For all of you that have been patiently waiting for NSX 6.1.3 so you can upgrade to vSphere 6, your wait is over! VMware has relaeased NSX 6.1.3 today and it is now live for download. On top of support for vSPhere 6 it also includes a number od security and bug fixes details can be found in the release notes.
NSX vSphere 6.1.3 introduces the following features:
- Dynamic routing protocols are supported on sub-interfaces.
- ECMP and Logical Firewall are supported at the same time with logical routing.
Continue reading “VMware NSX 6.1.3 Released Today”
If you are currently running NSX for vSphere 6.1 you will be happy to hear that that NSX 6.1.2 for vSphere has been released. In it is a number of bug fixes that I am particularly happy about. One fix in particular that I am very happy to see is:
vNICs get ejected because of insufficient ESXi heap memory – I ran into this in the MoaC Lab and of course it took some time to track down and get resolved. Aside from being a difficult bug to diagnose it caused secondary issues that were just a pain. So glad to see this one is taken care of.
Poodle Vulnerability – This release includes an API call that you can use to diable SSL v3 on specified NSX Edges.
OpenSSL – Has been upgraded to the 101j release
UI Fixes – Not yet sure which ones.
Security Group Parallel Creation – has been added. This should help in the over time it takes to deploy App Services in vRealize Automation.
VPN Fixes – I’m not sure on what these fixes are, but I hope there is a fix for OSPF updates over Layer2 VPN. I will surely let you know once I find out.
There is more details on the the NSX for vSphere 6.1.2 release in the release notes.
You can also find the download here.
In my previous NSX articles we covered installing and configuring NSX, We discussed deploying/configuring Transport Zones, Logical Switches, Logical Routers, Edge Gateways, and connecting the Logical and Edge Gateways. With all these completed we now have an environment that with the appropriate routes and transport traffic from our physical network to our logical networks that we deployed. The missing price is the routes. We could go and configure a bunch of static routes throughout all the NSX routers and our physical routers, but that wouldn’t be fun. It also wouldn’t be automated. In this post I am going to walk through configuring the NSX routers to use OSPF for route distribution.
Continue reading “VMware NSX 6.1 for vSphere – Configuring OSPF route distribution”
This article builds on my previous article Deploying an Edger Gateway. In this article we are going to connect the Edge router we deployed in my previous post to the Logical Router we deployed in the post Deploying Logical Distributed Routers. In order to link these together we will need to deploy a Logical Switch to be used as a transit network between the Edge Gateway and the Logical Router.
Connecting the Logical and Edge Router
Continue reading “VMware NSX 6.1 for vSphere – Connecting logical and Edge Routers”
So far we have deployed (2) Logical Switches and (1) Distributed Logical Router and deployed a VM on to each logical switch. Our VM’s can communicate with each other across the Distributed Logical Router, but they can’t communicate to anything else. What we now need to do is deploy an Edge Gateway that we will configure to communicate upstream to the physical network and downstream to the logical network. Where we could technically just connect the Distributed Logical Router upstream to your physical network, it’s not really a best practice approach and it’s not a supported approach when integrating with vCAC.
Continue reading “VMware NSX 6.1 for vSphere – Deploying an Edge Gateway”