Your browser failed to load CSS style sheets. Your browser or web proxy might not support elliptic-curve TLS

Building network automation solutions

6 week online course

Start now!
back to overview

VMware NSX Firewall Errata and Updates

Marcos Hernandez sent me a nice list of updates/errata after watching the NSX firewalls video from the VMware NSX Architecture webinar:

  • NSX vSphere supports firewall rules based on MAC sets (L2)
  • Distributed firewall in NSX vSphere now supports detection of established TCP sessions during “hot" DFW insertion (it used to drop those connections).
  • ACLs in NSX MultiHypervisor don’t apply to logical switch ports (VM NICs). The slides correctly state that ACLs are only applicable to router and L2 gateway ports, but then in the audio there is a little confusion around it.
  • NSX MultiHypervisor has two ways of doing security. Security Profiles that apply to logical switch ports (which connect to VMs) and ACLs (which can also include L3/L4 rules that and apply only to router ports).

No comments:

You don't have to log in to post a comment, but please do provide your real name/URL. Anonymous comments might get deleted.