NSX 60 Install
NSX 60 Install
EN-001268-00
NSX Installation and Upgrade Guide
You can find the most up-to-date technical documentation on the VMware Web site at:
http://www.vmware.com/support/
The VMware Web site also provides the latest product updates.
If you have comments about this documentation, submit your feedback to:
docfeedback@vmware.com
Copyright © 2010 – 2013 VMware, Inc. All rights reserved. Copyright and trademark information.
VMware, Inc.
3401 Hillview Ave.
Palo Alto, CA 94304
www.vmware.com
2 VMware, Inc.
Contents
1 Overview of NSX 7
NSX Capabilities 8
NSX Components 9
6 Upgrading NSX 43
Upgrade vShield 5.5 to NSX 6.0.x 43
Upgrade NSX 6.0 to NSX 6.0.x 48
VMware, Inc. 3
NSX Installation and Upgrade Guide
Index 55
4 VMware, Inc.
About this Book
This manual, the NSX Installation and Upgrade Guide, describes how to install and upgrade the
®
VMware NSX™ system by using the vSphere Web Client. The information includes step-by-step
configuration instructions, and suggested best practices.
Intended Audience
This manual is intended for anyone who wants to install or use NSX in a VMware vCenter environment.
The information in this manual is written for experienced system administrators who are familiar with
virtual machine technology and virtual datacenter operations. This manual assumes familiarity with
VMware Infrastructure 5.x, including VMware ESX, vCenter Server, and the vSphere Web Client.
Document Feedback
VMware welcomes your suggestions for improving our documentation. If you have comments, send your
feedback to docfeedback@vmware.com.
Online and Telephone To use online support to submit technical support requests, view your
Support product and contract information, and register your products, go to
http://www.vmware.com/support.
Support Offerings To find out how VMware support offerings can help meet your business
needs, go to http://www.vmware.com/support/services.
VMware Professional VMware Education Services courses offer extensive hands-on labs, case
Services study examples, and course materials designed to be used as on-the-job
reference tools. Courses are available onsite, in the classroom, and live
online. For onsite pilot programs and implementation best practices,
VMware, Inc. 5
NSX Installation and Upgrade Guide
6 VMware, Inc.
Overview of NSX 1
®
VMware NSX is a software networking and security virtualization platform that delivers the operational
model of a virtual machine for the network. Virtual networks reproduce the Layer2 - Layer7 network model
in software, allowing complex multi-tier network topologies to be created and provisioned
programmatically in seconds. NSX also provides a new model for network security. Security profiles are
distributed to and enforced by virtual ports and move with virtual machines.
NSX supports VMware's software-defined data center strategy. By extending the virtualization capabilities
of abstraction, pooling and automation across all data center resources and services, the software-defined
data center architecture simplifies and speeds the provisioning and management of compute, storage and
networking resources through policy-driven automation. By virtualizing the network, NSX delivers a new
operational model for networking that breaks through current physical network barriers and enables data
center operators to achieve better speed and agility with reduced costs.
NSX includes a library of logical networking services - logical switches, logical routers, logical firewalls,
logical load balancers, logical VPN, and distributed security. You can create custom combinations of these
services in isolated software-based virtual networks that support existing applications without modification,
or deliver unique requirements for new application workloads. Virtual networks are programmatically
provisioned and managed independent of networking hardware. This decoupling from hardware
introduces agility, speed, and operational efficiency that can transform datacenter operations.
n Self-Service Enterprise IT
n Rapid application deployment with automated network and service provisioning for private
clouds and test/dev environments
n Isolated dev, test, and production environments on the same physical infrastructure
n Multi-tenant clouds
n Automate network provisioning for tenants with customization and complete isolation
NSX can be configured through the vSphere Web Client, a command line interface (CLI), and REST API.
VMware, Inc. 7
NSX Installation and Upgrade Guide
NSX Capabilities
NSX offers a variety of logical networking services.
Logical Switches
A cloud deployment or a virtual data center has a variety of applications across multiple tenants. These
applications and tenants require isolation from each other for security, fault isolation, and avoiding
overlapping IP addressing issues. The NSX logical switch creates logical broadcast domains or segments to
which an application or tenant virtual machine can be logically wired. This allows for flexibility and speed
of deployment while still providing all the characteristics of a physical network's broadcast domains
(VLANs) without physical Layer 2 sprawl or spanning tree issues.
A logical switch is distributed and can span arbitrarily large compute clusters. This allows for virtual
machine mobility (vMotion) within the datacenter without limitations of the physical Layer 2 (VLAN)
boundary. The physical infrastructure does not have to deal with MAC/FIB table limits since the logical
switch contains the broadcast domain in software.
Logical Routers
Dynamic routing provides the necessary forwarding information between layer 2 broadcast domains,
thereby allowing you to decrease layer 2 broadcast domains and improve network efficiency and scale. NSX
extends this intelligence to where the workloads reside for doing East-West routing. This allows more direct
virtual machine to virtual machine communication without the costly or timely need to extend hops. At the
same time, NSX also provides North-South connectivity, thereby enabling tenants to access public networks.
Logical Firewall
Logical Firewall provides security mechanisms for dynamic virtual data centers. The Distributed Firewall
component of Logical Firewall allows you to segment virtual datacenter entities like virtual machines based
on VM names and attributes, user identity, vCenter objects like datacenters, and hosts as well as traditional
networking attributes like IP addresses, VLANs, etc. The Edge Firewall component helps you achieve key
perimeter security needs such as building DMZs based on IP/VLAN constructs, tenant to tenant isolation in
multi-tenant virtual data centers, Network Address Translation (NAT), partner (extranet) VPNs, and User
based SSL VPNs.
The Flow Monitoring feature displays network activity between virtual machines at the application protocol
level. You can use this information to audit network traffic, define and refine firewall policies, and identify
threats to your network.
8 VMware, Inc.
Chapter 1 Overview of NSX
Service Composer
Service Composer helps you provision and assign network and security services to applications in a virtual
infrastructure. You map these services to a security group, and the services are applied to the virtual
machines in the security group.
Data Security provides visibility into sensitive data stored within your organization's virtualized and cloud
environments. Based on the violations reported by NSX Data Security, you can ensure that sensitive data is
adequately protected and assess compliance with regulations around the world.
NSX Extensibility
VMware partners can integrate their solutions with the NSX platform, which enables customers to have an
integrated experience across VMware products and partner solutions. Data center operators can provision
complex, multi-tier virtual networks in seconds, independent of the underlying network topology or
components.
NSX Components
This section describes NSX components. NSX can be configured through the vSphere Web Client, a
command line interface (CLI), and REST API.
can be
1 Controller configuration
(Logical Switches and
Logical Routers)
1 3
vCenter
2 Logical Router
NSX vSwitch
vDS
VXLAN Distributed Firewall
ESXi Logical Router
VMware, Inc. 9
NSX Installation and Upgrade Guide
NSX Manager
The NSX Manager is the centralized network management component of NSX, and is installed as a virtual
appliance on any ESX™ host in your vCenter Server environment. It provides an aggregated system view.
One NSX Manager maps to a single vCenter Server environment and multiple NSX Edge, vShield Endpoint,
and NSX Data Security instances.
NSX vSwitch
NSX vSwitch is the software that operates in server hypervisors to form a software abstraction layer
between servers and the physical network.
As the demands on datacenters continue to grow and accelerate, requirements related to speed and access to
the data itself continue to grow as well. In most infrastructures, virtual machine access and mobility usually
depend on physical networking infrastructure and the physical networking environments they reside in.
This can force virtual workloads into less than ideal environments due to potential layer 2 or layer 3
boundaries, such as being tied to specific VLANs.
NSX vSwitch allows you to place these virtual workloads on any available infrastructure in the datacenter
regardless of the underlying physical network infrastructure. This not only allows increased flexibility and
mobility, but increased availability and resilience.
NSX Controller
NSX controller is an advanced distributed state management system that controls virtual networks and
overlay transport tunnels.
NSX controller is the central control point for all logical switches within a network and maintains
information of all virtual machines, hosts, logical switches, and VXLANs. The controller supports two new
logical switch control plane modes, Unicast and Hybrid. These modes decouple NSX from the physical
network. VXLANs no longer require the physical network to support multicast in order to handle the
Broadcast, Unknown unicast, and Multicast (BUM) traffic within a logical switch. The unicast mode
replicates all the BUM traffic locally on the host and requires no physical network configuration. In the
hybrid mode, some of the BUM traffic replication is offloaded to the first hop physical switch to achieve
better performance.
NSX Edge
NSX Edge provides network edge security and gateway services to isolate a virtualized network. You can
install an NSX Edge either as a logical (distributed) router or as a services gateway.
The NSX Edge logical (distributed) router provides East-West distributed routing with tenant IP address
space and data path isolation. Virtual machines or workloads that reside on the same host on different
subnets can communicate with one another without having to traverse a traditional routing interface.
The NSX Edge gateway connects isolated, stub networks to shared (uplink) networks by providing common
gateway services such as DHCP, VPN, NAT, dynamic routing, and Load Balancing. Common deployments
of NSX Edge include in the DMZ, VPN Extranets, and multi-tenant Cloud environments where the NSX
Edge creates virtual boundaries for each tenant.
10 VMware, Inc.
Chapter 1 Overview of NSX
Firewall Supported rules include IP 5-tuple configuration with IP and port ranges for
stateful inspection for all protocols.
Network Address Separate controls for Source and Destination IP addresses, as well as port
Translation translation.
Dynamic Host Configuration of IP pools, gateways, DNS servers, and search domains.
Configuration Protocol
(DHCP)
Site-to-Site Virtual Uses standardized IPsec protocol settings to interoperate with all major VPN
Private Network (VPN) vendors.
SSL VPN-Plus SSL VPN-Plus enables remote users to connect securely to private networks
behind a NSX Edge gateway.
Load Balancing Simple and dynamically configurable virtual IP addresses and server groups.
High Availability High availability ensures an active NSX Edge on the network in case the
primary NSX Edge virtual machine is unavailable.
NSX Edge supports syslog export for all services to remote servers.
Accounting
network
Engineering
network
VPN
Interface 1 Marketing
DNS
network
Interface 2
Interface 5
Interface 3
Internet
Interface 4
DHCP
High
availability NSX Edge
Interface 6
Load
Balancing
MPLS VPN
NSX Edge
VMware, Inc. 11
NSX Installation and Upgrade Guide
Distributed Firewall
NSX Distributed Firewall is a hypervisor kernel-embedded firewall that provides visibility and control for
virtualized workloads and networks. You can create access control policies based on VMware vCenter
objects like datacenters and clusters, virtual machine names and tags, network constructs such as
IP/VLAN/VXLAN addresses, as well as user group identity from Active Directory. Consistent access control
policy is now enforced when a virtual machine gets vMotioned across physical hosts without the need to
rewrite firewall rules. Since Distributed Firewall is hypervisor-embedded, it delivers close to line rate
throughput to enable higher workload consolidation on physical servers. The distributed nature of the
firewall provides a scale-out architecture that automatically extends firewall capacity when additional hosts
are added to a datacenter.
12 VMware, Inc.
Preparing for Installation 2
This section describes the system requirements for NSX as well as the ports that must be open.
Hardware
Table 2‑1. Hardware Requirements
Component Minimum
Software
For the latest interoperability information, see the Product Interoperability Matrix at
http://partnerweb.vmware.com/comp_guide/sim/interop_matrix.php.
VMware, Inc. 13
NSX Installation and Upgrade Guide
n VMware Tools
For vShield Endpoint and NSX Data Security, you must upgrade your virtual machines to hardware
version 7 or 8 and install VMware Tools 8.6.0 released with ESXi 5.0 Patch 3. For more information, see
“Install VMware Tools on the Guest Virtual Machines,” on page 36.
n If you added ESX hosts by name to the vSphere inventory, ensure that DNS servers have been
configured on the NSX Manager and name resolution is working. Otherwise, NSX Manager cannot
resolve the IP addresses.
n Access to the datastore where you store virtual machine files, and the account permissions to copy files
to that datastore
n Enable cookies on your Web browser to access the NSX Manager user interface
n From NSX Manager, port 443 accessible from the ESX host, the vCenter Server, and the NSX appliances
to be deployed. This port is required to download the OVF file on the ESX host for deployment.
n Connect to the NSX Manager using one of the following supported Web browsers:
n Mozilla Firefox: the latest browser version, and the one previous version at the time the NSX 6.0 is
produced.
n Google Chrome: the latest browser version, and the one previous version at the time the NSX 6.0 is
produced.
n NSX Manager port 443 from the ESX host, the vCenter Server, and the NSX appliances to be deployed
n 902/TCP and 903/TCP to and from the vCenter Web Client and ESX hosts
n 443/TCP from the REST client to NSX Manager for using REST API calls
n 80/TCP to 443/TCP for using the NSX Manager user interface and initiating connection to the vSphere
SDK
14 VMware, Inc.
Installing the NSX Manager 3
The NSX Manager is the centralized management component of NSX, and runs as a virtual appliance on an
ESX host.
VMware recommends that you install NSX Manager on a dedicated management cluster separate from the
cluster(s) that NSX Manager manages. Each NSX Manager manages a single vCenter Server environment.
The NSX Manager requires connectivity to the vCenter Server, ESXi host, and NSX Edge instances, vShield
Endpoint module, and NSX Data Security virtual machine. NSX components can communicate over routed
connections as well as different LANs.
The NSX Manager should be run on an ESX host that is not affected by downtime, such as frequent reboots
or maintenance mode operations. You can use HA or DRS to increase the resilience of the NSX Manager. If
the ESX host on which the NSX Manager resides is expected to require downtime, vMotion the NSX
Manager virtual appliance to another ESX host. Thus, more than one ESX host is recommended.
n 443/TCP from the REST client to NSX Manager for using REST API calls
n 80/TCP and 443/TCP for using the NSX Manager user interface and initiating connection to the vSphere
SDK
You can install the NSX Manager in a different vCenter than the one that the NSX Manager will be
interoperating with. A single NSX Manager serves a single vCenter Server environment.
VMware, Inc. 15
NSX Installation and Upgrade Guide
The NSX Manager virtual machine installation includes VMware Tools. Do not attempt to upgrade or install
VMware Tools on the NSX Manager.
Prerequisites
You must have been assigned the Enterprise Administrator or NSX Administrator role.
Procedure
1 Log in to the vSphere Web Client.
The NSX Manager management interface, vCenter Server, and ESXi hosts must be reachable by all
future NSX Edge and vShield Endpoint instances.
3 Right-click the host where you want to install NSX Manager and select Deploy OVF Template.
It may take a few seconds for the Deploy OVF Template option to be displayed.
4 If this is the first time that you are deploying an OVF file, follow these steps.
e Repeat Step 3.
5 Enter the URL to download and install the OVF file from the internet or click Browse to locate the
folder on your computer that contains the NSX Manager OVA file and click Next.
7 Click Accept to accept the VMware license agreements and click Next.
8 Edit the name (if required) and select the location for the NSX Manager that you are installing.
9 Click Next.
11 On the Select storage page, select the storage for the NSX Manager and click Next.
12 On the Setup networks page, confirm that the NSX Manager adapter has been mapped to the correct
host network and click Next.
13 Specify whether you want to configure IPv4 only, IPv6 only, or dual-stack network configuration.
If you are configuring a dual-stack network, the host name of the NSX Manager will be used by other
entities. Hence, the NSX Manager host name must be mapped to the right IP address in the DNS servers
used in that network.
d Click Network Properties and type the hostname for the NSX Manager virtual machine.
16 VMware, Inc.
Chapter 3 Installing the NSX Manager
g Click DNS and type the IP addresses for DNS servers and domain search list.
h Click Services Configuration and type the NTP server lis for the NSX Manager virtual machine.
j Click Next.
15 On the Ready to complete page, review the NSX Manager settings and click Finish.
Procedure
1 Open a Web browser window and type the IP address assigned to the NSX Manager. For example,
https://11.111.11.11.
The NSX Manager user interface opens in a web browser window using SSL.
NOTE You can use an SSL certificate for authentication. Refer to the NSX Administration Guide.
3 Log in to the NSX Manager virtual appliance by using the user name admin and the password you set
during installation. If you had not set a password during installation, type default as the password.
Prerequisites
n You must have a vCenter Server user account with administrative access to synchronize NSX Manager
with the vCenter Server . If your vCenter password has non-Ascii characters, you must change it before
synchronizing the NSX Manager with the vCenter Server.
n To use SSO on NSX Manager, you must have vCenter Server 5.5 or later and single sign on service must
be installed on the vCenter Server.
Procedure
1 Log in to the NSX Manager virtual appliance.
3 From the left panel, select NSX Management Service and click Configure next to vCenter Server.
4 Type the IP address of the vCenter Server, and the vCenter Server user name and password.
5 Type the IP address and port number of the NSX Management service.
6 Click OK.
VMware, Inc. 17
NSX Installation and Upgrade Guide
What to do next
Login to the vSphere Web Client and click the Networking & Security tab. You can now install and
configure NSX components.
Procedure
1 Log in to the NSX Manager Virtual Appliance.
3 To specify the backup location, click Change next to FTP Server Settings.
b From the Transfer Protocol drop-down menu, select either SFTP or FTP, based on what the
destination supports.
d Type the user name and password required to login to the backup system.
e In the Backup Directory field, type the absolute path where backups will be stored.
This text is prepended to each backup filename for easy recognition on the backup system. For
example, if you type ppdb, the resulting backup is named as ppdbHH_MM_SS_DayDDMonYYYY.
h Click OK.
a From the Backup Frequency drop-down menu, select Hourly, Daily, or Weekly. The Day of Week,
Hour of Day, and Minute drop-down menus are disabled based on the selected frequency. For
example, if you select Daily, the Day of Week drop-down menu is disabled as this field is not
applicable to a daily frequency.
b For a weekly backup, select the day of the week and hour that the data should be backed up.
c Select the minute at which the backup should begin and click Schedule.
18 VMware, Inc.
Installing NSX Components 4
After the NSX Manager is installed, you can obtain licenses to activate the NSX Endpoint, NSX Edge, and
NSX Data Security components. The NSX Manager OVA package includes the drivers and files required to
install these add-on components.
NSX virtual appliances include VMware Tools. Do not attempt to alter or upgrade the VMware Tools
software on an NSX virtual appliance.
Before purchasing and activating an NSX for vSphere license, you can install and run the software in
evaluation mode. When run in evaluation mode, intended for demonstration and evaluation purposes, NSX
components are completely operational immediately after installation, do not require any licensing
configuration, and provide full functionality for 60 days from the time you first activate them.
Procedure
1 Log in to the vSphere Web Client.
4 From the drop-down menu at the top, select Assign a new license key.
5 Type the license key and an optional label for the new key.
6 Click Decode.
Decode the license key to verify that it is in the correct format, and that it has enough capacity to license
the assets.
VMware, Inc. 19
NSX Installation and Upgrade Guide
7 Click OK.
What to do next
Obtain and install an NSX for vSphere license within the evaluation period.
Network virtualization allows you to place these virtual workloads on any available infrastructure in the
datacenter regardless of the underlying physical network infrastructure. This not only allows increased
flexibility and mobility, but increased availability and resilience.
You install the network infrastructure components in your virtual environment on a per-cluster level for
each vCenter server, which deploys the required software on all hosts in the cluster. This software is also
referred to as an NSX vSwitch. When a new host is added to this cluster, the required software is
automatically installed on the newly added host. After the network infrastructure is installed on a cluster,
Logical Firewall is enabled on that cluster.
Procedure
1 Log in to the vSphere Web Client.
NOTE While the installation is in progress, do not deploy, upgrade, or uninstall any service or
component.
5 Monitor the installation till the Installation Status column displays a green check mark.
6 If the Installation Status column displays a red warning icon and says Not Ready, click Resolve. If the
installation is still not successful, click the warning icon. All errors are displayed. Take the required
action and click Resolve again.
When the installation is complete, the Installation Status column displays 6.0 and the Firewall column
displays Enabled. Both columns have a green check mark as well. If you see Resolve in the Installation
Status column, click Resolve and then refresh your browser window.
Prerequisites
n You must have the Super Administrator or Enterprise Administrator role permissions to configure and
manage logical switches.
n Install network virtualization components on the clusters that are to be part of the logical switch. See
“Install Network Virtualization Components,” on page 20.
20 VMware, Inc.
Chapter 4 Installing NSX Components
n Physical infrastructure MTU must be at least 50 bytes more than the MTU of the virtual machine vNIC.
n Set Managed IP address for each vCenter server in the vCenter Server Runtime Settings. For more
information, see vCenter Server and Host Management.
n If using DHCP for IP assignment for VMKNics, verify that DHCP is available on VXLAN transport
VLANs.
If using an IP pool for static IP assignment, selecting a gateway other than the default gateway of the
ESX management network leverages a dedicated TCP stack (applies to VMware ESXi™ 5.5 or later).
n For Link Aggregation Control Protocol (LACP), it is recommended hat you enable 5- tuple hash
distribution.
n You must use a consistent distributed virtual switch type (vendor etc.) and version across a given
network scope. Inconsistent switch types can lead to undefined behavior in your logical switch.
The control plane that manages logical networks and overlay transport can be set as one of the
following:
n Multicast: Multicast IP addresses on physical network is used for the control plane. This mode is
recommended only when you are upgrading from older VXLAN deployments. Requires
PIM/IGMP on physical network.
n Unicast : The control plane is handled by an NSX controller. All traffic replication is handled
locally by the hypervisor. No multicast IP addresses or special network configuration is required.
n Hybrid : The optimized unicast mode. Offloads local traffic replication to physical network. This
requires IGMP snooping on the first-hop switch, but does not require PIM. First-hop switch
handles traffic replication for the subnet.
Procedure
1 Log in to the vSphere Web Client.
4
In the NSX Controller nodes section, click the Add Node ( ) icon.
5 In the Add Controller dialog box, select the datacenter on which you are adding the node.
8 Select the logical switch, portgroup, or distributed portgroup to which the node is to be connected to.
9 Select the IP pool from which IP addresses are to be assigned to the node.
NOTE The IP address of the controller must be reachable from the NSX Manager and the management
network of the vSphere hosts communicating with the controller.
VMware, Inc. 21
NSX Installation and Upgrade Guide
10 Click OK.
The NSX controller can now control the traffic flow through your logical network.
If you need to delete a controller, stop using the logical router or logical switch based on this controller
before deleting it.
Procedure
1 Log in to the vSphere Web Client.
3 Click the Logical Network Preparation tab and then click Segment ID.
4
Click the Edit ( ) icon
The segment ID range determines the maximum number of logical switches that can be created in your
infrastructure.
6 If you do not have a deployed NSX controller in your environment, select Enable multicast addressing
and type an address range. For example, 239.1.1.10-239.1.1.20.
NOTE You must specify a multicast address range for VMware ESX 5.1 hosts or when using the hybrid
mode.
7 Click OK.
Prerequisites
n All hosts in the cluster must be connected to a vDS.
Procedure
1 Log in to the vSphere Web Client.
4 For the cluster on which you want to configure VXLAN, click Configure in the VXLAN column.
5 In the Configuring VXLAN networking dialog box, select the switch to which you want to map the
cluster.
22 VMware, Inc.
Chapter 4 Installing NSX Components
7 Type the Maximum Transmission Units (MTU) for the virtual distributed switch.
MTU is the maximum amount of data that can be transmitted in one packet before it is divided into
smaller packets. VXLAN traffic frames are slightly larger in size because of the encapsulation, so the
MTU for each switch must be set to 1550 or higher.
8 In VMKNic IP Addressing, select one of the following:
Select To
Use DHCP Assign an IP address to the VXLAN VTEPs through Dynamic Host
Configuration Protocol (DHCP).
Use IP pool Assign a static IP address to the VXLAN VTEPs from the selected IP pool.
10 Select the VMKNic Teaming Policy for the vSwitch. The NIC teaming policy determines the load
balancing and failover settings of the virtual switch.
It is important to choose the right teaming policy to avoid packet loss. See “Teaming Policy for Virtual
Distributed Switches,” on page 23.
VTEP (VXLAN Tunnel End Points) is the number of dvUplinks on the switch, which load balances
traffic between multiple PNICs. VMware recommends that you do not edit the default VTEP value.
This field is disabled if the teaming policy you selected does not require multiple VTEPs (ether channel,
failover, LACPv1, or LACPv2).
12 Click OK.
For certain teaming modes, VMware software creates multiple VTEPs to load balance traffic between the
physical vNICs.
For information on teaming mode descriptions, refer to the VMware vSphere documentation.
LACPv2 No 5.5
LACPv1 No 5.1
VMware, Inc. 23
NSX Installation and Upgrade Guide
Procedure
1 Log in to the vSphere Web Client.
5 In the New Transport Zone dialog box, type a name and description for the transport zone.
6 Depending on whether you have a controller node in your environment, or you want to use multicast
addresses, select the control plane mode.
n Multicast: Multicast IP addresses on physical network is used for the control plane. This mode is
recommended only when you are upgrading from older VXLAN deployments. Requires
PIM/IGMP on physical network.
n Unicast : The control plane is handled by an NSX controller. All unicast traffic leverages headend
replication. No multicast IP addresses or special network configuration is required.
n Hybrid : The optimized unicast mode. Offloads local traffic replication to physical network (L2
multicast). This requires IGMP snooping on the first-hop switch, but does not require PIM. First-
hop switch handles traffic replication for the subnet.
8 Click OK.
Procedure
1 Log in to the vSphere Web Client.
The Summary tab displays the name and description of the transport zone as well as the number of
logical switches associated with it. Transport Zone Details displays the clusters in the transport zone.
5 Click the Edit Settings icon in the Transport Zone Details section to edit the name, description, or
control plane mode of the transport zone.
If you change the transport zone control plane mode, select Migrate existing Logical Switches to the
new control plane mode to change the control plane more for existing logical switches linked to this
transport zone. If you do not select this check box, only the logical switches linked to this transport zone
after the edit is done will have the new control plane mode.
6 Click OK.
24 VMware, Inc.
Chapter 4 Installing NSX Components
Procedure
1 Log in to the vSphere Web Client.
2 Click Networking & Security and then click Installation.
5 In the New Transport Zone dialog box, type a name and description for the transport zone.
6 Depending on whether you have a controller node in your environment, or you want to use multicast
addresses, select the control plane mode.
n Multicast: Multicast IP addresses on physical network is used for the control plane. This mode is
recommended only when you are upgrading from older VXLAN deployments. Requires
PIM/IGMP on physical network.
n Unicast : The control plane is handled by an NSX controller. All unicast traffic leverages headend
replication. No multicast IP addresses or special network configuration is required.
n Hybrid : The optimized unicast mode. Offloads local traffic replication to physical network (L2
multicast). This requires IGMP snooping on the first-hop switch, but does not require PIM. First-
hop switch handles traffic replication for the subnet.
8 Click OK.
Prerequisites
The clusters you add to a transport zone have the network infrastructure installed and are configured for
VXLAN. See the NSX Installation and Upgrade Guide.
Procedure
1 Log in to the vSphere Web Client.
5
In Transport Zones Details, click the Add Cluster ( ) icon.
7 Click OK.
Procedure
1 Log in to the vSphere Web Client.
VMware, Inc. 25
NSX Installation and Upgrade Guide
5 In the New Transport Zone dialog box, type a name and description for the transport zone.
6 Depending on whether you have a controller node in your environment, or you want to use multicast
addresses, select the control plane mode.
n Multicast: Multicast IP addresses on physical network is used for the control plane. This mode is
recommended only when you are upgrading from older VXLAN deployments. Requires
PIM/IGMP on physical network.
n Unicast : The control plane is handled by an NSX controller. All unicast traffic leverages headend
replication. No multicast IP addresses or special network configuration is required.
n Hybrid : The optimized unicast mode. Offloads local traffic replication to physical network (L2
multicast). This requires IGMP snooping on the first-hop switch, but does not require PIM. First-
hop switch handles traffic replication for the subnet.
8 Click OK.
Procedure
1 Log in to the vSphere Web Client.
5
In Transport Zones Details, click the Remove Clusters ( ) icon.
7 Click OK.
Procedure
1 Log in to the vSphere Web Client.
5 In the New Transport Zone dialog box, type a name and description for the transport zone.
26 VMware, Inc.
Chapter 4 Installing NSX Components
6 Depending on whether you have a controller node in your environment, or you want to use multicast
addresses, select the control plane mode.
n Multicast: Multicast IP addresses on physical network is used for the control plane. This mode is
recommended only when you are upgrading from older VXLAN deployments. Requires
PIM/IGMP on physical network.
n Unicast : The control plane is handled by an NSX controller. All unicast traffic leverages headend
replication. No multicast IP addresses or special network configuration is required.
n Hybrid : The optimized unicast mode. Offloads local traffic replication to physical network (L2
multicast). This requires IGMP snooping on the first-hop switch, but does not require PIM. First-
hop switch handles traffic replication for the subnet.
8 Click OK.
Uplink interfaces of NSX Edge connect to uplink port groups that have access to a shared corporate network
or a service that provides access layer networking. Multiple external IP addresses can be configured for load
balancer, site-to-site VPN, and NAT services.
Logical Router
The NSX Edge logical router provides East-West distributed routing with tenant IP address space and data
path isolation. Virtual machines or workloads that reside on the same host on different subnets can
communicate with one another without having to traverse a traditional routing interface.
A logical router can have eight uplink interfaces and up to a thousand internal interfaces.
Uplink interfaces of NSX Edge connect to uplink port groups that have access to a shared corporate network
or a service that provides access layer networking.
Multiple external IP addresses can be configured for load balancer, site-to-site VPN, and NAT services.
Overlapping IP addresses are not allowed for internal interfaces, and overlapping subnets are not allowed
for internal and uplink interfaces.
VMware, Inc. 27
NSX Installation and Upgrade Guide
Procedure
1 Log in to the vSphere Web Client.
3
Click the Add ( ) icon.
5 Select Enable High Availability to enable and configure high availability (HA).
This name appears in your vCenter inventory. The name should be unique across all Edges within a
single tenant.
7 (Optional) Type a host name for the NSX Edge virtual machine.
This name appears in CLI. If you do not specify the host name, the Edge ID is displayed in CLI.
9 Click Next.
Procedure
1 On the CLI Credentials page, specify the CLI credentials for your NSX Edge virtual machine.
Option Action
CLI user name Edit if required.
CLI password Type a password.
Configure Deployment
You must add an appliance before you can deploy a NSX Edge. If you do not add an appliance when you
install NSX Edge, NSX Edge remains in an offline mode until you add an appliance.
Prerequisites
Verify that the resource pool has enough capacity for the Edge virtual machine to be deployed. See “System
Requirements for NSX,” on page 13.
Procedure
1 On the Deployment Configuration page, select the datacenter where you want to place the NSX Edge
virtual machine.
28 VMware, Inc.
Chapter 4 Installing NSX Components
2 Select the size of the NSX Edge instance based on your system resources.
The Large NSX Edge has more CPU, memory, and disk space than the Compact NSX Edge, and
supports a bigger number of concurrent SSL VPN-Plus users. The X-Large NSX Edge is suited for
environments which have Load Balancer with millions of concurrent sessions. The Quad Large NSX
Edge is recommended for high throughput and requires a high connection rate.
See “System Requirements for NSX,” on page 13.
3 Click Enable auto rule generation to add firewall, NAT, and routing routes to enable control traffic to
flow for these services..
If you do not select Enable auto rule generation, you must manually add firewall, NAT, and routing
configuration to allow control channel traffic for NSX Edge services such as Load Balancing, VPN, etc.
NOTE Auto rule generation does not create rules for data-channel traffic.
4
In NSX Edge Appliances, click the Add ( ) icon to add an appliance.
If you had selected Enable HA on the Name and Description page, you can add two appliances. If you
add a single appliance, NSX Edge replicates its configuration for the standby appliance and ensures that
the two HA NSX Edge virtual machines are not on the same ESX host even after you use DRS and
vMotion (unless you manually vMotion them to the same host).
5 In the Add Edge Appliance dialog box, select the cluster or resource pool and datastore for the
appliance.
7 (Optional) Select the vCenter folder within which the appliance is to be added.
8 Click OK.
9 Click Next.
Procedure
1
On the Configure Interfaces page, click the Add ( ) icon and type a name for the interface.
NOTE You must add at least one internal interface for HA to work.
4 Select the port group or logical switch to which this interface should be connected.
b Depending on what you want to connect to the interface, click the Logical Switch, Standard
Portgroup, or Distributed Portgroup tab.
d Click Select.
VMware, Inc. 29
NSX Installation and Upgrade Guide
6
In Configure Subnets, click the Add ( ) icon to add a subnet for the interface.
a
In Add Subnet, click the Add ( ) icon and type IP address for the subnet.
NOTE If you enter more than one IP address, you can select the Primary IP address. An interface
can have one primary and multiple secondary IP addresses. NSX Edge considers the Primary IP
address as the source address for locally generated traffic.
You must add an IP address to an interface before using it on any feature configuration.
b Type the subnet mask for the interface and click OK.
7 Type the MAC address for the interface. If HA is enabled, type two management IP addresses in CIDR
format.
NOTE Heartbeats of the two NSX Edge HA virtual machines are communicated through these
management IP addresses. The management IP addresses must be in the same L2/subnet and be able to
communicate with each other.
Option Description
Enable Proxy ARP Supports overlapping network forwarding between different interfaces
Send ICMP Redirect Conveys routing information to hosts
12 Click Next.
Procedure
1 On the Default Gateway page, select Configure Default Gateway.
2 Select the interface that can communicate with the next hop or gateway IP address.
4 In MTU, the default MTU for the interface you selected in Step 2 is displayed. You can edit this value,
but it cannot be more than the configured MTU on the interface.
5 Click Next.
If you do not configure the firewall policy, the default policy is set to deny all traffic and logs are disabled.
30 VMware, Inc.
Chapter 4 Installing NSX Components
You must configure HA parameters for high availability to work on network configurations on NSX Edge.
NSX Edge supports two virtual machines for high availability, both of which are kept up to date with user
configurations. If a heartbeat failure occurs on the primary virtual machine, the secondary virtual machine
state is changed to active. Thus, one NSX Edge virtual machine is always active on the network.
Procedure
1 On the Firewall & HA page, select Configure Firewall default policy.
Enabling default logging may generate too many logs and affect the performance of your NSX Edge.
Hence, it is recommended that you enable default logging only while troubleshooting or debugging.
4 If you selected Enable HA on the Name & Description page, complete the Configure HA parameters
section.
NSX Edge replicates the configuration of the primary appliance for the standby appliance and ensures
that the two HA NSX Edge virtual machines are not on the same ESX host even after you use DRS and
vMotion. Two virtual machines are deployed on vCenter in the same resource pool and datastore as the
appliance you configured. Local link IPs are assigned to HA virtual machines in the NSX Edge HA so
that they can communicate with each other. You can specify management IP addresses to override the
local links.
b (Optional) Type the period in seconds within which, if the backup appliance does not receive a
heartbeat signal from the primary appliance, the primary appliance is considered inactive and the
back up appliance takes over.
c (Optional) Type two management IP addresses in CIDR format to override the local link IPs
assigned to the HA virtual machines.
Ensure that the management IP addresses do not overlap with the IPs used for any other interface
and do not interfere with traffic routing. You should not use an IP that exists somewhere else on
your network, even if that network is not directly attached to the NSX Edge.
5 Click Next.
Procedure
1 On the Summary page, review the settings for the NSX Edge.
3 Click Finish to accept the settings and install theNSX Edge gateway.
With distributed routing, virtual machines or workloads that reside on the same host on different subnets
can communicate with one another without having to traverse a traditional routing interface such as the
NSX Edge services gateway.
VMware, Inc. 31
NSX Installation and Upgrade Guide
You must have one, three, or five controller nodes and one logical switch in your environment before
installing a logical router. See “Add NSX Controllers,” on page 21.
Prerequisites
You must have at least three controller nodes and one logical switch in your environment before installing
an logical router.
Procedure
1 Log in to the vSphere Web Client.
3
Click the Add ( ) icon.
5 Select Enable High Availability to enable and configure high availability (HA).
This name appears in your vCenter inventory. The name should be unique across all Edges within a
single tenant.
7 (Optional) Type a host name for the NSX Edge virtual machine.
This name appears in CLI. If you do not specify the host name, the Edge ID is displayed in CLI.
9 Click Next.
Procedure
1 On the CLI Credentials page, specify the CLI credentials for your NSX Edge virtual machine.
Option Action
CLI user name Edit if required.
CLI password Type a password.
3 Click Next.
Prerequisites
For high availability, verify that the resource pool has enough capacity for both HA virtual machines to be
deployed.
32 VMware, Inc.
Chapter 4 Installing NSX Components
Procedure
1 On the Deployment Configuration page, select the datacenter where you want to place the NSX Edge
virtual machine.
2
In NSX Edge Appliances, click the Add ( ) icon to add an appliance.
If you had selected Enable HA on the Name and Description page, you can add two appliances. If you
add a single appliance, NSX Edge replicates its configuration for the standby appliance ensures that the
two HA NSX Edge virtual machines are not on the same ESX host even after you use DRS and vMotion
(unless you manually vMotion them to the same host).
3 In the Add Edge Appliance dialog box, select the cluster or resource pool and datastore for the
appliance.
5 (Optional) Select the vCenter folder within which the appliance is to be added.
6 Click OK.
7 Click Next.
Procedure
1 (Optional) On the Interfaces page, type the IP address for the management interface.
2 (Optional) In Management Interface Configuration, click Select next to the Connected To field and
select the logical switch or port group that you want to set as the management interface. Add ( ) icon
to add a subnet for the management interface.
3
In the Add Subnet dialog box, click the Add ( ) icon.
4 Type the IP address of the subnet and click OK. If you add more than one subnet, select the primary
subnet.
6
In Configure Interfaces, click the Add ( ) icon to add a traffic interface and type a name for the
interface.
8 Select the port group or VXLAN virtual wire to which this interface should be connected.
b Depending on what you want to connect to the interface, click the Virtual Wire or Distributed
Portgroup tab.
VMware, Inc. 33
NSX Installation and Upgrade Guide
d Click OK.
10
In Configure Subnets, click the Add ( ) icon to add a subnet for the interface.
11
In Add Subnet, click the Add ( ) icon to add an IP address.
You must add an IP address to an interface before using it on any feature configuration.
13 Click OK.
16 Click Next.
If you selected Enable HA on the Name & Description page, complete the Configure HA parameters
section. NSX Edge replicates the configuration of the primary appliance for the standby appliance and
ensures that the two HA NSX Edge virtual machines are not on the same ESX host even after you use DRS
and vMotion. Two virtual machines are deployed on vCenter in the same resource pool and datastore as the
appliance you configured. Local link IPs are assigned to HA virtual machines in the NSX Edge HA so that
they can communicate with each other. You can specify management IP addresses to override the local
links.
Procedure
1 Type the period in seconds within which, if the backup appliance does not receive a heartbeat signal
from the primary appliance, the primary appliance is considered inactive and the back up appliance
takes over. The default interval is 15 seconds.
2 (Optional) Type two management IP addresses in CIDR format to override the local link IPs assigned to
the HA virtual machines.
Ensure that the management IP addresses do not overlap with the IPs used for any other interface and
do not interfere with traffic routing. You should not use an IP that exists somewhere else on your
network, even if that network is not directly attached to the NSX Edge.
3 Click Next.
Procedure
1 On the Summary page, review the settings for the NSX Edge.
3 Click Finish to accept the settings and install theNSX Edge router.
The logical router control virtual machine is deployed. Logical router instances are instantiated on each host
that has the logical switches being routed.
34 VMware, Inc.
Chapter 4 Installing NSX Components
Prerequisites
The installation instructions that follow assume that you have the following system:
n A datacenter with supported versions of vCenter Server and ESXi installed on each host in the cluster.
For information on the required versions, see “System Requirements for NSX,” on page 13.
n Network virtualization components must have been installed on the hosts in the cluster where you
want to install vShield Endpoint. vShield Endpoint cannot be installed on stand alone hosts.
If you want to assign an IP address to the NSX Endpoint service virtual machine from an IP pool, create the
IP pool before installing NSX Endpoint. See “Create an IP Pool,” on page 38.
Procedure
1 Log in to the vSphere Web Client.
3
Click the Service Deployments tab and click the New Service Deployment ( ) icon.
4 In the Deploy Network and Security Services dialog box, select vShield Endpoint and click Next.
5 In Specify schedule (at the bottom of the dialog box), select Deploy now to deploy Endpoint as soon as
it is installed or select a deployment date and time.
6 Click Next.
7 Select the datacenter and cluster(s) where you want to install Endpoint and click Next.
8 On the Select storage page, select the datastore on which to add the service virtual machines storage or
select Specified on host It is recommended that use shared datastores and networks instead of
specified on host so that deployment workflows are automated.
The selected datastore must be available on all hosts in the selected cluster.
If you selected Specified on host, follow the steps below for each host in the cluster.
a On the vSphere Web Client home page, click vCenter and then click Hosts.
b Click a host in the Name column and then click the Manage tab.
9 Click Next.
10 On the Configure management network page, select the distributed virtual port group to host the
management interface. If the datastore is set to Specified on host, the network must also be Specified
on host.
The selected port group must be able to reach the NSX Manager’s port group and must be available on
all hosts in the selected cluster.
If you selected Specified on host, follow the steps in Step 8 to select a network on the host. When you
add a host(s) to the cluster, the datastore and network must be set before it is added to the cluster.
VMware, Inc. 35
NSX Installation and Upgrade Guide
Select To
DHCP Assign an IP address to the NSX Endpoint service virtual machine through
Dynamic Host Configuration Protocol (DHCP).
An IP pool Assign an IP address to the NSX Endpoint service virtual machine from
the selected IP pool.
12 Click Next and then click Finish on the Ready to complete page.
13 Monitor the deployment till the Installation Status column displays Successful.
14 If the Installation Status column displays Failed, click the icon next to Failed. All deployment errors
are displayed. Click Resolve to fix the errors. In some cases, resolving the errors displays additional
errors. Take the required action and click Resolve again.
What to do next
Install VMware Tools on guest virtual machines.
Prerequisites
Ensure that the guest virtual machine has a supported version of Windows installed. The following
Windows operating systems are supported for NSX Endpoint:
Procedure
1 Select the type of installation for VMware Tools.
36 VMware, Inc.
Chapter 4 Installing NSX Components
n Complete.
n Custom.
n From the VMware Device Drivers list, select VMCI Driver, then select NSX Driver.
If you want to assign an IP address to the Data Security service virtual machine from an IP pool, create the
IP pool before installing Data Security. See “Create an IP Pool,” on page 38.
Procedure
1 Click Networking & Security and then click Installation.
2
Click the Service Deployments tab and click the New Service Deployment ( ) icon.
3 In the Deploy Network and Security Services dialog box, select Data Security and click Next.
4 In Specify schedule (at the bottom of the dialog box), select Deploy now to deploy Data Security as
soon as it is installed or select a deployment date and time.
5 Click Next.
6 Select the datacenter and cluster(s) where you want to install Data Security and click Next.
7 On the Select storage page, select the datastore on which to add the service virtual machines storage or
select Specified on host.
The selected datastore must be available on all hosts in the selected cluster.
If you selected Specified on host, the datastore for the ESX host must be specified in the AgentVM
Settings of the host before it is added to the cluster. See vSphere API/SDK Documentation.
8 Click Next.
9 On the Configure management network page, select the distributed virtual port group to host the
management interface. This port group must be able to reach the NSX Manager’s port group.
If the datastore is set to Specified on host, the network to be used must be specified in the
agentVmNetwork property of each host in the cluster. See vSphere API/SDK Documentation.
When you add a host(s) to the cluster, the agentVmNetwork property for the host must be set before it
is added to the cluster.
The selected port group must be available on all hosts in the selected cluster.
Select To
DHCP Assign an IP address to the Data Security service virtual machine through
Dynamic Host Configuration Protocol (DHCP).
An IP pool Assign an IP address to the Data Security service virtual machine from the
selected IP pool.
11 Click Next and then click Finish on the Ready to complete page.
VMware, Inc. 37
NSX Installation and Upgrade Guide
12 Monitor the deployment till the Installation Status column displays Successful.
13 If the Installation Status column displays Failed, click the icon next to Failed. All deployment errors
are displayed. Click Resolve to fix the errors. In some cases, resolving the errors displays additional
errors. Take the required action and click Resolve again.
Create an IP Pool
Procedure
1 Log in to the vSphere Web Client.
3 Click an NSX Manager in the Name column and then click the Manage tab.
6 Type a name for the IP pool and type the default gateway.
7 Type the primary and secondary DNS and the DNS suffix and the prefix length.
8 Type the IP address ranges to be included in the pool and click OK.
38 VMware, Inc.
Extensibility (Integrate Partner
Solutions with NSX) 5
VMware partners can integrate their solutions with the VMware NSX platform.
After partners design the services that they want to offer, they can implement their service virtual machine
and create vendor templates which contain the settings and configuration parameters for the service levels
that they provide. They register the service manager and service with NSX Manager and can monitor the
health and performance of the service.
If the partner solutions's management console does not provide a mechanism to register the solution with
NSX Manager, you must register the solution manually.
NSX Manager
NSX Controller
Virtual networks
Hypervisor
Overlay transport
Hardware partner
extensions
Network hardware
VMware, Inc. 39
NSX Installation and Upgrade Guide
Procedure
1 Log in to the vSphere Web Client.
3
Click the New Service Definition ( ) icon.
4 Type a name and version for the service that you are inserting.
5 Select the service manager and type a description for the service.
7
Add the required attributes by clicking the New Attribute ( ) icon.
8 Click Next and select the service categories within which you want to add the solution.
9 Click Next.
The Configure Service Manager page is displayed only if you selected New Service Manager in step 5.
10 On the Configure service manager page, configure the service manager for the service you are adding.
b In Administrative URL, type the URL of the solution provider's service manager.
c In Base API URL, type the URL of the web site where the service manager's REST APIs are
available and the thumbprint of the service manager.
d In Credentials, type the username and password for logging in to the service manager.
f Click Next.
11
On the Add service configuration page, click the New Service Definition ( ) icon to add one or more
service configurations.
12 Click Next.
13 On the Add profile configuration page, add one or more service profiles.
a Type the configuration ID, name, and description for the profile.
b
Add one or more attributes by clicking the New Attribute ( ) icon.
c Click OK.
What to do next
Deploy the solution.
40 VMware, Inc.
Chapter 5 Extensibility (Integrate Partner Solutions with NSX)
Prerequisites
If you have not registered third party solutions with NSX Manager, you must manually add the solution to
NSX Manager before you can install the service. See Chapter 5, “Extensibility (Integrate Partner Solutions
with NSX),” on page 39.
Ensure that NSX Manager can access the partner solution's management console.
Procedure
1 Click Networking & Security and then click Installation.
2
Click the Service Deployments tab and click the New Service Deployment ( ) icon.
3 In the Deploy Network and Security Services dialog box, select the appropriate solution(s).
4 In Specify schedule (at the bottom of the dialog box), select Deploy now to deploy the solution
immediately or select a deployment date and time.
5 Click Next.
6 Select the datacenter and cluster(s) where you want to deploy the solution and click Next.
7 On the Select storage page, select the datastore on which to add the solution service virtual machines
storage or select Specified on host.
The selected datastore must be available on all hosts in the selected cluster.
If you selected Specified on host, the datastore for the ESX host must be specified in the AgentVM
Settings of the host before it is added to the cluster. See vSphere API/SDK Documentation.
8 Click Next.
9 On the Configure management network page, select the distributed virtual port group to host the
management interface. This port group must be able to reach the NSX Manager’s port group.
If the network is set to Specified on host, the network to be used must be specified in the Agent VM
Settings > Network property of each host in the cluster. See vSphere API/SDK Documentation.
When you add a host(s) to the cluster, the Agent VM Settings > Network property for the host must be
set before it is added to the cluster.
The selected port group must be available on all hosts in the selected cluster.
Select To
DHCP Assign an IP address to the service virtual machine through Dynamic Host
Configuration Protocol (DHCP).
An IP pool Assign an IP address to the service virtual machine from the selected IP
pool.
11 Click Next and then click Finish on the Ready to complete page.
12 Monitor the deployment till the Installation Status displays Successful. If the status displays Failed,
click the icon next to Failed and take action to resolve the error.
VMware, Inc. 41
NSX Installation and Upgrade Guide
What to do next
You can now consume the partner service through NSX UI or NSX API. See NSX Administration Guide.
42 VMware, Inc.
Upgrading NSX 6
Follow the upgrade procedure appropriate to the current software version installed in your environment.
Prerequisites
n You have upgraded to vCenter Server 5.5.
n vShield Data Security has been uninstalled. For information on uninstalling the current Data Security
software, see the documentation for that version.
n vShield Edge instances prior to version 5.5, if any, have been upgraded to version vShield 5.5.
Pre-5.5 vShield Edge instances cannot be managed or deleted after vShield Manager has been
upgraded to NSX Manager.
Procedure
1 Download the NSX upgrade bundle to a location to which vShield Manager can browse. The name of
the upgrade bundle file is something like VMware-vShield-Manager-upgrade-bundle-to-NSX-
buildNumber.tar.gz.
2 From the vShield Manager 5.5 inventory panel, click Settings & Reports.
3 Click the Updates tab and then click Upload Upgrade Bundle .
VMware, Inc. 43
NSX Installation and Upgrade Guide
7 Click Confirm Install. The upgrade process reboots vShield Manager, so you might lose connectivity to
the vShield Manager user interface. None of the other vShield components are rebooted.
8 After the reboot, log in to the NSX Manager virtual appliance by opening a Web browser window and
typing the same IP address as that of the vShield Manager. For example, https://11.111.11.11.
The Summary tab displays the version of NSX Manager that you just installed.
Close any existing browser sessions accessing the vSphere Web Client. Wait for a few minutes and clear
the browser cache before logging back in to the vSphere Web Client.
If SSH was enabled on vShield manager 5.5, you must enable it on NSX Manager after the upgrade. Log
in to the NSX Manager virtual appliance and click View Summary. In System-level components, click
Start for SSH service.
9 Shut down the NSX Manager virtual machine and increase the memory to 12 GB and vCPU to 4.
All grouping objects from vShield Manager 5.5 are carried over to NSX. Objects that were created at
datacenter or port group level are now visible and applicable at the global scope. For information on how to
view grouping objects in the vSphere Web Client, see Grouping Objects in NSX Administration Guide.
All users and associated roles are carried over to NSX as well. For information on viewing roles in the
vSphere Web Client, see User Management in NSX Administration Guide.
Prerequisites
n vShield Manager has been upgraded to NSX Manager.
Procedure
1 Log in to the vSphere Web Client.
If you had Virtual Wires in your 5.5 environment, the Installation Status column displays legacy,
Update, and Uninstall.
44 VMware, Inc.
Chapter 6 Upgrading NSX
Figure 6‑1. Installation Status displays Update when you have Virtual Wires in your 5.5 environment
If you did not have Virtual Wires in your 5.5 environment, the Installation Status column displays
Install.
Figure 6‑2. Installation Status displays Install when you do not have Virtual Wires in your 5.5
environment
4 For each cluster, click Update or Install in the Installation Status column.
Each host in the cluster receives the new logical switch software.
5 Monitor the installation till the Installation Status column displays a green check mark
6 If the Installation Statuscolumn displays a red warning icon and says Not Ready, click Resolve. If the
installation is still not successful, click the warning icon. All errors are displayed. Take the required
action and click Resolve again.
NSX reboots the hosts after moving them to maintenance mode and leveraging DRS to vMotion active
virtual machines to other hosts. In case an error message is displayed, you may need to reboot the hosts
in the cluster manually or take other action according to the error message.
While the upgrade is in progress, do not deploy, upgrade, or uninstall any service or component.
All virtual wires from your 5.5 infrastructure are upgraded to NSX logical switches and the VXLAN
column for the cluster says Enabled. You can now add a controller and change the control plane setting
for the transport zone to Unicast or Hybrid at the logical switch level or transport zone level. See
“Prepare and Enable Clusters for Logical Switches,” on page 20 and “View and Edit a Transport Zone,”
on page 24.
VMware, Inc. 45
NSX Installation and Upgrade Guide
When vShield Manager 5.5 is upgraded to NSX Manager 6.0, vShield App 5.5 rules are migrated to NSX in
the following way:
1 A new section is created for each namespace (datacenter and virtual wire) configured in vShield App
version 5.5. Each section includes the corresponding firewall rules.
2 All rules in each section have the same value in the AppliedTo field - datacenter ID for datacenter
namespace, virtual wire ID for virtual wire namespace, and port group ID for port group based
namespace.
3 Containers created at different namespace levels are moved to the global level.
4 Section order is as below to ensure that firewall behavior after the upgrade remains the same:
Section_Namespace_Portgroup-1
..................
Section_Namespace_Portgroup-N
Section_Namespace_VirtualWire-1
..................
Section_Namespace_VirtualWire-N
Section_Namespace_Datacenter_1
..................
Section_Namespace_Datacenter_N
Default_Section_DefaultRule
These rules are displayed in the Firewall table, but you cannot edit them. To use NSX Firewall, you must
follow the procedure below.
Prerequisites
1 vShield Manager has been upgraded to NSX Manager.
2 Virtual wires have been upgraded to NSX Logical Switches. For non-VXLAN users, network
virtualization components have been installed.
46 VMware, Inc.
Chapter 6 Upgrading NSX
Procedure
1 After you update all the clusters in your infrastructure while upgrading to NSX logical switches (or
installing network virtualization components), a pop up message indicates that Firewall is ready to be
upgraded.
2 Click Upgrade.
Prerequisites
n vShield Manager has been upgraded to NSX Manager.
n System requirements for NSX Edge X-Large have been changed in NSX. See Chapter 2, “Preparing for
Installation,” on page 13.
Procedure
1 Log in to the vSphere Web Client.
3 For each NSX Edge instance, select Upgrade Version from the Actions menu.
After the NSX Edge is upgraded successfully, the Version column displays 6.0.0 and Status displays
Deployed.
NSX Edge firewall rules do not support sourcePort, so version 5.5 Edge rules containing sourcePort are
modified during the upgrade as follows.
n If there are no applications used in the rule, a service is created with protocol=any, port=any and
sourcePort=asDefinedInTheRule.
n If there are applications or applicationGroups used in the rule, these grouping objects are
duplicated by adding the sourcePort to them. Because of this, the groupingObjectIds used in the
firewall rule change after the upgrade.
VMware, Inc. 47
NSX Installation and Upgrade Guide
Prerequisites
n dvSwitch has been created and all hosts are connected to the dvSwitch and dvPort group.
Procedure
1 Log in to the vSphere Web Client.
vShield Endpoint 5.5 deployments are displayed and the Installation Status column says Upgrade
Available.
4 In the Installation Status column for vShield Endpoint, click the arrow next to Upgrade Available.
After vShield Endpoint is upgraded, the vShield Endpoint service virtual machines are visible in the
vCenter Server inventory.
Pre-NSX Data Security policies and violation reports are carried over to the vSphere Web Client, but you can
run a Data Security scan only after installing NSX Data Security version 6.0.
For information on installing Data Security, see “Install Data Security,” on page 37.
Legacy partner solutions work at a global level, but you cannot add these solutions to a Service Composer
policy.
When an upgrade is available for a partner solution installed through the Service Deployments tab, the
status column displays Upgrade available. You can upgrade the solution through this tab..
48 VMware, Inc.
Chapter 6 Upgrading NSX
Procedure
1 Download the NSX vSphere 6.0.x Upgrade bundle to a location to which NSX Manager can browse. The
name of the upgrade bundle file is something like VMware-NSX-Manager-upgrade-bundle-releaseNumber-
NSXbuildNumber.tar.gz.
6 Click Continue.
7 In the Upgrade dialog box, specify whether you want to enable SSO and click Upgrade.
Wait till the upgrade procedure completes and the NSX Manager login page appears.
8 Log in to the NSX Manager Virtual Appliance again and confirm that version and build number on the
top right matches the upgrade bundle you just installed.
Update Clusters
After upgrading NSX Manager to version 6.0.x, you must update the appropriate clusters in your
environment.
Prerequisites
NSX Manager has been upgraded to version 6.0.x.
Procedure
1 Log in to the vCenter Web Client.
While the hosts in the clusters are being rebooted, the cluster Installation Status may display Warning
and the hosts's Installation Status may display Not Ready.
When the cluster is updated, 6.0.x is displayed in the Installation Status column.
Your environment has now been upgraded to NSX 6.0.x. You do not need to upgrade any other NSX
component.
VMware, Inc. 49
NSX Installation and Upgrade Guide
50 VMware, Inc.
Uninstalling NSX Components 7
This chapter details the steps required to uninstall NSX components from your vCenter inventory.
Procedure
1 Log in to the vSphere Web Client.
4 For the appropriate cluster, select Uninstall in the Installation Status column.
Prerequisites
You must have been assigned the Enterprise Administrator or NSX Administrator role.
Procedure
1 Log in to the vSphere Web Client.
3
Select an NSX Edge and click the Delete ( ) icon.
VMware, Inc. 51
NSX Installation and Upgrade Guide
Procedure
1 Log in to the vSphere Web Client.
4
Select the NSX Data Security service and click the Delete Service Deployment ( ) icon.
5 In the Confirm Delete dialog box, click Delete now or select a date and time for the delete to take effect.
6 Click OK.
CAUTION If NSX Data security or any partner services dependent on the vShield Endpoint module are
installed on a cluster, you must uninstall them before uninstalling the vShield Endpoint service.
Procedure
1 Log in to the vSphere Web Client.
2 Click Networking & Security and then click Installation.
4
Select the vShield Endpoint service and click the Delete Service Deployment ( ) icon.
5 In the Confirm Delete dialog box, confirm that there are no warnings displayed.
6 Click Delete now or select a date and time for the delete to take effect.
7 Click OK.
52 VMware, Inc.
Troubleshooting Installation Issues 8
This section describes installation issues.
Solution
1 Confirm that the user has admin privileges.
2 Verify whether NSX Manager and Lookup service appliances are in time sync. To achieve this, use
same NTP server configurations at NSX Manager and Lookup service.
Solution
1 Check DNS settings.
2 Confirm that user has administrative privileges.
VMware, Inc. 53
NSX Installation and Upgrade Guide
54 VMware, Inc.
Index
C NSX Manager
client requirements 13 installation 15
introduction 10
D logging in to GUI 17
default gateway, configuring IP address 30 syncing with vCenter 17
NSX vSwitch
G about 10
GUI, logging in 17 install 20
NSX controller 21
I
install P
partner appliance 41 partner solution, register 39
vShield Endpoint 35
installation S
licenses 19 synchronizing with vCenter 17
NSX Endpoint thin agent 36 system requirements 13
NSX Manager 15
installing, NSX Edge 28 T
introduction thin agent installation 36
NSX 9 transport zone 24–26
NSX Edge 10 troubleshoot, configure lookup service 53
NSX Manager 10 troubleshooting, unable to configure vCenter
Server 53
L
licensing, installation 19 U
logging in to the GUI 17 uninstall
Logical Firewall 20 firewall 51
logical network 24–26 network virtualization components 51
logical switch NSX Data Security 52
add NSX controller 21 NSX Edge 51
assign segment ID pool & multicast address vShield Endpoint module 52
range 22 unregister a vShield Endpoint SVM 52
configure VXLAN 22 upgrade
prepare for 20 5.5 to 6.0 43
6.0 to 6.0.1 48
N Firewall 46
NSX Edge logical switch 46
install as router 31
NSX Manager 43
install as services gateway 27
NSX Data Security 48
installation 28
to logical switches 44
introduction 10
to NSX Edge 47
licensing 19
vShield Endpoint 48
uninstall 51
NSX Endpoint
licensing 19
thin agent installation 36
VMware, Inc. 55
NSX Installation and Upgrade Guide
V
vCenter, syncing from NSX Manager 17
vShield Endpoint
uninstall 52
unregister SVM 52
56 VMware, Inc.