EvertAM's Posts

I have no hand's on experience with Federation, so this might be a stupid suggestion, but have you checked that you don't have any unassigned TZ overlays?
Have you tried removing and recreating the scheduled backup?
Not PowerCLI, but you should be able to retrieve all DFW rules through the API as well.   Loop through this to get all policy id's: GET /policy/api/v1/infra/domains/<domain-id>/security-policies ... See more...
Not PowerCLI, but you should be able to retrieve all DFW rules through the API as well.   Loop through this to get all policy id's: GET /policy/api/v1/infra/domains/<domain-id>/security-policies Then use the results to loop through this to get an overview of all the rule-ids within each policy: GET /policy/api/v1/infra/domains/<domain-id>/security-policies/<security-policy-id>/rules And finally, you could loop this to get the details for every rule within the policy: GET /policy/api/v1/infra/domains/<domain-id>/security-policies/<security-policy-id>/rules/<rule-id> This should allow you to output it all in JSON.  Alternatively, consider managing the rulebase through IaC, that should give you a permanent overview of your rules in a repository.
The client is in charge of choosing it's TCP source port, either completely dynamically, like you'll see with a browser, or a fixed port (or pool of ports) for something like DHCP for example. It ap... See more...
The client is in charge of choosing it's TCP source port, either completely dynamically, like you'll see with a browser, or a fixed port (or pool of ports) for something like DHCP for example. It appears that the client (the source in this logs) has setup multiple connections to the same host. It's hard to tell if this is normal in this specific instance, tcp/343 is not an IANA assigned port and I personally don't really recognize it.
You probably already did this, but have you verified the available disk space? It wouldn't really explain why the manual backup works, but it never hurts to check I guess.
Gotcha. Only other config item I can think of is that the alert itself might be set for "Rolling window" instead of instance. It might be worth a check, my personal next stap would be to contact supp... See more...
Gotcha. Only other config item I can think of is that the alert itself might be set for "Rolling window" instead of instance. It might be worth a check, my personal next stap would be to contact support and ask them
Have you checked the health monitor to make sure it triggers instantly? Generally, you want some leniency to make sure you don't generate false alerts. 
I believe your issue might be that you're adding multiple ports to both the original and the translated ports. Adding multiple ports is generally used for NAT overload.  Based in your screenshot, yo... See more...
I believe your issue might be that you're adding multiple ports to both the original and the translated ports. Adding multiple ports is generally used for NAT overload.  Based in your screenshot, you're trying to NAT all traffic to an IP, but only allow certain ports in. This would be better handled using a firewall rule. If you are specifically trying to NAT only 3 ports (while handling traffic to other ports differently), I think you'll need multiple NAT rules.
Do you have a (cleaned up if needed) example of the payload you used?
It should be possible (the Terraform provider supports it at least). Make sure you have the syntax completely correct. Based on the output there, you'll need both expression AND expressions in your ... See more...
It should be possible (the Terraform provider supports it at least). Make sure you have the syntax completely correct. Based on the output there, you'll need both expression AND expressions in your body.
Do I correctly understand that you want to verify if a transport node has been removed from the fabric? Or do you want to check if NSX was outright uninstalled from the machine?
This might sound obvious but have you checked if that group already exists in NSX-T? You can find them under Inventory -> Groups
Ethernet would be considered non-IP, it is meant for all your L2 rules. However, the categories themselves do not necessarily restrict you from the rules you can make in them. They are recommendatio... See more...
Ethernet would be considered non-IP, it is meant for all your L2 rules. However, the categories themselves do not necessarily restrict you from the rules you can make in them. They are recommendations for to help you with ordering and building your firewall policies.  https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.2/administration/GUID-6AB240DB-949C-4E95-A9A7-4AC6EF5E3036.html The documentation is for 3.2, but this hasn't really changed between recent versions I believe, it's still the same in 4.x at least.
We've been doing it manually actually, but our environment is smell enough. As part of our migration we do also tag new VM's with a predefined set of categories to identify them. We use these as the ... See more...
We've been doing it manually actually, but our environment is smell enough. As part of our migration we do also tag new VM's with a predefined set of categories to identify them. We use these as the member criteria for our NSX Security groups as well.  Assuming you've already consistently tagged VM's, using those is probably not a bad idea
It doesn't seem to be universal, we've recently upgrade to 22.1.4 but did not encounter the issue. Based in the expiration dates, it seems like your System-Default-Root-CA was somehow renewed. Our c... See more...
It doesn't seem to be universal, we've recently upgrade to 22.1.4 but did not encounter the issue. Based in the expiration dates, it seems like your System-Default-Root-CA was somehow renewed. Our controllers show the same expiration dates for both the root and the Secure-Channel-Cert (with the root expiring one second earlier). You could try to renew the Secure-Channel-Cert, but that might be bit risky in a production environment.
We're in the process of doing this right now now. Some of our experiences below: - Try to add other sources outside of your VMware environment (switches, loadbalancers, ...), this will help in iden... See more...
We're in the process of doing this right now now. Some of our experiences below: - Try to add other sources outside of your VMware environment (switches, loadbalancers, ...), this will help in identifying flows that aren't necessarily virtual.  - vRNI has a LOT of information, and it can be quite a challenge to sift through it - Flows are only ever stored for 30 days, something to keep in mind if you have flows that might only occur every so often - Define your applications and tiers in vRNI (under Applications -> All Applications -> Add). This will help tremendously in analyzing flows I don't believe it's a good idea to use vRNI to define the contents of your waves. Identify (some of) your applications, and sort those into waves. Secure based on an application, not a VM.
Your understanding is correct. This IDS/IPS engine is part of the distributed firewall, which does not require NSX overlay segments to function.
That's probably not gonna work for your goal. The out filter will filter out routes that the T0 advertises to the outside world. Based on your message, you want to apply something like this to the th... See more...
That's probably not gonna work for your goal. The out filter will filter out routes that the T0 advertises to the outside world. Based on your message, you want to apply something like this to the the MPLS peers (incoming): 0.0.0.0/0 Deny Any          Allow This will cause the MPLS peers to not accept a default route from the remote side, this in turn will cause the T0 to not install a default route from the MPLS peers in it's routing table. You might additionally want to add some extra rules in there for other public IP's, but that will depend on your environment.  For this usecase, you don't necessarily need any other filters I believe. It is best practice to only allow your own public address space on an outgoing BGP filter (even though your ISP should be filtering this as well), and to deny any incoming private subnets from your ISP (again, they should not send this, but if everyone did there job properly, most of us would be out of a job). All of this assumes that you are directly peering to an ISP of course
Are you applying these as incoming or outgoing filters?
Where did you apply these exactly?  You'll generally use prefix lists to filter which routes you accept into the routing table, and which prefixes you want to advertise.  Your screenshots don't hav... See more...
Where did you apply these exactly?  You'll generally use prefix lists to filter which routes you accept into the routing table, and which prefixes you want to advertise.  Your screenshots don't have the name on them, but one of them outright denies everything right at the top, so that's a likely culprit. The list will be checked top to bottom and hit on the first match.   Am I understanding correctly that you're trying to force internet traffic through the internet line, and all other traffic through the MPLS?