SlideShare a Scribd company logo
Deploying the NSX Manager virtual appliance
The deployment of NSX requires a lot of things to be in place for a successful
deployment of NSX and below I will list the most important things for a smooth and
successful deployment of NSX.
NSX, VMWARE VERSION OF SDN/ Software-Defined Data
Center (SDDC)
VMware NSXfor vSphere isa core componentof the VMware Software-DefinedData
Center(SDDC);itisthe componentthatenablesnetworkvirtualization.Network
virtualization provides alayerof abstractionoverthe physical networkusingaVXLAN network
overlay.WithNSX,networkoperationsare now independentof the physical hardware,and
functionssuchas logical firewalls,loadbalancers,logical routers,logical switches,andvirtual
private networkscanbe provisioned,modified,ortorndownas part of an automatedworkflow.
Choosing the right VMware NSX for vSphere edition
VMware NSX has four licensing editions: standard, advanced, enterprise, and remote
office/branch offices (ROBO). Each licensing tier provides distinctive functionality, available
per CPU socket on a perpetual basis at the vSphere cluster level.
The standard and advanced editions are also available as per 100 users in a pack basis to
align with virtual desktop deployments (vSphere for desktop). The enterprise edition
is also available on per-VM term basis. You can upgrade from standard to
advanced/enterprise and from advanced to enterprise.
Getting ready
Like vSphere licensing, VMware NSX is licensed per CPU socket. If you have a
separate Management vSphere Cluster that is used for Infrastructure VMs and are not
planning to protect it with the NSX Distributed Firewall or place NSX Edge Service
Gateways onto it, you are not required to license the CPUs on that Management
vSphere Cluster. The Compute vSphere cluster and Edge vSphere cluster need to be
licensed.
How To do It :
From your vSphere inventory you will need to do the following:
1. Determine how many CPU sockets you need
2. Determine the NSX features required
3. If you are planning to integrate third-party partner solutions with NSX
4. Choose the NSX edition based on the features required
VMware NSX editions
The four tiers of licenses are as follows:
1. Standard edition
2. Advanced edition
3. Enterprise edition
4. ROBO
Note : Check on VMware website for all license requirements before deploying.
Log Insight into NSX : VMware vRealize Log Insight for NSX
VMware vRealize Log Insight is a log management engine that collects logs from a
number of different sources and provides rich dashboards and search functionality.
Log Insight is available for NSX at no additional charge, you are entitled to one Log
Insight CPU per NSX CPU license. The support and subscription is included with the
NSX purchase. It is a fully functioning version of Log Insight but limited to vSphere and
NSX data sources and content packs only. If you need more data sources and content
packs, additional Log Insight licenses are required.
VMware NSX Monitoring Tools
Selecting ESXi hosts and network adapters
Similar to the requirements of a VMware vSphere solution, choosing the correct hardware is
still an important part of any NSX deployment; therefore, you need to follow the same process
that you did for vSphere to ensure the hardware you are deploying is on the VMware
Compatibility Guide.
The compatibility guide does not only list the supported servers, but you need to also check if
your network interface card (I/O devices) is supported and features such as VXLAN Offload
and Receive Side Scaling are also supported.
VXLAN Offload
VXLAN Offload is akin to TCP segmentation offload (TSO), but compared to TSO, which is
designed for TCP packet headers, VXLAN encapsulates the original (source) packet from a
virtual machine into a user datagram protocol (UDP) packet with its own unique header,
known as the VXLAN header. Placing this additional header onto a packet invalidates
traditional offloading mechanisms in-place and therefore increases load on the CPU as
additional CPU cycles are needed to encapsulate and decapsulate every VXLAN packet.
Receive Side Scaling
Receive Side Scaling (RSS) is a technique the Network Interface Card (NIC)
employs to ensure that data processing for a particular connection is balanced across
multiple CPU cores. Without RSS, all connections would be handled by a single CPU
core, which can adversely affect network performance.
FIRST STEP’S Before Deployment
Deploying the NSX Manager virtual appliance is the first step to enabling network
virtualization in your vSphere environment. In this recipe, you will go through the steps
to enable your environment for NSX.
The following diagram depicts the logical process of enabling your environment for
network virtualization, and the first four steps will be covered here :
Deploying The NSX Manager Virtual Appliance
Things Needed Before Deployment :
Before deploying NSX Manager, the following prerequisites need to be satisfied:
 Static IP address and portgroup for NSX Manager
 Firewall ports open between NSX Manager, vCenter server, and ESXi VMKernel 0
Interface on each host (refer to vmware website for a complete list of ports)
 Forward and reverse DNS entries for NSX Manager
 NTP server is accessible; minimum of four is recommended for accurate time
 Shared datastore for the appliance to be deployed onto
 Satisfy minimum requirements for NSX Manager
Fill in the following table before deployment : (Also make sure to include the cli password and cli
privilege password )
Afteryouhave gatheredall the neededinfoaslistedabove follow the steps below todeployNSX
Manager.
1. Log into the vSphere Web Client
2. Select Hosts and Clusters, right-click on the target cluster and select Deploy OVF
Template
3. Select Local File and locate the NSX Manager OVA downloaded earlier; click on Next
4. Type in the Name of the virtual appliance and click on Next
5. Select the vSphere cluster and resource where you want to deploy NSX Manager and
select Next
6. Review details, Accept license agreements and click on Next
7. Select the shared datastore of where you want the virtual appliance to be deployment onto
8. Select the VLAN-backed portgroup as defined earlier and click on Next
9. Fill in the template details as highlighted in the preceding table and click on Next
10. Ensure all details are correct and click on Finish:
Next Step will be to :
Replacing the NSX Manager certificate
When you first deploy the NSX Manager, it creates a self-signed certificate. Using a self-
signed certificate is generally not a recommended security practice. It is recommended to
deploy a signed certificate from your internal certificate authority. NSX Manager supports two
ways of deploying a signed certificate, which are as follows:
 Certificate signing request to a Certificate Authority (CA)
 Importing a PKCS#12 certificate archive (bundle) onto the NSX Manager, which includes
the private and public key for NSX Manager and certificate chain of any subordinate CAs in
your environment
Next we will explore how you can create a certificate signing request on NSX Manager and
how to import a PKCS#12 certificate bundle onto the NSX Manager.
Certificate Signing Request
A Certificate Signing Request (CSR) is the first part in a three-step process; this process
involves the following steps:
1. The NSX Manager creating a CSR
2. The CSR is sent as a request to the certificate authority, which then signs the certificate
and sends back a signed certificate
3. Importing the signed certificate into the NSX Manager
The procedure to complete a certificate signing request is as follows:
1. Log into NSX Manager via your web browser
2. Click on Manage Appliance Settings
3. Click on SSL Certificates
4. Click on Generate CSR and follow the prompts as per the following screenshot:
5. Click on OK and select Download CSR
6. Send the CSR file to your security administrator and get the certificate signed
7. With the returned certificate, click on Import so you can import the correct certificate into
the NSX Manager
8. Reboot the NSX Manager to complete the process of importing a signed certificate into the
NSX Manager
Using a PKCS#12 certificate
Importing PKCS#12 into the NSX Manager is used when the certificate signing was
not completed using the CSR method outlined in the previous recipe. The PKCS#12
format is typically used in scripted installations of NSX Manager and other
components. If a CSR was not generated by the NSX Manager itself, it is required that
the PKCS#12 archive is imported into NSX Manager.
The PKCS#12 archive generally consists of the following:
 A signed server certificate
 A private key for the signed certificate
 Root and intermediate certificate authority public keys
The PKCS#12 is also password-protected, so it's important to have the password
before attempting to import the PKCS#12 archive into NSX Manager.
In some cases, the received signed certificate may not be in the PCKS#12 format. In
this event, you must convert the certificates into the PKCS#12 format for import into
the NSX Manager. This can be achieved using openSSL (https://www.openssl.org/),
and the command to achieve this is as follows:
openssl pkcs12-export-outserver.p12-inkeyserver.key -inserver.crt-certfile CACert.crt
The procedure to import the PCKS#12 archive is as follows:
1. Log into the NSX Manager via your web browser
2. Click on Manage Appliance Settings
3. Click on SSL Certificates
4. Click on Upload PCKS#12Keystore and browse to the file
5. Enter the password for archive and click on Import
6. Reboot the NSX Manager to complete the process of importing the signed certificate
Until NextTime…………………………………

More Related Content

PDF
VMware Horizon (view) 7 Lab Manual
PPTX
VMworld 2016: vSphere 6.x Host Resource Deep Dive
PPTX
VMworld 2015: VMware NSX Deep Dive
PPTX
VMworld 2016: Advanced Network Services with NSX
PPTX
Troubleshooting Provisioning Services Target Boot Processes
PPTX
VMworld 2015: Just Because You COULD, Doesn’t Mean You SHOULD – vSphere 6.0 A...
PDF
VMUG - NSX Architettura e Design
PPTX
VMworld 2016: Virtualize Active Directory, the Right Way!
VMware Horizon (view) 7 Lab Manual
VMworld 2016: vSphere 6.x Host Resource Deep Dive
VMworld 2015: VMware NSX Deep Dive
VMworld 2016: Advanced Network Services with NSX
Troubleshooting Provisioning Services Target Boot Processes
VMworld 2015: Just Because You COULD, Doesn’t Mean You SHOULD – vSphere 6.0 A...
VMUG - NSX Architettura e Design
VMworld 2016: Virtualize Active Directory, the Right Way!

What's hot (19)

PDF
NetScaler Deployment Guide for XenDesktop7
PPTX
VMware Advance Troubleshooting Workshop - Day 2
PPTX
Citrix TechEdge 2014 - How to Protect Against the Top 10 Web Security Issues ...
PPTX
Advanced Tools and Techniques for Troubleshooting NetScaler Appliances
PDF
VMware vSphere 6.0 Lab Manual
PPTX
VMware Advance Troubleshooting Workshop - Day 4
PDF
VMware vSphere Networking deep dive
PDF
VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies
PPTX
VMworld 2015: Advanced SQL Server on vSphere
PDF
Citrix Internals: ICA Connectivity
PPTX
VMworld 2015: Managing Users: A Deep Dive into VMware User Environment Manager
PPTX
VMware vSphere 4.1 deep dive - part 2
PPTX
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI Automation
PDF
VMworld 2013: NSX PCI Reference Architecture Workshop Session 2 - Privileged ...
PPTX
VMworld 2015: Extreme Performance Series - vCenter Performance Best Practices
PPTX
VMware App Volumes Troubleshooting
PPTX
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
PPTX
How to hack Citrix (So, You Just Inherited Someone Else's Citrix Environment....
PPTX
VMWare NSX Components
NetScaler Deployment Guide for XenDesktop7
VMware Advance Troubleshooting Workshop - Day 2
Citrix TechEdge 2014 - How to Protect Against the Top 10 Web Security Issues ...
Advanced Tools and Techniques for Troubleshooting NetScaler Appliances
VMware vSphere 6.0 Lab Manual
VMware Advance Troubleshooting Workshop - Day 4
VMware vSphere Networking deep dive
VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies
VMworld 2015: Advanced SQL Server on vSphere
Citrix Internals: ICA Connectivity
VMworld 2015: Managing Users: A Deep Dive into VMware User Environment Manager
VMware vSphere 4.1 deep dive - part 2
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI Automation
VMworld 2013: NSX PCI Reference Architecture Workshop Session 2 - Privileged ...
VMworld 2015: Extreme Performance Series - vCenter Performance Best Practices
VMware App Volumes Troubleshooting
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
How to hack Citrix (So, You Just Inherited Someone Else's Citrix Environment....
VMWare NSX Components
Ad

Similar to Deploying The NSX Manager Virtual Appliance (20)

PPTX
Nsx security deep dive
PDF
An Introduction to VMware NSX
PDF
VMware 2V0-41.23 Certification | Questions & Answers
PDF
2V0-41.23 Exam | Start Your Preparation
PDF
2V0-41.23 Exam | Start Your Preparation
PDF
ICM_NSX-T_V2.4_LAB
PDF
VMworld 2013: Operational Best Practices for NSX in VMware Environments
PDF
Vsphere esxi-vcenter-server-50-installation-setup-guide
PDF
VMware NSX primer 2014
PPTX
NSX-T Architecture and Components.pptx
PDF
VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...
PPTX
VMworld 2015: VMware NSX Deep Dive
PDF
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
PPTX
VMware nsx network virtualization tool
PDF
Vsp 40 esxi_i_vc_setup_guide
PPTX
Self service it with v realizeautomation and nsx
PPTX
General-and-complete_Training_Slide_v0.9-TGT.pptx
PDF
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
PDF
Partnerské integrace, referenční architektury a implementace Virtual SAN / NSX
Nsx security deep dive
An Introduction to VMware NSX
VMware 2V0-41.23 Certification | Questions & Answers
2V0-41.23 Exam | Start Your Preparation
2V0-41.23 Exam | Start Your Preparation
ICM_NSX-T_V2.4_LAB
VMworld 2013: Operational Best Practices for NSX in VMware Environments
Vsphere esxi-vcenter-server-50-installation-setup-guide
VMware NSX primer 2014
NSX-T Architecture and Components.pptx
VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...
VMworld 2015: VMware NSX Deep Dive
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
VMware nsx network virtualization tool
Vsp 40 esxi_i_vc_setup_guide
Self service it with v realizeautomation and nsx
General-and-complete_Training_Slide_v0.9-TGT.pptx
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
Partnerské integrace, referenční architektury a implementace Virtual SAN / NSX
Ad

More from David kankam (13)

DOCX
How to Create an AWS VPC from Beginning to End and deploy a Windows Instance ...
DOCX
Palo Alto U turn NAT for inside user's to access Web Server in a different Zo...
DOCX
Resolve a Palo Alto firewall blocking oracle application.
DOCX
Creating Cisco ACI Fabric Policy
DOCX
Upcoming Topics To Be Covered On NSX Deployment.
DOCX
Converting From Nexus NX-OS Mode to ACI Mode.
DOCX
ACI HIGH LEVEL DESIGN OVERVIEW
DOCX
SDN THE CISCO WAY
PPTX
Integration of pola alto and v mware nsx to protect virtual and cloud environ...
PPTX
Nexus lan switching configuration
PPTX
Cisco virtual port channel high level over view
PPTX
Nexus Virtual Device Context high Level Explanation.
PPTX
Nexus Virtual Device Context high Level Explanation.
How to Create an AWS VPC from Beginning to End and deploy a Windows Instance ...
Palo Alto U turn NAT for inside user's to access Web Server in a different Zo...
Resolve a Palo Alto firewall blocking oracle application.
Creating Cisco ACI Fabric Policy
Upcoming Topics To Be Covered On NSX Deployment.
Converting From Nexus NX-OS Mode to ACI Mode.
ACI HIGH LEVEL DESIGN OVERVIEW
SDN THE CISCO WAY
Integration of pola alto and v mware nsx to protect virtual and cloud environ...
Nexus lan switching configuration
Cisco virtual port channel high level over view
Nexus Virtual Device Context high Level Explanation.
Nexus Virtual Device Context high Level Explanation.

Recently uploaded (20)

PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
Five Habits of High-Impact Board Members
PPT
Geologic Time for studying geology for geologist
PPTX
Modernising the Digital Integration Hub
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
STKI Israel Market Study 2025 version august
PDF
A review of recent deep learning applications in wood surface defect identifi...
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPT
What is a Computer? Input Devices /output devices
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Five Habits of High-Impact Board Members
Geologic Time for studying geology for geologist
Modernising the Digital Integration Hub
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
Developing a website for English-speaking practice to English as a foreign la...
STKI Israel Market Study 2025 version august
A review of recent deep learning applications in wood surface defect identifi...
Group 1 Presentation -Planning and Decision Making .pptx
What is a Computer? Input Devices /output devices
A novel scalable deep ensemble learning framework for big data classification...
Taming the Chaos: How to Turn Unstructured Data into Decisions
DP Operators-handbook-extract for the Mautical Institute
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
O2C Customer Invoices to Receipt V15A.pptx
Module 1.ppt Iot fundamentals and Architecture
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Web Crawler for Trend Tracking Gen Z Insights.pptx
Final SEM Unit 1 for mit wpu at pune .pptx

Deploying The NSX Manager Virtual Appliance

  • 1. Deploying the NSX Manager virtual appliance The deployment of NSX requires a lot of things to be in place for a successful deployment of NSX and below I will list the most important things for a smooth and successful deployment of NSX. NSX, VMWARE VERSION OF SDN/ Software-Defined Data Center (SDDC) VMware NSXfor vSphere isa core componentof the VMware Software-DefinedData Center(SDDC);itisthe componentthatenablesnetworkvirtualization.Network virtualization provides alayerof abstractionoverthe physical networkusingaVXLAN network overlay.WithNSX,networkoperationsare now independentof the physical hardware,and functionssuchas logical firewalls,loadbalancers,logical routers,logical switches,andvirtual private networkscanbe provisioned,modified,ortorndownas part of an automatedworkflow. Choosing the right VMware NSX for vSphere edition VMware NSX has four licensing editions: standard, advanced, enterprise, and remote office/branch offices (ROBO). Each licensing tier provides distinctive functionality, available per CPU socket on a perpetual basis at the vSphere cluster level. The standard and advanced editions are also available as per 100 users in a pack basis to align with virtual desktop deployments (vSphere for desktop). The enterprise edition is also available on per-VM term basis. You can upgrade from standard to advanced/enterprise and from advanced to enterprise.
  • 2. Getting ready Like vSphere licensing, VMware NSX is licensed per CPU socket. If you have a separate Management vSphere Cluster that is used for Infrastructure VMs and are not planning to protect it with the NSX Distributed Firewall or place NSX Edge Service Gateways onto it, you are not required to license the CPUs on that Management vSphere Cluster. The Compute vSphere cluster and Edge vSphere cluster need to be licensed. How To do It : From your vSphere inventory you will need to do the following: 1. Determine how many CPU sockets you need 2. Determine the NSX features required 3. If you are planning to integrate third-party partner solutions with NSX 4. Choose the NSX edition based on the features required VMware NSX editions The four tiers of licenses are as follows: 1. Standard edition 2. Advanced edition 3. Enterprise edition 4. ROBO Note : Check on VMware website for all license requirements before deploying.
  • 3. Log Insight into NSX : VMware vRealize Log Insight for NSX VMware vRealize Log Insight is a log management engine that collects logs from a number of different sources and provides rich dashboards and search functionality. Log Insight is available for NSX at no additional charge, you are entitled to one Log Insight CPU per NSX CPU license. The support and subscription is included with the NSX purchase. It is a fully functioning version of Log Insight but limited to vSphere and NSX data sources and content packs only. If you need more data sources and content packs, additional Log Insight licenses are required. VMware NSX Monitoring Tools Selecting ESXi hosts and network adapters Similar to the requirements of a VMware vSphere solution, choosing the correct hardware is still an important part of any NSX deployment; therefore, you need to follow the same process that you did for vSphere to ensure the hardware you are deploying is on the VMware Compatibility Guide. The compatibility guide does not only list the supported servers, but you need to also check if your network interface card (I/O devices) is supported and features such as VXLAN Offload and Receive Side Scaling are also supported. VXLAN Offload VXLAN Offload is akin to TCP segmentation offload (TSO), but compared to TSO, which is designed for TCP packet headers, VXLAN encapsulates the original (source) packet from a virtual machine into a user datagram protocol (UDP) packet with its own unique header, known as the VXLAN header. Placing this additional header onto a packet invalidates traditional offloading mechanisms in-place and therefore increases load on the CPU as additional CPU cycles are needed to encapsulate and decapsulate every VXLAN packet.
  • 4. Receive Side Scaling Receive Side Scaling (RSS) is a technique the Network Interface Card (NIC) employs to ensure that data processing for a particular connection is balanced across multiple CPU cores. Without RSS, all connections would be handled by a single CPU core, which can adversely affect network performance. FIRST STEP’S Before Deployment Deploying the NSX Manager virtual appliance is the first step to enabling network virtualization in your vSphere environment. In this recipe, you will go through the steps to enable your environment for NSX. The following diagram depicts the logical process of enabling your environment for network virtualization, and the first four steps will be covered here :
  • 6. Things Needed Before Deployment : Before deploying NSX Manager, the following prerequisites need to be satisfied:  Static IP address and portgroup for NSX Manager  Firewall ports open between NSX Manager, vCenter server, and ESXi VMKernel 0 Interface on each host (refer to vmware website for a complete list of ports)  Forward and reverse DNS entries for NSX Manager  NTP server is accessible; minimum of four is recommended for accurate time  Shared datastore for the appliance to be deployed onto  Satisfy minimum requirements for NSX Manager Fill in the following table before deployment : (Also make sure to include the cli password and cli privilege password )
  • 7. Afteryouhave gatheredall the neededinfoaslistedabove follow the steps below todeployNSX Manager. 1. Log into the vSphere Web Client 2. Select Hosts and Clusters, right-click on the target cluster and select Deploy OVF Template 3. Select Local File and locate the NSX Manager OVA downloaded earlier; click on Next 4. Type in the Name of the virtual appliance and click on Next 5. Select the vSphere cluster and resource where you want to deploy NSX Manager and select Next 6. Review details, Accept license agreements and click on Next 7. Select the shared datastore of where you want the virtual appliance to be deployment onto 8. Select the VLAN-backed portgroup as defined earlier and click on Next 9. Fill in the template details as highlighted in the preceding table and click on Next 10. Ensure all details are correct and click on Finish:
  • 8. Next Step will be to : Replacing the NSX Manager certificate When you first deploy the NSX Manager, it creates a self-signed certificate. Using a self- signed certificate is generally not a recommended security practice. It is recommended to deploy a signed certificate from your internal certificate authority. NSX Manager supports two ways of deploying a signed certificate, which are as follows:  Certificate signing request to a Certificate Authority (CA)  Importing a PKCS#12 certificate archive (bundle) onto the NSX Manager, which includes the private and public key for NSX Manager and certificate chain of any subordinate CAs in your environment Next we will explore how you can create a certificate signing request on NSX Manager and how to import a PKCS#12 certificate bundle onto the NSX Manager. Certificate Signing Request A Certificate Signing Request (CSR) is the first part in a three-step process; this process involves the following steps: 1. The NSX Manager creating a CSR 2. The CSR is sent as a request to the certificate authority, which then signs the certificate and sends back a signed certificate 3. Importing the signed certificate into the NSX Manager The procedure to complete a certificate signing request is as follows: 1. Log into NSX Manager via your web browser 2. Click on Manage Appliance Settings 3. Click on SSL Certificates
  • 9. 4. Click on Generate CSR and follow the prompts as per the following screenshot: 5. Click on OK and select Download CSR 6. Send the CSR file to your security administrator and get the certificate signed 7. With the returned certificate, click on Import so you can import the correct certificate into the NSX Manager 8. Reboot the NSX Manager to complete the process of importing a signed certificate into the NSX Manager
  • 10. Using a PKCS#12 certificate Importing PKCS#12 into the NSX Manager is used when the certificate signing was not completed using the CSR method outlined in the previous recipe. The PKCS#12 format is typically used in scripted installations of NSX Manager and other components. If a CSR was not generated by the NSX Manager itself, it is required that the PKCS#12 archive is imported into NSX Manager. The PKCS#12 archive generally consists of the following:  A signed server certificate  A private key for the signed certificate  Root and intermediate certificate authority public keys The PKCS#12 is also password-protected, so it's important to have the password before attempting to import the PKCS#12 archive into NSX Manager. In some cases, the received signed certificate may not be in the PCKS#12 format. In this event, you must convert the certificates into the PKCS#12 format for import into the NSX Manager. This can be achieved using openSSL (https://www.openssl.org/), and the command to achieve this is as follows: openssl pkcs12-export-outserver.p12-inkeyserver.key -inserver.crt-certfile CACert.crt
  • 11. The procedure to import the PCKS#12 archive is as follows: 1. Log into the NSX Manager via your web browser 2. Click on Manage Appliance Settings 3. Click on SSL Certificates 4. Click on Upload PCKS#12Keystore and browse to the file 5. Enter the password for archive and click on Import 6. Reboot the NSX Manager to complete the process of importing the signed certificate Until NextTime…………………………………