NSX-T Data Center is designed to address the emerging application frameworks and architectures that have heterogeneous endpoints and technology stacks. In addition to vSphere, these environments may also include other hypervisors, containers, bare metal, and public clouds.
vRealize Network Insight Cloud supports NSX-T Data Center deployments where the VMs are managed by VMware vCenter.
- vRealize Network Insight Cloud supports only the NSX-T setups in which VMware vCenter manages the ESXi hosts.
- vRealize Network Insight Cloud supports NSGroups, NSX-T Firewall Rules, IPSets, NSX-T Logical Ports, NSX-T Logical Switches, NSX-T distributed firewall IPFIX flows, Segment, Group, and Policy Based VPN.
- vRealize Network Insight Cloud supports both NSX-V and NSX-T deployments. When you use NSX in your queries, the results include both NSX-V and NSX-T entities. NSX Manager lists both NSX-V and NSX-T Managers. NSX Security Groups list both NSX-T and NSX-V security groups. If NSX-V or NSX-T is used instead of NSX, then only those entities are displayed. The same logic applies to the entities such as firewall rules, IPSets, and logical switches.
- With NSX-T 2.4 release, vRealize Network Insight Cloud supports NSX Declarative Policy Management which simplifies and automate network and security configurations through outcome-driven policy statements.
Note: Micro-segmentation for Security Group is done based on NSX Policy data. But in case there is no corresponding NSX Policy Group, the standalone NS Group is included in the Micro-segmentation analysis. For more details on NS Group, see NSX-T product documentation.
- Ensure to add only local users in an NSX-T Federation setup.
- You must have at least the Read only privilege.
- You must add all the VMware vCenter associated with NSX-T Manager as data sources in vRealize Network Insight Cloud.
Note: If you add the NSX-T Manager before adding VMware vCenter, then vRealize Network Insight Cloud takes around four hours to stabilize.
- Ensure that there are no logical switches in the exclusion list in the Distributed Firewall (DFW). If there are any logical switches in this list, then the flows are not reported for any VMs attached to these logical switches.
- Go to .
- Under VMware Manager, select VMware NSX-T Manager.
- Provide the user credentials.
Option Action Collector VM Select a collector VM from the drop-down menu. IP Address/FQDN Enter the IP address (IPv4 or IPv6 address), or the FQDN details. Authentication Method Select the authentication method from the drop-down menu. Username/Password Enter the user name and the password. Certificate (Principal Identity)
- Certificate: Click Browse and upload the principal identity certificate.
- Private Key: Click Browse and upload the principal identity private key.
Note: vRealize Network Insight Cloud does not support encrypted principal identity private key.
Note: You must add the data source using either IP address or FQDN. Do not add the data source using both IP address and FQDN.
- If you have more than one management node in a single NSX-T deployment, you must add only one node as a data source in vRealize Network Insight Cloud or use Virtual IP (VIP) (of those nodes). If you add more than one management node, then vRealize Network Insight Cloud may not function properly.
- Ensure that you use VIP when you add NSX-T as a data source. If you add a management node IP instead of VIP, and later if you want to add a VIP or other management node IP, then you have to delete the existing data source to add the new VIP or Management IP.
- Ensure that each management node in the cluster is reachable from the collector.
- If IPFIX is not required, the user must be a local user with audit level permissions. But if IPFIX is required, the user must have one of the following permissions: enterprise_admin, network_engineer, or security_engineer.
- Click Validate.
- (Optional) Select Enable DFW IPFIX to update the IPFIX settings on NSX-T. By selecting this option, vRealize Network Insight Cloud receives DFW IPFIX flows from NSX-T. For more information on enabling IPFIX, see Enable VMware NSX-T DFW IPFIX.
- DFW IPFIX is not supported in the Standard Edition of NSX-T.
- vRealize Network Insight Cloud does not support NSX-T Switch IPFIX flows.
- (Optional) If you want to collect latency metrics data, select Enable latency metric collection check box. If you select this option, vRealize Network Insight Cloud receives latency metrics such as VTEP - VTEP, vNIC - pNIC, pNIC - vNIC, vNIC - vNIC from NSX-T. For more information about network latency, see Network Latency Statistics.
- This option is available only for NSX-T 2.5 and later.
- VTEP - VTEP is available from NSX-T 2.5 and later.
- vNIC - pNIC, pNIC - vNIC, vNIC - vNIC are available from NSX-T 3.0.2 and later.
- To enable latency metric collection, you must have enterprise_admin permission.
- Ensure that the port 1991 is open on the collector to receive the latency data from the ESXi node.
- This option is available only for NSX-T 2.5 and later.
- (Optional) To enable the flow collection from NSX Intelligence, select the Enable NSX Intelligence check box.
NSX Intelligence provides deep packet inspection with the application layer visibility. After receiving flows from NSX Intelligence, you can see L7 (application layer) information such as App-Id.Note: To enable NSX Intelligence in vRealize Network Insight Cloud, you must deploy the NSX Intelligence appliance. vRealize Network Insight Cloud supports NSX Intelligence 1.2 with NSX-T Data Center 3.1 and later.
NSX Intelligence takes at least 12 minutes to process and send the flow information to vRealize Network Insight Cloud.Note: To enable the flow collection from NSX Intelligence, you must select the Enable DFW IPFIX check box as vRealize Network Insight Cloud uses the DFW IPFIX as a primary source of flows.
L7 information is not available for dropped flows as it is not supported by NSX Intelligence.
- In the Nickname text box, enter a nickname.
- In the Notes (Optional) text box, add a note if necessary.
- Click Submit.
Examples for Queries
Here are some examples for queries related to NSX-T:
|NSX-T Manager where VC Manager=10.197.53.214||NSX-T Manager where this particular VC Manager has been added as the compute manager.|
|NSX-T Logical Switch||Lists all the NSX-T Logical switches present in the instance of vRealize Network Insight Cloud. including the details on whether it is a system-created or a user-created switch.|
|NSX-T Logical Ports where NSX-T Logical Switch = 'DB-Switch'||Lists the NSX-T logical ports belonging to that particular NSX-T logical switch, DB-Switch.|
|VMs where NSX-T Security Group = 'Application-Group'
OrVMs where NSGroup = ‘Application-Group’
|Lists all the VMs in that particular security group, Application-Group.|
|NSX-T Firewall Rule where Action='ALLOW'||Lists all the NSX-T Firewall Rules which have their action set as ALLOW.|
|NSX-T Firewall Rule where Destination Security Group = ‘CRM-Group’||Lists the firewall rules where the CRM-Group is the Destination Security Group. The results include both Direct Destination Security Groups and Indirect Destination Security Groups.|
|NSX-T Firewall Rule where Direct Destination Security Group = ‘CRM-Group’||Lists the firewall rules where the CRM-Group is the Destination Security Group. The results include only the Direct Destination Security Groups.|
|VMs where NSX-T Logical Port = ‘App_Port-Id-1’||Lists all the VMs which have that particular NSX-T Logical Port.|
|NSX-T Transport Zone||Lists the VLAN and the overlay transport zone and the respective details associated with it including the type of the transport node.
Note: vRealize Network Insight Cloud does not support KVM as a data source.
|NSX-T Router||Lists the TIER 1 and TIER 0 routers. Click the router shown in the results to view more details associated with it including the NSX-T Edge Cluster and the HA mode.|
|NSX Policy Segment||Lists all the NSX Policy Segments present in the instance of vRealize Network Insight Cloud.|
|NSX Policy Manager||Lists all the NSX Policy Manages present in the instance of vRealize Network Insight Cloud.|
|NSX Policy Group||Lists all the NSX Policy Groups present in the instance of vRealize Network Insight Cloud.|
|NSX Policy Firewall||Lists all the NSX Policy Firewalls present in the instance of vRealize Network Insight Cloud.|
|NSX Policy Firewall Rule||Lists all the NSX Policy Firewall Rules present in the instance of vRealize Network Insight Cloud.|
|NSX Policy Firewall Rule where Action = 'ALLOW'||Lists all the NSX Policy Firewall Rules which have their action set as ALLOW.|
|NSX Policy Based VPN||Lists all the NSX Policy Based VPNs present in the instance of vRealize Network Insight Cloud.|
Support for NSX-T Metrics
|Entities||Widgets on the Entity Dashboard||Supported NSX-T Metrics|
Logical Switch Packet Metrics
Logical Switch Byte Metrics
Logical Port Packet Metrics
Logical Port Byte Metrics
Router Interface Metrics
Firewall Rule Metrics
nsx-t logical switch where Rx Packet Drops > 0
This query lists all the logical switches where the count of the dropped received packets is greater than 0.
nsx-t logical port where Tx Packet Drops > 0
This query lists all the logical ports where the count of the dropped transmitted packets is greater than 0.
top 10 nsx-t firewall rules order by Connection count
This query lists the top 10 firewall rules based on the connection count(
Security Planning for NSX-T
plan NSX-T Layer2 Network ‘<NAME_OF_NSX_T_LOGICAL_SEGMENT>’You can also obtain the same result by performing the following steps:
- Select from the left navigation from.
- Select either NSX-T L2 Network or NSX Policy Segment as the scope from the drop-down menu.