Configure VRF Lite, NSX Distributed Firewall, NSX Gateway Firewall, and Distributed Intrusion Detection
Acting as a VMware NSX® administrator, you will configure VRF lite (Virtual Routing and Forwarding), NSX Distributed Firewall, NSX Gateway Firewall, and Distributed Intrusion Detection. You will create uplink trunk segments, create security groups, configure Firewall rules, block external SSH requests, and enable Distributed Intrusion Detection.
Already have an account? Sign In »

In this Challenge Lab, you will configure VRF lite (Virtual Routing and Forwarding) to allow multiple isolate tenant networks to share a single Tier-0 Gateway. First, you will create uplink trunk segments for each tenant, and then you will deploy multiple VRF gateways. Next, you will deploy new Tier-1 gateways that connect to each VRF, and then you will create network segments for the Tier-1 gateways. Finally, you will attach VMs to the VRF segments, and then you will test connectivity.
You will be using a VMware NSX management appliance named sa-nsxmgr-01.hexelo.com. You will be using a vCenter server named sa-vcsa-01.hexelo.com.
Note: Once you begin the Challenge Lab, you will not be able to pause, save, or exit and then return to your Challenge Lab. Please ensure that you have set aside enough time to complete the Challenge Lab before you start.