Vmware NSX 6 Lab Guide PDF
Vmware NSX 6 Lab Guide PDF
CopyrightITrademark
Copyright © 2014 VMware, Inc. All rights reserved. This manual and its accompanying
materials are protected by U.S. and international copyright and intellectual property laws.
VMware products are covered by one or more patents listed at http ://www.vmware.com/go/
patents. VMware is a registered trademark or trademark of VMware, Inc. in the United States
and/or other jurisdictions. All other marks and names mentioned herein may be trademarks
of their respective companies.
The training material is provided "as is," and all express or implied conditions,
representations, and warranties, including any implied warranty of merchantability, fitness for
a particular purpose or noninfringement, are disclaimed, even if VMware, lnc., has been
advised of the possibility of such claims. This training material is designed to support an
instructor-led training course and is intended to be used for reference purposes in
conjunction with the instructor-led training course. The training material is not a standalone
training tool. Use of the training material for self-study without class attendance is not
recommended.
These materials and the computer programs to which it relates are the property of, and
embody trade secrets and confidential information proprietary to, VMware, Inc., and may not
be reproduced, copied, disclosed, transferred, adapted or modified without the express
written approval of VMware, Inc.
Course development: Rob Nendel, John Tuffin, Jerry Ozbun
Technical review: Elver Sena, Chris McCain
Technical editing: Jim Brook, Shalini Pallat, Jeffrey Gardiner
Production and publishing: Ron Morton, Regina Aboud
The courseware for VMware instructor-led training relies on materials developed by the
VMware Technical Communications writers who produce the core technical documentation,
www.vmware.com/education
TABLE OF CONTENTS
Task 3: Verify That the vSphere Web Client Plug-In for NSX Manager Is
Installed
In your lab environment, the VMware vSphere® Web Client Plug-in for NSX Manager is
preinstalled and ready for use.
1. To log in to the vSphere Web Client, in the Firefox window, click the vSphere Web Client
bookmark.
2. When prompted, log in as root and enter the password VMwarel!.
Allow the initial authentication to complete. The initial authentication may take several minutes
to complete.
3. On the vSphere Web Client Home tab, click the Inventories> Networking & Security icon.
4. In the left navigation pane, review the list ofNSX features , then select NSX Managers.
5. In the middle pane, verify that a single NSX Manager instance with an IP address of
192.168.110.42 appears in the Objects list.
If an NSX Manager does not appear in the Objects list, ask your instructor for help.
J Objects 1'-- _
@ Actions ....
~ ·192.:168.110.42 192.168.110.42
g. Click OK.
h. In the hosts list, press Shift and click to select all three ESXi hosts .
i. Right-click the selected hosts and select Connect from the pop-up menu.
You can also connect each host individually from the vCenter > Hosts and Clusters
inventory panel.
4. Assign a VMware NSXTM for vSphere® license.
a. In the middle pane, click the Solutions tab.
b. Select the NSX for vSphere solution.
c. Click the Assign License Key link.
d. In the Assign License Key panel, select Assign a new license key from the drop-down menu.
e. In the License key text box, enter or paste your NSX for vSphere license key.
f. Click OK.
1. Tfthe Firefox window has been closed, double-click the Firefox icon on the ControlCenter
desktop.
2. Tfyou are not logged in to the vSphere Web Client, in the Firefox window, click the vSphere
Web Client bookmark.
3 . When prompted, log in as root and enter the password VMwarel ! .
4. On the vSphere Web Client Home tab, click Inventories> Networking and Security.
2 . In the middle pane, on the Management tab, click the green plus sign in the NSX Controller
nodes pane].
3. In the Add Controller dialog box, perform the following actions to configure and deploy the
first NSX Controller.
a. Select 192.168.110.42 from the VMware NSX Manager" drop-down menu.
b. Select ABC Medical from the Datacenter drop-down menu.
c. Select Management and Edge Cluster from the Cluster/Resource Pool drop-down
menu.
d. Select ds-site-a-nfsOl from the Datastore drop-down menu.
e. Click the Connected To > Select link to open the Connect to a Network dialog box.
f. Tn the Connect to a Network dialog box, click Distributed Portgroup.
h. Select New IP Pool from the IP Pool drop-down menu to open the Add TP Pool dialog box
and configure the options.
Option Action
Name Enter Controller-Pool in the text box.
Secondary DNS
DNS Suffix
Static IP Pool
Leave blank.
Leave blank.
j. In the Add Controller dialog box, enter VMware11 in the Password and the Confirm
password text boxes.
k. Click OK.
4. Monitor the NSX Controller deployment to completion.
• Use the horizontal scroll bar to uncover the Status column, if necessary.
• Monitor the deployment until the status changes from Deploying to Normal.
The deployment process takes a few minutes to complete.
Q2. How many vCPUs does the NSX Controller instance have?
Q3. How much total memory does the NSX Controller instance have?
Q5. What port group is the NSX Controller instance connected to?
•
08. Can the controller be safely restarted?
11. Run the following command to determine the startup nodes in the cluster, and review the
command output.
show control-cluster startup-nodes
12. Run the following command to review a detailed cluster role report.
show control-cluster roles
13. Review the command output and answer the following question.
09. How many roles have been assigned with the first controller as master?
15. Review the command output and answer the following questions.
010. How many roles have components actively listening on a network port?
011. How many unique ports are used for role-based communications?
16. Close the PuTTY window and click OK when prompted to confinn.
17. Restore the Firefox window.
j. Click OK.
Q2. How many vCPUs does the NSX Controller instance have?
Q3. How much total memory does the NSX Controller instance have?
Q5. What port group is the NSX Controller instance connected to?
10. Review the command output and answer the following questions.
11 . Run the following command to determine the startup nodes in the cluster, and review the
command output.
show control-cluster startup-nodes
12. Run the following command to review a detailed cluster role report .
show control-cluster roles
13. Review the command output and answer the following question.
Q9. How many roles have been assigned with the second controller as master?
15. Close the PuTTY window and click OK when prompted to confirm.
16. Restore the Firefox window.
Q2. How many vCPUs does the NSX Controller instance have?
Q3. How much total memory does the NSX Controller instance have?
05. What port group is the NSX Controller instance connected to?
10. Review the command output and answer the following questions.
12. Run the following command to review a detailed cluster role report.
show control-cluster roles
13. Review the command output and answer the following question.
09. How many roles have been assigned with the second controller as master?
•
14. Run the following command to review a cluster connections report.
show control-cluster connections
15. Close the PuTTY window and click OK when prompted to confirm.
16. Restore the Firefox window.
1. On the vSphere Web Client Home tab, click Inventories> Networking & Security.
2. In the left navigation pane, select Installation.
3. In the middle pane , click the Host Preparation tab .
4. For each cluster listed, click the Install link in the Installation Status column, and cli ck Yes
when prompted to confirm.
The following clusters are listed:
1. For Compute Cluster A, click the Configure link provided in the VXLAN column to open the
Configure VXLAN networking dialog box, and perform the following actions.
a. Verify that the Switch selection is Compute_VDS.
b. Verify that the VLAN setting is o.
c. Verify that the MTU setting is 1600.
d. For VMKNic IP Addressing, click Use IP Pool.
e. Select New IP Pool from the TP Pool drop-down menu to open the Add IP Pool dialog box.
f. Configure the following options.
Option Action
Name Enter VTEP - Poc 1-1 in the text box.
Static IP Pool Enter 192 . 168 . 250 . 51-192 . 168 • 250 . 60 in the text box .
3. Click the vSphere Web Client Refresh icon, which is located to the left of the logged in user
name.
4. Verify that the Compute Clu ster A VXLAN status is Enabled with a green check mark.
5. For Compute Cluster B, click the Configure link provided in the VXLAN column to open the
Configure VXLAN networking dialog box, and perform the following actions.
a. Verify that the Switch selection is Compute_VDS.
b. Verify that the VLAN setting is o.
c. Verify that the MTU setting is 1600.
d. For VMKNic IP Addressing, click Use IP Pool, and select VTEP-Pool-l from the drop-
down menu.
e. Leave all other settings at default value and click OK.
6. Wait for the update to complete and click the vSphere Web Client Refresh icon.
8. For Management and Edge Cluster, click the Configure link provided in the VXLAN column
to open the Configure VXLAN networking dialog box, and perform the following actions.
a. Verify that the Switch selection is Mgmt_Edge_VDS.
b. Verify that the VLAN setting is o.
c. Verify that the MTU setting is 1600.
d. For VMKNic IP Addressing, click Use IP Pool.
e. Select New IP Pool from the IP Pool drop-down menu to open the Add IP Pool dialog box.
f. Configure the following options
Option Action
Name EnterVTEP-Pool-2 in the text box.
Static IP Pool Enter 192 . 168 . 150 . 51-192 . 168 . 150 . 60 in the text box.
lfthe VXLAN status is not Enabled, wait and refresh again until the status changes.
11. Click the Logical Network Preparation tab and verify that VXLAN Transport is selected.
12. In the Clusters and Hosts list, expand each of the three clusters listed.
Option Action
Segment ID Pool Enter 5000-5999 in the text box.
3. Click OK.
Option Action
Select clusters to add Select the check box for each of the three clusters listed.
3. Click OK.
4. Wait for the update to complete and verify that Global Transport Zone appears in the transport
zones list, with a Control Plane Mode ofUnicast.
1. In the vSphere Web Client, remain in the Networking & Security view.
Q1. Have the same logcial switch port groups been added to both distributed
switches?
Q2. If the same port groups appear on both switches, why has the system
configured networking in this way?
Q3. Can the 10 number, associated with a VXLAN logical switch be determined from
the port group name?
Q4. Does the transit network port group in both the Compute_VDS and
Mgmt_Edge_VOS inventories share the same VXLAN 10?
+ I" I
X '&J I~ -r I <'Q Actions ...
I
CJc> db-sv-O1a Acti (I ns .....
6. In the Web-Tier - Add Virtual Machines dialog box, perform the following actions to migrate
virtual machines to the Web-Tier logical switch.
a. In the filter list, select the web-sv-Ola and web-sv-02a check boxes.
b. Click Next.
c. In the Select VNICs list, select the Network Adapter 1 (VM Network) check box for
•
web-sv-O1a and web-sv-02a.
d. Click Next.
e. Click Finish.
7. In the Recent Tasks panel , monitor the virtual machine migrations to completion.
8. In the Logical Switches list, double-click the Web-Tier entry to manage that object.
9. Click the Related Objects tab and click Virtual Machines.
Q1. Do the web-sv-01 a and web-sv-02a virtual machines appear in the virtual
machines list?
10. At the top of the left inventory pane, click the Network & Security back arrow.
11. In the Logical Switches list, select the App-Tier logical switch.
12. Click the Add Virtual Machines icon, or select Add VM ... from the Actions drop-down menu.
13. In the Add Virtual Machines dialog box, perform the following actions to migrate virtual
machin es to the App-Tier logical switch .
a. In the filter list, select the app-sv-Ola check box.
b. Click Next.
c. In the Select VNICs list, select the Network Adapter 1 (VM Network) check box for
app-sv-O1a.
e. Click Finish.
18. In the Recent Tasks panel, monitor the virtual machine migration to completion.
app-su-01a
Guest as:
Compatibilit·:;,:
DNS Name:
IP Addresses:
SUSE Linux Enterprise 11 (64-bit)
ESXi 5. I] and later (\...t'11 ··.. ersion B)
\ ..t,/I··Nare Tools: Running, 'o/ersion:9344 (Current)
a s-s» -01a
•
Host:
The IP address information is also provided in your Lab Topology handout on the Lab
Networks and IP Addressing page.
5. Test connectivity from the web-sv-Ola virtual machine using a console window.
a. In the VMs and Templates inventory tree, select the wcb-sv-Ola virtual machine.
b. Select Open Console from the Actions drop-down menu .
It may take a minute for the console window to initialize. Hover the mouse over the
console window, wait until the mouse pointer becomes a hand icon, then click anywhere
inside the console window and press enter.
c. Log in as root and enter the password VMwarell .
d. At the command line prompt, run the following command to query the ARP cache.
arp -an
Q2. Did the ping command receive replies from the web-sv-02a virtual machine?
h. At the command line prompt, run the following command to ping the app-sv-Gl a virtual
machine. Replace ip_address with the app-sv-Ola [P address recorded in step 5.
ping ip_address
Q4. Did the ping command receive replies from the app-sv-01 a virtual machine?
Q5. Did the ping command receive replies from the db-sv-01a virtual machine?
Q6. If any ping test failed, what might be the root cause?
07. Did the ping command receive replies from the web-sv-01a virtual machine?
d. Leave the Command Prompt window open for the remainder of the class.
7. Test connectivity using logical switch monitoring tools .
a. Restore the Firefox window.
b. Click the vSphere Web Client Home icon.
•
c. On the vSphere Web Client Home tab, click Inventories> Networking & Security.
d. In the left navigation pane, select Logical Switches.
e. In the center pane, double-click the Web-Tier entry to manage that object.
f. Click the Monitor tab and verify that the Ping test is selected.
k. Verify that the Size of test packet selection is VXLAN standard and click Start Test.
I. Click Start Test.
n. At the top of the left navigation pane , click the Networking & Security back arrow button.
Configuration
Interfaces v NIC#
01. Did the ping command receive replies from the web-sv-02a virtual machine?
ping ip_address
02. Did the ping command receive replies from the app-sv-nt a virtual machine?
Q3. Did the ping command receive replies from the db-sv-01a virtual machine?
Q4. Do these results differ from the ping tests you performed after creating the
logical switches (before adding the distributed router)?
i. At the command prompt, run the following command to query the ARP cache.
arp -an
j. Press Ctrl+Alt to release the mouse cursor and click the vSphere Web Client tab.
4. Test connectivity from the ControJCenter system using a Command Prompt window.
a. Minimize the Firefox window.
b. In the Command Prompt window, run the following command to ping the web-sv-O1a
virtual machine.
Replace ip_address with the web-sv-O1a IP address recorded in step 2.
ping ip_address
Q6. Did the ping command receive replies from the web-sv-01a virtual machine?
Q7. Did the ping command receive replies from the web-sv-02a virtual machine?
Q8. If no ICMP replies were received during the preceding tests, why?
~!NI Controller
5001 192.168.110.201
6. If the ARP-table is empty, you can repeat task 4, step 3 to repopulate the table.
Lab 6 Deploying an NSX Edge Services Gateway and Configuring Static Routing 45
Task 1: Prepare for the Lab
You perform these actions to prepare for the lab if you have closed windows or logged out of the
VMware vSphere® Web Client interface.
1. If a Command Prompt window is not open on the Control Center desktop, perform the
following actions.
a. On the ControlCenter desktop, double-click the Command Prompt shortcut.
b. Position the Command Prompt window at a convenient location on the desktop.
2. If the Firefox window has been closed, double-click the Firefox icon on the ControlCenter
desktop.
3. If you are not logged in to the vSphere Web Client, click the vSphere Web Client bookmark in
the Firefox window.
4. When prompted, log in as root and enter the password VMwarel ! .
5. In the Firefox window, if the web-sv-Ola console tab is not open, perform the following actions.
a. On the vSphere Web Client Home tab, click the Inventories> VMs and Templates icon.
b. Expand the inventory tree and select Discovered virtual machine> web-sv-Ol a.
c. Select Open Console from the Actions drop-down menu.
d. If prompted to log in, log in as root and enter the password VMwarel ! .
e. Press Ctr1+Alt to release the mouse cursor and click the vSphere Web Client tab.
f. Click the vSphere Web Client Home icon.
46 Lab 6 Deploying an NSX Edge Services Gateway and Configuring Static Routing
7. Select the Enable SSH access check box and click Next.
8. On the Configure deployment page, verify that the Datacenter selection is ABC Medical.
9. Verify that the Appliance Size selection is Compact.
10. Verify that the Enable auto rule generation check box is selected.
11. Under NSX Edge Appliances, click the green plus sign to open the Add NSX Edge Appliance
dialog box, and perform the following actions.
a. Select Management and Edge Cluster from the ClusterlResource Pool drop-down
menu.
b. Select ds-site-a-nfsOl from the Datastore drop-down menu.
c. Leave all other fields at default value and click OK.
12. Click Next.
13. On the Configure Interfaces page , click the green plus sign to open the Add NSX Edge
Interface dialog box, and perform the following actions to configure the first of two interfaces.
a . Enter Uplink- Interface in the Name text box.
b. For Type, leave UpLink selected.
c. Click the Connected To > Select link.
d. Click Distributed Portgroup.
e. Click the Mgmt-Edge-VDS - HQ Uplink button and click OK.
f. Click the green plus sign under Configure Subnets.
g. In the Add Subnet dialog box , click the green plus sign to add an IF address field.
h. Enter 192.168.100.3 in the IP Address text box and click OK to confirm the entry.
•
i. Enter 24 in the Subnet prefix length text box.
Lab 6 Deploying an NSX Edge Services Gateway and Configuring Static Routing 47
e. Click the green plus sign under Configure Subnets.
f. In the Add Subnet dialog box, click the green plus sign to add an IP address field.
g. Enter 192 . 168 . 10 . 1 in the IP Address text box and click OK to confirm the entry.
h. Enter 29 in the Subnet prefix length text box.
i, Click OK to close the Add Subnet dialog box.
Subnet Prefix
Name IP Address Length Connected To
Uplink-Interface 192.168.100.3 24 Mgmt_Edge_VDS - HQ Uplink
::: 1 Installing
48 Lab 6 Deploying an NSX Edge Services Gateway and Configuring Static Routing
Task 3: Verify the NSX Edge Gateway Deployment
You verify the state of the deployed NSX Edge services gateway appliance by reviewing appliance
configuration reports.
1. In the edge list, verify that the Perimeter Gateway type is NSX Edge.
•
8. On the vSphere Web Client Home tab, click Inventories> Hosts and Clusters.
9. Expand the Hosts and Clusters inventory tree so that the inventory of each cluster is shown.
10. Click the vSphere Web Client Refresh icon.
11. Select the Perimeter Gateway appliance in the Management and Edge Cluster inventory.
The appliance virtual machine name starts with Perimeter Gateway, followed by a number, for
example, Perimeter Gateway-G.
12. In the middle pane, use the Summary tab report to answer the following questions.
Lab 6 Deploying an NSX Edge Services Gateway and Configuring Static Routing 49
06. How many network adapters does the appliance have?
50 Lab 6 Deploying an NSX Edge Services Gateway and Configuring Static Routing
3. In the middle pane, on the Manage tab, click Routing.
4. In the routing category panel, verify that Static Routes is selected.
5. Click the green plus sign to open the Add Static Route dialog box and perform the following
actions.
a. Select Transit-Interface from the Interface drop-down menu.
b. Enter 192.168.110.0/24 in the Network text box.
This address is the address of the Management network.
c. Enter 192.168.10.1 in the Next Hop text box.
This address is the address of the Perimeter Gateway interface on the Transit network.
2. At the web-sv-O1a command prompt, run the following command to ping the ControlCenter
system.
ping 192.168.110.10
•
3. Confirm that ICMP echo replies are received and press Ctrl+C to stop the ping command.
The ping test demonstrates the bidirectional connectivity between the logical switch network
and the Management network, for traffic initiated on the Web-Tier network. If the ping
command does not receive the expected replies, ask your instructor for assistance.
4. In the Firefox window, press Ctr1+Alt to release the mouse cursor, open a new browser tab , and
browse the web-sv-O 1a IP address .
http://172 .16 .10.11
5. After the web-sv-O 1a Web page is displayed, browse the web-sv-02a IF address .
http://172.16 .10.12
Lab 6 Deploying an NSX Edge Services Gateway and Configuring Static Routing 51
6. After the web-sv-02a Web page is displayed, close the Firefox tab used to browse the Web
servers.
The Ping and HTTP tests that are conducted verify bidirectional connectivity between the
management and Web-Tier networks for connections initiated in either direction.
9. Verify that ICMP echo replies are received and press Ctrl+C to stop the ping command.
10. Run the following command to verify that the static routes enable bidirectional connectivity
between the Management network and the DB-Tier logical switch network.
Ping 172.16.30.11
11 . Verify that ICMP echo replies are received and press Ctrl+C to stop the ping command.
12. Leave the Command Prompt window open.
13. Restore the Firefox window and click the vSphere Web Client tab.
1. In the left navigation pane, click the Networking & Security back arrow button.
2. In the Firefox window, leave the following tabs open.
• vSphere'Veb Client
• web-sv-Ola
3. On the ControlCenter desktop, leave the Command Prompt window open.
52 Lab 6 Deploying an NSX Edge Services Gateway and Configuring Static Routing
Lab 7
Configuring and Testing Dynamic
Routing on NSX Edge Appliances
6. On the vSphere Web Client Home tab, click Inventories> Networking & Security.
•
16. Restore the Firefox window.
4. If a green check mark does not appear, perform the following actions.
a. On the right side of the Route Redistribution Status panel, click Change.
b. In the Change redistribution settings dialog box, select the OSPF check box .
c. Click Save.
d. In the Route Redistribution Status panel, at the top of the page, verify that a green check
mark appears next to OSPF.
5. At the top of the page, click Publish Changes.
Do not select the Enable OSPF check box. For management purposes, OSPF can be enabled or
disabled in the Global Configuration page, after having been initially configured elsewhere. An
error message is displayed if OSPF is enabled in Global Configuration without first configuring
the OSPF parameters. This condition is unique to NSX Edges of type Distributed Router.
5. At the top of the Global Configuration page, click Publish Changes.
6. In the routing category panel, select OSPF.
7. On the right side of the OSPF Configuration panel, click Edit to open the OSPF Configuration
dialog box, and perform the following actions.
a. Select the Enable OSPF check box.
b. Enter 192 . 168 . 10 . 3 in the Protocol Address text box.
c. Enter 192 . 168 . 10 . 2 in the Forwarding Address text box.
d. Click OK.
8. In the Area Definitions panel, click the green plus sign to open the New Area Definition dialog
box.
a. Enter 829 in the Area ID text box.
b. Leave all other fields at the default value and click OK.
9. In the Area to Interface Mapping panel, click the green plus sign to open the New Area to
Interface Mapping dialog box, and perform the following actions.
a. Verify that the Interface selection is Transit-Interface.
b. Select 829 from the Area drop-down menu.
c. Leave all other fields at default value and click OK.
10. At the top of the OSPF configuration page, click Publish Changes.
11. After the changes have been published, verify that the OSPF Configuration Status is Enabled.
OSPF Configuration
Status Enabled
•
switch network.
ping 172.16 .10.11
f. In the OSPF Configuration panel, verify that the following options are set as specified.
• Status: Enabled
• Protocol Address: 192.168.10.3
• Forwarding Address: 192.168 .10.2
g. In the Area Definitions panel, verify that Area 829 is defined with Normal for Type and
None for Authentication.
h. In the Area to Interface Mapping panel, verify that area 829 has been mapped to Transit-
Interface.
i. In the routing category panel, select Route Redistribution.
j. In the Route Redistribution Status panel, verify that a green check mark appears next to
OSPF.
k. In the Route Redistribution table, verify that an entry exists with the following criteria.
• Learner: OSPF
• From: Connected
• Prefix: Any
• Action: Permit
7. In the left navigation pane, click the Networking & Security back arrow button.
8. In the edge list, double-click the Perimeter Gateway entry to manage that object.
9. In the middle pane, click the Manage tab and click Routing.
IOSPF Status:Enabled
Area Definitions:
I.
g. In the Area Definitions panel, verify that the following areas are defined.
• Area ID:829, Type: Normal, Authentication: None
• Area ID:O, Type: Normal, Authentication: None
h. In the Area to Interface Mapping panel, verify that area 829 is mapped to Transit-Interface
and area 0 is mapped to Uplink-Interface.
i. In the routing category panel, select Route Redistribution.
j. In the Route Redistribution Status panel, verify that a green check mark appears next to
•
OSPF.
k. In the Route Redistribution table, verify that an entry exists with the following criteria.
• Leamer: OSPF
• From: OSPF
• Prefix: Any
• Action: Permit
01. Are the configuration settings for Distributed Router and Perimeter Gateway
exactly as specified in the preceding steps?
12. In the left navigation pane , click the Networking & Security back arrow button.
13. In the edge list, double-click the Distributed Router entry.
14. In the middle pane, click the Manage tab and click Settings.
15. In the settings category panel, select Interfaces and answer the following question .
02. Are the logical switch networks: Web-Tier (172.16.10.0/24), App-Tier (172.16.20.0/24),
and DB-Tier (172.16.30.0/24), connected to Distributed Router interfaces?
Q3. Is the absence of static routes on Distributed Router an issue (are there
subnets not directly connected that Distributed Router should advertise)?
18. In the routing category panel , select Route Redistribution, and answer the following question.
19. In the left navigation pane, click the Networking & Security back arrow button .
20. In the edge list, double-click the Perimeter Gateway entry to manage that object.
21. In the middle pane, click the Manage tab and click Settings.
22. In the settings category panel, select Interfaces and answer the following question.
07. Is the current route redistribution configured to allow the learning of static
routes through OSPF?
ping 172.16.30.11
•
4. Configure a Destination NAT Rule
5. Test Connectivity Using the Destination NAT Translation
6. Verify Non-Translated Packet Addressing Before Defining a Source NAT Rule
7. Configure a Source NAT Rule
8. Test Connectivity Using the Source NAT Translation
9. Use What You Have Learned
10. Clean Up for the Next Lab
6. On the vSphere Web Client Home tab, click Inventories> Networking & Security.
7. Run the following command to begin capturing HTTP traffic on the uplink interface.
All commands are case-sensitive.
debug packet display interface vNic_O port_80
Include the port_80 filter as the last argument of the command. The last argument is the filter
expression. The filter expression must be expressed with underscore characters where spaces
might normally appear.
8. Leave the traffic capture running in the PuTTY window and restore the Firefox window.
9. In the Firefox window, open a new browser tab and go to http://172.16.10.ll to browse the
web-sv-O1a Web server.
10. After the Web page is displayed, go to http://192.168.l00. 7 to verify that there is no response.
The 192.168.100.7 address specified in the URL is the NAT address that you associate with the
web-sv-O la virtual machine at 172.16.10.11.
11. After Firefox reports that the page cannot be displayed, close the browser tab and minimize the
Firefox window.
•
12. In the PuTTY window, examine the packets captured to determine source and destination
addressing format.
Packet addressing is always reported in the following format:
time protocol source-address : source-port > destination-address : destination-port
• 172.16.10.11
This address is the IP address of the web-sv-O1a virtual machine on the Web-Tier network.
14. Answer the following question.
01. In the packet capture, do you observe any packets exchanged between the
ControlCenter system and the 192.168.100.7 IP address?
[Z] x
IP Address
o Uplink:-I ...
192.168.100.7
2. After the Web page is displayed, keep the Web server tab open and minimize the Firefox
window.
3. In the PuTTY window, determine packet addressing and verify that the following two IP
addresses are involved in the exchange.
• 192.168.110.10
This address is the IP address of the ControlCenter.
• 192.168.100.7
This address is the destination NAT original address. For packets sent to this address, the
destination was transformed from 192.168.100.7 to 172.16.10.11 before being fowarded by
NSX Edge. For response packets sent from the Web server, the source address was
translated so that the packets appear as if originating from the destination NAT addres s to
maintain the integrity ofthe client > server connection.
6. Restore the Firefox window and click the page refresh icon to reload the Web server page.
7. After the Web page is displayed, close the browser tab and minimize the Firefox window.
8. In the PuTTY window, determine packet addressing and verify that the following two IP
addresses are involved in the exchange.
• 192.168.110.10
This address is the IP address of the ControlCenter.
• 172.16.10.11
This address is the destination NAT translated address of the web-sv-Ol a Web server. The
packets captured on the transit network are forwarded from perimeter gateway to
distributed router with the destination address translated.
9. Press Ctrl+C to stop the packet capture and leave the PuTTY window open.
10. Consider the tests performed so far in this lab and answer the following questions.
01. If response traffic was not translated based on the destination NAT mapping,
what source address would the packets have when received by the
ControlCenter?
•
Source NAT Rule
You verify the source and destination address of packets exchanged between the ControlCenter and
the web-sv-O 1a Web server virtual machine before applying a source NAT translation.
1. In the PuTTY window, run the following command to begin capturing ICMP packets on the
uplink interface.
debug packet display interface vNic_O icmp
2. Leave the packet capture running, restore the Firefox window, and click the web-sv-Ill a
console tab.
4. After at least one TCMP echo reque st and echo reply are reported, press Ctrl+C to stop the ping
command.
5. Press CtrJ+Alt to release the mouse cursor and minimize the Firefox window.
6. In the PuTTY window, determine source and destination addressing and verify that the
following two IP addresses are involved in the ICMP exchange.
• 192.168.110.10
This address is the IP address of the ControlCenter
• 172.16.10.11
This address is the non-translated IP address of the web-sv-Ola Web server virtual
machine.
The captured exchange shows the web-sv-Gl a Web server IP address is unaffected by the
destination NAT rule when traffic is initiated from that address. The original web-sv-Gl a Web
server IP address is maintained as the packets leave perimeter gateway in transit to the
ControlCenter system.
7. Restore the Firefox window and click the vSphere Web Client tab.
If the test does not produce the expected results, review your configuration carefully,
ensure that the destination NAT rule is enabled and is applied on the Uplink-Interface, and
try the test again. If the test continues to fail, ask your instructor for assistance. Both
destination NAT rules must be defined and working for upcoming labs.
1. On the ControlCenter desktop, leave the PuTTY window and the Command Prompt window
open .
2. In the Firefox window, click the vSphere Web Client tab.
3. At the top of the left navigation page, click the Networking & Security back arrow button.
4. In the Firefox window, leave the following tabs open.
• vSphere Web Client
• web-sv-Ola
•
Lab 8 Configuring and Testing NAT on an NSX Edge Services Gateway 75
76 Lab 8 Configuring and Testing NAT on an NSX Edge Services Gateway
Lab 9
Configuring Load Balancinq with NSX
Edge Gateway
6. On the vSphere Web Client Home tab, click Inventories> Networking & Security.
[Z] x
IP Address
• 192.168.100.7
NAT address for web-sv-Ola
• 192.168.100.8
NAT address for web-sv-02a
• 192.168.1 00.9
New address for the load balancer virtual server
11 . Click OK to close the Assigned IP Addresses dialog box .
Option Action
Name Enter Web- sv- 01a in the text box.
Option Action
Name EnterWeb-sv-02a in the text box.
•
All other settings Leave at the default value.
3. Leave the packet capture running and restore the Firefox window.
4. In the Firefox window, open a new browser tab and go to https ://l92.168 .100.9.
5. IfFirefox reports that the connection is untrusted, perform the following actions .
a. Click the I Understand the Risks link.
b. Click the Add Exception link
c. In the Add Security Exception dialog box, click Confirm Security Exception.
6. Minimize the Firefox window.
• 172.16.10.11 or 172.16.10.12
These are the addresses of the Web servers on the Web-Tier logical switch network.
8. Consider the packet exchange you just examined and answer the following question.
01. Which extra operation is the perimeter gateway performing on packets that
leave the Transit network interface, on the way to the Web server virtual
machines?
03. What setting would you enable on the load balancer so that original source
addresses are maintained?
•
Lab 9 Configuring Load Balancing with NSX Edge Gateway 83
17. In the PuTTY window, examine the captured packets to determine source and destination
addressing, and verify that the exchange is between a combination of the following IP
addresses. Only one of the two Web server addresses is used.
• 192.168.110.10
This address is the address of the ControlCenter system . With transparent mode enabled,
the original source address has been maintained in packets forwarded to the Web server.
Sessions are still proxied by perimeter gateway, using a different source port than the
source port that is used by the original client.
• 172.16.10.11 or 172.16.10.12
These addresses are the addresses of the Web servers on the Web-Tier logical switch
network.
18. On the ControlCenter desktop, double-click the Internet Explorer shortcut.
19. In Internet Explorer, go to https:/1192.168.100.9.
20. When Internet Explorer reports a prob lem with the Web site security certificate, click the
Continue to this website (not recommended) link.
21. Wait for the Web page to be displayed, which might take a few moments, and minimize the
Internet Explorer window.
22. In the PuTTY window, examine the captured packets to determine source and destination
addressing, and verify that the exchange is between a combination of the following IP
addresses. Only one of the Web server addresses appear.
• 192.168.110.10
This address is the IP address of the ControlCenter system.
• 172.16.10.11 or 172.16.10.12
These addresses are the addresses of the Web servers on the Web logical switch network.
The address that appears in the most recent capture should be the Web server not seen in
the previous capture.
23. Press Ctr1+C to stop the packet capture.
24. Restore the Firefox window and click the "Sphere Web Client tab.
01. Is the original IP address being translated in any way by this rule?
02. Is the port range being translated in any way by this rule?
03. If this rule performs no apparent translation, why did the system define it?
04. Given that a virtual server uses a destination NAT rule to trigger member server
selection, do you think that a virtual server can operate normally using a pool
of member servers with IP addresses that are also defined by destination NAT
rules?
•
Lab 9 Configuring Load Balancing with NSX Edge Gateway 85
Task 9: Migrate the Web-Tier Logical Switch to the Perimeter Gateway
You migrate the Web-Tier logical switch so that the network is connected directly to the perimeter
gateway. The load balancer virtual server is moved to the directly-connected Web-Tier network to
show side-by-side operation of the load balancer.
1. At the top of the left navigation pane, click the Networking & Security back arrow button.
2. In the edge list, double-click the Distributed Router entry to manage that object.
3. In the middle pane, click the Manage tab and click Settings.
4. In the settings category panel, select Interfaces,
5. In the interfaces list, select the Web-Interface entry and click the disconnect icon.
6. Wait for the update to complete, and verify that a disconnect icon appears in the Web-Interface
Status column.
7. At the top of the left navigation pane, click the Networking & Security back arrow button.
8. In the edge list, double-click the Perimeter Gateway entry to manage that object.
9. In the middle pane, click the Manage tab and click Settings.
10. In the settings category panel, select Interfaces.
11. Select the vNIC# 2 interface, click the pencil icon to open the Edit NSX Edge Interface dialog
box, and perform the following actions.
a. Enter Web-Tier-Temp in the Name text box.
b. Verify that the Type selection is Internal.
c. Click the Connected To > Select link.
d. Click the Web-Tier button and click OK.
e. Above the IP Address table, click the green plus sign to open the Add Subnet dialog box.
g. Enter 172 . 16 . 10 . 1 in the IP address text box and click OK to confirm the entry.
The new interface you are configuring on perimeter gateway replaces the distributed router
interface you disconnected in step 5, using the same IP address.
h. Enter 24 in the Subnet Prefix Length text box .
i. Click OK to close the Add Subnet dialog box.
Task 10: Reposition the Virtual Server and Examine NAT Rule Changes
The virtual server is repositioned to be on the same subnet as the pool members, in a one-armed
configuration.
1. Under the Manage tab, click Load Balancer.
2. In the load balancer category panel, select Virtual Servers.
3. In the virtual servers list, select the single virtual server defined and click the pencil icon .
4. In the Edit Virtual Server dialog box, change the IP Address field to 172.16.10.1, and click
OK.
For this example, the primary IP address of an interface is used for the virtual server.
5. Under the Manage tab, click NAT.
6. In the NAT rules list, find the destination NAT rule that has 172.16.10.1 in the Original IP
Address column, and answer the following questions.
01. Has the system autoremoved the destination NAT rule for the old virtual server
IP address of 192.168.100.9?
02. Is the new rule translating the original IP address or port in any way?
03. Based on the virtual server destination NAT rules that you have examined so
far, is there any difference in the actual operation performed by NSX Edge on
•
traffic to be sent to a member server?
Q4. Other than a primary interface IP address being used as the virtual server IP
address in this example, what is the primary difference between the two
positions in terms of traffic flow and sequence of operations on the edge when
traffic is received, transformed, and subsequently sent to a member server?
3. Leave the packet capture running and restore the Firefox window,
4. In the Firefox window, click the NSX for vSphere Training tab and go to https:1/l72.1 6.10.1.
While performing the interim tasks in this activity, after migrating the Web-Tier virtual switch,
the OSPF routing table automatically updates and both perimeter gateway and distributed router
are aware of the new network location.
5. When Firefox reports the connection is untrusted, perform the following actions.
a. Click the] Understand the Risks link.
b. Click the Add Exception link
c. In the Add Security Exception dialog box, click Confirm Security Exception.
6. After the Web page is displayed, close the browser tab used to browse the Web page and
minimize the Firefox window.
7. In the PuTTY window, examine the captured packets to determine source and destination
addressing, and verify that the exchange is between a combination of the following IP
addresses . Only one of the Web server IP addresses appear.
• 172.16.10.1
This address is the perimeter gateway interface on which the destination NAT rule is applied.
• 172.16.10.11 or 172.16.10.12
These addresses are the addresses of the Web servers on the Web logical switch network.
The address that appears in the capture should be the Web server not seen in the previous
capture .
13. Press Ctr1+C to stop the packet capture.
14. Restore the Firefox window and, ifnot already active , click the vSphere Web Client tab.
•
Lab 9 Configuring Load Balancing with NSX Edge Gateway 89
90 Lab 9 Configuring Load Balancing with NSX Edge Gateway
Lab 10
Advanced Load Balancing
IMPORTANT
This lab require s that you have completed the previous lab (Configuring Load Balancing with NSX
Edge Gateway). If you did not perform the previous lab, ask your instructor for guidance.
6. On the vSphere Web Client Home tab, click the Inventories > Networking & Security icon.
3. Leave the packet capture running and position the window so that you remember that it contains
the uplink capture.
4. On the ControlCenter desktop, double-click the PuTTY shortcut.
5. In the PuTTY window, double-click the Edge Services GW saved session.
6. Log in as admin and enter the VMwarel ! VMwarel! password.
7. In the new PuTTY window, begin capturing HTTP traffic on the web-tier-temp interface by
running the following command.
debug packet display interface vNic_2 port_80
The two packet captures show the load balancer virtual server receiving SSL traffic and
connecting to a pool member server using HTTP.
8. Leave both PuTTY windows open and position the windows so that the captures can be
compared.
9. On the ControlCenter desktop, double-click the Internet Explorer shortcut.
Ensure that you use Internet Explorer for the following tests.
• 172.16.10.1
This address is the virtual IP (vIP) address of the load balancer in the one-aim configuration.
15. Press Ctrl+C to stop the traffic capture.
16. Select the PuTTY window that contains the transit interface capture.
17. In the PuTTY window, examine the captured packets and verify that the exchange is between a
combination of the following IP addresses. Only one of the Web server IP addresses appears.
• 192.168.110 .10
This address is the IP address of the ControlCenter system that is maintained in transparent
mode.
• I72.16. 1O. II or 172.16.10.12
These addresses are the IP addresses ofthe Web servers on the Web logical switch network.
18. Restore the Internet Explorer window and click the page refresh icon.
• 172.16.10.11 or 172.16.10.12
These addresses are the IP addresses of the Web servers on the Web logical switch network.
The address that appears in the capture should be the Web server not seen in the previous
transit network capture.
b. Click OK.
3. Under the Manage tab, click Settings.
4. In the settings category panel, select Interfaces.
5. In the interface list, select the Web-Tier-Temp interface and click the disconnect icon.
6. Wait for the update to complete and verify that a disconnect icon appears in the Web-Tier-Temp
Status column.
6. On the vSphere Web Client Home tab, click the Inventories> Networking & Security icon.
• 192.168.222.2/30
d. Leave all remaining settings at the default value and click OK.
8. Wait for the HA configuration update to finish, and verify that the HA status in the HA
Configuration panel is Enabled.
9. Click the vSphere Web Client Home icon.
10. On the vSphere Web Client Home tab, click Inventories> Hosts and Clusters.
11 . Expand the Hosts and Clusters inventory tree so that the Management and Edge Cluster
inventory is shown.
12. In the Management and Edge Cluster inventory, find all virtual machines with names starting
with Perimeter Gateway.
13. Select each perimeter gateway virtual machine and use the Summary tab information to answer
the following questions.
Based on the sequence of actions taken so far, the active node should be the vshield-edge-2-0
(Perimeter Gateway-O) node. Remember which node was listed as active, you will cause a
failover in the next task.
4. At the command prompt, run the following command to display HA heartbeat packets captured
on the transit network interface.
debug packet display interface vNic_1
net 192 .168.222.0 mask 255.255.255.252
This command displays HA heartbeat packets captured on the transit network interface.
5. Examine the exchange and verify that the two HA nodes are activ ely communicating status to
each other. You should see packets exchanged between the following IP addresses.
• 192.168.222.1
• 192.168.222 .2
6. Keep the traffic capture running and restore the Firefox window.
10. Examine the command output and answer the following questions.
This command displays HA heartbeat packets captured on the transit network interface.
12. Examine the packet exchange and verify that only the active node is communicating heartbeat
information and is receiving no replies from the peer node.
13. Keep the traffic capture running and restore the Firefox window.
2. Above the logical switch list, click the green plus sign to open the New Logical Switch dialog
box, and perform the following actions .
a. Enter Branch-Web-Tier in the Name text box .
b. Verify that the Transport Zone is Global Transport Zone.
c. Verify that the Control Plane Mode is Unicast.
d. Click OK.
3. In the logical switch list, select the Branch-Web-Tier entry and select Add VM from the
Actions drop-down menu .
4. In the Add Virtual Machines dialog box, perform the following actions.
a. On the Select Virtual Machines page, scroll down and select the web-sv-02a check box,
and click Next.
b. On the Select VNICs page, select the web-sv-02a - Network adapter 1 (Web-Tier) check
box and click Next.
c. On the Ready to complete page, verify that web-sv-02a Network adapter 1 now indicates
(Branch-Web-Tier) and click Finish.
5. Wait for the migration task to complete, and double-click the Branch-Web-Tier entry to
manage that object.
f. Under Configure subnets, click the green plus sign to open the Add Subnet dialog box.
g. In the Add Subnet dialog box, click the green plus sign to add an IP address field.
Subnet Prefix
Name IP Address Length Connected To
Uplink-Interface 192.168.130.4 24 Mgmt~dge_VDS - HQ Access
...
:'" 1 Installing
If the Client Settings dialog box does not close, scroll back through the configuration settings
and look for any setting with a red box around it. The dialog box does not report settings that
fail validation.
j. Leave all other fields at the default value and click OK.
Internet Control Message Protocol (TCMP) echo replies are received. Leave the ping command
running,
IfICMP echo replies are not received, press Ctrl+C to stop the ping command, wait one minute ,
and repeat this step.
8. Press Ctrl+Alt to release the pointer.
9. In the Firefox window, select the web-sv-Ol a console tab.
Q1. If you capture traffic on the web-sv-01 virtual machine, on the perimeter
gateway side of the tunnel, what source IP address would the incoming ping
packets have?
•
Q2. What source hardware (MAC) address would the frames have?
11 . At the web-sv-01a command prompt, examine the Address Resolution Protocol (ARP) table.
arp -a
12. In the ARP table output, find the hardware address for 172.16.10.12 and the IP address ofthe
web-sv-02a virtual machine.
Q3. Is the 172.16.10.12 hardware address the same that you recorded in step 6?
The hardware address for web-sv-02a (at 172.16.10.12) is preserved when the tunnel traffic is
decapsulated by the perimeter gateway. Because this is a layer 2 tunnel, response frames sent to
that MAC address are intercepted for encapsulation back to the sending node. This tunnel
differs from an IPsec tunnel, for example, where you might see the source IP with the hardware
address of the gateway interface that faces the destination.
01. Are packets being exchanged between the two NSX Edge gateways?
Perimeter gateway: 192.168.100.10
Branch gateway: 192.168.130.4
6. In the Fircfox window, if the web-sv-02a console tab is not open , perform the following actions.
a. On the vSphere Web Client Home tab, the Inventories> VMs and Templates icon.
b. Expand the inventory tree and select Discovered virtual machine> web-sv-02a.
c. Select Open Console from the Actions drop-down menu.
d. Ifprompted to log in, log in as root and enter the password VMwarel!.
e. Press CtrI+Alt to release the pointer and click the vSphere Web Client tab.
f. Click the vSphere Web Client Home icon.
17. Click Publish Changes and wait for the update to complete.
18. In the routing category panel, select Static Routes.
m. Leave all remaining settings at the default value and click OK.
4. In the top status panel, click Enable.
5. Click Publish Changes and wait for the update to complete .
6. In the status panel, verify that the IPSec VPN Service Status is Enabled.
3. Run the following command to change the default gateway used by the virtual machine.
route add default gw 172.16.40 .1 ethO
4. Run the following command to verify that the 172.16.40.12 IP address has been assigned.
ifconfig
5. Run the following command to verify that the default gateway route for 172.16.40 .1 has been
configured.
route
m. Leave all remaining settings at the default value and click OK.
6. Click Enable.
7. Click the Publish Changes button and wait for the update to complete.
8. In the status panel, verify that the IPSec VPN Service Status is Enabled.
•
Task 7: Test VPN Tunnel Connectivity
Use ping tests to determine connectivity status of the IPsec VPN tunnel.
1. Wait one minute for the VPN tunnels to be established, and click the Show IPSec Statistics lillie
2. In the IPSec VPN Statistics pop-up panel , verify that the single virtual private network (VPN)
connection that is listed in the top table has a green check mark in the Channel State column.
3. Select the single connection listed in the top table.
4. Verify that a single tunnel is listed in the bottom table with a green check mark in the Tunnel
State column.
5. Close the IPSec VPN Statistics pop-up panel.
The VPN connection between the two VMware NSX Edge" gateway appliances is established
and a tunnel is open .
• 172.16.1 0.11
This address is the IP address of the web-sv-Ol a Web server
• 172.16.20.11
This address is the IP address of the app-sv-Ola application server.
• 172.16.30.11
This address is the IP address of the db-sv-O1a database server.
7. Leave the ping command running, press Ctrl+Alt to release the pointer.
8. Minimize the Firefox window.
9. In the PuTTY window, verify that ICMP echo request packets are being captured leaving the
transit network interface.
The packet addressing is as follows:
• Source: 172.16.40 .12
• Destination: 172.16.20.11
10. Read the synopsis below and answer the questions that follow.
The IPSec VPN tunnels have been established between the perimeter gateway and branch
gateway appliances. The capture on the perimeter gateway shows that the tunnels are
operational, because the traffic is being captured after decapsulation. However, a connectivity
problem exists between the perimeter gateway and the distributed router.
Q2. What is the problem because of which no response to be sent back through the tunnel?
•
perform the following actions.
a. For Interface, leave Transit-Interface selected.
b. Enter 192 . 168 . 10 . 1 in the Gateway IP text box.
This address is the perimeter gateway on the transit network.
c. Leave all other settings at the default value and click Save.
17. Click Publish Changes and wait for the update to complete.
18. Minimize the Firefox window.
19. In the PuTTY window, verify that bidirectional communication is taking place between the
following IP addresses.
• 172.16.40.12
This address is the IP address of the web-sv-02a Web server.
• 172.16.20.11
This address is the IP address of the app-sv-O1a server.
• 172.16.30.11
This address is the IP address of the db-sv-O 1a server.
24. In the PuTTY window, press Ctr1+C to stop the packet capture.
II
a. Select LOCAL from the Authentication Server Type drop-down menu.
b. Deselect the Enable password policy check box.
c. Deselect the Enable account lockout policy check box.
d. Leave all other settings at the default value and click OK.
3. In the SSL VPN-Plus category panel, select Users.
4. In the middle pane, click the green plus sign to open the Add User dialog box, and perform the
following actions.
a. Enter vpn-user in the User ID text box.
b. Enter VMwarel! in the Password text box and the Re-type Password text box.
c. Select the Password never expires check box .
d. Leave all other settings at the default value and click OK.
8. On the user portal page, verify that one tab labeled Tools is shown, with a Change Password
link available.
9. Click the Logout link in the upper-right corner of the page, in the black status bar, and click
OK when prompted to confirm .
10. In the Firefox window, close the portal tab and click the vSphere Web Client tab.
Full Access II
Full Access
Available Network Extension clients.
list
Test Package
The ping command does not receive Internet Control Message Protocol (ICMP) echo replies.
3. Leave the Command Prompt window open.
4. On the ControlCenter desktop, find a new shortcut titled VMware Tray.
The VMware Tray shortcut was added when the SSL VPN-Plus test package was installed from
the portal page .
5. Double-click the VMware Tray shortcut to start the SSL VPN-Plus Client application, and
click Login.
6. When prompted, log in as vpn-user and enter the password VMwarel! .
7. Click OK when prompted to confirm the connection has been established.
8. In the Command Prompt window, run the following command to ping the web-sv-02a server.
ping 172.16 .40.1 2
01. What is the gateway address and port for the network configuration?
Q3. What IP address is assigned to encapsulated packets that traverse the tunnel?
Q4. If you capture packets on the NSX Edge side of the SSL VPN·Plus tunnel, on an
interface connected to the destination subnet, what source IP address do ping
II
packets have?
8. Leave the packet capture running and switch to the Command Prompt window.
9. Run the following command to ping the web-sv-02a server.
ping 172.16 .40 .12
10. Switch to the PuTTY window and verify that an ICMP exchange has occurred between the
following IP addresses.
• 192.168.170.2
This address is the IP address assigned to the SSL VPN-Plus Client application running on
the ControlCenter system.
• 172.16.40.12
This address is the IP address of the web-sv-02a server.
Lab 15 Using NSX Edge Firewall Rules to Control Network Traffic 137
Task 1: Prepare for the Lab
You perform these actions to prepare for the lab if you have closed windows or logged out of the
VMware vSphere® Web Client interface.
1. Ifa Command Prompt window is not open on the ControlCenter desktop, perform the following
actions.
a . On the Control Center desktop, double-click the Command Prompt shortcut.
b. Position the Command Prompt window to a convenient location on the desktop.
2. If the PuTTY window is not open on the ControlCenter desktop, perform the following actions.
a. On the ControlCenter desktop, double-click the PuTTY shortcut.
b. In the PuTTY window, double -click the Edge Services GW saved session.
c. If prompted to confirm a PuTTY security alert, click Yes.
d. Log in as admin and enter the password VMwarel ! VMwarel ! .
3. If the Firefox window has been closed, double -click the Firefox icon on the ControlCenter
desktop.
4. If you are not logged in to the vSphere Web Client, perform the following actions.
a . In the Firefox window, click the vSphere Web Client bookmark.
b. When prompted, log in as root and enter the password VMwarel ! .
5. In the Firefox window, if the web-sv-Ola console tab is not open, perform the following
actions.
a . On the vSphere Web Client Home tab, click Inventories> VMs and Templates.
b. Expand the inventory tree and select Discovered virtual machine> web-sv-Ota.
c. Select Open Console from the Actions drop-down menu.
d. If prompted to log in, log in as root and enter the password VMwarel ! .
e. Press Ctrl+Alt to release the pointer and click the vSphere Web Client tab.
f. Click the vSphere Web Client Home icon.
6. On the vSphere Web Client Home tab, click Inventories> Networking & Security.
138 Lab 15 Using NSX Edge Firewall Rules to Control Network Traffic
Task 2: Enable Flow Monitoring for Future Reference
Flow monitoring is not used in this activity. You enable flow monitoring now so that allowed and
blocked traffic flows can be captured for reference in an upcoming lab.
1. In the left navigation pane , select Flow Monitoring.
2. In the middle pane, click the Configuration tab.
3. On the configuration page , click Enable.
4 User any
Lab 15 Using NSX Edge Firewall Rules to Control Network Traffic 139
14. Point to the Name cell and click the plus sign .
15. Enter Allowed to Web Servers in the Rule Name text box and click OK.
16. Point to the Destination cell, click the plus sign, and perform the following actions in the pop-
up configuration panel.
a. Select IP Sets from the drop-down menu .
b. Click the New IP Set link at the bottom of the pop-up panel to open the Add TP Addresses
dialog box, and configure the following options.
Option Action
Name Enter Local Web Servers in the text box.
140 Lab 15 Using NSX Edge Firewall Rules to Control Network Traffic
Task 4: Determine How the Firewall Rule Interacts with Other NSX
Edge Features
You determine how a firewall rule interacts with an existing destination NAT rule.
1. In the Firefox window, open a new browser tab and go to https ://192 .168.100.9 .
2. Verify that the Web page is displayed, or you are prompted with an untrusted connection
message, and close the browser tab.
3. If not active, click the vSphere Web Client tab and answer the following quest ions.
Q1. Because the virtual server for load balancing HTTP traffic was configured with
the 172.16.10.11 Web server as a member server, will the rule that you just
created allow HTTP connections to the virtual server IP address of
192.168.100.9?
Q2. Because the load balancer uses destination NAT logic to perform member
server selection, will attempts to connect to the destination NAT rule that you
created earlier in the course for the 172.16.10.11 Web server be allowed?
4. In the Firefox window, open a new browser tab and go to https://192 .168.100.7 .
This address is the destination NAT address for the web-sv-O1a Web server.
5. Verify that the Web page cannot be displayed and close the browser tab.
6. Ifnot active , click the vSphere Web Client tab.
7. In the middle pane, under the Manage tab, click Grouping Objects.
8. In the category panel, select IP Sets.
9. In the IP Set list, select the Local Web Servers entry.
10. Click the pencil icon to open the Edit IP Addresses dialog box, and perform the following
actions.
a. In the IP Addresses text box, change the entry to read as follows (without spaces).
172 .16.10.11,192.168.100.7
b. Click OK.
11. In the Firefox window, open a new browser tab and go to https ://I92.168.100.7.
12. Verify that the Web page is displayed, or you are prompted with an untrusted connection
message, and close the browser tab.
13. If not active, click the vSphere Web Client tab.
Lab 15 Using NSX Edge Firewall Rules to Control Network Traffic 141
14. In the middle pane, under the Manage tab, click Firewall.
15. In the rule list, select the Allowed to Web Servers rule,
16. Click the red X icon to delete the rule and click OK when prompted to confirm.
17. Point to the Default Rule Action cell.
18. Click the plus sign .
19. Click Accept and click OK.
20. Click Publish and wait for the update to complete.
142 Lab 15 Using NSX Edge Firewall Rules to Control Network Traffic
Lab 16
Using NSX Distributed Firewall Rules to
Control Network Traffic
Lab 16 Using NSX Distributed Firewall Rules to Control Network Traffic 143
Task 1: Prepare for the Lab
You perform these actions to prepare for the lab if you have closed windows or logged out of the
VMware vSphere® Web Client interface.
1. Ifa Command Prompt window is not open on the ControlCenter desktop, perform the following
actions.
a . On the Control Center desktop, double-click the Command Prompt shortcut.
b. Position the Command Prompt window to a convenient location on the desktop.
2. If the PuTTY window is not open on the ControlCenter desktop, perform the following actions.
a. On the ControlCenter desktop, double-click the PuTTY shortcut.
b. In the PuTTY window, double -click the Edge Services GW saved session.
c. If prompted to confirm a PuTTY security alert, click Yes.
d. Log in as admin using the VMwarel ! VMwarel! password.
3. If the Firefox window has been closed, double -click the Firefox icon on the ControlCenter
desktop.
4. If you are not logged in to the vSphere Web Client, perform the following actions.
a . In the Firefox window, click the vSphere Web Client bookmark.
b. When prompted, log in as root, using the VMwarel! password.
5. In the Firefox window, if the web-sv-Ola console tab is not open, perform the following
actions.
a . On the vSphere Web Client Home tab, click the Inventories> VMs and Templates icon.
b. Expand the inventory tree and select Discovered virtual machine> web-sv-Ota.
c. Select Open Console from the Actions drop-down menu.
d. If prompted to log in, log in as root using the VMwarel! password.
e. Press Ctrl+Alt to release the pointer and click the vSphere Web Client tab.
f. Click the vSphere Web Client Home icon.
6. On the vSphere Web Client Home tab, click the Inventories> Networking & Security icon.
144 Lab 16 Using NSX Distributed Firewall Rules to Control Network Traffic
Task 2: Create a Distributed Firewall Section
You create a section that contains your custom firewall rules.
1. In the left navigation pane, select Firewall.
2. In the middle pane, on the Configuration tab, verify that General is selected.
3. In the section list, find the Default Section Layer3 (Rule 1-3) entry.
4. If necessary, use the horizontal scroll bar to uncover the icons that appear on the far right of the
default section.
5. Click the folder icon.
Service Action
•
c. Click OK.
7. Click Publish Changes and wait for the update to complete.
Lab 16 Using NSX Distributed Firewall Rules to Control Network Traffic 145
5. Point to the Source cell and click the plus sign to open the pop-up configuration panel, and
perform the following actions.
a. Select Logical Switch from the View drop-down menu.
b. Select the Web-Tier check box and click the blue right arrow button to move the switch
into the Selected list.
c. Click OK.
6. Point to the Destination cell and click the plus sign to open the pop-up configuration panel, and
perform the following actions.
a. Select Logical Switch from the View drop-down menu.
b. Select the App-Tier check box and click the blue right arrow button to move the switch
into the Selected list.
7. Click OK.
8. Point to the Services cell and click the plus sign to open the pop-up configuration panel, and
perform the following actions.
a. Click the New... link that appears in the lower-left comer of the pop-up panel.
b. Select Service to open the Add Service dialog box, and configure the following options.
Option Action
Name Enter Tomcat-8443 in the text box.
146 Lab 16 Using NSX Distributed Firewall Rules to Control Network Traffic
12. Enter Allowed App To DB in the Rule Name text box and click OK.
13. Point to the Source cell and click the plus sign to open the pop-up configuration panel, and
perform the following actions.
a. Select Logical Switch from the View drop-down menu.
b. Select the App-Tier check box and click the blue right arrow button to move the switch
into the Selected list.
c. Click OK.
14. Point to the Destination cell and click the plus sign to open the pop-up configuration panel, and
perform the following actions.
a. Select Logical Switch from the View drop-down menu.
b. Select the DB-Tier check box and click the blue right arrow button to move the switch
into the Selected list.
15. Click OK.
16. Point to the Services cell and click the plus sign to open the pop-up configuration panel, and
perform the following actions.
a. Enter SQL in the search text box.
b. In the Available services list, scroll down to find the generic MySQL service .
c. Select the MySQL check box and click the blue right arrow to move the service to the
Selected list.
d. Click OK.
17. Click Publish Changes and wait for the update to complete.
•
Task 4: Restrict Inbound Web Server Traffic to HTTP and HTTPS
You configure a firewall rule that restricts network traffic that is destined for a Web server, to HTTP
and HTTPS .
1. In the Firefox window, open a new browser tab and go to https://172.16.1 0.11 .
Lab 16 Using NSX Distributed Firewall Rules to Control Network Traffic 147
7. Click Block and Log and click OK.
8. Click Publish Changes and wait for the update to complete.
9. In the Firefox window, open a new browser tab and go to https:/!l72.l6.10.l1.
10. Iftbe Web page is displayed, click the Firefox refresh icon to reload the page.
11. Verify that the Web page is not displayed, and close the browser tab.
12. Click the vSphere Web Client tab.
13. Click the green plus sign above tbe rules list to create a rule in Test Section.
If the icon is not active, select any rule in the Test Section rule list.
14. Point to the Name cell and click the plus sign.
15. Enter Allowed to Web Servers in the Rule Name text box and click OK.
16. Point to the Destination cell, click the plus sign to open the pop-up configuration panel, and
perform the following actions.
a. Select Logical Switch from the View drop-down menu.
b. Select the Web-Tier check box and click the blue right-arrow button to move the
Web-Tier entry to the Selected list on the right.
c. Click OK.
17. Point to the Services cell and click the plus sign to open the pop-up configuration panel, and
perform the following actions.
a. Enter HTTP in the search text box.
b. Select the generic HTTP and HTTPS check boxes and click the blue right arrow button
to move those services to the Selected list.
c. Click OK.
18. Point to the Action cell and click the plus sign that appears.
19. Click Log and click OK.
20. Click Publish Changes and wait for the update to complete.
21. In the Firefox window, open a new browser tab and go to https:/!l72.16.l0.11.
22. Click the Firefox refresh icon to reload the page.
23. Verify that the Web page is displayed, or you are prompted with an untrusted connection
message, and close the browser tab.
24. Click the vSphere Web Client tab.
148 Lab 16 Using NSX Distributed Firewall Rules to Control Network Traffic
25. Point to Web-Tier in the Destination cell and click the red X icon that appears to remove Web-
Tier from the Destination cell.
26. Point to the Destination cell and click IP.
I IP
01. Why does the Distributed Firewall rule allow browser connections to the
172.16.10.11 Web server through the destination NAT address 192.168.100.7,
when the rule explicitly defines 172 .16.10.11 as the only valid destination?
Lab 16 Using NSX Distributed Firewall Rules to Control Network Traffic 149
Task 5: Review Distributed Firewall Log Entries
You review log entries that detail connections that have been allowed or blocked by firewall rules.
• 172.16.30.11
This addre ss is the IP address of db -sv-OIa.
4. Press Ctrl+Alt to release the pointer and click the vSphere Web Client tab.
5. Click the vSphere Web Client Home icon.
6. In the left pane , select Log Browser.
7. In the middle pane, select the Select object now... link to open the Select an Object dialog box ,
and perform the following actions.
a. On the Filter tab, verify that Hosts is selected.
b. In the Hosts list, click esxcomp-Ol a.corp.local.
c. Click OK.
8. Select the Retrieve Now link and wait for the logs to be retrieved from the host.
Log retrieval takes several minutes to complete.
9. Verify that VMKernel is selected in the Type drop-down menu at the top of the pane .
10. Enter DROP in the filter text box, located at the top on the right side of the pane.
Log entrie s describing connections that were dropped because of a firewall rule are displayed.
150 Lab 16 Using NSX Distributed Firewall Rules to Control Network Traffic
Task 6: Restore a Saved Distributed Firewall Configuration
You restore the firewall configuration from a saved backup.
1. Click the vSphere Web Client Home icon.
2. On the vSphere Web Client Home page, click the Inventories> Networking & Security icon.
3. In the left navigation pane, select Firewall.
4. In the middle pane, click the Saved Configurations tab.
The configuration list contains several new entries that were autosaved by the system.
5. Click the Configuration tab.
6. Under the General and Ethernet buttons, click the Load saved configuration icon.
l General 1 Ethernet 1
+ [] X - -.II ~ II
7. In the Load Saved Configuration dialog box, scroll down and select the last (oldest) autosaved
configuration, and click OK.
The oldest autosaved configuration was saved when the Test Section was created, prior to new
•
rules being defined.
8. When prompted to confirm , read the message and click Yes.
9. Click Publish Changes and wait for the update to complete.
Lab 16 Using NSX Distributed Firewall Rules to Control Network Traffic 151
152 Lab 16 Using NSX Distributed Firewall Rules to Control Network Traffic
Lab 17
Using Flow Monitoring
II
5. In the Change Time Interval dialog box, select Last 24 hours and click OK.
01. What percent (%) of the traffic flows have been allowed?
02. What percent (%) of the traffic flows have been blocked by a firewall rule?
13. In the flow list, find the top flow based on the number of packets transferred.
05. Are the destinations the same for the two flows examined?
14. Under the Manage tab, click Top Sources and review the top flow report.
II
6. On the vSphere Web Client Home tab, click the Inventories> Networking & Security icon.
12. On the vSphere Web Client Home tab, examine the feature icons available in the Inventories
panel.
Q2. You added dory as an NSX administrator. Why are you unable to manage NSX as dory?
14. Click the down arrow control next to the logged in user name and select Logout.
~I~I Halp v I
II
l
emove S ored Data...
I Reset To Factory Defaults
Logout
24. On the vSphere Web Client Home tab, examine the feature icons available in the Inventories
panel.
2. After the update completes, find the error or warning dialog box that is displayed and read the
provided message.
The message indicates that dory no longer has rights to administer the current NSX feature .
3. Close the warning dialog box.
4. At the top of the left navigation pane , click the NSX Managers left arrow.
5. At the top of the left navigation pane , click the Networking & Security left arrow.
6. In the left navigation pane, select NSX Edges.
Q1. As dory, can you administer any N5X Edge other than perimeter gateway?
Lab 16: Using NSX Distributed Firewall Rules to Control Network Traffic
Task 4: Restrict Inbound Web Server Traffic to HTIP and HTTPS 147
1. Distributed Firewall rules work on true source
and destination addresses and objects. Such
rules are not affected by transforms (such as
destination NAT translations) performed by
NSX Edge devices.
.Managemen
. . . . .. . . . .t . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
.1
•......... ~ ~ ~ .... .....•..~ .
: ~ ~ ~ ~ Branch
We b-sv-Ola We b-sv-02a App-sv-Ola DB-sv-01a
Gateway
Perimeter
I .
(.11) (.12) (.11) (.11)
. .... .. . .. .... .. . . . ~?~~.~.y. . 'c~~ p~ t ~ 'A......• ... . . . ... ... . . . . .... •..... . .... . . .. . .... . .. ... ...... ... .... c~";" p~t~' Ii' '.4
.3
Management A
~ vmware'
Physical Topology and Components
Management A
Transit
Web Tier Tier DB Tier
.1Y1.a.n.a.g~!,!~ ~~ _ .
.1
Branch
Web-sv-01a Web -sv-02a App-sv-Ola DB-sv-Ola
Gateway
Perimeter (.11) (.12) (.11) (.11)
. .. ... ... ....... .. G~~~.~.y.
.3
. 'c~ ";' P~ t~'A .
:C~';"P~t~'B " " " " " " " :4'r- "" .
HQ Upli nk: 192.168 .100.0;24 HQAccess: 192.168.130.0/24
AQ Tier DB Tier
.. 1Yl.a.n.a~[l1~~t. . . . . . . . . . . . . . . . . . .. . . • • . • . . . . . . . . . . . ~ ~ .
Controller .1
Cluster
Branch
Web-sv-01a Web-sv-02a App-sv-01a DB-sv-01a
Gateway
Perimeter (.11) (.12) (.11) (.11)
. . . . . . . . . . .. . . . . .. ~?~\'.~.y.
.3
. 'C';~p~ tE:A"" " " " "" " " " " """ " " "" "
.--------------------------
"
~,__o
" " " " " " " " " ' " ... .. ;c~';"p~t;; B" " " """ " -l.
HQ Upli nk: 192.168.100.0;24 HQAccess: 192.168 .130.0/24
;'
//
,r
"
Management A: 192.168.110.0/24
,.ryt.an.a~rr!~ ~ ~ . , , . . ~ ~ .
Controller .1
Cluster
Branch
Web-sv-01a Web-sv-02a App-sv-01a DB-sv-01a
Gateway
Perimeter (.11) (.12) (.11) (.11)
.. .. . . . . . . .. . . . . .. ~?~~.~.y. . 'C';~ p~tE:A"" " " " "" " " " " """ " " "" " " " " " " " " " " " ' " ... . .
.3
~
!LGW: 192.168.110.2 (vPodRouter) ~
!
(.10) I
I
I
I
I
~
I
J
,
\ ./
: Route : I
i
I
I
~
(Perimeter Gatewa y on HQ Uplink) i
JI
I
I
I
I
Management A: 192.168.110.0/24
Physical:
• Management A: 192.168.110.0/24
• vMotion A: 10.10.30.0/24
• Transport A: 192.168.150.0/24
• Management B: 192.168.210.0/24
• vMotion B: 10.20.30.0/24
• Transport B: 192.168.250.0/24
• HQ Uplink: 192.168.100.0/24
• HQ Access: 192.168.130.0/24
Virtual
• Web Tier: 172.16.10.0/24
• App Tier: 172.16.20.0/24
• DB Tier: 172.16.30.0/24
• Transit: 192.168.10.0/29
Edges
• Perimeter Gateway
• 192.168.100.3 on HQ Uplink (primary address)
• 192.168.100.7 on HQ Uplink (1:1 NAT forweb-sv-01a)
• 192.168.100.8 on HQ Uplink (1:1 NAT forweb-sv-02a)
• 192.168.100.9 on HQ Uplink (Load balancer)
• 192.168.100.10 on HQ Uplink (L2 and IPsec VPN)
• 192.168.10.1 on Transit
Branch Gateway
• 192.168.130.4 on HQ Access (primary address)
Distributed Router
• 192.168.10.2 on Transit
• 172.16.10.1 on Web Tier
• 172.16.20.1 on App Tier
• 172.16.30.1 on DB Tier
Virtual Machines
• Web-sv-01 a: 172.16.10.11 on Web Tier
• Web-sv-02a: 172.16.10.12 on Web Tier
• App-sv-01 a: 172.16.20.11 on App Tier
• DB-sv-01 a: 172.16.30.11 on DB Tier
,. "
~;
tfI'!' ....... ,
,
, c)o-,.----- - - - - ---:---:-- - - - - -----,
I
, \
I
, HQ Upli nk: 192.168.100.0/24 HQAccess: 192.168.130.0/24
I I
I I Management A
I
I
I
I
Contro ICente r i NSX Manager : vCenter Server
(.10) \ (.42) " (.22)
,--------"",
. ,.~ .'7 .'7 .'7 .'7 .'7 .'7 .'7 .'7.'7.'7 .'7.'7 .~ ~ ryT.~ ~a.i'[€.fl] ~~! .
Controller IP Pool:
: Controller ~
l Cluster :
I
lI
I
J.... : I
I
I
192.168.110.201-192.168.110.210 on Management A
,
\ • __
•• _ __ _ ''
1fIII! • •• • •• • .• • • . • • • • • • • • • • •• •• • . • •
Management A
Compute A
..~~~~~e.n:;~ ~ .
~
Global Transport Zone ,/ -, VXLAN ID Pool: 5000-5999
I
,~-----------------------------~ ,--------------------------- " \
I \
I I
. .. ". Ma
"
nagement
". " . .Compute A Com pute B
.
·· ..
·.
·.
·.
,
,-------------------------------------,
172.16.30.0 24 '
172.16.20.0 24
Web Tier
,-------------------------------------~
HQ Uplink: 192.168.100.0/24
Management A
192.168.110.0;24
,--------------------------------------~,
I Distributed Router \
.1 172.16.30.0 24
.1 172.16.20.0 24
I : : :
I : . .
: ~ Web-sv-01a Web-sv-02a App-sv-01a DB-sv-01a
I : (.11) (.12) (.11) (.11)
I : .
. . .. . .. . . . . .. . . . . .. . .. .. . . .. . . . . .. . . .. . . . .. . . . . . .. .\ : :ca"~ p~ t~ '1i ' ,. c~';"pu't~' Ii' .
,---------------------------------------~
HQ Uplink: 192.168.100.0/24 HQAccess: 192.168.130.0/24
Management A
192.168.110.0/24
Distributed Router
I ,---------------------------, , .=.
l t----'. 172.16.30.0 24
----=.'-====~=____,
.1 172 .16.20.0 24
. • . • . . . . . . . . . • . . . . • . . • • • • • . . . . .ry1.a.,,!a.~.11) ~~!. .
Cor.troller
(,:JustE'r
.1
Perimeter
We b-sv-01a We b-sv-02a App-sv-01a DB-sv-01a
Gateway
(.11) (.12) (.11) (.11)
" :3 ...... :ca'~'p~t~ 'f" .•... .. •.... . .. ..• ... .•.... ... ... . .. . .... ....... ...... .. . .•..... ..
compu te B
~-------------------- -----~
HQ Uplink: 192.168.100.0/24 HQAccess: 192.168.130.0/24
Management A
192.168.110.0;24
DB Tier
Perimeter
Gateway Web-sv-Ola Web-sv-02a App-sv-Ola DB-sv-Ola
(.11) (.12) (.11) (.11)
.... .. . .. ...... .. .. . . . . ... ... ..... ... ... .. .. . . . . . . . .j
Com put e A
HQUplink: 192.168.100.0/24
Management A
192.168.110.0/24
,
,;------------------------,
Control "
:
II
I
I
I
1 .3 VM (protocol address)
Distributed Router I
.........,..:=,
I
I
II
1_ _--i1i-- ---=.
17:...:2:::..=.,:
16::..:;.3::,:0::.:..0=-=2",-
4---,
192.168.10.0 29 I :::J...--'•.::.
l _--;:; - ""'-'--'''-'-='''-'-'='~'-'=='-
172.16.20.0 24----,
Transit
Tier DB Tier
I
... . ................ ...... ............. . iy1.a.':a.~.n:> !'!'L .
con taller :
CI~ster
I Control .1
VM
Perimeter
I Web-sv-Ola Web-sv-02a App-sv-Ola DB-sv-Ola
I Gateway ........~....
I . (.11) (.12) (.11) (.11)
............\ ;'
,~------------~ -,~
com put e A Com put e B
(J
~.
~
o
~
t--- - - - - -- - - - - - - - - --='--- - - ----q
Management A
192.168.110.0/24
Distributed Router
.1 172.16.30.0 24
.1 172 .16.20.0 24
DB Tier
Perimeter
App-sv-01a DB-sv-01a
Gateway
Com pute B
.3
HQAccess: 192.168.130.0/24
Management A
192.168.110.0/24
Distributed Router
.1 172.16.30.0 24
.1 172.16.20.0 24
Perimeter
Gateway
Compute B
.3
HQ Uplink : )~2. 1.68.100.0/24 HQAccess: 192.168.130.0/24
(1:1 NAT to web-sv-Ola .7) ," ", / "
(1:1 NAT for web-sv-02a .8) / " ""
,----------------- -------, /
I '
I (LB Virtual Server .9) ./
,---------------------------
Management A
192.168.110.0/24
Distributed Router
.1 172.16.30.0 24
.1 172.16.20.0 24
~
• • • . • • . • • • • • • . . . . • . . • . • • • . • • . • • • • • • • •. • •ry1.a.,!aJle.r1) ~ ~!
Controller
1 ~ •.. . . .. ~ ~ ~
; ;. •. . . . . . . . . . .
Cluster
Perimeter
(----:-, : ,--~------~--, ~
.1 : "-~,' Web-sv-Ola Web-sv-02a 1 App-sv-01a
~
DB-sv-01a
Gateway
: i-' ~" (.11) (.12) : (.11) (.11)
: ,----------------- ,1
. c~ ;,; p~t~ i>: . Com pute B
.3
HQ Uplink: 192.168.100.0/24 HQAccess: 192.168.130.0/24
(1:1 NAT to web-sv-Ola .7)
Management A
192.168.110.0/24
Distributed Router
.1 172.16.30.0 24
.1 172.16.20.0 24
·• I
~;;~
,--~----- ~ ~ ----, ,
Distributed Router
_=-=
. 1'-----------------="--'='==~~___,
172.16.30.0 24
.1 172.16.20.0 24
Management A
192.168.110.0;24
Branch
Web Tier
eI <.---------
Web-sv-Ola Web-sv-01a App-sv-Ola DB-sv-01a
(.12) (.11) (.11) (.11)
Compute B
'C; ~, p~ t ~ 'A .
Branch ......
A Tier DBTier Web Tier .. :~~ _
I I
I 172.16.10.0 24 I:
______________
Branch
Gateway
Perimeter
Branch Gateway Distri but ed Router
.1 172.16.30.0 24
Web Tier
• 172.16.40 .0/24 .1 172.16.20.0 24
~" " " "" " T" " " " " " " " " "" " ' : " "" T "" ' " ~ ..
: We b-sv-02a
: (.12) . C1 C1
Compute B
~ ~ ~ .
Web-sv-01a App-sv-Ola DB-sv-Ola
(.11) (.11) (.11)
Com put e A
Distributed Router
.1 172.16.30.0 24
J .1 172.16.20.0 24
Branch
Transit
Web Tier Tier DB Tier Web Tier
172.16.40 .0 24
Branch
Gateway
Branch
Web Tier
• 172 .16.40 .0/24 • Branch
Gateway
: We b-sv-02a
~ (.12)
.
c~';"·PC:t~· Ii· .
Branch
Web Tier Web Tier
Branch
Gateway
,,---------
:ca"~ p~ t ~
.3
HQ Uplink: 192.168.100.0/24 HQAccess: 192.168.130.0/24
(1:1 NAT to web-sv-01a .7)
Management A
192.168.110.0/24
VPOD
Branch
Transit
Web Tier DBTier Web Tier
172.16.40.0 24
.. . ,--------- ------,
c~t~~;!;;;::~,o;""' . i ·· · · · ·· · · , ()
'~ ~~ ~
Branch
Gateway
. . . 0_'_
•
I
I
I
I
.
:
:
:
0
Web-sv-01a
0
,-------- -------,
r - -----"L--------"''--------O
HQ Uplink: 192.168.100.0/24 HQAccess: 192.168.130.0/24
(1:1 NAT to web-sv-01a .7)
Management A
192.168.110.0/24
Branch
Transit
DB Tier Web Tier
172.16.40.0 24
Management A
192.168.110.0/24
Branch
Transit
DB Tier Web Tier
172.16.40.0 24
Management A
192.168.110.0/24