Edu en Nsxticm32 Lab Se
Edu en Nsxticm32 Lab Se
Configure, Manage
Lab Manual
Copyright © 2022 VMware, Inc. All rights reserved. This manual and its accompanying
materials are protected by U.S. and international copyright and intellectual property laws.
VMware products are covered by one or more patents listed at
http://www.vmware.com/go/patents. VMware is a registered trademark or trademark of
VMware, Inc. in the United States and/or other jurisdictions. All other marks and names
mentioned herein may be trademarks of their respective companies. VMware vSphere® with
VMware Tanzu®, VMware vSphere® vMotion®, VMware vSphere® Client™, VMware
vSphere® 2015, VMware vSphere®, VMware vShield Endpoint™, VMware vCenter Server®,
VMware View®, VMware Horizon® View™, VMware Verify™, VMware vSphere® Distributed
Switch™, VMware Pivotal Labs® Platform Deployment™, VMware Pivotal Labs® Navigator™,
VMware NSX-T™ Data Center, VMware NSX-T™, VMware NSX® Network Detection and
Response™, VMware NSX® Manager™, VMware NSX® Gateway Firewall™, VMware NSX®
Firewall for Bare Metal, VMware NSX® Firewall with Advanced Threat Prevention, VMware
NSX® Firewall, VMware NSX® Edge™, VMware NSX® Distributed IDS/IPS™, VMware NSX®
Distributed Firewall™, VMware NSX® Data Center Enterprise Plus, VMware NSX® Data
Center, VMware NSX® Advanced Load Balancer Controller™, VMware NSX® Advanced
Load Balancer™, VMware NSX® Advanced Load Balancer™ – Basic Edition, VMware NSX®,
VMware Go™, VMware ESXi™, and VMware ACE™ are registered trademarks or trademarks
of VMware, Inc. in the United States and/or other jurisdictions.
The training material is provided “as is,” and all express or implied conditions, representations,
and warranties, including any implied warranty of merchantability, fitness for a particular
purpose or noninfringement, are disclaimed, even if VMware, Inc., has been advised of the
possibility of such claims. This material is designed to be used for reference purposes in
conjunction with a training course.
The training material is not a standalone training tool. Use of the training material for self-
study without class attendance is not recommended. These materials and the computer
programs to which it relates are the property of, and embody trade secrets and confidential
information proprietary to, VMware, Inc., and may not be reproduced, copied, disclosed,
transferred, adapted or modified without the express written approval of VMware, Inc.
www.vmware.com/education
Typographical Conventions
• <ESXi_host_name>
www.vmware.com/education
www.vmware.com/education
Contents
v
Lab 6 Deploying and Configuring NSX Edge Nodes .................................................... 27
Task 1: Prepare for the Lab ........................................................................................................................................ 28
Task 2: Deploy Two NSX Edge Nodes.................................................................................................................. 28
Task 3: Configure an Edge Cluster .......................................................................................................................... 33
Lab 7 Configuring the Tier-1 Gateway................................................................................ 35
Task 1: Prepare for the Lab ........................................................................................................................................ 36
Task 2: Create a Tier-1 Gateway .............................................................................................................................. 36
Task 3: Connect Segments to the Tier-1 Gateway ............................................................................................37
Task 4: Use Network Topology to Validate the Tier-1 Gateway Configuration .....................................37
Task 5: Test East-West L3 Connectivity .............................................................................................................. 38
Lab 8 Creating and Configuring a Tier-0 Gateway with OSPF ................................. 39
Task 1: Prepare for the Lab ........................................................................................................................................ 40
Task 2: Create Uplink Segments ............................................................................................................................... 41
Task 3: Create a Tier-0 Gateway............................................................................................................................. 42
Task 4: Connect the Tier-0 and Tier-1 Gateways .............................................................................................. 45
Task 5: Use Network Topology to Validate the Tier-0 Gateway Configuration ................................... 46
Task 6: Test the End-to-End Connectivity ........................................................................................................... 46
Lab 9 Configuring the Tier-0 Gateway with BGP .......................................................... 49
Task 1: Prepare for the Lab ........................................................................................................................................ 50
Task 2: Create Uplink Segments ............................................................................................................................... 51
Task 3: Create a Tier-0 Gateway............................................................................................................................. 52
Task 4: Connect the Tier-0 and Tier-1 Gateways .............................................................................................. 54
Task 5: Use Network Topology to Validate the Tier-0 Gateway Configuration ................................... 55
Task 6: Test the End-to-End Connectivity ........................................................................................................... 55
Lab 10 Configuring VRF Lite .................................................................................................. 57
Task 1: Prepare for the Lab ........................................................................................................................................ 58
Task 2: Create the Uplink Trunk Segment ............................................................................................................ 59
Task 3: Deploy and Configure the VRF Gateways ........................................................................................... 59
Task 4: Deploy and Connect the Tier-1 Gateways to the VRF Gateways ............................................... 63
Task 5: Create and Connect Segments to the Tier-1 Gateways.................................................................. 64
Task 6: Attach VMs to Segments on Each VRF................................................................................................. 65
Task 7: Test the VRF End-to-End Connectivity ................................................................................................. 66
Task 8: Review the Routing Tables in Each VRF ............................................................................................... 67
vi
Task 9: Verify the Routing Isolation Between VRFs ......................................................................................... 68
Lab 11 Configuring the NSX Distributed Firewall.............................................................. 71
Task 1: Prepare for the Lab .........................................................................................................................................72
Task 2: Test the IP Connectivity ...............................................................................................................................73
Task 3: Create Security Groups................................................................................................................................ 74
Task 4: Create Distributed Firewall Rules ............................................................................................................. 76
Task 5: Test the IP Connectivity After the Firewall Rule Creation.............................................................. 78
Task 6: Prepare for the Next Lab ............................................................................................................................ 79
Lab 12 Configuring the NSX Gateway Firewall ................................................................ 81
Task 1: Prepare for the Lab ........................................................................................................................................ 82
Task 2: Test SSH Connectivity ................................................................................................................................. 82
Task 3: Configure a Gateway Firewall Rule to Block External SSH Requests ........................................ 83
Task 4: Test the Effect of the Configured Gateway Firewall Rule.............................................................. 83
Task 5: Prepare for the Next Lab ............................................................................................................................ 84
Lab 13 Configuring Distributed Intrusion Detection ....................................................... 85
Task 1: Prepare for the Lab ........................................................................................................................................ 86
Task 2: Enable Distributed Intrusion Detection and Prevention ................................................................... 87
Task 3: Download the Intrusion Detection and Prevention Signatures ..................................................... 87
Task 4: Create an Intrusion Detection and Prevention Profile ...................................................................... 88
Task 5: Configure Intrusion Detection Rules ........................................................................................................ 88
Task 6: Generate Malicious Traffic ........................................................................................................................... 89
Task 7: Create a Segment and Attach a VM ....................................................................................................... 90
Task 8: Generate Suspicious Traffic ......................................................................................................................... 91
Task 9: Analyze Intrusion Detection Events ......................................................................................................... 91
Task 10: Modify the IDS/IPS Settings to Prevent Malicious Traffic ............................................................ 93
Task 11: Generate and Analyze Intrusion Prevention Events ......................................................................... 93
Lab 14 (Simulation) Deploying NSX Application Platform ........................................... 95
Lab 15 (Simulation) Configuring Malware Prevention for East-West Traffic ........ 97
Lab 16 (Simulation) Using NSX Network Detection and Response to Detect
Threats .......................................................................................................................................... 99
Lab 17 Configuring Network Address Translation ........................................................ 101
Task 1: Prepare for the Lab ...................................................................................................................................... 102
Task 2: Create a Tier-1 Gateway for Network Address Translation......................................................... 102
vii
Task 3: Create a Segment ........................................................................................................................................ 103
Task 4: Attach a VM to NAT-Segment ............................................................................................................... 104
Task 5: Configure NAT............................................................................................................................................... 104
Task 6: Configure NAT Route Redistribution .................................................................................................... 105
Task 7: Verify the IP Connectivity ..........................................................................................................................107
Lab 18 Configuring NSX Advanced Load Balancer ........................................................ 111
Task 1: Prepare for the Lab ........................................................................................................................................ 112
Task 2: Create Segments for the NSX Advanced Load Balancer .............................................................. 113
Task 3: Deploy the NSX Advanced Load Balancer Controller .....................................................................114
Task 4: Access the NSX Advanced Load Balancer UI..................................................................................... 115
Task 5: Create a Cloud Connector for NSX-T Data Center .......................................................................... 116
Task 6: Configure Service Engine Networks and Routing ..............................................................................119
Task 7: Test the Connectivity to Web Servers ................................................................................................ 120
Task 8: Create a Virtual Service ............................................................................................................................... 121
Task 9: Configure Route Advertisement and Route Redistribution for the Virtual IP......................... 124
Lab 19 Deploying Virtual Private Networks .................................................................... 127
Task 1: Prepare for the Lab .......................................................................................................................................128
Task 2: Deploy a New NSX Edge Node to Support the VPN Deployment ........................................... 129
Task 3: Configure a New Edge Cluster .................................................................................................................. 131
Task 4: Deploy and Configure a New Tier-0 Gateway and Segments for VPN Support ................. 132
Task 5: Create an IPSec VPN Service................................................................................................................... 135
Task 6: Create an L2 VPN Server and Session ................................................................................................. 135
Task 7: Configure a Predeployed Autonomous Edge as an L2 VPN Client ........................................... 137
Task 8: Verify the Operation of the VPN Setup................................................................................................139
Lab 20 Managing Users and Roles ..................................................................................... 141
Task 1: Prepare for the Lab ........................................................................................................................................141
Task 2: Add an Active Directory Domain as an Identity Source .................................................................142
Task 3: Assign NSX Roles to Domain Users and Test Permissions ...........................................................143
Task 4: Modify an Existing Role and Test the Role Permissions ................................................................ 144
viii
Lab 1 Reviewing the Lab Environment
and Topologies
1. Review information that affects the NSX-T Data Center 3.2 ICM lab performance.
• You access and manage the lab environment from the student desktop.
• The student desktop resides on the Management network (SA-Management), and you
can start deploying the various NSX-T Data Center fabric items from the student
desktop.
• A vCenter Server system and NSX Manager instance are predeployed with two clusters
that are populated with various virtual machines.
• At various points in the labs, you are directed to copy and paste information for later
use.
a. When you initially access the student desktop, right-click the Start menu, select Run >
Notepad, and add useful information to the file.
1
Task 2: Review the Networking Topologies
You must review the topology diagrams periodically while configuring the NSX-T Data Center
environment. Your lab environment is highlighted by the Lab Environment topology diagram.
2
Lab 2 Reviewing the Configuration of
the Predeployed NSX Manager
Instance
5. Use the NSX CLI to Review the NSX Management Cluster Information
In this lab environment, you use a single-node NSX cluster. In a production environment, a three-
node cluster must be deployed to provide redundancy and high availability.
• Password: VMware1!
3
Task 2: Prepare for the Lab
You log in to the vSphere Client UI and the NSX UI.
a. Open Chrome.
You must use Chrome as your primary browser, unless specified otherwise.
b. If the page is not loaded by default, click the vSphere > vSphere Client (SA-VCSA-01)
bookmark.
• Password: VMware1!
2. Log in to the NSX UI.
a. If the page is not loaded by default, open a new tab in Chrome and click the NSX-T Data
Center > NSX Manager bookmark.
• Password: VMware1!VMware1!
Task 3: Verify the Licensing for vCenter Server and ESXi Hosts
You verify the licenses of the vCenter Server and ESXi hosts.
1. In the vSphere Client UI, select Administration from the menu in the left pane.
b. Click the vCenter Server Systems tab and view the license expiration date.
4
4. If the license is expired, assign a vCenter Server license key to the vCenter Server instance.
d. In the License key text box, enter or paste the vCenter Server license key.
f. Click OK.
b. Click the Hosts tab and view the license expiration dates.
6. If the licenses are expired, assign a license key to all ESXi hosts.
f. In the License key text box, enter or paste the license key.
h. Click OK.
5
Task 4: Verify the NSX Manager Configuration and Licensing
You examine the configuration and licensing information of the predeployed NSX Manager appliance.
1. On the NSX UI Home page, navigate to System > Configuration > Appliances.
2. Under NSX Appliances, view the information of the predeployed NSX Manager instance
(172.20.10.41), including the IP address, NSX version, cluster status, and resource utilization.
Information appears for only one NSX Manager node because you use a single-node cluster
in this lab.
NOTE
You can safely ignore the A compute manager is required to deploy any
of the appliances below. To add a compute manager, go to the
COMPUTE MANAGERS page. alert. You will add a compute manager later.
3. Verify the license of NSX Manager by clicking System > Settings > Licenses.
4. (Optional) If valid licenses for NSX Data Center Enterprise Plus and NSX Firewall with
Advanced Threat Prevention are not assigned to NSX Manager, go to
https://vmware.bravais.com/s/d9shWBkET2aRGcwmcmTJ and retrieve the NSX Manager
license keys.
6
Task 5: Use the NSX CLI to Review the NSX Management Cluster
Information
You use the NSX CLI to review the configuration and status information of the NSX cluster.
1. On your student desktop, open the MTPuTTY application from the system tray.
NOTE
7
Task 6: Register vCenter Server as a Compute Manager
You configure vCenter Server as a compute manager.
1. On the NSX UI Home page, navigate to System > Configuration > Fabric > Compute
Managers and click +ADD COMPUTE MANAGER.
Option Action
3. Click ADD.
4. When the Thumbprint is Missing message appears, click ADD to use the server's
default thumbprint.
The registration status appears as Registered and the connection status appears as Up.
8
Lab 3 (Simulation) Deploying a Three-
Node NSX Management Cluster
5. Review the NSX Management Cluster Information from the NSX CLI
IMPORTANT
Do not perform the steps from this simulation in your actual lab environment.
Do not refresh, navigate away from, or minimize the browser tab hosting the simulation.
These actions might pause the simulation, and the simulation might not progress.
9
10
Lab 4 Preparing the NSX
Infrastructure
3. Create IP Pools
11
Task 1: Prepare for the Lab
You log in to the NSX UI.
• Password: VMware1!VMware1!
a. On the NSX UI Home page, navigate to System > Configuration > Fabric > Transport
Zones and click +ADD ZONE.
Option Action
c. Click ADD.
2. Create a VLAN-based transport zone to communicate with the non-overlay networks that
are external to NSX-T Data Center.
12
b. In the New Transport Zone window, create a transport zone.
Option Action
c. Click ADD.
1. On the NSX UI Home page, navigate to Networking > IP Management > IP Address Pools
and click ADD IP ADDRESS POOL.
b. Enter IP Pool for ESXi, KVM, and Edge in the Description text box.
c. Click Set under Subnets and select ADD SUBNET > IP Ranges.
4. Click SAVE.
13
Task 4: Prepare the ESXi Hosts
You prepare the ESXi hosts to participate in the virtual networking and security functions offered
by NSX-T Data Center.
1. On the NSX UI Home page, navigate to System > Configuration > Fabric > Nodes > Host
Transport Nodes.
2. From the Managed by drop-down menu, select sa-vcsa-01.vclass.local.
Two clusters appear: Management-Cluster, and Compute-Cluster-02.
3. Expand the Compute-Cluster-02 cluster view.
The NSX Configuration status of the hosts appears as Not Configured and the Node Status
is Not Available.
4. Select the Compute-Cluster-02 check box and click CONFIGURE NSX.
5. In the NSX Installation dialog box, click Create New Transport Node Profile.
6. Provide the required details in the Add Transport Node Profile page.
Option Action
Teaming Policy Uplink Select Uplink 5 for uplink-1 and select Uplink 6 for uplink-2.
Mapping
NOTE
14
7. Click ADD.
The autoinstall process starts, which might take approximately 5 minutes to complete.
9. When the installation completes, verify that NSX is installed on the hosts and the status of
the Compute-Cluster-02 cluster nodes is Up.
You might need to click REFRESH at the bottom to refresh the page.
1. On the NSX UI Home page, navigate to System > Configuration > Fabric > Nodes > Host
Transport Nodes.
c. Provide the configuration details in the Add Host Node Details page.
Option Action
d. Click Next.
15
g. In the Configure NSX window, provide the configuration details.
Option Action
3. Verify that the configuration state appears as Success and the node status appears as Up
for the sa-kvm-01 host.
You might need to refresh the page to update the status of the installation.
16
Lab 5 Configuring Segments
2. Create Segments
17
Task 1: Prepare for the Lab
You log in to the vSphere Client UI and the NSX UI.
a. Open Chrome.
• Password: VMware1!
• Password: VMware1!VMware1!
a. On the NSX UI Home page, navigate to Networking > Connectivity > Segments > NSX.
Option Action
c. Click SAVE.
18
2. Create a segment named App-Segment.
Option Action
b. Click SAVE.
Option Action
b. Click SAVE.
4. Verify that the three segments are created successfully and the Status is Success.
19
Task 3: Attach VMs to Segments
You attach VMs running on the ESXi hosts and KVM hosts to their corresponding segments.
1. In the vSphere Client UI, select Inventory from the menu on the left and navigate to the
Hosts and Clusters tab.
b. From the Network adapter 1 drop-down menu, select Browse, select Web-Segment,
and click OK.
d. Click OK.
b. From the Network adapter 1 drop-down menu, select Browse, select Web-Segment,
and click OK.
d. Click OK.
b. From the Network adapter 1 drop-down menu, select Browse, select Web-Segment,
and click OK.
d. Click OK.
b. From the Network adapter 1 drop-down menu, select Browse, select App-Segment,
and click OK.
d. Click OK.
20
7. Connect sa-db-01 to DB-Segment.
b. From the Network adapter 1 drop-down menu, select Browse, select DB-Segment, and
click OK.
c. Verify that the Connected check box is selected.
d. Click OK.
sudo -s
c. Check the status of the VMs running on the SA-KVM-01 host.
c. On the NSX UI Home page, click Networking > Connectivity > Segments> NSX, click
the vertical ellipsis icon next to Web-Segment, and select Edit.
If the number of ports configured does not appear, click the REFRESH button.
21
e. Provide the details in the Set Segment Ports window.
Option Action
ID Copy and paste the ID (numbers between the single quotes) from the Notepad
file.
f. Click SAVE.
g. Click CLOSE.
3. Click the segment icon under Web-Segment to open a navigation pane on the right and
verify the Web-Segment configuration.
4. Click the 3 VMs icon and verify that sa-web-01, sa-web-02, and sa-web-03-victim are
connected to Web-Segment.
5. Click the segment icon under App-Segment to open a navigation pane on the right and
verify the App-Segment configuration.
6. Click the 1 VMs icon and verify that sa-app-01 is connected to App-Segment.
7. Click the segment icon under DB-Segment to open a navigation pane on the right and verify
the DB-Segment configuration.
8. Click the 1 VMs icon and verify that sa-db-01 is connected to App-Segment.
22
Task 5: Test Layer 2 Connectivity and Verify the Configuration of
Segments
You verify the information about segments from the NSX Manager instance and the data plane.
a. In the vSphere Client UI, select Inventory from the menu on the left and navigate to the
Hosts and Clusters tab.
b. In the Navigator pane, click sa-web-01 and select Launch Web Console.
c. When the web console window opens, click in the window and press Enter to activate
the screen.
ping -c 3 172.16.10.12
This VM resides on an ESXi host. Your ping is successful.
ping -c 3 172.16.10.13
This VM resides on an ESXi host. Your ping is successful.
ping -c 3 172.16.10.14
This VM resides on a KVM host. Your ping is successful.
get logical-switches
sa-nsxmgr-01> get logical-switches
VNI UUID Name
69633 20d91369-b964-4ff6-a8a9-f8c263dc7213 App-Segment
69632 8fd97015-4bdc-47eb-ad98-d67608f82e75 Web-Segment
69634 4fa53e28-3923-4d6f-865c-5736e0e1d02a DB-Segment
23
c. Record the UUID value for Web-Segment in a Notepad file. __________
69632 8fd97015-4bdc-47eb-ad98-d67608f82e75 Web-Segment
The UUIDs in your lab environment might be different.
nsxcli
24
12. Retrieve the segment information from the sa-esxi-05 host.
get logical-switches
A similar output appears:
25
26
Lab 6 Deploying and Configuring NSX
Edge Nodes
27
Task 1: Prepare for the Lab
You log in to the vSphere Client UI and the NSX UI.
a. Open Chrome.
• Password: VMware1!
• Password: VMware1!VMware1!
1. On the NSX UI Home page, navigate to System > Configuration > Fabric > Nodes > Edge
Transport Nodes.
Option Action
4. Click NEXT.
5. On the Credentials page, enter VMware1!VMware1! as the CLI password and the system
root password.
28
6. Turn on the Allow SSH Login and Allow Root SSH Login toggles to display Yes.
7. Click NEXT.
Option Action
9. Click NEXT.
10. On the Configure Node Settings page, provide the configuration details.
Option Action
Management Click the Select Interface link, select pg-SA-Management, and click
Interface SAVE.
29
12. On the Configure NSX page, provide the configuration details.
Option Action
Teaming Policy Uplink Mapping - DPDK Click the Select Interface link, select pg-
Fastpath Interfaces for uplink-1 (active) SA-Edge-Overlay, and click SAVE.
13. On the Configure NSX page, click + ADD SWITCH and provide the configuration details.
Option Action
Teaming Policy Uplink Mapping - DPDK Click the Select Interface link, select pg-
Fastpath Interfaces for uplink-1 (active) SA-Edge-Uplinks, and click SAVE.
The Edge deployment might take several minutes to complete. The deployment status
displays various values, for example, Deployment In Progress.
You must wait for the configuration status to appear as Success and the status as Up. You
can click REFRESH occasionally.
30
15. On the NSX UI Home page, navigate to System > Configuration > Fabric > Nodes > Edge
Transport Nodes , click +ADD EDGE NODE, and provide the configuration details to deploy
the second edge node.
Option Action
b. On the Credentials page, enter VMware1!VMware1! as the CLI password and the
system root password.
c. Turn on the Allow SSH Login and Allow Root SSH Login toggles to display Yes.
d. On the Configure Deployment page, enter the details.
Option Action
Option Action
31
f. On the Configure NSX page, enter the details.
Option Action
Teaming Policy Uplink Mapping - DPDK Click the Select Interface link, select pg-
Fastpath Interfaces for uplink-1 (active) SA-Edge-Overlay, and click SAVE.
g. On the Configure NSX page, click + ADD SWITCH and provide the configuration details.
Option Action
Teaming Policy Uplink Mapping - DPDK Click the Select Interface link, select pg-
Fastpath Interfaces for uplink-1 (active) SA-Edge-Uplinks, and click SAVE.
h. Click FINISH.
The Edge deployment might take several minutes to complete. The deployment status
displays various temporary values, for example, Node Not Ready.
You must wait for the configuration state to appear as Success and the node status as
Up. You can click REFRESH occasionally.
16. Verify that the two edge nodes are deployed and listed in the Edge Node list.
The configuration state appears as Success and the node status appears as Up.
32
Task 3: Configure an Edge Cluster
You create an NSX Edge cluster and add the two NSX Edge nodes to the cluster.
1. On the NSX UI Home page, navigate to System > Configuration > Fabric > Nodes > Edge
Clusters.
Option Action
4. In the Available (2) pane, select sa-nsxedge-01 and sa-nsxedge-02 and click the right arrow
to move these objects to the Selected (0) pane.
5. Click ADD.
You can click REFRESH if Edge-Cluster-01 does not appear after a few seconds.
7. Click 2 in the Edge Transport Nodes column and verify that sa-nsxedge-01 and sa-nsxedge-
02 appear in the list.
33
34
Lab 7 Configuring the Tier-1 Gateway
35
Task 1: Prepare for the Lab
You log in to the vSphere Client UI and the NSX UI.
a. Open Chrome.
• Password: VMware1!
• Password: VMware1!VMware1!
1. On the NSX UI Home page, navigate to Networking > Connectivity > Tier-1 Gateways.
Option Action
Linked Tier-0 Leave the text box blank because the Tier-0 gateway is not yet created.
Gateway
Edge Cluster Leave the text box blank because services are not required at this point.
4. Scroll to the lower portion of the T1-GW-01 gateway and expand Route Advertisement.
36
7. Click SAVE.
8. When a message prompts you to continue editing the Tier-1 gateway, click NO.
1. On the NSX UI Home page, navigate to Networking > Connectivity > Segments > NSX.
2. Click the vertical ellipsis icon next to Web-Segment and select Edit.
3. Click the vertical ellipsis icon next to App-Segment and select Edit.
4. Click the vertical ellipsis icon next to DB-Segment and select Edit.
2. Verify that the Web, App, and DB Segments are connected to the T1-GW-01 gateway.
You might need to zoom in to see the names of the created segments and Tier-1 gateway.
3. Click the gateway icon under T1-GW-01 to open a navigation pane on the right.
37
Task 5: Test East-West L3 Connectivity
You verify east-west connectivity among the tenant networks.
2. If not already logged in, enter root as the user name and VMware1! as the password.
3. From sa-web-01, verify that you can reach the virtual machines in App-Segment and DB-
Segment.
If the pings fail, verify that both virtual machines are powered on.
38
Lab 8 Creating and Configuring a Tier-
0 Gateway with OSPF
39
Task 1: Prepare for the Lab
You log in to the NSX UI.
• Password: VMware1!VMware1!
40
Task 2: Create Uplink Segments
You create a segment for the uplinks used by the Tier-0 gateway to connect to the upstream
router.
1. On the NSX UI Home page, navigate to Networking > Connectivity > Segments > NSX and
click ADD SEGMENT.
Option Action
3. Click SAVE.
4. When a message prompts you to continue configuring the segment, click NO.
5. Click ADD SEGMENT to create another segment for the second uplink.
Option Action
7. Click SAVE.
8. When a message prompts you to continue configuring the segment, click NO.
9. Verify that the two segments for the OSPF uplinks appear in the Segments list.
41
Task 3: Create a Tier-0 Gateway
You create a Tier-0 gateway and use the OSPF protocol to configure it.
1. On the NSX UI Home page, navigate to Networking > Connectivity > Tier-0 Gateways.
Option Action
4. Click SAVE.
5. When a message prompts you to continue editing this Tier-0 gateway, click YES.
Option Action
The MTU value must be the same between neighbor routers to establish OSPF
adjacencies. In this lab, all routers are configured with 1,500 bytes.
b. Click SAVE.
42
8. On the Set Interfaces page, click ADD INTERFACE.
Option Action
The MTU value must be the same between neighbor routers to establish OSPF
adjacencies. In this lab, all routers are configured with 1,500 bytes.
9. Disable BGP.
a. Expand BGP.
f. Click SAVE.
a. Expand OSPF.
b. Turn on the OSPF toggle.
d. In the Set Area Definition window, click ADD AREA DEFINITION and enter 0 in the
Area ID text box.
43
f. Click Set next to OSPF Configured Interfaces.
Option Action
Area ID Select 0.
h. Click SAVE.
Option Action
Area ID Select 0.
l. Click the View link next to OSPF Neighbors to view the OSPF neighbors.
In the OSPF Neighbors, the source IP address 192.168.200.1 and 192.168.210.1 appear
with the state Full.
44
11. Configure route redistribution for OSPF.
Option Action
e. Select the Static Routes and Connected Interfaces & Segments check boxes under
Tier-0 Subnets on the Set Route Re-distribution page.
When you select the Connected Interfaces & Segments check box, all related options
in that category are selected.
f. Select the Connected Interfaces & Segments and Static Routes check boxes under
Advertised Tier-1 Subnets on the Set Route Re-distribution page.
When you select the Connected Interfaces & Segments check box, all related options
in that category are selected.
g. Click APPLY.
1. On the NSX UI Home page, navigate to Networking > Connectivity > Tier-1 Gateways.
2. Click the vertical ellipsis icon next to the T1-GW-01 gateway and select Edit.
3. On the T1-GW-01 edit page, select OSPF-T0-GW-01 from the Linked Tier-0 Gateway drop-
down menu.
45
Task 5: Use Network Topology to Validate the Tier-0 Gateway
Configuration
You using Network Topology to validate the configured Tier-0 gateway.
You might need to zoom in to see the names of the created elements in the Network
Topology diagram.
3. Click the gateway icon under OSPF-T0-GW-01 to open a navigation pane on the right.
4. Double-click the gateway icon under OSPF-T0-GW-01 to open the Fabric View.
In the lab environment, routing was preconfigured on your student desktop, the RRAS server,
and the VyOS router.
1. Ping the 192.168.200.2 and 192.168.210.2 gateway IPs from the console of any tenant VM to
verify connectivity to the uplinks.
a. In the vSphere Client, open a web console to any tenant VM, such as sa-web-01, sa-app-
01, sa-db-01, and so on.
• Password: VMware1!
ping -c 3 192.168.200.2
ping -c 3 192.168.210.2
Your pings are successful.
46
3. Use the command prompt of your student desktop to verify that you can reach all the
tenant VMs.
ping 172.16.10.11
ping 172.16.20.11
ping 172.16.30.11
You can ping any of the tenant networks from your student desktop, which verifies that the
north-south routing is working correctly.
c. If prompted, click Advanced and click the Proceed to 172.16.10.11 (unsafe) link to
accept the certificate.
47
48
Lab 9 Configuring the Tier-0 Gateway
with BGP
49
Task 1: Prepare for the Lab
You log in to the NSX UI.
• Password: VMware1!VMware1!
50
Task 2: Create Uplink Segments
You create segments for the two uplinks used by the Tier-0 gateway to connect to the
upstream router.
1. On the NSX UI Home page, navigate to Networking > Connectivity > Segments > NSX and
click ADD SEGMENT.
Option Action
3. Click SAVE.
4. When a message prompts you to continue configuring the segment, click NO.
5. Click ADD SEGMENT to create another segment for the second uplink.
Option Action
7. Click SAVE.
8. When a message prompts you to continue configuring the segment, click NO.
9. Verify that the two segments for the Tier-0 gateway uplinks appear in the Segments list.
51
Task 3: Create a Tier-0 Gateway
You create a Tier-0 gateway and use the BGP protocol to configure it.
1. On the NSX UI Home page, navigate to Networking > Connectivity > Tier-0 Gateways.
Option Action
4. Click SAVE.
5. When a message prompts you to continue editing this Tier-0 gateway, click YES.
Option Action
b. Click SAVE.
52
8. On the Set Interfaces page, click ADD INTERFACE.
Option Action
Option Action
b. Click SAVE.
Option Action
d. Click SAVE.
e. Click CLOSE.
f. Click SAVE.
53
12. Expand ROUTE RE-DISTRIBUTION and click Set.
Option Action
c. Select the Static Routes and Connected Interfaces & Segments check boxes under
Tier-0 Subnets on the Set Route Re-distribution page.
When you select the Connected Interfaces & Segments check box, all related options
in that category are selected.
d. Select the Connected Interfaces & Segments and Static Routes check boxes under
Advertised Tier-1 Subnets on the Set Route Re-distribution page.
When you select the Connected Interfaces & Segments check box, all related options
in that category are selected.
1. On the NSX UI Home page, navigate to Networking > Connectivity > Tier-1 Gateways.
2. Click the vertical ellipsis icon next to the T1-GW-01 gateway and select Edit.
3. On the T1-GW-01 edit page, select BGP-T0-GW-01 from the Linked Tier-0 Gateway drop-
down menu.
54
Task 5: Use Network Topology to Validate the Tier-0 Gateway
Configuration
You use Network Topology to validate the configured Tier-0 gateway.
You might need to zoom in to see the names of the created elements in the Network
Topology diagram.
3. Click the gateway icon under BGP-T0-GW-01 to open a navigation pane on the right.
Verify that 192.168.100.1 and 192.168.110.1 appear with the Success as the status.
5. Click CLOSE.
6. Double-click the gateway icon under BGP-T0-GW-01 to open the Fabric View.
1. Ping the 192.168.100.2 and 192.168.110.2 gateway IPs from the console of any tenant VM to
verify connectivity to the uplinks.
a. In the vSphere Client, open a web console to any tenant VM, such as sa-web-01, sa-app-
01, sa-db-01, and so on.
• Password: VMware1!
ping -c 3 192.168.100.2
ping -c 3 192.168.110.2
Your pings are successful.
55
3. Use the command prompt of your student desktop to verify that you can reach all the
tenant VMs.
ping 172.16.10.11
ping 172.16.20.11
ping 172.16.30.11
You can ping any of the tenant networks from your student desktop, which verifies that the
north-south routing is working properly.
56
Lab 10 Configuring VRF Lite
57
Task 1: Prepare for the Lab
You log in to the vSphere Client UI and the NSX UI.
a. Open Chrome.
• Password: VMware1!
• Password: VMware1!VMware1!
58
Task 2: Create the Uplink Trunk Segment
You create the uplink trunk segment that is connected to the uplink interfaces of each VRF
gateway.
1. In the NSX UI, navigate to Networking > Connectivity > Segments > NSX.
3. When the Segment wizard appears, configure the uplink trunk segment for the VRF
Gateways uplink interfaces.
Option Action
1. In the NSX UI, navigate to Networking > Connectivity > Tier-0 Gateways.
a. Click ADD GATEWAY and select VRF from the drop-down menu to deploy the first
VRF gateway.
b. When the VRF Gateway wizard appears, configure the VRF gateway for VRF Red.
Option Action
59
c. Click SAVE and click YES at the Want to continue configuring this
Tier-0 Gateway? prompt.
3. Configure uplink interfaces for VRF Red.
c. Configure the uplink interface for the T0-GW-VRF-Red VRF gateway in the ADD
INTERFACE wizard.
Option Action
a. Expand BGP.
d. When the Set BGP Neighbors window appears, click ADD BGP NEIGHBOR and set up
the peering with the upstream router.
Option Action
60
5. Scroll to the lower portion of the T0-GW-VRF-Red gateway, expand ROUTE RE-
DISTRIBUTION, and click Set.
d. Select the Connected Interfaces & Segments and Static Routes check boxes under
Tier-0 Subnets on the Set Route Re-distribution page.
When you select the Connected Interfaces & Segments check box, all the related
check boxes are selected.
e. Select the Connected Interfaces & Segments and Static Routes check boxes under
Advertised Tier-1 Subnets on the Set Route Re-distribution page.
When you select the Connected Interfaces & Segments check box, all the related
check boxes are selected.
7. Click APPLY.
8. Under Route Re-distribution, verify that the BGP Status toggle is turned on and click SAVE.
9. Click CLOSE EDITING to finish configuring the VRF gateway configuration for VRF Red.
a. Click ADD GATEWAY and select VRF from the drop-down menu to deploy the second
VRF gateway.
b. When the VRF Gateway wizard appears, configure the VRF gateway for VRF Blue.
Option Action
c. Click SAVE and click YES at the Want to continue configuring this
Tier-0 Gateway? prompt.
11. Configure the uplink interfaces for VRF Blue.
61
c. Configure the uplink interface for the T0-GW-VRF-Blue VRF gateway from the ADD
INTERFACE wizard.
Option Action
a. Expand BGP.
d. When the Set BGP Neighbors window appears, click ADD BGP NEIGHBOR and set up
the peering with the upstream router.
Option Action
13. Scroll to the lower portion of the T0-GW-VRF-Blue gateway, expand ROUTE RE-
DISTRIBUTION, and click Set.
62
c. Click Set under Route Re-distribution.
d. Select the Connected Interfaces & Segments and Static Routes check boxes under
Tier-0 Subnets on the Set Route Re-distribution page.
When you select the Connected Interfaces & Segments check box, all the related
check boxes are selected.
e. Select the Connected Interfaces & Segments and Static Routes check boxes under
Advertised Tier-1 Subnets on the Set Route Re-distribution page.
When you select the Connected Interfaces & Segments check box, all the related
check boxes are selected.
16. Under Route Re-distribution, verify that the BGP Status toggle is turned on and click SAVE.
17. Click CLOSE EDITING to finish the VRF gateway configuration for VRF Blue.
1. In the NSX UI, navigate to Networking > Connectivity > Tier-1 Gateways.
2. Click ADD TIER-1 GATEWAY to add the Tier-1 gateway connected to VRF Red.
3. Configure the Tier-1 gateway in the ADD TIER-1 GATEWAY window for VRF Red.
Option Action
Edge Cluster Leave blank because no services are required for this lab.
5. Turn on the All Static Routes and All Connected Segments & Service Ports toggles.
6. Click SAVE and click NO at the Want to continue configuring the Tier-1
Gateway? prompt.
7. Click ADD TIER-1 GATEWAY to add the Tier-1 gateway connected to VRF Blue.
63
8. Configure the Tier-1 gateway in the ADD TIER-1 GATEWAY window for VRF Blue.
Option Action
Edge Cluster Leave blank because no services are required for this lab.
10. Turn on the All Static Routes and All Connected Segments & Service Ports toggles.
11. Click SAVE and click NO at the Want to continue configuring the Tier-1
Gateway? prompt.
a. In the NSX UI, navigate to Networking > Connectivity > Segments > NSX .
Option Action
c. Click SAVE.
64
2. Create a segment named VRF-Blue-Segment.
a. In the NSX UI, navigate to Networking > Connectivity > Segments > NSX.
Option Action
c. Click SAVE.
1. In the vSphere Client UI, select Inventory from the menu on the left and navigate to the
Hosts and Clusters tab.
d. Click OK.
d. Click OK.
65
Task 7: Test the VRF End-to-End Connectivity
You test the connectivity from VMs, which are connected to segments, to the remote networks.
These remote networks are preconfigured in each VRF. You verify that the end-to-end
connectivity is working.
In the lab environment, routing was preconfigured in the upstream FRR router SA-FRR-01.
a. In the Navigator pane, click Ubuntu-01a and select Launch Web Console.
b. When the web console window opens, click in the window and press Enter to activate
the screen.
2. Verify connectivity in VRF Red by pinging from the Ubuntu-01a VM console to the 10.0.10.11
IP in the remote network 10.0.10.0/24, which is routed through the upstream FRR router.
ping -c 3 10.0.10.11
The pings are successful.
3. Verify the route that the packets follow in VRF Red to reach the remote IP 10.0.10.11 by
running the traceroute command from the Ubuntu-01a console.
traceroute -n 10.0.10.11
The T1-GW-VRF-Red and T0-GW-VRF-Red hops appear in the traceroute before reaching
remote IP 10.0.10.11.
a. In the Navigator pane, click Ubuntu-02a and select Launch Web Console.
b. When the web console window opens, click in the window and press Enter to activate
the screen.
5. Verify the connectivity in VRF Blue by pinging from the Ubuntu-02a VM console to IP 10.0.20.11
in the remote network 10.0.20.0/24, which is routed through the upstream FRR router.
ping -c 3 10.0.20.11
The pings are successful.
6. Verify the route that the packets follow in VRF Blue to reach the remote IP 10.0.20.11 by
running the traceroute command from the Ubuntu-02a console.
traceroute -n 10.0.20.11
The T1-GW-VRF-Blue and T0-GW-VRF-Blue hops appear in the traceroute before reaching
remote IP 10.0.20.11.
66
Task 8: Review the Routing Tables in Each VRF
You review the routing tables in each VRF.
get logical-routers
The VRF ID for the SR-VRF-T0-GW-VRF-Red logical router is 6. The VRF ID might be
different in your lab environment.
3. Enter into the VRF context for the SR-VRF-T0-GW-VRF-Red logical router.
vrf 6
The prompt changes to sa-nsxedge-02(tier0_vrf_sr[6]).
get route
All the routes in the VRF, including Tier0-Connected, Tier1-Connected, and BGP types,
appear.
exit
The prompt changes to sa-nsxedge-02.
get logical-routers
The VRF ID for the SR-VRF-T0-GW-VRF-Blue logical router is 7. The VRF ID might be
different in your lab environment.
67
8. Enter the SR-VRF-T0-GW-VRF-Blue logical router into the vrf context.
vrf 7
The prompt changes to sa-nsxedge-02(tier0_vrf_sr[7]).
NOTE
The 172.16.40.0/24 network also appears in the VRF Red routing table in an earlier step.
VMs in different VRFs can be connected to overlapping networks.
11. Exit the VRF context and return to the edge prompt.
exit
The prompt changes to sa-nsxedge-02.
1. Verify the lack of connectivity between VMs connected to different VRFs even though they
are using the same 172.16.40.0/24 subnet address.
ping -c 3 172.16.40.12
The pings are not successful.
68
2. Verify the lack of connectivity from the Ubuntu-01a VM in VRF Red to the 10.0.20.0/24
remote network IP in VRF Blue by pinging from the Ubuntu-01a console to the 10.0.20.11
remote network IP.
ping -c 3 10.0.20.11
The pings are not successful.
3. Verify the lack of connectivity in the other direction by pinging from the Ubuntu-02a VM to
the Ubuntu-01a VM IP 172.16.40.11.
ping -c 3 172.16.40.11
The pings are not successful.
4. Verify the lack of connectivity from the Ubuntu-02a VM in VRF Blue to the 10.0.10.0/24
remote network IP in VRF Red by pinging from the Ubuntu-02a console to the 10.0.10.11
remote network IP.
ping -c 3 10.0.10.11
The pings are not successful.
69
70
Lab 11 Configuring the NSX
Distributed Firewall
71
Task 1: Prepare for the Lab
You log in to the NSX UI.
• Password: VMware1!VMware1!
72
Task 2: Test the IP Connectivity
You verify the IP connectivity among the virtual machines in the 3-Tier application.
curl -k https://172.16.20.11:8443/cgi-bin/app.py
b. Verify that an HTTPS response is returned from sa-app-01.
4. Test access to the database server over the MySQL port 3306.
curl http://172.16.30.11:3306/cgi-bin/data.py
c. Verify that the data is successfully returned from sa-db-01.
73
Task 3: Create Security Groups
You create three dynamic security groups and one static security group for the future definition
of firewall rules.
2. Add a group.
c. Click the Set link under Compute Members and click +ADD CRITERION.
4. Verify that the sa-web-01, sa-web-02, sa-web-03-victim, and sa-web-04 virtual machines
are listed and click CLOSE.
5. Add a group.
c. Click the Set link under Compute Members and click +ADD CRITERION.
7. Verify that the sa-app-01 virtual machine is listed and click CLOSE.
74
8. Add a group.
c. Click the Set link under Compute Members and click +ADD CRITERION.
10. Verify that the sa-db-01 virtual machine is listed and click CLOSE.
f. Find and select the App-Servers, DB-Servers, and Web-Servers check boxes.
12. Click the View Members link for the 3-Tier group.
13. Verify that all VMs for the 3-tier application are listed and click CLOSE.
75
Task 4: Create Distributed Firewall Rules
You create distributed firewall rules to manage traffic between applications.
1. In the NSX UI, navigate to Security > Policy Management > Distributed Firewall.
2. Navigate to the Category Specific Rules tab and click the APPLICATION section.
4. After the row for the new policy appears, enter EXTERNAL ACCESS POLICY as the
name.
5. Click the vertical ellipsis icon near EXTERNAL ACCESS POLICY and select Add Rule.
a. In the Name column, enter Allow External Web Traffic as the name of the
new rule.
c. In the Destinations column, click the pencil icon, select the Web-Servers check box, and
click APPLY.
d. In the Services column, click the pencil icon, select the HTTPS check box, and click
APPLY.
f. In the Applied To column, click the pencil icon, click Groups, select the Web-Servers
check box, and click APPLY.
7. Click the vertical ellipsis icon near EXTERNAL ACCESS POLICY and select Add Policy
Below.
8. After the row for the new policy appears, enter 3-TIER POLICY as the name.
9. Click the vertical ellipsis icon near 3-TIER POLICY and select Add Rule to add three
distributed firewall rules.
IMPORTANT
Perform this step thrice to add three new distributed firewall rules under 3-TIER POLICY.
76
10. In the first row, configure the rule.
a. In the Name column, enter Allow Web Traffic as the name of the new rule.
b. In the Sources column, click the pencil icon, select the Web-Servers check box, and click
APPLY.
c. In the Destinations column, click the pencil icon, select the App-Servers check box, and
click APPLY.
d. In the Services column, click the pencil icon, click the Raw Port-Protocols tab, and click
ADD SERVICE ENTRY.
e. Select TCP from the Service Type drop-down menu, leave the Source Ports text box
blank, enter 8443 as the destination port, and click APPLY.
g. In the Applied To column, click the pencil icon, click Groups, select the Web-Servers and
App-Servers check boxes, and click APPLY.
a. In the Name column, enter Allow DB Traffic as the name of the new rule.
b. In the Sources column, click the pencil icon, select the App-Servers check box, and click
APPLY.
c. In the Destinations column, click the pencil icon, select the DB-Servers check box, and
click APPLY.
d. In the Services column, click the pencil icon, select the MySQL check box, and click
APPLY.
f. In the Applied To column, click the pencil icon, click Groups, select the App-Servers and
DB-Servers check boxes, and click APPLY.
77
12. In the third row, configure the rule.
a. In the Name column, enter Reject All Other Traffic as the name of the new
rule.
b. In the Sources column, click the pencil icon, select the 3-Tier check box, and click
APPLY.
c. In the Destinations column, click the pencil icon, select the 3-Tier check box, and click
APPLY.
f. In the Applied To column, click the pencil icon, click Groups, select the 3-Tier check box,
and click APPLY.
All pings fail because a distributed firewall rule is configured to reject all traffic that is not
explicitly allowed between the Web, App, and DB VMs.
NOTE
The ping also fails for virtual machines in the same segment because an explicit rule does not
exist to allow traffic from the sa-web-01 machine to the sa-web-02 machine in Web-
Segment.
78
3. Test the HTTPS access to the application server.
curl -k https://172.16.20.11:8443/cgi-bin/app.py
b. Verify that an HTTPS response is returned from sa-app-01.
4. Test access to the database server over the MySQL port 3306.
5. From the sa-app-01 console, try to open an SSH session to sa-db-01 to verify that only the
MySQL traffic is allowed between sa-app-01 and sa-db-01.
ssh 172.16.30.11
The connection is refused.
1. On the NSX UI Home page, navigate to Security > Policy Management > Distributed
Firewall > Category Specific Rules > APPLICATION.
2. Click the vertical ellipsis icon near EXTERNAL ACCESS POLICY and select Disable All
Rules.
3. Click the vertical ellipsis icon near 3-TIER POLICY and select Disable All Rules.
4. Click PUBLISH.
79
80
Lab 12 Configuring the NSX Gateway
Firewall
81
Task 1: Prepare for the Lab
You log in to the vSphere Client UI and the NSX UI.
a. Open Chrome.
• Password: VMware1!
• Password: VMware1!VMware1!
1. Use MTPuTTY on your student desktop to open the preconfigured SSH connections to sa-
web-01, sa-app-01, and sa-db-01.
ssh 172.16.20.11
b. If prompted to continue connecting, enter yes and press Enter.
exit
82
Task 3: Configure a Gateway Firewall Rule to Block External SSH
Requests
You configure a gateway firewall rule to block SSH requests from external networks.
1. On the NSX UI Home page, navigate to Security > Policy Management > Gateway Firewall
> Gateway Specific Rules.
4. When the row for the new policy appears, enter BLOCK EXTERNAL SSH TRAFFIC as
the name.
5. Click the vertical ellipsis icon near the BLOCK EXTERNAL SSH TRAFFIC policy and select
Add Rule.
c. In the Destinations column, click the pencil icon, select the 3-Tier check box, and click
APPLY.
d. In the Services column, click the pencil icon, select the SSH check box in the Set
Services page, and click APPLY.
7. Click PUBLISH.
1. Open MTPuTTY from the student desktop and try to connect to sa-web-01, sa-app-01, and
sa-db-01.
83
3. From the sa-web-01 console, open an SSH connection to sa-app-01.
If not already logged in, use the following credentials for sa-web-01:
• Password: VMware1!
The connection is successful because the gateway firewall rule that you configured does
not affect the east-west traffic.
exit
1. On the NSX UI Home page, navigate to Security > Policy Management > Gateway Firewall
> Gateway Specific Rules.
3. Click the vertical ellipsis icon near the BLOCK EXTERNAL SSH TRAFFIC policy and select
Disable All Rules.
4. Click PUBLISH.
5. Open MTPuTTY from the desktop and connect to sa-web-01, sa-app-01, and sa-db-01.
6. Verify that SSH connections are allowed from the external network.
84
Lab 13 Configuring Distributed
Intrusion Detection
85
Task 1: Prepare for the Lab
You log in to the vSphere Client UI and the NSX UI.
a. Open Chrome.
• Password: VMware1!
• Password: VMware1!VMware1!
86
Task 2: Enable Distributed Intrusion Detection and Prevention
You enable Distributed Intrusion Detection and Prevention for the Compute-Cluster-02 vSphere
cluster.
1. On the NSX UI Home page, navigate to Security > Policy Management > IDS/IPS &
Malware Prevention.
2. When the message to set up IDS/IPS and Malware Prevention appears, click SKIP SETUP.
3. Click SKIP SETUP to confirm that you want to skip the setup.
5. On the Shared Settings tab, navigate to Activate Hosts & Clusters for East-West Traffic.
7. When the Are you sure you want to Enable Intrusion Detection
and Prevention for selected clusters? message appears, click YES and
verify that the IDS/IPS status is changed to On.
2. Under Intrusion Detection and Prevention Signatures, verify the current version of the
IDS/IPS signatures and the last time they were downloaded.
3. In the Intrusion Detection Signatures section, select the Auto Update new versions
(recommended) check box.
IMPORTANT
If a message indicates that a new update is available, do not click the Update Now link. If you
click the link, the lab works, but the number of IDS/IPS events might differ.
87
Task 4: Create an Intrusion Detection and Prevention Profile
You create custom Intrusion Detection and Prevention profiles for different types of signatures.
Option Action
Severities to Deselect the Medium and Low check boxes and leave the Critical, High,
Include and Suspicious check boxes selected.
4. Click SAVE.
5. Verify that Success appears as the status for the IDS/IPS Profile.
4. Click the vertical ellipsis icon near IDS/IPS Policy and select Add Rule.
88
5. Configure the new rule.
e. In the Security Profiles column, click the pencil icon, select the IDS/IPS Profile check
box, and click APPLY.
2. Initiate the CouchDB Command Execution attack against the sa-web-03-victim virtual
machine.
sudo ./attack.sh
When prompted, you can enter VMware1! as the root password.
89
[*] Local IP: http://172.20.10.16:8080/XuD2rB
[*] 172.16.10.13:5984 - The 1 time to exploit
[*] Client 172.16.10.13 (curl/7.38.0) requested /XuD2rB
[*] Sending payload to 172.16.10.13 (curl/7.38.0)
[*] Command shell session 1 opened (172.20.10.101:4446 ->
172.16.10.13:35558) at 2021-06-04 06:19:59 -0500
[+] Deleted /tmp/jmiomsnv
[+] Deleted /tmp/qdlwxouzeaemx
[*] Server stopped.
[*] Session 1 created in the background.
A command shell session was successfully opened to the sa-web-03-victim virtual machine
and two commands to delete folders were run.
1. On the NSX UI Home page, navigate to Networking > Connectivity > Segments > NSX and
click ADD SEGMENT.
Option Action
3. Click SAVE.
4. When the Want to continue this Segment message appears, click No.
6. In the vSphere Client UI, select Inventory from the menu on the left and navigate to the
Hosts and Clusters tab.
90
8. Connect sa-patchvm-01 to the Security-Segment segment.
b. From the Network adapter 1 drop-down menu, select Browse, select Security-
Segment, and click OK.
c. Verify that the Connected check box is selected.
d. Click OK.
sudo -s
You can use VMware1! as the password.
cd /root
4. Replay a .pcap file to generate a suspicious threat event.
1. On the NSX UI Home page, navigate to Security > Threat Detection & Response > IDS/IPS.
2. Verify that at least one high event and one suspicious event appear in the histogram.
3. Point to the orange dot to gather additional information about the intrusion, including its
severity, type, total number of attempts, and when it was first started.
4. Navigate to the bottom of the dashboard and expand the event with the SLR Alert -
Apache CouchDB Remote Privilege Escalation details.
2017-12635 is an example CVE. You will need the CVEs later in the lab.
91
6. Use the Intrusion Activity diagram to verify that the event was only detected but not
prevented.
7. Click the View Full Event History link to obtain specific details about each occurrence of the
attack.
9. Point to the purple dot to gather additional information about the intrusion, including its
severity, type, total number of attempts, and when it was first started.
NOTE
If a purple dot does not appear, generate suspicious traffic once again.
10. Navigate to the bottom of the dashboard and expand the event with suspicious severity,
which is labeled as NSX - Detect VMware NSX TEST.
NOTE
Multiple events might be labelled as NSX-Detect VMware NSX Test. Ensure that you expand
the event with suspicious severity.
11. From the Event details, verify the value for each parameter of the IDS/IPS event.
Parameter Value
Severity Suspicious
Target IP 172.20.10.105
Service HTTP
Signature ID 1102996
12. From the IDS/IPS event, click View Full Event History to see the Intrusion History details.
92
Task 10: Modify the IDS/IPS Settings to Prevent Malicious Traffic
You modify the IDS/IPS settings and rules to prevent malicious traffic.
1. On the NSX UI Home page, navigate to Security > Policy Management > IDS/IPS &
Malware Prevention > Distributed Rules.
3. Find the IDS/IPS rule and select Detect and Prevent from the Mode drop-down menu.
4. Click PUBLISH.
6. Click the View and manage global signature set >> link.
7. Enter the CVEs that you gathered in the previous task in the search text box.
Example: 2017-12635.
8. Verify that the action for the signature returned by the search is set to Reject.
9. Click SAVE.
2. Initiate the CouchDB Command Execution attack against the sa-web-03-victim virtual
machine.
sudo ./attack.sh
When prompted, you can enter VMware1! as the root password.
93
[*] Started reverse TCP handler on 172.20.10.101:4446
[*] Generating curl command stager
[*] Using URL: http://0.0.0.0:8080/4OngmHX0XB722N
[*] Local IP: http://172.20.10.101:8080/4OngmHX0XB722N
[*] 172.16.10.13:5984 - The 1 time to exploit
[-] Exploit failed: NoMethodError undefined method `[]' for
nil:NilClass
[*] Server stopped.
[!] This exploit may require manual cleanup of '/tmp/lbculbdr'
on the target
[!] This exploit may require manual cleanup of
'/tmp/cdsnpxnpbpkhqcn' on the target
[*] Exploit completed, but no session was created.
4. Enter exit -y to close the shell session.
5. On the NSX UI Home page, navigate to Security > Threat Detection & Response > IDS/IPS.
6. Find and expand the event with the SLR Alert - Apache CouchDB Remote Privilege
Escalation details.
7. On the Intrusion Activity diagram, verify that the attack was prevented.
94
Lab 14 (Simulation) Deploying NSX
Application Platform
5. Validate the NSX Application Platform Deployment from the Tanzu Kubernetes Cluster
95
From your local desktop, go to https://vmware.bravais.com/s/8t2MxGWS0Tt53ikHudBE to
open the simulation.
IMPORTANT
Do not perform the steps from this simulation in your actual lab environment.
Do not refresh, navigate away from, or minimize the browser tab hosting the simulation.
These actions might pause the simulation, and the simulation might not progress.
96
Lab 15 (Simulation) Configuring
Malware Prevention for East-West
Traffic
97
From your local desktop, go to https://vmware.bravais.com/s/komCmXmyDc4EA7PGwctz to
open the simulation.
IMPORTANT
Do not perform the steps from this simulation in your actual lab environment.
Do not refresh, navigate away from, or minimize the browser tab hosting the simulation.
These actions might pause the simulation, and the simulation might not progress.
98
Lab 16 (Simulation) Using NSX
Network Detection and Response to
Detect Threats
2. Validate the NSX Network Detection and Response Deployment from the CLI
99
From your local desktop, go to https://vmware.bravais.com/s/dnfxNCOufIeEJXRl6JCs to open
the simulation.
IMPORTANT
Do not perform the steps from this simulation in your actual lab environment.
Do not refresh, navigate away from, or minimize the browser tab hosting the simulation.
These actions might pause the simulation, and the simulation might not progress.
100
Lab 17 Configuring Network Address
Translation
3. Create a Segment
4. Attach a VM to NAT-Segment
5. Configure NAT
101
Task 1: Prepare for the Lab
You log in to the vSphere Client UI and the NSX UI.
a. Open Chrome.
• Password: VMware1!
• Password: VMware1!VMware1!
1. On the NSX UI Home page, navigate to Networking > Connectivity > Tier-1 Gateways and
click ADD TIER-1 GATEWAY.
Option Action
Route Advertisement Turn on the All Static Routes, All Connected Segments &
Service Ports, and All NAT IPs toggles.
102
3. Click SAVE.
4. If a message prompts you to continue editing the Tier-1 gateway, click NO.
5. Verify that the T1-GW-02-NAT gateway appears in the Tier-1 Gateway list and the status is
Success.
1. On the NSX UI Home page, navigate to Networking > Connectivity > Segments > NSX and
click ADD SEGMENT.
Option Action
3. Click SAVE.
4. When the Want to continue this Segment message appears, click No.
103
Task 4: Attach a VM to NAT-Segment
You attach the T2-NAT-01 VM to the newly created NAT segment.
1. On the vSphere Client Home page, navigate to Inventory > Hosts and Clusters.
3. In the Network adapter 1 drop-down menu, click Browse, select NAT-Segment, and click
OK.
5. Click OK.
1. On the NSX UI Home page, navigate to Networking > Network Services > NAT.
Option Action
5. Click SAVE.
7. Verify that T1-GW-02-NAT is still selected in the Gateway drop-down menu and click ADD
NAT RULE again.
104
8. Provide the configuration details in the New NAT Rule window.
Option Action
9. Click SAVE.
1. Use MTPuTTY to connect to sa-vyos-01 and verify that the 172.16.101.0/24 route is
advertised by entering show ip route.
105
C>* 172.20.11.0/24 is directly connected, eth1
C>* 192.168.100.0/24 is directly connected, eth2.100
C>* 192.168.110.0/24 is directly connected, eth2.110
C>* 192.168.120.0/24 is directly connected, eth2.120
C>* 192.168.130.0/24 is directly connected, eth2.130
O 192.168.200.0/24 [110/10] is directly connected, eth2.200,
04:14:13
C>* 192.168.200.0/24 is directly connected, eth2.200
O 192.168.210.0/24 [110/10] is directly connected, eth2.210,
04:14:13
C>* 192.168.210.0/24 is directly connected, eth2.210
2. On the Tier-0 Gateway, redistribute the NAT route (80.80.80.1/32) so that the upstream
router learns about it.
a. On the NSX UI Home page, navigate to Networking > Connectivity > Tier-0 Gateways.
b. Click the vertical ellipsis icon next to BGP-T0-GW-01 and select Edit from the menu.
c. Expand ROUTE RE-DISTRIBUTION and click 1, which is the current count value.
d. Click the vertical ellipsis icon next to BGP-Route-Redistribution and select Edit from the
menu.
g. Click APPLY.
4. Switch back to the MTPuTTY connection for sa-vyos-01 and enter show ip route
again to verify that 80.80.80.1/32 appears.
106
B>* 172.16.20.0/24 [20/0] via 192.168.100.2, eth2.100, 05:48:13
* via 192.168.110.2, eth2.110, 05:48:13
B>* 172.16.30.0/24 [20/0] via 192.168.100.2, eth2.100, 05:48:13
* via 192.168.110.2, eth2.110, 05:48:13
B>* 172.16.101.0/24 [20/0] via 192.168.100.2, eth2.100,
01:42:01
* via 192.168.110.2, eth2.110,
01:42:01
C>* 172.20.10.0/24 is directly connected, eth0
C>* 172.20.11.0/24 is directly connected, eth1
C>* 192.168.100.0/24 is directly connected, eth2.100
C>* 192.168.110.0/24 is directly connected, eth2.110
C>* 192.168.120.0/24 is directly connected, eth2.120
C>* 192.168.130.0/24 is directly connected, eth2.130
O 192.168.200.0/24 [110/10] is directly connected, eth2.200,
05:48:20
C>* 192.168.200.0/24 is directly connected, eth2.200
O 192.168.210.0/24 [110/10] is directly connected, eth2.210,
05:48:20
C>* 192.168.210.0/24 is directly connected, eth2.210
2. Retrieve gateway instances and identify the virtual routing and forwarding (VRF) instance
context for SR-BGP-T0-GW-01.
get logical-routers
sa-nsxedge-02> get logical-routers
Tue Oct 19 2021 UTC 16:55:30.094
Logical Router
UUID VRF LR-
ID Name Type
Ports Neighbors
736a80e3-23f6-5a2d-81d6-
bbefb2786666 0 0
TUNNEL 3 4/5000
314ad7e8-15dc-46e0-9396-8d3b788fce86 1 5 SR-BGP-T0-
GW-
01 SERVICE_ROUTER_TIER0 8 2/5000
0
c99c88c7-146c-4946-8fda-8ccce5580b1d 3 4 DR-BGP-T0-
107
GW-
01 DISTRIBUTED_ROUTER_TIER0 6 2/5000
0
a29d6b1f-8955-4f92-9cc6-7ecbbf74beb9 5 1 DR-T1-GW-
01 DISTRIBUTED_ROUTER_TIER1 7 3/
50000
53155656-0295-44de-a030-e0562f1644f4 6 9 SR-VRF-T0-
GW-VRF-
Red VRF_SERVICE_ROUTER_TIER0 5 0/50000
b3755f3e-0097-44e5-a0b4-f9ce722f2d6c 7 8 DR-VRF-T0-
GW-VRF-Red VRF_DISTRIBUTED_ROUTER_TIER0
4 2/50000
8ee4ffbf-4a23-4293-916d-02ac4ab8a614 8 11 DR-VRF-T0-
GW-VRF-Blue VRF_DISTRIBUTED_ROUTER_TIER0
4 2/50000
1c55ed99-b0a7-43c7-bbe1-f126432b9920 9 12 SR-VRF-T0-
GW-VRF-
Blue VRF_SERVICE_ROUTER_TIER0 5 0/50000
c9c6fda4-66a4-4303-94f0-748427a8e9ca 10 14 DR-T1-GW-
VRF-
Red DISTRIBUTED_ROUTER_TIER1 5 3/5000
0
45f843f2-adfa-4f56-8027-f6e04b0ef37c 11 15 DR-T1-GW-
VRF-
Blue DISTRIBUTED_ROUTER_TIER1 5 3/5000
0
080f91b3-00c6-4aa3-b186-22b61c57efd9 12 17 SR-T1-GW-
02-
NAT SERVICE_ROUTER_TIER1 5 2/500
00
13127c88-10b5-46ff-a3bd-76e7b288dfc1 13 16 DR-T1-GW-
02-
NAT DISTRIBUTED_ROUTER_TIER1 4 0/500
00
In the command output, the VRF ID for SR-BGP-T0-GW-01 is 1. The VRF ID in your lab might
be different.
3. Access the VRF for SR-BGP-T0-GW-01 and view the routing table of the Tier-0 SR.
vrf 1
get route
sa-nsxedge-02> vrf 1
sa-nsxedge-02(tier0_sr[1])> get route
108
Flags: t0c - Tier0-Connected, t0s - Tier0-Static, b - BGP, o -
OSPF
t0n - Tier0-NAT, t1s - Tier1-Static, t1c - Tier1-Connected,
t1n: Tier1-NAT, t1l: Tier1-LB VIP, t1ls: Tier1-LB SNAT,
t1d: Tier1-DNS FORWARDER, t1ipsec: Tier1-IPSec, isr: Inter-SR,
> - selected route, * - FIB route
109
05:57:27
b > * 192.168.120.0/24 [20/66] via 192.168.110.1, uplink-283,
05:57:27
b > * 192.168.130.0/24 [20/66] via 192.168.100.1, uplink-280,
05:57:27
b > * 192.168.130.0/24 [20/66] via 192.168.110.1, uplink-283,
05:57:27
b > * 192.168.200.0/24 [20/66] via 192.168.100.1, uplink-280,
05:57:27
b > * 192.168.200.0/24 [20/66] via 192.168.110.1, uplink-283,
05:57:27
b > * 192.168.210.0/24 [20/66] via 192.168.100.1, uplink-280,
05:57:27
b > * 192.168.210.0/24 [20/66] via 192.168.110.1, uplink-283,
05:57:27
t0c> * fc99:48f2:3b44:1800::/64 is directly connected,
downlink-365, 01:52:28
t0c> * fc99:48f2:3b44:8800::/64 is directly connected, linked-
303, 06:11:51
t0c> * fe80::/64 is directly connected, downlink-279, 07:03:00
4. On your student desktop, open a browser window and either enter
http://80.80.80.1 or click the NAT Web Server bookmark.
A test page appears indicating that your NAT is successful.
110
Lab 18 Configuring NSX Advanced
Load Balancer
111
Task 1: Prepare for the Lab
You log in to the vSphere Client UI and the NSX UI.
a. Open Chrome.
• Password: VMware1!
• Password: VMware1!VMware1!
112
Task 2: Create Segments for the NSX Advanced Load Balancer
You create a management and a data plane segment for the NSX Advanced Load Balancer
deployment.
a. On the NSX UI Home page, navigate to Networking > Connectivity > Segments > NSX.
Option Action
c. Click SAVE.
Option Action
b. Click SAVE.
113
Task 3: Deploy the NSX Advanced Load Balancer Controller
You use the NSX UI to deploy the NSX Advanced Load Balancer controller.
1. On the NSX UI Home page, navigate to System > Configuration > Appliances > NSX
Advanced Load Balancer.
2. Click the SET VIRTUAL IP link to configure a virtual IP address for the NSX Advanced Load
Balancer controller cluster.
4. Click the ADD NSX ADVANCED LOAD BALANCER link to start the deployment.
5. When the deployment wizard appears, configure settings in the Application Information
section.
Option Action
Wait for the successful upload and extraction of the OVA file.
6. Click NEXT.
114
7. Configure settings in the Configuration section.
Option Action
8. Click NEXT.
Option Action
1. On your student desktop, log in to the NSX Advanced Load Balancer UI.
a. Open Chrome.
• Password: VMware1!VMware1!
115
2. On the welcome page, configure details in the System Settings section.
Option Action
3. Click NEXT.
5. In the Multi-tenant section, leave all default values and click SAVE.
1. In the NSX Advanced Load Balancer UI, navigate to the Administration tab.
2. In the left pane, expand User Credentials and select the User Credentials menu.
3. Click CREATE.
Option Action
5. Click SAVE.
6. Click CREATE.
116
7. Create user credentials for the vCenter Server instance.
Option Action
8. Click SAVE.
9. In the NSX Advanced Load Balancer UI, navigate to the Infrastructure tab.
11. Select NSX-T Cloud from the CREATE drop-down menu on the right.
Option Action
13. On the NSX-T tab, click CHANGE CREDENTIALS and configure parameters.
Option Action
117
15. Configure parameters for the Management network.
Option Action
16. In the Data Networks section, select PROD-Overlay-TZ from the Transport Zone drop-
down menu.
17. Under Data Network Segments (s), click ADD and configure parameters.
Option Action
18. Under vCenter Servers, click ADD and enter sa-vcsa-01.vclass.local as the
name.
Option Action
24. Verify that the status of nsxtcloud changes to green after a few seconds.
118
Task 6: Configure Service Engine Networks and Routing
You create a static IP pool for the SE Engines data plane and management plane networks and
configure static routing.
1. In the NSX Advanced Load Balancer UI, navigate to Infrastructure > Cloud Resources >
Networks.
Option Action
Static IP Address Click +Add Static IP Address Pool and enter 172.16.60.11-
Pool 172.16.60.20 in the text box.
7. Click Save once again to exit the Edit Network Settings wizard.
Option Action
Static IP Address Click +Add Static IP Address Pool and enter 172.16.70.11-
Pool 172.16.70.20 in the text box.
12. Click Save once again to exit the Edit Network Settings wizard.
15. Find the VRF Context: T1-GW-01 section and click CREATE.
119
16. On the new Static Route wizard, configure parameters.
Option Action
This static route is used to guarantee the return traffic from the service engines to the back-
end web servers.
2. Ping the two web servers and verify that the pings are successful.
ping 172.16.10.11
ping 172.16.10.12
3. On your student desktop, open a browser tab and verify that you can access the two web
servers.
http://172.16.10.11
http://172.16.10.12
If prompted, click Advanced and click the Proceed to 172.16.10.11 or 172.16.10.12 (unsafe)
link to accept the certificate.
IMPORTANT
Do not proceed to the next task if you cannot access the two web servers.
120
Task 8: Create a Virtual Service
You create a virtual IP address and a server pool and associate them with a virtual service.
1. On the NSX UI Home page, navigate to Networking > Network Services > Advanced Load
Balancer > Virtual IP Addresses.
Option Action
b. Click SAVE.
3. Verify that the newly created VIP-Web appears in the Virtual IP Addresses list and its status
is Success.
Option Action
121
b. On the Set Pool Members/IP Group/Groups page, click ADD MEMBER under Members
to add two web server nodes (sa-web-01 and sa-web-02) to the pool member list.
Option Action
c. Click ADD.
d. Click ADD MEMBER and provide the configuration details for the second member.
Option Action
e. Click ADD.
f. Click APPLY.
g. Click SAVE.
6. Verify that the newly created Web-Pool appears in the Pool list and its status is Success.
122
8. Create a virtual service.
Option Action
Service Click the Set link, click ADD PORTS OR PORT RANGES, enter 80
Ports/Port under Service Ports or Port Ranges, click ADD, and click APPLY.
Ranges
b. Click SAVE.
9. When you are prompted to continue configuring this Virtual Service, click NO.
10. Verify that VS-Web appears in the Virtual Services list and its status is Success.
IMPORTANT
Refresh the status of the Virtual Service regularly for up-to-date information. The status of
the Virtual Service might change from success to unknown, and then to in progress. The
status will be in progress for 5 to 10 minutes while the service engines are deployed in the
back end. You can monitor the deployment of the service engines from the vSphere Client
UI. The service engine VM name starts with the prefix nsxtcloud_Avi-se.
123
Task 9: Configure Route Advertisement and Route Redistribution for
the Virtual IP
You advertise the virtual service's virtual IP (VIP) and verify that the HTTP traffic is handled by
both web servers in a round-robin method.
a. On your student desktop, open a Chrome browser window and try to access the load
balancer’s VIP address http://192.168.100.7.
The website cannot be reached because the load balancer’s VIP is not advertised and is
unknown to the external clients.
a. From your student desktop, open the Command Prompt window and access the load
balancer’s VIP address.
curl -i http://192.168.100.7
b. Verify that the website cannot be reached.
The website cannot be reached because the load balancer’s VIP is not advertised and is
unknown to the external clients.
a. On the NSX UI Home page, navigate to Networking > Connectivity > Tier-1 Gateways.
b. Click the vertical ellipsis icon next to T1-GW-01 and select Edit.
d. In the Edit Route Advertisement Configuration window, enable All LB VIP Routes.
5. Configure the BGP-T0-GW-01 gateway to redistribute the VIP route to the upstream VyOS
router.
124
d. Click the vertical ellipsis icon next to BGP-Route Re-distribution and select Edit from
the menu.
b. Refresh the browser display to verify that both back-end web servers are being used
(because of the configured round-robin method).
Because of the browser cache behavior, you might need to press F5 (force refresh) to
see the traffic being load balanced between the two web servers.
a. On the student desktop, open a Command Prompt window and access the load
balancer’s VIP address.
curl -i http://192.168.100.7
The webpage appears.
125
b. Run the same curl command again to verify that both back-end web servers are being
used in a round-robin method.
126
Lab 19 Deploying Virtual Private
Networks
4. Deploy and Configure a New Tier-0 Gateway and Segments for VPN Support
127
Task 1: Prepare for the Lab
You log in to the vSphere Client UI and the NSX UI.
a. Open Chrome.
• Password: VMware1!
128
Task 2: Deploy a New NSX Edge Node to Support the VPN
Deployment
You deploy a new NSX Edge node to configure VPN tunnels.
1. On the NSX UI Home page, navigate to System > Configuration > Fabric > Nodes > Edge
Transport Nodes.
Option Action
4. Click NEXT.
5. On the Credentials page, enter VMware1!VMware1! as the CLI password and the system
root password.
6. Turn on the Allow SSH Login and Allow Root SSH Login toggles to display Yes.
7. Click NEXT.
Option Action
9. Click NEXT.
129
10. On the Configure Node Settings page, provide the configuration details.
Option Action
Management Interface Click the Select Interface link, select pg-SA-Management, and
click SAVE.
Option Action
Teaming Policy Switch Mapping - DPDK Click the Select Interface link, select pg-
Fastpath Interfaces for uplink-1 (active) SA-Edge-Overlay, and click SAVE.
130
13. On the Configure NSX page, click + ADD SWITCH and provide the configuration details.
Option Action
Teaming Policy Switch Mapping - DPDK Click the Select Interface link, select pg-
Fastpath Interfaces for uplink-1 (active) SA-Edge-Uplinks, and click SAVE.
NOTE
The edge deployment might take several minutes to complete. The deployment status
displays various temporary values, for example, Node Not Ready.
Wait until the configuration state displays Success and the node status is Up. You might need
to click REFRESH occasionally.
15. Verify that the edge node is deployed and listed in the Edge VM list.
The configuration state appears as Success and the node status is Up.
1. On the NSX UI Home page, navigate to System > Configuration > Fabric > Nodes > Edge
Clusters.
131
3. Provide the configuration details in the Add Edge Cluster window.
Option Action
4. In the Available (1) pane, select sa-nsxedge-03 and click the right arrow to move it to the
Selected (0) pane.
5. Click ADD.
a. On the NSX UI Home page, navigate to Networking > Connectivity > Segments > NSX.
Option Action
c. Click SAVE.
132
2. Click ADD SEGMENT again to create another segment.
Option Action
b. Click SAVE.
3. On the NSX UI Home page, navigate to Networking > Connectivity > Tier-0 Gateways.
Option Action
6. Click SAVE.
7. When the prompt to continue configuring this Tier-0 gateway appears, click YES.
8. Scroll to the lower portion of the T0-GW-02-VPN gateway, expand ROUTE RE-
DISTRIBUTION and click Set.
133
d. On the Set Route Redistribution page, leave all the check boxes deselected under
Advertised Tier-1 Subnets.
e. On the Set Route Redistribution page, select the Static Routes and Connected
Interfaces & Segments check boxes under Tier-0 Subnets.
9. Click APPLY.
Option Action
b. Click SAVE.
Wait for the new Tier-0 gateway status to appear as Successful. You might need to click
REFRESH periodically while waiting.
134
Task 5: Create an IPSec VPN Service
You create and configure an IPSec VPN Service.
1. On the NSX UI Home page, navigate to Networking > Network Services > VPN > VPN
Services.
Option Action
4. Click SAVE.
5. When you are prompted to continue configuring this VPN service, click NO.
a. On the VPN Services tab, click ADD SERVICE > L2 VPN Server.
Option Action
c. Click SAVE.
d. When you are prompted to continue configuring this VPN service, click YES.
2. Click the Set link under Sessions and click ADD L2 VPN SESSION.
135
3. Configure the session.
Option Action
c. Click SAVE.
Option Action
e. Click SAVE.
f. When you are prompted to continue configuring this L2 VPN session, click NO.
5. Click the L2 VPN Sessions tab and verify that the session was created.
NOTE
The L2 VPN session status might appear as either Down or In Progress until you configure
the Autonomous Edge as an L2 VPN client and an active session is running.
136
6. Acquire the peer code for the L2 VPN session.
c. Click YES.
7. Navigate to Networking > Connectivity > Segments > NSX and add the newly created VPN
session information to L2VPN-Segment.
a. Click the vertical ellipsis icon next to L2VPN-Segment and select Edit from the menu.
Option Action
1. Open a web browser and click the NSX-T Data Center > NSX Autonomous Edge
bookmark.
3. On the login page, enter admin as the user name and VMware1!VMware1! as the
password.
137
5. Configure the new port.
Option Action
6. Click SAVE.
Option Action
You must ensure that you copy only the text without the quotes.
138
12. Configure the port attachment.
Option Action
14. On the L2VPN tab, verify that the status for L2VPN-Client-Session changes to UP.
1. In the NSX UI, navigate to Networking > Network Services > VPN > L2 VPN SESSIONS.
You might need to refresh the status to view the most recent information.
b. In the Network adapter 1 drop-down menu, click Browse, select L2VPN-Segment, and
click OK.
4. Verify that both the NSX Autonomous Edge (auto-edge-01) and the T1-L2VPN-02 virtual
machines reside on sa-esxi-07.vclass.local.
a. In the vSphere Client inventory, right-click T1-L2VPN-02 and select Edit Settings.
Otherwise, click Browse, select Remote_Network from the drop-down menu, and click
OK.
139
7. Log in to the T1-L2VPN-01 VM.
• Password: VMware1!
NOTE
• Password: VMware1!
ping -c 3 172.16.50.11
The ping should also complete successfully. You have now verified bidirectional
communication between the two VMs at the end of the VPN tunnel.
NOTE
140
Lab 20 Managing Users and Roles
• Password: VMware1!VMware1!
141
Task 2: Add an Active Directory Domain as an Identity Source
You use LDAP to add an Active Directory Domain to NSX Manager.
1. On the NSX UI Home page, navigate to System > Settings > User Management and click
the LDAP tab.
Option Action
4. When the Set LDAP Server window appears, click ADD LDAP SERVER.
Option Action
6. Click the Check Status link and verify that the connection status is Success.
8. Click SAVE.
9. Click the Check Status link and verify that the connection status is Success.
142
Task 3: Assign NSX Roles to Domain Users and Test Permissions
You assign an NSX role to an Active Directory domain user and verify the user's permissions.
1. On the NSX UI home page, navigate to System > Settings > User Management and click the
User Role Assignment tab.
3. When the role assignment window appears, select VCLASS in the Search Domain drop-
down menu.
4. Enter jdoe in the Users/User Group Name box and select the jdoe@vclass.local user.
5. In the Roles pane, select Network Admin from the Roles drop-down menu .
6. Click SAVE.
7. At the upper-right corner of the NSX UI, click the admin user and select Log out.
• Password: VMware1!
9. In the upper-right corner of the NSX UI, verify that you are logged in as jdoe@vclass.local.
10. Navigate to Networking > Connectivity > Tier-0 Gateways and verify that the ADD
GATEWAY > Tier-0 option is available.
The availability of the option indicates that users with the Network Admin role have
permissions to configure Tier-0 gateways.
12. Navigate to Networking > Connectivity > Tier1- Gateways and verify that the ADD TIER-1
GATEWAY option is available.
The availability of the option indicates that users with the Network Admin role have
permissions to configure Tier-1 gateways.
15. Click Category Specific Rules and click the APPLICATION tab.
143
16. Click +ADD POLICY.
The unavailable option indicates that users with the Network Admin role do not have
permissions to configure distributed firewall policies or rules.
17. In the upper-right corner of the NSX UI, click the jdoe@vclass.local user and select Log out.
• Password: VMware1!VMware1!
2. On the NSX UI home page, navigate to System > Settings > User Management and click the
Roles tab.
3. Click the vertical ellipsis icon next to the Network Admin role and click Clone.
8. From the Permission drop-down menu for Tier-0 Gateways, select Read-only.
9. From the Permission drop-down menu for Tier-0 Gateways -> OSPF, select Read-only.
13. Click the vertical ellipsis icon next to the jdoe@vclass.local user and select Edit.
14. In the Roles pane, click X for Network Admin to remove this role.
17. At the upper-right corner of the NSX UI, click the admin user and select Log out.
144
18. Log in to the NSX UI at https://sa-nsxmgr-01.vclass.local as jdoe.
• Password: VMware1!
19. In the upper-right corner of the NSX UI, verify that you are logged in as jdoe@vclass.local.
20. Navigate to Networking > Connectivity > Tier-0 Gateways and verify that the ADD
GATEWAY > Tier-0 option is not available.
The unavailable option indicates that users with the T1 Admin role do not have permissions to
configure Tier-0 gateways.
22. Navigate to Networking > Connectivity > Tier-1 Gateways and verify that the ADD TIER-1
GATEWAY option is available.
The availability of the option indicates that users with the T1 Admin role have permissions to
configure Tier-1 gateways.
25. Click Category Specific Rules and click the APPLICATION tab.
The unavailable option indicates that users with the T1 Admin role do not have permissions to
configure distributed firewall policies or rules.
27. In the upper-right corner of the NSX UI, click the jdoe@vclass.local user and select Log out.
145