You can exclude a set of virtual machines from distributed firewall protection.
NSX Manager, NSX Controller, and NSX Edge virtual machines are automatically excluded from distributed firewall protection. In addition, place the following service virtual machines in the Exclusion List to allow traffic to flow freely.
- vCenter Server. It can be moved into a cluster that is protected by Firewall, but it must already exist in the exclusion list to avoid connectivity issues.
Note: It is important to add the vCenter Server to the exclusion list before changing the "any any" default rule from allow to block. Failure to do so will result in access to the vCenter Server being blocked after creating a Deny All rule (or modifying default rule to block action). If this occurs, use the API to change the default rule from deny to allow. For example, use
GET /api/4.0/firewall/globalroot-0/configto retrieve the current configuration, and use
PUT /api/4.0/firewall/globalroot-0/configto change the configuration. See "Working with Distributed Firewall Configuration" in the NSX API Guide for more information.
- Partner service virtual machines.
- Virtual machines that require promiscuous mode. If these virtual machines are protected by distributed firewall, their performance may be adversely affected.
- The SQL server that your Windows-based vCenter uses.
- vCenter Web server, if you are running it separately.
- Navigate to Exclusion List settings.
- In NSX 6.4.1 and later, navigate to .
- In NSX 6.4.0, navigate to .
- Click Add.
- Move the VMs that you want to exclude to Selected Objects.
- Click OK.