosed,
transferred, adapted or modified without the express written approval of VMware, Inc.
www.vmware.com/education
Typographical Conventions
• <ESXi_host_name>
www.vmware.com/education
Contents
iv
Task 3: Configure an Edge Cluster ............................................................................................................................. 33
Lab 7 Configuring the Tier-1 Gateway .................................................................................... 35
Task 1: Prepare for the Lab ............................................................................................................................................ 36
Task 2: Create a Tier-1 Gateway ................................................................................................................................. 36
Task 3: Connect Segments to the Tier-1 Gateway .............................................................................................. 37
Task 4: Test East-West L3 Connectivity ................................................................................................................. 37
Lab 8 Configuring the Tier-0 Gateway .................................................................................. 38
Task 1: Prepare for the Lab ............................................................................................................................................ 39
Task 2: Create Uplink Segments .................................................................................................................................. 39
Task 3: Create a Tier-0 Gateway............................................................................................................................... 40
Task 4: Connect the Tier-0 and Tier-1 Gateways ................................................................................................43
Task 5: Test the End-to-End Connectivity ..............................................................................................................43
Lab 9 Configuring VRF Lite .........................................................................................................44
Task 1: Prepare for the Lab ............................................................................................................................................45
Task 2: Create the Uplink Trunk Segments ............................................................................................................ 46
Task 3: Deploy and Configure the VRF Gateways .............................................................................................. 47
Task 4: Deploy and Connect the Tier-1 Gateways to the VRF Gateways ................................................ 53
Task 5: Create and Connect Segments to the Tier-1 Gateways....................................................................54
Task 6: Attach VMs to Segments on Each VRF ................................................................................................... 55
Task 7: Test the VRF End-to-End Connectivity .................................................................................................... 56
Task 8: Review the Routing Tables in Each VRF .................................................................................................. 57
Task 9: Verify the Routing Isolation Between VRFs ........................................................................................... 59
Lab 10 Configuring the NSX Distributed Firewall................................................................ 61
Task 1: Prepare for the Lab ............................................................................................................................................ 62
Task 2: Test the IP Connectivity.................................................................................................................................. 62
Task 3: Create Security Groups ................................................................................................................................... 63
Task 4: Create Distributed Firewall Rules ................................................................................................................ 65
Task 5: Test the IP Connectivity After the Firewall Rule Creation................................................................ 67
Task 6: Prepare for the Next Lab ...............................................................................................................................68
Lab 11 Configuring the NSX Gateway Firewall .................................................................... 69
Task 1: Prepare for the Lab ........................................................................................................................................... 70
Task 2: Test SSH Connectivity .................................................................................................................................... 70
Task 3: Configure a Gateway Firewall Rule to Block External SSH Requests ........................................... 71
v
Task 4: Test the Effect of the Configured Gateway Firewall Rule................................................................ 72
Task 5: Prepare for the Next Lab ............................................................................................................................... 72
Lab 12 Configuring Distributed Intrusion Detection .......................................................... 73
Task 1: Prepare for the Lab ............................................................................................................................................ 74
Task 2: Download the Intrusion Detection Signatures........................................................................................ 74
Task 3: Enable Distributed Intrusion Detection for a vSphere Cluster ......................................................... 75
Task 4: Create an Intrusion Detection Profile ........................................................................................................ 75
Task 5: Configure the Intrusion Detection Rules ................................................................................................... 76
Task 6: Generate the Malicious East-West Traffic ............................................................................................... 77
Task 7: Analyze the Intrusion Detection Events ................................................................................................... 78
Lab 13 Analyzing Web Traffic with URL Analysis.............................................................. 79
Task 1: Prepare for the Lab ........................................................................................................................................... 80
Task 2: Configure the Tier-1 Gateway to Use Layer 7 Firewall Rules ........................................................... 81
Task 3: Create a Segment ............................................................................................................................................... 81
Task 4: Enable URL Analysis ......................................................................................................................................... 82
Task 5: Configure Custom Context Profiles for URL Analysis ........................................................................ 82
Task 6: Create a Layer 7 Rule for DNS Traffic ..................................................................................................... 84
Task 7: Generate Traffic for External Websites.................................................................................................... 85
Task 8: Review the URL Analysis Dashboard ........................................................................................................86
Task 9: Prepare for the Next Lab ...............................................................................................................................86
Lab 14 Configuring Network Address Translation ............................................................ 87
Task 1: Prepare for the Lab ............................................................................................................................................ 88
Task 2: Create a Tier-1 Gateway for Network Address Translation ............................................................ 88
Task 3: Create a Segment ..............................................................................................................................................89
Task 4: Attach a VM to the NAT-Segment ............................................................................................................89
Task 5: Configure NAT ................................................................................................................................................... 90
Task 6: Configure NAT Route Redistribution ......................................................................................................... 92
Task 7: Verify the IP Connectivity.............................................................................................................................. 94
Lab 15 Configuring Load Balancing .......................................................................................... 97
Task 1: Prepare for the Lab ............................................................................................................................................98
Task 2: Test the Connectivity to Web Servers.....................................................................................................98
Task 3: Create a Load Balancer ...................................................................................................................................99
Task 4: Configure Route Advertisement and Route Redistribution for the Virtual IP ......................... 102
Task 5: Prepare for the Next Lab ............................................................................................................................. 105
vi
Lab 16 Deploying Virtual Private Networks ....................................................................... 106
Task 1: Prepare for the Lab .......................................................................................................................................... 107
Task 2: Deploy a New NSX Edge Node to Support the VPN Deployment ............................................ 108
Task 3: Configure a New Edge Cluster ..................................................................................................................... 111
Task 4: Deploy and Configure a New Tier-0 Gateway and Segments for VPN Support .................. 112
Task 5: Create an IPSec VPN Service...................................................................................................................... 114
Task 6: Create an L2 VPN Server and Session .................................................................................................... 115
Task 7: Configure a Predeployed Autonomous Edge as an L2 VPN Client ............................................. 117
Task 8: Verify the Operation of the VPN Setup .................................................................................................. 119
Lab 17 (Simulation) Using NSX Intelligence to Gain Security Insights ...................... 121
Lab 18 Managing Users and Roles .......................................................................................... 122
Task 1: Prepare for the Lab .......................................................................................................................................... 122
Task 2: Add an Active Directory Domain as an Identity Source .................................................................. 123
Task 3: Assign NSX Roles to Domain Users and Test Permissions ............................................................ 124
vii
Lab 1 Introduction to Labs
You must be aware of the following items that impact the NSX-T Data Center 3.0 ICM lab
performance:
• You access and manage the lab environment from the student desktop.
• The student desktop resides on the Management network (SA-Management), and you can
start deploying the various NSX-T Data Center fabric items from here.
• A vCenter Server system and NSX Manager instance are predeployed with two clusters that
are populated with various virtual machines.
• At various points in the labs, you are directed to copy and paste information for later use.
a.. When you initially access the student desktop, right-click the Start button, select Run>
Notepad, and add the useful information to the file.
1
Lab Environment Topology Map
You can view the topology map periodically while configuring the NSX-T Data Center
environment.
2
Lab 2 Reviewing the Configuration of
the Predeployed NSX Manager
Instance
In this lab environment, you use a single-node NSX cluster. In a production environment, a three-
node cluster must be deployed to provide redundancy and high availability.
3
Task 2: Prepare for the Lab
You log in to the vSphere Client UI and the NSX UI.
a. Open Chrome.
d. On the login page, enter admin as the user name and VMware1!VMware1! as the
password.
4
Task 3: Verify the vCenter Server and the ESXi Hosts Licensing
You verify the licenses of the vCenter Server and ESXi hosts.
1. In the vSphere Client UI, select Administration from the Menu drop-down menu.
b. Click the vCenter Server Systems tab and view the license expiration date.
4. If the license is not valid, assign a vCenter Server license key to the vCenter Server instance.
d. In the License key text box, enter or paste the vCenter Server license key.
f. Click OK.
b. Click the Hosts tab and view the license expiration dates.
6. If the licenses are not valid, assign a license key to all ESXi hosts.
f. In the License key text box, enter or paste the license key.
h. Click OK.
5
Task 4: Verify the NSX Manager Configuration and Licensing
You examine the configuration and licensing information of the predeployed NSX Manager
appliance.
1. On the NSX UI Home page, navigate to System > Configuration > Appliances.
2. Under NSX Appliances, view the information of the predeployed NSX Manager instance
(172.20.10.41), including the IP address, NSX version, cluster status, and resource utilization.
Information appears for only one NSX Manager node because you use a single-node cluster
in this lab.
For now, you can safely ignore the following alert "A compute manager is required to deploy
an appliance. To add a computer manager, visit the COMPUTE MANAGERS page". You will
add a computer manager in an upcoming task in this lab.
3. Verify the license of NSX Manager by clicking System > Settings > Licenses.
If not, follow this link to retrieve the NSX Manager license key.
6
Task 5: Use the NSXCLI to Review the NSX Management Cluster
Information
You use the NSXCLI to review the configuration and status information of the NSX cluster.
1. On your student desktop, open the MTPuTTY application from the system tray.
NOTE
7
Task 6: Register vCenter Server as a Compute Manager
You configure vCenter Server as a compute manager.
1. If not open already , open a new tab in your browser and click the NSX-T Data Center > SA-
NSXMGR-01 bookmark.
2. On the NSX UI Home page, navigate to System > Configuration > Fabric > Compute
Managers and click +ADD.
Option Action
4. Click ADD.
5. When the Thumbprint is Missing message appears, click ADD to use the server's
default thumbprint.
The registration status appears as Registered and the connection status appears as Up.
8
Lab 3 (Simulation) Deploying a Three-
Node NSX Management Cluster
5. Review the NSX Management Cluster Information from the NSX CLI
IMPORTANT
This is a simulation. Do NOT perform these steps in your actual lab environment.
IMPORTANT
Do not refresh, navigate away from, or minimize the browser tab hosting the simulation.
These actions might pause the simulation and the simulation might not progress.
9
Lab 4 Preparing the NSX
Infrastructure
3. Create IP Pools
10
Task 1: Prepare for the Lab
You log in to the NSX UI.
3. On the login page, enter admin as the user name and VMware1!VMware1! as the
password.
a. On the NSX UI Home page, navigate to System > Configuration > Fabric > Transport
Zones and click +ADD.
Option Action
c. Click ADD.
11
2. Create a VLAN-based transport zone to communicate with the nonoverlay networks that
are external to NSX-T Data Center.
a. Click +ADD.
Option Action
c. Click ADD.
1. On the NSX UI Home page, navigate to Networking > IP Management > IP Address Pools
and click ADD IP ADDRESS POOL.
b. Enter IP Pool for ESXi, KVM, and Edge in the Description text box.
c. Click Set under Subnets and select ADD SUBNET > IP Ranges.
4. Click SAVE.
12
Task 4: Prepare the ESXi Hosts
You prepare the ESXi hosts to participate in the virtual networking and security functions offered
by NSX-T Data Center.
1. On the NSX UI Home page, navigate to System > Configuration > Fabric > Nodes > Host
Transport Nodes.
The NSX Configuration status of the hosts appears as Not Configured and the Node Status
is Not Available.
5. In the NSX Installation dialog box, click Create New Transport Node Profile.
6. Provide the required details in the Add Transport Node Profile page.
Option Action
7. Click ADD.
13
8. In the NSX Installation window, click APPLY.
9. When the installation completes, verify that NSX is installed on the hosts and the status of
the SA-Compute-01 cluster nodes is Up.
You might need to click REFRESH at the bottom to refresh the page.
1. On the NSX UI Home page, navigate to System > Configuration > Fabric > Nodes > Host
Transport Nodes.
b. Click +ADD.
c. Provide the configuration details in the Add Transport Node-Host Details page.
Option Action
d. Click Next.
14
g. In the Configure NSX window, provide the configuration details.
Option Action
b. Click +ADD.
c. Provide the configuration details in the Add Transport Node-Host Details page.
15
Option Action
d. Click Next.
Option Action
You can safely ignore the message: Host running on OS other than
ESXi/Windows Server will need third party package
installed to display physical NICs.
h. Click FINISH and the NSX Install process starts.
16
4. Verify that the configuration state appears as Success and the node status appears as Up
for the two KVM hosts.
You might need to refresh the page to update the status of the installation.
17
Lab 5 Configuring Segments
2. Create Segments
18
Task 1: Prepare for the Lab
You log in to the vSphere Client UI and the NSX UI.
a. Open Chrome.
c. On the login page, enter admin as the user name and VMware1!VMware1! as the
password.
a. On the NSX UI Home page, navigate to Networking > Connectivity > Segments.
Option Action
c. Click SAVE.
19
2. Create a segment named App-Segment.
Option Action
b. Click SAVE.
Option Action
b. Click SAVE.
4. Verify that the three segments are created successfully and the Status is Up.
6. Verify that the three newly created segments are listed under SA-Datacenter.
20
Task 3: Attach VMs to Segments
You attach VMs running on the ESXi hosts and KVM hosts to their corresponding segments.
1. In the navigator pane of the vSphere Client, click the Hosts and Clusters tab and expand the
view of SA-Datacenter > SA-Compute-01.
b. From the Network adapter 1 drop-down menu, select Browse, select Web-Segment,
and click OK.
d. Click OK.
b. From the Network adapter 1 drop-down menu, select Browse, select Web-Segment,
and click OK.
d. Click OK.
b. From the Network adapter 1 drop-down menu, select Browse, select App-Segment,
and click OK.
d. Click OK.
21
5. Power on T1-DB-01 on the sa-kvm-01 host.
sudo -s
c. Check the status of the VMs running on the SA-KVM-01 host.
a. At the SA-KVM-01 command prompt, view the UUID (shown as interfaceid) that is
associated with T1-DB-01.
c. On the NSX UI Home page, navigate to Networking > Connectivity > Segments, click
the vertical ellipsis icon next to DB-Segment, and select Edit.
Option Action
ID Copy and paste the ID (numbers between the single quotes) from the Notepad
file.
f. Click SAVE.
g. Click CLOSE.
22
7. Power on T1-Web-03 on the sa-kvm-02 host.
sudo -s
c. Check the status of the VMs running on the SA-KVM-02 host.
c. On the NSX UI Home page, click Networking > Connectivity > Segments, click the
vertical ellipsis icon next to Web-Segment, and select Edit.
If the number of ports configured does not appear, click the REFRESH button.
Option Action
ID Copy and paste the ID (numbers between the single quotes) from the Notepad
file.
f. Click SAVE.
g. Click CLOSE.
23
Task 4: Test Layer 2 Connectivity and Verify the Configuration of
Segments
You verify the information about segments from the NSX Manager instance and the data plane.
b. In the Navigator pane, click T1-Web-01 and select Launch Web Console.
c. When the web console window opens, click in the window and press enter to activate
the screen.
ping -c 3 172.16.10.12
Your ping should be successful.
ping -c 3 172.16.10.13
Your ping should be successful.
get logical-switches
sa-nsxmgr-01> get logical-switches
VNI UUID Name
69633 20d91369-b964-4ff6-a8a9-f8c263dc7213 App-Segment
69632 8fd97015-4bdc-47eb-ad98-d67608f82e75 Web-Segment
69634 4fa53e28-3923-4d6f-865c-5736e0e1d02a DB-Segment
c. Record the UUID value for Web-Segment in a Notepad file.
24
6. Retrieve the MAC table information for Web-Segment.
nsxcli
11. Retrieve the segment information from the sa-esxi-04 host.
get logical-switches
25
sa-esxi-04.vclass.local> get logical-switches
Logical Switches Summary
------------------------------------------------------------
26
Lab 6 Deploying and Configuring NSX
Edge Nodes
27
Task 1: Prepare for the Lab
You log in to the vSphere Client UI and the NSX UI.
a. Open Chrome.
c. On the login page, enter admin as the user name and VMware1!VMware1! as the
password.
1. On the NSX UI Home page, navigate to System > Configuration > Fabric > Nodes > Edge
Transport Nodes.
Option Action
4. Click NEXT.
5. On the Credentials page, enter VMware1!VMware1! as the CLI password and the system
root password.
6. Click the Allow SSH Login and Allow Root SSH Login toggles to display Yes.
7. Click NEXT.
28
8. On the Configure Deployment page, provide the configuration details.
Option Action
9. Click NEXT.
10. On the Configure Node Settings page, provide the configuration details.
Option Action
Management Click the Select Interface link, select pg-SA-Management, and click
Interface SAVE.
29
12. On the Configure NSX page, provide the configuration details.
Option Action
Teaming Policy Switch Mapping - DPDK Click the Select Interface link, select pg-
Fastpath Interfaces for uplink-1 (active) SA-Edge-Overlay, and click SAVE.
13. On the Configure NSX page, click + ADD SWITCH and provide the configuration details.
Option Action
Teaming Policy Switch Mapping - DPDK Click the Select Interface link, select pg-
Fastpath Interfaces for uplink-1 (active) SA-Edge-Uplinks, and click SAVE.
The Edge deployment might take several minutes to complete. The deployment status
displays various values, for example, Node Not Ready, which is only temporary.
Wait for the configuration status to appear as Success and the status as Up. You can click
REFRESH occasionally.
30
15. On the NSX UI Home page, navigate to System Configuration > Fabric > Nodes > Edge
Transport Nodes , click +ADD EDGE VM, and provide the configuration details to deploy the
second edge node.
Option Action
b. In the Credentials window, enter VMware1!VMware1! as the CLI password and the
system root password.
c. Click the Allow SSH Login and Allow Root SSH Login toggles to display Yes.
Option Action
31
e. On the Configure Node Settings window, enter the details.
Option Action
Option Action
Teaming Policy Switch Mapping - DPDK Click the Select Interface link, select pg-
Fastpath Interfaces for uplink-1 (active) SA-Edge-Overlay, and click SAVE.
32
g. On the Configure NSX page, click + ADD SWITCH and provide the configuration details.
Option Action
Teaming Policy Switch Mapping - DPDK Click the Select Interface link, select pg-
Fastpath Interfaces for uplink-1 (active) SA-Edge-Uplinks, and click SAVE.
h. Click FINISH.
The Edge deployment might take several minutes to complete. The deployment status
displays various temporary values, for example, Node Not Ready.
Wait for the configuration state to appear as Success and the node status as Up. You
can click REFRESH occasionally.
16. Verify that the two edge nodes are deployed and listed on the Edge VM list.
The configuration state appears as Success and the node status appears as Up.
1. On the NSX UI Home page, navigate to System > Configuration > Fabric > Nodes > Edge
Clusters.
2. Click +ADD.
Option Action
4. In the Available (2) pane, select both sa-nsxedge-01 and sa-nsxedge-02 and click the right
arrow to move them to the Selected (0) pane.
33
5. Click ADD.
7. Click 2 in the Edge Transport Nodes column and verify that sa-nsxedge-01 and sa-nsxedge-
02 appear in the list.
34
Lab 7 Configuring the Tier-1 Gateway
35
Task 1: Prepare for the Lab
You log in to the vSphere Client UI and the NSX UI.
a. Open Chrome.
c. On the login page, enter admin as the user name and VMware1!VMware1! as the
password.
1. On the NSX UI Home page, navigate to Networking > Connectivity > Tier-1 Gateways.
Option Action
Linked Tier-0 Leave the text box blank because the Tier-0 gateway is not yet
Gateway created.
Edge Cluster Leave the text box blank because services are not required at this
point.
4. Scroll to the lower portion of the T1-GW-01 gateway, click the expand button next to Route
Advertisement, and select the options.
• Turn on the All Static Routes toggle.
5. Click SAVE.
36
6. When a message prompts you to continue editing the Tier-1 gateway, click NO.
1. On the NSX UI Home page, navigate to Networking > Connectivity > Segments.
2. Click the vertical ellipsis icon next to Web-Segment and select Edit.
3. Click the vertical ellipsis icon next to App-Segment and select Edit.
4. Click the vertical ellipsis icon next to DB-Segment and select Edit.
2. If not already logged in, enter root as the user name and VMware1! as the password.
3. From T1-Web-01, verify that you can reach the virtual machines in App-Segment and DB-
Segment.
37
Lab 8 Configuring the Tier-0 Gateway
38
Task 1: Prepare for the Lab
You log in to the NSX UI.
3. On the login page, enter admin as the user name and VMware1!VMware1! as the
password.
1. On the NSX UI Home page, navigate to Networking > Connectivity > Segments and click
ADD SEGMENT.
Option Action
3. Click SAVE.
4. When a message prompts you to continue configuring the segment, click NO.
5. Click ADD SEGMENT to create another segment for the second uplink.
39
6. Configure the segment.
Option Action
7. Click SAVE.
8. When a message prompts you to continue configuring the segment, click NO.
9. Verify that the two segments for the Tier-0 Gateway uplinks appear in the Segments list.
1. On the NSX UI Home page, navigate to Networking > Connectivity > Tier-0 Gateways.
Option Action
4. Click SAVE.
5. When a message prompts you to continue editing this Tier-0 gateway, click YES.
6. Scroll to the lower portion of the T0-GW-01 gateway, click the expand button next to
ROUTE RE-DISTRIBUTION, and click Set.
40
7. Set route redistribution.
d. Select the Static Routes and the Connected Interfaces & Segments check boxes under
Tier-0 Subnets on the Set Route Re-distribution page.
When you select the Connected Interfaces & Segments check box, all related options
in that category are selected.
e. Select the Static Routes and the Connected Interfaces & Segments check boxes under
Advertised Tier-1 Subnets on the Set Route Re-distribution page.
When you select the Connected Interfaces & Segments check box, all related options
in that category are selected.
8. Click APPLY.
11. Click the expand button next to INTERFACES and click Set.
Option Action
b. Click SAVE.
41
13. In the Set Interfaces page, click ADD INTERFACE.
Option Action
14. Click the expand button next to BGP and enter 100 in the Local AS text box.
Option Action
b. Click SAVE.
Option Action
d. Click SAVE.
e. Click CLOSE.
42
f. Click SAVE and CLOSE EDITING.
1. On the NSX UI Home page, navigate to Networking > Connectivity > Tier-1 Gateways.
2. Click the vertical ellipsis icon next to the T1-GW-01 gateway and select Edit.
3. On the T1-GW-01 edit page, select T0-GW-01 from the Linked Tier-0 Gateway drop-down
menu.
1. To verify connectivity, ping from the console of any tenant VM (T1-Web-01, T1-App-01, T1-
DB-01, and so on) to the 192.168.100.1 gateway.
ping -c 3 192.168.100.1
ping -c 3 192.168.110.1
Your pings should be successful.
2. Use the command prompt of your student desktop to verify that you can reach all the
tenant VMs.
ping 172.16.10.11
ping 172.16.20.11
ping 172.16.30.11
You should be able to ping from your student desktop to any of the tenant networks, which
verifies that the north-south routing is working properly.
43
Lab 9 Configuring VRF Lite
44
Task 1: Prepare for the Lab
You log in to the vSphere Client UI and the NSX UI.
a. Open Chrome.
c. On the login page, enter admin as the user name and VMware1!VMware1! as the
password.
45
Task 2: Create the Uplink Trunk Segments
You create the uplink trunk segments that are connected to the uplink interfaces of each VRF
gateway.
1. In the NSX UI, navigate to Networking > Connectivity > Segments > SEGMENTS.
3. When the Segment wizard appears, configure the uplink trunk segment for the VRF
Gateways Uplink-1 interfaces.
Option Action
Option Action
46
Task 3: Deploy and Configure the VRF Gateways
You deploy one VRF gateway for each VRF. You select T0-GW-01 as the default Tier-0
gateway to connect the VRF gateways.
1. In the NSX UI, navigate to Networking > Connectivity > Tier-0 Gateways.
a. Click ADD GATEWAY and select VRF from the drop-down menu to deploy the first
VRF gateway.
b. When the VRF Gateway wizard appears, configure the VRF gateway for VRF Red.
Option Action
c. Click SAVE and click YES at the Want to continue configuring this
Tier-0 Gateway? prompt.
3. Configure uplink interfaces for VRF Red.
c. Configure the first uplink interface for the T0-GW-VRF-Red VRF gateway in the ADD
INTERFACE wizard.
Option Action
d. Click SAVE.
47
e. Click ADD INTERFACE.
f. Configure the second uplink interface for the T0-GW-VRF-Red VRF gateway in the
ADD INTERFACE wizard.
Option Action
d. When the Set BGP Neighbors window appears, click ADD BGP NEIGHBOR and set up
the peering with the upstream router.
Option Action
Route Filter Click Set, click ADD ROUTE FILTER, click ADD for the IPv4 address
family, and click Apply.
48
f. Click ADD BGP NEIGHBOR and set up the second peering with the upstream router.
Option Action
Route Filter Click Set, click ADD ROUTE FILTER, click ADD for the IPv4 address
family, and click Apply.
5. Scroll to the lower portion of the T0-GW-VRF-Red gateway, click the expand button next to
ROUTE RE-DISTRIBUTION, and click Set.
d. Select the Connected Interfaces & Segments check box under Tier-0 Subnets on the
Set Route Re-distribution page.
When you select the Connected Interfaces & Segments check box, all the related
check boxes are selected.
e. Select the Connected Interfaces & Segments check box under Advertised Tier-1
Subnets on the Set Route Re-distribution page
When you select the Connected Interfaces & Segments check box, all the related
check boxes are selected.
7. Click APPLY.
8. Verify that the Route Re-distribution Status toggle is turned on and click SAVE.
9. Click CLOSE EDITING to finish configuring the VRF gateway configuration for VRF Red.
49
10. Deploy a VRF gateway for VRF Blue.
a. Click ADD GATEWAY and select VRF from the drop-down menu to deploy the second
VRF gateway.
b. When the VRF Gateway wizard appears, configure the VRF gateway for VRF Blue.
Option Action
c. Click SAVE and click YES at the Want to continue configuring this
Tier-0 Gateway? prompt.
11. Configure the uplink interfaces for VRF Blue.
c. Configure the first uplink interface for the T0-GW-VRF-Blue VRF gateway from the
ADD INTERFACE wizard.
Option Action
d. Click SAVE
50
f. Configure the second uplink interface for the T0-GW-VRF-Blue VRF gateway in the
ADD INTERFACE wizard.
Option Action
d. When the Set BGP Neighbors window appears, click ADD BGP NEIGHBOR and set up
the peering with the upstream router.
Option Action
Route Filter Click Set, click ADD ROUTE FILTER, click ADD for the IPv4 address
family and click Apply.
51
f. Click ADD BGP NEIGHBOR and set up the second peering with the upstream router.
Option Action
Route Filter Click Set, click ADD ROUTE FILTER, click ADD for the IPv4 address
family and click Apply.
13. Scroll to the lower portion of the T0-GW-VRF-Blue gateway, click the expand button next
to ROUTE RE-DISTRIBUTION, and click Set.
d. Select the Connected Interfaces & Segments check box under Tier-0 Subnets on the
Set Route Re-distribution page.
When you select the Connected Interfaces & Segments check box, all the related
check boxes are selected.
e. Select the Connected Interfaces & Segments check box under Advertised Tier-1
Subnets on the Set Route Re-distribution page.
When you select the Connected Interfaces & Segments check box, all the related
check boxes are selected.
16. Verify that the Route Re-distribution Status toggle is turned on and click SAVE.
17. Click CLOSE EDITING to finish the VRF gateway configuration for VRF Blue.
52
Task 4: Deploy and Connect the Tier-1 Gateways to the VRF
Gateways
You deploy one Tier-1 gateway for each VRF by selecting the corresponding VRF gateway to
connect.
1. In the NSX UI, navigate to Networking > Connectivity > Tier-1 Gateways.
2. Click ADD TIER-1 GATEWAY to add the Tier-1 gateway connected to VRF Red.
3. Configure the Tier-1 gateway in the ADD TIER-1 GATEWAY window for VRF Red.
Option Action
Edge Cluster Leave blank because no services are required for this lab.
4. Click SAVE and click YES at the Want to continue configuring the Tier-1
Gateway? prompt.
5. Scroll to the lower portion of the Tier-1 configuration wizard, click the expand button next to
Route Advertisement, and select the options.
6. Turn on the All Static Routes and All Connected Segments & Service Ports toggles.
8. Click ADD TIER-1 GATEWAY to add the Tier-1 gateway connected to VRF Blue.
9. Configure the Tier-1 gateway in the ADD TIER-1 GATEWAY window for VRF Blue.
Option Action
Edge Cluster Leave blank because no services are required for this lab.
10. Click SAVE and click YES at the Want to continue configuring the Tier-1
Gateway? prompt.
11. Scroll to the lower portion of the Tier-1 configuration wizard, click the expand button next to
Route Advertisement, and select the options.
12. Turn on the All Static Routes and All Connected Segments & Service Ports toggles.
53
13. Click SAVE and click CLOSE EDITING.
Option Action
c. Click SAVE.
Option Action
c. Click SAVE.
54
3. On the vSphere Client home page, click the Networking tab.
4. Verify that the two newly created segments are listed under SA-Datacenter.
1. In the navigator pane of the vSphere Client, click the Hosts and Clusters tab and expand the
SA-Datacenter > SA-Compute-01 view.
d. Click OK.
d. Click OK.
55
Task 7: Test the VRF End-to-End Connectivity
You test the connectivity from VMs, which are connected to segments, to the remote networks.
These remote networks are preconfigured in each VRF. You verify that the end-to-end
connectivity is working. In the lab environment, routing was preconfigured in the upstream FRR
router SA-FRR-01.
a. In the Navigator pane, click Ubuntu-01a and select Launch Web Console.
b. When the web console window opens, click in the window and press Enter to activate
the screen.
2. Verify connectivity in VRF Red by pinging from the Ubuntu-01a VM console to the 10.0.10.11
IP in the remote network 10.0.10.0/24, which is routed through the upstream FRR router.
ping -c 3 10.0.10.11
The pings are successful.
3. Verify the route that the packets follow in VRF Red to reach the remote IP 10.0.10.11 by
running the traceroute command from the Ubuntu-01a console.
traceroute -n 10.0.10.11
The hops T1-GW-VRF-Red and T0-GW-VRF-Red should appear in the traceroute before
reaching remote IP 10.0.10.11.
a. In the Navigator pane, click Ubuntu-02a and select Launch Web Console.
b. When the web console window opens, click in the window and press Enter to activate
the screen.
5. Verify the connectivity in VRF Blue by pinging from the Ubuntu-02a VM console to IP
10.0.20.11 in the remote network 10.0.20.0/24, which is routed through the upstream FRR
router.
ping -c 3 10.0.20.11
The pings are successful.
56
6. Verify the route that the packets follow in VRF Blue to reach the remote IP 10.0.20.11 by
running the traceroute command from the Ubuntu-02a console.
traceroute -n 10.0.20.11
The hops T1-GW-VRF-Blue and T0-GW-VRF-Blue should appear in the traceroute before
reaching remote IP 10.0.20.11.
set cli-timeout 0
2. List the logical routers in the sa-nsxedge-01 by running the get logical-routers
command in the console.
get logical-routers
The VRF ID for the SR-VRF-T0-GW-VRF-Red logical router is 6. The VRF ID might be
different in your lab environment.
3. Enter into the VRF context for the SR-VRF-T0-GW-VRF-Red logical router.
vrf 6
get route
All the routes in the VRF, including Tier0-Connected, Tier1-Connected, and BGP types,
appear.
57
5. Verify the BGP neighbor status for VRF Red.
NOTE
You obtain 192.168.30.1 neighbor if you run the same command in the sa-nsxedge-02 edge
node.
exit
The prompt changes to sa-nsxedge-01.
get logical-routers
The VRF ID for the SR-VRF-T0-GW-VRF-Blue logical router is 7. The VRF ID might be
different in your lab environment.
vrf 7
get route
All the routes in the VRF, including Tier0-Connected, Tier1-Connected, and BGP types, must
appear.
NOTE
The 172.16.40.0/24 network also appears in the VRF Red routing table in an earlier step.
VMs in different VRFs can be connected to overlapping networks.
58
10. Verify the BGP neighbor status for VRF Blue.
NOTE
You obtain the 192.168.40.1 neighbor if you run the same command in the sa-nsxedge-02
edge node.
11. Exit the VRF context and return to the edge prompt.
exit
The prompt changes to sa-nsxedge-01.
1. Verify the lack of connectivity between VMs connected to different VRFs even though they
are using the same 172.16.40.0/24 subnet address.
ping -c 3 172.16.40.12
The pings are not successful.
2. Verify the lack of connectivity from the Ubuntu-01a VM in VRF Red to the 10.0.20.0/24
remote network IP in VRF Blue by pinging from the Ubuntu-01a console to the 10.0.20.11
remote network IP.
ping -c 3 10.0.20.11
The pings are not successful.
59
3. Verify the lack of connectivity in the other direction by pinging from the Ubuntu-02a VM to
the Ubuntu-01a VM IP 172.16.40.11.
ping -c 3 172.16.40.11
The pings are not successful.
4. Verify the lack of connectivity from the Ubuntu-02a VM in VRF Blue to the 10.0.10.0/24
remote network IP in VRF Red by pinging from the Ubuntu-02a console to the 10.0.10.11
remote network IP.
ping -c 3 10.0.10.11
The pings are not successful.
60
Lab 10 Configuring the NSX
Distributed Firewall
61
Task 1: Prepare for the Lab
You log in to the NSX UI.
3. On the login page, enter admin as the user name and VMware1!VMware1! as the
password.
1. Use MTPuTTY (located in the toolbar of the student desktop) to open an SSH console to
T1-Web-01.
curl http://172.16.20.11
b. Verify that an HTTP response is returned from T1-App-01.
b. Connect to the SQL database and enter VMware1! when prompted for the password.
62
Task 3: Create Security Groups
You create three dynamic security groups and one static security group for the future definition
of firewall rules.
2. Add a group.
c. Click Set Members under Compute Members and click +ADD CRITERIA.
3. Click the View Members link for the Web-Servers group and verify that all the three web
VMs (T1-Web-01, T1-Web-02, and T1-Web-03) are listed.
4. Click CLOSE.
5. Add a group.
c. Click Set Members under Compute Members and click +ADD CRITERIA.
6. Click the View Members link for the App-Servers group and verify that the T1-App-01 VM is
listed.
7. Click CLOSE.
63
8. Add a group.
c. Click Set Members under Compute Members and click +ADD CRITERIA.
• Fourth entry: db
9. Click the View Members link for the DB-Servers group and verify that the T1-DB-01 VM is
listed.
12. Click the View Members link for the 3-Tier group and verify that all VMs for the 3-tier
application are listed.
64
Task 4: Create Distributed Firewall Rules
You create distributed firewall rules to manage traffic between applications.
1. In the NSX UI, navigate to Security > East West Security > Distributed Firewall.
4. After the row for the new policy appears, enter 3-TIER POLICY as the name.
5. Configure the Applied To field for 3-TIER POLICY so that it applies only to the 3-Tier group.
a. In the 3-TIER POLICY, point to the DFW text box next to the Applied To field.
c. Click Groups, select the 3-Tier check box, and click APPLY.
6. Click the vertical ellipsis icon near 3-TIER POLICY and select Add Rule to add three
distributed firewall rules.
IMPORTANT
You must perform this step thrice to add three new distributed firewall rules under 3-TIER
POLICY.
• Applied To: Click Groups, select the 3-Tier check box, and click APPLY.
65
8. On the second row, configure the rule.
• Applied To: Click Groups, select the 3-Tier check box, and click APPLY.
• Applied To: Click Groups, select the 3-Tier check box, and click APPLY.
10. Navigate to the top-right corner of the screen and click PUBLISH.
66
Task 5: Test the IP Connectivity After the Firewall Rule Creation
You test the connectivity between applications to verify that the distributed firewall rules were
successfully applied.
curl http://172.16.20.11
b. Verify that an HTTP response is returned from T1-App-01.
b. Connect to the SQL database and enter VMware1! when prompted for the password.
5. From the T1-App-01 console, attempt to open an SSH session to T1-DB-01 to verify that
only MySQL traffic is allowed between T1-App-01 and T1-DB-01.
ssh 172.16.30.11
The connection times out eventually. If you do not want to wait, press Ctrl+C to exit.
67
Task 6: Prepare for the Next Lab
You disable all user-created distributed firewall rules.
1. On the NSX UI Home page, navigate to Security > East West Security > Distributed
Firewall > CATEGORY SPECIFIC RULES > APPLICATION.
2. Click the vertical ellipsis icon near 3-TIER POLICY and select Disable All Rules.
3. Click PUBLISH.
68
Lab 11 Configuring the NSX Gateway
Firewall
69
Task 1: Prepare for the Lab
You log in to the vSphere Client UI and the NSX UI.
a. Open Chrome.
c. On the login page, enter admin as the user name and VMware1!VMware1! as the
password.
1. Use MTPuTTY on your student desktop to open the preconfigured SSH connections to T1-
Web-01, T1-App-01, and T1-DB-01.
ssh 172.16.20.11
b. Log in with VMware1! as the password.
exit
70
Task 3: Configure a Gateway Firewall Rule to Block External SSH
Requests
You configure a gateway firewall rule to block SSH requests from external networks.
1. On the NSX UI Home page, navigate to Security > North South Security > Gateway
Firewall > GATEWAY SPECIFIC RULES.
4. When the row for the new policy appears, enter SSH TRAFFIC as the name.
5. Click the vertical ellipsis icon near the SSH TRAFFIC policy and select Add Rule.
• Services: Select the SSH check box in the Set Services page and click APPLY.
• Applied To: Select the T0-GW-01-Uplink-1 and T0-GW-01-Uplink-2 check boxes and
click APPLY.
7. Click PUBLISH.
71
Task 4: Test the Effect of the Configured Gateway Firewall Rule
You verify that the gateway firewall rule successfully blocks the SSH traffic.
1. Open MTPuTTY from the student desktop and try to connect to T1-Web-01, T1-App-01, and
T1-DB-01.
ssh 172.16.20.11
c. Log in with VMware1! as the password.
The connection should be successful because the gateway firewall rule that you
configured does not affect the east-west traffic.
exit
1. On the NSX UI Home page, navigate to Security > North South Firewall > Gateway Firewall
> GATEWAY SPECIFIC RULES.
3. Click the vertical ellipsis icon near the SSH TRAFFIC policy and select Disable All Rules.
4. Click PUBLISH.
5. Open MTPuTTY from the desktop and connect to T1-Web-01, T1-App-01, and T1-DB-01.
6. Verify that SSH connections are allowed from the external network.
72
Lab 12 Configuring Distributed
Intrusion Detection
73
Task 1: Prepare for the Lab
You log in to the vSphere Client UI and the NSX UI.
a. Open Chrome.
c. On the login page, enter admin as the user name and VMware1!VMware1! as the
password.
1. On the NSX UI Home page, navigate to Security > East West Security > Distributed IDS.
2. When the message to start with the NSX Intrusion Detection System appears, click GET
STARTED.
4. Under Intrusion Detection Signatures, verify the current version of the IDS signatures and the
last time they were downloaded.
5. In the Intrusion Detection Signatures section, select the Auto Update new versions
(recommended) check box.
IMPORTANT
If a message indicates that a new update is available, do not click the Update Now link. If you
click the link, the lab works, but the number of IDS events that you see might differ.
74
Task 3: Enable Distributed Intrusion Detection for a vSphere Cluster
You enable Distributed Intrusion Detection for the SA-Compute-01 vSphere cluster.
3. When the Are you sure you want to enable intrusion detection
for selected clusters? message appears, click YES and verify that the status is
changed to Enabled.
1. On the NSX UI Home page, navigate to Security > East West Security > Distributed IDS >
PROFILES.
Option Action
4. Click SAVE.
75
Task 5: Configure the Intrusion Detection Rules
You configure Intrusion Detection rules to detect east-west malicious traffic.
1. On the NSX UI Home page, navigate to Security > East West Security > Distributed IDS >
RULES.
4. Click the vertical ellipsis icon near IDS Policy and select Add Rule.
• Sources: Any
• Destinations: Any
• Services: Any
• Action: Detect
76
Task 6: Generate the Malicious East-West Traffic
You use tcpreplay to generate the malicious east-west traffic.
b. In the Network adapter 1 drop-down menu, click Browse, select Web-Segment, and
click OK.
d. Click OK.
sudo -s
Use VMware1! as the password.
cd /home/vmware
9. Use a .pcap file to replay an intrusion detection attempt.
tcpreplay -i ens160
cryptolocker_9CBB128E8211A7CD00729C159815CB1C.pcap
The replay of the packet capture file might take a few minutes.
77
Task 7: Analyze the Intrusion Detection Events
You examine the Intrusion Detection events dashboard.
1. On the NSX UI Home page, navigate to Security > East West Security > Distributed IDS >
EVENTS.
2. Point to each of the red dots to gather additional information about each intrusion, including
its severity, type, total number of attempts, and when it was first launched.
3. Navigate to the bottom of the dashboard and expand one of the critical events that was
logged.
4. Review additional information about the attack, including the attacker and target information,
the protocol used, and its associated IDS rule.
5. Click the View Intrusion History link to obtain specific details about each occurrence of the
attack.
78
Lab 13 Analyzing Web Traffic with
URL Analysis
3. Create a Segment
79
Task 1: Prepare for the Lab
You log in to the vSphere Client UI and the NSX UI.
a. Open Chrome.
c. On the login page, enter admin as the user name and VMware1!VMware1! as the
password.
80
Task 2: Configure the Tier-1 Gateway to Use Layer 7 Firewall Rules
You associate an edge cluster to the Tier-1 gateway to allow the context-aware configuration or
Layer 7 gateway firewall rules.
1. On the NSX UI Home page, navigate to Networking > Connectivity > Tier-1 Gateways.
2. Click the vertical ellipsis icon next to T1-GW-01 and select Edit.
4. Click SAVE.
Option Action
3. Click SAVE.
4. When the Want to continue this Segment message appears, click No.
81
Task 4: Enable URL Analysis
You enable URL Analysis on the Edge-Cluster-01 NSX Edge cluster.
1. From the NSX UI, navigate to Security > North South Security > URL Analysis.
2. When the Start the NSX URL Analysis message appears, click GET STARTED.
4. Find the Edge-Cluster-01 NSX Edge Cluster and turn on the URL Analysis State toggle.
7. Expand Edge-Cluster-01 and verify that the Connection Status for both NSX Edge nodes is
Up.
The Connection Status might take up to 5 minutes to change. Click the REFRESH arrow next
to Connection Status periodically to update the status.
1. On the Settings tab, find the Edge-Cluster-01 NSX Edge cluster and click Set under the
Profiles option.
b. Click Set
4. Click SAVE.
82
6. Configure a new context profile for search engines.
b. Click Set.
7. Click SAVE.
b. Click Set.
83
Task 6: Create a Layer 7 Rule for DNS Traffic
You configure a Layer 7 firewall rule on the Tier-1 gateway uplink to capture DNS traffic.
1. In the NSX UI, navigate to Security > North South Security > Gateway Firewall >
GATEWAY SPECIFIC RULES.
4. When the row for the new policy appears, enter URL POLICY as the name.
5. Click the vertical ellipsis icon near URL POLICY and select Add Rule.
• Services: Select the DNS-UDP and DNS check boxes in the Set Services page and click
APPLY.
• Profiles: Select the DNS check box in the Select Context Profile page and click APPLY.
• Applied To: Select the T1-GW-01 check box and click APPLY.
7. Click PUBLISH.
84
Task 7: Generate Traffic for External Websites
You generate web traffic to different types of websites from the Ubuntu-02 virtual machine.
d. Click OK.
sudo -s
Use VMware1! as the password.
cat /etc/resolv.conf
The DNS server is 172.20.10.10
85
10. Generate traffic for search engines.
1. From the NSX UI, navigate to Security > North South Security > URL Analysis > URLs.
The URL Analysis dashboard displays the accessed URLs classified by reputation score and
category. At least three different categories appear in the dashboard.
Results might take up to 5 minutes to appear. Click the REFRESH link at the top-right of the
page to see the most recent results.
2. Navigate to the bottom of the dashboard and review additional information about each
visited URL, including its reputation score, domain name, category, and session count.
1. On the NSX UI Home page, navigate to Security > North South Security > Gateway
Firewall > GATEWAY SPECIFIC RULES.
3. Click the vertical ellipsis icon near URL POLICY and select Disable All Rules.
4. Click PUBLISH.
86
Lab 14 Configuring Network Address
Translation
3. Create a Segment
5. Configure NAT
87
Task 1: Prepare for the Lab
You log in to the vSphere Client UI and the NSX UI.
a. Open Chrome.
c. On the login page, enter admin as the user name and VMware1!VMware1! as the
password.
1. On the NSX UI Home page, navigate to Networking > Connectivity > Tier-1 Gateways and
click ADD TIER-1 GATEWAY.
Option Action
Route Turn on the All Static Routes, All Connected Segments & Service
Advertisement Ports, and All NAT IPs toggles.
88
3. Click SAVE.
4. If a message prompts you to continue editing the Tier-1 gateway, click NO.
5. Verify that the NAT gateway appears in the Tier-1 Gateway list and the status is Success.
Option Action
3. Click SAVE.
4. When the Want to continue this Segment message appears, click No.
1. In the vSphere Client UI, select Hosts and Clusters from the Menu drop-down menu.
3. In the Network adapter 1 drop-down menu, click Browse, select NAT-Segment, and click
OK.
5. Click OK.
89
Task 5: Configure NAT
You configure the source and destination NAT rules on the Tier-1 NAT gateway.
1. On the NSX UI Home page, navigate to Networking > Network Services > NAT.
Option Action
5. Click SAVE.
7. Verify that T1-GW-02-NAT is still selected in the Gateway drop-down menu and click ADD
NAT RULE again.
90
8. Provide the configuration details in the New NAT Rule window.
Option Action
9. Click SAVE.
91
Task 6: Configure NAT Route Redistribution
You verify route redistribution in the NAT network to the upstream VyOS router.
1. Use MTPuTTY to connect to sa-vyos-01 and verify that the 172.16.101.0/24 route is
advertised by entering show ip route.
a. On the NSX UI Home page, navigate to Networking > Connectivity > Tier-0 Gateways.
b. Click the vertical ellipsis icon next to T0-GW-01 and select Edit from the menu.
c. Click the expand button next to ROUTE RE-DISTRIBUTION and click the current count
value, 1.
d. Click the vertical ellipsis icon next to T0-GW-01 Route Re-distribution and select Edit
from the menu.
g. Click APPLY.
The ROUTE RE-DISTRIBUTION count is set to 5.
92
3. Click SAVE and click CLOSE EDITING.
4. Switch back to the MTPuTTY connection for sa-vyos-01 and enter show ip route
again to verify that 80.80.80.1/32 appears.
93
Task 7: Verify the IP Connectivity
You test the connectivity to the NAT network.
2. Retrieve gateway instances and identify the virtual routing and forwarding (VRF) instance
context for SR-T0-GW-01.
get logical-routers
sa-nsxedge-01> get logical-routers
Logical Router
UUID VRF LR-ID Name
Type Ports
736a80e3-23f6-5a2d-81d6-bbefb2786666 0 0
TUNNEL 3
90dbc567-26d2-4010-9f98-519d9f2802c3 1 3 SR-T0-GW-
01 SERVICE_ROUTER_TIER0 7
a949fe00-5d14-4ce7-9af1-a5bce157d75f 3 2 DR-T0-GW-
01 DISTRIBUTED_ROUTER_TIER0 5
bd4b7bc2-8800-432e-844a-a646057edb03 4 1 DR-T1-GW-
01 DISTRIBUTED_ROUTER_TIER1 7
2eb670da-f124-4c2f-b1bf-b77c174ac2b5 5 9 SR-VRF-T0-
GW-VRF-Red VRF_SERVICE_ROUTER_TIER0 5
298ce52a-a221-4440-9057-61147b01f55e 6 14 SR-VRF-T0-
GW-VRF-Blue VRF_SERVICE_ROUTER_TIER0 5
01da2dfd-3270-4e32-b7ac-fe046ce7c5ed 7 17 DR-T1-GW-
VRF-Red DISTRIBUTED_ROUTER_TIER1 5
a2b1cbe8-844a-4ffc-a139-aa6bf61ce9bf 8 7 DR-VRF-T0-
GW-VRF-Red VRF_DISTRIBUTED_ROUTER_TIER0 4
0ee4a285-58eb-4e02-ba33-77c04132246e 9 18 DR-T1-GW-
VRF-Blue DISTRIBUTED_ROUTER_TIER1 5
10d4bdb0-df81-4c82-965c-5dedcefd71f0 10 12 DR-VRF-T0-
GW-VRF-Blue VRF_DISTRIBUTED_ROUTER_TIER0 4
ba44be1f-ee5e-4876-8851-a15fbe5aa808 11 20 SR-T1-GW-
02-NAT SERVICE_ROUTER_TIER1 5
2d78b3f7-08e2-4f55-85e7-f362a303e2fa 12 19 DR-T1-GW-
02-NAT DISTRIBUTED_ROUTER_TIER1 4
In the command output, the VRF ID for SR-T0-GW-01 is 1. The VRF ID in your lab might be
different.
94
3. Access the VRF for SR-T0-GW-01 and view the routing table of the Tier-0 SR.
vrf 1
get route
sa-nsxedge-01> vrf 1
sa-nsxedge-01(tier0_sr)> get route
95
t0c> * fcb7:309d:a277:c800::/64 is directly connected, linked-
287, 20:33:51
t0c> * fcb7:309d:a277:c803::/64 is directly connected,
downlink-348, 01:29:47
t0c> * fe80::/64 is directly connected, downlink-274, 20:33:51
isr> * ff00::/8 is directly connected, inter-sr-271, 20:40:04
4. From your student desktop, open a browser window and either enter
http://80.80.80.1 or click the NAT Web Server bookmark.
A test page appears indicating that your NAT is successful.
96
Lab 15 Configuring Load Balancing
97
Task 1: Prepare for the Lab
You log in to the vSphere Client UI and the NSX UI.
a. Open Chrome.
c. On the login page, enter admin as the user name and VMware1!VMware1! as the
password.
2. Ping the two web servers and verify that the pings are successful.
ping 172.16.10.11
ping 172.16.10.12
3. On your student desktop, open a browser tab and verify that you can access the two web
servers.
http://172.16.10.11
http://172.16.10.12
Do not proceed to the next task if you cannot access the two web servers.
98
Task 3: Create a Load Balancer
You create a load balancer and attach it to the Tier-1 gateway.
1. On the NSX UI Home page, navigate to Networking > Network Services > Load Balancing
> LOAD BALANCERS.
Option Action
b. Click SAVE.
c. When the message to continue the load balancer configuration appears, click YES.
d. On the Load Balancer options page, click Set Virtual Servers under VIRTUAL
SERVERS.
Option Action
Server Pool Click the vertical ellipsis icon next to the field and select Create New
99
4. Create a server pool for the web servers.
Option Action
b. On the Configure Server Pool Members page, click ADD MEMBER under Enter individual
members to add two web server nodes (T1-Web-01 and T1-Web-02) to the pool
member list.
Option Action
IP Enter 172.16.10.11.
c. Click SAVE.
100
d. Click ADD MEMBER and enter the configuration details for the second member.
Option Action
IP Enter 172.16.10.12.
e. Click SAVE.
f. Click APPLY.
5. Click the SERVER POOLS tab and verify that the newly created Web-Pool appears in the
server pool list.
6. Click the VIRTUAL SERVERS tab and verify that the newly created Web-VirtualServer
appears in the virtual server list.
7. Click the LOAD BALANCERS tab and verify that the Web-LB load balancer is attached to
the T1-GW-01 gateway and its status is Success.
101
Task 4: Configure Route Advertisement and Route Redistribution for
the Virtual IP
You advertise the load balancer's virtual IP (VIP) and verify that the HTTP traffic is handled by
both web servers in a round-robin method.
a. From your student desktop, open a Chrome browser window and try to access the load
balancer’s VIP address http://192.168.100.7.
The website cannot be reached because the load balancer’s VIP is not advertised and is
unknown to the external clients.
a. From your student desktop, open the Command Prompt window and access the load
balancer’s VIP address.
curl -i http://192.168.100.7
b. Verify that the website cannot be reached.
The website cannot be reached because the load balancer’s VIP is not advertised and is
unknown to the external clients.
a. On the NSX UI Home page, navigate to Networking > Connectivity > Tier-1 Gateways.
b. Click the vertical ellipsis icon next to T1-GW-01 and select Edit.
d. In the Edit Route Advertisement Configuration window, enable All LB VIP Routes.
102
5. Configure the T0-GW-01 gateway to redistribute the VIP route to the upstream VyOS
router.
d. Click the vertical ellipsis icon next to T0-GW-01 Route Re-distribution and select Edit
from the menu.
g. Click APPLY.
The ROUTE RE-DISTRIBUTION count is set to 6.
a. From the student desktop, open a Firefox browser and access the VIP address by using
http://192.168.100.7.
b. Refresh the browser display to verify that both back-end web servers are being used
(as a result of the configured round-robin method).
Due to the browser cache behavior, you might need to press Ctrl+F5 (force refresh) to
see the traffic being load balanced between the two web servers.
103
8. Use curl to verify access to the load balancer VIP.
a. From the student desktop, open a Command Prompt window and access the load
balancer’s VIP address.
curl -i http://192.168.100.7
The webpage should appear.
b. Run the same curl command again to verify that both back-end web servers are being
used in a round-robin method.
104
Task 5: Prepare for the Next Lab
You disable the load balancer and detach the Web-LB load balancer from the T1-GW-01
gateway.
1. Navigate to Networking > Network Services > Load Balancing > LOAD BALANCERS.
5. Click SAVE.
105
Lab 16 Deploying Virtual Private
Networks
4. Deploy and Configure a New Tier-0 Gateway and Segments for VPN Support
106
Task 1: Prepare for the Lab
You log in to the vSphere Client UI and the NSX UI.
a. Open Chrome.
c. On the login page, enter admin as the user name and VMware1!VMware1! as the
password.
107
Task 2: Deploy a New NSX Edge Node to Support the VPN
Deployment
You deploy a new NSX Edge node to configure VPN tunnels.
1. On the NSX UI Home page, navigate to System > Configuration > Fabric > Nodes > Edge
Transport Nodes.
Option Action
4. Click NEXT.
5. On the Credentials page, enter VMware1!VMware1! as the CLI password and the system
root password.
6. Click the Allow SSH Login and Allow Root SSH Login toggles to display Yes.
7. Click NEXT.
Option Action
9. Click NEXT.
108
10. On the Configure Node Settings page, provide the configuration details.
Option Action
Management Click the Select Interface link, select pg-SA-Management, and click
Interface SAVE.
Option Action
Teaming Policy Switch Mapping - DPDK Click the Select Interface link, select pg-
Fastpath Interfaces for uplink-1 (active) SA-Edge-Overlay, and click SAVE.
109
13. On the Configure NSX page, click + ADD SWITCH and provide the configuration details.
Option Action
Teaming Policy Switch Mapping - DPDK Click the Select Interface link, select pg-
Fastpath Interfaces for uplink-1 (active) SA-Edge-Uplinks, and click SAVE.
NOTE
The edge deployment might take several minutes to complete. The deployment status
displays various temporary values, for example, Node Not Ready.
Wait until the configuration state displays Success and the node status is Up. You might need
to click REFRESH occasionally.
15. Verify that the edge node is deployed and listed in the Edge VM list.
The configuration state appears as Success and the node status is Up.
110
Task 3: Configure a New Edge Cluster
You create an NSX Edge cluster and add the NSX Edge node to the cluster.
1. On the NSX UI Home page, navigate to System > Configuration > Fabric > Nodes > Edge
Clusters.
2. Click +ADD.
Option Action
4. In the Available (1) pane, select sa-nsxedge-03 and click the right arrow to move it to the
Selected (0) pane.
5. Click ADD.
111
Task 4: Deploy and Configure a New Tier-0 Gateway and Segments
for VPN Support
You deploy and configure a new Tier-0 gateway and segments for VPN support.
a. On the NSX UI Home page, navigate to Networking > Connectivity > Segments.
Option Action
c. Click SAVE.
Option Action
b. Click SAVE.
3. On the NSX UI Home page, navigate to Networking > Connectivity > Tier-0 Gateways.
112
4. Click ADD GATEWAY > Tier-0.
Option Action
6. Click SAVE.
7. When the prompt to continue configuring this Tier-0 gateway appears, click YES.
8. Scroll to the lower portion of the T0-GW-02-VPN gateway, click the expand button next to
ROUTE RE-DISTRIBUTION, and click Set.
d. On the Set Route Redistribution page, leave all the check boxes deselected under
Advertised Tier-1 Subnets.
e. On the Set Route Redistribution page, select the Static Routes and Connected
Interfaces & Segments check boxes under Tier-0 Subnets.
9. Click APPLY.
10. Verify that the Route Re-distribution Status toggle is turned on.
12. Click the expand button next to INTERFACES and click Set.
113
13. In the Set Interfaces page, click ADD INTERFACE.
Option Action
b. Click SAVE.
Wait for the new Tier-0 gateway status to appear as Successful. You might need to click
REFRESH periodically while waiting.
1. On the NSX UI Home page, navigate to Networking > Network Services > VPN > VPN
SERVICES.
Option Action
4. Click SAVE.
5. When you are prompted to continue configuring this VPN service, click NO.
114
Task 6: Create an L2 VPN Server and Session
You create an L2 VPN server and session for the VPN network.
a. On the VPN SERVICES tab, click ADD SERVICE > L2 VPN Server.
Option Action
c. Click SAVE.
d. When you are prompted to continue configuring this VPN service, click YES.
2. Click the expand button next to SESSIONS, click Add Sessions, and click ADD L2 VPN
SESSION.
b. Click the vertical ellipsis icon next to Local Endpoint/IP and select Add Local Endpoint.
Option Action
c. Click SAVE.
115
d. On the ADD L2 VPN SESSION page, continue configuring the session.
Option Action
e. Click SAVE.
f. When you are prompted to continue configuring this L2 VPN session, click NO.
5. Click the L2 VPN SESSIONS tab and verify that the session was created.
NOTE
The L2VPN session status appears as either Down or In Progress until you configure the
Autonomous Edge as an L2 VPN client and an active session is running.
a. On the L2 VPN SESSIONS tab, click the expand button next to L2-VPN-Session.
c. Click YES.
116
7. Navigate to Networking > Connectivity > Segments and add the newly created VPN
session information to the L2VPN-Segment.
a. Click the vertical ellipsis icon next to L2VPN-Segment and select Edit from the menu.
Option Action
1. Open a web browser and click the NSX-T Data Center > NSX Autonomous Edge
bookmark.
3. On the login page, enter admin as the user name and VMware1!VMware1! as the
password.
Option Action
6. Click SAVE.
117
8. Configure the L2VPN client session.
Option Action
c. Copy the string after the peer_code text. Be sure to copy only the text without the
quotes.
Option Action
14. On the L2VPN tab, verify that the status for L2VPN-Client-Session changes to UP.
118
Task 8: Verify the Operation of the VPN Setup
You verify the proper operation of the VPN tunnel deployed by opening consoles into the two
L2VPN VMs and using ping to reach across the VPN.
1. In the NSX UI, navigate to Networking > Network Services > VPN > L2 VPN SESSIONS.
You might need to refresh the status to view the most recent information.
3. Click the Information icon beside the status for L2VPN-Session to display additional
information about the tunnel status.
b. In the Network adapter 1 drop-down menu, click Browse, select L2VPN-Segment, and
click OK.
5. Verify that both the NSX Autonomous Edge (Auto-Edge-01) and the T1-L2VPN-02 virtual
machines reside on sa-esxi-01.vclass.local.
a. In the vSphere Client inventory, right-click T1-L2VPN-02 and select Edit Settings.
b. Verify that Network adapter 1 has the Remote_Network value.
Otherwise, click Browse, select Remote_Network from the drop-down menu, and click
OK.
8. Log in to the T1-L2VPN-01 VM with vmware as the user name and VMware1! as the
password .
ping -c 3 172.16.50.12
The ping should complete successfully.
119
10. Log in to T1-L2VPN-02 VM with vmware as the user name and VMware1! as the password.
ping -c 3 172.16.50.11
The ping should also complete successfully. You have now verified bidirectional
communication between the two VMs at the end of the VPN tunnel.
120
Lab 17 (Simulation) Using NSX
Intelligence to Gain Security Insights
IMPORTANT
Do not refresh, navigate away from, or minimize the browser tab hosting the simulation.
These actions might pause the simulation and the simulation might not progress.
121
Lab 18 Managing Users and Roles
3. On the login page, enter admin as the user name and VMware1!VMware1! as the
password.
122
Task 2: Add an Active Directory Domain as an Identity Source
You use LDAP to add an Active Directory Domain to NSX Manager.
1. On the NSX UI Home page, navigate to System > Settings > Users and Roles and click the
LDAP tab.
Option Action
4. When the Set LDAP Server window appears, click ADD LDAP SERVER.
Option Action
6. Click the Check Status link and verify that the connection status is Successful.
8. Click SAVE.
123
9. Click the Check Status link and verify that the connection status is Successful.
1. On the NSX UI home page, navigate to System > Settings > Users and Roles and click the
USERS tab.
3. When the role assignment window appears, select VCLASS in the Search Domain drop-
down menu.
4. Enter jdoe in the Users/User Group Name box and select the [email protected] user.
5. In the Roles pane, select Network Engineer from the Roles drop-down menu .
6. Click SAVE.
7. At the upper-right corner of the NSX UI, click the admin user and select Log out.
9. In the upper-right corner of the NSX UI, verify that you are logged in as [email protected].
10. Navigate to Networking > Connectivity > Tier-1 Gateways and verify that the ADD TIER-1
GATEWAY option is available.
The availability of the option indicates that users with the Network Engineer role have
permissions to configure Tier-1 gateways.
11. Navigate to Security > East West Security > Distributed Firewall.
12. Click CATEGORY SPECIFIC RULES and click the APPLICATION tab.
The unavailable option indicates that users with the Network Engineer role do not have
permissions to configure distributed firewall policies or rules.
14. In the upper-right corner of the NSX UI, click the [email protected] user and select Log out.
124