Edu en Nsxticm3 Lab Ie
Edu en Nsxticm3 Lab Ie
Edu en Nsxticm3 Lab Ie
com
mcse2012.blogfa.com
[email protected]
www.vmware.com/education
mcse2012.blogfa.com
Typographical Conventions
You must be aware of the following items that impact the NSX-T Data Center 3.0 ICM lab
performance:
• You access the lab environment by using a Remote Desktop Connection to the student
desktop. The student desktop resides on the Management network (SA-Management),
and you can start deploying the various NSX-T Data Center fabric items from the student
desktop.
• A vCenter Server system and NSX Manager instance are predeployed with two clusters
that are populated with various virtual machines.
• At various points in the labs, you are directed to copy and paste information for later use.
1. When you initially access the student desktop, right-click the Start button, select
Run> Notepad, and add the useful information to the file.
In this lab environment, you use a single-node NSX cluster. In a production environment, a
three-node cluster must be deployed to provide redundancy and high availability.
1. Use the information provided by your instructor to log in to your lab environment.
Task 2: Prepare for the Lab
You log in to the vSphere Client UI and the NSX UI.
a. Open Chrome.
d. On the login page, enter admin as the user name and VMware1!VMware1! as the
password.
Task 3: Verify the vCenter Server and the ESXi Hosts Licensing
You verify the licenses of the vCenter Server and ESXi hosts. Your instructor provides the
necessary licenses.
1. In the vSphere Client UI, select Administration from the Menu drop-down menu.
b. Click the vCenter Server Systems tab and view the license expiration date.
4. If the license is not valid, assign a vCenter Server license key to the vCenter Server
instance.
c. In the License key text box, enter or paste the vCenter Server license key provided
by the instructor.
e. Click OK.
5. Verify that the ESXi hosts licenses are valid.
b. Click the Hosts tab and view the license expiration dates.
6. If the licenses are not valid, assign a license key to all ESXi hosts.
e. In the License key text box, enter or paste the license key provided by the instructor.
g. Click OK.
Task 4: Verify the NSX Manager Configuration and Licensing
You examine the configuration and licensing information of the predeployed NSX Manager
appliance.
1. On the NSX UI Home page, navigate to System > Configuration > Appliances.
2. Under NSX Appliances, view the information of the predeployed NSX Manager instance
(172.20.10.41), including the IP address, NSX version, cluster status, and resource
utilization.
Information appears for only one NSX Manager node because you use a single-node
cluster in this lab.
3. Verify the license of NSX Manager by clicking System > Settings > Licenses.
1. On your student desktop, open the MTPuTTY application from the system tray.
NOTE
1. If not open already , open a new tab in your browser and click the NSX-T Data Center >
SA-NSXMGR-01 bookmark.
2. On the NSX UI Home page, navigate to System > Configuration > Fabric > Compute
Managers and click +ADD.
Option Action
4. Click ADD.
5. When the Thumbprint is Missing message appears, click ADD to use the server's
default thumbprint.
The registration status appears as Registered and the connection status appears as Up.
5. Review the NSX Management Cluster Information from the NSX CLI
IMPORTANT
Do not refresh, navigate away from, or minimize the browser tab hosting the simulation.
These actions might pause the simulation and the simulation might not progress.
Lab 4 Preparing the NSX
Infrastructure
3. Create IP Pools
3. On the login page, enter admin as the user name and VMware1!VMware1! as the
password.
a. On the NSX UI Home page, navigate to System > Configuration > Fabric >
Transport Zones and click +ADD.
Option Action
c. Click ADD.
a. Click +ADD.
Option Action
c. Click ADD.
1. On the NSX UI Home page, navigate to Networking > IP Management > IP Address
Pools and click ADD IP ADDRESS POOL.
b. Enter IP Pool for ESXi, KVM, and Edge in the Description text box.
c. Click Set under Subnets and select ADD SUBNET > IP Ranges.
1. On the NSX UI Home page, navigate to System > Configuration > Fabric > Nodes > Host
Transport Nodes.
The NSX Configuration status of the hosts appears as Not Configured and the Node
Status is Not Available.
5. In the NSX Installation dialog box, click Create New Transport Node Profile.
6. Provide the required details in the Add Transport Node Profile page.
Option Action
7. Click ADD.
8. In the NSX Installation window, click APPLY.
9. When the installation completes, verify that NSX is installed on the hosts and the status of
the SA-Compute-01 cluster nodes is Up.
You might need to click REFRESH at the bottom to refresh the page.
1. On the NSX UI Home page, navigate to System > Configuration > Fabric > Nodes > Host
Transport Nodes.
b. Click +ADD.
c. Provide the configuration details in the Add Transport Node-Host Details page.
Option Action
d. Click Next.
Option Action
b. Click +ADD.
c. Provide the configuration details in the Add Transport Node-Host Details page.
Option Action
d. Click Next.
Option Action
You can safely ignore the message: Host running on OS other than
ESXi/Windows Server will need third party package installed
to display physical NICs.
h. Click FINISH and the NSX Install process starts.
4. Verify that the configuration state appears as Success and the node status appears as Up
for the two KVM hosts.
You might need to refresh the page to update the status of the installation.
Lab 5 Configuring Segments
2. Create Segments
a. Open Chrome.
c. On the login page, enter admin as the user name and VMware1!VMware1! as the
password.
a. On the NSX UI Home page, navigate to Networking > Connectivity > Segments.
Option Action
c. Click SAVE.
Option Action
b. Click SAVE.
Option Action
b. Click SAVE.
4. Verify that the three segments are created successfully and the Status is Up.
6. Verify that the three newly created segments are listed under SA-Datacenter.
Task 3: Attach VMs to Segments
You attach VMs running on the ESXi hosts and KVM hosts to their corresponding segments.
1. In the navigator pane of the vSphere Client, click the Hosts and Clusters tab and expand
the view of SA-Datacenter > SA-Compute-01.
b. From the Network adapter 1 drop-down menu, select Browse, select Web-
Segment, and click OK.
d. Click OK.
b. From the Network adapter 1 drop-down menu, select Browse, select Web-
Segment, and click OK.
d. Click OK.
b. From the Network adapter 1 drop-down menu, select Browse, select App-Segment,
and click OK.
d. Click OK.
5. Power on T1-DB-01 on the sa-kvm-01 host.
sudo -s
c. Check the status of the VMs running on the SA-KVM-01 host.
virsh list –-all
The T1-DB-01 VM is in the shutoff state.
a. At the SA-KVM-01 command prompt, view the UUID (shown as interfaceid) that
is associated with T1-DB-01.
c. On the NSX UI Home page, navigate to Networking > Connectivity > Segments,
click the vertical ellipsis icon next to DB-Segment, and select Edit.
Option Action
ID Copy and paste the ID (numbers between the single quotes) from the
Notepad file.
f. Click SAVE.
g. Click CLOSE.
sudo -s
c. Check the status of the VMs running on the SA-KVM-02 host.
virsh list –-all
d. Power on the VM.
c. On the NSX UI Home page, click Networking > Connectivity > Segments, click the
vertical ellipsis icon next to Web-Segment, and select Edit.
If the number of ports configured does not appear, click the REFRESH button.
Option Action
ID Copy and paste the ID (numbers between the single quotes) from the
Notepad file.
f. Click SAVE.
g. Click CLOSE.
b. In the Navigator pane, click T1-Web-01 and select Launch Web Console.
c. When the web console window opens, click in the window and press enter to activate
the screen.
ping -c 3 172.16.10.12
Your ping should be successful.
ping -c 3 172.16.10.13
Your ping should be successful.
get logical-switches
sa-nsxmgr-01> get logical-switches
VNI UUID Name
69633 20d91369-b964-4ff6-a8a9-f8c263dc7213 App-Segment
69632 8fd97015-4bdc-47eb-ad98-d67608f82e75 Web-Segment
69634 4fa53e28-3923-4d6f-865c-5736e0e1d02a DB-Segment
c. Record the UUID value for Web-Segment in a Notepad file.
nsxcli
11. Retrieve the segment information from the sa-esxi-04 host.
get logical-switches
sa-esxi-04.vclass.local> get logical-switches
Logical Switches Summary
------------------------------------------------------------
a. Open Chrome.
c. On the login page, enter admin as the user name and VMware1!VMware1! as the
password.
1. On the NSX UI Home page, navigate to System > Configuration > Fabric > Nodes >
Edge Transport Nodes.
Option Action
4. Click NEXT.
5. On the Credentials page, enter VMware1!VMware1! as the CLI password and the
system root password.
6. Click the Allow SSH Login and Allow Root SSH Login toggles to display Yes.
7. Click NEXT.
8. On the Configure Deployment page, provide the configuration details.
Option Action
9. Click NEXT.
10. On the Configure Node Settings page, provide the configuration details.
Option Action
Option Action
Teaming Policy Switch Mapping - DPDK Click the Select Interface link, select pg-
Fastpath Interfaces for uplink-1 (active) SA-Edge-Overlay, and click SAVE.
13. On the Configure NSX page, click + ADD SWITCH and provide the configuration details.
Option Action
Teaming Policy Switch Mapping - DPDK Click the Select Interface link, select pg-
Fastpath Interfaces for uplink-1 (active) SA-Edge-Uplinks, and click SAVE.
14. Click FINISH.
The Edge deployment might take several minutes to complete. The deployment status
displays various values, for example, Node Not Ready, which is only temporary.
Wait for the configuration status to appear as Success and the status as Up. You can click
REFRESH occasionally.
15. On the NSX UI Home page, navigate to System Configuration > Fabric > Nodes > Edge
Transport Nodes , click +ADD EDGE VM, and provide the configuration details to deploy
the second edge node.
Option Action
c. Click the Allow SSH Login and Allow Root SSH Login toggles to display Yes.
Option Action
Option Action
Option Action
Teaming Policy Switch Mapping - DPDK Click the Select Interface link, select
Fastpath Interfaces for uplink-1 (active) pg-SA-Edge-Overlay, and click SAVE.
g. On the Configure NSX page, click + ADD SWITCH and provide the configuration
details.
Option Action
Teaming Policy Switch Mapping - DPDK Click the Select Interface link, select
Fastpath Interfaces for uplink-1 (active) pg-SA-Edge-Uplinks, and click SAVE.
h. Click FINISH.
The Edge deployment might take several minutes to complete. The deployment
status displays various temporary values, for example, Node Not Ready.
Wait for the configuration state to appear as Success and the node status as Up. You
can click REFRESH occasionally.
16. Verify that the two edge nodes are deployed and listed on the Edge VM list.
The configuration state appears as Success and the node status appears as Up.
1. On the NSX UI Home page, navigate to System > Configuration > Fabric > Nodes >
Edge Clusters.
2. Click +ADD.
Option Action
5. Click ADD.
7. Click 2 in the Edge Transport Nodes column and verify that sa-nsxedge-01 and sa-
nsxedge-02 appear in the list.
Lab 7 Configuring the Tier-1 Gateway
a. Open Chrome.
c. On the login page, enter admin as the user name and VMware1!VMware1! as the
password.
1. On the NSX UI Home page, navigate to Networking > Connectivity > Tier-1 Gateways.
Option Action
Linked Tier-0 Gateway Leave the text box blank because the Tier-0 gateway is not
yet created.
Edge Cluster Leave the text box blank because services are not required
at this point.
4. Scroll to the lower portion of the T1-GW-01 gateway, click the expand button next to
Route Advertisement, and select the options.
5. Click SAVE.
6. When a message prompts you to continue editing the Tier-1 gateway, click NO.
1. On the NSX UI Home page, navigate to Networking > Connectivity > Segments.
2. Click the vertical ellipsis icon next to Web-Segment and select Edit.
3. Click the vertical ellipsis icon next to App-Segment and select Edit.
4. Click the vertical ellipsis icon next to DB-Segment and select Edit.
2. If not already logged in, enter root as the user name and VMware1! as the password.
3. From T1-Web-01, verify that you can reach the virtual machines in App-Segment and DB-
Segment.
3. On the login page, enter admin as the user name and VMware1!VMware1! as the
password.
1. On the NSX UI Home page, navigate to Networking > Connectivity > Segments and click
ADD SEGMENT.
Option Action
3. Click SAVE.
4. When a message prompts you to continue configuring the segment, click NO.
5. Click ADD SEGMENT to create another segment for the second uplink.
Option Action
8. When a message prompts you to continue configuring the segment, click NO.
9. Verify that the two segments for the Tier-0 Gateway uplinks appear in the Segments list.
1. On the NSX UI Home page, navigate to Networking > Connectivity > Tier-0 Gateways.
Option Action
4. Click SAVE.
5. When a message prompts you to continue editing this Tier-0 gateway, click YES.
6. Scroll to the lower portion of the T0-GW-01 gateway, click the expand button next to
ROUTE RE-DISTRIBUTION, and click Set.
d. Select the Static Routes and the Connected Interfaces & Segments check boxes
under Tier-0 Subnets on the Set Route Re-distribution page.
When you select the Connected Interfaces & Segments check box, all related
options in that category are selected.
e. Select the Connected Interfaces & Segments and the Static Routes check boxes
under Advertised Tier-1 Subnets on the Set Route Re-distribution page.
When you select the Connected Interfaces & Segments check box, all related
options in that category are selected.
11. Click the expand button next to INTERFACES and click Set.
Option Action
b. Click SAVE.
Option Action
14. Click the expand button next to BGP and enter 100 in the Local AS text box.
Option Action
b. Click SAVE.
Option Action
d. Click SAVE.
e. Click CLOSE.
1. On the NSX UI Home page, navigate to Networking > Connectivity > Tier-1 Gateways.
2. Click the vertical ellipsis icon next to the T1-GW-01 gateway and select Edit.
3. On the T1-GW-01 edit page, select T0-GW-01 from the Linked Tier-0 Gateway drop-
down menu.
1. To verify connectivity, ping from the console of any tenant VM (T1-Web-01, T1-App-01, T1-
DB-01, and so on) to the 192.168.100.1 gateway.
ping -c 3 192.168.100.1
ping -c 3 192.168.110.1
Your pings should be successful.
2. Use the command prompt of your student desktop to verify that you can reach all the
tenant VMs.
ping 172.16.10.11
ping 172.16.20.11
ping 172.16.30.11
You should be able to ping from your student desktop to any of the tenant networks,
which verifies that the north-south routing is working properly.
Lab 9 Configuring VRF Lite
a. Open Chrome.
c. On the login page, enter admin as the user name and VMware1!VMware1! as the
password.
Task 2: Create the Uplink Trunk Segments
You create the uplink trunk segments that are connected to the uplink interfaces of each VRF
gateway.
1. In the NSX UI, navigate to Networking > Connectivity > Segments > SEGMENTS.
3. When the Segment wizard appears, configure the uplink trunk segment for the VRF
Gateways Uplink-1 interfaces.
Option Action
Option Action
1. In the NSX UI, navigate to Networking > Connectivity > Tier-0 Gateways.
a. Click ADD GATEWAY and select VRF from the drop-down menu to deploy the first
VRF gateway.
b. When the VRF Gateway wizard appears, configure the VRF gateway for VRF Red.
Option Action
c. Click SAVE and click YES at the Want to continue configuring this
Tier-0 Gateway? prompt.
3. Configure uplink interfaces for VRF Red.
c. Configure the first uplink interface for the T0-GW-VRF-Red VRF gateway in the ADD
INTERFACE wizard.
Option Action
d. Click SAVE.
e. Click ADD INTERFACE.
f. Configure the second uplink interface for the T0-GW-VRF-Red VRF gateway in the
ADD INTERFACE wizard.
Option Action
d. When the Set BGP Neighbors window appears, click ADD BGP NEIGHBOR and set
up the peering with the upstream router.
Option Action
Route Filter Click Set, click ADD ROUTE FILTER, click ADD for the IPv4
address family, and click Apply.
Option Action
Route Filter Click Set, click ADD ROUTE FILTER, click ADD for the IPv4
address family, and click Apply.
5. Scroll to the lower portion of the T0-GW-VRF-Red gateway, click the expand button next
to ROUTE RE-DISTRIBUTION, and click Set.
d. Select the Connected Interfaces & Segments check box under Tier-0 Subnets on the
Set Route Re-distribution page.
When you select the Connected Interfaces & Segments check box, all the related
check boxes are selected.
e. Select the Connected Interfaces & Segments check box under Advertised Tier-1
Subnets on the Set Route Re-distribution page
When you select the Connected Interfaces & Segments check box, all the related
check boxes are selected.
7. Click APPLY.
8. Verify that the Route Re-distribution Status toggle is turned on and click SAVE.
9. Click CLOSE EDITING to finish configuring the VRF gateway configuration for VRF Red.
10. Deploy a VRF gateway for VRF Blue.
a. Click ADD GATEWAY and select VRF from the drop-down menu to deploy the
second VRF gateway.
b. When the VRF Gateway wizard appears, configure the VRF gateway for VRF Blue.
Option Action
c. Click SAVE and click YES at the Want to continue configuring this
Tier-0 Gateway? prompt.
11. Configure the uplink interfaces for VRF Blue.
c. Configure the first uplink interface for the T0-GW-VRF-Blue VRF gateway from the
ADD INTERFACE wizard.
Option Action
d. Click SAVE
Option Action
d. When the Set BGP Neighbors window appears, click ADD BGP NEIGHBOR and set
up the peering with the upstream router.
Option Action
Route Filter Click Set, click ADD ROUTE FILTER, click ADD for the IPv4
address family and click Apply.
Option Action
Route Filter Click Set, click ADD ROUTE FILTER, click ADD for the IPv4
address family and click Apply.
13. Scroll to the lower portion of the T0-GW-VRF-Blue gateway, click the expand button next
to ROUTE RE-DISTRIBUTION, and click Set.
d. Select the Connected Interfaces & Segments check box under Tier-0 Subnets on the
Set Route Re-distribution page.
When you select the Connected Interfaces & Segments check box, all the related
check boxes are selected.
e. Select the Connected Interfaces & Segments check box under Advertised Tier-1
Subnets on the Set Route Re-distribution page.
When you select the Connected Interfaces & Segments check box, all the related
check boxes are selected.
16. Verify that the Route Re-distribution Status toggle is turned on and click SAVE.
17. Click CLOSE EDITING to finish the VRF gateway configuration for VRF Blue.
Task 4: Deploy and Connect the Tier-1 Gateways to the VRF
Gateways
You deploy one Tier-1 gateway for each VRF by selecting the corresponding VRF gateway to
connect.
1. In the NSX UI, navigate to Networking > Connectivity > Tier-1 Gateways.
2. Click ADD TIER-1 GATEWAY to add the Tier-1 gateway connected to VRF Red.
3. Configure the Tier-1 gateway in the ADD TIER-1 GATEWAY window for VRF Red.
Option Action
Edge Cluster Leave blank because no services are required for this lab.
4. Click SAVE and click YES at the Want to continue configuring the Tier-
1 Gateway? prompt.
5. Scroll to the lower portion of the Tier-1 configuration wizard, click the expand button next
to Route Advertisement, and select the options.
6. Turn on the All Static Routes and All Connected Segments & Service Ports toggles.
8. Click ADD TIER-1 GATEWAY to add the Tier-1 gateway connected to VRF Blue.
9. Configure the Tier-1 gateway in the ADD TIER-1 GATEWAY window for VRF Blue.
Option Action
Edge Cluster Leave blank because no services are required for this lab.
10. Click SAVE and click YES at the Want to continue configuring the Tier-
1 Gateway? prompt.
11. Scroll to the lower portion of the Tier-1 configuration wizard, click the expand button next
to Route Advertisement, and select the options.
12. Turn on the All Static Routes and All Connected Segments & Service Ports toggles.
13. Click SAVE and click CLOSE EDITING.
Option Action
c. Click SAVE.
Option Action
c. Click SAVE.
4. Verify that the two newly created segments are listed under SA-Datacenter.
1. In the navigator pane of the vSphere Client, click the Hosts and Clusters tab and expand
the SA-Datacenter > SA-Compute-01 view.
d. Click OK.
d. Click OK.
a. In the Navigator pane, click Ubuntu-01a and select Launch Web Console.
b. When the web console window opens, click in the window and press Enter to activate
the screen.
ping -c 3 10.0.10.11
The pings are successful.
3. Verify the route that the packets follow in VRF Red to reach the remote IP 10.0.10.11 by
running the traceroute command from the Ubuntu-01a console.
traceroute -n 10.0.10.11
The hops T1-GW-VRF-Red and T0-GW-VRF-Red should appear in the traceroute before
reaching remote IP 10.0.10.11.
a. In the Navigator pane, click Ubuntu-02a and select Launch Web Console.
b. When the web console window opens, click in the window and press Enter to activate
the screen.
5. Verify the connectivity in VRF Blue by pinging from the Ubuntu-02a VM console to IP
10.0.20.11 in the remote network 10.0.20.0/24, which is routed through the upstream FRR
router.
ping -c 3 10.0.20.11
The pings are successful.
6. Verify the route that the packets follow in VRF Blue to reach the remote IP 10.0.20.11 by
running the traceroute command from the Ubuntu-02a console.
traceroute -n 10.0.20.11
The hops T1-GW-VRF-Blue and T0-GW-VRF-Blue should appear in the traceroute before
reaching remote IP 10.0.20.11.
set cli-timeout 0
2. List the logical routers in the sa-nsxedge-01 by running the get logical-routers
command in the console.
get logical-routers
The VRF ID for the SR-VRF-T0-GW-VRF-Red logical router is 6. The VRF ID might be
different in your lab environment.
3. Enter into the VRF context for the SR-VRF-T0-GW-VRF-Red logical router.
vrf 6
The prompt changes to sa-nsxedge-01(tier0_vrf_sr).
get route
All the routes in the VRF, including Tier0-Connected, Tier1-Connected, and BGP types,
appear.
NOTE
You obtain 192.168.30.1 neighbor if you run the same command in the sa-nsxedge-02
edge node.
get logical-routers
The VRF ID for the SR-VRF-T0-GW-VRF-Blue logical router is 7. The VRF ID might be
different in your lab environment.
vrf 7
The prompt changes to sa-nsxedge-01(tier0_vrf_sr).
9. Verify the routing table for VRF Blue.
get route
All the routes in the VRF, including Tier0-Connected, Tier1-Connected, and BGP types,
must appear.
NOTE
The 172.16.40.0/24 network also appears in the VRF Red routing table in an earlier step.
VMs in different VRFs can be connected to overlapping networks.
NOTE
You obtain the 192.168.40.1 neighbor if you run the same command in the sa-nsxedge-02
edge node.
11. Exit the VRF context and return to the edge prompt.
exit
The prompt changes to sa-nsxedge-01.
1. Verify the lack of connectivity between VMs connected to different VRFs even though
they are using the same 172.16.40.0/24 subnet address.
ping -c 3 172.16.40.12
The pings are not successful.
2. Verify the lack of connectivity from the Ubuntu-01a VM in VRF Red to the 10.0.20.0/24
remote network IP in VRF Blue by pinging from the Ubuntu-01a console to the 10.0.20.11
remote network IP.
ping -c 3 10.0.20.11
The pings are not successful.
3. Verify the lack of connectivity in the other direction by pinging from the Ubuntu-02a VM
to the Ubuntu-01a VM IP 172.16.40.11.
ping -c 3 172.16.40.11
The pings are not successful.
4. Verify the lack of connectivity from the Ubuntu-02a VM in VRF Blue to the 10.0.10.0/24
remote network IP in VRF Red by pinging from the Ubuntu-02a console to the 10.0.10.11
remote network IP.
ping -c 3 10.0.10.11
The pings are not successful.
Lab 10 Configuring the NSX
Distributed Firewall
3. On the login page, enter admin as the user name and VMware1!VMware1! as the
password.
1. Use MTPuTTY (located in the toolbar of the student desktop) to open an SSH console to
T1-Web-01.
curl http://172.16.20.11
b. Verify that an HTTP response is returned from T1-App-01.
b. Connect to the SQL database and enter VMware1! when prompted for the
password.
2. Add a group.
c. Click Set Members under Compute Members and click +ADD CRITERIA.
3. Click the View Members link for the Web-Servers group and verify that all the three web
VMs (T1-Web-01, T1-Web-02, and T1-Web-03) are listed.
4. Click CLOSE.
5. Add a group.
c. Click Set Members under Compute Members and click +ADD CRITERIA.
7. Click CLOSE.
8. Add a group.
c. Click Set Members under Compute Members and click +ADD CRITERIA.
• Fourth entry: db
9. Click the View Members link for the DB-Servers group and verify that the T1-DB-01 VM is
listed.
12. Click the View Members link for the 3-Tier group and verify that all VMs for the 3-tier
application are listed.
1. In the NSX UI, navigate to Security > East West Security > Distributed Firewall.
4. After the row for the new policy appears, enter 3-TIER POLICY as the name.
5. Configure the Applied To field for 3-TIER POLICY so that it applies only to the 3-Tier
group.
a. In the 3-TIER POLICY, point to the DFW text box next to the Applied To field.
c. Click Groups, select the 3-Tier check box, and click APPLY.
6. Click the vertical ellipsis icon near 3-TIER POLICY and select Add Rule to add three
distributed firewall rules.
IMPORTANT
You must perform this step thrice to add three new distributed firewall rules under 3-TIER
POLICY.
• Applied To: Click Groups, select the 3-Tier check box, and click APPLY.
• Applied To: Click Groups, select the 3-Tier check box, and click APPLY.
• Applied To: Click Groups, select the 3-Tier check box, and click APPLY.
10. Navigate to the top-right corner of the screen and click PUBLISH.
Task 5: Test the IP Connectivity After the Firewall Rule Creation
You test the connectivity between applications to verify that the distributed firewall rules were
successfully applied.
curl http://172.16.20.11
b. Verify that an HTTP response is returned from T1-App-01.
b. Connect to the SQL database and enter VMware1! when prompted for the
password.
5. From the T1-App-01 console, attempt to open an SSH session to T1-DB-01 to verify that
only MySQL traffic is allowed between T1-App-01 and T1-DB-01.
ssh 172.16.30.11
The connection times out eventually. If you do not want to wait, press Ctrl+C to exit.
Task 6: Prepare for the Next Lab
You disable all user-created distributed firewall rules.
1. On the NSX UI Home page, navigate to Security > East West Security > Distributed
Firewall > CATEGORY SPECIFIC RULES > APPLICATION.
2. Click the vertical ellipsis icon near 3-TIER POLICY and select Disable All Rules.
3. Click PUBLISH.
Lab 11 Configuring the NSX Gateway
Firewall
a. Open Chrome.
c. On the login page, enter admin as the user name and VMware1!VMware1! as the
password.
1. Use MTPuTTY on your student desktop to open the preconfigured SSH connections to T1-
Web-01, T1-App-01, and T1-DB-01.
ssh 172.16.20.11
b. Log in with VMware1! as the password.
exit
Task 3: Configure a Gateway Firewall Rule to Block External SSH
Requests
You configure a gateway firewall rule to block SSH requests from external networks.
1. On the NSX UI Home page, navigate to Security > North South Security > Gateway
Firewall > GATEWAY SPECIFIC RULES.
4. When the row for the new policy appears, enter SSH TRAFFIC as the name.
5. Click the vertical ellipsis icon near the SSH TRAFFIC policy and select Add Rule.
• Services: Select the SSH check box in the Set Services page and click APPLY.
7. Click PUBLISH.
1. Open MTPuTTY from the student desktop and try to connect to T1-Web-01, T1-App-01,
and T1-DB-01.
ssh 172.16.20.11
c. Log in with VMware1! as the password.
The connection should be successful because the gateway firewall rule that you
configured does not affect the east-west traffic.
exit
1. On the NSX UI Home page, navigate to Security > North South Firewall > Gateway
Firewall > GATEWAY SPECIFIC RULES.
3. Click the vertical ellipsis icon near the SSH TRAFFIC policy and select Disable All Rules.
4. Click PUBLISH.
5. Open MTPuTTY from the desktop and connect to T1-Web-01, T1-App-01, and T1-DB-01.
6. Verify that SSH connections are allowed from the external network.
Lab 12 Configuring Distributed
Intrusion Detection
a. Open Chrome.
c. On the login page, enter admin as the user name and VMware1!VMware1! as the
password.
1. On the NSX UI Home page, navigate to Security > East West Security > Distributed IDS.
2. When the message to start with the NSX Intrusion Detection System appears, click GET
STARTED.
4. Under Intrusion Detection Signatures, verify the current version of the IDS signatures and
the last time they were downloaded.
5. In the Intrusion Detection Signatures section, select the Auto Update new versions
(recommended) check box.
IMPORTANT
If a message indicates that a new update is available, do not click the Update Now link. If
you click the link, the lab works, but the number of IDS events that you see might differ.
Task 3: Enable Distributed Intrusion Detection for a vSphere
Cluster
You enable Distributed Intrusion Detection for the SA-Compute-01 vSphere cluster.
3. When the Are you sure you want to enable intrusion detection
for selected clusters? message appears, click YES and verify that the status is
changed to Enabled.
1. On the NSX UI Home page, navigate to Security > East West Security > Distributed IDS
> PROFILES.
Option Action
4. Click SAVE.
5. Verify that Success appears as the status for Critical_ High_ IDS_ Profile.
Task 5: Configure the Intrusion Detection Rules
You configure Intrusion Detection rules to detect east-west malicious traffic.
1. On the NSX UI Home page, navigate to Security > East West Security > Distributed IDS
> RULES.
4. Click the vertical ellipsis icon near IDS Policy and select Add Rule.
• Sources: Any
• Destinations: Any
• Services: Any
• Action: Detect
b. In the Network adapter 1 drop-down menu, click Browse, select Web-Segment, and
click OK.
d. Click OK.
sudo -s
Use VMware1! as the password.
cd /home/vmware
9. Use a .pcap file to replay an intrusion detection attempt.
tcpreplay -i ens160
cryptolocker_9CBB128E8211A7CD00729C159815CB1C.pcap
The replay of the packet capture file might take a few minutes.
1. On the NSX UI Home page, navigate to Security > East West Security > Distributed IDS
> EVENTS.
2. Point to each of the red dots to gather additional information about each intrusion,
including its severity, type, total number of attempts, and when it was first launched.
3. Navigate to the bottom of the dashboard and expand one of the critical events that was
logged.
4. Review additional information about the attack, including the attacker and target
information, the protocol used, and its associated IDS rule.
5. Click the View Intrusion History link to obtain specific details about each occurrence of
the attack.
3. Create a Segment
a. Open Chrome.
c. On the login page, enter admin as the user name and VMware1!VMware1! as the
password.
Task 2: Configure the Tier-1 Gateway to Use Layer 7 Firewall Rules
You associate an edge cluster to the Tier-1 gateway to allow the context-aware configuration
or Layer 7 gateway firewall rules.
1. On the NSX UI Home page, navigate to Networking > Connectivity > Tier-1 Gateways.
2. Click the vertical ellipsis icon next to T1-GW-01 and select Edit.
4. Click SAVE.
Option Action
3. Click SAVE.
4. When the Want to continue this Segment message appears, click No.
1. From the NSX UI, navigate to Security > North South Security > URL Analysis.
2. When the Start the NSX URL Analysis message appears, click GET STARTED.
4. Find the Edge-Cluster-01 NSX Edge Cluster and turn on the URL Analysis State toggle.
7. Expand Edge-Cluster-01 and verify that the Connection Status for both NSX Edge nodes
is Up.
The Connection Status might take up to 5 minutes to change. Click the REFRESH arrow
next to Connection Status periodically to update the status.
1. On the Settings tab, find the Edge-Cluster-01 NSX Edge cluster and click Set under the
Profiles option.
b. Click Set
4. Click SAVE.
b. Click Set.
7. Click SAVE.
1. In the NSX UI, navigate to Security > North South Security > Gateway Firewall >
GATEWAY SPECIFIC RULES.
4. When the row for the new policy appears, enter URL POLICY as the name.
5. Click the vertical ellipsis icon near URL POLICY and select Add Rule.
6. Configure the rule.
• Services: Select the DNS-UDP and DNS check boxes in the Set Services page and
click APPLY.
• Profiles: Select the DNS check box in the Select Context Profile page and click
APPLY.
• Applied To: Select the T1-GW-01 check box and click APPLY.
7. Click PUBLISH.
d. Click OK.
sudo -s
Use VMware1! as the password.
cat /etc/resolv.conf
The DNS server is 172.20.10.10
1. From the NSX UI, navigate to Security > North South Security > URL Analysis > URLs.
The URL Analysis dashboard displays the accessed URLs classified by reputation score
and category. At least three different categories appear in the dashboard.
Results might take up to 5 minutes to appear. Click the REFRESH link at the top-right of
the page to see the most recent results.
2. Navigate to the bottom of the dashboard and review additional information about each
visited URL, including its reputation score, domain name, category, and session count.
Task 9: Prepare for the Next Lab
You disable the Layer 7 gateway firewall rule.
1. On the NSX UI Home page, navigate to Security > North South Firewall > Gateway
Firewall > GATEWAY SPECIFIC RULES.
3. Click the vertical ellipsis icon near URL POLICY and select Disable All Rules.
4. Click PUBLISH.
Lab 14 Configuring Network Address
Translation
3. Create a Segment
5. Configure NAT
a. Open Chrome.
c. On the login page, enter admin as the user name and VMware1!VMware1! as the
password.
Task 2: Create a Tier-1 Gateway for Network Address Translation
You create a Tier-1 gateway to support network address translation (NAT).
1. On the NSX UI Home page, navigate to Networking > Connectivity > Tier-1 Gateways
and click ADD TIER-1 GATEWAY.
Option Action
Route Advertisement Turn on the All Static Routes, All Connected Segments &
Service Ports, and All NAT IPs toggles.
3. Click SAVE.
4. If a message prompts you to continue editing the Tier-1 gateway, click NO.
5. Verify that the NAT gateway appears in the Tier-1 Gateway list and the status is Success.
Task 3: Create a Segment
1. On the NSX UI Home page, navigate to Networking > Connectivity > Segments and click
ADD SEGMENT.
Option Action
3. Click SAVE.
4. When the Want to continue this Segment message appears, click No.
1. In the vSphere Client UI, select Hosts and Clusters from the Menu drop-down menu.
3. In the Network adapter 1 drop-down menu, click Browse, select NAT-Segment, and
click OK.
5. Click OK.
Task 5: Configure NAT
You configure the source and destination NAT rules on the Tier-1 NAT gateway.
1. On the NSX UI Home page, navigate to Networking > Network Services > NAT.
Option Action
5. Click SAVE.
7. Verify that T1-GW-02-NAT is still selected in the Gateway drop-down menu and click
ADD NAT RULE again.
9. Click SAVE.
1. Use MTPuTTY to connect to sa-vyos-01 and verify that the 172.16.101.0/24 route is
advertised by entering show ip route.
a. On the NSX UI Home page, navigate to Networking > Connectivity > Tier-0
Gateways.
b. Click the vertical ellipsis icon next to T0-GW-01 and select Edit from the menu.
c. Click the expand button next to ROUTE RE-DISTRIBUTION and click the current
count value, 1.
d. Click the vertical ellipsis icon next to T0-GW-01 Route Re-distribution and select Edit
from the menu.
g. Click APPLY.
The ROUTE RE-DISTRIBUTION count is set to 5.
4. Switch back to the MTPuTTY connection for sa-vyos-01 and enter show ip route
again to verify that 80.80.80.1/32 appears.
2. Retrieve gateway instances and identify the virtual routing and forwarding (VRF) instance
context for SR-T0-GW-01.
get logical-routers
sa-nsxedge-01> get logical-routers
Logical Router
UUID VRF LR-ID Name Type Ports
736a80e3-23f6-5a2d-81d6-bbefb2786666 0 0 TUNNEL 3
90dbc567-26d2-4010-9f98-519d9f2802c3 1 3 SR-T0-GW-01
SERVICE_ROUTER_TIER0 7
a949fe00-5d14-4ce7-9af1-a5bce157d75f 3 2 DR-T0-GW-01
DISTRIBUTED_ROUTER_TIER0 5
bd4b7bc2-8800-432e-844a-a646057edb03 4 1 DR-T1-GW-01
DISTRIBUTED_ROUTER_TIER1 7
2eb670da-f124-4c2f-b1bf-b77c174ac2b5 5 9 SR-VRF-T0-GW-VRF-Red
VRF_SERVICE_ROUTER_TIER0 5
298ce52a-a221-4440-9057-61147b01f55e 6 14 SR-VRF-T0-GW-VRF-Blue
VRF_SERVICE_ROUTER_TIER0 5
01da2dfd-3270-4e32-b7ac-fe046ce7c5ed 7 17 DR-T1-GW-VRF-Red
DISTRIBUTED_ROUTER_TIER1 5
a2b1cbe8-844a-4ffc-a139-aa6bf61ce9bf 8 7 DR-VRF-T0-GW-VRF-Red
VRF_DISTRIBUTED_ROUTER_TIER0 4
0ee4a285-58eb-4e02-ba33-77c04132246e 9 18 DR-T1-GW-VRF-Blue
DISTRIBUTED_ROUTER_TIER1 5
10d4bdb0-df81-4c82-965c-5dedcefd71f0 10 12 DR-VRF-T0-GW-VRF-
Blue VRF_DISTRIBUTED_ROUTER_TIER0 4
ba44be1f-ee5e-4876-8851-a15fbe5aa808 11 20 SR-T1-GW-02-NAT
SERVICE_ROUTER_TIER1 5
2d78b3f7-08e2-4f55-85e7-f362a303e2fa 12 19 DR-T1-GW-02-NAT
DISTRIBUTED_ROUTER_TIER1 4
In the command output, the VRF ID for SR-T0-GW-01 is 1. The VRF ID in your lab might
be different.
3. Access the VRF for SR-T0-GW-01 and view the routing table of the Tier-0 SR.
vrf 1
get route
sa-nsxedge-01> vrf 1
sa-nsxedge-01(tier0_sr)> get route
Flags: t0c - Tier0-Connected, t0s - Tier0-Static, b - BGP,
t0n - Tier0-NAT, t1s - Tier1-Static, t1c - Tier1-Connected,
t1n: Tier1-NAT, t1l: Tier1-LB VIP, t1ls: Tier1-LB SNAT,
t1d: Tier1-DNS FORWARDER, t1ipsec: Tier1-IPSec, isr: Inter-SR,
> - selected route, * - FIB route
a. Open Chrome.
c. On the login page, enter admin as the user name and VMware1!VMware1! as the
password.
2. Ping the two web servers and verify that the pings are successful.
ping 172.16.10.11
ping 172.16.10.12
3. On your student desktop, open a browser tab and verify that you can access the two web
servers.
http://172.16.10.11
http://172.16.10.12
Do not proceed to the next task if you cannot access the two web servers.
Task 3: Create a Load Balancer
You create a load balancer and attach it to the Tier-1 gateway.
1. On the NSX UI Home page, navigate to Networking > Network Services > Load
Balancing > LOAD BALANCERS.
Option Action
b. Click SAVE.
c. When the message to continue the load balancer configuration appears, click YES.
d. On the Load Balancer options page, click Set Virtual Servers under VIRTUAL
SERVERS.
Option Action
Server Pool Click the vertical ellipsis icon next to the field and select Create New
4. Create a server pool for the web servers.
Option Action
b. On the Configure Server Pool Members page, click ADD MEMBER under Enter
individual members to add two web server nodes (T1-Web-01 and T1-Web-02) to the
pool member list.
Option Action
IP Enter 172.16.10.11.
c. Click SAVE.
d. Click ADD MEMBER and enter the configuration details for the second member.
Option Action
IP Enter 172.16.10.12.
e. Click SAVE.
f. Click APPLY.
5. Click the SERVER POOLS tab and verify that the newly created Web-Pool appears in the
server pool list.
6. Click the VIRTUAL SERVERS tab and verify that the newly created Web-VirtualServer
appears in the virtual server list.
7. Click the LOAD BALANCERS tab and verify that the Web-LB load balancer is attached to
the T1-GW-01 gateway and its status is Success.
a. From your student desktop, open a Chrome browser window and try to access the
load balancer’s VIP address http://192.168.100.7.
b. Verify that the website cannot be reached.
The website cannot be reached because the load balancer’s VIP is not advertised and
is unknown to the external clients.
2. Use curl to verify access to the load balancer VIP.
a. From your student desktop, open the Command Prompt window and access the load
balancer’s VIP address.
curl -i http://192.168.100.7
b. Verify that the website cannot be reached.
The website cannot be reached because the load balancer’s VIP is not advertised and
is unknown to the external clients.
a. On the NSX UI Home page, navigate to Networking > Connectivity > Tier-1
Gateways.
b. Click the vertical ellipsis icon next to T1-GW-01 and select Edit.
d. In the Edit Route Advertisement Configuration window, enable All LB VIP Routes.
5. Configure the T0-GW-01 gateway to redistribute the VIP route to the upstream VyOS
router.
d. Click the vertical ellipsis icon next to T0-GW-01 Route Re-distribution and select
Edit from the menu.
g. Click APPLY.
The ROUTE RE-DISTRIBUTION count is set to 6.
a. From the student desktop, open a Firefox browser and access the VIP address by
using http://192.168.100.7.
b. Refresh the browser display to verify that both back-end web servers are being used
(as a result of the configured round-robin method).
Due to the browser cache behavior, you might need to press Ctrl+F5 (force refresh)
to see the traffic being load balanced between the two web servers.
a. From the student desktop, open a Command Prompt window and access the load
balancer’s VIP address.
curl -i http://192.168.100.7
The webpage should appear.
b. Run the same curl command again to verify that both back-end web servers are
being used in a round-robin method.
Task 5: Prepare for the Next Lab
You disable the load balancer and detach the Web-LB load balancer from the T1-GW-01
gateway.
1. Navigate to Networking > Network Services > Load Balancing > LOAD BALANCERS.
5. Click SAVE.
Lab 16 Deploying Virtual Private
Networks
4. Deploy and Configure a New Tier-0 Gateway and Segments for VPN Support
a. Open Chrome.
c. On the login page, enter admin as the user name and VMware1!VMware1! as the
password.
Task 2: Deploy a New NSX Edge Node to Support the VPN
Deployment
You deploy a new NSX Edge node to configure VPN tunnels.
1. On the NSX UI Home page, navigate to System > Configuration > Fabric > Nodes >
Edge Transport Nodes.
Option Action
4. Click NEXT.
5. On the Credentials page, enter VMware1!VMware1! as the CLI password and the
system root password.
6. Click the Allow SSH Login and Allow Root SSH Login toggles to display Yes.
7. Click NEXT.
Option Action
9. Click NEXT.
10. On the Configure Node Settings page, provide the configuration details.
Option Action
Option Action
Teaming Policy Switch Mapping - DPDK Click the Select Interface link, select pg-
Fastpath Interfaces for uplink-1 (active) SA-Edge-Overlay, and click SAVE.
13. On the Configure NSX page, click + ADD SWITCH and provide the configuration details.
Option Action
Teaming Policy Switch Mapping - DPDK Click the Select Interface link, select pg-
Fastpath Interfaces for uplink-1 (active) SA-Edge-Uplinks, and click SAVE.
NOTE
The edge deployment might take several minutes to complete. The deployment status
displays various temporary values, for example, Node Not Ready.
Wait until the configuration state displays Success and the node status is Up. You might
need to click REFRESH occasionally.
15. Verify that the edge node is deployed and listed in the Edge VM list.
The configuration state appears as Success and the node status is Up.
Task 3: Configure a New Edge Cluster
You create an NSX Edge cluster and add the NSX Edge node to the cluster.
1. On the NSX UI Home page, navigate to System > Configuration > Fabric > Nodes >
Edge Clusters.
2. Click +ADD.
Option Action
4. In the Available (1) pane, select sa-nsxedge-03 and click the right arrow to move it to the
Selected (0) pane.
5. Click ADD.
a. On the NSX UI Home page, navigate to Networking > Connectivity > Segments.
Option Action
Option Action
b. Click SAVE.
3. On the NSX UI Home page, navigate to Networking > Connectivity > Tier-0 Gateways.
Option Action
6. Click SAVE.
7. When the prompt to continue configuring this Tier-0 gateway appears, click YES.
8. Scroll to the lower portion of the T0-GW-02-VPN gateway, click the expand button next
to ROUTE RE-DISTRIBUTION, and click Set.
d. On the Set Route Redistribution page, leave all the check boxes deselected under
Advertised Tier-1 Subnets.
e. On the Set Route Redistribution page, select the Static Routes and Connected
Interfaces & Segments check boxes under Tier-0 Subnets.
9. Click APPLY.
10. Verify that the Route Re-distribution Status toggle is turned on.
12. Click the expand button next to INTERFACES and click Set.
Option Action
b. Click SAVE.
Wait for the new Tier-0 gateway status to appear as Successful. You might need to click
REFRESH periodically while waiting.
Task 5: Create an IPSec VPN Service
You create and configure an IPSec VPN Service.
1. On the NSX UI Home page, navigate to Networking > Network Services > VPN > VPN
SERVICES.
Option Action
4. Click SAVE.
5. When you are prompted to continue configuring this VPN service, click NO.
a. On the VPN SERVICES tab, click ADD SERVICE > L2 VPN Server.
Option Action
c. Click SAVE.
d. When you are prompted to continue configuring this VPN service, click YES.
2. Click the expand button next to SESSIONS, click Add Sessions, and click ADD L2 VPN
SESSION.
3. Configure the session.
b. Click the vertical ellipsis icon next to Local Endpoint/IP and select Add Local
Endpoint.
Option Action
c. Click SAVE.
Option Action
e. Click SAVE.
f. When you are prompted to continue configuring this L2 VPN session, click NO.
5. Click the L2 VPN SESSIONS tab and verify that the session was created.
NOTE
The L2VPN session status appears as either Down or In Progress until you configure the
Autonomous Edge as an L2 VPN client and an active session is running.
6. Acquire the peer code for the L2 VPN session.
a. On the L2 VPN SESSIONS tab, click the expand button next to L2-VPN-Session.
c. Click YES.
a. Click the vertical ellipsis icon next to L2VPN-Segment and select Edit from the menu.
Option Action
1. Open a web browser and click the NSX-T Data Center > NSX Autonomous Edge
bookmark.
3. On the login page, enter admin as the user name and VMware1!VMware1! as the
password.
Option Action
6. Click SAVE.
Option Action
c. Copy the string after the peer_code text. Be sure to copy only the text without the
quotes.
Option Action
14. On the L2VPN tab, verify that the status for L2VPN-Client-Session changes to UP.
1. In the NSX UI, navigate to Networking > Network Services > VPN > L2 VPN SESSIONS.
You might need to refresh the status to view the most recent information.
3. Click the Information icon beside the status for L2VPN-Session to display additional
information about the tunnel status.
5. Verify that both the NSX Autonomous Edge (Auto-Edge-01) and the T1-L2VPN-02 virtual
machines reside on sa-esxi-01.vclass.local.
a. In the vSphere Client inventory, right-click T1-L2VPN-02 and select Edit Settings.
Otherwise, click Browse, select Remote_Network from the drop-down menu, and
click OK.
7. In the vSphere Client, open a web console to T1-L2VPN-01.
8. Log in to the T1-L2VPN-01 VM with vmware as the user name and VMware1! as the
password .
ping -c 3 172.16.50.12
The ping should complete successfully.
10. Log in to T1-L2VPN-02 VM with vmware as the user name and VMware1! as the
password.
ping -c 3 172.16.50.11
The ping should also complete successfully. You have now verified bidirectional
communication between the two VMs at the end of the VPN tunnel.
Lab 17 (Simulation) Using NSX
Intelligence to Gain Security Insights
IMPORTANT
Do not refresh, navigate away from, or minimize the browser tab hosting the simulation.
These actions might pause the simulation and the simulation might not progress.
Lab 18 Managing Users and Roles
3. On the login page, enter admin as the user name and VMware1!VMware1! as the
password.
Task 2: Add an Active Directory Domain as an Identity Source
You use LDAP to add an Active Directory Domain to NSX Manager.
1. On the NSX UI Home page, navigate to System > Settings > Users and Roles and click
the LDAP tab.
Option Action
4. When the Set LDAP Server window appears, click ADD LDAP SERVER.
Option Action
6. Click the Check Status link and verify that the connection status is Successful.
8. Click SAVE.
9. Click the Check Status link and verify that the connection status is Successful.
Task 3: Assign NSX Roles to Domain Users and Test Permissions
You assign an NSX role to an Active Directory domain user and verify the user's permissions.
1. On the NSX UI home page, navigate to System > Settings > Users and Roles and click
the USERS tab.
3. When the role assignment window appears, select VCLASS in the Search Domain drop-
down menu.
4. Enter jdoe in the Users/User Group Name box and select the [email protected] user.
5. In the Roles pane, select Network Engineer from the Roles drop-down menu .
6. Click SAVE.
7. At the upper-right corner of the NSX UI, click the admin user and select Log out.
9. In the upper-right corner of the NSX UI, verify that you are logged in as
[email protected].
10. Navigate to Networking > Connectivity > Tier-1 Gateways and verify that the ADD TIER-
1 GATEWAY option is available.
The availability of the option indicates that users with the Network Engineer role have
permissions to configure Tier-1 gateways.
11. Navigate to Security > East West Security > Distributed Firewall.
12. Click CATEGORY SPECIFIC RULES and click the APPLICATION tab.
The unavailable option indicates that users with the Network Engineer role do not have
permissions to configure distributed firewall policies or rules.
14. In the upper-right corner of the NSX UI, click the [email protected] user and select Log
out.