Change Controller PasswordTo ensure data security, you can change passwords for NSX controllers. Recover from an NSX Controller FailureIn case of an NSX Controller failure, you may still have two controllers that are working. The cluster majority is maintained, and the control plane continues to function. Even so, it is important to delete all three controllers and add new ones, so as to maintain a fully functional three-node cluster. Change VXLAN PortYou can change the port used for VXLAN traffic. Check Communication Channel HealthNSX checks on the status of communication between NSX Manager and firewall agent, NSX Manager and control plane agent, and control plane agent and controllers. Customer Experience Improvement ProgramNSX participates in VMware’s Customer Experience Improvement Program (CEIP). System Events and Audit LogsSystem events are events that are related to NSX operations. They are raised to detail every operational event. Events might relate to basic operation (Informational) or to a critical error (Critical). Management System SettingsYou can edit the vCenter Server, DNS and NTP server, and Lookup server that you specified during initial login. NSX Manager requires communication with your vCenter Server and services such as DNS and NTP to provide details on your VMware Infrastructure inventory. Working with SNMP TrapsThe NSX Manager receives system events that are informational, warning, and critical from for example, the NSX Edge and hypervisor. The SNMP agent forwards the SNMP traps with OIDs to the SNMP receiver. NSX Backup and RestoreProper backup of all NSX components is crucial to restore the system to its working state in the event of a failure. Flow MonitoringFlow monitoring is a traffic analysis tool that provides a detailed view of the traffic to and from protected virtual machines. When flow monitoring is enabled, its output defines which machines are exchanging data and over which application. This data includes the number of sessions and packets transmitted per session. Session details include sources, destinations, applications, and ports being used. Session details can be used to create firewall to allow or block rules. Activity MonitoringActivity monitoring provides visibility into the applications that are in use on the Windows desktop virtual machines that are managed by vCenter. This visibility helps ensure that security policies at your organization are being enforced correctly. TraceflowTraceflow is a troubleshooting tool that provides the ability to inject a packet and observe where that packet is seen as it passes through the physical and logical network. The observations allow you to determine information about the network, such as identifying a node that is down or a firewall rule that is preventing a packet from being received by its destination.