Before you can start using the NSX Suspicious Traffic feature, your NSX environment and the NSX Intelligence feature must meet the specific license and software requirements.
License Requirements
Base SKU License | Add-on SKU License |
---|---|
NSX-T Evaluation | None required |
NSX Data Center Evaluation | None required |
NSX Advanced Threat Prevention (Only applicable for customers who have previously purchased the license.) |
None required |
One of the following:
|
NSX Advanced Threat Prevention for Distributed Firewall |
NSX Distributed Firewall with Advanced Threat Prevention | None required |
NSX Gateway Firewall with Advanced Threat Prevention | None required |
One of the following:
|
NSX Advanced Threat Prevention for Gateway Firewall |
NSX Advanced with Advanced Threat Prevention | None required |
NSX Enterprise Plus with Advanced Threat Prevention | None required |
Software Requirements
You must meet the following software requirements before you can start using the NSX Suspicious Traffic feature.
Install NSX 3.2 or later.
Deploy the VMware NSX® Application Platform using an Advanced form factor.
Activate the NSX Intelligence 3.2 or later feature on the NSX Application Platform.
Configure the NSX Intelligence 3.2 or later feature to only collect network traffic data for the specific standalone hosts or clusters of hosts that you want to be monitored. The NSX Suspicious Traffic feature is only supported on standalone hosts or clusters of hosts that have traffic data collection activated. For information about configuring the settings for the NSX Intelligence 3.2 or later feature, see the Activating and Upgrading VMware NSX Intelligence document.
Activate the NSX Network Detection and Response feature if you are going to work with campaigns to obtain deeper analysis of the detected suspicious traffic events using the VMware NSX® Advanced Threat Prevention cloud service. See the feature activation information in the NSX Network Detection and Response section of the Security chapter of the NSX Administration Guide document. The NSX Administration Guide document is delivered with the VMware NSX Documentation set.
Important:To provide the functionalities for deeper analysis of the detected malicious or anomalous events, the NSX Network Detection and Response feature requires that your NSX 3.2 or later environment be connected to the Internet.
The NSX Network Detection and Response feature is not supported in air-gapped environments when there is no outbound Internet access from the Kubernetes cluster pods and the NSX Unified Appliance.