<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>andrewassis Tracker</title>
    <link>https://communities.vmware.com/wbsdv95928/tracker</link>
    <description>andrewassis Tracker</description>
    <pubDate>Sat, 11 Nov 2023 22:17:53 GMT</pubDate>
    <dc:date>2023-11-11T22:17:53Z</dc:date>
    <item>
      <title>Re: Unable to see open Velo tickets on my account</title>
      <link>https://communities.vmware.com/t5/VMware-NSX-Discussions/Unable-to-see-open-Velo-tickets-on-my-account/m-p/2986043#M16912</link>
      <description>&lt;P&gt;I understand that you're having trouble viewing all the support tickets, including open tickets, in your VMware support request history. To access your open tickets and resolve this issue, you should follow these steps:&lt;/P&gt;&lt;P&gt;1. **Log into My VMware:**&lt;BR /&gt;- Go to the My VMware portal: &lt;A href="https://my.vmware.com/" target="_blank"&gt;https://my.vmware.com/&lt;/A&gt;&lt;BR /&gt;- Sign in using your VMware account credentials. This account should have the appropriate permissions and entitlements to view your support tickets.&lt;/P&gt;&lt;P&gt;2. **Access Support Requests:**&lt;BR /&gt;- Once you're logged in, locate and click on the "Support Requests" or "My Support Requests" section. This should take you to a list of your support requests, both open and closed.&lt;/P&gt;&lt;P&gt;3. **Filter and Sort:**&lt;BR /&gt;- By default, the support request list may show only the most recent requests, including closed tickets. Look for options to filter or sort the list to view open tickets specifically.&lt;/P&gt;&lt;P&gt;4. **Check Support Request Status:**&lt;BR /&gt;- Review the status of each support request in the list. Open tickets should have a status that indicates they are still in progress or open.&lt;/P&gt;&lt;P&gt;5. **Contact VMware Support (if needed):**&lt;BR /&gt;- If you are still unable to locate your open tickets or have any concerns, it's advisable to contact VMware Support directly. They can assist you in finding and managing your support requests.&lt;/P&gt;&lt;P&gt;6. **Verify Entitlement:**&lt;BR /&gt;- Ensure that your VMware account is associated with the correct entitlement account (in your case, 579712866 AT&amp;amp;T). If there are any discrepancies or issues with your entitlement, this could affect your ability to view support tickets.&lt;/P&gt;&lt;P&gt;7. **Check Account Permissions:**&lt;BR /&gt;- Verify that your VMware account has the appropriate permissions to access and view support tickets associated with your entitlement account.&lt;/P&gt;&lt;P&gt;If you're unable to find your open support tickets despite following these steps, reaching out to VMware Support directly is your best course of action. They can assist you in resolving any account-related issues and help you access the information you need regarding your open support requests.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Sep 2023 20:29:01 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-NSX-Discussions/Unable-to-see-open-Velo-tickets-on-my-account/m-p/2986043#M16912</guid>
      <dc:creator>andrewassis</dc:creator>
      <dc:date>2023-09-10T20:29:01Z</dc:date>
    </item>
    <item>
      <title>Re: Guest VM unpredictably lost connection when using NSX-V edge gateway</title>
      <link>https://communities.vmware.com/t5/VMware-NSX-Discussions/Guest-VM-unpredictably-lost-connection-when-using-NSX-V-edge/m-p/2986042#M16911</link>
      <description>&lt;P&gt;The symptoms you're experiencing with random NSX-V Edge Gateway hang issues on vCenter-A but not on vCenter-B can be challenging to diagnose, but I can provide some steps and considerations to help you troubleshoot and potentially resolve the problem:&lt;/P&gt;&lt;P&gt;1. **Verify Compatibility:**&lt;BR /&gt;- Ensure that all components, including ESXi hosts, NSX-V, vCenter, and physical infrastructure, are on the VMware Compatibility Guide for your specific versions. Incompatible hardware or software versions can lead to unexpected issues.&lt;/P&gt;&lt;P&gt;2. **Collect Logs and Diagnostics:**&lt;BR /&gt;- When the issue occurs, collect logs and diagnostics from the affected Edge Gateway VM and the corresponding ESXi host. Analyzing these logs can provide insights into what's happening at the time of the hang.&lt;/P&gt;&lt;P&gt;3. **Review Edge Gateway Configuration:**&lt;BR /&gt;- Verify the configuration of the affected Edge Gateway VMs. Pay attention to firewall rules, routing, NAT, and any custom configurations. Ensure that they align with your network design and requirements.&lt;/P&gt;&lt;P&gt;4. **Monitor Resource Utilization:**&lt;BR /&gt;- Monitor the resource utilization (CPU, memory, and network) on the affected ESXi host and Edge Gateway VMs. High resource utilization can lead to performance issues and hangs.&lt;/P&gt;&lt;P&gt;5. **Check for Network Issues:**&lt;BR /&gt;- Examine the physical network infrastructure for any potential problems such as packet loss, congestion, or switch issues. Ensure that the network configuration on vCenter-A matches vCenter-B.&lt;/P&gt;&lt;P&gt;6. **Review VMware KB Articles:**&lt;BR /&gt;- Search VMware's Knowledge Base for any known issues or solutions related to NSX-V Edge Gateway hangs for your specific version. VMware often publishes articles with troubleshooting steps and fixes for common issues.&lt;/P&gt;&lt;P&gt;7. **Check for ESXi Host Isolation:**&lt;BR /&gt;- Ensure that the ESXi hosts where Edge Gateway VMs are running are not experiencing isolation events or network issues. Host isolation can lead to communication problems.&lt;/P&gt;&lt;P&gt;8. **Check for VMware Tools and ESXi Updates:**&lt;BR /&gt;- Ensure that VMware Tools inside the VMs and ESXi hosts are up-to-date. Outdated or incompatible versions can lead to communication issues.&lt;/P&gt;&lt;P&gt;9. **Consider NSX-V Version Compatibility:**&lt;BR /&gt;- While you mentioned upgrading NSX on vCenter-A, ensure that NSX-V version 6.4.14 is fully compatible with your vCenter and ESXi versions.&lt;/P&gt;&lt;P&gt;10. **Engage VMware Support:**&lt;BR /&gt;- If the issue persists and you can't identify the root cause, consider opening a support case with VMware. They have the expertise and tools to diagnose and resolve complex issues.&lt;/P&gt;&lt;P&gt;11. **Performance Monitoring:**&lt;BR /&gt;- Implement performance monitoring and alerting for your NSX-V environment. Tools like vRealize Operations Manager can help you proactively detect performance issues.&lt;/P&gt;&lt;P&gt;12. **HA and Fault Tolerance:**&lt;BR /&gt;- Consider enabling High Availability (HA) and Fault Tolerance (FT) for critical VMs, including Edge Gateway VMs, to provide redundancy and minimize downtime in case of issues.&lt;/P&gt;&lt;P&gt;13. **Regular Maintenance:**&lt;BR /&gt;- Schedule regular maintenance windows to perform updates and patches on your VMware infrastructure components. This can help ensure that you have the latest bug fixes and security updates.&lt;/P&gt;&lt;P&gt;Given the complexity of your environment and the intermittent nature of the issue, it's essential to thoroughly investigate each potential cause and monitor the situation closely. VMware support may be your best resource for diagnosing and resolving this issue, especially if it's specific to vCenter-A and not reproducible on vCenter-B.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Sep 2023 20:28:13 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-NSX-Discussions/Guest-VM-unpredictably-lost-connection-when-using-NSX-V-edge/m-p/2986042#M16911</guid>
      <dc:creator>andrewassis</dc:creator>
      <dc:date>2023-09-10T20:28:13Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterComputeResource' is not supported in NSX-T. "</title>
      <link>https://communities.vmware.com/t5/VMware-NSX-Discussions/ClusterComputeResource-is-not-supported-in-NSX-T-quot/m-p/2986041#M16910</link>
      <description>&lt;P&gt;The error message "ClusterComputeResource' is not supported in NSX-T" typically indicates that there are Distributed Firewall (DFW) rules in your VMware environment that reference a compute cluster. NSX-T does not support using compute clusters in DFW rules as you would in a traditional vSphere environment. To mitigate this issue and make your DFW rules compatible with NSX-T, you should update these rules. Here's how you can proceed:&lt;/P&gt;&lt;P&gt;1. **Identify DFW Rules with Cluster References:**&lt;BR /&gt;- First, identify the specific DFW rules that reference the "ClusterComputeResource." These rules may have been created in your vSphere environment.&lt;/P&gt;&lt;P&gt;2. **Understand the Intent of Cluster Rules:**&lt;BR /&gt;- Understand the purpose of these rules. In traditional vSphere environments, it's common to use clusters for grouping VMs, but in NSX-T, segmentation and security are typically achieved differently.&lt;/P&gt;&lt;P&gt;3. **Update DFW Rules:**&lt;BR /&gt;- For each rule that references a cluster, you'll need to update it to work with NSX-T. The exact changes will depend on the intent of the rule. Here are some considerations:&lt;BR /&gt;&lt;BR /&gt;a. **Replace Cluster References:** If the cluster was used to group VMs for security purposes, you'll need to replace the cluster reference with references to the specific VMs or security groups in NSX-T. This means redefining the source and destination objects of the rule.&lt;/P&gt;&lt;P&gt;b. **Redesign Rules:** If the rules were using cluster-based logic that's not directly translatable to NSX-T, you may need to redesign the rules to fit the NSX-T security model. This could involve creating new security groups, tags, or policies as needed.&lt;/P&gt;&lt;P&gt;c. **Review Policies:** Reevaluate the policies that these cluster-based rules were a part of. NSX-T has a different way of managing security policies, so you may need to create new policies to replace the old ones.&lt;/P&gt;&lt;P&gt;4. **Test and Validate:** Before making any changes in a production environment, thoroughly test the updated DFW rules in a test or staging environment. Ensure that the new rules achieve the desired security outcomes without any unintended consequences.&lt;/P&gt;&lt;P&gt;5. **Apply Changes:** Once you're confident that the updated rules are working correctly, apply them in your NSX-T environment.&lt;/P&gt;&lt;P&gt;6. **Documentation:** Document the changes you've made to the DFW rules for future reference and auditing.&lt;/P&gt;&lt;P&gt;7. **Review Other Configuration:** Review your overall NSX-T configuration to ensure it aligns with your security and segmentation requirements. Make sure that you have appropriate security groups, tags, and policies in place to manage security effectively.&lt;/P&gt;&lt;P&gt;8. **Seek Assistance if Needed:** If you encounter complexities or challenges during this process, consider seeking assistance from VMware support or consulting with a VMware NSX-T expert who can provide guidance specific to your environment.&lt;/P&gt;&lt;P&gt;Updating DFW rules from a vSphere-based model to an NSX-T model may require some significant changes, but it's essential to ensure that your security posture remains effective in the new environment while avoiding any compatibility issues.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Sep 2023 20:27:31 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-NSX-Discussions/ClusterComputeResource-is-not-supported-in-NSX-T-quot/m-p/2986041#M16910</guid>
      <dc:creator>andrewassis</dc:creator>
      <dc:date>2023-09-10T20:27:31Z</dc:date>
    </item>
    <item>
      <title>Re: "Manually create shadow firewall rules for ip-based IDFW traffic"</title>
      <link>https://communities.vmware.com/t5/VMware-NSX-Discussions/quot-Manually-create-shadow-firewall-rules-for-ip-based-IDFW/m-p/2986040#M16909</link>
      <description>&lt;P&gt;The message you're encountering during V2T (VMware vCenter to Tanzu) migration regarding IP-based IDFW (Identity Firewall) rules suggests that there are security rules in place that might disrupt network traffic during migration. To resolve this and ensure a smooth migration, you can follow these steps:&lt;/P&gt;&lt;P&gt;1. **Understand IP-Based IDFW Rules:**&lt;BR /&gt;- VMware's Identity Firewall (IDFW) relies on user identity and context for security rules. During migration, especially if you're transitioning from a traditional vCenter-based network to Tanzu, these rules can potentially block traffic since user context might change.&lt;/P&gt;&lt;P&gt;2. **Create Shadow Firewall Rules:**&lt;BR /&gt;- To avoid traffic interruption during migration, you should create shadow firewall rules that mimic your existing IP-based IDFW rules but don't depend on user identity or context. These shadow rules should permit the same traffic as your IDFW rules but without the user-specific conditions.&lt;/P&gt;&lt;P&gt;3. **Testing Shadow Rules:**&lt;BR /&gt;- Before applying the shadow rules, thoroughly test them in a controlled environment to ensure they work as expected and allow the necessary traffic. This step is crucial to avoid accidental disruption of network services.&lt;/P&gt;&lt;P&gt;4. **Apply Shadow Rules:**&lt;BR /&gt;- Once you are confident that the shadow rules are correctly configured, apply them to the relevant firewall or security groups within Tanzu. These rules should essentially replicate the functionality of your IP-based IDFW rules.&lt;/P&gt;&lt;P&gt;5. **Monitor Traffic:**&lt;BR /&gt;- During and after migration, monitor network traffic closely to ensure that it is not being blocked or interrupted by the shadow rules. If any issues arise, you can adjust the shadow rules as needed.&lt;/P&gt;&lt;P&gt;6. **Remove Shadow Rules After Migration:**&lt;BR /&gt;- After the migration is completed successfully, you can remove the shadow rules since they were only intended as temporary replacements for IP-based IDFW rules.&lt;/P&gt;&lt;P&gt;7. **Documentation:**&lt;BR /&gt;- Document your changes thoroughly, including the creation and removal of shadow rules. This documentation will be valuable for reference and auditing purposes.&lt;/P&gt;&lt;P&gt;It's important to note that the exact steps and configurations will depend on your specific network setup and requirements. You should also consult VMware documentation and consider seeking assistance from VMware support if you encounter any challenges during the migration process, especially regarding security rules and policies. Proper planning and testing are key to ensuring a seamless migration without disruptions to network traffic.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Sep 2023 20:26:31 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-NSX-Discussions/quot-Manually-create-shadow-firewall-rules-for-ip-based-IDFW/m-p/2986040#M16909</guid>
      <dc:creator>andrewassis</dc:creator>
      <dc:date>2023-09-10T20:26:31Z</dc:date>
    </item>
    <item>
      <title>Re: Error 522003 when attempting to add QoS Binding Map to segment via API</title>
      <link>https://communities.vmware.com/t5/VMware-NSX-Discussions/Error-522003-when-attempting-to-add-QoS-Binding-Map-to-segment/m-p/2986039#M16908</link>
      <description>&lt;P&gt;The error message you're encountering, "invalid qos profile in segment monitoring profile map" in NSX-T version 3.2.3, indicates that there may be an issue with the QoS profile configuration when trying to create a binding map for a segment. To troubleshoot and resolve this issue, here are some steps you can follow:&lt;/P&gt;&lt;P&gt;1. **Verify QoS Profile Configuration:**&lt;BR /&gt;- Double-check the QoS profile you are trying to associate with the segment. Ensure that the QoS profile is correctly configured with the desired settings and is in an active state.&lt;/P&gt;&lt;P&gt;2. **Check JSON Format:**&lt;BR /&gt;- Ensure that the JSON payload you are sending in your API request is correctly formatted. Make sure there are no syntax errors, missing or extra fields, and that the QoS profile path is specified correctly.&lt;/P&gt;&lt;P&gt;3. **API Version Compatibility:**&lt;BR /&gt;- Confirm that you are using the correct API version and endpoints for your NSX-T version (3.2.3 in your case). Ensure that there are no breaking changes or updates in the API between your version and earlier versions.&lt;/P&gt;&lt;P&gt;4. **Testing with a Known Good QoS Profile:**&lt;BR /&gt;- To isolate the issue, try creating a binding map with a known good QoS profile to see if it works. If it does, it may suggest that there is an issue with the specific QoS profile you are trying to use.&lt;/P&gt;&lt;P&gt;5. **Logs and Debugging:**&lt;BR /&gt;- Review the NSX Manager logs for any additional error messages or details related to the "invalid qos profile" error. This might provide more context on what's going wrong.&lt;/P&gt;&lt;P&gt;6. **Upgrading NSX-T:**&lt;BR /&gt;- Check if there are any known issues or bug fixes related to QoS profiles in NSX-T 3.2.3. If there is a known issue, consider upgrading to a newer version that addresses the problem.&lt;/P&gt;&lt;P&gt;7. **Contact VMware Support:**&lt;BR /&gt;- If you are still unable to resolve the issue, consider reaching out to VMware support for assistance. They can provide more specific guidance and potentially help with any potential bugs or issues in your NSX-T version.&lt;/P&gt;&lt;P&gt;8. **Automation and Scripting:**&lt;BR /&gt;- Since you mentioned that you have thousands of segments to update, consider using automation and scripting to streamline the process. You can use tools like PowerShell, Python, or Ansible to automate the task of creating binding maps for segments with QoS profiles.&lt;/P&gt;&lt;P&gt;By following these steps and ensuring that your QoS profiles and API requests are correctly configured, you should be able to resolve the "invalid qos profile in segment monitoring profile map" error in NSX-T 3.2.3.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Sep 2023 20:26:00 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-NSX-Discussions/Error-522003-when-attempting-to-add-QoS-Binding-Map-to-segment/m-p/2986039#M16908</guid>
      <dc:creator>andrewassis</dc:creator>
      <dc:date>2023-09-10T20:26:00Z</dc:date>
    </item>
    <item>
      <title>Re: multicast dns(MDNS)</title>
      <link>https://communities.vmware.com/t5/VMware-NSX-Discussions/multicast/m-p/2986038#M16907</link>
      <description>&lt;P&gt;Enabling MDNS (Multicast DNS) packet traffic on NSX-T routers for specific VLANs can involve several steps. NSX-T provides features for controlling and allowing multicast traffic, but you'll need to ensure that your configuration is correct to permit MDNS traffic to flow between segments and devices on different subnets. Here are some steps and considerations to help you troubleshoot and configure MDNS support in NSX-T:&lt;/P&gt;&lt;P&gt;1. **Verify NSX-T Multicast Configuration:**&lt;BR /&gt;- Check if multicast is configured correctly on NSX-T. Ensure that IGMP Snooping and PIM (Protocol Independent Multicast) are properly configured on the NSX-T routers.&lt;BR /&gt;- Make sure that multicast is enabled on the segments where MDNS traffic needs to be allowed.&lt;/P&gt;&lt;P&gt;2. **Check for Block Rules:**&lt;BR /&gt;- Review the NSX-T firewall rules to check if there are any rules that might be blocking MDNS traffic. Look for rules on both the T0 and T1 routers that may be impacting MDNS traffic flow.&lt;/P&gt;&lt;P&gt;3. **Create Firewall Rules:**&lt;BR /&gt;- If you don't have specific firewall rules in place to allow MDNS traffic, you may need to create them. Configure rules that permit UDP traffic on port 5353 (the standard MDNS port) between the source and destination segments or subnets.&lt;BR /&gt;&lt;BR /&gt;4. **MDNS Gateway Configuration:**&lt;BR /&gt;- Ensure that the MDNS Gateway feature is configured correctly. The MDNS Gateway should be attached to the appropriate segments and subnets where MDNS traffic needs to be allowed. Verify that it's correctly listening for MDNS traffic.&lt;/P&gt;&lt;P&gt;5. **Monitoring and Troubleshooting:**&lt;BR /&gt;- Use NSX-T monitoring tools and logs to trace the flow of MDNS packets. Check for any drop or deny events in the NSX-T logs that may indicate the packets are being blocked.&lt;BR /&gt;- You can also use packet capture tools or Wireshark to capture MDNS traffic at various points in your network to see if it's reaching the expected destinations or being blocked.&lt;/P&gt;&lt;P&gt;6. **Contact VMware Support:**&lt;BR /&gt;- If you are unable to identify the issue and resolve it through the above steps, consider reaching out to VMware support for assistance. They can provide specific guidance for your NSX-T version and configuration.&lt;/P&gt;&lt;P&gt;7. **Documentation and Vendor Support:**&lt;BR /&gt;- Consult the official VMware NSX-T documentation for your specific version to ensure that you're following recommended practices for multicast and MDNS support.&lt;BR /&gt;- Check with your radio system vendor to ensure that their equipment and software are compatible with NSX-T and that they have any specific configuration requirements for MDNS.&lt;/P&gt;&lt;P&gt;It's worth noting that MDNS traffic can be tricky to manage in virtualized network environments like NSX-T due to its multicast nature. Proper configuration and troubleshooting are essential to ensure that MDNS packets can flow between segments and devices on different subnets. Be sure to backup your configuration before making any significant changes, and consider testing changes in a controlled environment before applying them to a production network.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Sep 2023 20:24:17 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-NSX-Discussions/multicast/m-p/2986038#M16907</guid>
      <dc:creator>andrewassis</dc:creator>
      <dc:date>2023-09-10T20:24:17Z</dc:date>
    </item>
    <item>
      <title>Re: Problemas NSX</title>
      <link>https://communities.vmware.com/t5/Brazilian-Portuguese-Discussions/Problemas-NSX/m-p/2979081#M7036</link>
      <description>&lt;P&gt;Qual foi a solução?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jul 2023 16:36:12 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Brazilian-Portuguese-Discussions/Problemas-NSX/m-p/2979081#M7036</guid>
      <dc:creator>andrewassis</dc:creator>
      <dc:date>2023-07-25T16:36:12Z</dc:date>
    </item>
    <item>
      <title>Problemas NSX</title>
      <link>https://communities.vmware.com/t5/Brazilian-Portuguese-Discussions/Problemas-NSX/m-p/2979076#M7034</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Quais os maiores problemas que já tiveram com NSX dentro de um ISP?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jul 2023 16:33:03 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Brazilian-Portuguese-Discussions/Problemas-NSX/m-p/2979076#M7034</guid>
      <dc:creator>andrewassis</dc:creator>
      <dc:date>2023-07-25T16:33:03Z</dc:date>
    </item>
    <item>
      <title>Implementação de NSX</title>
      <link>https://communities.vmware.com/t5/Brazilian-Portuguese-Discussions/Implementa%C3%A7%C3%A3o-de-NSX/m-p/2979073#M7038</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Qual o passo a passo para implementar NSX em ISP?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jul 2023 16:30:24 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Brazilian-Portuguese-Discussions/Implementa%C3%A7%C3%A3o-de-NSX/m-p/2979073#M7038</guid>
      <dc:creator>andrewassis</dc:creator>
      <dc:date>2023-07-25T16:30:24Z</dc:date>
    </item>
    <item>
      <title>NSX ISP</title>
      <link>https://communities.vmware.com/t5/Brazilian-Portuguese-Discussions/NSX-ISP/m-p/2979069#M7040</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Qual a função principal do NSX em um ambiente ISP? &lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jul 2023 16:27:18 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Brazilian-Portuguese-Discussions/NSX-ISP/m-p/2979069#M7040</guid>
      <dc:creator>andrewassis</dc:creator>
      <dc:date>2023-07-25T16:27:18Z</dc:date>
    </item>
  </channel>
</rss>

