The use of the NSX-T Data Center gateway firewall requires additional evaluation. This guidance does not cover the use of the gateway firewall to protect components deployed on overlay port groups. You can use the NSX-T Data Center gateway firewall to protect vRealize Automation and vRealize Operations Manager. Such configurations must be additionally evaluated based on your architecture. Similary, the edge configurations must be evaluated if you deploy an NSX-T Edge cluster.

Caution:

The following configurations are not officially tested with VMware Cloud Foundation. These configurations are included as optional and site-specific only.

Product

Configuration

Context for Evaluating the Configuration

NSX-T Data Center (Gateway Firewall configurations)

Multiple configurations for the NSX-T Data Center gateway firewall.

VI-NET-CFG-01428, VI-NET-CFG-01429, VI-NET-CFG-01431, VI-NET-CFG-01432,VI-NET-CFG-01453,VI-NET-CFG-01456, VI-NET-CFG-01464, VI-NET-CFG-01493, VI-NET-CFG-01494, VI-NET-CFG-01495, VI-NET-CFG-01496, VI-NET-CFG-01513, VI-NET-CFG-01514, VI-NET-CFG-01515

The gateway firewall protects components deployed on overlay port groups such as vRealize Automation or vRealize Operations Manager. The scope of the compliance kit includes ESXi, vCenter Server, vSAN, NSX Manager, and SDDC Manager, which are not deployed on overlay port groups.

If you use vRealize Suite products, you must reevaluated this configuration.

NSX-T Data Center (Edge configurations)

VMW-NSXT-01430, VMW-NSXT-01435, VMW-NSXT-01437, VMW-NSXT-01438, VMW-NSXT-01441, VMW-NSXT-01449, VMW-NSXT-01450, VMW-NSXT-01455, VMW-NSXT-01459, VMW-NSXT-01460, VMW-NSXT-01469, VMW-NSXT-01470, VMW-NSXT-01503, VMW-NSXT-01504, VMW-NSXT-01505, VMW-NSXT-01506, VMW-NSXT-01507, VMW-NSXT-01510, VMW-NSXT-01511, VMW-NSXT-01512

Application Virtual Networks (AVN)s, which include the NSX Edge Cluster and NSX network segments, are no longer deployed and configured during bring-up. Instead they are implemented as a Day-N operations in SDDC Manager, providing greater flexibility.

These configurations should be reevaluated if you plan to deploy NSX-T edges in your environment.