0% found this document useful (0 votes)
44 views

Operational Best Practices For NSX in Vmware: Environments

Uploaded by

saikyawhtike
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views

Operational Best Practices For NSX in Vmware: Environments

Uploaded by

saikyawhtike
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 67

NET5790

Operational Best Practices for NSX in VMware


Environments
Ray Budavari, VMware
Thomas Kraus, VMware

#NET5790

Agenda

Introduction - Network Virtualization


Operational Impacts
NSX for vSphere Components
Operational Tools
Demonstrations
Conclusion

Introduction - Network Virtualization


Virtual

Virtual

Network
Operations

1. Decouple

2. Reproduce

3. Automate

Physical
Hardware
independence

Physical
No change to network
from end host perspective

Cloud
Operations
Operational benefits
of virtualization

Agenda

Introduction - Network Virtualization


Operational Impacts
NSX for vSphere Components
Operational Tools
Demonstrations
Conclusion

Operational Impacts - Questions

If a Virtual Machine has a network outage where do I start?


How does network virtualization map to our operating model?
What tools exist to correlate logical and physical networks to
assist in troubleshooting?

What opportunities does network virtualization provide to improve


how we operate our environment?

Are we adding complexity


by adopting network
virtualization?

Does network virtualization


create a black box?

Operational Impacts - Answers


Capability
Packet Capture
NetFlow

RSPAN/ERSPA
N
Performance
Statistics
Syslog

Physical

Virtual

Capability
VM level
visibility
Network
Snapshot

CLI

UI

API

Physical

?
?

Virtual

Operational Impacts - Opportunities

All NSX components such as the NSX Controller, NSX vSwitch and
NSX Edge provide detailed network visibility and data

Simplify the underlying physical network


One consistent physical transport network to manage for virtual machine traffic
Greatly reduces the number of MAC/ARP table entries to manage
Enables you to build the network you want, while still meeting application and
workload connectivity requirements

Centralized reporting and


monitoring, distributed
performance and scale

Designed for automation


NSX is built on a REST API
provided by NSX Manager

All operations can be performed


programmatically via scripting or
higher-level languages
7

DC Networks

Operational Impacts - Examples

If a Virtual Machine has a network outage where do I start


to troubleshoot?

Before Network Virtualization:


Validate VLAN trunk configuration across multiple devices and ports
Verify VM visibility on each path of the network
Troubleshooting requires accessing different devices and interfaces

vSphere Web Client


Hypervisor CLI

Access Switch CLI


Distribution Switch CLI
Firewall
Load Balancer

These devices are typically managed by different teams

Virtualization Administrators
Network Administrators
Security Administrators
Service Providers

Operational Impacts - Examples

After Network Virtualization:


VXLAN network tests determine if the issue is related to the transport network
If VTEPs are reporting issues, engage the network team to troubleshoot physical
transport network

Provide VTEP IP/MAC information

Otherwise virtualization team validates VM logical networking


Verify NSX Components and Controller state information
Verify Source and Destination Hypervisors

Enhanced toolset is available for troubleshooting


Reduced number of components and resources required
NSX components can be queried or configured via REST API

Agenda

10

Introduction - Network Virtualization


Operational Impacts
NSX for vSphere Components
Operational Tools
Demonstrations
Conclusion

NSX for vSphere Components

Consumption
NSX Manager

Management

vCenter Server

Plane
NSX Edge
Logical Router

NSX Controller
User World Agent

Control
Plane

NSX vSwitch

VXLAN

Distributed

Firewall

Logical Router

ESXi

Single point of configuration


REST API and UI interface

Manages Logical networks


Run-time state
Does not sit in the Data Path
Control-Plane Protocol

NSX Edge
Services
Gateway
VDS

Data
Plane

Hypervisor Kernel Modules

11

Self Service Portal


Cloud Management
vCloud Automation Center

NSX vSwitch
Distributed network edge
Line Rate performance
NSX Edge
VM form factor
Data Plane for North South
traffic
Routing and Advanced
services

Components NSX Manager


NSX for vSphere centralized management plane

1:1 mapping between an NSX Manager and vCenter Server


Provides the management UI and API for NSX
vSphere Web Client Plugin
Deploys NSX Controller and NSX Edge Virtual Appliances (OVF)
Installs VXLAN, Distributed Routing and Firewall kernel modules and UW
Agent on ESXi hosts

Configures Controller
Cluster via a REST API
and hosts via a
message bus

Generates certificates to
secure control plane
communications

12

Components NSX Controller

Logical Router

Logical Router

VXLAN

VXLAN

Controller
VXLAN Directory
Service
MAC table
ARP table

Logical Router

VTEP table

VXLAN

A reliable and secure control plane to distribute VXLAN and Logical


Routing network information to ESXi hosts

NSX Controllers are clustered for scale out and high availability
Network information is sliced across nodes in a Controller Cluster
Enables dependency on multicast routing/PIM in the physical network to
be removed

Provides suppression of ARP broadcast traffic in VXLAN networks


13

Components UW agent
UW agent is a TCP (SSL) client that communicates with the Controller using
the control plane protocol

May connect to multiple controllers


Mediator between the ESXi Hypervisor Kernel Modules and NSX Controllers
Also communicates with message bus agent to retrieve information from|
NSX Manager

Runs as a service daemon on ESXi: netcpa


Logs to: /var/log/netcpa.log
Controller
Cluster

Controller

Controller

Controller

User World
Agent

Client

Client

Client

Kernel
Modules
ESXi Host
14

NSX
MGR

VXLAN

LR

Components NSX vSwitch and NSX Edge


ESXi

NSX vSwitch

Hypervisor Kernel Modules

NSX Edge
Logical
Router

(vSphere VIBs)

VDS

VXLAN

vSphere

Logical Router

Firewall

NSX Edge Logical Router

NSX vSwitch (VDS)

Control Functions only

VMkernel Modules

Dynamic Routing &

VXLAN
Distributed Routing
Distributed Firewall
Switch Security
Message Bus
15

NSX Edge
Services
Gateway

updates to Controller

Determines active ESXi


host for L2 Bridging

NSX Edge Services GW

L3-L7 Services:
NAT, DHCP, LB, VPN, Interface based
FW

Dynamic Routing
VM form factor
High Availability

Agenda

16

Introduction - Network Virtualization


Operational Impacts
NSX for vSphere Components
Operational Tools
Demonstrations
Conclusion

Operational Tools ESXi

pktcap-uw
New with vSphere 5.5
Enhanced tool that provides a framework for packet capture and tracing at the
Uplink, vSwitch, vmknic, vnic and port level at any stage in a packets lifecycle

17

Operational Tools ESXi

pktcap-uw
Extensive range of filters
such as source/destination
mac, IP, Protocol, VLAN,
VXLAN, ports etc.

Supports pcap format


output for use with protocol
analyzers such as
Wireshark

18

Operational Tools NSX vSwitch Backup & Restore

vSwitch Backup & Restore

19

Operational Tools NSX vSwitch Netflow

NetFlow / IPFIX

NetFlow collector
address and port

20

Operational Tools NSX vSwitch RSPAN/ERSPAN

RSPAN/ERSPAN, Port Mirroring

21

Operational Tools NSX vSwitch Alarms


vSwitch Alarms allow for alerting on VDS related events. Some of the
available preconfigured Triggers include Health Status, Reconfiguration,
Port blocked, Port Deleted, Link Down and Host removal

SNMP Network MIBs provide standards based visibility of NSX vSwitch


objects

22

Operational Tools NSX vSwitch Health Check

Network Health Check feature helps to detect common


configuration errors
Mismatched VLAN trunks between virtual switch and physical switch
Mismatched MTU setting between vNIC, virtual switch, physical adapter, and
physical switch ports.

Mismatched Teaming Configurations

vSphere admins can provide failure data to the Network admins to


facilitate problem resolution

Health Check uses


L2 Echo protocol to
send Ethernet
broadcast frames to
the physical switch

If reply packets are


not received,
warnings are
highlighted in the
vSphere Web Client
23

Operational Tools NSX Controller


Control Plane basics

NSX Manager

ESXi hosts and NSX Edge Logical


Router VMs collect network
information, which is then reported
to the Controller via User World
Agent (UWA)

NSX
Controller
Cluster

The NSX Controller CLI provides a


consistent, centralized interface to
verify VXLAN and Logical Routing
network state information

NSX Manager also provides APIs to


programmatically retrieve data from
the controller nodes

UWA

UWA

UWA

VTEP
UWA

VTEP

UWA

VTEP

UWA

VTEP

VTEP

VTEP

vSphere Cluster A
vSphere Cluster B
24

Operational Tools NSX Controller VTEP Report

VM

IP1

VM

MAC1

IP
2
MAC2

VNI
VNI
5001
5001

VXLAN 5001

vSphere Distributed Switch


10.20.10.11

10.20.10.10

11

vSphere Host

10.20.10.12

11

vSphere Host

VNI
VNI

VTEPIPIP
VTEP

VNI
VNI

VTEPIP
IP
VTEP

5001
5001

10.20.10.10
10.20.10.10
10.20.10.11

5001
5001

10.20.10.11
10.20.10.10
10.20.10.11

VTEPIPIP
VTEP
10.20.10.10
10.20.10.10
10.20.10.11

vSphere Host

Controller

10

Send VNI,VTEP
Mapping to
Controller

Report the new


VNI,VTEP
Mapping to the
Hosts

10
Management
Network

25

7
3

Operational Tools NSX Controller


General NSX Controller troubleshooting
steps:
Verify Controller cluster status and roles
Verify Controller node network connectivity
Check Controller API service
Validate VXLAN and Logical Router mapping
table entries to ensure they are consistent

Review source and destination netcpa logs and


CLI to determine control plane connectivity issues
between ESXi hosts & NSX Controller

The first set of commands relates to NSX


Controller CLI cluster status and health:
nsx-controller # show control-cluster status
nsx-controller # show control-cluster startupnodes

nsx-controller # show control-cluster roles


nsx-controller # show control-cluster connections
nsx-controller # show control-cluster vnet core
stats

nsx-controller # show network <arg>


nsx-controller # show log cloudnet/cloudnet_javavnet-controller.<start-time-stamp>.log

26

Operational Tools NSX Controller


General NSX Controller VXLAN operations:
List VNIs
VXLAN connection table
Verify VXLAN VTEP, MAC and ARP mapping tables
View VXLAN statistics

NSX Controller CLI VXLAN commands:


# show control-cluster vnet vxlan vni <vni>
# show control-cluster vnet vxlan connection-table <vni>
# show control-cluster vnet vxlan vtep-table <vni>
# show control-cluster vnet vxlan mac-table <vni>

# show control-cluster vnet vxlan arp-table <vni>


# show control-cluster vnet vxlan vni-stats <vni>

Note: VXLAN Logical Switches and Logical


Router instances are distributed across
Controller Nodes (slicing), so you will need to
run the CLI commands on the node which is
active for a given object

27

Operational Tools NSX Controller


General NSX Controller Logical Routing operations:
List Logical Router instances
Verify Logical Router interface and route mapping tables
Verify active controller connections
View Logical Router statistics

NSX Controller CLI Logical Routing commands:


# show control-cluster vnet logical-router instance-table <lr-id>
# show control-cluster vnet logical-router lif-table <lr-id>
# show control-cluster vnet logical-router route-table <lr-id>
# show control-cluster vnet logical-router lr-stats <lr-id>

Note that the NSX Controller CLI is still not final

28

Operational Tools VXLAN


Common VXLAN issues:
Connectivity between VXLAN VTEPs on Transport Network
MTU on Transport Network not set to 1600 bytes or greater
Teaming mismatch between dvUplinks and upstream switch
Preparation - either with the installation of VXLAN kernel modules or creation of VTEP VMkernel
interfaces

ESXi host communication with Controller

NSX for vSphere provides a new workflow for preparation and configuration
Supports multiple VTEPs per host

NSX leverages the vSphere 5.5 multi-instance TCP/IP stack

29

Operational Tools VXLAN

At Logical Switch level on the Monitoring Tab you can use the
unicast or broadcast test to verify the connectivity between VTEPs

VXLAN standard tests


with a 1600 byte MTU

30

Operational Tools VXLAN


The VXLAN Replication Mode will also determine transport network
connectivity requirements

Unicast Mode
All replication occurs using
unicast

Hybrid Mode
Local replication offloaded to
physical network, while remote
replication occurs via unicast

Multicast Mode
Requires IGMP for a Layer 2
topology and Multicast Routing
for L3 topology

All modes require an MTU of


1600 bytes
31

Operational Tools VXLAN

VXLAN namespace for esxcli provides detailed network


information and statistics.
# esxcli network vswitch dvs vmware vxlan list

# esxcli network vswitch dvs vmware vxlan network list --vds-name=Compute_VDS

# esxcli network vswitch dvs vmware vxlan network mac list vds-name=Compute_VDS -vxlan-id=5001

# esxcli network vswitch dvs vmware vxlan network arp list --vds-name Compute_VDS --vxlan-id=5001
# esxcli network vswitch dvs vmware vxlan network port list --vds-name Compute_VDS --vxlan-id=5001
# esxcli network vswitch dvs vmware vxlan network stats list --vds-name Compute_VDS --vxlan-id=5001

32

Operational Tools Logical Routing


Use the net-vdr command on
ESXi hosts to view Logical
Routing configuration and
statistics
Display Logical Router instances
~ # net-vdr -I l

List Logical Interface and Routing


Tables
~ # net-vdr -l lif <instance-name>
~ # net-vdr -l --route <instance-name>
LIFs and routes are pushed by the NSX
controller to the ESXi hosts and should
be consistent across the environment

View L2 Bridging information


~ # net-vdr -b mac <instance-name>
~ # net-vdr -l stats <instance-name>

33

Operational Tools NSX Edge Services


NSX Edge VM CLIs
NSX Edge provides a familiar CLI command
set for troubleshooting network services

Documented in a dedicated CLI guide

Sample Configuration Commands


show configuration {ospf|bgp|isis|static-routing}
show configuration {firewall|nat|dhcp|dns}
show configuration {loadbalancer|ipec|sslvpn-plus}

Sample Status Commands

34

show interface [IFNAME]


show firewall
show ip {route|ospf|bgp|forwarding}
show arp
show system {cpu|memory|network-stats|storage|uptime}

show service {dhcp|dns|highavailability|ipsec|loadbalancer|sslvpn-plus}

Operational Tools NSX Edge Services

API provides based statistics (for interfaces and services)


UI also provides interface statistics and graphs

35

Operational Tools NSX Edge Services

Logging commands
show log {follow|reverse}
show flowtable

Debug/troubleshooting commands
traceroute <ip_address or dns_name>
ping <ip address> or ping interface addr <alternate_src_ip> <ip_address>
debug packet display interface <vNic_0-9> <EXPRESSION>

debug packet display interface vNic_0 host_192.168.1.2


debug packet display interface vNic_2 host_192.168.1.3_and_port_80
debug packet display interface vNic_1 src_192.168.1.2_and_dst_192.168.1.3
debug packet capture interface <vNic_0-9> <EXPRESSION>
debug show files
debug copy {scp|ftp} <URL>

debug messagebus {forwarder|messages}


36

Operational Tools Flow Monitoring

Flow monitoring provides vNIC level visibility of VM traffic flows


Reporting on Top Flows, Destinations and Sources
Detailed Flow Data for both Allowed and Blocked Flows

37

Operational Tools Flow Monitoring

Flow data easily available through UI or via API for orchestration


Per flow granularity for Allowed and Blocked with ability to add or
edit firewall rules related to the flow.

38

Operational Tools NSX Manager

Perform Backup & Restore


operations (both scheduled
and on-demand)

NSX Manager Appliance


Upgrades

Verify status of NSX


Manager Services

Generate Tech support logs


View appliance CPU,
Memory and Disk usage

39

Operational Practices vCenter Operations Manager

Dashboard based view of environment


Monitor overall health of NSX vSphere Management and Control
Layer components and diagnose issues quickly

Networking and Security metrics

40

Operational Tools Syslog


Syslog is supported across all NSX components
1) NSX Manager
2) NSX Controllers
3) NSX Edges

4) ESXi Hosts

41

Operational Practices Log Insight

Consolidation, visualization, and correlation of syslog data from


multiple related components in a Software Defined Datacenter

Build Custom Dashboards for real time monitoring and trending


Customize Log interpretation Logic to parse using regex, int, str

42

Operational Tools REST API

NSX Manager exposes web service API over HTTPS (TCP 443)

API request and response data is formatted in XML


Simple single-user authentication using password
REST principles:
Leverages HTTP to send data between Clients and Servers (Requests and Responses)
Resources, Global Permanent Identifiers, Constraints

43

Agenda

44

NSX Platform / Network Virtualization


Operational Impacts
NSX for vSphere Components
Operational Tools
Demonstrations
Conclusion

NSX for vSphere Demonstrations

1. Packet capture of encapsulated VXLAN frames


2. Flow Monitoring

45

Key Takeaways & Best Practices

VMware NSX provides a unified platform for administering,


monitoring, and supporting your virtual networks and services

NSX enables a similar operational model for virtual networks as


vSphere does for virtual machines

Moving network features to logical space simplifies physical


networks and troubleshooting

Start with the basics when troubleshooting (transport network and


control plane)

Understanding the component interactions and toolset is key to


NSX operations

Enable logging on all components before you have issues and


familiarize yourself with how to collect support logs

Automate repeatable steps via the REST API to reduce error


Take the NSX for vSphere Hands on Lab: HOL-SDC-1303 to
reinforce concepts from this session
46

Questions

47

Backup Slides

48

Network Virtualization - Operations


Cloud Ops or Network Ops

What are the key capabilities required for


operating a Logical world?
NSX Manager

Overall Logical network


health/stats

Logical Topology

VM to VM connectivity

L2

Per VM flow visibility


L2

Traffic Analysis Packet


Capture
Transport/Tunnel health

Controller Cluster

Inventory/Fault Mgmt
vSwitch
ESXi

vSwitch

vSwitch

vSwitch

vSwitch

ESXi

ESXi

ESXi

NSX Edge

Multi-level Logging, Event


tracking and Auditing
Physical network
troubleshooting/visibility

WAN/Inter
net

49

Upgrade Management

NSX Operations Capabilities


NSX Optimized for vSphere
Logical Network Health

UI: NSX Manager


CLI: Central NSX Controller, NSX Edge

VM to VM connectivity (Logical)

NSX Controller Central CLI, Host level CLI

Traffic Flow visibility

IPFIX (VDS)
NSX Edge Flow Monitoring

Traffic Analysis per VM

RSPAN/ERSPAN (VM Traffic)


Host Packet Capture (Overlay)

Network Inventory, Fault Management

NSX Manager, SNMP (MIBS for ports, Switch etc)

Multi-level logging, Event tracking &


Auditing

Syslog Export (NSX controller, NSX Manager, NSX


Edge etc.)

Transport (Overlay) Health

NSX Manager Connectivity Check


NSX Controller Central CLI, Per host CLI

Upgrade Management

NSX Manager (Automated VIB and Controller


upgrades)

API visibility

NSX Manager API

External Tools

Custom, VCOPs, Log Insight

50

NSX System Architecture


Management Plane

Cloud Management System


vSphere API

REST API
vSphere API

NSX Manager

vCenter Server

REST API

Control Plane

Data Plane

Control Plane
Protocol

CP Protocol

NSX Controller

NSX Edge
Logical
Router

Control Plane Protocol


Security VXLAN DR DFW

Security VXLAN DR DFW

NSX vSwitch

51

Message Bus

vSphere API

UWA

Security VXLAN DR DFW

NSX Edge
Services
Gateway

Control Plane Protocol


Control plane protocol
All messages are TLVs
Categorized into primitives:
Connection management, negotiation, etc:
Hello, bye, keepalive
App specific:
Open, close, notification, update, query

Extensible.
App ID in message common header.

VXLAN sub protocol

52

Update and query messages contains one


or more TLVs for different data types:
VM IP, VM MAC, VTEP

VXLAN Control Plane Security


Certificate

1 Generation

NSX Manager

SSL

NSX Manager DB

REST API
Message Bus

UW
Agent

OVF
Deployment

UW
Agent

VTEP

UW
Agent

VTEP

UW
Agent

VTEP

Controller Cluster

vSphere Cluster A

53

SSL

SSL

VTEP

UW
Agent

VTEP

UW
Agent

VTEP

vSphere Cluster B

Operational Practices NSX Controller MAC Report

VM

IP1

VM

MAC1

IP
2
MAC2

VXLAN 5001

vSphere Distributed Switch


10.20.10.10

10.20.10.11

10.20.10.12

vSphere Host

vSphere Host

vSphere Host

VNI

VM MAC

VNI

VM MAC

5001

MAC1

5001

MAC2

VNI
VNI

VMMAC
MAC
VM

VTEP
VTEP

5001
5001

MAC1
MAC1

10.20.10.10
10.20.10.1
0

5001

MAC2

10.20.10.1
1

Controller

Send VNI,VM
MAC Mapping
and VTEP IP to
Controller

7
6

3
Management
Network

54

Operational Tools NSX Controller IP Report

VM

IP1

VM

MAC1

IP
2
MAC2

VXLAN 5001

vSphere Distributed Switch


10.20.10.10

10.20.10.11

10.20.10.12

vSphere Host

vSphere Host

vSphere Host

VNI

VM
IP

VM
MAC

VNI

VM
IP

VM
MAC

5001

IP1

MAC1

5001

IP2

MAC2

VNI
VNI

VMIPIP
VM

VMMAC
MAC
VM

5001
5001
5001

IP1
IP1
IP2

MAC1
MAC1
MAC2

Controller

Send VM MAC,
IP Mapping and
VNI to Controller

7
6

3
Management
Network

55

Controller Based VXLAN ARP Request


DA: Broadcast
SA: MAC1

VM

L2

Payload

IP1

VM

IP2
MAC2

MAC1

VNI

VM
IP

VM
MAC

VTEP

5001

IP1

MAC1

10.20.10.10

5001

IP2

MAC2

10.20.10.11

VXLAN 5001

vSphere Distributed Switch

10.20.10.10

10.20.10.11

10.20.10.12

vSphere Host

vSphere Host

vSphere Host

VNI
VNI

VM
VM
IP
IP
IP1
IP1

VM
VM
MAC
MAC
MAC
1MAC1

5001
5001

10.20.10.1
010.20.10.10

5001

IP2

MAC2

10.20.10.11

VTEP
VTEP

Controller
ARP Report for
VM IP2, MAC2
sent to VTEP
10.20.10.10

ARP Request for


VM IP2 sent to
Controller

Management
Network

56

Controller Based VXLAN Communication after ARP Resolution


DA: MAC2
SA: MAC1

L2

VM

Payload

IP1

VM

MAC2

10

MAC1

IP2
VXLAN 5001

VNI

V
M
IP

VM
MAC

VTEP

5001

IP1

MAC1

10.20.10.10

5001

IP2

MAC2

10.20.10.11

vSphere Distributed Switch


10.20.10.10

10.20.10.11

10.20.10.12

vSphere Host

vSphere Host

vSphere Host

VNI

VM
IP

VM
MAC

VTEP

VNI
VNI

VM
VM
IP
IP

VM
VM
MAC
MAC

VTEP
VTEP

500
1

IP1

MAC1

10.20.10.10

500
1500
1

IP2
IP2

MAC2
MAC1

10.20.10.11
10.20.10.11

500
1

IP2

MAC2

10.20.10.11

500
1

IP1

MAC2

10.20.10.10

9
VXLAN Transport
Network

DA: 10.20.10.11
SA: 10.20.10.10

DA: MAC1
5001

L2 IP UDP VXLAN L2
57

SA: MAC2

Payload

Controller

Operational Tools NSX Edge Services

Download Edge Gateway Tech Support Logs using the Web Client

Or from NSX Edge CLI using the following command


NSX-Edge1-0# export tech-support scp user@scpserver:file

58

Operational Tools REST API


VERB

= GET

URI

= https://<NSX Manager Hostname>/api/2.0/vdn/scopes

HEADERS

= Authorization

HTTP Body = N/A

RESPONSE: Search for the id of scope:


<id>vdnscope-X</id>

59

Operational Tools REST API


VERB

= POST

URI

= https://<NSX Manager
Hostname>/api/2.0/vdn/scopes/vdnscope-1/virtualwires

HEADERS

= Authorization, Content-Type

HTTP Body =
<virtualWireCreateSpec>
<name>Test-Logical-Switch-01</name>
<description>Created via REST API</description>
<tenantId>virtual wire tenant</tenantId>
<multicastProxy>true</multicastProxy>
<disableMulticast>true</disableMulticast>
</virtualWireCreateSpec>

60

Operational Tools REST API

Response: 201 Created

The Response Body provides the virtualwire-id, which can be used for additional
operations (eg, attaching to a Logical Router LIF or for Distributed Firewall rules)
61

Demo 1 (3 mins) - Script


Component Installation
NSX Manager
NSX Controller Cluster

Preparation
Login to ESXi host (destination)
Add Logical Switch
Connect VMs to Logical Switch

Data Collection
Start data collection on destination host, output to a share (that is also accessible on
analyzer)

Connect VMs to Logical Switch


Generate some traffic

62

Stop data collection


Start Wireshark and open pcap file
Enable VXLAN decoder
Walk through packet data format (VXLAN headers, unicast mode etc)
Show anything else ? Controller CLI/esxcli ?

References

Other VMworld breakouts VXLAN troubleshooting,


Security operations

VMware Networking and Security Booth


Hands on Lab: HOL-SDC-1303 VMware NSX to gain hands
on experience

Expert Bar/Group Discussions

63

Other VMware Activities Related to This Session

HOL:
HOL-SDC-1303
VMware NSX Network Virtualization Platform

64

THANK YOU

NET5790
Operational Best Practices for NSX in VMware
Environments
Ray Budavari, VMware
Thomas Kraus, VMware

#NET5790

You might also like