NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation...

52
NSX-T Evaluation Guide Step-by-step to build NSX-T 3.0

Transcript of NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation...

Page 1: NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation 2.4.1.New VDS-NSX creation • Create New VDS-NSX (for future NSXT Logical Switches). From

NSX-T Evaluation Guide Step-by-step to build NSX-T 3.0

Page 2: NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation 2.4.1.New VDS-NSX creation • Create New VDS-NSX (for future NSXT Logical Switches). From

NSX-T 3.0 Evaluation Guide

You can find the most up-to-date technical documentation and give us

feedback on VMware website at:

https://nsx.techzone.vmware.com/resource/nsx-t-evaluation-guide

VMware, Inc. 3401 Hillview Ave. Palo Alto, CA 94304 www.vmware.com

Copyright © 2020 VMware, Inc. All rights reserved. Copyright and trademark information.

Page 3: NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation 2.4.1.New VDS-NSX creation • Create New VDS-NSX (for future NSXT Logical Switches). From

VMware, Inc. 4

NSX-T Evaluation Guide

Contents

Overview .............................................................................................................................................................. 5

1. REQUIREMENT ......................................................................................................................................... 6

2. INSTALLATION OF NSX-T ....................................................................................................................... 7

2.1. Download of NSX Manager OVA .................................................................................................... 8

2.2. Deployment of NSX-T Manager ...................................................................................................... 8

2.3. Register NSX-T to vCenter ............................................................................................................ 12

2.4. ESXi Host Preparation ............................................................................................................... 14

2.4.1. New VDS-NSX creation ......................................................................................................... 14

2.4.2. Uplink Profile Creation ........................................................................................................... 18

2.4.3. Installation of NSX in ESXi .................................................................................................... 18

2.5. Deployment of Edge Node ............................................................................................................. 20

2.5.1. Creation of VDS Port Group "All VLAN" .............................................................................. 20

2.5.2. Installation of NSX Edge Node ....................................................................................................... 21

2.5.3. Creation of Edge Cluster ................................................................................................................ 24

3. NSX EVALUATION .................................................................................................................................. 25

3.1. Security only (no Logical Network) ............................................................................................... 26

3.1.1. Create VLAN in NSX-T .......................................................................................................... 27

3.1.2. Create 2 Web VMs in VLAN "VLAN-Web" .......................................................................... 29

3.1.3. Configure Microsegmentation ............................................................................................... 30

3.1.4. Validate Micro-Segmentation ................................................................................................ 33

3.2. Logical Network and Security ........................................................................................................ 34

3.2.1. Create Tenants Logical Networks ........................................................................................ 36

3.2.2. Configure North/South Communication (T0 / Physical Router) ....................................... 38

3.2.3. Validate Networking ....................................................................................................................... 44

3.2.4. Configure and Validate Security (Micro-Segmentation) ........................................................... 45

3.3. Operation Tools ............................................................................................................................... 48

3.3.1. Network Topology ................................................................................................................... 48

3.3.2. Traceflow .................................................................................................................................. 50

Page 4: NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation 2.4.1.New VDS-NSX creation • Create New VDS-NSX (for future NSXT Logical Switches). From

VMware, Inc. 5

NSX-T Evaluation Guide

Overview

The goal of this document is to offer a "step by step" NSX Evaluation Guide to test (some) NSX Services: - Security Services - Micro-Segmentation (DFW) - Logical Networking Services - Logical Switching – Logical Routing (with distributed routing) - Operation tools - Network Topology – Traceflow. NSX offers many more services, such as Load Balancing, VPN, IDS, NSX Intelligence, Federation, etc. Those are currently out of scope of that document. Also to limit the ESXi/Storage requirements, this evaluation does not cover high-availability and only 1 element of each NSX component will be installed.

Page 5: NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation 2.4.1.New VDS-NSX creation • Create New VDS-NSX (for future NSXT Logical Switches). From

VMware, Inc. 6

NSX-T Evaluation Guide

1. REQUIREMENT Here are the requirements for NSX-T Evaluation. Compute & Storage

Compute Number Version Download

vCenter 1 7.0 download link

vCenter-Cluster 1+ n/a n/a

ESXi per Cluster 2+ 7.0 download link

CPU per ESXi 8+ n/a n/a

RAM per ESXi 48GB+ n/a n/a

NIC per ESXi 2+ n/a n/a

Storage Shared storage - Recommended for live vMotionf tests

Size 500 GB

Networking

Page 6: NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation 2.4.1.New VDS-NSX creation • Create New VDS-NSX (for future NSXT Logical Switches). From

VMware, Inc. 7

NSX-T Evaluation Guide

VLAN Number Description

Management VLAN 11 VLAN where Management is running (vCenter / ESXi-Mgt / future NSX-Mgr / future EdgeNode-Mgt)

Overlay VLAN 12 VLAN where future NSX Logical Switches Overlay will run in

Physical Router VLAN IP MTU Note

Management VLAN 11 192.168.50.1/24 1500

Overlay VLAN 12 192.168.51.1/24 * 1700+ *

Web VLAN 16 10.16.1.1/24 1500

Needed for NSX Evaluation - Security only (no Logical Network)

External VLAN 3103 20.20.20.1/24 1500

Needed for NSX Evaluation -Logical Network + Security

* Since in this lab all Transport Nodes (ESXi / Edge Nodes) run the Overlay traffic in the same VLAN 12, there is actually requirement to have an IP and MTU 1700+ on the physical router.

2. INSTALLATION OF NSX-T Disclaimer: The below install is a minimal installation intended for a lab environment only. We do not recommend below install in a live production environment.

Page 7: NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation 2.4.1.New VDS-NSX creation • Create New VDS-NSX (for future NSXT Logical Switches). From

VMware, Inc. 8

NSX-T Evaluation Guide

2.1. Download of NSX Manager OVA Download NSX-T 3.0 Manager for VMware ESXi OVA file download link

2.2. Deployment of NSX-T Manager • From vCenter, deploy NSX-T Unified Appliance OVA.

• Select OVF file

Page 8: NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation 2.4.1.New VDS-NSX creation • Create New VDS-NSX (for future NSXT Logical Switches). From

VMware, Inc. 9

NSX-T Evaluation Guide

• From vCenter, deploy NSX-T Unified Appliance OVA.

• Select OVF file.

• Enter NSX-T Manager VM name + vCenter folder for VM.

• Select ESXi to host NSX-T Manager.

Page 9: NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation 2.4.1.New VDS-NSX creation • Create New VDS-NSX (for future NSXT Logical Switches). From

VMware, Inc. 10

NSX-T Evaluation Guide

• Review NSX-T Manager VM details.

• Select NSX-T Manager VM size (Small).

• Select storage for NSX-T Manager VM.

• Select VDS Port Group for NSX-T Manager management vNIC (vCenter Management Port Group).

Page 10: NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation 2.4.1.New VDS-NSX creation • Create New VDS-NSX (for future NSXT Logical Switches). From

VMware, Inc. 11

NSX-T Evaluation Guide

• Enter NSX-T Manager information (passwords, hostname, IP, DNS, NTP). Important: Role name is "NSX Manager".

• Review NSX-T Manager VM settings.

• Once NSX-T Manager deployment is finished, start the VM.

Page 11: NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation 2.4.1.New VDS-NSX creation • Create New VDS-NSX (for future NSXT Logical Switches). From

VMware, Inc. 12

NSX-T Evaluation Guide

2.3. Register NSX-T to vCenter

Note: NSX-T Manager requires few minutes to fully start and get all its services running.

• Log on NSX-T Manager UI. In a browser: https://192.168.50.5/.

• Configuration NSX-T License. Under "System - Settings - Licenses", click "Add".

Page 12: NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation 2.4.1.New VDS-NSX creation • Create New VDS-NSX (for future NSXT Logical Switches). From

VMware, Inc. 13

NSX-T Evaluation Guide

• Register NSX-T in vCenter (to allow the deployment of NSX elements into vCenter/ESXi from NSX). Under "System - Configuration - Fabric - Compute Managers", click "Add".

• Validate NSX-T registration in vCenter. Under "System - Configuration - Fabric - Compute Managers", click "Refresh" (bottom-left).

Page 13: NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation 2.4.1.New VDS-NSX creation • Create New VDS-NSX (for future NSXT Logical Switches). From

VMware, Inc. 14

NSX-T Evaluation Guide

2.4. ESXi Host Preparation 2.4.1. New VDS-NSX creation

• Create New VDS-NSX (for future NSX-T Logical Switches). From vCenter, under "Networking", select the Data Center, and right-click to create a "New Distributed Switch". For this lab, see the top of page for "Number of uplinks (1)", and "Default Port Group (none)".

Page 14: NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation 2.4.1.New VDS-NSX creation • Create New VDS-NSX (for future NSXT Logical Switches). From

VMware, Inc. 15

NSX-T Evaluation Guide

• Add that VDS-NSX to ESXi. From vCenter, under "Networking", select the VDS-NSX, and right-click to "Add and Manage Hosts...".

Page 15: NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation 2.4.1.New VDS-NSX creation • Create New VDS-NSX (for future NSXT Logical Switches). From

VMware, Inc. 16

NSX-T Evaluation Guide

Page 16: NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation 2.4.1.New VDS-NSX creation • Create New VDS-NSX (for future NSXT Logical Switches). From

VMware, Inc. 17

NSX-T Evaluation Guide

• Configure that VDS-NSX with a large MTU (at least 1700). From vCenter, under "Networking", select the VDS-NSX, and right-click to "Add and Manage Hosts...".

Page 17: NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation 2.4.1.New VDS-NSX creation • Create New VDS-NSX (for future NSXT Logical Switches). From

VMware, Inc. 18

NSX-T Evaluation Guide

2.4.2. Uplink Profile Creation

• Create Uplink Profile for Transport Nodes ("VLAN-Overlay + NIC" information for ESXis + Edge Node). From NSX-T, under "System - Configuration - Fabric - Profiles - Uplink Profiles", click "Add". For this lab, see the top of page for VLAN for Overlay traffic information (12), and number of uplinks for "VDS - NSX-T" information (1 NIC).

2.4.3. Installation of NSX in ESXi

• Configure NSX-T for ESXi.

o Select each ESXi of vCenter-Cluster

Under "System - Configuration - Fabric - Node - Host Transport Nodes - Managed by", select "Lab-vCenter". Select Type = VDS (to enable NSX into the existing "VDS-NSX" vCenter Distributed Switch), Mode = Standard, Transport Zone = "nsx-overlay-transportzone" (Default TZ for overlay traffic) + "nsx-vlan-transportzone" (Default TZ for VLAN traffic), Uplink Profile = "Lab-HostProfile" (with VLAN-Overlay information), IP (TEP) = Information on top of the page, Uplink = ESX VDS Uplink1.

Page 18: NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation 2.4.1.New VDS-NSX creation • Create New VDS-NSX (for future NSXT Logical Switches). From

VMware, Inc. 19

NSX-T Evaluation Guide

o For each ESXi, configure its new "VDS - NSX-T" Click "Configure NSX".

o For each ESXi, validate "VDS - NSX-T" creation.

Page 19: NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation 2.4.1.New VDS-NSX creation • Create New VDS-NSX (for future NSXT Logical Switches). From

VMware, Inc. 20

NSX-T Evaluation Guide

2.5. Deployment of Edge Node Note: If you limit your Evaluation at Security only (no Logical Network) and not Logical Network + Security nor Operation Tools, you don't need to deploy Edge Nodes.

2.5.1. Creation of VDS Port Group "All VLAN"

• Create a Port Group "All VLAN" (= VLAN Tag 0-4096) on VDS. From vCenter, under "Networking", select the VDS-NSX, and right-click to "New Distributed Port Group...". For this lab, see the top of page for this Port Group on VDS.

Page 20: NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation 2.4.1.New VDS-NSX creation • Create New VDS-NSX (for future NSXT Logical Switches). From

VMware, Inc. 21

NSX-T Evaluation Guide

2.5.2. Installation of NSX Edge Node

Deploy 1 Edge Node on ESXi. Under "System - Configuration - Fabric - Nodes - Edge Transport Nodes", click "Add Edge VM". Select Form Factor Medium (useful if you want to test later Load-Balancing), enable SSH for admin and root if you want to try later deeper troubleshooting, Management and Switch (TEP) IP addresses on the top of the page), and Transport Zones = "nsx-overlay-transportzone" (default TZ for Overlay traffic) and "nsx-vlan-transportzone" (default TZ for VLAN traffic).

Page 21: NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation 2.4.1.New VDS-NSX creation • Create New VDS-NSX (for future NSXT Logical Switches). From

VMware, Inc. 22

NSX-T Evaluation Guide

Page 22: NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation 2.4.1.New VDS-NSX creation • Create New VDS-NSX (for future NSXT Logical Switches). From

VMware, Inc. 23

NSX-T Evaluation Guide

• Validate Edge Node deployment. Under "System - Configuration - Fabric - Nodes - Edge Transport Nodes", click "Refresh" (bottom UI)

Page 23: NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation 2.4.1.New VDS-NSX creation • Create New VDS-NSX (for future NSXT Logical Switches). From

VMware, Inc. 24

NSX-T Evaluation Guide

2.5.3. Creation of Edge Cluster Create 1 Edge Cluster with EdgeNode1 member. Under "System - Configuration - Fabric - Nodes - Edge Clusters", click "Add". Select EdgeNode1 as member of that Edge Cluster.

• Validate Edge Cluster creation. Under "System - Configuration - Fabric - Nodes - Edge Clusters", click "Refresh".

Page 24: NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation 2.4.1.New VDS-NSX creation • Create New VDS-NSX (for future NSXT Logical Switches). From

VMware, Inc. 25

NSX-T Evaluation Guide

3. NSX EVALUATION

Overview NSX-T Services evaluated in that Evaluation Guide:

• Security Services o Micro-Segmentation (DFW)

• Logical Networking Services o Logical Switching o Logical Routing (with distributed routing)

• Operation tools o Network Topology o Traceflow

NSX offers many more services, such as Load Balancing, VPN, IDS, NSX Intelligence, Federation, etc. Those are currently out of scope of that document. Limit the ESXi/Storage requirements, this evaluation does not cover high-availability and only 1 element of each NSX component will be installed.

3. NSX Evaluation i. Security only (no Logical Network) ii. Logical Network + Security iii. Operation Tools

Page 25: NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation 2.4.1.New VDS-NSX creation • Create New VDS-NSX (for future NSXT Logical Switches). From

VMware, Inc. 26

NSX-T Evaluation Guide

3.1. Security only (no Logical Network) In this section, you'll configure 2 Web VMs on a new VLAN and provide micro-segmentation (DFW) on those 2 VMs. Important Note: In this section, the routing is still fully done by physical fabric. So your physical router needs an interface for that new VLAN (10.114.218.1/24 in lab).

Logical View

Physical View

Page 26: NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation 2.4.1.New VDS-NSX creation • Create New VDS-NSX (for future NSXT Logical Switches). From

VMware, Inc. 27

NSX-T Evaluation Guide

The Security evaluation done in this chapter is focusing on NSX L4 Stateful North/South and East/West firewalling capabilities. NSX-T offers more than L4 Stateful firewall capabilities, such as Layer7 Firewalling, Intrusion Detection System (IDS), eco-system with Security Vendors like Checkpoint, Fortinet, or Palo Alto

3.1.1. Create VLAN in NSX-T

• Log on NSX-T Manager UI. In a browser: https://192.168.50.5/.

• Create new VLAN "Web" + interface on physical router for this lab, see on top of the page

for the physical router interface + VLAN information. There is no steps described in this document, as it varies per physical router.

• Create new VLAN Segment "VLAN-Web". Under "Networking - Segments", click "Add Segment". For this lab, see on top of the page for the VLAN number (16). Select Transport Zone = "nsx-vlan-transportzone" (Default TZ for VLAN traffic), VLAN = "16", and no extra configuration for that Segment.

Page 27: NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation 2.4.1.New VDS-NSX creation • Create New VDS-NSX (for future NSXT Logical Switches). From

VMware, Inc. 28

NSX-T Evaluation Guide

• Validate new VLAN Segment "VLAN-Web" is available on vCenter.

From vCenter, under "Networking", validate "VLAN-Web" is under VDS-NSX. For this lab, see on top of the page for the VM IP addresses.

Page 28: NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation 2.4.1.New VDS-NSX creation • Create New VDS-NSX (for future NSXT Logical Switches). From

VMware, Inc. 29

NSX-T Evaluation Guide

3.1.2. Create 2 Web VMs in VLAN "VLAN-Web"

• Create 2 Web VMs in VLAN "VLAN-Web" From vCenter, under "Host and Clusters", validate 2 Web VMs are well created and connected to "VLAN-Web"

• Validate connectivity from external to those VMs From external client, validate ping communication to VMs is allowed, and validate SSH communication to VMs is also allowed. Note: I'm using ping + SSH, but you can use any protocol of your choice

root@lab3-jumphost:~# ping 10.16.1.11 PING 10.16.1.11 (10.16.1.11) 56(84) bytes of data. 64 bytes from 10.16.1.11: icmp_seq=1 ttl=63 time=0.565 ms 64 bytes from 10.16.1.11: icmp_seq=2 ttl=63 time=0.593 ms ^C --- 10.16.1.11 ping statistics --- 2 packets transmitted, 2 received, 0% packet loss, time 1022ms rtt min/avg/max/mdev = 0.565/0.579/0.593/0.014 ms root@lab3-jumphost:~# ssh [email protected] The authenticity of host '10.16.1.11 (10.16.1.11)' can't be established. ECDSA key fingerprint is SHA256:uncl2WyCuNSTwllyvR2He8JEKqZn0K2qdhYB06L+bKE. Are you sure you want to continue connecting (yes/no)? yes Warning: Permanently added '10.16.1.11' (ECDSA) to the list of known hosts. [email protected]'s password: Welcome to Ubuntu 16.04.4 LTS (GNU/Linux 4.4.0-116-generic x86_64) * Documentation: https://help.ubuntu.com

Page 29: NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation 2.4.1.New VDS-NSX creation • Create New VDS-NSX (for future NSXT Logical Switches). From

VMware, Inc. 30

NSX-T Evaluation Guide

* Management: https://landscape.canonical.com * Support: https://ubuntu.com/advantage

217 packages can be updated. 136 updates are security updates. Last login: Mon Apr 6 16:58:28 2020 root@VLANWebeb-VM1:~# root@lab3-jumphost:~# ping 10.16.1.12 PING 10.16.1.12 (10.16.1.12) 56(84) bytes of data. 64 bytes from 10.16.1.12: icmp_seq=1 ttl=63 time=1.21 ms 64 bytes from 10.16.1.12: icmp_seq=2 ttl=63 time=0.441 ms ^C --- 10.16.1.12 ping statistics --- 2 packets transmitted, 2 received, 0% packet loss, time 1001ms rtt min/avg/max/mdev = 0.441/0.828/1.216/0.388 ms root@lab3-jumphost:~# ssh [email protected] The authenticity of host '10.16.1.12 (10.16.1.12)' can't be established. ECDSA key fingerprint is SHA256:uncl2WyCuNSTwllyvR2He8JEKqZn0K2qdhYB06L+bKE. Are you sure you want to continue connecting (yes/no)? yes Warning: Permanently added '10.16.1.12' (ECDSA) to the list of known hosts. [email protected]'s password: Welcome to Ubuntu 16.04.4 LTS (GNU/Linux 4.4.0-116-generic x86_64) * Documentation: https://help.ubuntu.com * Management: https://landscape.canonical.com * Support: https://ubuntu.com/advantage 217 packages can be updated. 136 updates are security updates. Last login: Mon Apr 6 16:59:23 2020 root@VLANWeb-VM2:~#

3.1.3. Configure Microsegmentation

3.1.3.1. Create NSX Group "VLAN Web VMs"

To simplify the configuration of micro-segmentation, NSX offers the ability to Group Workload into static or dynamic membership, such as VM name, tags, segment, etc.

• Create NSX Group "Group VLAN Web VMs". From NSX-T, under "Inventory - Groups", click "Add Group". For this lab, we create dynamic Membership Criteria based on VM Name "starts with VLAN Web".

Page 30: NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation 2.4.1.New VDS-NSX creation • Create New VDS-NSX (for future NSXT Logical Switches). From

VMware, Inc. 31

NSX-T Evaluation Guide

• Validate membership of NSX Group "Group VLAN Web VMs". From NSX-T, under "Inventory - Groups", click "View Members" of "Group VLAN Web VMs".

3.1.3.2. Create Micro-Segmentation (DFW)

Micro-segmentation is defined in "Categories" (Emergency, Infrastructure, Environment, Application), with security "Sections" + "Rules" in each. The security rules in the different sections will be pushed to the relevant VMs vNics based on the "Apply To" defined in the Section and/or Rule.

• Create new DFW Section (= Policy). From NSX-T, under "Security - Distributed Firewall - Category Specific Rules", click "Add

Page 31: NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation 2.4.1.New VDS-NSX creation • Create New VDS-NSX (for future NSXT Logical Switches). From

VMware, Inc. 32

NSX-T Evaluation Guide

Policy". For this lab, let's create a Section name "Section-VLANWeb", and with an Applied To = "Group VLAN Web VMs".

• Create new DFW Rule. From NSX-T, under "Security - Distributed Firewall - Category Specific Rules", select section "Section-VLAN Web" and click "Add Rule". For this lab, let's create the following rules:

Name Sources Destinations Services Profiles Applied To Action

Internal Group VLAN Web VMs

Group VLAN Web VMs

HTTP + ICMP None DFW Allow

External Any Group VLAN Web VMs HTTP None DFW Allow

Default Any Group VLAN Web VMs Any None DFW Reject

Page 32: NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation 2.4.1.New VDS-NSX creation • Create New VDS-NSX (for future NSXT Logical Switches). From

VMware, Inc. 33

NSX-T Evaluation Guide

• Publish DFW. From NSX-T, under "Security - Distributed Firewall - Category Specific Rules", click "Publish" (top-right).

3.1.4. Validate Micro-Segmentation

• Validate connectivity from external to those VMs. From external client, validate HTTP communication to VMs is allowed, and validate ICMP communication to VMs is NOT allowed. Note: I'm using the web client "curl" to access the web page "/test.php", but you can use any web client.

root@lab3-jumphost:~# curl http://10.16.1.11/test.php The Client IP@ is: 10.114.218.216<br> The Server IP@ is: 10.16.1.11 root@lab3-jumphost:~# ping 10.16.1.11 PING 10.16.1.11 (10.16.1.11) 56(84) bytes of data. From 10.16.1.11 icmp_seq=1 Destination Host Prohibited From 10.16.1.11 icmp_seq=2 Destination Host Prohibited ^C --- 10.16.1.11 ping statistics --- 2 packets transmitted, 0 received, +2 errors, 100% packet loss, time 1013ms root@lab3-jumphost:~# curl http://10.16.1.12/test.php The Client IP@ is: 10.114.218.216<br> The Server IP@ is: 10.16.1.12 root@lab3-jumphost:~# ping 10.16.1.12 PING 10.16.1.12 (10.16.1.12) 56(84) bytes of data. From 10.16.1.12 icmp_seq=1 Destination Host Prohibited From 10.16.1.12 icmp_seq=2 Destination Host Prohibited ^C --- 10.16.1.12 ping statistics --- 2 packets transmitted, 0 received, +2 errors, 100% packet loss, time 1001ms

Page 33: NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation 2.4.1.New VDS-NSX creation • Create New VDS-NSX (for future NSXT Logical Switches). From

VMware, Inc. 34

NSX-T Evaluation Guide

• Validate L2 connectivity between those VMs. From VLANWeb VM, validate HTTP + ICMP communication to VLANWeb VM is allowed, and validate SSH communication to VLAN Web VM is NOT allowed.

root@VLANWebeb-VM1:~# ping 10.16.1.12 PING 10.16.1.12 (10.16.1.12) 56(84) bytes of data. 64 bytes from 10.16.1.12: icmp_seq=1 ttl=64 time=1.80 ms 64 bytes from 10.16.1.12: icmp_seq=2 ttl=64 time=1.23 ms ^C --- 10.16.1.12 ping statistics --- 2 packets transmitted, 2 received, 0% packet loss, time 1000ms rtt min/avg/max/mdev = 1.231/1.518/1.805/0.287 ms (reverse-i-search)`cu': ^Crl http://127.0.0.1/response_code.php root@VLANWebeb-VM1:~# curl http://10.16.1.12/test.php The Client IP@ is: 10.16.1.11<br> The Server IP@ is: 10.16.1.12 root@VLANWebeb-VM1:~# ssh 10.16.1.12 ssh: connect to host 10.16.1.12 port 22: Connection refused

3.2. Logical Network and Security

In this section, you'll configure Logical Networks for Tenants Green and Blue (Logical Routers = "Tier1" and Logical Switches = "Segments"). Those Tenants Logical Networks will have access to the physical fabric via a Logical Router ("Tier0"). Routing between the Tier0 and physical router will be done via "static routing" or "BGP".

Important Note: In this section, the internal Tenant routing (East/West) is done in "Logical Space" by NSX. The physical router provides the routing between the "logical space" and the "physical world" (North/South).

Logical View

Page 34: NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation 2.4.1.New VDS-NSX creation • Create New VDS-NSX (for future NSXT Logical Switches). From

VMware, Inc. 35

NSX-T Evaluation Guide

Physical View

The Network evaluation done in this chapter is focusing on NSX Switching and Routing capabilities. NSX-T offers more than Switching and Routing capabilities, such as NAT, Load Balancing, VPN.

The Security evaluation done in this chapter is focusing on NSX L4 Stateful North/South and East/West firewalling capabilities. NSX-T offers more than L4 Stateful firewall capabilities, such as Layer7 Firewalling, Intrusion Detection System (IDS), eco-system with Security Vendors like Checkpoint, Fortinet, or Palo Alto Networks. More information on https://www.vmware.com/products/nsx.html and https://nsx.techzone.vmware.com/.

Page 35: NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation 2.4.1.New VDS-NSX creation • Create New VDS-NSX (for future NSXT Logical Switches). From

VMware, Inc. 36

NSX-T Evaluation Guide

3.2.1. Create Tenants Logical Networks

• Log on NSX-T Manager UI. In a browser: https://192.168.50.5/

• Create new Logical Routers "T1-xxx". Under "Networking - Connectivity - Tier-1 Gateways", click "Add Tier-1 Gateway". For this lab, see on top of the page for the T1 name (T1-Tenant1, and T1-Tenant2). Configure the T1 Name.

• Create new Overlay Segments "LSxxx".

Under "Networking - Segments", click "Add Segment". For this lab, see on top of the page for the Segment name (LS1.1, LS1.2, and LS2.1). Select Connectivity = "T1-xxx" ("LS1.1 + LS1.2 on T1-Tenant1" and "LS2.1 on T1-Tenant2"),

Page 36: NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation 2.4.1.New VDS-NSX creation • Create New VDS-NSX (for future NSXT Logical Switches). From

VMware, Inc. 37

NSX-T Evaluation Guide

Transport Zone = "nsx-overlay-transportzone" (Default TZ for Overlay traffic), Subnets = 10.x.x.1/24"

• Validate new Overlay Segments "LSxxx" is available on vCenter.

From vCenter, under "Networking", validate "LSxxx" is under VDS-NSX.

• Create 2 Web VMs in each Overlay Segment "LSxxx".

From vCenter, under "Host and Clusters", validate VMs are well created and connected to "LSxxx" For this lab, see on top of the page for the VM IP addresses.

Page 37: NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation 2.4.1.New VDS-NSX creation • Create New VDS-NSX (for future NSXT Logical Switches). From

VMware, Inc. 38

NSX-T Evaluation Guide

3.2.2. Configure North/South Communication (T0 / Physical Router)

3.2.2.1. Configure physical router + Create T0-Provider + Connect T1s to T0-Provider

• Create new VLAN External + interface on physical router. For this lab, see on top of the page for the physical router interface + VLAN information. There is no steps described in this document, as it varies per physical router.

• Create VLAN Segment "External". Under "Networking - Segments", click "Add Segment". For this lab, see on top of the page for the VLAN number (3103). Select Transport Zone = "nsx-vlan-transportzone" (Default TZ for VLAN traffic), VLAN = "3103"

• Create new Logical Routers "T0-Provider".

Under "Networking - Connectivity - Tier-0 Gateways", click "Add Gateway Tier-0". For this lab, see on top of the page for the T0 settings. Select Edge Cluster = ""EdgeCluster1", and the following settings: Interface "20.20.20.2/24" on Segment "External" on Edge Node "EdgeNode1".

Page 38: NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation 2.4.1.New VDS-NSX creation • Create New VDS-NSX (for future NSXT Logical Switches). From

VMware, Inc. 39

NSX-T Evaluation Guide

• Connect the different T1 to the Provider-T0.

For each T1, under "Networking - Connectivity - Tier-1 Gateways", edit T1 and link it to "T0-Provider".

Page 39: NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation 2.4.1.New VDS-NSX creation • Create New VDS-NSX (for future NSXT Logical Switches). From

VMware, Inc. 40

NSX-T Evaluation Guide

Then configure "3.2.2.2. Static Routing." OR "3.2.2.3. Dynamic Routing."

3.2.2.2. Configure North/South Routing Static

• Configure static route on physical router.

Subnets "10.1.1.0/24" + "10.1.2.0/24" + "10.2.1.0/24" have a static route via "20.20.20.2". There is no steps described in this document, as it varies per physical router. Just showing the routing table of the physical router

physical-router@lab3:~$ show ip route Codes: K - kernel route, C - connected, S - static, R - RIP, O - OSPF, I - ISIS, B - BGP, > - selected route, * - FIB route S>* 10.1.1.0/24 [1/0] via 20.20.20.2, eth3 S>* 10.1.2.0/24 [1/0] via 20.20.20.2, eth3 S>* 10.2.1.0/24 [1/0] via 20.20.20.2, eth3

• Configure static route on T0-Provider. Default gateway via "20.20.20.1". Under "Networking - Connectivity - Tier-0 Gateways", edit the "T0-Provider" and under "Routing - Static Routes", set a "Static Route".

And Configure the "Set Next Hops" = "20.20.20.1"

Page 40: NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation 2.4.1.New VDS-NSX creation • Create New VDS-NSX (for future NSXT Logical Switches). From

VMware, Inc. 41

NSX-T Evaluation Guide

3.2.2.3. Configure North/South Routing Dynamic with BGP

• Configure BGP on physical router.

There is no steps described in this document, as it varies per physical router. Just showing the BGP configuration of the physical router

physical-router@lab3:~$ show configuration commands | grep bgp

set protocols bgp 2 neighbor 20.20.20.2 'default-originate' <-- Advertise itself for default gateway

set protocols bgp 2 neighbor 20.20.20.2 remote-as '1'

• Configure BGP on T0-Provider. Under "Networking - Connectivity - Tier-0 Gateways", edit the "T0-Provider" and under "BGP", configure the "Local AS" = "1".

Page 41: NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation 2.4.1.New VDS-NSX creation • Create New VDS-NSX (for future NSXT Logical Switches). From

VMware, Inc. 42

NSX-T Evaluation Guide

And configure the "BGP Neighbors" = "20.20.20.1", with "Remote AS number" = "2", and with "Source Addresses" = "20.20.20.1".

• Configure T0-Provider "Route Distribution".

Under "Networking - Connectivity - Tier-0 Gateways", edit the "T0-Provider" and under "Route Redistribution", add redistribution of T1 Subnets.

And configure the "T1 Connected Interfaces & Segments".

Page 42: NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation 2.4.1.New VDS-NSX creation • Create New VDS-NSX (for future NSXT Logical Switches). From

VMware, Inc. 43

NSX-T Evaluation Guide

• Configure T1-xxx "Route Distribution".

Under "Networking - Connectivity - Tier-1 Gateways", edit each "T1-xxx" and under "Route Advertisement", select "All Connected Segments & Service Ports".

• Validate learned BGP routes on physical router.physical-router@lab3:~$ show ip bgp

neighbors 20.20.20.2

BGP neighbor is 20.20.20.2, remote AS 1, local AS 2, external link BGP version 4, remote router ID 20.20.20.2 BGP state = Established, up for 00:00:16 <snip> physical-router@lab3:~$ show ip bgp neighbors 20.20.20.2 routes BGP table version is 0, local router ID is 192.168.52.1 Status codes: s suppressed, d damped, h history, * valid, > best, i - internal, r RIB-failure, S Stale, R Removed Origin codes: i - IGP, e - EGP, ? - incomplete Network Next Hop Metric LocPrf Weight Path *> 10.1.1.0/24 20.20.20.2 0 0 1 ? *> 10.1.2.0/24 20.20.20.2 0 0 1 ? *> 10.2.1.0/24 20.20.20.2 0 0 1 ? Total number of prefixes 3

Page 43: NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation 2.4.1.New VDS-NSX creation • Create New VDS-NSX (for future NSXT Logical Switches). From

VMware, Inc. 44

NSX-T Evaluation Guide

• Validate BGP status of T0-Provider. Under "Networking - Connectivity - Tier-0 Gateways", expand "BGP", and click on "BGP Neighbors". And click on the "i" next to "Status" ("Connection State" should be "ESTABLISHED").

3.2.3. Validate Networking

• Validate North/South connectivity from external to those VMs. From external client, validate communication to VMs

root@lab3-jumphost:~# ping 10.1.1.11 PING 10.1.1.11 (10.1.1.11) 56(84) bytes of data. 64 bytes from 10.1.1.11: icmp_seq=1 ttl=61 time=1.64 ms 64 bytes from 10.1.1.11: icmp_seq=2 ttl=61 time=1.20 ms ^C --- 10.1.1.11 ping statistics --- 2 packets transmitted, 2 received, 0% packet loss, time 1001ms rtt min/avg/max/mdev = 1.202/1.424/1.646/0.222 ms root@lab3-jumphost:~# ping 10.2.1.11 PING 10.2.1.11 (10.2.1.11) 56(84) bytes of data. 64 bytes from 10.2.1.11: icmp_seq=1 ttl=61 time=8.01 ms 64 bytes from 10.2.1.11: icmp_seq=2 ttl=61 time=1.67 ms --- 10.2.1.11 ping statistics --- 2 packets transmitted, 2 received, 0% packet loss, time 1001ms rtt min/avg/max/mdev = 1.672/4.845/8.019/3.174 ms

• Validate East/West connectivity from VMs to VMs. From VM3, validate communication to VM4, VM5, and VM7.

root@LS1-1-VM3:~# ping 10.1.1.12 PING 10.1.1.12 (10.1.1.12) 56(84) bytes of data. 64 bytes from 10.1.1.12: icmp_seq=1 ttl=64 time=1.82 ms 64 bytes from 10.1.1.12: icmp_seq=2 ttl=64 time=0.828 ms ^C --- 10.1.1.12 ping statistics --- 2 packets transmitted, 2 received, 0% packet loss, time 1002ms

Page 44: NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation 2.4.1.New VDS-NSX creation • Create New VDS-NSX (for future NSXT Logical Switches). From

VMware, Inc. 45

NSX-T Evaluation Guide

rtt min/avg/max/mdev = 0.828/1.325/1.822/0.497 ms root@LS1-1-VM3:~# ping 10.1.2.11 PING 10.1.2.11 (10.1.2.11) 56(84) bytes of data. 64 bytes from 10.1.2.11: icmp_seq=1 ttl=63 time=3.00 ms 64 bytes from 10.1.2.11: icmp_seq=2 ttl=63 time=0.469 ms ^C --- 10.1.2.11 ping statistics --- 2 packets transmitted, 2 received, 0% packet loss, time 1001ms rtt min/avg/max/mdev = 0.469/1.735/3.002/1.267 ms root@LS1-1-VM3:~# ping 10.2.1.11 PING 10.2.1.11 (10.2.1.11) 56(84) bytes of data. 64 bytes from 10.2.1.11: icmp_seq=1 ttl=61 time=0.482 ms 64 bytes from 10.2.1.11: icmp_seq=2 ttl=61 time=0.596 ms ^C --- 10.2.1.11 ping statistics --- 2 packets transmitted, 2 received, 0% packet loss, time 999ms rtt min/avg/max/mdev = 0.482/0.539/0.596/0.057 ms

3.2.4. Configure and Validate Security (Micro-Segmentation)

Follow the procedure detailed in to implement the following Micro-Segmentation:

To simplify the configuration of micro-segmentation, NSX offers the ability to Group Workload into static or dynamic membership, such as VM name, tags, segment, etc.

Groups Members

Group-Tenant1-LS1.1 Segment LS1.1

Group-Tenant1-LS1.2 Segment LS1.2

Page 45: NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation 2.4.1.New VDS-NSX creation • Create New VDS-NSX (for future NSXT Logical Switches). From

VMware, Inc. 46

NSX-T Evaluation Guide

Groups Members

Group-Tenant1 Group-Tenant1-LS1.1 + Group-Tenant1-LS1.2

Group-Tenant2 Segment LS2.1

Group-AllTenants Group-Tenant1 + Group-Tenant2

Micro-segmentation is defined in "Categories" (Emergency, Infrastructure, Environment, Application), with security "Sections" + "Rules" in each. The security rules in the different sections will be pushed to the relevant VMs vNics based on the "Apply To" defined in the Section and/or Rule.

Section Rule-Name Sources Destinations Services Profiles Applied

To Action

Tenant1

ApplyTo = Group-Tenant1

Internal-LS1.1 Deny

Group-Tenant1-LS1.1

Group-Tenant1-LS1.1

Any None DFW Reject

Internal-LS1.2 Deny

Group-Tenant1-LS1.2

Group-Tenant1-LS1.2

Any None DFW Reject

L3 East/West Allow

Group-Tenant1-LS1.1

Group-Tenant1-LS1.2

HTTP + ICMP None DFW Allow

L3 East/West Deny

Group-Tenant1-LS1.1

Group-Tenant1-LS1.2

Any None DFW Reject

Tenant2

ApplyTo = Group-Tenant2

Internal allow

Group-Tenant2

Group-Tenant2 Any None DFW Allow

Cross-Tenants

ApplyTo = Group-AllTenants

Cross- Group- Group- HTTP None DFW Allow

Page 46: NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation 2.4.1.New VDS-NSX creation • Create New VDS-NSX (for future NSXT Logical Switches). From

VMware, Inc. 47

NSX-T Evaluation Guide

Section Rule-Name Sources Destinations Services Profiles Applied

To Action

Tenants Allow1

Tenant1 Tenant2

Cross-Tenants Allow2

Group-Tenant2

Group-Tenant1 HTTP None DFW Allow

Cross-Tenants Deny1

Group-Tenant1

Group-Tenant2 Any None DFW Reject

Cross-Tenants Deny2

Group-Tenant2

Group-Tenant1 Any None DFW Reject

External

ApplyTo = Group-AllTenants

External Allow Any Group-

AllTenants HTTP None DFW Allow

External Deny Any Group-

AllTenants Any None DFW Reject

Here is a partial configuration view:

Page 47: NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation 2.4.1.New VDS-NSX creation • Create New VDS-NSX (for future NSXT Logical Switches). From

VMware, Inc. 48

NSX-T Evaluation Guide

3.3. Operation Tools In this section, you'll use 2 popular Operation tools which greatly facilitate Network and Security admins:

• Network Topology • Traceflow

The Operation evaluation done in this chapter is focusing on those 2 tools. NSX-T offers more than those tools, such as Port Mirroring, IPFIX, Syslog, advanced status and statistics on its different services.

3.3.1. Network Topology What has been created so far is the following logical topology:

Page 48: NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation 2.4.1.New VDS-NSX creation • Create New VDS-NSX (for future NSXT Logical Switches). From

VMware, Inc. 49

NSX-T Evaluation Guide

NSX offers a graphical representation of its network topology.

• Log on NSX-T Manager UI. In a browser: https://192.168.50.5/.

• Display the NSX Network Topology. Under "Networking - Network Topology".

Page 49: NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation 2.4.1.New VDS-NSX creation • Create New VDS-NSX (for future NSXT Logical Switches). From

VMware, Inc. 50

NSX-T Evaluation Guide

• And specific Network elements, such as T0 information.

3.3.2. Traceflow Traceflow allows you to inject a packet into the network and monitor its flow across the network. Traceflow allows you to identify the path a packet takes to reach its destination or, conversely, where a packet is dropped along the way. Each entity reports the packet handling on input and output, so you can determine whether issues occur when receiving a packet or when forwarding the packet.

• Check the Traceflow from VM3 HTTP to VM7.

Under "Plan & Troubleshoot - Traceflow", select the Source "LS1.1-VM3", to Destination "LS2.1-VM7", Protocol Type "TCP" with Source Port = "5000" to Destination Port = "80".

Page 50: NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation 2.4.1.New VDS-NSX creation • Create New VDS-NSX (for future NSXT Logical Switches). From

VMware, Inc. 51

NSX-T Evaluation Guide

And click "Trace". You can follow the path through the different Logical NSX Routing + Security elements on the top half of the screen.

You can also follow each step of the different NSX elements on the bottom half of the screen (and on which device it's running).

Page 51: NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation 2.4.1.New VDS-NSX creation • Create New VDS-NSX (for future NSXT Logical Switches). From

VMware, Inc. 52

NSX-T Evaluation Guide

Note: Worth nothing even if that traffic is routed, it actually does not leave the ESXi1 (192.168.50.21) thanks to the power of NSX service distribution :-)

• Check the Traceflow from VM3 HTTP to VM1.

Under "Plan & Troubleshoot - Traceflow", select the Source "LS1.1-VM3", to Destination "VLANWeb-VM1", Protocol Type "TCP" with Source Port = "5000" to Destination Port = "80".

Page 52: NSX-T Evaluation Guide · VMware, Inc. 14 NSX-T Evaluation Guide 2.4. ESXi Host Preparation 2.4.1.New VDS-NSX creation • Create New VDS-NSX (for future NSXT Logical Switches). From

VMware, Inc. 53

NSX-T Evaluation Guide

And click "Trace". You can follow the path through the different Logical NSX Routing + Security elements on the top half of the screen.

You can also follow each step of the different NSX elements on the bottom half of the screen (and on which device it's running).

Note: The traceflow tracks the different NSX elements up to it reaches the physical fabric and ends there