Edu en Nsxtto3 Lab Se
Edu en Nsxtto3 Lab Se
com
mcse2012.blogfa.com
[email protected]
Lab Manual
NSX-T Data Center 3.0
Copyright © 2021 VMware, Inc. All rights reserved. This manual and its accompanying
materials are protected by U.S. and international copyright and intellectual property laws.
VMware products are covered by one or more patents listed at
http://www.vmware.com/go/patents. VMware is a registered trademark or trademark of
VMware, Inc. in the United States and/or other jurisdictions. All other marks and names
mentioned herein may be trademarks of their respective companies. VVMware vSphere®
vMotion®, VMware vSphere® Web Client, VMware vSphere® Client™, VMware vSphere®,
VMware vRealize® Log Insight™ for vCenter™, VMware vRealize® Log Insight™, VMware
vRealize®, VMware vCenter Server®, VMware View®, VMware Horizon® View™, VMware
Verify™, VMware Horizon® 7, VMware Horizon® 7, VMware Horizon® 7 on VMware Cloud™
on AWS, VMware Pivotal Labs® Navigator™, VMware NSX-T™ Data Center, VMware NSX-
T™, VMware NSX® Manager™, VMware NSX® Edge™, VMware NSX® Data Center, VMware
NSX®, VMware vCenter® Log Insight™, VMware Go™, VMware ESXi™, VMware ESX® and
VMware ACE™ are registered trademarks or trademarks of VMware, Inc. in the United States
and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of
their respective companies.
The training material is provided “as is,” and all express or implied conditions, representations,
and warranties, including any implied warranty of merchantability, fitness for a particular
purpose or noninfringement, are disclaimed, even if VMware, Inc., has been advised of the
possibility of such claims. This material is designed to be used for reference purposes in
conjunction with a training course.
The training material is not a standalone training tool. Use of the training material for self-
study without class attendance is not recommended. These materials and the computer
programs to which it relates are the property of, and embody trade secrets and confidential
information proprietary to, VMware, Inc., and may not be reproduced, copied, disclosed,
transferred, adapted or modified without the express written approval of VMware, Inc.
www.vmware.com/education
mcse2012.blogfa.com
Typographical Conventions
• <ESXi_host_name>
www.vmware.com/education
Contents
iv
Lab 5 Infrastructure Preparation Validation ......................................................................... 27
Task 1: Prepare for the Lab ............................................................................................................................................ 28
Task 2: Verify the Transport Node Preparation Prerequisites ........................................................................ 28
Task 3: Verify the Transport Node Preparation from the NSX UI .................................................................. 31
Task 4: Verify the Transport Node Preparation from the ESXi CLI ............................................................. 33
Task 5: Verify the Transport Node Preparation from the KVM CLI .............................................................34
Task 6: Verify the NSX Edge Configuration from the NSX CLI ...................................................................... 36
Task 7: Prepare for the Next Lab................................................................................................................................ 37
Lab 6 NSX Infrastructure Preparation Break-Fix Scenario 1......................................... 39
Task 1: Read the Scenario Description ...................................................................................................................... 39
Task 2: Confirm the Problem........................................................................................................................................ 40
Task 3: Troubleshoot and Fix the Problem ..............................................................................................................41
Task 4: Verify That the Problem Is Fixed..................................................................................................................41
Lab 7 NSX Infrastructure Preparation Break-Fix Scenario 2 ........................................ 43
Task 1: Read the Scenario Description ......................................................................................................................43
Task 2: Confirm the Problem........................................................................................................................................ 44
Task 3: Troubleshoot and Fix the Problem .............................................................................................................45
Task 4: Verify That the Problem Is Fixed.................................................................................................................45
Task 5: Prepare for the Next Lab ...............................................................................................................................45
Lab 8 NSX Infrastructure Preparation Challenge Scenario (Optional) ..................... 47
Task 1: Read the Scenario Description ...................................................................................................................... 47
Task 2: Confirm the Problem........................................................................................................................................ 48
Task 3: Troubleshoot and Fix the Problem ............................................................................................................ 49
Task 4: Verify That the Problem Is Fixed................................................................................................................ 49
Lab 9 Logical Switching Validation............................................................................................ 51
Task 1: Prepare for the Lab ............................................................................................................................................ 52
Task 2: Verify Segments from the NSX UI .............................................................................................................. 52
Task 3: Verify Logical Switches from the NSX CLI .............................................................................................. 53
Task 4: Verify Logical Switches from the ESXi CLI ............................................................................................. 56
Task 5: Verify Logical Switches from the KVM CLI ............................................................................................. 59
Lab 10 Logical Switching Break-Fix Scenario 1 .................................................................... 61
Task 1: Read the Scenario Description ...................................................................................................................... 62
Task 2: Confirm the Problem......................................................................................................................................... 63
v
Task 3: Troubleshoot and Fix the Problem ............................................................................................................. 63
Task 4: Verify That the Problem Is Fixed................................................................................................................ 64
Lab 11 Logical Switching Break-Fix Scenario 2 ................................................................... 65
Task 1: Read the Scenario Description ......................................................................................................................66
Task 2: Confirm the Problem......................................................................................................................................... 67
Task 3: Troubleshoot and Fix the Problem ............................................................................................................. 67
Task 4: Verify That the Problem Is Fixed................................................................................................................. 67
Lab 12 (Optional) Logical Switching Challenge Scenario ................................................ 69
Task 1: Read the Scenario Description ..................................................................................................................... 70
Task 2: Confirm the Problem........................................................................................................................................ 70
Task 3: Troubleshoot and Fix the Problem .............................................................................................................. 71
Task 4: Verify That the Problem Is Fixed.................................................................................................................. 71
Lab 13 Logical Routing Validation ............................................................................................. 73
Task 1: Prepare for the Lab ............................................................................................................................................ 74
Task 2: Verify the Tier-1 and Tier-0 Gateways from the NSX UI ................................................................... 74
Task 3: Verify the Logical Routers from the NSX CLI on the NSX Manager Instance ..........................74
Task 4: Verify the Logical Routers from the NSX CLI on the ESXi Host ................................................... 76
Task 5: Verify the Logical Routers from the NSX CLI on the KVM Host ................................................... 79
Task 6: Verify the Logical Routers from the NSX CLI on the NSX Edge Nodes ................................... 80
Lab 14 Logical Routing Break-Fix Scenario 1 ....................................................................... 85
Task 1: Read the Scenario Description ......................................................................................................................86
Task 2: Confirm the Problem......................................................................................................................................... 87
Task 3: Troubleshoot and Fix the Problem ............................................................................................................. 87
Task 4: Verify That the Problem Is Fixed................................................................................................................. 88
Lab 15 Logical Routing Break-Fix Scenario 2 ...................................................................... 89
Task 1: Read the Scenario Description ......................................................................................................................89
Task 2: Confirm the Problem.......................................................................................................................................... 91
Task 3: Troubleshoot and Fix the Problem .............................................................................................................. 91
Task 4: Verify That the Problem Is Fixed................................................................................................................. 92
Lab 16 Logical Routing Break-Fix Scenario 3 ...................................................................... 93
Task 1: Read the Scenario Description ...................................................................................................................... 93
Task 2: Confirm the Problem......................................................................................................................................... 95
Task 3: Troubleshoot and Fix the Problem ............................................................................................................. 95
vi
Task 4: Verify That the Problem Is Fixed................................................................................................................. 95
Lab 17 Logical Routing Challenge Scenario 1 (Optional) ................................................. 97
Task 1: Read the Scenario Description ...................................................................................................................... 97
Task 2: Confirm the Problem.........................................................................................................................................99
Task 3: Troubleshoot and Fix the Problem .............................................................................................................99
Task 4: Verify That the Problem Is Fixed.................................................................................................................99
Lab 18 Logical Routing Challenge Scenario 2 (Optional) ............................................... 101
Task 1: Read the Scenario Description ..................................................................................................................... 101
Task 2: Confirm the Problem....................................................................................................................................... 103
Task 3: Troubleshoot and Fix the Problem ...........................................................................................................104
Task 4: Verify That the Problem Is Fixed...............................................................................................................104
Lab 19 Distributed Firewall Validation ................................................................................... 105
Task 1: Prepare for the Lab .......................................................................................................................................... 106
Task 2: Enable Distributed Firewall Rules ............................................................................................................... 107
Task 3: Test the Connectivity Between Three-Tier App Machines ............................................................ 108
Task 4: Verify DFW Rules from the ESXi CLI ....................................................................................................... 110
Task 5: Verify DFW Rules from the KVM CLI ....................................................................................................... 113
Task 6: Prepare for the Next Lab .............................................................................................................................. 115
Lab 20 Distributed Firewall Break-Fix Scenario 1 ............................................................. 117
Task 1: Read the Scenario Description ..................................................................................................................... 118
Task 2: Confirm the Problem........................................................................................................................................ 119
Task 3: Troubleshoot and Fix the Problem ............................................................................................................ 119
Task 4: Verify That the Problem Is Fixed............................................................................................................... 120
Lab 21 Distributed Firewall Break-Fix Scenario 2 ............................................................. 121
Task 1: Read the Scenario Description .................................................................................................................... 122
Task 2: Confirm the Problem....................................................................................................................................... 123
Task 3: Troubleshoot and Fix the Problem ........................................................................................................... 123
Task 4: Verify That the Problem Is Fixed............................................................................................................... 123
Lab 22 (Optional) Distributed Firewall Challenge Scenario ......................................... 125
Task 1: Read the Scenario Description .................................................................................................................... 126
Task 2: Confirm the Problem....................................................................................................................................... 127
Task 3: Troubleshoot and Fix the Problem ........................................................................................................... 127
Task 4: Verify That the Problem Is Fixed............................................................................................................... 127
vii
Lab 23 Gateway Firewall Validation ...................................................................................... 129
Task 1: Prepare for the Lab .......................................................................................................................................... 130
Task 2: Test Connectivity Before Enabling Gateway Firewall Rules .......................................................... 130
Task 3: Enable Gateway Firewall Rules.................................................................................................................... 131
Task 4: Test Connectivity After Enabling Gateway Firewall Rules .............................................................. 131
Task 5: Verify Gateway Rules from the NSX Edge CLI ................................................................................... 132
Task 6: Prepare for the Next Lab ............................................................................................................................. 134
Lab 24 Gateway Firewall Break-Fix Scenario 1 ................................................................ 135
Task 1: Read the Scenario Description .................................................................................................................... 136
Task 2: Confirm the Problem....................................................................................................................................... 137
Task 3: Troubleshoot and Fix the Problem ........................................................................................................... 137
Task 4: Verify That the Problem Is Fixed............................................................................................................... 137
Lab 25 Gateway Firewall Break-Fix Scenario 2 ............................................................... 139
Task 1: Read the Scenario Description ....................................................................................................................140
Task 2: Confirm the Problem........................................................................................................................................ 141
Task 3: Troubleshoot and Fix the Problem ............................................................................................................ 141
Task 4: Verify That the Problem Is Fixed................................................................................................................ 141
Lab 26 Load Balancer Validation ............................................................................................ 143
Task 1: Prepare for the Lab .......................................................................................................................................... 143
Task 2: Verify the Load Balancer Operation ........................................................................................................ 145
Task 3: Verify the Load Balancer Configuration from the NSX CLI ............................................................ 147
Task 4: Prepare for the Next Lab ............................................................................................................................. 150
Lab 27 Load Balancer Break-Fix Scenario 1 ........................................................................ 151
Task 1: Read the Scenario Description .................................................................................................................... 152
Task 2: Confirm the Problem....................................................................................................................................... 153
Task 3: Troubleshoot and Fix the Problem ........................................................................................................... 153
Task 4: Verify That the Problem Is Fixed............................................................................................................... 153
Lab 28 Load Balancer Break-Fix Scenario 2...................................................................... 155
Task 1: Read the Scenario Description .................................................................................................................... 156
Task 2: Confirm the Problem....................................................................................................................................... 157
Task 3: Troubleshoot and Fix the Problem ........................................................................................................... 157
Task 4: Verify That the Problem Is Fixed............................................................................................................... 158
Lab 29 IPSec VPN Break-Fix Scenario ................................................................................ 159
viii
Task 1: Read the Scenario Description .................................................................................................................... 160
Task 2: Confirm the Problem........................................................................................................................................ 161
Task 3: Troubleshoot and Fix the Problem ............................................................................................................ 161
Task 4: Verify That the Problem Is Fixed............................................................................................................... 162
Lab 30 Layer 2 VPN Validation ............................................................................................... 163
Task 1: Prepare for the Lab .......................................................................................................................................... 164
Task 2: Verify the IPsec VPN from the NSX CLI ................................................................................................ 164
Task 3: Verify the L2 VPN from the NSX CLI ...................................................................................................... 167
Task 4: Verify the Operation of the VPN Setup ................................................................................................. 169
Lab 31 Layer 2 VPN Break-Fix Scenario ............................................................................. 173
Task 1: Read the Scenario Description .................................................................................................................... 173
Task 2: Confirm the Problem....................................................................................................................................... 174
Task 3: Troubleshoot and Fix the Problem ........................................................................................................... 175
Task 4: Verify That the Problem Is Fixed............................................................................................................... 175
Lab 32 (Optional) Layer 2 VPN Challenge Scenario ...................................................... 177
Task 1: Read the Scenario Description .................................................................................................................... 177
Task 2: Confirm the Problem....................................................................................................................................... 179
Task 3: Troubleshoot and Fix the Problem ........................................................................................................... 179
Task 4: Verify That the Problem Is Fixed............................................................................................................... 179
Lab 33 Datapath Troubleshooting for the E-W Packet Capture .............................. 181
Task 1: Use Traceflow .................................................................................................................................................... 182
Task 2: Perform Data Collection for Packet Capture ....................................................................................... 184
Task 3: Perform Packet Capture ............................................................................................................................... 189
Lab 34 Datapath Troubleshooting for the N-S Packet Capture ............................... 201
Task 1: Use Traceflow ................................................................................................................................................... 202
Task 2: Perform Data Collection for Packet Capture ......................................................................................204
Task 3: Perform Packet Capture ............................................................................................................................... 210
ix
Lab 1 Reviewing the Lab Structure
and Environments
You assume the role of the network administrator for the VM Beans Coffee Company.
To prepare for an upcoming audit, your manager asked you to perform a series of validation
checks on the company's Production environment. You must confirm that this environment is
configured and working as expected. As part of your job, you must also investigate and fix
any user-reported issues that might arise in the company's Non-Production environment.
1
2. Review the configuration information.
The following software-defined data centers (SDDC) are available as part of the vSphere
environment:
• DataCenter-01-Production: Contains two vSphere clusters representing a healthy and
working environment. This environment is used for validating the NSX-T Data Center
components.
• DataCenter-02-Non-Production: Contains four vSphere clusters representing a
problematic environment and is used for troubleshooting the NSX-T Data Center
problems.
The SDDCs provide infrastructure services for the company's environments and business
units:
• Production (Prod):
Hosts the production (Prod) workloads across various business units and the
company's remote office branch office (ROBO) implementation.
Runs on the DataCenter-01-Production data center and represents a healthy and
working environment.
Is used for lab tasks that involve the validation of the NSX-T Data Center
components
• Non-Production (Non-Prod):
Hosts the workloads from the Development (DEV), Staging (STG), and QA (QA)
business units.
Runs on the DataCenter-02-Non-Production data center and represents a
misconfigured and nonworking environment.
Is used for lab tasks that involve troubleshooting the NSX-T Data Center problems.
2
Task 2: Review the Production Environment Overview
The production environment runs a three-tier web application with database, application, and web
tiers running across ESXi and KVM hosts. You review an overview of the Production environment
components to be used in future labs.
1. Review the configuration of the three-tier web application and the corresponding vCenter
Server inventory items.
3
2. Review the topology for the Production environment.
1. Review the configuration of the Staging environment and the corresponding vCenter Server
inventory items.
4
2. Review the topology for the Staging environment.
5
2. Review the topology for these environments.
In Validation labs, you explore and gather information from the healthy Production
environment. You record the relevant information in the student worksheet.
2. Review the information about the Break-Fix Scenario and Challenge Scenario lab activities.
• In Break-Fix Scenario and Challenge Scenario labs, you troubleshoot and fix problems in
the Non-Production environment.
• The Challenge Scenario labs are optional and involve a higher difficulty level.
You might need to use supplemental materials, such as knowledge base articles or user
documentation, to resolve the problems in these labs.
6
Task 6: Review Best Practices to Access the Lab Environment
You review the best practices that enable you to effectively perform future labs.
1. Review the best practices that you must follow across all labs.
• You access and manage the lab environment from the student desktop. The system
assigned to you serves as an end-user terminal.
• The student desktop resides on the Management network (SA-Management). You use
the student desktop to validate the environment, run commands on NSX-T Data Center
components, and troubleshoot Break-Fix Scenario labs.
• Notepad++ is installed on the student desktop and can be accessed from the taskbar.
You can use Notepad++ to save the command outputs and log events that you gather
during the labs. You must create one file per lab task to organize the content for future
reference.
• In the Validation labs, you gather information. You can record this information in the
student worksheet.
7
8
Lab 2 NSX-T Data Center Operations
and Troubleshooting Tools
3. Configure Syslog in an NSX Edge Node and Review the Collected Logs
a. Open Chrome.
b. Select the NSX-T Data Center > NSX Manager (Prod) bookmark.
c. On the login page, enter admin as the user name and VMware1!VMware1! as the
password.
9
Task 2: Configure Syslog in NSX Manager and Review the Collected
Logs
You configure a Syslog server address in NSX Manager, and you review the collected logs from
the remote Syslog collector.
2. Configure NSX Manager to send the UDP info-level log messages to the vRealize Log Insight
server.
get logging-server
4. Log in to the vRealize Log Insight UI.
b. Select the NSX-T Data Center > vRealize Log Insight bookmark.
c. On the login page, enter admin as the user name and VMware1! as the password.
6. Verify that the log messages from the NSX Manager component appear in the Events pane.
7. Return to the SA-NSX-Manager-01 MTPuTTY session and remove the Syslog server
configuration.
get logging-server
A blank system prompt must be returned.
10
Task 3: Configure Syslog in an NSX Edge Node and Review Collected
Logs
You configure a Syslog server address in NSX Edge, and you review the collected logs from the
remote Syslog collector.
get logging-servers
5. Return to the vRealize Log Insight UI and click Interactive Analytics to refresh the displayed
data.
6. Verify that the log messages from the NSX Edge node appear in the events pane.
7. Return to the sa-nsxedge-01 MTPuTTY session and remove the Syslog server configuration.
get logging-server
A blank system prompt must be returned.
9. Close all MTPuTTY sessions and the vRealize Log Insight UI browser tab.
11
Task 4: Generate a Technical Support Bundle for NSX Manager
You generate a technical support bundle to gather log and configuration information for NSX
Manager.
2. At the Request Bundle step, verify that Management Nodes is selected from the Type
drop-down menu.
3. From the Available pane, select the sa-nsxmgr-01 check box and click the right arrow to
move it to the Selected pane.
5. Turn on the Include core files and audit logs toggle to display Yes.
In the Status step, you monitor the collection progress. This process might take up to 15
minutes to complete. When the support bundle is ready, the DOWNLOAD button appears.
NOTE
You do not need to wait for the generation of the support bundle to complete. You can
return later if you want to download and examine the contents of the support bundle.
12
Task 5: Configure a Traceflow Session
You specify the source VM and the destination VM of a Traceflow session.
1. Open MTPuTTY and open an SSH session to the SA-KVM-01 host, which is in the
Production-Infrastructure folder.
2. Power on the sa-db-01 VM.
Option Action
Option Action
Option Action
6. Click TRACE.
13
Task 6: Examine the Traceflow Output
You examine the Traceflow output to determine how the packet is introduced in the datapath,
which components are involved, and how the packet is delivered.
1. If a trace observation warning message appears, ignore and close the message because
your lab runs in a nested ESXi environment.
2. Verify that the Traceflow output that appears includes the network diagram at the top and
the observations pane with the steps of the packet at the bottom.
3. In the first row of the packet walk in the Observations pane, verify that a packet is
introduced through the transport node.
4. In the second and third rows, verify that the distributed firewall receives the packet, applies
firewall rules, and forwards the packet to the Prod-App-Segment segment.
5. In the fourth through seventh rows, verify that Prod-App-Segment, which is attached to the
Prod-T1-GW-01 gateway, receives and forwards the packet to the Prod-DB-Segment
segment.
14
6. In the eighth and ninth rows, verify that the source TEP and destination TEP IP addresses
appear.
7. In the 10th and 11th rows, verify that the distributed firewall receives the packet and applies
firewall rules, if any, at the destination host.
8. In the last row, verify that the packet is delivered to the destination VM's port.
15
16
Lab 3 NSX Management Cluster
Validation
3. Verify the NSX Management Cluster Status from the NSX CLI
a. Open Chrome.
17
2. Log in to the NSX UI.
b. Select the NSX-T Data Center > NSX Manager (Prod) bookmark.
c. On the login page, enter admin as the user name and VMware1!VMware1! as the
password.
1. From the NSX UI, verify the NSX Management cluster status.
b. Click VIEW DETAILS to obtain information about individual nodes in the cluster.
2. Use the information in the NSX UI to record the status and configuration of the NSX
management cluster in the Value column of this table in your student worksheet.
You must click VIEW DETAILS on the node to display some of the details required to
populate the table.
IMPORTANT
In all Validation lab tasks, you record the information in the tables in your student worksheet.
Parameter Value
Cluster ID
Virtual IP
Node UUID
3. Verify that the NSX management cluster status appears as STABLE and the cluster node
status appears as Available.
18
Task 3: Verify the NSX Management Cluster Status from the NSX CLI
You verify the NSX management cluster status from the nsxcli command line.
An NSX Manager instance with a similar name exists in the Non-Production environment.
Verify that you have logged in to the correct NSX Manager instance.
Parameter Value
Cluster ID
Overall status
The UUID and status of NSX Manager nodes running other groups such as
CLUSTER_BOOT_MANGER, MANAGER, POLICY, and HTTPS also appear.
19
7. Use the information in the command output to record the status and configuration of the
NSX CLI management cluster in the Value column of this table in your student worksheet.
Parameter Value
Cluster ID
Node UUID
HTTPS Port
DATASTORE Port
IP Address
Verify that the node UUID recorded here is same as the UUID recorded using the NSX UI in
the previous task.
Verify that the IP address recorded here is the node IP address and not the cluster virtual IP
recorded in the previous task.
8. Verify that the NSX Manager node is joined to the cluster by ensuring that the node status is
JOINED.
20
Lab 4 NSX Management Cluster
Break-Fix Scenario
One of the NSX Manager VMs configured in the existing three-node NSX management
cluster has failed and is unrecoverable. The failure occurred because the ESXi server
hardware malfunctioned.
VMware Support advises removing the failed NSX Manager instance from the existing NSX
management cluster and creating a three-node cluster with a new NSX Manager VM.
21
2. Review details about the lab environment and the course of action.
• The existing NSX management cluster was configured with the nsxmgr-01a, nsxmgr-
02a, and nsxmgr-03a nodes. The nsxmgr-03a node has failed and is unrecoverable.
• The nsxmgr-04a node is already deployed and runs on the standalone sa-esxi-13.
vclass.local ESXi host.
• The nsxmgr-03a node should be detached from the existing NSX management cluster.
• The nsxmgr-04a node should be joined to the existing NSX management cluster.
When this lab concludes, a three-node NSX management cluster must be configured with
the nsxmgr-01a, nsxmgr-02a, and nsxmgr-04a nodes.
NOTE
Before performing the next step, verify that the NSX Manager name is correct. The NSX
Manager name must be nsxmgr-01a in the Non Production - NSX Inventory
folder in MTPuTTY.
22
8. Verify the management cluster status.
9. Verify the HTTP service state on nsxmgr-01a with the get service http command.
Example:
NOTE
Before performing the next step, verify that the NSX Manager name is correct. The NSX
Manager name must be nsxmgr-01a in the Non Production - NSX Inventory
folder in MTPuTTY.
23
2. Verify the status and retrieve the UUID.
The nsxmgr-03a manager UUID appears under Manager Group in the get
cluster status command output.
c. (Optional) If the % The get cluster status operation cannot be
processed currently, please try again later message appears,
wait for 2 minutes and run the get cluster status command again.
24
6. Obtain the cluster ID.
a. Retrieve the cluster ID.
nsxmgr-01a> get cluster config
Example:
nsxmgr-01a> get cluster config
Cluster Id: cfec1b3b-290c-441e-a0a3-f14ad389f932
Cluster Configuration Version: 8
b. Copy the retrieved cluster ID to the Notepad file.
7. In MTPuTTY, double-click nsxmgr-04a in the Non Production - NSX Inventory
folder.
8. Join nsxmgr-04a to the existing management cluster.
nsxmgr-04a> join 172.20.10.101 cluster-id <Cluster-ID>
thumbprint <nsxmgr-01a-thumbprint> username admin password
VMware1!VMware1!
Example:
nsxmgr-04a> join 172.20.10.101 cluster-id cfec1b3b-290c-
441e-a0a3-f14ad389f932 thumbprint
17f9165415bd7ed8c7e7764b019a75b621b67190ac14fa660a5be46ed6bd
5523 username admin password VMware1!VMware1!
Data on this node will be lost. Are you sure? (yes/no): yes
Join operation successful. Services are being restarted.
Cluster may take some time to stabilize.
The join command typically takes up to 10 minutes to successfully join nsxmgr-04a to the
management cluster.
9. Verify the cluster status on nsxmgr-04a.
nsxmgr-04a> get cluster status
If the nsxmgr-04a status is DOWN, wait for a few more minutes and run the get
cluster status command again. In the command output, the management cluster must
be formed with the nsxmgr-01a, nsxmgr-02a, and nsxmgr-04a nodes.
10. Open Chrome and click NSX Manager (Non Prod) in the NSX-T Data Center
bookmarks folder.
a. If necessary, log in to nsxmgr-01a with admin as the user name and
VMware1!VMware1! as the password .
11. Select System > Appliances.
In the management cluster status, three NSX Manager nodes (sa-nsxmgr-01a : 172.20.10.101,
nsxmgr-02a : 172.20.10.102, nsxmgr-04a : 172.20.10.104) appear and the management
cluster status is STABLE.
25
Task 4: Verify That the Problem Is Fixed
You verify that the three-node management cluster is configured and that the status is UP.
26
Lab 5 Infrastructure Preparation
Validation
27
Task 1: Prepare for the Lab
You prepare for the lab by logging in to the NSX UI.
b. Select the NSX-T Data Center > NSX Manager (Prod) bookmark.
NOTE
c. On the login page, enter admin as the user name and VMware1!VMware1! as the
password .
a. From the NSX UI, select System > Fabric > Compute Managers.
b. Use the information in the NSX UI to record the configuration and status details for the
sa-vcsa-01.vclass.local compute manager in the Value column of this table
in your student worksheet.
Parameter Value
Type
Registration status
Version
Connection status
28
2. Verify the transport zone configuration.
a. From the NSX UI, select System > Fabric > Transport Zones.
c. Click the Prod-Overlay-TZ transport zone and use the information that appears to
record the transport zone details in the Value column of this table in your student
worksheet.
Parameter Value
Traffic type
Switch name
Number of switches
d. Click the Prod-VLAN-TZ transport zone and use the information that appears to record
the transport zone details in the Value column of this table in your student worksheet.
Parameter Value
Traffic type
Switch name
Number of Switches
29
3. Verify the uplink profiles.
a. Select System > Fabric > Profiles and click the Uplink Profiles tab.
Parameter Value
Teaming policy
Active uplinks
MTU
b. On the IP ADDRESS POOLS tab, verify that TEP-IP-Pool exists and the status of the IP
address pool is Success.
c. Click the 1 numbered link in the Subnets column and click the arrow to expand the IP
range information.
d. Record the IP range information of the TEP-IP-Pool in the Value column of this table in
your student worksheet.
Parameter Value
CIDR 172.20.__________
Gateway 172.20.__________
30
Task 3: Verify the Transport Node Preparation from the NSX UI
You verify the KVM and ESXi transport nodes configuration from the NSX UI.
a. From the NSX UI, select System > Fabric > Nodes > Host Transport Nodes.
b. From the Managed by drop-down menu, select None: Standalone Hosts and verify that
sa-kvm-01.vclass.local and sa-kvm-02.vclass.local are configured as transport nodes.
c. Use the information available in the NSX UI to record the configuration of the sa-kvm-
01.vclass.local host transport node in the Value column of this table in your student
worksheet.
Click the information icon next to the Up status to display additional information about
the manager connectivity, controller connectivity, PNIC/bond status, and tunnel status.
Parameter Value
Node status
OS type
TEP IP address
Manager connectivity
Controller connectivity
Transport zones
i. Verify that the TEP IP address recorded here is from the IP range recorded in the
previous task.
d. On the Host Transport Nodes tab, select sa-vcsa-01.vclass.local from the Managed by
drop-down menu.
You might need to resize the columns to see the full name of the vSphere clusters.
31
g. Record the configuration and state of the sa-esxi-04.vclass.local host transport node in
the Value column of this table in your student worksheet.
Parameter Value
Node status
OS type
TEP IP address
Manager Connectivity
Controller Connectivity
Transport Zones
i. Verify that the TEP IP address recorded here is from the IP range recorded in the
previous task.
h. Click the information icon next to the Up status to display additional information about
the manager connectivity, controller connectivity, PNIC/bond status, and tunnel status.
Parameter Value
Node status
Configuration state
TEP IP address
Deployment type
Manager connectivity
Transport zones
Edge cluster
32
Task 4: Verify the Transport Node Preparation from the ESXi CLI
You use the native ESXi commands to query the list of NSX-T Data Center packages and
modules installed on the ESXi host. You also retrieve the configuration information of the IP
addresses, TEP, and NSX-T Data Center modules.
1. Open MTPuTTY from the taskbar and double-click SA-ESXi-04 from the Production -
Infrastructure folder.
2. Use the relevant information from various command outputs to record the details for the sa-
esxi-04 ESXi host in the Value column of this table in your student worksheet.
Parameter Value
[root@sa-esxi-04:~] esxcfg-vswitch -l
a. Verify that Prod-Overlay-NVDS is configured with Uplinks vmnic5 and vmnic4.
33
5. Query the NSX-Proxy agent service status.
6. Query network connections between the ESXi host and the NSX Management plane.
7. Query network connections between the ESXi host and the NSX Control plane.
Task 5: Verify the Transport Node Preparation from the KVM CLI
You query the NSX-T Data Center packages and NSX Managed Virtual Distributed Switch (N-
VDS) configuration from the command line.
1. Open MTPuTTY from the taskbar and double-click SA-KVM-02 in the Production -
Infrastructure folder.
2. At the SA-KVM-02 VM command line, switch the user to root.
vmware@sa-kvm-02:~$ sudo -i
34
3. Use the relevant information from various command outputs to record the details for the sa-
kvm-02 Kernel-based Virtual Machine (KVM) host in the Value column of this table in your
student worksheet.
The substeps include the commands that must be run.
Parameter Value
a. List the NSX-T Data Center packages installed on the Ubuntu KVM host.
root@sa-kvm-02:~# dpkg --list | egrep "Name|nsx"
b. Run the ifconfig command to list the interfaces to verify the interfaces from the
KVM command line.
root@sa-kvm-02:~# ifconfig
The IPv4 address of the nsx-vtep0.0 interface was created when the Ubuntu KVM host
was configured as a transport node.
c. Query the Open vSwitch configuration.
root@sa-kvm-02:~# ovs-vsctl show
The command output lists the bridges named nsx-managed and nsx-switch.0
that were configured during the transport node preparation.
4. Query the NSX-Proxy agent service status.
root@sa-kvm-02:~# service nsx-proxy status
5. Verify that the status of NSX proxy is running.
6. Verify that the Ubuntu KVM host and the NSX Management plane are connected.
a. Run the netstat -nap | grep 1234 command.
root@sa-kvm-02:~# netstat -nap | grep 1234
b. Verify that open and ESTABLISHED connections exist between the KVM host and NSX
Management plane on port 1234.
7. Verify that the Ubuntu KVM host and the NSX Control plane are connected.
a. Run the netstat -nap | grep 1235 command.
root@sa-kvm-02:~# netstat -nap | grep 1235
b. Verify that open and ESTABLISHED connections exist between the KVM host and NSX
Control plane on port 1235.
35
Task 6: Verify the NSX Edge Configuration from the NSX CLI
You log in to the sa-nsxedge-01 NSX Edge node to query the information from the NSX CLI.
2. Use the relevant information from various command outputs to record the details for NSX
Edge sa-nsxedge-01 in the Value column of this table in your student worksheet. The
substeps include the commands that must be run.
Parameter Value
Node UUID
36
Task 7: Prepare for the Next Lab
You power on the sa-nsxedge-11 virtual machine that is used in an upcoming infrastructure break-
fix lab.
4. In the Navigator pane, right-click sa-nsxedge-11 and select Power > Power On
37
38
Lab 6 NSX Infrastructure Preparation
Break-Fix Scenario 1
A junior colleague tried to add the sa-esxi-12 ESXi host as a host transport node to the
staging environment. The addition failed and your colleague has asked for your assistance.
You assist your colleague to get NSX configured on the ESXi host.
At the end of this lab, the sa-esxi-12 host must display a successful configuration status in the
NSX UI.
39
2. Review details about the lab environment and the course of action.
• The sa-esxi-12 host is already deployed and running in vCenter Server under
Staging-Cluster-02 cluster in the Datacenter-02-Non-Production
data center.
Password: VMware1!
IP assignment: TEP-IP-Pool
Teaming Policy Switch Mapping: Active > vmnic4, Standby > vmnic5
1. In Chrome, click the NSX-T Datacenter > NSX Manager (Non Prod) bookmark.
2. Log in to NSX Manager by entering admin as the user name and VMware1!VMware1!
as the password.
3. From the NSX UI, click System > Fabric > Nodes and click the Host Transport Nodes tab.
Ignore the status of the already added transport nodes. These problems will be fixed in later
labs.
Use the configuration details provided from the scenario in the Add Transport Node wizard.
40
Task 3: Troubleshoot and Fix the Problem
You use the techniques and tools acquired in the course to troubleshoot and fix the problem .
1. Use the available techniques and tools to troubleshoot and fix the problem.
2. If you cannot fix the problem, ask your instructor or use the lab resources link for help.
1. In Chrome, select the Breakfix labs bookmarks folder and click NSX Manager.
2. Log in to NSX Manager by entering admin as the user name and VMware1!VMware1!
as the password.
3. From the NSX UI, click the System > Fabric > Nodes > Host Transport Nodes tab.
41
42
Lab 7 NSX Infrastructure Preparation
Break-Fix Scenario 2
Your colleague deployed a virtual machine manually to be used as an NSX Edge node in the
Staging environment. You must add and configure this virtual machine as an NSX Edge
transport node.
NOTE
Do not deploy a new NSX Edge node. You must add the NSX Edge node that is already
deployed.
• The sa-nsxedge-11 host must display a successful configuration status in the NSX UI.
• You must be able to ping the TEP IP of the edge transport node.
43
2. Review details about the lab environment and the course of action.
• The sa-nsxedge-11 edge VM is already deployed and running in the vCenter Server
inventory under the Management-Edge-Cluster-02 cluster in the
Datacenter-02-Non-Production data center.
• The sa-nsxedge-11 edge VM is added to MTPuTTY under the Non-Production -
NSX-Inventory folder.
• The fully qualified domain name (FQDN) of the edge VM is sa-nsxedge-11.vclass.local.
Password: VMware1!VMware1!
1. In Chrome, select the NSX-T Data Center bookmarks folder and click NSX Manager (Non-
Prod).
2. Log in to NSX Manager by entering admin as the user name and VMware1!VMware1!
as the password .
3. From the NSX UI, click the System > Fabric > Nodes > Edge Transport Nodes tab.
4. Verify that the sa-nsxedge-11 edge node is not configured as an edge transport node in
NSX-T Data Center.
44
Task 3: Troubleshoot and Fix the Problem
You use the techniques and tools acquired in the course to troubleshoot and fix the problem.
1. Use the available techniques and tools to troubleshoot and fix the problem.
2. If you cannot fix the problem, ask your instructor or use the lab resources link for help.
1. In Chrome, select the Breakfix labs bookmarks folder and click NSX Manager.
2. Log in to NSX Manager by entering admin as the user name and VMware1!VMware1!
as the password .
3. From the NSX UI, click the System > Fabric > Nodes > Edge Transport Nodes tab.
5. From the TEP IP Addresses column, record the TEP IP of sa-nsxedge-11. __________
6. Use the TEP IP that you recorded to ping , from the student desktop, to the TEP IP address
of sa-nsxedge-11.
4. In the Navigator pane, right-click sa-nsxedge-11 and select Power > Shut Down Guest OS.
45
46
Lab 8 NSX Infrastructure Preparation
Challenge Scenario (Optional)
A junior colleague tried to add the sa-kvm-03 Ubuntu Kernel-based Virtual Machine (KVM)
host as a host transport node to the Staging environment. Adding the node failed and your
colleague asked for your assistance.
At the end of this lab, a successful configuration status must appear for the sa-kvm-03 host
in the NSX UI.
47
2. Review details about the lab environment and the course of action.
• The sa-kvm-03 host is already deployed. vCenter Server does not manage this host.
Password: VMware1!
Teaming policy switch mapping: Active > eth2, Standby > eth3
1. In Chrome, select the NSX-T Data Center bookmarks folder and click NSX Manager (Non-
Prod).
2. Log in to NSX Manager by entering admin as the user name and VMware1!VMware1!
as the password.
3. From the NSX UI, click the System > Fabric > Nodes > Host Transport Nodes tab.
You can use the configuration details from the scenario description in the Add Transport
Node wizard.
48
Task 3: Troubleshoot and Fix the Problem
You use the techniques and tools acquired in the course to troubleshoot and fix the problem.
1. Use the available techniques and tools to troubleshoot and fix the problem.
2. If you cannot fix the problem, ask your instructor or use the lab resources link for help.
1. In Chrome, select the NSX-T Data Center bookmarks folder and click NSX Manager (Non-
Prod).
2. Log in to NSX Manager by entering admin as the user name and VMware1!VMware1!
as the password.
3. From the NSX UI, click the System > Fabric > Nodes > Host Transport Nodes tab.
49
50
Lab 9 Logical Switching Validation
51
Task 1: Prepare for the Lab
You log in to the vSphere Client UI and the NSX UI.
a. Open Chrome.
b. Click the NSX-T Data Center > NSX Manager (Prod) bookmark.
c. On the login page, enter the admin as the user name and the VMware1!VMware1!
as the password .
2. Find the Prod-Web-Segment segment and verify that its status is Success.
52
Task 3: Verify Logical Switches from the NSX CLI
You run the nsxcli commands to retrieve the configuration of the Prod-Web-Segment logical
switch.
1. Open MTPuTTY from the taskbar and click the sa-nsxmgr-01 tab.
2. Query the logical switches configured in NSX Manager.
a. Run the get logical-switches command.
sa-nsxmgr-01> get logical-switches
The VNI, UUID, name, and type of the segment appear.
b. Record the logical switch VNI and UUID of Prod-Web-Segment in the Value column of
this table in your student worksheet.
You use these details in the upcoming lab tasks.
Parameter Value
Name Prod-Web-Segment
VNI
UUID
Type
NOTE
The command output displays that multiple logical switches were created, including the
Prod-Web-Segment logical switch. These preconfigured logical switches are part of the
topology and will be used in later labs.
To query the ports configured on the segment, you must use the UUID of the segment. Do
not use the VNI.
53
4. List the transport node table of the Prod-Web-Segment logical switch.
NOTE
You can also use the UUID of the segment to query the transport node table.
a. From the vSphere Client, select sa-web-01 and click Launch Web Console in the right
pane.
• Password: VMware1!
c. Initiate a series of pings from the sa-web-01 VM to the sa-web-02 and sa-web-03 VMs.
54
6. Use the relevant information from various command outputs to record the details in the
Value column of this table in your student worksheet.
The substeps include the commands that must be run.
Verify Logical Switches from NSX Manager CLI
Switch Table Entry Value
arp-table MAC of sa-web-01
(172.16.10.11)
mac-table VTEP-IP associated with sa-
web-01 MAC
mac-table VTEP-IP associated with sa-
web-02 MAC
vtep TransportNode-ID
associated with sa-web-01
55
7. Display names of the transport nodes.
56
6. Record configuration details for Prod-Web-Segment in the Value column of this table in your
student worksheet.
Parameter Value
DVS name
Controller IP
Replication mode
Transport binding
a. From vSphere Web Client, select sa-web-01 and click Launch Web Console in the right
pane.
• Password: VMware1!
c. Initiate a series of pings from the sa-web-01 VM (172.16.10.11) to the sa-web-02 and sa-
web-03 VMs.
57
8. Use the relevant information from various command outputs to record the details in the
Value column of this table in your student worksheet.
The substeps include the commands that must be run.
58
Task 5: Verify Logical Switches from the KVM CLI
You use the NSX CLI on the sa-kvm-02 host to retrieve the configuration of the Prod-Web-
Segment logical switch.
1. Open MTPuTTY from the taskbar and click the SA-KVM-02 tab.
2. At the SA-KVM-02 VM command line, change the user to root.
vmware@sa-kvm-02:~$ sudo -i
3. Retrieve the interfaceid of the sa-web-03 virtual machine from the virtual machine
configuration.
root@sa-kvm-02:~# virsh dumpxml sa-web-03 | grep interfaceid
4. Record the interfaceid. __________
5. Run the nsxcli command to enter the nsxcli command line.
root@sa-kvm-02:~# nsxcli
6. Query the logical switches realized on the KVM host.
sa-kvm-02> get logical-switches
The logical switch UUID realized on KVM, VNI/VLAN ID, and the number of ports that are
connected to the logical switch on that host appear.
7. Query the information about the Prod-Web-Segment segment.
sa-kvm-02> get logical-switch <Prod-Web-Segment-VNI>
The command output includes the segment UUID, VNI, replication mode, link status and VIF,
MAC, ARP, and TEP counts.
Example: sa-kvm-02> get logical-switch 69632
8. Query the switch ports connected to the Prod-Web-Segment segment.
sa-kvm-02> get logical-switch <Prod-Web-Segment-VNI> ports
This command lists the port UUID to which the VM is connected, the port status, the VIF
UUID, and snoop mode (ARP, DHCP) to learn the IP/MAC association.
Example: sa-kvm-02> get logical-switch 69632 ports
9. Verify that the VIF UUID in the command output matches the interfaceid from the virsh
dumpxml command that you recorded.
10. Initiate pings from the sa-web-01 VM.
a. Navigate to the sa-web-01 VM console.
b. If needed, log in to the sa-web-01 VM.
• User name: root
• Password: VMware1!
c. Initiate a series of pings from the sa-web-01 VM (172.16.10.11) to the sa-web-02 and sa-
web-03 VMs.
sa-web-01:~# ping -c 2 172.16.10.12
sa-web-01:~# ping -c 2 172.16.10.13
59
11. Use the relevant information from various command outputs to record the details in the
Value column of this table in your student worksheet.
a. Click the sa-kvm-02 tab in MTPuTTY and query the arp-table of the Prod-Web-
Segment segment.
b. From the arp-table output, record the MAC of the sa-web-01 VM in the table.
d. Verify that the sa-web-01 VTEP IP (outer IP) recorded here matches the value
recorded, in the earlier task, from NSX manager.
e. From the mac-table output, record the VTEP label used for the sa-web-01 traffic in the
table.
g. From the vtep-table output, record the VTEP IP used for the sa-web-01 traffic in the
table.
60
Lab 10 Logical Switching Break-Fix
Scenario 1
61
Task 1: Read the Scenario Description
You read the scenario description and determine the course of action.
In an NSX environment, VMs connected to the same segment and residing on separate ESXi
hosts cannot communicate with each other.
The sa-hrapp-02 VM runs on sa-esxi-06 and the sa-hrapp-03 VM runs on sa-esxi-07. Both
VMs are connected to STG-HR-Segment.
IMPORTANT
You cannot ping the VMs in STG-HR-Segment from outside the segment. This behavior is
expected.
62
Task 2: Confirm the Problem
You confirm a problem that was reported by the help desk: Users cannot ping between the sa-
hrapp-02 and sa-hrapp-03 VMs.
a. Select sa-hrapp-02 and click Launch Web Console from the Summary tab.
b. Log in by entering root as the user name and VMware1! as the password.
ping -c 3 172.16.50.13
The ping must not be successful.
1. Use the available techniques and tools to troubleshoot and fix the problem.
2. If you cannot fix the problem, ask your instructor or use the lab resources link for help.
63
Task 4: Verify That the Problem Is Fixed
You verify that the connectivity between the sa-hrapp-02 and sa-hrapp-03 servers is restored.
IMPORTANT
ping -c 3 172.16.50.13
64
Lab 11 Logical Switching Break-Fix
Scenario 2
65
Task 1: Read the Scenario Description
You read the scenario description and determine the course of action.
An NSX administrator applied a new security configuration at a segment port, which caused
communication loss between several VMs.
The sa-finapp-01 and sa-finapp-02 VMs are unable to ping each other.
IMPORTANT
You cannot ping the VMs in the STG-FIN-Segment from outside the segment. This behavior
is expected.
66
Task 2: Confirm the Problem
You confirm a problem that was reported by the help desk: VM sa-finapp-01 cannot
communicate with VM sa-finapp-02. Pings between these VMs failed.
4. Select the sa-finapp-01 VM and click Launch Web Console from the Summary tab.
5. Log in to the VM by entering root as the user name and VMware1! as the password .
ping -c 3 172.16.70.12
The ping command must not be successful.
1. Use the available techniques and tools to troubleshoot and fix the problem.
2. If you cannot fix the problem, ask your instructor or use the lab resources link for help.
ping -c 3 172.16.70.12
67
68
Lab 12 (Optional) Logical Switching
Challenge Scenario
69
Task 1: Read the Scenario Description
You read the scenario description and determine the course of action.
You must troubleshoot and fix a problem reported to the help desk. Network connectivity
does not exist between VMs in QA-UAT-Segment. The sa-uat-01 VM runs on the sa-esxi-08
host and the sa-uat-02 VM runs on the sa-esxi-09 host. The VMs cannot ping each other.
IMPORTANT
You cannot ping the VMs in QA-UAT-Segment from outside the segment. This behavior is
expected.
70
Task 3: Troubleshoot and Fix the Problem
You use the techniques and tools acquired in the course to troubleshoot and fix the problem.
1. Use the available techniques and tools to troubleshoot and fix the problem.
2. If you cannot fix the problem, ask your instructor or use the lab resources link for help.
2. At the sa-uat-01 command prompt, test network connectivity to the sa-uat-02 VM.
ping -c 3 172.16.60.12
71
72
Lab 13 Logical Routing Validation
3. Verify the Logical Routers from the NSX CLI on the NSX Manager Instance
4. Verify the Logical Routers from the NSX CLI on the ESXi Host
5. Verify the Logical Routers from the NSX CLI on the KVM Host
6. Verify the Logical Routers from the NSX CLI on the NSX Edge Nodes
73
Task 1: Prepare for the Lab
You log in to the NSX UI.
b. Select the NSX-T Data Center > NSX Manager (Prod) bookmark.
c. On the login page, enter admin as the user name and VMware1!VMware1! as the
password.
Task 2: Verify the Tier-1 and Tier-0 Gateways from the NSX UI
You verify the status of the Tier-1 and Tier-0 gateways from the NSX UI.
2. Find the Prod-T1-GW-01 gateway and verify that its status is Success.
4. Find the Prod-T0-GW-01 gateway and verify that its status is Success.
Task 3: Verify the Logical Routers from the NSX CLI on the NSX
Manager Instance
You query the logical router configuration from the NSX command line on NSX Manager.
• One distributed router (DR) instance and two service router (SR) instances are created
for Prod-T0-GW-01. Two SR instances are created because Prod-T0-GW-01 is
configured to be in active-active high availability mode. Observe that the ClusterID is
shared by both SR instances.
Additional Tier-0 and Tier-1 gateways are also created. These gateways are preconfigured
as per the topology to facilitate upcoming lab tasks.
74
4. Record the LR-ID and UUID of the SR and DR instances for the Prod-T0-GW-01 and Prod-
T1-GW-01 gateways in the UUID column of this table in your student worksheet.
You can use the find command with the LR-Name to limit the output to the logical router
of interest.
75
Task 4: Verify the Logical Routers from the NSX CLI on the ESXi Host
You query logical router information from the NSX CLI on the ESXi host.
[root@sa-esxi-05:~] nsxcli
3. List the logical routers present on this transport node.
4. Use the UUIDs recorded from the NSX Manager instance to verify that the DR instances of
Prod-T0-GW-01 and Prod-T1-GW-01 gateways are realized on the ESXi host.
The Tier-0 gateway distributed router (Prod-T0-GW-01) appears on the ESXi hosts only
after the Tier-1 gateway (Prod-T1-GW-01) is connected to the Tier-0 gateway (Prod-T0-
GW-01).
76
7. Record the overlay/VNI, mode, IP/mask, and MAC of each interface in this table in your
student worksheet.
• The LIF in Routing-LinkLif mode is the connection to the Tier-0 gateway (Prod-T0-GW-
01)
9. Compare the VNIs with the overlay VNIs that you recorded in an earlier step.
10. Exit nsxcli and return to the root user command prompt.
sa-esxi-05.vclass.local> exit
11. List the logical routers on the ESXi host.
NOTE
77
12. List the detailed LIF information about the Prod-T1-GW-01 distributed router.
NOTE
13. List the detailed LIF information about the Prod-T0-GW-01 distributed router.
[root@sa-esxi-05:~] net-vdr --lif --brief -l <DR-Prod-T0-GW-
01-UUID>
Example: [root@sa-esxi-05:~] net-vdr --lif --brief -l 152b6f28-
b5de-4d69-9c1b-a4cdc01518bb
The DR UUID, LIF information, LIF ID, mode, state, IP/mask, MAC address, and LIF UUID
information appear.
14. Record the overlay VNI, mode, and IP/mask (IPv4) in this table in your student worksheet.
The command output displays the LIFs in R-L and R-B modes:
• The LIF with R-B mode is the Routing-Backplane (R-B) to connect the Tier-0 DR to the
Tier-0 SR.
• The LIF with R-L mode is the linked port to connect the Tier-1 DR with the Tier-0 DR.
Compare the Id and IP/mask on this side of the connection with the overlay/VNI and
IP/mask recorded earlier on the Tier1 DR.
• The LIF with R,DL mode is the connection from the Tier-0 DR to the load balancer Tier-1
DR that is used in a later lab.
78
Task 5: Verify the Logical Routers from the NSX CLI on the KVM Host
You query the logical router information from the NSX CLI on KVM.
vmware@sa-kvm-01:~$ sudo -i
3. Enter the NSX CLI.
root@sa-kvm-01:~# nsxcli
4. Query the logical routers.
NOTE
If the command returns an empty list, virtual machines are currently not running on this KVM
transport node, and you must start the sa-db-01 virtual machine.
5. Verify that the router UUIDs are identical to those recorded in the earlier task that used NSX
CLI on the NSX Manager Instance (sa-nsxmgr-01).
79
8. Record the interface details of the Prod-T1-GW-01 logical router in the Value column of this
table in your student worksheet.
Parameter Value
Router ID
9. Compare the interface IPs with the IPs that you recorded in the previous task that used NSX
CLI on the ESXi host (sa-esxi-05).
Task 6: Verify the Logical Routers from the NSX CLI on the NSX Edge
Nodes
You query the logical router information from the NSX CLI on the NSX Edge nodes.
1. From MTPuTTY, open an SSH connection to the sa-nsxedge-01 tab.
2. List the logical routers.
DISTRIBUTED_ROUTER_TIER1 DR-Prod-T1-GW-01
DISTRIBUTED_ROUTER_TIER0 DR-Prod-T0-GW-01
SERVICE_ROUTER_TIER0 SR-Prod-T0-GW-01
80
4. Verify that the router UUIDs are identical to the UUIDs that you recorded in the earlier task
that used the NSX CLI on NSX Manager (sa-nsxmgr-01).
Only one of the active-active Tier-0 service routers appear on sa-nsxedge-01. The other
service router resides on sa-nsxedge-02.
7. Record details about the SR-Prod-T0-GW-01 neighbors in this table in your student
worksheet.
Neighbor AS State
Two neighbors are available because the Tier-0 service router is configured with two uplinks
to the upstream physical router. The neighbor in the established state is reversed on the
other partner in the active-active service router running on sa-nsxedge-02.
81
9. Display the routing table.
Flags:
t0c - Tier0-Connected, t0s - Tier0-Static, B - BGP,
t0n - Tier0-NAT, t1s - Tier1-Static, t1c - Tier1-Connected,
t1n: Tier1-NAT, t1l: Tier1-LB VIP, t1ls: Tier1-LB SNAT,
t1d: Tier1-DNS FORWARDER, t1ipsec: Tier1-IPSec, isr: Inter-SR,
> - selected route, * - FIB route
10. Display the directly connected routes.
Gateway Interface
82
15. Display the logical routers forwarding table.
16. Verify that the gateway IP and interface/port UUID for the Prod-App-Segment
(172.16.20.0/24) are identical to those recorded earlier for the BGP route.
83
84
Lab 14 Logical Routing Break-Fix
Scenario 1
85
Task 1: Read the Scenario Description
You read the scenario description and determine the course of action.
1. Read the scenario description.
An NSX administrator reconfigured a Tier-1 gateway, and the VMs connected to its
segments are unable to establish connectivity with an external network.
2. Review details about the issue and the course of action.
The following components are used in the scenario:
• STG-T0-GW-01 gateway
• STG-HR-T1-GW-01 gateway
• STG-HR-Segment segment
• sa-hrapp-01 VM (172.16.50.11) and student-desktop (172.20.10.80)
The communication between the sa-hrapp-01 VM and the student desktop failed after the
reconfiguration of the STG-HR-T1-GW-01 gateway.
You go to https://sa-nsxvip-02.vclass.local/login.jsp?, log in to the Non-Production NSX UI,
and confirm and resolve the reported issue.
At the end of the lab, sa-hrapp-01 VM (172.16.50.11) and student desktop (172.20.10.80)
should ping each other.
86
Task 2: Confirm the Problem
You confirm a problem that was reported by the help desk: The sa-hrapp-01 VM cannot
communicate with student desktop IP 172.20.10.80 and pings between these servers failed.
4. Select sa-hrapp-01 and click Open Web Console on the Summary tab in the right pane.
5. Log in to the sa-hrapp-01 VM by entering root as the user name and VMware1! as the
password.
ping -c 3 172.20.10.80
The ping command must not be successful.
1. Use the available techniques and tools to troubleshoot and fix the problem.
IMPORTANT
2. If you cannot fix the problem, ask your instructor or use the lab resources link for help.
87
Task 4: Verify That the Problem Is Fixed
You verify that the connectivity to the student desktop is restored.
IMPORTANT
ping -c 3 172.20.10.80
88
Lab 15 Logical Routing Break-Fix
Scenario 2
89
2. Review details about the issue and the course of action.
• STG-T0-GW-01 gateway
• STG-Payroll-Segment-01
The ping between the sa-payroll-01 VM and the student desktop failed.
At the end of the lab, you must be able to establish a ping between sa-payroll-01 and the
student desktop.
90
Task 2: Confirm the Problem
You confirm a problem that was reported by the help desk: The sa-payroll-01 VM cannot
communicate with the student desktop. Pings between the sa-payroll-01 VM and the student
desktop fail.
4. In the Navigator pane, select sa-payroll-01 and click Launch Web Console in the right pane.
5. Log in to the sa-payroll-01 VM by entering root as the user name and VMware1! as the
password .
ping -c 3 172.20.10.80
The ping command must not be successful.
1. Use the available techniques and tools to troubleshoot and fix the problem.
2. If you cannot fix the problem, ask your instructor or use the lab resources link for help.
91
Task 4: Verify That the Problem Is Fixed
You verify that the connectivity to the sa-payroll-01 VM from the student desktop is restored.
IMPORTANT
ping -c 3 172.20.10.80
92
Lab 16 Logical Routing Break-Fix
Scenario 3
93
2. Review details about the issue and the course of action.
• STG-Payroll-Segment-02
The ping between the sa-payroll-02 VM and the student desktop failed.
94
Task 2: Confirm the Problem
You confirm a problem that was reported by the help desk: The sa-payroll-02 VM cannot
communicate with the student desktop. Pings between the sa-payroll-02 VM and the student
desktop fail.
4. In the Navigator pane, click sa-payroll-02 and select Launch Web Console in the right pane.
5. Log in to the sa-payroll-02 VM by entering root as the user name and VMware1! as the
password .
ping -c 3 172.20.10.80
The ping command must not be successful.
1. Use the available techniques and tools to troubleshoot and fix the problem.
2. If you cannot fix the problem, ask your instructor or use the lab resources link for help.
ping -c 3 172.20.10.80
95
96
Lab 17 Logical Routing Challenge
Scenario 1 (Optional)
Because of a planned maintenance activity, BGP peering with the upstream router IP
192.168.140.1 is down. IP 192.168.140.1 is directly connected through Tier-0 uplink 1.
However, the alternate upstream router IP 192.168.150.1 is still accessible. Since the
maintenance window started, none of the web servers are accessible from the student
desktop despite Tier-0 being configured in active-standby mode with two uplinks.
97
2. Review details about the issue and the course of action.
• Dev-Web-Segment
The ping between the sa-devweb-01 VM and the student desktop failed.
You go to https://sa-nsxvip-02.vclass.local/login.jsp?, log in to the NSX UI, and fix this issue.
98
Task 2: Confirm the Problem
You confirm a problem that was reported by the help desk: The sa-devweb-01 VM cannot
communicate with the student desktop. Pings between the sa-devweb-01 VM and the student
desktop fail.
4. In the Navigator pane, click sa-devweb-01 and select launch Web Console on the Summary
tab in the right pane.
5. Log in to the sa-devweb-01 VM by entering root as the username and VMware1! as the
password .
ping -c 3 172.20.10.80
The ping command must not be successful.
1. Use the available techniques and tools to troubleshoot and fix the problem.
2. If you cannot fix the problem, ask your instructor or use the lab resources link for help.
ping -c 3 172.20.10.80
99
100
Lab 18 Logical Routing Challenge
Scenario 2 (Optional)
After a recent configuration change, one of the DEV App servers can access the Internet
while the other server cannot. Both DEV App servers can reach the student desktop.
101
2. Review details about the issue and the course of action.
• DEV-App-Segment
• vmware.com
Only one of the VMs connected to DEV-App-Segment can successfully ping the Internet.
You go to https://sa-nsxvip-02.vclass.local/login.jsp?, log in to the NSX UI, and fix this issue.
102
Task 2: Confirm the Problem
You confirm a problem that was reported by the help desk: The sa-devapp-01 VM cannot
communicate with the Internet. Pings between the sa-devapp-01 VM and vmware.com fail. The
sa-devapp-02 VM attached to the same segment can ping vmware.com.
4. In the Navigator pane, select sa-devapp-01 and click Launch Web Console.
5. Log in to the sa-devapp-01 VM by entering root as the username and VMware1! as the
password.
ping -c 3 172.20.10.80
The ping is successful.
ping -c 3 vmware.com
The ping might be successful.
8. In the vSphere Client, right-click sa-devapp-02 and select Launch Web Console.
9. Log in to the sa-devapp-02 VM by entering root as the user name and VMware1! as the
password .
ping -c 3 172.20.10.80
The ping is successful.
ping -c 3 vmware.com
The result of this ping should be the opposite of that seen on sa-devapp-01. Only one of the
sa-devapp-01 and sa-devapp-02 VMs should not be able to ping the Internet.
103
Task 3: Troubleshoot and Fix the Problem
You use the techniques and tools acquired in the course to troubleshoot and fix the problem.
1. Use the available techniques and tools to troubleshoot and fix the problem.
2. If you cannot fix the problem, ask your instructor or use the lab resources link for help.
NOTE
The problem is not fixed until both VMs are able to ping the Internet without packet loss.
ping -c 10 vmware.com
2. At the sa-devapp-02 command prompt, test the connectivity.
ping -c 10 vmware.com
3. Close the consoles of the sa-devapp-01 and sa-devapp-02 VMs.
104
Lab 19 Distributed Firewall Validation
105
Task 1: Prepare for the Lab
You log in to the vSphere Web Client UI and the NSX UI.
1. From your student desktop, log in to the vSphere Web Client UI.
a. Open Chrome.
b. Select the vSphere Site-A > vSphere Web Client (SA-VCSA-01) bookmark.
NOTE
c. On the login page, enter admin as the user name and VMware1!VMware1! as the
password.
106
Task 2: Enable Distributed Firewall Rules
You enable distributed firewall rules to manage traffic in the three-tier app.
1. From the NSX UI, select Security > East West Security > Distributed Firewall.
5. Record the details of the rules in this policy in the Services and Actions column of the table in
your student worksheet.
6. Click the Edit menu (vertical ellipsis) of the Web Traffic policy and click Enable All Rules.
107
Task 3: Test the Connectivity Between Three-Tier App Machines
You test the connectivity between the three-tier app machines to validate the distributed firewall
rules.
1. Open MTPuTTY from the taskbar and double-click sa-web-01 in the Production-VMs
Inventory folder.
2. At the sa-web-01 command prompt, test the ICMP connectivity.
All pings should fail because you configured a rule to drop all traffic that is not explicitly
allowed.
Click on the link below to access the NSX Training test web
application:
https://web-app.corp.local/cgi-bin/nsx-webapp.cgi">ABC Medical
Point of Sale App
https://secured-app.corp.local/finance/data.html">ABC Medical
Finance Data
sa-web-01:~ #
The HTTP response that is returned from sa-app-01 confirms that HTTP is allowed from sa-
web-01 to sa-app-01.
108
4. Test the SQL access.
b. Connect to the SQL database and enter VMware1! when prompted for the password.
5. Verify that only MySQL traffic is allowed between sa-app-01 and sa-db-01.
6. From the sa-app-01 MTPuTTY session, try to open an SSH session to sa-db-01.
109
Task 4: Verify DFW Rules from the ESXi CLI
You use the native ESXi commands to query the distributed firewall rules applied to the sa-web-
01 VM.
1. Open MTPuTTY from the taskbar and click the SA-ESXi-04 tab.
2. Retrieve the name of the dvfilter associated with the vNIC of the sa-web-01 VM.
3. Record the details of the distributed firewall dvfilter applied to the sa-web-01 VM in this table
in your student worksheet.
Parameter Value
agentName
name
vNIC slot
110
4. Retrieve the distributed firewall rules associated with a dvfilter.
Example:
NOTE
The UUIDs of the address sets are different in your lab environment.
111
5. Record the information of the mySQL traffic rule (port 3306) in the Value column of this
table in your student worksheet.
Parameter Value
Rule number
Direction (in/out/inout)
Protocol
Port
Action (accept/reject/drop)
6. Retrieve the IP and MAC addresses associated with the distributed firewall rules for a
dvfilter.
Parameter Value
Source IP
Destination IP
112
8. Obtain the distributed firewall configuration for a dvfilter.
NOTE
The vsipioctl getfwconfig command gives the combined output of both getrules
and getaddrsets.
1. Open MTPuTTY from the taskbar and double-click SA-KVM-01 to connect over SSH.
vmware@sa-kvm-01:~$ sudo -i
3. Retrieve the virtual interface identifier for the vNICs that have associated distributed firewall
rules on SA-KVM-01.
SA-KVM-01 runs a single VM called sa-db-01 and the port used by the sa-db-01 VM is
labelled T1-DB-01.
Example:
root@sa-kvm-01:~# ovs-appctl -t /var/run/openvswitch/nsxa-
ctl dfw/vif
Vif ID : 57601300-2e82-48c4-8c27-1e961ac70e81
Port name : T1-DB-01
Port number : 1
113
4. Record the VIF details in the Value column of this table in your student worksheet.
Parameter Value
Vif ID
Parameter Value
Rule number
To addrset (destination)
Port
Action
a. Verify that the Rule Number recorded here is identical to that recorded in the previous
task on the ESXi transport node.
114
7. Retrieve the IP and MAC addresses associated with the distributed firewall rules for a
dvfilter.
Parameter Value
Source IP
Destination IP
a. Verify that the mySQL rule address set source and destination IPs recorded here are
identical to that recorded in the previous task on the ESXi transport node.
1. From the NSX UI, navigate to Security > East West Security > Distributed Firewall.
4. Click the Edit menu (vertical ellipsis) of the Web Traffic policy and click Disable All Rules.
115
116
Lab 20 Distributed Firewall Break-Fix
Scenario 1
117
Task 1: Read the Scenario Description
You read the scenario description and determine the course of action.
Recently, a team member made some changes to the configuration of the NSX-T Data
Center distributed firewall. After making these changes, an SSH connection cannot be
established from sa-infosec-01 to sa-infosec-02.
• STG-Infosec-Segment-01
To resolve the problem, you must open an SSH connection from sa-infosec-01 to sa-infosec-
02 (172.16.150.12).
IMPORTANT
Disabling the distributed firewall or the default Block_All_Traffic are not valid solutions.
118
Task 2: Confirm the Problem
You confirm a problem that was reported by the help desk: sa-infosec-01 cannot connect to sa-
infosec-02 through SSH.
4. In the Navigator pane, click sa-infosec-01 and select Launch Web Console from the virtual
machine summary page.
5. Log in to the sa-infosec-01 VM by entering root as the user name and VMware1! as the
password .
ssh [email protected]
The SSH connection attempt fails with a connection refused message.
1. Use the available techniques and tools to troubleshoot and fix the problem.
2. If you cannot fix the problem, ask your instructor or use the lab resources link for help.
119
Task 4: Verify That the Problem Is Fixed
You verify that the SSH connectivity from sa-infosec-01 to sa-infosec-02 is restored.
1. From the sa-infosec-01 command prompt, access the sa-infosec-02 command prompt.
ssh [email protected]
Use VMware1! as the password.
Enter exit to close the SSH session and return to the sa-infosec-01 command prompt
120
Lab 21 Distributed Firewall Break-Fix
Scenario 2
121
Task 1: Read the Scenario Description
You read the scenario description and determine the course of action.
Recently, a team member made some changes to the configuration of the NSX-T Data
Center distributed firewall. After making these changes, an SSH connection cannot be
established from sa-infosec-03 to sa-tlsvm-01.
• STG-Infosec-Segment-01
To resolve the problem, you must open an SSH connection from sa-infosec-03 to sa-tlsvm-
01 (172.16.150.10).
IMPORTANT
Disabling the distributed firewall or the default Block_All_Traffic are not valid solutions.
122
Task 2: Confirm the Problem
You confirm a problem that was reported by the help desk: sa-infosec-03 cannot connect to sa-
tlsvm-01 through SSH.
4. In the Navigator pane, click sa-infosec-03 and select Launch Web Console from the virtual
machine summary page.
5. Log in to the sa-infosec-03 VM by entering root as the username and VMware1! as the
password .
ssh [email protected]
The connection fails with a connection reset by peer error.
1. Use the available techniques and tools to troubleshoot and fix the problem.
2. If you cannot fix the problem, ask your instructor or use the lab resources link for help.
1. From the sa-infosec-03 command prompt, access the sa-tlsvm-01 command prompt.
ssh [email protected]
Use VMware1! as the password.
2. Enter exit to close the SSH session and return to the sa-infosec-03 command prompt.
123
124
Lab 22 (Optional) Distributed Firewall
Challenge Scenario
125
Task 1: Read the Scenario Description
You read the scenario description and determine the course of action.
Recently, a team member made some changes to the configuration of the NSX-T Data
Center distributed firewall. After making these changes, accessing http://sa-tlsvm-
01.vclass.local from sa-infosec-03 is not possible.
• STG-Infosec-Segment-01
• http://sa-tlsvm-01.vclass.local webpage
To resolve the problem, you must be able to access the webpage at http://sa-tlsvm-
01.vclass.local from sa-infosec-03.
IMPORTANT
Disabling the distributed firewall or the default Block_All_Traffic are not valid solutions.
126
Task 2: Confirm the Problem
You confirm a problem that was reported by the help desk: sa-infosec-03 cannot access
http://sa-tlsvm-01.vclass.local.
4. In the Navigator pane, click sa-infosec-03 and select Launch Web Console from the virtual
machine summary page.
5. Log in to the sa-infosec-03 VM by entering root as the user name and VMware1! as the
password.
curl http://sa-tlsvm-01.vclass.local
The curl command must not be successful.
1. Use the available techniques and tools to troubleshoot and fix the problem.
2. If you cannot fix the problem, ask your instructor or use the lab resources link for help.
curl http://sa-tlsvm-01.vclass.local
A response appears with the HTML code of the webpage.
127
128
Lab 23 Gateway Firewall Validation
129
Task 1: Prepare for the Lab
You log in to the vSphere Web Client UI and the NSX UI.
1. From your student desktop, log in to the vSphere Web Client UI.
a. Open Chrome.
b. Select the NSX-T Data Center > NSX Manager (Prod) bookmark.
NOTE
c. On the login page, enter admin as the user name and VMware1!VMware1! as the
password.
2. Double-click sa-web-01 and verify that you can open SSH sessions to the web server.
3. Double-click sa-app-01 and verify that you can open SSH sessions to the applications
servers.
4. Double-click sa-db-01 and verify that you can open SSH sessions to the database server.
5. In MTPuTTY, close all open SSH session tabs for sa-web-01, sa-app-01, and sa-db-01.
130
Task 3: Enable Gateway Firewall Rules
You enable gateway firewall rules to manage SSH traffic to the virtual machines in the three-tier
app.
1. From the NSX UI, select Security > North South Security > Gateway Firewall.
Block-SSH-from-Outside Web-VMs
App-VMs
DB-VMs
5. Click the Edit menu (vertical ellipsis) for Block-SSH-Policy and click Enable All Rules.
2. Double-click sa-web-01 and verify that you can no longer open SSH sessions to the web
servers.
3. Double-click sa-app-01 and verify that you can no longer open SSH sessions to the
application servers.
4. Double-click sa-db-01 and verify that you can no longer open SSH sessions to the database
server.
131
Task 5: Verify Gateway Rules from the NSX Edge CLI
You verify the gateway firewall rule information from the NSX Edge command line.
1. Open MTPuTTY, expand the Production-NSX Inventory folder, and click sa-nsxedge-01.
3. Record details of the Uplink-01-Intf interface in the Value column of this table in your student
worksheet.
Parameter Value
Type
Interface (UUID)
Context Name
NOTE
The other interface (Uplink-02-Intf) on which the rule is applied is present on sa-nsxedge-02.
132
4. Run the following command to query the gateway firewall rules associated with the UPLINK
interface.
Parameter Value
Rule ID
Direction (in/out/inout)
Protocol
From (source)
To (destination)
Port
Action (accept/reject/drop)
133
Task 6: Prepare for the Next Lab
You disable the gateway firewall rules to prepare for the upcoming labs.
1. From the NSX Manager UI, navigate to Security > North South Security > Gateway
Firewall.
2. Click the GATEWAY SPECIFIC RULES tab and select Prod-T0-GW-01 from the Gateway
drop-down menu.
3. Click the Edit menu (vertical ellipsis) of Block-SSH-Policy and click Disable All Rules.
134
Lab 24 Gateway Firewall Break-Fix
Scenario 1
135
Task 1: Read the Scenario Description
You read the scenario description and determine the course of action.
1. Read the scenario description.
Recently, a team member made some changes to the configuration of the NSX-T Data
Center gateway firewall. After making these changes, you cannot ping the student desktop
from sa-infosec-01.
2. Review details about the issue and the course of action.
The following components are used in the scenario:
• STG-T0-GW-01 and STG-Sec-T1-GW-01 gateways
• STG-Infosec-Segment-01 segment
• sa-infosec-01 virtual machine
• Student desktop
You go to https://sa-nsxvip-02.vclass.local/login.jsp?, log in to the Non-Production NSX UI,
and fix this issue.
To resolve the problem, you must be able to ping the student desktop (172.20.10.80) from
sa-infosec-01.
IMPORTANT
You must resolve the (Break-Fix Scenario 1) Logical Switching problem affecting sa-esxi-06
before you can complete this lab. Disabling the gateway firewall is not a valid solution.
136
Task 2: Confirm the Problem
You confirm a problem that was reported by the help desk: sa-infosec-01 cannot ping the
student desktop.
4. In the Navigator pane, click sa-infosec-01 and select Launch Web Console from the virtual
machine summary page.
5. Log in to the sa-infosec-01 VM by entering root as the username and VMware1! as the
password .
ping -c 3 172.20.10.80
The ping command must not be successful.
1. Use the available techniques and tools to troubleshoot and fix the problem.
2. If you cannot fix the problem, ask your instructor or use the lab resources link for help.
ping -c 3 172.20.10.80
137
138
Lab 25 Gateway Firewall Break-Fix
Scenario 2
139
Task 1: Read the Scenario Description
You read the scenario description and determine the course of action.
1. Read the scenario description.
During a maintenance window, a team member recently reconfigured the gateway firewall
policy that allowed the sa-infosec-02 VM to successfully ping a DNS server (8.8.8.8) on the
Internet. The sa-infosec-02 user cannot ping 8.8.8.8 from sa-infosec-02.
2. Review details about the issue and the course of action.
The following components are used in the scenario:
• STG-T0-GW-01 and STG-Sec-T1-GW-01 gateways
• STG-Infosec-Segment-01 segment
• sa-infosec-02 virtual machine
• A public DNS server 8.8.8.8
You go to https://sa-nsxvip-02.vclass.local/login.jsp?, log in to the Non-Production NSX UI,
and fix this issue.
To resolve the problem, you must be able to ping the 8.8.8.8 from sa-infosec-02.
IMPORTANT
You must resolve the (Break-Fix Scenario 1) Logical Switching problem affecting sa-esxi-06
before you can complete this lab. Disabling the gateway firewall is not a valid solution.
140
Task 2: Confirm the Problem
You confirm a problem that was reported by the help desk: sa-infosec-02 cannot ping the public
DNS server 8.8.8.8.
4. In the Navigator pane, click sa-infosec-02 and select Launch Web Console from the virtual
machine summary page.
5. Log in to the sa-infosec-02 VM by entering root as the user name and VMware1! as the
password.
ping -c 3 8.8.8.8
The ping command must not be successful.
1. Using the available techniques and tools to troubleshoot and fix the problem.
2. If you cannot fix the problem, ask your instructor or use the lab resources link for help.
ping -c 3 8.8.8.8
141
142
Lab 26 Load Balancer Validation
a. Select the NSX-T Data Center > Prod Manager (Prod) bookmark.
b. On the login page, enter admin as the user name and VMware1!VMware1! as the
password.
143
3. Connect the Prod-Web-Segment segment to the Prod-LB-T1-GW-01 Tier-1 gateway.
a. From the NSX UI, navigate to Networking > Connectivity > Segments.
After you make this change, the topology of the three-tier application in the Production
environment is changed.
144
Task 2: Verify the Load Balancer Operation
You verify that the HTTP traffic is being handled by both back-end web servers in a round-robin
method.
NOTE
a. From the student desktop, open Firefox and select the 3-Tier-App > Production > LB
VIP bookmark.
The webpage appears with the Web-Server name and the IP address from which the
page is loaded.
b. Refresh the browser to verify that both back-end web servers are used because of the
configured round-robin method.
Because of the browser cache behavior, you might need to press Ctrl+F5 (force
refresh) to see the load-balanced traffic between the two web servers.
145
2. Use the curl command to verify access to the load balancer VIP.
a. From the student desktop, open the Windows command prompt and access the load
balancer VIP address.
curl -i http://192.168.100.7
The HTML body section of the text contains the Web-Server name and the IP address
from which the page is loaded.
b. Run the same curl command again to verify that both back-end web servers are being
used in a round-robin method.
146
Task 3: Verify the Load Balancer Configuration from the NSX CLI
You log in to sa-nsxedge-01 and use the NSX command line to query the load-balancer
configuration information.
1. From MTPuTTY, click sa-nsxedge-01.
2. Verify the load balancer configuration.
sa-nsxedge-01> get load-balancer
3. Record the configuration details of the load balancer in the Value column of this table in your
student worksheet.
Parameter Value
Display name
UUID
Size
Virtual server Id
Parameter Value
Display name
Ipv4 IP address
Enabled
IP Protocol
Pool ID
147
6. Verify the load balancer virtual server status.
Parameter Value
Display name
IP
Port
Status
148
10. Record configuration details of the server pool in the Value column of this table in your
student worksheet.
Parameter Value
Display name
Algorithm
Name STATUS
172.16.10.11:80
172.16.10.12:80
172.16.10.13:80
13. Review the error log that can be used to troubleshoot any load balancer issues.
149
Task 4: Prepare for the Next Lab
You connect the Prod-Web-Segment segment to the Prod-T1-GW-01 gateway.
If the NSX UI session has expired, log in with admin as the user name and VMware1!VMware1!
as the password.
a. From the NSX UI, navigate to Networking > Connectivity > Segments.
150
Lab 27 Load Balancer Break-Fix
Scenario 1
151
Task 1: Read the Scenario Description
You read the scenario description and determine the course of action.
An administrator configured the NSX-T Data Center load balancer to load balance the QA
web server traffic. But the end users are unable to access the QA website by using the load-
balanced address.
The NSX-T Data Center load balancer configuration includes the following components:
• QA-LB-Web-Segment
The problem is resolved when the student desktop can reach the web server VIP at
http://192.168.100.8/.
152
Task 2: Confirm the Problem
You confirm a problem that was reported by the help desk: The load balancer configured with
VIP 192.168.100.8 does not work.
1. From your student desktop, open Firefox and try to access the web server VIP address.
You can use one of the following ways to access the web server VIP address:
• Go to http://192.168.100.8.
1. Use the available techniques and tools to troubleshoot and fix the problem.
2. If you cannot fix the problem, ask your instructor or use the lab resources link for help.
IMPORTANT
This problem is fixed when the load balancer VIP address is reachable and one of the back-
end web servers can be accessed.
153
154
Lab 28 Load Balancer Break-Fix
Scenario 2
155
Task 1: Read the Scenario Description
You read the scenario description and determine the course of action.
An administrator configured the NSX-T Data Center load balancer to redistribute the traffic
between the web servers. However, the load balancing does not work as intended, and
every time a user accesses the webpage, requests are sent to only one server.
The NSX-T Data Center load balancer configuration includes the following components:
• QA-LB-Web-Segment
156
Task 2: Confirm the Problem
You confirm a problem that was reported by the help desk: The load redistribution is not
functional for the web servers when accessing the LB VIP on http://192.168.100.8.
1. From your student desktop, open Firefox and try to access the load balancer VIP address.
NOTE
You can use one of the following ways to access the web server VIP address:
• Go to http://192.168.100.8.
If load balancing works, the webpage displays a different web server IP address.
4. Verify that all requests are being served from a single web server IP address.
1. Use the available techniques and tools to troubleshoot and fix the problem.
2. If you cannot fix the problem, ask your instructor or use the lab resources link for help.
157
Task 4: Verify That the Problem Is Fixed
You verify that load redistribution is functional for the web servers when accessing the LB VIP on
http://192.168.100.8.
1. From your student desktop, open Firefox and access the web server VIP address at
http://192.168.100.8.
158
Lab 29 IPSec VPN Break-Fix Scenario
159
Task 1: Read the Scenario Description
You read the scenario description and determine the course of action.
A colleague is setting up an IPSec VPN between the Production and Non-Production sites.
The VPN service, local endpoints, and IPSec session have been created at both the
Production and Non-Production sites. The status of the IPSec session between the sites is
Down.
IMPORTANT
Do not make changes on the Production side of the IPSec VPN configuration.
Do not make changes on the Tier-0 and Tier-1 gateways.
The problem is resolved when the IPSec session between the sites displays Success as the
status.
160
Task 2: Confirm the Problem
You confirm a problem that was reported by your colleague: The IPSec session between the
Prod and Non-Prod sites is down.
a. Use the NSX-T Data Center > NSX Manager (Prod) bookmark.
2. Navigate to Networking > VPN > IPSEC SESSIONS in the NSX UI.
a. Use the NSX-T Data Center > NSX Manager (Non-Prod) bookmark
5. Navigate to Networking > VPN > IPSEC SESSIONS in the NSX UI.
1. Use the available techniques and tools to troubleshoot and fix the problem.
2. If you cannot fix the problem, ask your instructor or use the lab resources link for help.
161
Task 4: Verify That the Problem Is Fixed
You verify that the IPSec VPN session is successfully established between the Production and
Non-Production environments.
a. Use the NSX-T Data Center > NSX Manager (Non-Prod) bookmark.
2. Navigate to Networking > VPN > IPSEC SESSIONS in the NSX UI.
162
Lab 30 Layer 2 VPN Validation
163
Task 1: Prepare for the Lab
You log in to the vSphere Client UI and the NSX UI.
a. Open Chrome.
b. Click the NSX-T Data Center > NSX Manager (Prod) bookmark.
NOTE
c. On the login page, enter admin as the user name and VMware1!VMware1! as the
password.
164
3. Display the list of IPsec VPN sessions.
Example:
6. Use the command output to record the values in this table in your student worksheet.
Parameter Value
UUID
Type
Session status
Local IP
Peer IP
Tunnel status
165
7. From MTPuTTY, double-click auto-edge-01 under the Production-NSX Inventory
folder.
The SID is the same as that recorded by you earlier on the Tier-0 NSX Edge instance.
12. Use the command output to record the values in this table in your student worksheet.
Parameter Value
UUID
Session status
Local IP
Peer IP
The local and peer IPs are reversed when compared to the values that you recorded earlier.
The UUID is referenced later.
166
Task 3: Verify the L2 VPN from the NSX CLI
You use the NSX CLI to verify the status and configuration of the L2 VPN session.
4. Use the command output to record the values in this table in your student worksheet.
Parameter Value
DISPLAY_NAME
ID (session ID)
IPSEC_VPN_SESSION_ID
5. Verify that the IPsec VPN session ID that you recorded matches the UUID that you recorded
in the previous task for the NSX Edge IPsec session details.
167
6. Display information about the L2 VPN session's logical switches:
The UUID is the L2 VPN Session ID that you recorded earlier. If needed, use the get
l2vpn sessions command to obtain it again.
Example: sa-nsxedge-03> get l2vpn session 7f40715a-b17c-4b18-
bf87-1874ff5d0bc3 logical-switches
7. Use the command output to update this table, with the VNI and tunnel ID values, in your
student worksheet.
VNI Tunnel ID
10. Use the command output to record the values in this table in your student worksheet.
Parameter Value
DISPLAY_NAME
ID (session ID)
IPSEC_VPN_SESSION_ID
168
11. Verify that the IPsec session ID that you recorded matches the UUID that you recorded in
the previous task for the Autonomous Edge IPsec session details.
The UUID is the L2 VPN Session ID that you recorded earlier. If needed, use the get
l2vpn sessions command to obtain it again.
Example: auto-edge-01> get l2vpn session ed3e5342-2206-43cd-
895c-1a7cb739c68b logical-switches
13. Use the command output to update the table in your student worksheet with the VLAN and
tunnel ID values.
VLAN Tunnel ID
14. Verify that tunnel ID 100 is present in the output that you recorded on both auto-edge-01
and sa-nsxedge-03.
As per the topology at the beginning of this lab, tunnel 100 is used in the configuration of the
VPN that connects the RB-V10-VM-01 and RB-V10-VM-02 virtual machines.
1. In the NSX UI, navigate to Networking > Network Services > VPN > L2 VPN SESSIONS.
3. Click the Information icon beside the status for L2VPN-Session to display additional
information about the tunnel status.
169
4. In the vSphere Client inventory, ensure that RB-Auto-Edge-01 and RB-V10-VM-02 are
running on the sa-esxi-02.vclass.local ESXi host.
b. Verify that both the NSX Autonomous Edge (RB-Auto-Edge-01) and the RB-V10-VM-
02 virtual machines reside on the sa-esxi-02.vclass.local ESXi host.
c. (Optional) If the virtual machines do not reside on the ESXi host, use vSphere vMotion to
migrate the VMs.
c. Verify that Network adapter 1 has the ROBO-B-pg-VLAN-10 value and is connected.
d. (Optional) Click Browse, select ROBO-B-pg-VLAN-10 from the drop-down menu, and
click OK.
8. Log in to the RB-V10-VM-01 VM with root as the user name and VMware1! as the
password .
ping -c 3 172.17.10.12
The ping completes successfully.
10. Return to the vSphere Client and open a web console to RB-V10-VM-02.
11. Log in to the RB-V10-VM-02 VM with root as the user name and VMware1! as the
password .
170
12. Verify bidirectional connectivity from RB-V10-VM-02 to RB-V10-VM-01.
ping -c 3 172.17.10.11
The ping completes successfully. You verified bidirectional communication between the two
VMs at the end of the VPN tunnel.
171
172
Lab 31 Layer 2 VPN Break-Fix
Scenario
After a recent change in the configuration of the Production L2 VPN, users reported that the
RB-V15-VM-01 virtual machine is unable to communicate with the RB-V15-VM-02 virtual
machine at the remote site. You must identify and resolve the issue.
IMPORTANT
A single L2 VPN session carries traffic with more than one tunnel ID. Changes that you make
must not affect traffic from other virtual machines.
173
2. Review details about the issue and the course of action.
The problem is resolved when you can ping RB-V15-VM-02 (172.17.15.12) from RB-V15-VM-
01 (172.17.15.11).
174
3. Expand Datacenter-01-Production > Prod-Compute-Cluster-01 > Prod-VPN in the vCenter
Server inventory.
4. In the Navigator pane, click RB-V15-VM-01 and select Launch Web Console on the virtual
machine summary page.
5. Log in to the RB-V15-VM-01 VM by entering root as the user name and VMware1! as the
password.
ping -c 3 172.17.15.12
The ping command must not be successful.
1. Use the available techniques and tools to troubleshoot and fix the problem.
2. If you cannot fix the problem, ask your instructor or use the lab resources link for help.
ping -c 3 172.17.15.12
175
176
Lab 32 (Optional) Layer 2 VPN
Challenge Scenario
After a recent change in the configuration of the Production VPN, users reported that the
RB-V20-VM-01 virtual machine is unable to communicate with the RB-V20-VM-02 virtual
machine at the remote site. You must identify and resolve the issue.
IMPORTANT
A single L2 VPN session carries traffic with more than one tunnel ID. Changes that you make
must not affect traffic from other virtual machines.
177
2. Review details about the issue and the course of action.
The problem is resolved when you can ping RB-V20-VM-02 (172.17.20.12) from RB-V20-VM-
01 (172.17.20.11).
178
Task 2: Confirm the Problem
You confirm a problem that was reported by the help desk: The RB-V20-VM-01 virtual machine is
unable to ping the RB-V20-VM-02 virtual machine at the remote site.
4. In the Navigator pane, click RB-V20-VM-01 and select Launch Web Console on the virtual
machine summary page.
5. Log in to the RB-V20-VM-01 VM by entering root as the user name and VMware1! as the
password.
ping -c 3 172.17.20.12
The ping command must not be successful.
1. Use the available techniques and tools to troubleshoot and fix the problem.
2. If you cannot fix the problem, ask your instructor or use the lab resources link for help.
ping -c 3 172.17.20.12
179
180
Lab 33 Datapath Troubleshooting for
the E-W Packet Capture
1. Use Traceflow
181
Task 1: Use Traceflow
You use the Traceflow tool to examine how a packet traverses the datapath.
1. Open Chrome from the taskbar and select the NSX-T Data Center > NSX Manager (Prod)
bookmark.
2. Log in to NSX Manager with admin as the user name and VMware1!VMware1! as the
password.
4. Click Traceflow.
Option Action
Option Action
Option Action
6. Click TRACE.
182
7. From the Traceflow observations window, record the requested details in the table.
Traceflow Observations
Question Answer
What is the logical switch VNI ID that connects the Prod-App-Segment to the
Tier-1 gateway?
What is the distributed firewall rule number applied to the sa-app-01 virtual
interface?
What is the interface name that delivered the packet to the destination?
183
Task 2: Perform Data Collection for Packet Capture
You use commands to query and record information about sa-web-01, sa-esxi-04, sa-app-01, and
sa-esxi-05 through the CLI and GUI.
1. Record the IP address, MAC address, and ESXi host details of the sa-web-01 VM from the
vSphere Client.
a. Log in to the vSphere Client with [email protected] as the user name and
VMware1! as the password.
b. Expand the DataCenter-01-Production > Prod-Compute-Cluster-01 > Prod-Web-App
resource pool.
c. Click sa-web-01 VM and click the Summary tab.
d. Record details about the sa-web-01 VM in the Value column of the table.
Parameter Value
IP address
MAC address
Host
2. At the sa-ESXi-04 host command line, record the sa-web-01 VM port number, client name,
MAC, and uplink details.
a. Open MTPuTTY from the taskbar, expand the Production-Infrastructure folder from
bookmarks, and double-click SA-ESXi-04.
b. On the sa-esxi-04 host, list the ports.
[root@sa-esxi-04:~] nsxcli --cmd get ports
c. Record details about the sa-web-01 VM in the table.
184
3. On the sa-esxi-04 host, collect the dvFilter name of the sa-web-01 virtual machine.
[root@sa-esxi-04:~] summarize-dvfilter | grep -A5 sa-web-01
Parameter Value
dvFilter name
Prod-Overlay-NVDS
Parameter Value
Local TEP IP
Parameter Value
Local TEP IP
185
10. On the sa-esxi-04 host, find the IP address information.
[root@sa-esxi-04:~] esxcfg-vmknic -l
11. Record the sa-ESXi-04 host VMkernel IP address information in the table.
vmk0 (Management)
12. Record the IP address, MAC address, and ESXi host details of the sa-app-01 VM from the
vSphere Client.
Parameter Value
IP address
MAC address
Host
186
13. Record the sa-app-01 VM port number, client name, MAC, and uplink details from the sa-
ESXi-05 host command line.
a. Open MTPuTTY from the taskbar, expand the Production-Infrastructure folder from
bookmarks, and double-click SA-ESXi-05.
b. On the sa-esxi-05 host, list the ports and record the values in the table.
sa-app-01
vdrport
vmk10
vmk50
14. On the sa-esxi-05 host, collect the dvFilter name of the sa-app-01 virtual machine.
Parameter Value
dvFilter name
187
16. Record the hostswitch uplink information from the sa-esxi-05 command line.
a. At the sa-esxi-05 command line, obtain the sa-esxi-05 host uplink configuration
information.
[root@sa-esxi-05:~] esxcfg-vswitch -l
b. Record the host uplink configuration information in the table.
Prod-Overlay-NVDS
Parameter Value
Local TEP IP
Parameter Value
Local TEP IP
[root@sa-esxi-05:~] esxcfg-vmknic -l
188
20. Record the sa-ESXi-05 host VMkernel IP address information in the table.
vmk0 (Management)
d. Select sa-web-01 and from the virtual machine summary page and select Launch Web
Console.
e. Log in to the sa-web-01 VM by entering root as the user name and VMware1! as the
password .
2. At the sa-web-01 VM command line, initiate a ping from sa-web-01 to the sa-app-01 IP
address (172.16.20.11).
3. Open MTPuTTY and double-click SA-ESXi-04 to connect through the SSH client to the ESXi
host where the sa-web-01 VM is running.
[root@sa-esxi-04:~] nsxcli
189
5. On the sa-esxi-04, list the available alternatives.
Possible alternatives:
start capture dvfilter <esx-dvfilter-name>
start capture interface <interface-name> [direction
<direction>] [file <filename>] [count <packet-count>]
[expression <expression>]
start capture trace
These command options are used to capture traffic.
6. Capture the VM traffic and obtain the ICMP echo details to understand the source and
destination details.
a. On the sa-esxi-04 host, capture the VM traffic with the sa-web-01 client name.
Use the sa-web-01 client name that you recorded in the sa-web-01 Details from the sa-
esxi-04 Command Line table in the student worksheet.
c. Record the ICMP echo request details from the packet capture in the table.
Parameter Value
Source MAC
Destination MAC
Source IP
Destination IP
190
7. Capture the sa-web-01 VM traffic and obtain the ICMP echo details to understand the source
and destination details.
a. On sa-esxi-04 host, capture the sa-web-01 VM traffic on an ESXi host before the dvfilter
is applied to the vNIC of a VM.
Use the dvfilter name of the VM that you recorded in the Identify the dvFilter Name of
sa-web-01 table in the student worksheet.
c. Record the ICMP echo request details from the packet capture in the table.
Parameter Value
Source MAC
Destination MAC
Source IP
Destination IP
191
8. Capture the sa-web-01 VM traffic on an ESXi host and obtain the ICMP echo details to
understand the source and destination details.
a. On sa-esxi-04, capture the sa-web-01 VM traffic on an ESXi host after the dvfilter is
applied to the vNIC of a VM.
Use the dvfilter name that you recorded, in the Identify the dvFilter Name of sa-web-01
table in the student worksheet.
c. Record the ICMP echo request details from the packet capture in the table.
Parameter Value
Source MAC
Destination MAC
Source IP
Destination IP
192
9. Capture the VM traffic at the vdrport and obtain the ICMP echo details to understand the
source and destination details.
Use the vdrport client name that you recorded in the sa-web-01 Details from the sa-
esxi-04 Command Line table in the student worksheet.
c. Record the ICMP echo request details from the packet capture in the table.
Parameter Value
Source MAC
Destination MAC
Source IP
Destination IP
193
10. Capture the egress traffic at the ESXi host N-VDS uplink interface and obtain the ICMP echo
details to understand the source and destination details.
a. On sa-esxi-04, capture the egress traffic at the ESXi host N-VDS uplink interface.
Use the Prod-Overlay-NVDS uplink interface that you recorded in the sa-esxi-04 Host
Uplink Configuration Information table in the student worksheet.
Use the sa-app-01 ESXi host TEP IP that you recorded in the sa-esxi-05 host TEP IP
table in the student worksheet.
c. Record the ICMP echo request details from the packet capture to understand the
source and destination details.
Parameter Value
Destination Port
Inner Source IP
Inner Destination IP
If the SA-ESXi-05 session is closed, you can find SA-ESXi-05 under the Production-
Infrastructure folder in the MTPuTTY bookmarks.
194
12. Run the following command to enter the nsxcli command line.
[root@sa-esxi-05:~] nsxcli
13. Capture the ingress traffic at the ESXi host N-VDS uplink interface and obtain the ICMP echo
request details to understand the source and destination details.
a. On the sa-esxi-05 host, capture the ingress traffic at the ESXi host N-VDS uplink
interface.
Use the Prod-Overlay-NVDS uplink interface that you recorded in the sa-esxi-05 Host
Uplink Configuration Information table in the student worksheet.
Use the sa-web-01 ESXi host TEP IP that you recorded in the sa-esxi-04 host TEP IP
table in the student worksheet.
c. Record the ICMP echo request details from the packet capture in the table.
Parameter Value
Destination Port
Inner Source IP
Inner Destination IP
195
14. Capture the VM traffic at the switchport and obtain the ICMP echo request details to
understand the source and destination details.
Use the sa-app-01 PortNum that you recorded in the sa-app-01 Details from the sa-esxi-
05 Command Line table in the student worksheet.
c. Record the ICMP echo request details from the packet capture in the table.
Parameter Value
Source MAC
Destination MAC
Source IP
Destination IP
196
15. Capture the VM traffic on an ESXi host and obtain the ICMP echo request details to
understand the source and destination details.
a. Capture the VM traffic on an ESXi host before the dvfilter is applied to the vNIC of a
VM.
Use the dvfilter name of the sa-app-01 VM that you recorded in the Identify dvFilter
Name of sa-app-01 table in the student worksheet.
c. Record the ICMP echo request details from the packet capture in the table.
Packet Capture Before the dvFilter Is Applied to the vNIC of the sa-app-01 VM
Parameter Value
Source MAC
Destination MAC
Source IP
Destination IP
197
16. Capture the VM traffic on an ESXi host and obtain the ICMP echo request details to
understand the source and destination details.
a. Capture the VMs traffic on an ESXi host before the dvfilter is applied to the vNIC of a
VM.
Use the dvfilter name of the sa-app-01 VM that you recorded in the Identify dvFilter
Name of sa-app-01 table in the student worksheet.
c. Record the ICMP echo request details from the packet capture in the table.
Packet Capture After the dvFilter Is Applied to the vNIC of the sa-app-01 VM
Parameter Value
Source MAC
Destination MAC
Source IP
Destination IP
198
17. Capture the VM traffic on an ESXi host and obtain the ICMP echo request details to
understand the source and destination details.
a. Capture the VM traffic on an ESXi host before the dvfilter is applied to the vNIC of a
VM.
Use the sa-app-01 client name, previously recorded in the table sa-app-01 Details from
sa-esxi-05 Command Line, to capture the outgoing traffic at the vNIC of the VM.
c. Record the ICMP echo request details from the packet capture in the table.
Parameter Value
Source MAC
Destination MAC
Source IP
Destination IP
199
200
Lab 34 Datapath Troubleshooting for
the N-S Packet Capture
1. Use Traceflow
201
Task 1: Use Traceflow
Use the Traceflow tool to examine how a packet traverses the datapath.
1. Open Chrome from the taskbar and select the NSX-T Data Center > NSX Manager (Prod)
bookmark.
2. Log in to NSX Manager with admin as the user name and VMware1!VMware1! as the
password.
4. Click Traceflow.
You might need to click NEW TRACE to clear the details of the previous traceflow.
Option Action
Option Action
Option Action
202
6. Click TRACE.
7. From the Traceflow observations window, record the requested details in the table.
Traceflow Observations
Question Answer
What is the transit logical switch VNI ID that connects the Tier-1 gateway with the
Tier-0 gateway?
What is the Tier-1 gateway logical router port connecting to the Tier-0 gateway?
What is the Tier-0 gateway logical router port connecting to the Tier-0 gateway?
What is the interface on the edge to which the gateway firewall rules are applied?
What is the interface name that delivered the packet to the destination?
203
Task 2: Perform Data Collection for Packet Capture
You record the sa-web-01, sa-esxi-04, sa-nsxedge-02, and sa-esxi-02 details and use them in the
upcoming tasks to perform the packet capture.
1. Record the IP address, MAC address, and ESXi host details of the sa-web-01 VM from the
vSphere Client.
IP address
MAC address
Host
2. At the sa-esxi-04 host command line, record the sa-web-01 VM port number, client name,
MAC, and uplink details.
a. Open MTPuTTY from the taskbar, expand the Production-Infrastructure folder from
bookmarks, and double-click SA-ESXi-04.
b. List the ports.
[root@sa-esxi-04:~] nsxcli --cmd get ports
c. Record details in the table.
204
3. On the sa-esxi-04 host, collect the dvFilter name of the sa-web-01 virtual machine.
Parameter Value
dvFilter name
[root@sa-esxi-04:~] esxcfg-vswitch -l
6. Record the host switch uplink Information.
Prod-Overlay-NVDS
Parameter Value
Local TEP IP
[root@sa-esxi-04:~] esxcfg-vmknic -l
205
10. Record the VMkernel IP address information.
vmk0 (Management)
11. Open MTPuTTY from the taskbar, expand the Production-NSX Inventory folder from
bookmarks, and double-click sa-nsxedge-02.
sa-nsxedge-02 TEP IP
Parameter Value
Local VTEP IP
sa-nsxedge-02> vrf 0
16. Collect the interfaces in the tunnel vrf context.
To monitor and capture the traffic through the NSX Edge tunnels, you use the uplink interface
UUID. The uplink interface IP address is the NSX Edge TEP IP address.
206
17. Record the interfaces in the tunnel vrf context.
Parameter Value
Interface
Port-type
IP/Mask
MAC
MTU
sa-nsxedge-02(vrf)> exit
19. On sa-nsxedge-02, list the gateway firewall interfaces.
Parameter Value
Interface
Type
Name Uplink-02-Intf
VRF ID
Context name
21. On sa-nsxedge-02, list the logical router port interface UUID, name, IP, MAC, and RX/TX
packets.
207
22. Record the uplink interface details.
Parameter Value
Name
IP/Mask
MAC Address
23. On sa-nsxedge-02, list the logical router port UUID for the Prod-T0-GW-01 Tier-1 gateway.
a. List the logical routers.
sa-nsxedge-02> get logical-routers
The command output displays the vrf ID of the SR-Prod-T0-GW-01 gateway.
b. Enter the SR vrf context.
sa-nsxedge-02> vrf <vrf-id-of-SR-Prod-T0-GW-01>
Example: sa-nsxedge-02> vrf 2
c. Identify the backplane interface details.
sa-nsxedge-02(tier0_sr)> get interfaces
d. Record the details about the backplane bp-sr1-port port in the table.
Parameter Value
Uplink interface UUID
IfUid
Port-type
IP/Mask
MAC
VNI
208
24. Retrieve the ESXi host details about the sa-nsxedge-02 VM from the vSphere Client.
Parameter Value
IP address
Host
26. On the sa-esxi-02 host, start esxtop to view the sa-nsxedge-02.eth2 interface uplink
mapping.
[root@sa-esxi-02:~] esxtop
27. Press n to go to the networking view of esxtop.
Example: vmnic3
USED-BY TEAM-PNIC
sa-nsxedge-02.eth2
209
Task 3: Perform Packet Capture
You use the nsxcli commands to capture and analyze the ICMP traffic between VMs and ESXi
hosts.
d. Select sa-web-01 from the virtual machine summary page and select Launch Web
Console.
e. Log in to the sa-web-01 VM by entering root as the user name and VMware1! as the
password.
2. At the sa-web-01 VM command line, initiate a ping from sa-web-01 to the external IP address
(172.20.10.10).
3. Open MTPuTTY and double-click SA-ESXi-04 to connect through the SSH client because the
sa-web-01 VM is running on this host.
[root@sa-esxi-04:~] nsxcli
210
5. Capture the VM traffic and obtain the ICMP echo details to understand the source and
destination details.
a. On the sa-esxi-04 host, capture the VM traffic with the sa-web-01 client name.
Use the sa-web-01 client name that you recorded in the sa-web-01 Details from sa-esxi-
04 Command Line table in the student worksheet.
c. Record the ICMP echo request details from the packet capture in the table.
Parameter Value
Source MAC
Destination MAC
Source IP
Destination IP
211
6. Capture the VM traffic and obtain the ICMP echo details to understand the source and
destination details.
a. On the sa-esxi-04 host, capture the VM traffic on an ESXi host before the dvfilter is
applied to the vNIC of a VM.
Use the dvfilter name of the VM that you recorded in the Identify the dvFilter Name of
sa-web-01 table in the student worksheet.
c. Record the ICMP echo request details from the packet capture in the table.
Packet Capture Before the dvFilter Is Applied to the vNIC of the sa-web-01 VM
Parameter Value
Source MAC
Destination MAC
Source IP
Destination IP
212
7. Capture the VM traffic and obtain the ICMP echo details to understand the source and
destination details.
a. On the sa-esxi-04 host, capture the VM traffic on an ESXi host after the dvfilter is applied
to the vNIC of a VM.
Use the dvfilter name of the VM that you recorded in the Identify the dvFilter Name of
sa-web-01 table in the student worksheet.
c. Record the ICMP echo request details from the packet capture in the table.
Packet Capture After the dvFilter Is Applied to the vNIC of the sa-web-01 VM
Parameter Value
Source MAC
Destination MAC
Source IP
Destination IP
213
8. Capture the VM traffic and determine the different MAC addresses.
Use the vdrport client name that you recorded in the sa-web-01 Details from sa-esxi-04
Command Line table in the student worksheet.
• 02:50:56:56:44:55: Linked router port MAC address which connects the Tier-1
distributed router (DR) to the Tier-0 distributed router (DR)
214
9. Capture the egress traffic at the ESXi host N-VDS uplink interface and obtain the ICMP echo
details to understand the source and destination details.
a. On the sa-esxi-04 host, capture the egress traffic at the ESXi host N-VDS uplink
interface.
Use the Prod-Overlay-NVDS uplink interface that you recorded in the sa-esxi-04 Host
Uplink Configuration Information table in the student worksheet.
Use the sa-nsxedge-02 TEP IP that you recorded in the sa-nsxedge-02 TEP IP in the
student worksheet.
c. Record the ICMP echo request details from the packet capture in the table.
Parameter Value
Destination Port
Inner Source IP
Inner Destination IP
215
10. Capture the ingress traffic on the ESXi host where the NSX Edge is running.
a. In the MTPuTTY window, click SA-ESXi-02 to connect to the ESXi host where the sa-
nsxedge-02 VM runs.
b. On the sa-esxi-02 host, capture the ICMP echo request message received over the
vmnic2 adapter.
After the ICMP echo request is received at the ESXi host uplink, the hypervisor forwards
the traffic to the NSX Edge TEP interface (tunnel port) to decapsulate the Geneve
packet.
11. Open MTPuTTY from the taskbar and click the sa-nsxedge-02 tab.
12. On the sa-nsxedge-02 node, list the available alternatives on NSX Edge.
Possible alternatives:
start capture interface <interface-name> [direction
<direction>] [core <core-id>] [snaplen <capture-snaplen-arg]
[file <filename>] [expression <expression>]
start capture interface <interface-name> [direction
<direction>] [file <filename>] [count <packet-count>]
[expression <expression>]
216
13. Capture the traffic at the tunnel port with the uplink interface UUID and obtain the ICMP echo
details to understand the source and destination details.
a. On the sa-nsxedge-02 node, capture the traffic at the tunnel port with the uplink
Interface UUID that you recorded in the NSX Edge TEP Interface Details table in the
student worksheet.
c. Record the ICMP echo request details from the packet capture in the table.
Parameter Value
Destination Port
Inner Source IP
Inner Destination IP
217
14. Capture the traffic at the Tier-0 transit link port and obtain the ICMP echo details to
understand the source and destination details.
a. On the sa-nsxedge-02 node, capture the traffic at the Tier-0 transit link port (also called
backplane).
Use the interface UUID that you recorded in the Uplink Port Details: bp-sr1-port table in
the student worksheet.
c. Record the ICMP echo request details from the packet capture in the table.
Parameter Value
Source MAC
Destination MAC
Source IP
Destination IP
218
16. Capture the outgoing traffic from the Tier-0 gateway uplink and obtain the ICMP echo
request details.
a. On the sa-nsxedge-02 node, capture the outgoing traffic from the Tier-0 gateway uplink.
Use the uplink interface UUID that you recorded in the NSX Edge Uplink Interface: Uplink-
02-Intf table in the student worksheet.
c. Record the ICMP echo request details from the packet capture in the table.
Parameter Value
Source MAC
Destination MAC
Source IP
Destination IP
17. In the MTPuTTY window, click the SA-ESXi-02 tab because the sa-nsxedge-02 VM runs on
this host.
219
18. Capture the outgoing traffic at the ESXi host uplink through the vmnic3 interface and obtain
the ICMP echo request details.
a. On the sa-esxi-02 host, capture the outgoing traffic at the ESXi host uplink through the
vmnic3 interface.
c. Record the ICMP echo request details from the packet capture in the table.
Outgoing Traffic at the ESXi Host Uplink Where NSX Edge Runs
Parameter Value
Source IP
Destination IP
19. Capture the incoming traffic on the ESXi host uplink and obtain the ICMP echo request details.
a. On the sa-esxi-02 host, capture the incoming traffic on the ESXi host uplink.
c. Record the ICMP echo request details from the packet capture in the table.
Incoming Traffic at the ESXi Host Uplink Where NSX Edge Runs
Parameter Value
Source IP
Destination IP
220