VCD 100 Tenantportal
VCD 100 Tenantportal
Portal Guide
19 SEP 2019
VMware Cloud Director 10.0
vCloud Director Tenant Portal Guide
You can find the most up-to-date technical documentation on the VMware website at:
https://docs.vmware.com/
VMware, Inc.
3401 Hillview Ave.
Palo Alto, CA 94304
www.vmware.com
©
Copyright 2017-2020 VMware, Inc. All rights reserved. Copyright and trademark information.
VMware, Inc. 2
Contents
VMware, Inc. 3
vCloud Director Tenant Portal Guide
VMware, Inc. 4
vCloud Director Tenant Portal Guide
VMware, Inc. 5
vCloud Director Tenant Portal Guide
VMware, Inc. 6
vCloud Director Tenant Portal Guide
VMware, Inc. 7
vCloud Director Tenant Portal Guide
VMware, Inc. 8
vCloud Director Tenant Portal Guide
VMware, Inc. 9
vCloud Director Tenant Portal Guide
The VMware vCloud Director Tenant Portal Guide provides information about how to use the
VMware vCloud Director tenant portal. In this release, you use the tenant portal to administrate
your organization, create and configure virtual machines, vApps, and networks within vApps.
®
You can also configure advanced networking capabilities that are provided by VMware NSX for
®
vSphere within a vCloud Director environment. With the vCloud Director tenant portal, you can
also create and manage catalogs, vApp and VDC templates, and create and manage cross-virtual
data center networks.
Intended Audience
This guide is intended for anyone who wants to use the capabilities of the vCloud Director tenant
portal. The information is written primarily for organization administrators who use the tenant
portal to administer their organization, manage virtual machines, vApps, networks, and so on.
VMware, Inc. 10
Getting Started with the vCloud
Director Tenant Portal 1
When you log into the tenant portal, there are a number of tasks you can complete, from
creating virtual machines and vApps, to setting up advanced networking configuration and
running vRealize Orchestrator workflows.
n View Tasks
n View Events
Before you can access your organization, a vCloud Director system administrator must create
the organization, assign it resources, and provide the URL to access the tenant portal. Each
organization includes one or more organization administrators, who finish setting up the
organization by adding members and setting policies and preferences. After the organization
is set up, non-administrator users can log in to create, use, and manage virtual machines and
vApps.
VMware, Inc. 11
vCloud Director Tenant Portal Guide
Organizations
An organization is a unit of administration for a collection of users, groups, and computing
resources. Users authenticate at the organization level, supplying credentials established by
an organization administrator when the user was created or imported. System administrators
create and provision organizations, while organization administrators manage organization
users, groups, and catalogs.
vApp Networks
A vApp network is contained within a vApp and allows virtual machines in the vApp to
communicate with each other. You can connect a vApp network to an organization virtual data
center network to allow the vApp to communicate with other vApps in the organization and
outside of the organization, if the organization virtual data center network is connected to an
external network.
Catalogs
Organizations use catalogs to store vApp templates and media files. The members of an
organization that have access to a catalog can use its vApp templates and media files to create
their own vApps. Organization administrators can copy items from public catalogs to their
organization catalog.
VMware, Inc. 12
vCloud Director Tenant Portal Guide
Contact your organization administrator if you do not know the tenant portal organization
URL. See the vCloud Director Release Notes for information about supported browsers and
configurations.
Procedure
2 Enter your user name and password, and click Log In.
Users who are assigned the following organization roles can access the tenant portal. The items
they see and the actions they can perform depend on the rights that are associated with a
particular role.
n Organization Administrator
n Catalog Author
n vApp Author
n vApp User
For information about the predefined roles and their rights, see Predefined Roles and Their
Rights.
VMware, Inc. 13
vCloud Director Tenant Portal Guide
The Virtual Datacenters dashboard screen is part of the vCloud Director multisite feature that
makes it possible for tenants to see their geographically distributed cloud environment as a
single entity. For more information about multisite, see Working with Multiple Sites.
The dashboard is a unified view of the vCloud Director virtual data centers and sites not only in a
single organization. In a multi-cell and multi-organization environment, you can also see the virtual
data centers for all other associated organizations.
Note Depending on their rights, tenant users can see all member sites of an organization or only
a subset of sites.
The information about the organization is displayed on top in the summary ribbon.
The virtual data centers display in a card view. Each card contains information about the
organization to which the virtual center belongs, the number of vApps, the total number of virtual
machines and the number of virtual machines that are in a running state. The card also shows the
available CPU, memory, and storage capacity for the data center and displays real-time metrics
about the current allocations and reservations of resources.
From the main menu ( ), you can navigate to the different menu items.
Datacenters Navigates you to the Virtual Datacenters screen that displays the virtual data centers within the
organization.
Datacenter Groups Navigates you to the Datacenter Groups screen for managing cross-virtual data center networks.
By default, only the system administrator can view this menu item.
Libraries Navigates you to a consolidated view for vApp templates, catalogs, media, and other types of files.
You use these templates and files to deploy virtual machines or vApps.
Administration Navigates you to the multisite management screen where organization administrators can create a
trust association with another organization.
Tasks Navigates you to the Tasks screen that displays the tasks reported by vCloud Director.
VMware, Inc. 14
vCloud Director Tenant Portal Guide
Events Navigates you to the Events screen that displays the events reported by vCloud Director.
Operations Navigates you to the Service Library screen. The Service Library contains groups of vCloud
Director components, for which you can run vRealize Orchestrator workflows.
You can customize your vCloud Director Tenant Portal by using the Branding vCloud OpenAPIs.
For information about using the vCloud OpenAPI, see the Getting Started vCloud OpenAPI
document at https://code.vmware.com.
n Data centers
n vApp templates
n vApps
n Virtual machines
n vApp networks
n Catalogs
If a virtual machine uses an IP address assigned by DHCP, the search does not return its IP
address. If you want to search for a virtual machine that is with an IP address assigned by DHCP,
you must search by name.
By default, you can search only within the objects in your local site. If you have a multisite
environment, you can search among multiple sites.
Procedure
1 In the right-upper corner of the vCloud Director tenant portal, click the Search ( ) icon.
3 In the Search text box, enter a symbol, a part of a name, or IP address by which to search for
matching object names or static IP addresses of virtual machines.
4 If you use a multisite environment, select the sites within which you want to perform the
search.
5 Press Enter.
VMware, Inc. 15
vCloud Director Tenant Portal Guide
Results
The top five matching results per object type are displayed. The results are sorted alphabetically.
What to do next
n To see more results, if there are any, click Load more under each object type.
n To see more information about a specific object from the search results, point to the object.
n To manage a specific object, for example, to view or modify the settings of an object, click
the object. The details about the object display on the left.
View Tasks
From the tenant portal, you can view the list of recent tasks, together with their details and
status. In addition, you can also see the list of all tasks.
By default, the Recent Tasks panel is displayed at the bottom of the tenant portal and contains a
list of the tasks that have been recently run. When you start an operation, for example to create
a virtual machine, the task is displayed in the panel. In case you minimize the Recent Tasks panel,
you still see the number of running or failed recent tasks. You can always open the Recent Tasks
panel again by clicking the double arrows.
The tasks view lists all tasks and shows when tasks were run, and whether they were successfully
completed. This view is the first step for troubleshooting problems in your environment. The
tasks view contains long running operations, such as virtual machine or vApp creation.
Procedure
1 From the main menu ( ), select Tasks, or click More tasks under the Recent Tasks panel.
The list of all tasks displays, together with the time the task was run, and the status of the
task.
2 Click the editor icon ( ) to change the details you want to view about the tasks.
3 (Optional) To view the task details, click the name of the task.
The task details include information such as the reason for the failure, when the task has
failed, and so on.
Detail Description
Type The object on which the task was performed. For example, if you created a virtual machine, the
type is vm.
VMware, Inc. 16
vCloud Director Tenant Portal Guide
Detail Description
Completion time Date and time when the operation succeeded or failed.
Details Reason for the failure of the task. For example, if you try to create a snapshot of a virtual
machine, and the operation fails, because the storage is insufficient, the task details are of
the type: The requested operation will exceed the VDC's storage quota: storage
policy "*" has 8,693 MB remaining, requested 41,472 MB.
By default, the Recent Tasks panel is displayed at the bottom of the portal. When you start an
operation, for example to create a virtual machine, the task is displayed in the panel.
Prerequisites
Procedure
Long-running operations are operations such as creating a virtual machine or a vApp, power
operations performed on virtual machines and vApps, and so on.
3 In the Cancel Task dialog box, confirm that you want to cancel the task by clicking OK.
Results
View Events
From the portal, you can view the list of all events, as well as their details and status.
The events view is a way to view the status of the events in your portal. The view shows when
the events happened, and whether they were successful. The events view contains one-time
occurrences, such as user logins and object creation, or deletion.
VMware, Inc. 17
vCloud Director Tenant Portal Guide
Procedure
The list of all events displays, along with the time the event happened and the status of the
event.
2 Click the editor icon ( ) to change the details you want to view about the events.
Detail Description
Type The object on which the task was performed. For example, if you created a virtual machine, the
type is vm.
VMware, Inc. 18
Working with Virtual Machines
2
A virtual machine is a software computer that, like a physical computer, runs an operating system
and applications. The virtual machine consists of a set of specification and configuration files,
and is backed by the physical resources of a host. Every virtual machine has virtual devices that
provide the same functionality as physical hardware but are more portable, more secure, and
easier to manage.
In addition to the operations that you can run on a physical machine, vCloud Director virtual
machines support virtual infrastructure operations, such as taking a snapshot of virtual machine
state, and moving a virtual machine from one host to another.
Starting with vCloud Director 9.5, virtual machines support IPv6 connectivity. You can assign IPv6
addresses to virtual machines connected to IPv6 networks.
Important All steps for working with virtual machines are documented from the card view,
assuming that you have more than one virtual data center. Completing the same procedures
from the grid view is also possible, but the steps might slightly vary.
n Insert Media
n Eject Media
VMware, Inc. 19
vCloud Director Tenant Portal Guide
A virtual machine is a software computer that, like a physical computer, runs an operating system
and applications. The virtual machine consists of a set of specification and configuration files,
and is backed by the physical resources of a host. Every virtual machine has virtual devices that
provide the same functionality as physical hardware but are more portable, more secure, and
easier to manage. Virtual machines can be standalone, or they can exist within a vApp. A vApp is
a compound object composed of one or more virtual machines, as well as one or more networks.
The following figure shows the different options when creating a virtual machine. You can create
a standalone virtual machine or a virtual machine within a vApp. The standalone virtual machine is
directly connected to the organization virtual data center. You can also create a virtual machine
within a vApp. By creating a virtual machine inside of a vApp, you can group together multiple
virtual machines and their associated networks. vApps allow you to build complex applications,
and save them to a catalog for future use.
VMware, Inc. 20
vCloud Director Tenant Portal Guide
Edge Gateway
(Organization Edge) Internet
External Network
vApp
vApp Edge
Virtual Machines
Without vApp
vApp Network
vApp Network
vApp Network
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore and select Virtual Machines from the left panel.
2 Click to view the list in a card view and, optionally, filter the list of virtual machines from
the Look in drop-down menu.
3 To view the virtual machines in a grid view, click . Or to view them in a card view, click
VMware, Inc. 21
vCloud Director Tenant Portal Guide
4 (Optional) Configure the grid view to contain details you want to see about each virtual
machine.
b Select the virtual machine details you want to include in the grid view by selecting the
check box next to each detail you want to see.
Details include information about the hardware version, VMware Tools, memory, and so
on.
5 (Optional) From the grid view, click on the left of a virtual machine, to display the actions
you can take for the selected virtual machine.
6 To access the interface for the guest operating system of the virtual machine, click the
desktop icon in the upper right corner of the card view.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore and select Virtual Machines from the left panel.
2 Click to view the list in a card view and, optionally, filter the list of virtual machines from
the Look in drop-down menu.
4 Enter the name and the computer name for the virtual machine.
Important The computer name can contain only alphanumeric characters and hyphens. A
computer name cannot consist of digits only and cannot contain spaces.
6 Select whether you want the virtual machine to power on right after it is created.
VMware, Inc. 22
vCloud Director Tenant Portal Guide
Option Action
If you select a VM sizing policy that defines the VM size, this option is not
visible.
The predefined sizes of the virtual machine are: Small, Medium, and
Large.
e Specify the storage settings for the virtual machine, such as storage
policy and size in GB.
f Specify the network settings for the virtual machine, such as network, IP
mode, IP address, and primary NIC.
From Template You deploy a virtual machine from a template that you select from the
templates catalog.
a Select a virtual machine template from the list of available templates.
b (Optional) Select a VM placement policy and a VM sizing policy.
8 Click OK to save the settings of the virtual machine and to start the creation process.
You can see the card of the virtual machine in the catalog. Until the virtual machine is created,
its state is displayed as Busy.
Prerequisites
VMware, Inc. 23
vCloud Director Tenant Portal Guide
Prerequisites
This operation requires the rights included in the predefined vApp User role or an equivalent set
of rights.
Procedure
n Navigate to the VMware Remote Console download page, and select the link for your
platform.
www.vmware.com/go/download-vmrc
n On the Virtual Datacenters dashboard screen in the vCloud Director tenant portal, click
the card of the virtual data center that you want to explore. Select a virtual machine, and
from the Actions menu select Download VMRC.
n Windows
n Linux
With root privileges, run the .bundle installer and follow the prompts.
n Mac
Double click the .dmg to open it, then double-click the VMware Remote Console icon
inside to copy to the Applications folder.
Results
After installation, VMware Remote Console opens when you click Uniform Resource Identifiers
(URIs) that begin with the vmrc:// scheme. VMware Workstation, Player, and Fusion also handle
the vmrc:// URI scheme.
Prerequisites
VMware, Inc. 24
vCloud Director Tenant Portal Guide
n This operation requires the rights included in the predefined vApp User role or an equivalent
set of rights.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore and select Virtual Machines from the left panel.
2 Click to view the list in a card view and, optionally, filter the list of virtual machines from
the Look in drop-down menu.
3 From the Actions menu of the virtual machine, select Launch VM Remote Console.
Note If you do not have the VMware Remote Console installed, a pop-up window prompts
you to either install VMware Remote Console or use the Web console.
Results
Note When you connect to a vCloud Director virtual machine by using VMware Remote
Console, you are limited to console interaction only (sending Ctrl+Alt+Del). You cannot
perform device operations, power operations, or settings management.
Prerequisites
n This operation requires the rights included in the predefined vApp User role or an equivalent
set of rights.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore and select Virtual Machines from the left panel.
2 Click to view the list in a card view and, optionally, filter the list of virtual machines from
the Look in drop-down menu.
3 From the Actions menu of the virtual machine, select Launch Web Console.
Results
The virtual machine console opens in a new browser tab by using the VMware HTML Console
SDK.
VMware, Inc. 25
vCloud Director Tenant Portal Guide
What to do next
Click anywhere inside the console window to start using your mouse, keyboard, and other input
devices in the console.
Note For information about supported international keyboards, see the VMware HTML Console
SDK Documentation at https://www.vmware.com/support/developer/html-console/.
You cannot power on a virtual machine that has guest customization enabled unless the virtual
machine has a current version of VMware Tools installed.
Prerequisites
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore and select Virtual Machines from the left panel.
2 Click to view the list in a card view and, optionally, filter the list of virtual machines from
the Look in drop-down menu.
3 From the Actions menu of the virtual machine you want to start, select Power On.
Results
Prerequisites
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore and select Virtual Machines from the left panel.
VMware, Inc. 26
vCloud Director Tenant Portal Guide
2 Click to view the list in a card view and, optionally, filter the list of virtual machines from
the Look in drop-down menu.
3 From the Actions menu of the virtual machine you want to power off, select Power Off.
Results
Prerequisites
The virtual machine and guest operating system must be powered on.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore and select Virtual Machines from the left panel.
2 Click to view the list in a card view and, optionally, filter the list of virtual machines from
the Look in drop-down menu.
3 From the Actions menu of the virtual machine, select Shut Down Guest OS.
Results
Prerequisites
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore and select Virtual Machines from the left panel.
2 Click to view the list in a card view and, optionally, filter the list of virtual machines from
the Look in drop-down menu.
VMware, Inc. 27
vCloud Director Tenant Portal Guide
3 From the Actions menu of the virtual machine you want to reset, select Reset.
Results
The suspend and resume feature is useful when you want to save the current state of your virtual
machine and continue work later from the same state.
Prerequisites
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore and select Virtual Machines from the left panel.
2 Click to view the list in a card view and, optionally, filter the list of virtual machines from
the Look in drop-down menu.
3 From the Actions menu of the virtual machine you want to suspend, select Suspend.
Results
Prerequisites
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore and select Virtual Machines from the left panel.
2 Click to view the list in a card view and, optionally, filter the list of virtual machines from
the Look in drop-down menu.
3 From the Actions menu of the virtual machine, select Discard suspended state.
VMware, Inc. 28
vCloud Director Tenant Portal Guide
Results
VMware Tools improves management and performance of the virtual machine by replacing
generic operating system drivers with VMware drivers tuned for virtual hardware. You install
VMware Tools into the guest operating system. Although the guest operating system can run
without VMware Tools, you lose important features and convenience.
Prerequisites
n If your newly created virtual machine has no guest operating system, you must install it
before you can install VMware Tools.
n If the version of VMware Tools is earlier than 7299 in a virtual machine in your vApp, you
must upgrade it.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore and select Virtual Machines from the left panel.
2 Click to view the list in a card view and, optionally, filter the list of virtual machines from
the Look in drop-down menu.
3 From the Actions menu of the virtual machine in which you want to install VMware Tools,
select Install VMware Tools.
VMware Tools is installed on the target guest operating system. If there is an error during
installation, an error message displays. You can also view the progress of the installation
operation in the Tasks window.
4 To open the Web console of the virtual machine, from the Actions menu, select Launch Web
Console.
5 Follow the instructions on the VMware Knowledge Base Article 1014294 to configure the
VMware Tools for your particular operating system.
Results
VMware, Inc. 29
vCloud Director Tenant Portal Guide
You cannot downgrade the hardware version of the virtual machines in a vApp.
vCloud Director supports hardware versions depending on the backing vSphere resources. The
supported hardware version depends on the latest supported virtual hardware version in the
backing Provider VDC. An Organization Administrator or a System Administrator can set the
hardware version to an earlier than the latest supported version by the underlying hardware.
The vCloud Director tenant portal dynamically sets the list of selectable virtual hardware versions
based on the backing hardware of the Organization or Provider VDC.
For information about the hardware features available with virtual machine compatibility settings,
see vSphere Virtual Machine Administration.
For information about the VMware products and their virtual hardware version, see https://
kb.vmware.com/s/article/1003746.
Prerequisites
n Stop the virtual machine or the vApp that contains the virtual machine.
n Verify that the latest version of VMware Tools is installed on the virtual machine.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore and select Virtual Machines from the left panel.
2 Click to view the list in a card view and, optionally, filter the list of virtual machines from
the Look in drop-down menu.
3 From the Actions menu of the virtual machine you want to upgrade, select Upgrade Virtual
Hardware Version.
4 Click OK.
Results
VMware, Inc. 30
vCloud Director Tenant Portal Guide
Prerequisites
Changing properties such as operating system, requires that the machine is powered off.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore and select Virtual Machines from the left panel.
2 Click to view the list in a card view and, optionally, filter the list of virtual machines from
the Look in drop-down menu.
3 In the card of the virtual machine you want to edit, click Details.
4 The list of properties that you can view or edit under General expands by default.
Option Action
Computer Name Edit the computer and host name set in the guest operating system that
identifies the virtual machine on a network. This field is restricted to 15
characters because of a Windows OS limitation on computer names.
You can edit this property while the virtual machine is powered on.
Operating System Family Select an operating system family from the drop-down menu.
You can edit this property while the virtual machine is powered off. In
addition, you cannot edit this property if an operating system is already
present on the virtual machine.
Boot Delay Specify the time in milliseconds to delay the boot operation.
The time between when you power on the virtual machine and when it exits
the BIOS and launches the guest operating system software can be short.
You can change the boot delay to provide more time.
Storage Policy Select a storage policy for the virtual machine to use from the drop-down
menu.
You can edit this property while the virtual machine is powered on.
Virtual Data Center View the name of the virtual data center to which this virtual machine
belongs.
VMware Tools View whether VMware Tools is installed on the virtual machine.
VMware, Inc. 31
vCloud Director Tenant Portal Guide
Option Action
Virtual Hardware Version View the virtual hardware version of the virtual machine.
Synchronize time Select the check box to enable time synchronization between the virtual
machine guest operating system and the virtual data center in which it is
running.
Enter BIOS Setup Select whether to force entry into the BIOS setup screen the next time the
virtual machine boots.
You can edit this property while the virtual machine is powered off.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore and select Virtual Machines from the left panel.
2 Click to view the list in a card view and, optionally, filter the list of virtual machines from
the Look in drop-down menu.
3 In the card of the virtual machine you want to edit, click Details.
4 Click Hardware to expand the list of hardware properties that you can view and edit.
Option Description
Expose hardware-assisted CPU You can expose full CPU virtualization to the guest operating system so that
virtualization to guest OS applications that require hardware virtualization can run on virtual machines
without binary translation or paravirtualization.
VMware, Inc. 32
vCloud Director Tenant Portal Guide
Option Description
Total Memory Edit the memory resource settings for a virtual machine. The virtual machine
memory size must be a multiple of 4 MB.
This setting determines how much of the ESXi host memory is allocated to
the virtual machine. The virtual hardware memory size determines how much
memory is available to applications that run in the virtual machine. A virtual
machine cannot benefit from more memory resources than its configured
virtual hardware memory size.
Memory hot add If you enable memory hot-add, you can add memory resources to a virtual
machine while the machine is powered on. This feature is only supported
on certain guest operating systems and virtual machine hardware versions
greater than 7.
Virtual CPU hot add If you enable virtual CPU hot-add, you can add virtual CPUs to the virtual
machine while it is powered on. You can add only multiples of the number of
cores per socket. This feature is only supported on certain guest operating
systems and virtual machine hardware versions.
Removable Media View the available removable media, such as attached CD/DVD and floppy
drive.
Option Description
Size Enter the hard disk size in MB. You can increase the size of the hard disk
later.
Note You can increase the size of an existing hard disk if the virtual
machine is not a linked clone and it has no snapshots.
Policy The storage policy for the virtual machine is used by default.
By default, all the hard disks attached to a virtual machine use the storage
policy specified for the virtual machine. You can override this default for any
of these disks when you create a virtual machine or modify its properties.
The Size column for each hard disk includes a drop-down menu that lists all
the storage policies available for this virtual machine.
Unit Number Enter the logical unit number for the hard disk drive.
VMware, Inc. 33
vCloud Director Tenant Portal Guide
You can add up to 10 NICs. For information about the number of supported number
of NICs depending on the virtual machine hardware version, see: http://kb.vmware.com/s/
article/2051652. vCloud Director supports modifying virtual machine NICs while the virtual
machine is running. For information about supported network adapter types, see http://
kb.vmware.com/kb/1001805.
Option Description
7 Click Save.
Some of the information requested on this menu applies only to Windows platforms. The Guest
OS Customization panel includes the information necessary for the virtual machine to join a
Windows domain. An organization administrator can specify default values for a domain that
Windows guests in that organization can join. Not all Windows virtual machines must join a
domain, but in most enterprise installations, a virtual machine that is not a domain member
cannot access many of the available network resources.
Prerequisites
n This operation requires the rights included in the predefined vApp Author role or an
equivalent set of rights.
VMware, Inc. 34
vCloud Director Tenant Portal Guide
n Before you can customize a Windows guest OS, your system administrator must install the
appropriate Microsoft Sysprep files on the vCloud Director server group. See the vCloud
Director Installation and Upgrade Guide.
n Customization of Linux guest operating systems requires that Perl is installed in the guest.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore and select Virtual Machines from the left panel.
2 Click to view the list in a card view and, optionally, filter the list of virtual machines from
the Look in drop-down menu.
3 In the card of the virtual machine you want to edit, click Details.
4 Click Guest OS Customization and Properties to expand the list of guest operating system
settings.
Option Description
Change SID Select this option to change the Windows Security ID (SID).
This option is specific for virtual machines running a Windows guest
operating system. The SID is used in some Windows operating systems to
uniquely identify systems and users. If you do not select this option, the
new virtual machine has the same SID as the virtual machine or template
on which it is based. Duplicate SIDs do not cause problems when the
computers are part of a domain and only domain user accounts are used.
However, if the machines are part of a Workgroup or local user accounts
are used, duplicate SIDs can compromise file access controls. For more
information, see the documentation for your Microsoft Windows operating
system.
Allow local administrator password Select this option to allow setting an administrator password on the guest
operating system.
a Specify a password for the local administrator.
Require Administrators to change Select this option to require administrators to change the password of the
password on first login guest operating system on the first login. This is recommended for security
purposes.
Auto generate password Select this option to allow password auto generation.
VMware, Inc. 35
vCloud Director Tenant Portal Guide
Option Description
Enable this VM to join a domain You can select this option to join the virtual machine to a Windows domain.
You can use the organization's domain or override the organization's domain
and enter the domain properties.
a Enter the domain name.
b Enter the user name and password.
c Enter the account organizational unit.
Script You can use a customization script to modify the guest operating
system of the virtual machine. When you add a customization script to
a virtual machine, the script is called only on initial customization and
force recustomization. If you set the precustomization command line
parameter, the script is called before guest customization begins. If you set
the postcustomization command line parameter, the script is called after
guest customization finishes.
n Click the upload button below the script text box to navigate to a
customization script on your local machine.
n Type the customization script directly into the Script file text box.
A customization script that you enter directly into the Script file text
box cannot contain more than 1500 characters. For more information, see
VMware Knowledge Base article https://kb.vmware.com/kb/1026614.
This process is required for all guest customization features, such as the computer name,
network settings, setting and expiring the administrator and root passwords, SID change for
Windows Operating systems, and so on, to work. This option should be selected for Power on
and Force re-customization to work.
If the check box is selected, and the virtual machine's configuration parameters in vCloud
Director are out of sync with the settings in the guest OS, the Profile tab on the virtual machines
Properties page displays that the settings out of sync with the guest OS and the virtual machine
needs guest customization.
VMware, Inc. 36
vCloud Director Tenant Portal Guide
n Password reset
If you want to perform a customization (or you made changes to network settings that need to
be reflected in the guest OS), you can select the Enable guest customization check box and set
the options on the Guest OS Customization tab of the virtual machine Properties page. When
virtual machines from vApp templates are used to create a vApp and then add a virtual machine,
the vApp templates act as building blocks. When you add virtual machines from the catalog to a
new vApp, the virtual machines are enabled for guest customization by default. When you save
a vApp template from a catalog as a vApp, virtual machines are enabled for guest customization
only if the Enable guest customization check box is selected.
n The Enable guest customization check box is the same as the source virtual machine in your
catalog.
n For Windows guest virtual machines, Change SID is the same as the source virtual machine in
your catalog.
n The password reset setting is same as the source virtual machine in your catalog.
You can deselect the Enable guest customization check box if required before you start the
vApp.
If blank virtual machines, which are pending guest OS installation, are added to a vApp, the
Enable guest customization check box is deselected by default because these virtual machines
are not yet ready for customization.
After you install the guest OS and VMware Tools, you can power off the virtual machines, stop
vApp, and select the Enable guest customization check box and start the vApp and virtual
machines to perform guest customization.
If the virtual machine name and network settings are updated on a virtual machine that has
been customized, the next time you power on the virtual machine, it is recustomized, which
resynchronizes the guest virtual machine with vCloud Director.
If the settings in a virtual machine are not synchronized with vCloud Director or an attempt
to perform a guest customization has failed, you can force the recustomization of the virtual
machine.
Ensure that the application that is running in the virtual machine supports a recustomization. If
you change a domain controller by using Microsoft Sysprep, and also change the SID, the virtual
machine might be damaged. To mitigate the risk of damaging your virtual machine, create a
snapshot before you recustomize it.
VMware, Inc. 37
vCloud Director Tenant Portal Guide
Prerequisites
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore and select Virtual Machines from the left panel.
2 Click to view the list in a card view and, optionally, filter the list of virtual machines from
the Look in drop-down menu.
3 From the Power menu of the virtual machine you want to power on and customize, select
Power On and Force Recustomization.
Results
Use the resource allocation settings (shares, reservation, and limit) to determine the amount of
CPU, memory, and storage resources provided for a virtual machine.
Shares specify the relative importance of a virtual machine within a virtual data center. If
a virtual machine has twice as many shares of a resource as another virtual machine, it is
entitled to consume twice as much of that resource when these two virtual machines are
competing for resources. Shares are typically specified as High, Normal, or Low and these
values specify share values with a 4:2:1 ratio, respectively. You can also select Custom to
assign a specific number of shares (which expresses a proportional weight) to each virtual
machine. When you assign shares to a virtual machine, you always specify the priority for
that virtual machine relative to other powered-on virtual machines.
Specifies the guaranteed minimum allocation for a virtual machine. vCloud Director allows you
to power on a virtual machine only if there are enough unreserved resources to satisfy the
reservation of the virtual machine. The virtual data center guarantees that amount even when
its resources are heavily loaded. The reservation is expressed in concrete units (megahertz or
megabytes).
VMware, Inc. 38
vCloud Director Tenant Portal Guide
For example, assume that you have 2 GHz available and specify a resource allocation
reservation of 1 GHz for virtual machine 1 and 1 GHz for virtual machine 2. Now each virtual
machine is guaranteed to get 1 GHz if it needs it. However, if virtual machine 1 is using only
500 MHz, virtual machine 2 can use 1.5 GHz.
Reservation defaults to 0. You can specify a reservation if you need to guarantee that the
minimum required amounts of CPU or memory are always available to the virtual machine.
Specifies an upper bound for CPU and memory resources that can be allocated to a virtual
machine. A virtual data center can allocate more than the reservation to a virtual machine, but
never allocates more than the limit, even if there are unused resources on the system. The
limit is expressed in concrete units (megahertz or megabytes).
CPU and memory resource limits default to unlimited. When the memory limit is unlimited,
the amount of memory configured for the virtual machine when it was created becomes its
effective limit in most cases.
In most cases, it is not necessary to specify a limit. You might waste idle resources if you
specify a limit. The system does not allow a virtual machine to use more resources than the
limit, even when the system is underutilized, and idle resources are available. Specify a limit
only if you have good reasons for doing so.
Prerequisites
n Ensure that a certain amount of memory for a virtual machine is provided by the virtual data
center.
n Guarantee that a particular virtual machine is always allocated a higher percentage of the
virtual data center resources than other virtual machines.
n Set an upper bound on the resources that can be allocated to a virtual machine.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore and select Virtual Machines from the left panel.
2 Click to view the list in a card view and, optionally, filter the list of virtual machines from
the Look in drop-down menu.
3 In the card of the virtual machine you want to edit, click Details.
4 Click Advanced.
VMware, Inc. 39
vCloud Director Tenant Portal Guide
5 Set the resource allocations shares for the CPU settings by selecting an option from the
Priority drop-down menu.
Option Description
Custom Allows you to assign a specific number of shares by entering the number of
shares (which expresses a proportional weight) to each virtual machine.
When you assign shares to a virtual machine, you always specify the priority
for that virtual machine relative to other powered-on virtual machines.
6 Specify the reservation for the CPU settings by entering the reservation in MHz, and
optionally, the limit for the CPU settings in MHz.
Option Description
Maximum Specify an upper bound for CPU resources that can be allocated to a virtual
machine in MHz.
7 Set the resource allocations shares for the memory settings by selecting an option from the
Priority drop-down menu.
Option Description
Custom Allows you to assign a specific number of shares by entering the number of
shares.
8 Specify the reservation for the memory settings in MB and, optionally, the limit for the
memory settings in MB.
Option Description
Maximum Specify an upper bound for CPU resources that can be allocated to a virtual
machine in MHz.
For example, you can add metadata about the creation date or owner.
VMware, Inc. 40
vCloud Director Tenant Portal Guide
Insert Media
You can insert media such as CD/DVD images from catalogs to use in a virtual machine guest
operating system. You can use these media files to install an operating system in the virtual
machine, various applications, drivers, and so on.
Prerequisites
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore and select Virtual Machines from the left panel.
2 Click to view the list in a card view and, optionally, filter the list of virtual machines from
the Look in drop-down menu.
3 Select the virtual machine where you want to add the media.
5 On the Insert CD window, select the media file to insert in the virtual machine.
6 Click Insert.
Eject Media
After you have finished using a CD or a DVD in your virtual machine, you can eject the media file.
Prerequisites
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore and select Virtual Machines from the left panel.
2 Click to view the list in a card view and, optionally, filter the list of virtual machines from
the Look in drop-down menu.
3 Select the virtual machine from which you want to eject the media.
Results
VMware, Inc. 41
vCloud Director Tenant Portal Guide
When you copy a virtual machine, the snapshots are not included in the copy.
Prerequisites
n This operation requires the rights included in the predefined vApp Author role or an
equivalent set of rights.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore and select Virtual Machines from the left panel.
2 Click to view the list in a card view and, optionally, filter the list of virtual machines from
the Look in drop-down menu.
3 From the Actions menu of the virtual machine you want to copy, select Copy to.
4 Select the destination vApp to which you want to copy the virtual machine, and click Next.
5 Configure the resources, such as name of the virtual machine and computer name, and,
optionally, the storage policy and NICs, and click Next.
Important The computer name can contain only alphanumeric characters and hyphens. It
cannot consist of digits only and cannot contain spaces.
6 On the Ready to Complete page review your settings and click Done.
When you move a virtual machine to a different vApp, the snapshots that you have taken are
lost.
Starting with vCloud Director 9.5, moving VMs across different vApps relies on VMware
® ®
vSphere vMotion and Enhanced vMotion Compatibility (EVC). You can move a VM to a
different vApp that belongs to the same or another organization VDC within the same provider
VDC.
While you are moving a virtual machine to a different vApp, you can perform reconfigurations
such as changing the network and the storage profile.
VMware, Inc. 42
vCloud Director Tenant Portal Guide
Table 2-1. Reconfigurations During Virtual Machine Movements and Virtual Machine States
VM state if the
VM state if the target target vApp in another
vApp is in the same organization VDC within
Reconfiguration organization VDC the same provider VDC
Prerequisites
n This operation requires the rights included in the predefined vApp Author role or an
equivalent set of rights.
n Verify that the underlying vSphere resources support vMotion and EVC. For information
about the requirements and limitations of vMotion and EVC, see vCenter Server and Host
Management.
n If you want to change the VM network or the storage profile, check whether you must power
off the VM. See table Reconfigurations During VM Movements and VM States.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore and select Virtual Machines from the left panel.
2 Click to view the list in a card view and, optionally, filter the list of virtual machines from
the Look in drop-down menu.
3 From the Actions menu of the machine you want to move, select Move to.
5 Configure the resources, such as name of the virtual machine and computer name, and,
optionally, the storage policy and NICs, and click Next.
Important The computer name can contain only alphanumeric characters and hyphens. It
cannot consist of digits only and cannot contain spaces.
6 On the Ready to Complete page review your settings and click Done.
VMware, Inc. 43
vCloud Director Tenant Portal Guide
An affinity rule places a group of virtual machines on a specific host so that you can easily audit
the usage of those virtual machines. An anti-affinity rule places a group of virtual machines across
different hosts, which prevents all virtual machines from failing at once in the event that a single
host fails.
If the affinity or anti-affinity rules cannot be satisfied, this prevents the virtual machines added to
the rule from powering on.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select Affinity Rules from the left panel.
2 (Optional) Click the Grid editor icon ( ) and select what details about the rules you want to
be displayed.
Results
You see the list of the existing affinity and anti-affinity rules, virtual machines, and enabled status
of each rule.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select Affinity Rules from the left panel.
By default, the check box is selected and rules are enabled after you create them.
By default, each affinity rule is required. This means that if the rule cannot be satisfied, the
virtual machines added to the rule do not power on.
6 Select the virtual machines that you want to add to the affinity rule.
7 Click Save.
VMware, Inc. 44
vCloud Director Tenant Portal Guide
Results
vCloud Director places the virtual machines associated with the affinity rule on a single host.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select Affinity Rules from the left panel.
By default, the check box is selected and rules are enabled after you create them.
By default, each anti-affinity rule is required. This means that if the rule cannot be satisfied,
the virtual machines added to the rule do not power on.
7 Click Save.
Results
vCloud Director places the virtual machines associated with the anti-affinity rule across multiple
hosts.
Prerequisites
This operation requires the Organization vDC: VM-VM Affinity Edit right. This right is included
in the predefined Catalog Author, vApp Author, and Organization Administrator roles.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select Affinity Rules from the left panel.
2 Click the radio button next to the name of the rule that you want to edit and click Edit.
VMware, Inc. 45
vCloud Director Tenant Portal Guide
4 Click Save.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select Affinity Rules from the left panel.
2 Click the radio button next to the name of the rule that you want to delete and click Delete.
Results
Use this feature to understand the status of a given virtual machine over time (days, weeks, or
months).
Prerequisites
This feature is only available if your vCloud Director administrator has enabled it.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore and select Virtual Machines from the left panel.
2 Click to view the list in a card view and, optionally, filter the list of virtual machines from
the Look in drop-down menu.
3 Select the virtual machine you want to monitor and click Details.
VMware, Inc. 46
vCloud Director Tenant Portal Guide
The list in the Metric drop-down menu varies depending on the choices of your system
administrator. You see some or all of the options.
Metric Description
A new chart is displayed each time you select a different value from the list.
8 Click Refresh.
Snapshots are useful as a short-term solution for testing software with unknown or potentially
harmful effects. For example, you can use a snapshot as a restoration point during a linear or
iterative process, such as installing update packages, or during a branching process, such as
installing different versions of a program.
VMware, Inc. 47
vCloud Director Tenant Portal Guide
You might want to use a snapshot when upgrading the operating system of a virtual machine.
For example, before you upgrade the virtual machine, you take a snapshot to preserve the point
in time before the upgrade. If there are no issues during the upgrade, you can choose to remove
the snapshot, which will commit the changes you made during the upgrade. However, if you
encountered an issue, you can revert to the snapshot, which will move back to your saved virtual
machine state prior to the upgrade.
With vCloud Director you can have only one snapshot of a virtual machine. Each attempt to take
a new snapshot of a virtual machine deletes the previous one.
Prerequisites
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore and select Virtual Machines from the left panel.
2 Click to view the list in a card view and, optionally, filter the list of virtual machines from
the Look in drop-down menu.
3 From the Actions menu of the virtual machine for which you want to take a snapshot, select
Create Snapshot.
Taking a snapshot of a virtual machine replaces the existing snapshot if there is any.
When you capture the virtual machine's memory state, the snapshot retains the live state of
the virtual machine. Memory snapshots create a snapshot at a precise time, for example, to
upgrade software that is still working. If you take a memory snapshot and the upgrade does
not complete as expected, or the software does not meet your expectations, you can revert
the virtual machine to its previous state.
When you capture the memory state, the virtual machine's files do not require quiescing. If
you do not capture the memory state, the snapshot does not save the live state of the virtual
machine and the disks are crash consistent unless you quiesce them.
This operation requires that VMware Tools is installed on the virtual machine. When you
quiesce a virtual machine, VMware Tools quiesces the file system of the virtual machine. A
VMware, Inc. 48
vCloud Director Tenant Portal Guide
quiesce operation ensures that a snapshot disk represents a consistent state of the guest
file systems. Quiesced snapshots are appropriate for automated or periodic backups. For
example, if you are unaware of the virtual machine's activity, but want several recent backups
to revert to, you can quiesce the files.
You cannot quiesce virtual machines that have large capacity disks.
6 Click OK.
Results
The snapshot allows you to revert your virtual machine to the most recent snapshot.
Prerequisites
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore and select Virtual Machines from the left panel.
2 Click to view the list in a card view and, optionally, filter the list of virtual machines from
the Look in drop-down menu.
3 From the Actions menu of the virtual machine you want to revert to a snapshot, select
Revert to Snapshot.
4 Click OK.
Results
When you remove a snapshot, you delete the state of the virtual machine that you preserved,
and you can never return to that state again. Removing a snapshot does not affect the current
state of the virtual machine.
Prerequisites
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore and select Virtual Machines from the left panel.
VMware, Inc. 49
vCloud Director Tenant Portal Guide
2 Click to view the list in a card view and, optionally, filter the list of virtual machines from
the Look in drop-down menu.
3 From the Actions menu of the virtual machine for which you want to remove the snapshot,
select Remove Snapshot.
4 Click OK.
Prerequisites
This operation requires the rights included in the predefined Organization Administrator role or
an equivalent set of rights.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore and select Virtual Machines from the left panel.
2 Click to view the list in a card view and, optionally, filter the list of virtual machines from
the Look in drop-down menu.
3 From the Actions menu of the virtual machine with expiring lease, select Renew Lease.
Results
The lease renews. You can see the new lease time frame in the Lease field.
Prerequisites
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore and select Virtual Machines from the left panel.
2 Click to view the list in a card view and, optionally, filter the list of virtual machines from
the Look in drop-down menu.
3 From the Actions menu of the virtual machine that you want to delete, select Delete.
VMware, Inc. 50
vCloud Director Tenant Portal Guide
Results
VMware, Inc. 51
Working with vApps
3
A vApp consists of one or more virtual machines that communicate over a network and use
resources and services in a deployed environment. A vApp can contain multiple virtual machines.
Starting with vCloud Director 9.5, vApps support IPv6 connectivity. You can assign IPv6
addresses to virtual machines connected to IPv6 networks.
Important All steps for working with vApps are documented from the card view, assuming that
you have more than one virtual data center. Completing the same procedures from the grid view
is also possible, but the steps might slightly vary.
n View vApps
n Open a vApp
VMware, Inc. 52
vCloud Director Tenant Portal Guide
n Delete a vApp
View vApps
You can view vApps in a grid view or in a card view.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select vApps from the left panel.
2 To view the vApps in a grid view, click . To view them in a card view, click .
3 (Optional) Configure the grid view to contain details you want to see.
b Select the vApp details you want to include in the grid view by selecting the check box
next to each detail you want to see.
4 (Optional) From the grid view, click on the left of a vApp, to display the actions you can
take for the selected vApp.
Building a vApp requires you to provide a name and optionally a description of the vApp. You
can go back and add the virtual machines to the vApp at a later stage.
Prerequisites
This operation requires the rights included in the predefined vApp Author role or an equivalent
set of rights.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select vApps from the left panel.
VMware, Inc. 53
vCloud Director Tenant Portal Guide
4 (Optional) Search the catalog for virtual machines to add to this vApp or add a new, blank
virtual machine by clicking Add Virtual Machine.
If there are no virtual machines in the catalog, create a virtual machine and add it to the vApp.
a Enter the name and the computer name for the virtual machine.
Important The computer name can contain only alphanumeric characters and hyphens.
A computer name cannot consist of digits only and cannot contain spaces.
Option Action
From Template You deploy a virtual machine from a template that you select from the
templates catalog.
1 Select the virtual machine template from the catalog.
2 (Optional) Select a VM placement policy and a VM sizing policy.
5 (Optional) Repeat Step 4 for each additional virtual machine you want to create within the
vApp.
VMware, Inc. 54
vCloud Director Tenant Portal Guide
Results
The vApp is created and is in a powered-off state. When you power on the vApp, the virtual
machines in it are created and powered on as well.
vCloud Director has its own restrictions for OVF deployments that differ from the restrictions in
vCenter Server. As a result, an OVF deployment that is successful in vCenter Server might fail in
vCloud Director.
vCloud Director supports OVF 1.1, but it does not support all the sections of the OVF 1.1 schema.
For example, the DeploymentOptions section in OVF is not supported.
If you upload an OVF package with a manifest file, vCloud Director validates the SHA-1 hash of
the OVF descriptor file and all VMDK files to the values in the manifest.mf file. If any hash does
not match, the upload fails. A system administrator can disable this check by setting the CONFIG
property to ovf.manifest.check.disabled.
Prerequisites
n Verify that you have an OVF package to upload and that you have permission to upload OVF
packages and deploy vApps.
n Verify that the OVF version in the OVF descriptor file is not 0.9.
n The default maximum supported size of an OVF descriptor file in vCloud Director is 12 MB.
You can override this by editing the CONFIG property ovf.descriptor.size.max.
n Verify that the default maximum allowed size of the manifest file (.mf extension) is 1 MB.
n Verify that the OVF package complies with the OVF XSD schema.
n If the OVF descriptor file contains ExtraConfig elements, verify that your system
administrator included these elements in AllowedList of extraConfigs elements. Elements
that are not included in the AllowedList cause the OVF upload to fail with a validation error.
VMware, Inc. 55
vCloud Director Tenant Portal Guide
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select vApps from the left panel.
3 Click the Upload ( ) button to browse to a location accessible from your computer, and
select the OVF/OVA template file.
The location might be your local hard drive, a network share, or a CD/DVD drive. The
supported file extensions include .ova, .ovf, .vmdk, .mf, .cert, and .strings. If you select
to upload an OVF file, which references more files than you are trying to upload, for example,
a VMDK file, you must browse and select all files.
4 Click Next.
5 Verify the details of the OVF/OVA template you are about to deploy and click Next.
6 Enter a name and, optionally a description for the vApp, and click Next.
7 (Optional) Change the computer name of the vApp so that it contains only alphanumeric
characters.
This step is required only if the name of the vApp contains spaces or special characters. By
default, the computer name is prepopulated with the name of the virtual machine. However,
computer names must contain only alphanumeric characters.
8 From the Storage Policy drop-down menu, select a storage policy for each of the virtual
machines in the vApp, and click Next.
9 Select the networks to which you want each virtual machine to connect.
n Select a network for each virtual machine from the Network drop-down menu.
n You can select the Switch to the advanced networking workflow check box, and enter
the network settings such as primary NIC, network adapter type, network, IP assignment
and IP address settings for each virtual machine in the vApp manually.
You can configure additional properties for virtual machines after you complete the wizard.
10 Click Next.
VMware, Inc. 56
vCloud Director Tenant Portal Guide
11 Customize the hardware of the virtual machines in the vApp, and click Next.
Option Description
Number of virtual CPUs Enter the number of virtual CPUs for each virtual machine in the vApp.
The maximum number of virtual CPUs that you can assign to a virtual
machine depends on the number of logical CPUs on the host and the type of
guest operating system that is installed on the virtual machine.
Cores per socket Enter the number of cores per socket for each virtual machine in the vApp.
You can configure how the virtual CPUs are assigned in terms of cores
and cores per socket. Determine how many CPU cores you want in the
virtual machine, then select the number of cores you want in each socket,
depending on whether you want a single core CPU, dual-core CPU, tri-core
CPU, and so on.
Number of cores View the number of cores for each virtual machine in the vApp.
The number changes when you update the number of virtual CPUs.
Total memory (MB) Enter the memory in MB for each virtual machine in the vApp.
This setting determines how much of the ESXi host memory is allocated to
the virtual machine. The virtual hardware memory size determines how much
memory is available to applications that run in the virtual machine. A virtual
machine cannot benefit from more memory resources than its configured
virtual hardware memory size.
12 On the Ready to Complete page, review your settings and click Finish.
Results
If the vApp template is based on an OVF file that includes OVF properties for customizing
its virtual machines, those properties are passed to the vApp. If any of those properties are
user-configurable, you can specify the values.
Prerequisites
n Only organization administrators and vApp authors can access vApp templates in public
catalogs.
n vApp users and above can access vApp templates in organization catalogs shared to them.
Procedure
1 From the main menu ( ), select Libraries, and select vApp Templates from the left panel.
VMware, Inc. 57
vCloud Director Tenant Portal Guide
2 Click the list bar ( ) on the left of the vApp template you want to deploy as a vApp, and
select Create vApp.
3 On the Accept Licenses page of the wizard, read the end user license agreement and click
Accept.
4 Click Next.
6 Specify how long this vApp can run before it is automatically stopped in hours or days.
7 Specify for how long the stopped vApp remains available before being automatically cleaned
up in hours or days.
8 Click Next.
9 Select the virtual data center in which you want to create the vApp.
11 Click Next.
12 Select the networks to which you want each virtual machine to connect.
n Select a network for each virtual machine from the Network drop-down menu.
n You can select the Switch to the advanced networking workflow check box, and enter
the network settings such as primary NIC, network adapter type, network, IP assignment
and IP address settings for each virtual machine in the vApp manually.
You can configure additional properties for virtual machines after you complete the wizard.
13 Click Next.
14 Customize the hardware of the virtual machines in the vApp, and click Next.
Option Description
Number of virtual CPUs Enter the number of virtual CPUs for each virtual machine in the vApp.
The maximum number of virtual CPUs that you can assign to a virtual
machine depends on the number of logical CPUs on the host and the type of
guest operating system that is installed on the virtual machine.
Cores per socket Enter the number of cores per socket for each virtual machine in the vApp.
You can configure how the virtual CPUs are assigned in terms of cores
and cores per socket. Determine how many CPU cores you want in the
virtual machine, then select the number of cores you want in each socket,
depending on whether you want a single core CPU, dual-core CPU, tri-core
CPU, and so on.
Number of cores View the number of cores for each virtual machine in the vApp.
The number changes when you update the number of virtual CPUs.
VMware, Inc. 58
vCloud Director Tenant Portal Guide
Option Description
Total memory (MB) Enter the memory in MB for each virtual machine in the vApp.
This setting determines how much of the ESXi host memory is allocated to
the virtual machine. The virtual hardware memory size determines how much
memory is available to applications that run in the virtual machine. A virtual
machine cannot benefit from more memory resources than its configured
virtual hardware memory size.
Hard disk properties Enter the size of the virtual machine hard disk in MB.
15 On the Ready to Complete page, review your settings and click Finish.
Results
Open a vApp
You can open a vApp to view the virtual machines and networks it contains. You can also view a
diagram showing how the virtual machines and networks are connected.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select vApps from the left panel.
3 From the card view, you can see general information, such as the number of virtual machines
associated with the vApp, lease information, total number of CPUs, total storage and
memory, associated networks, and whether a snapshot is taken.
4 To view the detailed settings of a selected vApp, click Details on the vApp card.
Power on a vApp
Powering on a vApp powers on all the virtual machines in the vApp that are not already powered
on.
Prerequisites
VMware, Inc. 59
vCloud Director Tenant Portal Guide
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select vApps from the left panel.
3 From the Actions menu of the vApp you want to power on, select Power On.
Results
Prerequisites
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select vApps from the left panel.
3 From the Actions menu of the vApp you want to stop, select Power Off.
4 Click OK.
Results
All virtual machines in the vApp and the vApp itself are powered off.
Stop a vApp
Stopping a vApp powers off or shuts down all the virtual machines in the vApp. You must stop
a vApp before you can perform certain actions. For example, adding the vApp to a catalog,
copying it or moving it to another VDC.
Prerequisites
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select vApps from the left panel.
VMware, Inc. 60
vCloud Director Tenant Portal Guide
3 From the Actions menu of the vApp you want to stop, select Stop.
4 Click OK.
Results
All virtual machines in the vApp and the vApp itself are powered off or shut down.
Reset a vApp
Resetting a vApp clears state (memory, cache, and so on), but the vApp continues to run.
Prerequisites
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select vApps from the left panel.
3 From the Actions menu of vApp you want to reset, select Reset.
Results
Suspend a vApp
Suspending a vApp preserves its current state by writing the memory to disk.
Prerequisites
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select vApps from the left panel.
3 From the Actions menu of the vApp you want to suspend, select Suspend.
Results
VMware, Inc. 61
vCloud Director Tenant Portal Guide
Prerequisites
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select vApps from the left panel.
3 From the Actions menu of the suspended vApp, select Discard Suspended State.
Results
Prerequisites
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select vApps from the left panel.
3 In the card of the selected vApp, click Details to view and edit the vApp properties.
Option Action
VMware, Inc. 62
vCloud Director Tenant Portal Guide
Option Action
Virtual data center The name of the data center to which the vApp belongs.
Defines how long the vApp can run before it is automatically stopped.
b Schedule the storage lease in number of hours or days.
Defines the how long the vApp remains available before being
automatically deleted.
Results
These settings are useful if you need to start and stop your virtual machines in a particular
order. For example, one virtual machine houses a database server, another houses an application
server, and the last houses a web server. In order for the related functions to work properly, the
database server must start first, the application server must start second, and the web server
must start last.
Prerequisites
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select vApps from the left panel.
3 In the card of the selected vApp, click Details, and scroll down to the vApp advanced
properties.
4 Enter the start and stop order properties for each virtual machine, and click Save.
Option Action
Start Order Enter the order in which you want the virtual machine to start. You must
enter a value for each machine in the sequence.
VMware, Inc. 63
vCloud Director Tenant Portal Guide
Option Action
Share a vApp
You can share your vApps with other groups or users within your organization. The access
controls that you set, determine the operations that can be completed on the shared vApps.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select vApps from the left panel.
3 In the card of the selected vApp, click Details, and scroll down to the sharing properties of
the vApp.
VMware, Inc. 64
vCloud Director Tenant Portal Guide
4 Select the users with whom you want to share the vApp and click Save.
Option Action
Share with everyone in the Select this option to share with all users in the organization and select the
organization access level.
n To grant full control, select Full Control.
All users in the organization can open, start, save a vApp as a vApp
template, add the template to a catalog, change the owner of the vApp,
copy to a catalog, and modify properties.
n To grant read-only access, select Read Only.
Share with specific users and groups Select this option to share only with users that you specify.
a Select the names from the Users and groups with no access panel to
move them to the Users and groups with access panel.
b Select an access level for the specified users and groups.
n To grant full control, select Full Control.
Users with full control can open, start, save a vApp as a vApp
template, add the template to a catalog, change the owner of the
vApp, copy to a catalog, and modify properties.
n To grant read-only access, select Read Only.
Results
Prerequisites
To view the vApp network diagram, your vApp must contain less than 40 virtual machines. If the
vApp contains more than 40 virtual machines, the diagram is not available.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select vApps from the left panel.
The diagram showing how the virtual machines and the networks in the vApp are connected
is displayed. A star sign represents a primary NIC. If a NIC is connected, its color is green, if a
NIC is not connected, its color is white.
VMware, Inc. 65
vCloud Director Tenant Portal Guide
5 (Optional) To highlight the connected virtual machines and networks, click a network or a
virtual machine.
The connected objects and the connections between them are highlighted.
What to do next
Virtual machines in the vApp can connect to the networks that are available in a vApp. If you
want to connect a virtual machine to a different network, you must first add it to the vApp.
A vApp can include vApp networks and organization virtual data center networks. A vApp
network can be isolated or routed. An isolated vApp network is contained within the vApp.
You can also route a vApp network to an organization virtual data center network to provide
connectivity to virtual machines outside of the vApp. For routed vApp networks, you can
configure network services, such as a firewall and static routing.
You can connect a vApp directly to an organization virtual data center network. If you have
multiple vApps that contain identical virtual machines connected to the same organization virtual
data center network and you want to start the vApps at the same time, you can fence the vApp.
Fencing the vApp allows you to power on the virtual machines without conflict, by isolating their
MAC and IP addresses.
The networks that you add to the vApp use the network pool that is associated with the
organization virtual data center in which you created the vApp.
Prerequisites
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select vApps from the left panel.
VMware, Inc. 66
vCloud Director Tenant Portal Guide
The list of networks, if there are any, is displayed. You can view information about each
network, such as name, gateway, netmask, connection and retain IP and NAT resources.
5 (Optional) To edit the columns to see, click the Grid editor icon ( ) and select or deselect
the check boxes of the columns you want to be displayed or hidden, respectively.
Fencing a vApp isolates the MAC and IP addresses of the virtual machines and changes the
connection type of the organization VDC networks from direct to fenced. On the fenced
networks firewall is automatically enabled and configured so that only outgoing traffic is allowed.
When you fence a vApp, you can also configure NAT and firewall rules on the fenced networks.
Prerequisites
n You can fence only direct vApp networks. If the vApp uses more than one network and the
other networks are, for example, routed, only the direct network is fenced.
n The virtual machines in the vApp that use the direct network must be stopped, so that the
direct vApp network is not currently in use.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select vApps from the left panel.
Results
The IP and MAC addresses of the virtual machines become isolated. You can power on identical
virtual machines in different vApps without a conflict.
VMware, Inc. 67
vCloud Director Tenant Portal Guide
Connections can be direct or fenced. Fencing allows identical virtual machines in different vApps
to be powered on without conflict by isolating the MAC and IP addresses of the virtual machines.
When fencing is enabled and the vApp is powered on, an isolated network is created from the
organization virtual data center network pool. An edge gateway is created and attached to the
isolated network and the organization virtual data center network. Traffic going to and from the
virtual machines pass through the edge gateway, which translates the IP address using NAT and
proxy-AR. This allows a router to pass traffic between two networks by using the same IP space.
Prerequisites
To add an organization virtual data center network, your administrator must have created such a
network.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select vApps from the left panel.
3 In the card of the selected vApp, click Actions and select Add network.
Option Action
Organization VDC Network Select an organization virtual data center network from the list of available
networks.
vApp Network a Enter a name and, optionally, a description for the network.
b Enter the network gateway CIDR.
c (Optional) Enter the primary and secondary DNS, and the DNS suffix.
d (Optional) Select whether to allow guest VLAN.
e (Optional) Enter static IP pool settings, such as IP ranges.
f (Optional) To be able to connect to an organization virtual data center
network, toggle on the Connect to an organization VDC network option
and select a network from the list.
5 Click Add.
Results
What to do next
VMware, Inc. 68
vCloud Director Tenant Portal Guide
Direct
Routed X X X X
Isolated X
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select vApps from the left panel.
6 Click Edit.
8 Click Save.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select vApps from the left panel.
6 Click Edit.
VMware, Inc. 69
vCloud Director Tenant Portal Guide
8 Click Save.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select vApps from the left panel.
6 Click Edit.
7 Edit the primary and secondary DNS, and the DNS suffix.
8 Click Save.
When you enable DHCP for a vApp network, connect a NIC on virtual machine in the vApp to
that network, and select DHCP as the IP mode for that NIC. vCloud Director assigns a DHCP IP
address to the virtual machine when you power it on.
Prerequisites
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select vApps from the left panel.
VMware, Inc. 70
vCloud Director Tenant Portal Guide
6 Click Edit.
7 Click Enabled.
vCloud Director uses these addresses to satisfy DHCP requests. The range of DHCP IP
addresses cannot overlap with the static IP pool for the vApp network.
10 Click Save.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select vApps from the left panel.
Prerequisites
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select vApps from the left panel.
VMware, Inc. 71
vCloud Director Tenant Portal Guide
You cannot add static routes to a fenced vApp or between overlapping networks. After you
add a static route to a vApp network, configure the network firewall rules to allow traffic on the
static route. For vApps with static routes, select to use assigned IP addresses until the vApp or
associated networks are deleted.
Static routes function only when the vApps containing the routes are running. If you change the
parent network of a vApp, delete a vApp, or delete a vApp network, and the vApp includes static
routes, those routes cannot function and you must remove them manually.
Prerequisites
n Two vApp networks are routed to the same organization virtual data center network.
n The vApp networks are in vApps that were started at least once.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select vApps from the left panel.
The network address is for the vApp network to which to add a static route.
The next hop IP address is the external IP address of that vApp network's router.
9 Click Save.
VMware, Inc. 72
vCloud Director Tenant Portal Guide
On vApp Network 1, create a static route to vApp Network 2. On vApp Network 2, create a static
route to vApp Network 1.
Prerequisites
The vApp is stopped and no virtual machines in the vApp are connected to the network.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select vApps from the left panel.
4 On the Networks tab, select the network that you want to delete, click Delete, and confirm
the deletion.
VMware, Inc. 73
vCloud Director Tenant Portal Guide
You might want to use a snapshot when upgrading the virtual machines in a vApp. For example,
before you upgrade the virtual machines, you create a snapshot to preserve the point in time
before the upgrade. To do this, you save a snapshot prior to upgrading, and then perform the
upgrade. If there are no issues during the upgrade, you can choose to remove the snapshot,
which will commit the changes you made during the upgrade. However, if you encountered an
issue, you can revert the snapshot, which will move back to your saved vApp state prior to the
upgrade.
n If any virtual machine in the vApp is connected to a named disk, you cannot take a vApp
snapshot.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select vApps from the left panel.
3 From the Actions menu of the vApp for which you want to take a snapshot, select Create
Snapshot.
When you capture the vApp memory state, the snapshot retains the live state of the vApp
and the virtual machines in the vApp. Memory snapshots create a snapshot at a precise time,
for example, to upgrade software that is still working. If you take a memory snapshot and the
upgrade does not complete as expected, or the software does not meet your expectations,
you can revert the virtual machine to its previous state.
When you capture the memory state, the vApp's files do not require quiescing. If you do not
capture the memory state, the snapshot does not save the live state of the vApp and the
disks are crash consistent unless you quiesce them.
This operation requires that VMware Tools is installed on the virtual machines in the vApp.
When you quiesce a virtual machine, VMware Tools quiesces the file system of the virtual
VMware, Inc. 74
vCloud Director Tenant Portal Guide
machine. A quiesce operation ensures that a snapshot disk represents a consistent state
of the guest file systems. Quiesced snapshots are appropriate for automated or periodic
backups. For example, if you are unaware of the virtual machine's activity, but want several
recent backups to revert to, you can quiesce the files.
6 Click OK.
Results
What to do next
You can revert all the virtual machines in the vApp to the most recent snapshot.
Prerequisites
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select vApps from the left panel.
3 From the Actions menu of the vApp you want to revert, select Revert to Snapshot.
4 Click OK.
Results
All virtual machines in the vApp are reverted to the snapshot state.
When you remove a vApp snapshot, you delete the state of the virtual machines in the vApp
snapshot and you can never return to that state again. Removing a snapshot does not affect the
current state of the vApp.
Prerequisites
VMware, Inc. 75
vCloud Director Tenant Portal Guide
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select vApps from the left panel.
3 From the Actions menu of the vApp for which you want to remove a snapshot, select
Remove Snapshot.
4 Click OK.
Results
Prerequisites
This operation requires the rights included in the predefined Organization Administrator role or
an equivalent set of rights.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select vApps from the left panel.
3 From the Actions menu of the vApp for which you want to change the owner, select Change
owner.
5 Click OK.
Results
Prerequisites
VMware, Inc. 76
vCloud Director Tenant Portal Guide
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select vApps from the left panel.
3 From the Actions menu of the vApp you want to move, select Move to.
4 Select the virtual data center where you want to move the vApp and click OK.
6 Click OK.
Results
The vApp is removed from the source data center and moved to the target data center.
Prerequisites
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select vApps from the left panel.
3 From the Actions menu of the vApp you want to copy, select Copy to.
5 Select the virtual data center in which you want to create the copy of the vApp.
7 Click OK.
Results
The vApp is copied with the name and description you provided to the specified virtual data
center.
VMware, Inc. 77
vCloud Director Tenant Portal Guide
Prerequisites
n The organization virtual data center is backed up by vCenter Server 5.5 or later.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select vApps from the left panel.
3 From the Actions menu of the vApp you want to copy, select Copy to.
5 Select the virtual data center in which you want to create the copy of the vApp.
7 Click OK.
Results
A copy of the vApp is created and the vApp copy is in a suspended state. The copied vApp is
enabled for network fencing.
What to do next
Modify the network properties of the new vApp or power on the vApp.
Prerequisites
You must be an organization administrator or vApp author to access virtual machines in public
catalogs.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select vApps from the left panel.
VMware, Inc. 78
vCloud Director Tenant Portal Guide
3 From the Actions menu of the vApp to which you want to add a virtual machine, select Add
VM.
The list of virtual machines that are associated to the vApp displays in the Add VMs window.
4 To create a new virtual machine and associate it with the vApp automatically, click Add
Virtual Machine.
5 Enter the name and the computer name for the virtual machine.
Important The computer name can contain only alphanumeric characters and hyphens. A
computer name cannot consist of digits only and cannot contain spaces.
7 Select whether you want the virtual machine to power on right after it is created.
Option Action
From Template You deploy a virtual machine from a template that you select from the
templates catalog.
a Select the virtual machine template from the catalog.
b (Optional) Select to use a custom storage policy and select the policy
from the Custom storage policy to use.
c If there is an end user license agreement available, you must review and
accept it.
VMware, Inc. 79
vCloud Director Tenant Portal Guide
Prerequisites
n This operation requires the rights included in the predefined vApp Author role or an
equivalent set of rights.
n Your organization must have a catalog and a virtual data center with available space.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select vApps from the left panel.
3 From the Actions menu of the vApp you want to add to a catalog, select Add to Catalog.
Note You can add vApps to a catalog even if the virtual machines that belong to the vApp
are in a running state. However, if you select a running vApp, it is added to the catalog as a
vApp template and all the virtual machines are in a suspended state.
6 (Optional) Select Overwrite catalog item if you want the new catalog item to overwrite any
existing vApp template and select the catalog item to overwrite.
For example, when you upload a new version of a vApp to the catalog you might want to
overwrite the old version.
The setting applies when you are creating a vApp based on the vApp template. It is ignored
when you build a vApp by using individual virtual machines from this template.
Option Description
Make identical copy Select to make an identical copy of the vApp when you create a vApp from
the vApp template.
Customize VM settings Select to enable customization of the virtual machine settings when you
create a vApp from the vApp template.
Results
The vApp is saved as a vApp template and appears in the specified catalog.
VMware, Inc. 80
vCloud Director Tenant Portal Guide
Prerequisites
n This operation requires the rights included in the predefined vApp Author role or an
equivalent set of rights.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select vApps from the left panel.
3 From the Actions menu of the vApp that you want to download, select Download.
5 (Optional) Select Preserve identity information to include the UUIDs and MAC addresses of
the virtual machines that reside in the vApp in the downloaded OVF package.
This limits the portability of the package and must be used only when necessary.
Results
By default, the package is downloaded in the Downloads folder for your browser.
Prerequisites
This operation requires the rights included in the predefined vApp User role or an equivalent set
of rights.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select vApps from the left panel.
Results
The lease renews. You can see the new lease timeframe in the Lease field.
Delete a vApp
You can delete a vApp, which removes it from your organization.
VMware, Inc. 81
vCloud Director Tenant Portal Guide
Prerequisites
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select vApps from the left panel.
4 Click OK.
Results
VMware, Inc. 82
Managing Organization Virtual
Data Center Networks 4
Organization VDC networks are created and assigned to your organization VDC by a system
administrator or an organization administrator. An organization administrator can view
information about networks, configure network services, and more.
You can use direct, routed, internal, or cross-VDC organization virtual data center networks
backed by NSX Data Center for vSphere.
You can use routed, internal, and imported organization virtual data center networks backed by
NSX-T Data Center.
Direct An organization VDC network with a direct connection to one of the external networks
that are provisioned by the system administrator and are backed by vSphere
resources.
Direct networks are only supported for organization VDCs that are backed by NSX Data
Center for vSphere.
Accessible by multiple organization VDCs. Virtual machines belonging to different
organization VDCs can connect to and see traffic on this network.
This network provides direct layer 2 connectivity to virtual machines outside of the
organization VDC. Virtual machines outside of this organization VDC can connect to
virtual machines in the organization VDC directly.
Note Only your system administrator can add a direct organization VDC network.
Isolated (Internal) Accessible only by the same organization VDC. Only virtual machines in this
organization VDC can connect to and see traffic on the internal organization VDC
network.
Isolated networks are supported for organization VDCs backed by NSX-T Data Center
and for organization VDC NSX Data Center for vSphere.
The isolated organization VDC network provides an organization VDC with an isolated,
private network that multiple virtual machines and vApps can connect to. This network
provides no connectivity to virtual machines outside the organization VDC. Machines
outside of the organization VDC have no connectivity to machines in the organization
VDC.
VMware, Inc. 83
vCloud Director Tenant Portal Guide
Routed Accessible only by the same organization VDC. Only virtual machines in this
organization VDC can connect to this network.
This network also provides controlled access to an external network. As a system
administrator or an organization administrator, you can configure network address
translation (NAT), firewall, and VPN settings to make specific virtual machines accessible
from the external network.
Can be IPv4 or IPv6.
Imported This network uses an existing NSX-T logical switch. Only a system administrator can
import a network.
Cross-VDC This network is part of a stretched network spanning a data center group. A data center
group can comprise between two and four organization virtual data centers in a single
or multisite vCloud Director deployment.
Virtual machines connected to this network are connected to the underlying stretched
network.
Cross-VDC networking requires NSX Data Center for vSphere.
Can be IPv4 only.
For information about cross-VDC networks, see Chapter 5 Managing Cross-Virtual Data
Center Networking.
All steps for managing your organization VDC networks are documented assuming that you have
more than one virtual data center in your environment.
n View the IP Addresses Used for an Organization Virtual Data Center Network
n Configure DHCP Settings for an Isolated Organization Virtual Data Center Network
VMware, Inc. 84
vCloud Director Tenant Portal Guide
Prerequisites
This operation requires the predefined organization administrator or system administrator roles
or a role that includes an equivalent set of rights.
Procedure
u On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select Networks from the left panel.
Results
You see a list of the available networks that you can sort by name.
What to do next
You can add a new network. You can also edit, delete or reset an existing network.
You can add a mix of isolated and routed organization VDC networks to meet the needs of your
organization. For example, you can isolate a network that contains sensitive information and have
a separate network that is associated with an edge gateway and connected to the Internet.
You can create an isolated VDC network that is backed by a network pool. Your service provider
can also create an isolated VDC network that is backed by an NSX-T logical switch.
Prerequisites
This operation requires the rights included in the predefined Organization Administrator role or
an equivalent set of rights.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select Networks from the left panel.
2 Click Add.
VMware, Inc. 85
vCloud Director Tenant Portal Guide
3 On the Select Network Type page, select Isolated and click Next.
5 Enter the Classless Inter-Domain Routing (CIDR) settings for the isolated network.
7 (Optional) To make the organization VDC network available to other organization VDCs
within the same organization, toggle on the Shared option.
One potential use case for this option is when an application exists within an Organization
VDC that has a reservation or allocation pool set as the allocation model. In this case, it
might not have enough room to run more virtual machines. As a solution, you can create
a secondary Organization VDC with pay-as-you-go and run more virtual machines on that
network on a temporary basis.
Note The Organization VDCs must be backed by the same Provider VDC.
8 Click Next.
9 (Optional) To reserve one or more IP addresses for assignment to virtual machines that
require static IP addresses, configure the Static IP Pools for the network.
10 Click Next.
Option Action
Primary DNS Enter the IP address for your primary DNS server.
Secondary DNS Enter the IP address for your secondary DNS server.
DNS Suffix Enter your DNS suffix. The DNS suffix is the DNS name without including the
hostname.
12 Click Next.
13 On the Ready to Complete page, review the organization VDC network settings that you
have provided, and click Finish.
VMware, Inc. 86
vCloud Director Tenant Portal Guide
translation (NAT), firewall, and VPN settings to make specific virtual machines accessible from the
external network.
You can add a mix of routed and isolated organization VDC networks to meet the needs of your
organization. For example, you can add a network that is associated with an edge gateway and
connected to the Internet, while having an isolated network that contains sensitive information.
Prerequisites
This operation requires the rights included in the predefined Organization Administrator role or
an equivalent set of rights.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select Networks from the left panel.
2 Click Add.
3 On the Select Network Type page, select Routed and click Next.
5 Enter the Classless Inter-Domain Routing (CIDR) settings for the routed organization VDC
network.
7 (Optional) To make the organization VDC network available to other organization VDCs
within the same organization, toggle on the Shared option.
One potential use case is when an application within an Organization VDC has a reservation
or allocation pool set as the allocation model. In this case, it might not have enough room to
run more virtual machines. As a solution, you can create a secondary Organization VDC with
pay-as-you-go and run more virtual machines on that network on a temporary basis.
Note The Organization VDCs must share the same network pool.
8 Click Next.
9 On the Edge Connection page, select an edge gateway with which to associate the
organization VDC network.
If the organization VDC includes more than one edge gateway, you must select an edge
gateway for this network to connect to. To support another routed network, the Edge
Gateway must show a value of at least 1 in the # Available Networks column.
VMware, Inc. 87
vCloud Director Tenant Portal Guide
10 From the Interface Type drop-down menu, select the interface type.
Option Description
Distributed Creates the network on a distributed logical router connected to this edge
gateway.
The maximum number of networks that are allowed is 400.
11 (Optional) To enable tagging of guest VLANs on this network, toggle on the Guest VLAN
Allowed option.
12 Click Next.
13 (Optional) To reserve one or more IP addresses for assignment to virtual machines that
require static IP addresses, configure the Static IP Pools for the network.
14 Click Next.
Option Action
Primary DNS Enter the IP address for your primary DNS server.
Secondary DNS Enter the IP address for your secondary DNS server.
DNS Suffix Enter your DNS suffix. The DNS suffix is the DNS name without including the
hostname.
16 Click Next.
17 On the Ready to Complete page, review the organization VDC network settings that you
have provided, and click Finish.
VMware, Inc. 88
vCloud Director Tenant Portal Guide
If you log in to the vCloud Director Tenant Portal as an organization administrator and attempt
to create a direct organization virtual data center network, you receive a warning message that
you have insufficient rights.
Prerequisites
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select Networks from the left panel.
2 Click Add.
3 On the Select Network Type page, select Direct and click Next.
6 (Optional) To make the organization VDC network available to other organization VDCs
within the same organization, toggle on the Shared option.
7 On the External Network Connection page, select the external network to which you want
your new organization virtual data center network to connect directly, and click Next.
8 On the Ready to Complete page, review the organization VDC network settings that you
have provided, and click Finish.
Note With an NSX-T logical switch, you can create only an IPv4 isolated organization network.
You cannot create a direct organization network based on an NSX-T logical switch.
Prerequisites
n The provider virtual data center that backs the target organization virtual data center must be
associated with an NSX-T Manager instance.
n The system administrator must create at least one NSX-T logical switch that is not in use by
other organization virtual data center networks.
For information about creating and configuring NSX-T logical switches, see the NSX-T
Administration Guide.
VMware, Inc. 89
vCloud Director Tenant Portal Guide
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select Networks from the left panel.
2 Click Add.
3 On the Select Network Type page, select Import and click Next.
4 Enter a name and, optionally, a description for the new organization VDC network, and click
Next.
5 From the list of available NSX-T logical switches, select the target switch by clicking the radio
button next to the switch name, and click Next.
8 Click Next.
Prerequisites
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select Networks from the left panel.
2 Click the name of the organization VDC network that you want to view or edit.
b Toggle on or off the Shared option to share or to not share the organization VDC
network with other virtual data centers within the same organization.
4 Click Save.
VMware, Inc. 90
vCloud Director Tenant Portal Guide
Prerequisites
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select Networks from the left panel.
2 Click the name of the organization VDC network that you want to convert.
4 Click Connection.
5 To connect to an edge gateway or to isolate the network from all other networks, toggle on
the Connect to an edge gateway option or toggle the same option off.
Option Action
Convert a routed network to an Toggle off the Connect to an edge gateway option.
isolated network.
6 Click Save.
Results
Prerequisites
This operation requires the rights included in the predefined Organization Administrator role or
an equivalent set of rights.
VMware, Inc. 91
vCloud Director Tenant Portal Guide
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select Networks from the left panel.
3 Click the name of the organization VDC network that you want to edit.
5 Click Connection.
6 From the Interface Type drop-down menu, select the interface type.
Option Description
Distributed Creates the network on a distributed logical router connected to this edge
gateway.
The maximum number of networks that are allowed is 400.
7 Click Save.
Prerequisites
n Verify that your network is an isolated or routed organization virtual data center network.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select Networks from the left panel.
2 Click the name of the network for which you want to see the used IP addresses.
VMware, Inc. 92
vCloud Director Tenant Portal Guide
You cannot add IP addresses to external organization virtual data center networks that have a
direct connection.
Prerequisites
n Verify that your network is an isolated or routed organization virtual data center network.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select Networks from the left panel.
In the Edit network window, you see the gateway CIDR and the IP address ranges, if any.
5 In the Static IP Pools text box, enter the IP address or range of IP addresses and click Add.
Note For cross-VDC networks, the IP addresses must not overlap with the IP addresses that
are assigned to the other organization VDC networks from the same stretched network.
6 Click Save.
Results
Prerequisites
VMware, Inc. 93
vCloud Director Tenant Portal Guide
n Verify that your network is an isolated or routed organization virtual data center network.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select Networks from the left panel.
n To modify an IP range, select the range, make the necessary edits, and click Modify.
5 Click Save.
Prerequisites
n Verify that your network is an isolated or routed organization virtual data center network.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select Networks from the left panel.
5 Edit the primary DNS, the secondary DNS, and the DNS suffix information as necessary.
6 Click Save.
VMware, Inc. 94
vCloud Director Tenant Portal Guide
configured to request an address from DHCP. The service provides the address when the virtual
machine powers on.
Prerequisites
n Verify that your network is an isolated organization virtual data center network.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select Networks from the left panel.
4 Select DHCP.
a Click Add.
The IP address range that you specify cannot overlap with the static IP address pool for
the organization virtual data center.
c Specify the default lease time for the DHCP addresses in seconds.
d Specify the maximum lease time for the DHCP addresses in seconds.
This is the maximum length of time that the DHCP-assigned IP addresses are leased to the
virtual machines. The default value is 7,200 seconds.
8 Click Save.
VMware, Inc. 95
vCloud Director Tenant Portal Guide
Prerequisites
n Verify that your network is an isolated organization virtual data center network.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select Networks from the left panel.
4 Select DHCP.
Option Action
Edit a DHCP pool. 1 Select the DHCP pool that you want to edit.
2 Click the Edit button.
3 Update the IP address range for the pool.
4 Edit the default lease time for the DHCP addresses in seconds.
5 Edit the maximum lease time for the DHCP addresses in seconds.
6 Click Save.
Delete a DHCP pool. 1 Select the DHCP pool that you want to delete.
2 Click the Delete button.
When you reset the organization virtual data center network, you force the network DHCP
service gateway to be redeployed. This operation results in a temporary disruption of the DHCP
services and no network services are available while the network is resetting.
Prerequisites
n This operation requires the rights included in the predefined Organization Administrator role
or an equivalent set of rights.
n The network is not connected to any virtual machines, vApps, or other networks.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select Networks from the left panel.
VMware, Inc. 96
vCloud Director Tenant Portal Guide
Prerequisites
n This operation requires the rights included in the predefined Organization Administrator role
or an equivalent set of rights.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select Networks from the left panel.
2 Click the radio button next to the name of the target network and click Delete.
VMware, Inc. 97
Managing Cross-Virtual Data
Center Networking 5
To create a network across multiple organization virtual data centers, you first group the virtual
data centers, then create a stretched network in the data center group. A data center group
can have either a common egress point configuration or an egress point configuration for each
network fault domain.
Cross-virtual data center networking requires NSX Data Center for vSphere.
A group of up to four virtual data centers that are configured to share multiple egress points.
A data center group can have one of the following egress points configurations:
Common egress points configuration The data center group can be configured with one
active egress point and one standby egress point.
The two egress points are common to all participating
virtual data centers across all network fault domains in
the data center group.
Egress points configuration per fault domain The data center group can be configured with one
active egress point for each network fault domain in
the data center group. Standby egresses cannot be
created.
An organization can have multiple data center groups. An organization virtual data center can
participate in multiple data center groups.
The participating organization virtual data centers can belong to different vCloud Director
sites. See Configure and Manage Multisite Deployments.
The network provider scope, typically representing the underlying vCenter Server instance
with the associated NSX Manager.
Egress point
VMware, Inc. 98
vCloud Director Tenant Portal Guide
An edge gateway that connects a data center group or network fault domain to the Internet.
The edge gateway must belong to a virtual data center from the data center group. BGP
routes are configured on the edge gateway representing the egress point and the universal
router of the virtual data center group or network fault domain. Existing routes on the edge
gateway are not affected.
Stretched network
A layer 2 network that is stretched across all virtual data centers in a data center group. Can
be IPv4 only.
You cannot convert a common egress configuration to an egress configuration per fault domain
or the reverse.
Prerequisites
n This operation requires the System Administrator role or a role with the VDC Group:
Configure VDC Group right published to the organization.
n Your system administrator must enable the target virtual data centers for cross-virtual data
center networking.
Procedure
VMware, Inc. 99
vCloud Director Tenant Portal Guide
Procedure
3 Enter a name and, optionally, a description for the new data center group.
5 On the Datacenters page, select at least two and up to four data centers for the new data
center group, and click Next.
The Datacenters page contains a list of the virtual data centers that are enabled for cross-
virtual data center networking by the system administrator.
Results
The newly created virtual data center group is listed in the Datacenter Groups view.
Prerequisites
The system administrator created at least one edge gateway on any of the virtual data centers
that are participating in the data center group.
Procedure
You are redirected to the Network Topology view for this data center group. You can see a
diagram of the current network topology, which depicts the participating virtual data centers
with their network fault domains, the egress points if configured, and the traffic routes.
The Add Active Egress Point page that opens provides a list of the edge gateways which
belong to the participating virtual data centers.
4 Select the edge gateway that you want to act as an active egress point for this data center
group, and click Add.
Results
BGP routes are configured on the edge gateway representing the egress point and the universal
router of the virtual data center group. Existing routes on the edge gateway are not affected.
The diagram of the network topology is updated with the newly added egress point. The traffic
from the participating virtual data centers to the Internet is represented with a solid blue line.
Prerequisites
Apart from the edge gateway that acts as an active egress point, you must have at least one
more edge gateway in any of the virtual data centers that are participating in the group.
Procedure
You are redirected to the Network Topology view for this data center group. You can see a
diagram of the current network topology, which depicts the participating virtual data centers
with their network fault domains, the egress points if configured, and the traffic routes.
The Add Stand-by Egress Point page opens providing a list of the unused edge gateways
that belong to the participating virtual data centers. The edge gateway that is in use by the
active egress point in this virtual datacenter group is not displayed.
4 Select the edge gateway that you want to act as a stand-by egress point for this data center
group, and click Add.
Results
BGP routes are configured on the edge gateway representing the egress point and the universal
router of the virtual data center group. Existing routes on the edge gateway are not affected.
The diagram of the network topology is updated with the newly added egress point. The
traffic from the participating virtual data centers to the Internet in fault tolerance scenarios is
represented with a dashed blue line.
Prerequisites
This operation requires the System Administrator role or a role with the VDC Group: Configure
VDC Group right published to the organization.
Procedure
Prerequisites
The system administrator enabled the target virtual data centers for cross-virtual data center
networking.
Procedure
3 Enter a name and, optionally, a description for the new data center group.
5 On the Datacenters page, select at least two and up to four data centers for the new data
center group, and click Next.
The Datacenters page contains a list of the virtual data centers that are enabled for cross-
virtual data center networking by the system administrator.
Results
The newly created virtual data center group is listed in the Datacenter Groups view.
Prerequisites
Apart from the edge gateways that are in use as egress points in this data center group, you
must have at least one unused edge gateway in any of the participating virtual data centers.
Procedure
You are redirected to the Network Topology view for this data center group. You can see a
diagram of the current network topology, which depicts the participating virtual data centers
with their network fault domains, the egress points if configured, and the traffic routes.
3 On the diagram of the network topology, click the target network fault domain.
Network fault domains are represented with solid lines and their names at the bottom of the
diagram.
The Add Active Egress Point page opens providing a list of the edge gateways that belong
to the participating virtual data centers.
5 Select the edge gateway that you want to act as an egress point for this fault domain, and
click Add.
Results
BGP routes are configured on the edge gateway representing the egress point and the universal
router of the network fault domain. Existing routes on the edge gateway are not affected.
The diagram of the network topology is updated with the newly added egress point. The traffic
from the virtual data centers in the network fault domain to the Internet is represented with a
continuous blue line.
Prerequisites
This operation requires the System Administrator role or a role with the VDC Group: View VDC
Group right published to the organization.
Procedure
You are redirected to the Network Topology view for this data center group. You can see a
diagram of the current network topology, which depicts the participating virtual data centers
with their network fault domains, the egress points if configured, and the traffic routes.
Prerequisites
n This operation requires the System Administrator role or a role with the VDC Group:
Configure VDC Group right published to the organization.
n The data center group contains less than four virtual data centers.
Procedure
You are redirected to the Network Topology view for this data center group. You can see a
diagram of the current network topology, which depicts the participating virtual data centers
with their network fault domains, the egress points if configured, and the traffic routes.
4 On the Datacenters page, select the data center that you want to add to the data center
group and click Finish.
The Datacenters page contains a list virtual data centers that are enabled for cross-virtual
data center networking by the system administrator.
Note A data center group must contain up to four virtual data centers.
Prerequisites
n This operation requires the System Administrator role or a role with the VDC Group:
Configure VDC Group right published to the organization.
n The data center group must contain at least three virtual data centers.
n The virtual data center that you want to remove must not provide an egress point to the data
center group.
Procedure
You are redirected to the Network Topology view for this data center group. You can see a
diagram of the current network topology, which depicts the participating virtual data centers
with their network fault domains, the egress points if configured, and the traffic routes.
3 In the upper right corner of the card of the target virtual data center, click the three dots, and
click Remove.
Results
The virtual data center is removed from the network topology diagram of the data center group.
Note During the data center group synchronization process, the data center group becomes
unavailable for a few seconds, because the universal router synchronizes in NSX.
Prerequisites
This operation requires the System Administrator role or a role with the VDC Group: Configure
VDC Group right published to the organization.
Procedure
You are redirected to the Network Topology view for this data center group. You can see a
diagram of the current network topology, which depicts the participating virtual data centers
with their network fault domains, the egress points if configured, and the traffic routes.
Prerequisites
This operation requires the System Administrator role or a role with the VDC Group: Configure
VDC Group right published to the organization.
Procedure
You are redirected to the Network Topology view for this data center group. You can see a
diagram of the current network topology, which depicts the participating virtual data centers
with their network fault domains, the egress points if configured, and the traffic routes.
Results
The diagram of the network topology is updated with the new traffic routes. The traffic to the
Internet is now redirected to the new active egress point.
Prerequisites
n This operation requires the System Administrator role or a role with the VDC Group:
Configure VDC Group right published to the organization.
n The new edge gateway must not be in use by other egress points in the data center group.
Procedure
You are redirected to the Network Topology view for this data center group. You can see a
diagram of the current network topology, which depicts the participating virtual data centers
with their network fault domains, the egress points if configured, and the traffic routes.
3 If you are replacing an egress point from a network fault domain configuration, on the
network topology diagram, select the network fault domain of the target egress point.
Network fault domains are represented with solid lines and domain names at the bottom of
the diagram.
4 In the upper right corner of the card of the target egress point, click the three dots, and click
Replace.
The Replace Egress Point page opens providing a list of the edge gateways that belong to
the participating virtual data centers.
Results
BGP routes are removed from the old edge gateway and configured on the new edge gateway
representing the egress point and the universal router of the virtual data center group.
The network topology diagram is updated with the name of the new edge gateway.
Prerequisites
n This operation requires the System Administrator role or a role with the VDC Group:
Configure VDC Group right published to the organization.
n If you want to remove an active egress point that is paired with a stand-by egress point, you
must swap the egress points or remove the stand-by egress point.
Procedure
You are redirected to the Network Topology view for this data center group. You can see a
diagram of the current network topology, which depicts the participating virtual data centers
with their network fault domains, the egress points if configured, and the traffic routes.
3 If you are removing an egress point from a network fault domain configuration, on the
network topology diagram, select the network fault domain of the target egress point.
Network fault domains are represented with solid lines and domain names at the bottom of
the diagram.
4 In the upper right corner of the card of the target egress point, click the three dots, and click
Delete.
Results
BGP routes are removed from the edge gateway representing the egress point if it is not in use
by other universal routers.
Prerequisites
n This operation requires the System Administrator role or a role with the VDC Group:
Configure VDC Group right published to the organization.
n You configured an egress point for the target data center group or network fault domain.
Procedure
You are redirected to the Network Topology view for this data center group. You can see a
diagram of the current network topology, which depicts the participating virtual data centers
with their network fault domains, the egress points if configured, and the traffic routes.
3 If you are synchronizing a network fault domain in a data center group, on the network
topology diagram, select the target network fault domain.
Network fault domains are represented with solid lines and domain names at the bottom of
the diagram.
4 To reapply the dynamic routing configuration to the group or network fault domain and its
associated egress points, click Sync routes, and click OK.
5 To synchronize an egress point with its data center group, in the upper right corner of the
card of the target egress point, click the three dots, click Sync, and click OK.
At a virtual data center level, stretched networks appear as organization virtual data center
networks of cross-VDC routing type.
Prerequisites
This operation requires the predefined Organization Administrator role or a role with the
Organization VDC Network: Edit Properties right.
Procedure
You are redirected to the Network Topology view for this data center group. You can see a
diagram of the current network topology, which depicts the participating virtual data centers
with their network fault domains, the egress points if configured, and the traffic routes.
4 Click Add.
5 Enter a name and, optionally, a description for the new stretched network.
6 Enter the network Classless Inter-Domain Routing (CIDR) settings, and click Create.
Results
You can see the newly created network in the list of stretched network for the data center group.
An organization virtual data center network of cross-VDC routing type is created for each
participating virtual data center. You can see the newly created networks in the Datacenters
view of the participating virtual data centers by clicking Networks. If a virtual machine or vApp
connects to such an organization virtual data center network, this virtual machine or vApp
connects to the stretched network.
What to do next
For each corresponding cross-VDC organization virtual data center network, you can assign
static IP addresses and IP pools. See Add IP Addresses to an Organization Virtual Data Center
Network IP Pool.
For DNS and DHCP configurations for virtual machines attached to a stretched network, you
can use the vCloud OpenAPI. To examine the vCloud OpenAPI documentation, go to https://
vCloud_Director_IP_address_or_host_name/docs. To view code samples and test vCloud
OpenAPI calls, go to https://vCloud_Director_IP_address_or_host_name/api-explorer?
scope=organization_name.
For information about editing the static IP pool allocation for a stretched network at a virtual data
center level, see Add IP Addresses to an Organization Virtual Data Center Network IP Pool.
Prerequisites
n Editing stretched networks requires the predefined Organization Administrator role or a role
with the Organization VDC Network: Edit Properties right.
Procedure
You are redirected to the Network Topology view for this data center group. You can see a
diagram of the current network topology, which depicts the participating virtual data centers
with their network fault domains, the egress points if configured, and the traffic routes.
4 Click the radio button next to the name of the target network, and click Edit.
Prerequisites
n This operation requires the predefined Organization Administrator role or a role with the
Organization VDC Network: Edit Properties right.
n The corresponding organization virtual data center networks must not be connected to any
virtual machines or vApps.
Procedure
You are redirected to the Network Topology view for this data center group. You can see a
diagram of the current network topology, which depicts the participating virtual data centers
with their network fault domains, the egress points if configured, and the traffic routes.
4 Click the radio button next to the name of the target network, and click Delete.
Results
The corresponding organization virtual data center networks are removed from all participating
virtual data centers.
Prerequisites
This operation requires the predefined Organization Administrator role or a role with the
Organization VDC Network: Edit Properties right.
Procedure
You are redirected to the Network Topology view for this data center group. You can see a
diagram of the current network topology, which depicts the participating virtual data centers
with their network fault domains, the egress points if configured, and the traffic routes.
4 Click the radio button next to the name of the target network, and click Sync.
Using these networking capabilities, you can achieve unprecedented security and isolation in
your organization virtual data center. These capabilities deliver the following benefits:
n Dynamic routing. The NSX capabilities in your vCloud Director environment support routing
protocols such as Border Gateway Protocol (BGP) and Open Shortest Path First (OSPF) to
simplify network integration between systems, to provide redundancy and continuity in a
cloud-hosted application deployment.
n Fine-grained network security and isolation. The NSX capabilities in your vCloud Director
environment support the use of object-based rule definitions to provide stateful network
traffic isolation without requiring multiple virtual networks. This zero-trust security model
prevents intruders from gaining full network access if an application or virtual machine
is compromised. Network configuration is simplified by using the same network security
policies to protect applications wherever they are physically located in the vCloud Director
environment and to extend your zero-trust security model for portable security no matter
where an application is deployed.
n Additional capabilities provided by NSX are enhanced VPN support for point-to-site (IPsec
VPN) and user (SSL VPN-Plus) connectivity, enhanced load balancing for HTTPS, and
expanded network scalability.
You can configure two types of firewalls: the edge gateway firewall and the distributed firewall.
For more information about the differences between these firewalls, see Firewall Configuration
Using the Tenant Portal.
You access these advanced networking capabilities using the vCloud Director tenant portal or
the vCloud Director Service Provider Admin Portal. The edge gateway must first be converted to
an advanced edge gateway. See Convert an Edge Gateway to an Advanced Edge Gateway.
Important IPv6 edge gateways support limited services. IPv6 edge gateways support edge
firewalls, distribute firewalls, and static routing.
n Load Balancing
n vCloud Director system administrators, who might use the tenant portal to configure the
distributed firewall and other advanced networking capabilities for an organization.
n Organization administrators, who use the tenant portal to manage the distributed firewall
and other advanced networking capabilities that the system administrator has made
available to that organization.
Note The tenant portal provides the ability to configure both edge gateway firewalls and
distributed firewalls.
The NSX logical firewall technology consists of two components to address different deployment
use cases. The edge gateway firewall focuses on North-South traffic enforcement while the
distributed firewall focuses on East-West access controls.
A distributed firewall provides the capability to isolate and secure each virtual machine and
application down to the layer 2 (L2) level. Configuring distributed firewalls effectively quarantines
any external or internal network security compromise, isolating East-West traffic between virtual
machines on the same network segment. Security policies are centrally managed, inheritable, and
nestable, so networking and security administrators can manage them at scale. Additionally, once
deployed, defined security policies follow the virtual machines or applications when they move
between different virtual data centers.
Each traffic session is checked against the top rule in the firewall table before moving down the
subsequent rules in the table. The first rule in the table that matches the traffic parameters is
enforced. Rules are displayed in the following order:
1 User-defined pre rules have the highest priority, and are enforced in top-to-bottom ordering
with a per-virtual NIC level precedence.
2 Auto-plumbed rules (rules that enable control traffic to flow for edge gateway services).
For more information about how the NSX software enforces firewall rules, see Change the Order
of a Firewall Rule in the NSX Administration documentation.
The edge gateway firewall capability in the vCloud Director environment is provided by the NSX
software. In NSX, this firewall capability is also referred to as the edge firewall. The edge gateway
firewall monitors North-South traffic to provide perimeter security functionality including firewall,
Network Address Translation (NAT) as well as site-to-site IPSec and SSL VPN functionality.
For more detailed information about the capabilities provided by the edge gateway firewall of
the NSX software, see the NSX Administration documentation.
For information about protecting traffic traveling between virtual machines in an organization
virtual data center, see Managing Distributed Firewall Rules Using the Tenant Portal.
Rules created on the distributed firewall screen that have an advanced edge gateway specified
in their Applied To column are not displayed in the Firewall screen for that advanced edge
gateway .
The edge gateway firewall rules for an edge gateway are displayed in the Firewall screen and
are enforced in the following order:
1 Internal rules, also known as auto-plumbed rules. These internal rules enable control traffic to
flow for edge gateway services.
2 User-defined rules.
3 Default rule.
The default rule settings apply to traffic that does not match any of the user-defined firewall
rules. The default rule is displayed at the bottom of the rules on the Firewall screen.
In the tenant portal, use the Enable toggle on the Firewall Rules screen of the edge gateway to
disable or enable an edge gateway firewall.
Prerequisites
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and select Edges from the left panel.
Results
What to do next
Once you have converted to an advanced edge gateway, you can configure settings by selecting
the gateway and clicking Services.
Add an NSX Data Center for vSphere Edge Gateway Firewall Rule
You use the edge gateway Firewall tab to add firewall rules for that edge gateway. You can add
multiple NSX Edge interfaces and multiple IP address groups as the source and destination for
these firewall rules.
Specifying internal for a source or a destination of a rule indicates traffic for all subnets on the
port groups connected to the NSX edge gateway. If you select internal as the source, the rule is
automatically updated when additional internal interfaces are configured on the NSX gateway.
Note Edge gateway firewall rules on internal interfaces do not work when the edge gateway is
configured for dynamic routing.
Procedure
2 If the Firewall Rules screen is not already visible, click the Firewall tab.
3 To add a rule below an existing rule in the firewall rules table, click in the existing row and
then click the Create button.
A row for the new rule is added below the selected rule, and is assigned any destination, any
service, and the Allow action by default. When the system-defined default rule is the only
rule in the firewall table, the new rule is added above the default rule.
5 Click in the Source cell and use the now visible icons to select a source to add to the rule:
Option Description
Click the IP icon Type the source value you want to use. Valid values are an IP address, CIDR,
an IP range, or the keyword any. The edge gateway firewall supports both
IPv4 and IPv6 formats.
Click the + icon Use the + icon to specify the source as an object other than a specific IP
address:
n Use the Select objects window to add objects that match your
selections and click Keep to add them to the rule.
n To exclude a source from the rule, add it to this rule using the Select
objects window and then select the toggle exclusion icon to exclude that
source from this rule.
When the toggle exclusion is selected on the source, the rule is applied to
traffic coming from all sources except for the source you excluded. When
the toggle exclusion is not selected, the rule applies to traffic coming from
the source you specified in the Select objects window
6 Click in the Destination cell and perform one of the following options:
Option Description
Click the IP icon Type the destination value you want to use. Valid values are an IP address,
CIDR, an IP range, or the keyword any. The edge gateway firewall supports
both IPv4 and IPv6 formats.
Click the + icon Use the + icon to specify the source as an object other than a specific IP
address:
n Use the Select objects window to add objects that match your
selections and click Keep to add them to the rule.
n To exclude a source from the rule, add it to this rule using the Select
objects window and then select the toggle exclusion icon to exclude that
source from this rule.
When the toggle exclusion is selected on the source, the rule is applied to
traffic coming from all sources except for the source you excluded. When
the toggle exclusion is not selected, the rule applies to traffic coming from
the source you specified in the Select objects window
7 Click in the Service cell of the new rule and click the + icon to specify the service as a
port-protocol combination:
b Type the port numbers for the source and destination ports, or specify any.
c Click Keep.
8 In the Action cell of the new rule, configure the action for the rule.
Option Description
Accept Allows traffic from or to the specified sources, destinations, and services.
Deny Blocks traffic from or to the specified sources, destinations, and services.
Modify NSX Data Center for vSphere Edge Gateway Firewall Rules
You can edit and delete only the user-defined firewall rules that were added to an edge gateway.
You cannot edit or delete an auto-generated rule or a default rule, except for changing the action
setting of the default rule. You can change the priority order of user-defined rules.
For details about the available settings for the various cells of a rule, see Add an NSX Data
Center for vSphere Edge Gateway Firewall Rule.
Procedure
n Disable a rule by clicking the green check mark in its No. cell. The green check mark turns
to a red disabled icon. If the rule is disabled and you want to enable the rule, click the red
disabled icon.
n Edit a rule name by double-clicking in its Name cell and typing the new name.
n Modify the settings for a rule, such as the source or action settings, by selecting the
appropriate cell and using the displayed controls.
n Delete a rule by selecting it and clicking the Delete button located above the rules table.
n Hide system-generated rules by using the Show only user-defined rules toggle.
n Move a rule up or down in the rules table by selecting the rule and clicking the up and
down arrow buttons located above the rules table.
Distributed Firewall
The distributed firewall allows you to segment organization virtual datacenter entities, such as
virtual machines, based on virtual machine names and attributes.
vCloud Director supports distributed firewall services on organization virtual data centers that are
backed by NSX Data Center for vSphere. As described in the NSX Administration documentation,
this distributed firewall is a hypervisor kernel-embedded firewall that provides visibility and
control for virtualized workloads and networks. You can create access control policies based
on objects like virtual machine names and on network constructs like IP addresses or IP set
addresses. Firewall rules are enforced at the vNIC level of each virtual machine to provide
consistent access control even when the virtual machine is moved to a new ESXi host by vSphere
vMotion. This distributed firewall supports a micro-segmentation security model where East-West
traffic can be inspected at near line rate processing.
As described in the NSX Administration documentation,, for layer 2 (L2) packets, the distributed
firewall creates a cache for performance boost. Layer 3 (L3) packets are processed in the
following sequence:
3 When a state match is not found, the packets are processed through the rules until a match is
found.
n For TCP packets, a state is set only for packets with a SYN flag. However, rules that do not
specify a protocol (service ANY), can match TCP packets with any combination of flags.
n For UDP packets, 5-tuple details are extracted from the packet. When a state does not exist
in the state table, a new state is created using the extracted 5-tuple details. Subsequently
received packets are matched against the state that was just created.
n For ICMP packets, ICMP type, code, and packet direction are used to create a state.
The distributed firewall can help in creating identity-based rules as well. Administrators can
enforce access control based on the user's group membership as defined in the enterprise Active
Directory (AD). Some use cases for when you might use identity-based firewall rules are:
n Users accessing virtual applications using a laptop or mobile device where AD is used for
user authentication
n Users accessing virtual applications using VDI infrastructure where the virtual machines are
Microsoft Windows based
For more detailed information about the capabilities provided by the NSX software's distributed
firewall, see the NSX Administration documentation.
You use the Distributed Firewall screen in the tenant portal to enable the distributed firewall for
an organization virtual data center.
Prerequisites
Verify that the organization to which the organization virtual data center belongs has the
following rights assigned to it:
The vCloud Director system administrator assigns rights to an organization. The Organization
vDC Distributed Firewall: Enable/Disable right is required for enabling the distributed firewall
using the user interface in the tenant portal. The Organization vDC Distributed Firewall: View
Rules right is required for viewing the firewall rules in the tenant portal and the Organization vDC
Distributed Firewall: Configure Rules right is required for configuring the firewall rules using the
tenant portal.
Verify that you have an assigned role that grants you the right named Organization vDC
Distributed Firewall: Enable/Disable. Of the pre-defined roles in a vCloud Director system, only
the System Administrator role has that right by default.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and under Networking, select Security.
2 Select the organization virtual data center for which you want to configure distributed firewall
rules.
What to do next
For a description of the default distributed firewall rule, see Managing Distributed Firewall Rules
Using the Tenant Portal.
The distributed firewall capability must be enabled on an organization virtual data center before
you can manage the distributed firewall settings using the vCloud Director Tenant Portal.
The default distributed firewall rule is configured to allow all layer 3 and layer 2 traffic to pass
through the organization virtual data center. This setting is indicated by the Allow set in the
Action column in the user interface. The default rule is always at the bottom of the rules table.
Important You cannot delete or modify the default distributed firewall rules.
For information about the predefined services and service groups that you can use in a rule, see
View Services Available for Firewall Rules and View Service Groups Available for Firewall Rules.
Prerequisites
n Enable the Distributed Firewall on an Organization Virtual Data Center using the Tenant Portal
n If you want to use an IP set as a source or destination in a rule, Create an IP Set for Use in
Firewall Rules and DHCP Relay Configuration.
n If you want to use an MAC set as a source or destination in a rule, Create a MAC Set for Use
in Firewall Rules.
n If you want to use a Security group as a source or destination in a rule, Create a Security
Group.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and under Networking, select Security.
2 Select the security services VDC network for which you want to modify firewall rules, and
click Configure Services.
3 Select the type of rule you want to create. You have the option to create a general rule or an
Ethernet rule.
Layer 3 (L3) rules are configured on the General tab. Layer 2 (L2) rules are configured on the
Ethernet tab.
4 To add a rule below an existing rule in the firewall table, click in the existing row and then
A row for the new rule is added below the selected rule, and is assigned any destination, any
service, and the Allow action by default . When the system-defined Default Allow rule is the
only rule in the firewall table, the new rule is added above the default rule.
6 Click in the Source cell and use the now visible icons to select a source to add to the rule:
Action Description
Click the IP icon Applicable for rules defined on the General tab.
Type the source value you want to use. Valid values are an IP address,
CIDR, an IP range, or the keyword any. The distributed firewall supports IPv4
format only.
Click the + icon Use the + icon to specify the source as an object other than a specific IP
address:
n Use the Select objects window to add objects that match your
selections and click Keep to add them to the rule.
n To exclude a source from the rule, add it to this rule using the Select
objects window and then select the toggle exclusion icon to exclude that
source from this rule.
When the toggle exclusion is selected on the source, the rule is applied to
traffic coming from all sources except for the source you excluded. When
the toggle exclusion is not selected, the rule applies to traffic coming from
the source you specified in the Select objects window
7 Click in the Destination cell and perform one of the following actions:
Action Description
Click the IP icon Applicable for rules defined on the General tab.
Type the destination value you want to use. Valid values are an IP address,
CIDR, an IP range, or the keyword any. The distributed firewall supports IPv4
format only.
Click the + icon Use the + icon to specify the source as an object other than a specific IP
address:
n Use the Select objects window to add objects that match your
selections and click Keep to add them to the rule.
n To exclude a source from the rule, add it to this rule using the Select
objects window and then select the toggle exclusion icon to exclude that
source from this rule.
When the toggle exclusion is selected on the source, the rule is applied to
traffic coming from all sources except for the source you excluded. When
the toggle exclusion is not selected, the rule applies to traffic coming from
the source you specified in the Select objects window
8 Click in the Service cell of the new rule and perform one of the following actions:
Action Description
Click the + icon To select a pre-defined service or service group, or define a new one:
a Select one or more objects and add them to the filter.
b Click Keep.
9 In the Action cell of the new rule, configure the action for the rule.
Option Description
Allow Allows traffic from or to the specified sources, destinations, and services.
Deny Blocks traffic from or to the specified sources, destinations, and services.
10 In the Direction cell of the new rule, select whether the rule applies to incoming traffic,
outgoing traffic, or both.
11 If this is a rule on the General tab, in the Packet Type cell of the new rule, select a packet
type of Any, IPV4, or IPV6.
12 Select the Applied To cell, and use the + icon to define the object scope to which this rule is
applicable.
When the rule contains virtual machines in the Source and Destination cells, you must add
both the source and destination virtual machines to the rule's Applied To for the rule to work
correctly.
Important IP address groups (IP sets), MAC address groups (MAC sets), and security groups
containing either IP sets or MAC sets are not valid input parameters.
For details about the available settings for the various cells of a rule, see Add a Distributed
Firewall Rule.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and under Networking, select Security.
2 Select the security services VDC network for which you want to modify firewall rules, and
click Configure Services.
3 Perform any of the following actions to manage the distributed firewall rules:
n Disable a rule by clicking the green check mark in its No. cell.
The green check mark turns to a red disabled icon. If the rule is disabled and you want to
enable the rule, click the red disabled icon.
n Edit a rule name by double-clicking in its Name cell and typing the new name.
n Modify the settings for a rule, such as the source or action settings, by selecting the
appropriate cell and using the displayed controls.
n Delete a rule by selecting it and clicking the Delete ( ) button located above
the rules table.
n Move a rule up or down in the rules table by selecting the rule and clicking the up and
down arrow buttons located above the rules table.
As described in the NSX documentation, an NSX edge gateway capabilities include IP address
pooling, one-to-one static IP address allocation, and external DNS server configuration. Static
IP address binding is based on the managed object ID and interface ID of the requesting client
virtual machine.
n Listens on the internal interface of the edge gateway for DHCP discovery.
n Uses the IP address of the internal interface of the edge gateway as the default gateway
address for all clients.
n Uses the broadcast and subnet mask values of the internal interface for the container
network.
In the following situations, you need to restart the DHCP service on the client virtual machines
that have the DHCP-assigned IP addresses:
Note If the DNS settings on a DHCP-enabled edge gateway are changed, the edge gateway
might stop providing DHCP services. If this situation occurs, use the DHCP Service Status toggle
on the DHCP Pools screen to disable and then reenable DHCP on that edge gateway. See Add a
DHCP IP Pool.
As described in the NSX Administration documentation, the DHCP service requires a pool of IP
addresses. An IP pool is a sequential range of IP addresses within the network. Virtual machines
protected by the edge gateway that do not have an address binding are allocated an IP address
from this pool. IP pool ranges cannot intersect one another, thus one IP address can belong to
only one IP pool.
Note At least one DHCP IP pool must be configured to have the DHCP service status turned on.
Procedure
3 If DHCP service is not currently enabled, turn on the DHCP Service Status toggle.
Note Add at least one DHCP IP pool before saving changes after turning on the DHCP
Service Status toggle. If no DHCP IP pools are listed on the screen and you turn on the DHCP
Service Status toggle and save the changes, the screen displays with the toggle turned off.
4 Under DHCP Pools, click the Create ( ) button, specify the details for the DHCP
pool, and click Keep.
Option Description
Auto Configure DNS Turn on this toggle to use the DNS service configuration for this IP pool DNS
binding.
If enabled, the Primary Name Server and Secondary Name Server are set
to Auto.
Option Description
Primary Name Server When you do not enable Auto Configure DNS, type your primary DNS
server IP address of your primary DNS server.
This IP address is used for hostname-to-IP address resolution.
Secondary Name Server When you do not enable Auto Configure DNS, type your secondary DNS
server IP address.
This IP address is used for hostname-to-IP address resolution.
Subnet Mask Type the subnet mask of the edge gateway interface.
Lease Never Expires Enable this toggle to keep the IP addresses that are assigned out of this
pool bound to their assigned virtual machines forever.
When you select this option, Lease Time is set to infinite.
Lease Time (Seconds) Length of time (in seconds) that the DHCP-assigned IP addresses are leased
to the clients.
The default lease time is one day (86400 seconds).
Note You cannot specify a lease time when you select Lease never
expires.
Results
Prerequisites
You have the MAC addresses for the virtual machines for which you want to set up bindings.
Procedure
2 On the DHCP > Bindings tab, click the Create ( ) button, specify the details for the
binding, and click Keep.
Option Description
MAC Address Type the MAC address of the virtual machine that you want bound to the IP
address.
Host Name Type the host name you want set for that virtual machine when the virtual
machine requests a DHCP lease.
IP Address Type the IP address you want bound to the MAC address.
Subnet Mask Type the subnet mask of the edge gateway interface.
Auto Configure DNS Enable this toggle to use the DNS service configuration for this DNS binding.
If enabled, the Primary Name Server and Secondary Name Server are set
to Auto.
Primary Name Server When you do not select Auto Configure DNS, type your primary DNS server
IP address of your primary DNS server.
This IP address is used for hostname-to-IP address resolution.
Secondary Name Server When you do not select Auto Configure DNS, type your secondary DNS
server IP address.
This IP address is used for hostname-to-IP address resolution.
Lease Never Expires Enable this toggle to keep the IP address bound to that MAC address
forever.
When you select this option, Lease Time is set to infinite.
Lease Time (Seconds) Length of time (in seconds) that the DHCP-assigned IP addresses are leased
to the clients.
The default lease time is one day (86400 seconds).
Note You cannot specify a lease time when you select Lease never
expires.
Configuring DHCP Relay for NSX Data Center for vSphere Edge
Gateways
The DHCP relay capability provided by NSX in your vCloud Director environment enables you to
leverage your existing DHCP infrastructure from within your vCloud Director environment without
any interruption to the IP address management in your existing DHCP infrastructure. DHCP
messages are relayed from virtual machines to the designated DHCP servers in your physical
DHCP infrastructure, which allows IP addresses controlled by the NSX software to continue to be
synchronized with IP addresses in the rest of your DHCP-controlled environments.
The DHCP relay configuration of an edge gateway can list several DHCP servers. Requests are
sent to all listed servers. While relaying the DHCP request from the VMs, the edge gateway adds
a gateway IP address to the request. The external DHCP server uses this gateway address to
match a pool and allocate an IP address for the request. The gateway address must belong to a
subnet of the edge gateway interface.
You can specify a different DHCP server for each edge gateway and can configure multiple
DHCP servers on each edge gateway to provide support for multiple IP domains.
Note
n DHCP relay does not support overlapping IP address spaces.
n DHCP relay and DHCP service cannot run on the same vNIC at the same time. If a relay agent
is configured on a vNIC, a DHCP pool cannot be configured on the subnets of that vNIC. See
the NSX Administration Guide for details.
As described in the NSX Administration documentation, the DHCP servers can be specified using
an existing IP set, IP address block, domain, or a combination of all of these. DHCP messages are
relayed to every specified DHCP server.
You must also configure at least one DHCP relay agent. A DHCP relay agent is an interface on the
edge gateway from which the DHCP requests are relayed to the external DHCP servers.
Prerequisites
If you want to use an IP set to specify a DHCP server, verify that an IP set exists as a grouping
object available to the edge gateway. See Create an IP Set for Use in Firewall Rules and DHCP
Relay Configuration.
Procedure
3 Use the on-screen fields to specify the DHCP servers by IP addresses, domain names, or IP
sets.
You select from existing IP sets using Add ( ) button to browse the available IP
sets.
4 Configure a DHCP relay agent and add its configuration to the on-screen table by clicking
the Add ( ) button, selecting a vNIC and its gateway IP address, and then clicking
Keep.
By default, the Gateway IP Address matches the primary address of the selected vNIC. You
can keep the default or select an alternate address if one is available on that vNIC.
The edge gateway NAT service provides the ability to assign a public address to a virtual
machine or group of virtual machines in a private network. To enable your edge gateways to
provide access to services running on privately addressed virtual machines in your organization
virtual data center, you must configure NAT rules on the edge gateways. In the most common
case, you associate a NAT service with an uplink interface on an edge gateway in your vCloud
Director environment so that addresses on organization virtual data center networks are not
exposed on the external network.
The NAT service configuration is separated into source NAT (SNAT) and destination NAT (DNAT)
rules. When you configure a SNAT or a DNAT rule on an edge gateway in the vCloud Director
environment, you always configure the rule from the perspective of your organization virtual data
center. Specifically, that means you configure the rules in the following ways:
n SNAT: the traffic is traveling from a virtual machine on an internal network in your
organization virtual data center (the source) through the Internet to the external network
(the destination). A SNAT rule translates the source IP address of the outgoing packets of
an organization virtual data center network that are being sent to an external network or to
another organization virtual data center network.
n DNAT: the traffic is traveling from the Internet (the source) to a virtual machine inside your
organization virtual data center (the destination). A DNAT rule translates the IP address,
and optionally the port, of packets received by an organization virtual data center network
that are coming from an external network or from another organization virtual data center
network.
You can configure NAT rules to create a private IP address space inside your organization virtual
data center. This configuration provides the ability to port a private IP address space from one
organization virtual data center to another. Configuring NAT rules allows you to use the same
private IP addresses for your virtual machines in one organization virtual data center that were
used in another.
Important You must configure both firewall and NAT rules on an edge gateway for the
virtual machines on an edge gateway network to be accessible. By default, edge gateways
are deployed with firewall rules configured to deny all network traffic to and from the virtual
machines on the edge gateway networks. Also, NAT is disabled by default on the edge gateways
so that edge gateways are unable to translate the IP addresses of the incoming and outgoing
traffic unless you configure NAT on the edge gateways. Attempting to ping a virtual machine
on a network after configuring a NAT rule will fail unless you add a firewall rule to allow the
corresponding traffic.
When creating NAT rules, you can specify the original and translated IP addresses by using the
following formats:
n any
When you configure a SNAT or a DNAT rule on an edge gateway in the vCloud Director
environment, you always configure the rule from the perspective of your organization virtual data
center. A SNAT rule translates the source IP address of packets sent from an organization virtual
data center network out to an external network or to another organization virtual data center
network. A DNAT rule translates the IP address, and optionally the port, of packets received by
an organization virtual data center network that are coming from an external network or from
another organization virtual data center network.
Prerequisites
The public IP addresses must have been added to the NSX Data Center for vSphere edge
gateway interface on which you want to add the rule. For DNAT rules, the original (public) IP
address must have been added to the edge gateway interface and for SNAT rules, the translated
(public) IP address must have been added to the interface.
Procedure
3 Depending on which type of NAT rule you are creating, click DNAT Rule or SNAT Rule.
Option Description
Protocol Select the protocol to which the rule applies. To apply this rule on all
protocols, select Any.
Original Port (Optional) Select the port or port range that the incoming traffic uses on
the edge gateway to connect to the internal network on which the virtual
machines are connected. This selection is not available when the Protocol is
set to ICMP or Any.
ICMP Type When you select ICMP (an error reporting and a diagnostic utility used
between devices to communicate error information) for Protocol, select the
ICMP Type from the drop-down menu.
ICMP messages are identified by the type field. By default, the ICMP type is
set to any.
Translated Port (Optional) Select the port or port range that inbound traffic is connecting to
on the virtual machines on the internal network. These ports are the ones
into which the DNAT rule is translating for the packets inbound to the virtual
machines.
Description (Optional) Type a description that helps identify what this rule is doing.
Enable logging Toggle on to have the address translation performed by this rule logged.
Option Description
Original Source IP/Range Type the original IP address or range of IP addresses to apply to this rule.
These addresses are the IP addresses of one or more virtual machines for
which you are configuring the SNAT rule so that they can send traffic to the
external network.
Description (Optional) Type a description that helps identify what this rule is doing.
Enable logging Toggle on to have the address translation performed by this rule logged.
What to do next
Add corresponding edge gateway firewall rules for the SNAT or DNAT rules you just configured.
See Add an NSX Data Center for vSphere Edge Gateway Firewall Rule.
To enable dynamic routing, you configure an advanced edge gateway using the Border Gateway
Protocol (BGP) or the Open Shortest Path First (OSPF) protocol.
For detailed information about the routing capabilities that NSX provides, see Routing in the NSX
Administration documentation.
You can specify static and dynamic routing for each advanced edge gateway. The dynamic
routing capability provides the necessary forwarding information between Layer 2 broadcast
domains, which allows you to decrease Layer 2 broadcast domains and improve network
efficiency and scale. NSX extends this intelligence to the locations of the workloads for East-
West routing. This capability allows more direct virtual machine to virtual machine communication
without the added cost or time needed to extend hops.
Specify Default Routing Configurations for the NSX Data Center for
vSphere Edge Gateway
You can specify the default settings for static routing and dynamic routing for an edge gateway.
Note To remove all configured routing settings, use the CLEAR GLOBAL CONFIGURATION
button at the bottom of the Routing Configuration screen. This action deletes all routing settings
currently specified on the subscreens: default routing settings, static routes, OSPF, BGP, and
route redistribution.
Procedure
3 To enable Equal Cost Multipath (ECMP) routing for this edge gateway, turn on the ECMP
toggle.
For more details about ECMP and NSX, see the routing topics in the NSX Troubleshooting
Guide.
a Use the Applied On drop-down list to select an interface from which the next hop
towards the destination network can be reached.
To see details about the selected interface, click the blue information icon.
Note If you have IPsec VPN configured in your environment, you should not use dynamic
routing.
You can select a router ID in the list or use the + icon to enter a new one. This router
ID is the first uplink IP address of the edge gateway that pushes routes to the kernel for
dynamic routing.
b Configure logging by turning on the Enable Logging toggle and selecting the log level.
c Click OK.
What to do next
n Configure BGP
n Configure OSPF
If ECMP is enabled in the default routing configuration, you can specify multiple next hops in the
static routes. See Specify Default Routing Configurations for the NSX Data Center for vSphere
Edge Gateway for steps on enabling ECMP.
Prerequisites
As described in the NSX documentation, the next hop IP address of the static route must exist
in a subnet associated with one of the NSX Data Center for vSphere edge gateway interfaces.
Otherwise, configuration of that static route fails.
Procedure
Option Description
Interface Optionally, select the edge gateway interface on which you want to add a
static route. By default, the interface is selected that matches the next hop
address.
What to do next
Configure a NAT rule for the static route. See Add a SNAT or a DNAT Rule.
Add a firewall rule to allow traffic to traverse the static route. See Add an NSX Data Center for
vSphere Edge Gateway Firewall Rule.
Configure OSPF
You can configure the Open Shortest Path First (OSPF) routing protocol for the dynamic routing
capabilities of an NSX Data Center for vSphere edge gateway. A common application of OSPF on
an edge gateway in a vCloud Director environment is to exchange routing information between
edge gateways in vCloud Director.
The NSX edge gateway supports OSPF, an interior gateway protocol that routes IP packets
only within a single routing domain. As described in the NSX Administration documentation,
configuring OSPF on an NSX edge gateway enables the edge gateway to learn and advertise
routes. The edge gateway uses OSPF to gather link state information from available edge
gateways and construct a topology map of the network. The topology determines the routing
table presented to the Internet layer, which makes routing decisions based on the destination IP
address found in IP packets.
As a result, OSPF routing policies provide a dynamic process of traffic load balancing between
routes of equal cost. An OSPF network is divided into routing areas to optimize traffic flow and
limit the size of routing tables. An area is a logical collection of OSPF networks, routers, and links
that have the same area identification. Areas are identified by an Area ID.
Prerequisites
A Router ID must be configured . Specify Default Routing Configurations for the NSX Data Center
for vSphere Edge Gateway.
Procedure
3 If OSPF is not currently enabled, use the OSPF Enabled toggle to enable it.
Option Description
Enable Graceful Restart Specifies that packet forwarding is to remain uninterrupted when OSPF
services are restarted.
Enable Default Originate Allows the edge gateway to advertise itself as a default gateway to its OSPF
peers.
5 (Optional) You can either click Save changes or continue with configuring area definitions and
interface mappings.
6 Add an OSPF area definition by clicking the Add ( ) button, specifying details for
the mapping in the dialog box, and clicking Keep.
Note By default, the system configures a not-so-stubby area (NSSA) with area ID of 51, and
this area is automatically displayed in the area definitions table on the OSPF screen. You can
modify or delete the NSSA area.
Option Description
Area Authentication Select the type of authentication for OSPF to perform at the area level.
All edge gateways within the area must have the same authentication and
corresponding password configured. For MD5 authentication to work, both
the receiver and transmitter must have the same MD5 key.
Choices are:
n None
No authentication is required.
n Password
With this choice, the password you specify in the Area Authentication
Value field is included in the transmitted packet.
n MD5
With this choice, the authentication uses MD5 (Message Digest type
5) encryption. An MD5 checksum is included in the transmitted packet.
Type the Md5 key into the Area Authentication Value field.
7 Click Save changes, so that the newly configured area definitions are available for selection
when you add interface mappings.
8 Add an interface mapping by clicking the Add ( ) button, specifying details for the
mapping in the dialog box, and clicking Keep.
The interface specifies the external network that both edge gateways are connected to.
b Select the area ID for the area to map to the selected interface.
c (Optional) Change the OSPF settings from the default values to customize them for this
interface mapping.
When configuring a new mapping, the default values for these settings are displayed.
In most cases, it is recommended to retain the default settings. If you do change the
settings, make sure that the OSPF peers use the same settings.
Option Description
Hello Interval Interval (in seconds) between hello packets that are sent on the interface.
Dead Interval Interval (in seconds) during which at least one hello packet must be
received from a neighbor before that neighbor is declared down.
Priority Priority of the interface. The interface with the highest priority is the
designated edge gateway router.
Cost Overhead required to send packets across that interface. The cost of an
interface is inversely proportional to the bandwidth of that interface. The
larger the bandwidth, the smaller the cost.
d Click Keep.
What to do next
Configure OSPF on the other edge gateways that you want to exchange routing information
with.
Add a firewall rule that allows traffic between the OSPF-enabled edge gateways. See Add an
NSX Data Center for vSphere Edge Gateway Firewall Rule.
Make sure that the route redistribution and firewall configuration allow the correct routes to be
advertised. See Configure Route Redistributions.
Configure BGP
You can configure Border Gateway Protocol (BGP) for the dynamic routing capabilities of an NSX
Data Center for vSphere edge gateway.
As described in the NSX Administration Guide, BGP makes core routing decisions by using
a table of IP networks or prefixes, which designate network reachability among multiple
autonomous systems. In the networking field, the term BGP speaker refers to a networking
device that is running BGP. Two BGP speakers establish a connection before any routing
information is exchanged. The term BGP neighbor refers to a BGP speaker that has established
such a connection. After establishing the connection, the devices exchange routes and
synchronize their tables. Each device sends keep alive messages to keep this relationship alive.
Procedure
3 If BGP is not currently enabled, use the Enable BGP toggle to enable it.
Option Description
Enable Graceful Restart Specifies that packet forwarding is to remain uninterrupted when BGP
services are restarted.
Enable Default Originate Allows the edge gateway to advertise itself as a default gateway to its BGP
neighbors.
Local AS Required. Specify the autonomous system (AS) ID number to use for the
local AS feature of the protocol. The value you specify must be a globally
unique number between 1 and 65534.
The local AS is a feature of BGP. The system assigns the local AS number to
the edge gateway you are configuring. The edge gateway advertises this ID
when the edge gateway peers with its BGP neighbors in other autonomous
systems. The path of autonomous systems that a route would traverse is
used as one metric in the dynamic routing algorithm when selecting the best
path to a destination.
5 You can either click Save changes, or continue to configure settings for the BGP routing
neighbors.
6 Add a BGP neighbor configuration by clicking the Add ( ) button, specifying details
for the neighbor in the dialog box, and clicking Keep.
Option Description
IP Address Type the IP address of a BGP neighbor for this edge gateway.
Remote AS Type a globally unique number between 1-65534 for the autonomous
system to which this BGP neighbor belongs. This remote AS number is used
in the BGP neighbor's entry in the system's BGP neighbors table.
Weight The default weight for the neighbor connection. Adjust as appropriate for
your organization's needs.
Keep Alive Time The frequency with which the software sends keep alive messages to its
peer. The default frequency is 60 seconds. Adjust as appropriate for the
needs of your organization.
Option Description
Hold Down Time The interval for which the software declares a peer dead after not receiving
a keep alive message. This interval must be three times the keep alive
interval. The default interval is 180 seconds. Adjust as appropriate for the
needs of your organization.
Once peering between two BGP neighbors is achieved, the edge gateway
starts a hold down timer. Every keep alive message it receives from the
neighbor resets the hold down timer to 0. If the edge gateway fails to
receive three consecutive keep alive messages, so that the hold down timer
reaches three times the keep alive interval, the edge gateway considers the
neighbor down and deletes the routes from this neighbor.
BGP Filters Use this table to specify route filtering using a prefix list from this BGP
neighbor.
Add a filter to the table by clicking the + icon and configuring the options.
Click Keep to save each filter.
n Select the direction to indicate whether you are filtering traffic to or from
the neighbor.
n Select the action to indicate whether you are allowing or denying traffic.
n Type the network that you want to filter to or from the neighbor. Type
ANY or a network in a CIDR format.
What to do next
Configure BGP on the other edge gateways that you want to exchange routing information with.
Add a firewall rule that allows traffic to and from the BGP-configured edge gateways. See Add an
NSX Data Center for vSphere Edge Gateway Firewall Rule for information.
Procedure
3 Use the protocol toggles to turn on those protocols for which you want to enable route
redistribution.
c Click Keep.
5 Specify redistribution criteria for each IP prefix by clicking the Add ( ) button,
specifying the criteria in the dialog box, and clicking Keep.
Entries in the table are processed sequentially. Use the up and down arrows to adjust the
sequence.
Option Description
Prefix Name Select a specific IP prefix to apply this criteria to or select Any to apply the
criteria to all network routes.
Learner Protocol Select the protocol that is to learn routes from other protocols under this
redistribution criteria.
Allow learning from Select the types of networks from which routes can be learned for the
protocol selected in the Learner Protocol list.
Action Select whether to permit or deny redistribution from the selected types of
networks.
Load Balancing
The load balancer distributes incoming service requests among multiple servers in such a way
that the load distribution is transparent to users. Load balancing helps achieve optimal resource
utilization, maximizing throughput, minimizing response time, and avoiding overload.
Load balancing for an edge gateway is configured on the external interface because the
edge gateway load balances incoming traffic from the external network. When configuring
virtual servers for load balancing, specify one of the available IP addresses you have in your
organization VDC.
A socket-based load balancing strategy is implemented on top of the socket interface. Two
connections are established for a single request, a client-facing connection and a server-facing
connection. The server-facing connection is established after server selection. For HTTP socket-
based implementation, the whole request is received before sending to the selected server with
optional L7 manipulation. For HTTPS socket-based implementation, authentication information is
exchanged either on the client-facing connection or server-facing connection. Socket-based load
balancing is the default mode for TCP, HTTP, and HTTPS virtual servers.
The key concepts of the NSX load balancer are, virtual server, server pool, server pool member,
and service monitor.
Virtual Server
Server Pool
Service Monitor
Defines how to probe the health status of a back end server.
Application Profile
Represents the TCP, UDP, persistence, and certificate configuration for a given application.
Setup Overview
You begin by setting global options for the load balancer. You now create a server pool
consisting of back end server members and associate a service monitor with the pool to manage
and share the back end servers efficiently.
You then create an application profile to define the common application behavior in a load
balancer such as client SSL, server SSL, x-forwarded-for, or persistence. Persistence sends
subsequent requests with similar characteristic such as, source IP or cookie are required to
be dispatched to the same pool member, without running the load balancing algorithm. The
application profile can be reused across virtual servers.
You then create an optional application rule to configure application-specific settings for traffic
manipulation such as, matching a certain URL or hostname so that different requests can be
handled by different pools. Next, you create a service monitor that is specific to your application
or you may use an already existing service monitor if it meets your needs.
Optionally you can create an application rule to support advanced functionality of L7 virtual
servers. Some use cases for application rules include content switching, header manipulation,
security rules, and DOS protection.
Finally, you create a virtual server that connects your server pool, application profile, and any
potential application rules together.
When the virtual server receives a request, the load balancing algorithm considers pool member
configuration and runtime status. The algorithm then calculates the appropriate pool to distribute
the traffic comprising one or more members. The pool member configuration includes settings
such as, weight, maximum connection, and condition status. The runtime status includes current
connections, response time, and health check status information. The calculation methods can be
round-robin, weighted round-robin, least connection, source IP hash, weighted least connections,
URL, URI, or HTTP header.
Each pool is monitored by the associated service monitor. When the load balancer detects a
problem with a pool member, it is marked as DOWN. Only UP server is selected when choosing a
pool member from the server pool. If the server pool is not configured with a service monitor, all
the pool members are considered as UP.
Procedure
Option Action
Note L7 VIPs for HTTP and HTTPS are processed after the firewall, so
when you do not enable acceleration, an edge gateway firewall rule must
exist to allow access to the L7 VIP for those protocols. When you enable
acceleration, and the server pool is in a non-transparent mode, a SNAT
rule is added, so you must ensure that the firewall is enabled on the edge
gateway.
Enable Logging Enable logging so that the edge gateway load balancer collects traffic logs.
What to do next
Configure application profiles for the load balancer. See Create an Application Profile.
When you create a profile for HTTPS traffic, the following HTTPS traffic patterns are allowed:
n Client -> HTTPS -> LB (terminate SSL) -> HTTP -> servers
n Client -> HTTPS -> LB (terminate SSL) -> HTTPS -> servers
Procedure
Option Description
Type Select the protocol type used to send requests to the server. The list of
required parameters depends on the protocol you select. Parameters that
are not applicable to the protocol you selected cannot be entered. All other
parameters are required.
Enable SSL Passthrough Click to enable SSL authentication to be passed through to the virtual server.
Otherwise SSL authentication takes place at the destination address.
HTTP Redirect URL (HTTP and HTTPS) Enter the URL to which traffic that arrives at the
destination address should be redirected.
Cookie Name (HTTP and HTTPS) If you specified Cookie as the persistence mechanism,
enter the cookie name. Cookie persistence uses a cookie to uniquely identify
the session the first time a client accesses the site. The load balancer refers
to this cookie when connecting subsequent requests in the session, so that
they all go to the same virtual server.
Option Description
Mode Select the mode by which the cookie should be inserted. The following
modes are supported:
n Insert
The edge gateway sends a cookie. When the server sends one or more
cookies, the client will receive one extra cookie (the server cookies plus
the edge gateway cookie). When the server does not send any cookies,
the client will receive the edge gateway cookie only.
n Prefix
Select this option when your client does not support more than one
cookie.
Note All browsers accept multiple cookies. But you might have a
proprietary application using a proprietary client that supports only one
cookie. The Web server sends its cookie as usual. The edge gateway
injects (as a prefix) its cookie information in the server cookie value. This
cookie added information is removed when the edge gateway sends it
to the server.
n App Session For this option, the server does not
send a cookie. Instead, it sends the user session
information as a URL. For example, http://example.com/
admin/UpdateUserServlet;jsessionid=OI24B9ASD7BSSD, where
jsessionid is the user session information and is used for the
persistence. It is not possible to see the App Session persistence table
for troubleshooting.
Expires in (Seconds) Enter a length of time in seconds that persistence stays in effect. Must be a
positive integer in the range 1–86400.
Insert X-Forwarded-For HTTP (HTTP and HTTPS) Select Insert X-Forwarded-For HTTP header for
header identifying the originating IP address of a client connecting to a Web server
through the load balancer.
Note Using this header is not supported if you enabled SSL passthrough.
Enable Pool Side SSL (HTTPS Only) Select Enable Pool Side SSL to define the certificate, CAs, or
CRLs used to authenticate the load balancer from the server side in the Pool
Certificates tab.
6 (HTTPS only) Configure the certificates to be used with the application profile. If the
certificates you need do not exist, you can create them from the Certificates tab.
Option Description
Virtual Server Certificates Select the certificate, CAs, or CRLs used to decrypt HTTPS traffic.
Pool Certificates Define the certificate, CAs, or CRLs used to authenticate the load balancer
from the server side.
Option Description
Cipher Select the cipher algorithms (or cipher suite) negotiated during the SSL/TLS
handshake.
Note When set to Required, the client must provide a certificate after the
request or the handshake is canceled.
What to do next
Add service monitors for the load balancer to define health checks for different types of network
traffic. See Create a Service Monitor.
Procedure
Option Description
Interval Enter the interval at which a server is to be monitored using the specified
Method.
Timeout Enter the maximum time in seconds within which a response from the server
must be received.
Max Retries Enter the number of times the specified monitoring Method must fail
sequentially before the server is declared down.
Type Select the way in which you want to send the health check request to the
server—HTTP, HTTPS, TCP, ICMP, or UDP.
Depending on the type selected, the remaining options in the New Service
Monitor dialog are enabled or disabled.
Option Description
Expected (HTTP and HTTPS) Enter the string that the monitor expects to match in the
status line of the HTTP or HTTPS response (for example, HTTP/1.1).
Method (HTTP and HTTPS) Select the method to be used to detect server status.
URL (HTTP and HTTPS) Enter the URL to be used in the server status request.
Note When you select the POST method, you must specify a value for
Send.
Receive (HTTP, HTTPS, and UDP) Enter the string to be matched in the response
content.
Note When Expected is not matched, the monitor does not try to match
the Receive content.
Extension (ALL) Enter advanced monitor parameters as key=value pairs. For example,
warning=10 indicates that when a server does not respond within 10
seconds, its status is set as warning. All extension items should be separated
with a carriage return character. For example:
<extension>delay=2
critical=3
escape</extension>
no-body Does not wait for a document body and stops reading
after the HTTP/HTTPS header.
header=STRING Sends any other tags in the HTTP header. Use multiple
times for additional headers.
escape Allows for the use of \n, \r, \t, or \ in a send or quit
string. Must come before a send or quit option. By default,
nothing is added to send and \r\n is added to the end of
quit.
What to do next
Add server pools for your load balancer. See Add a Server Pool for Load Balancing.
Procedure
4 Type a name and, optionally, a description for the load balancer pool.
5 Select a balancing method for the service from the Algorithm drop-down menu:
Option Description
ROUND-ROBIN Each server is used in turn according to the weight assigned to it. This is the
smoothest and fairest algorithm when the server processing time remains
equally distributed.
IP-HASH Selects a server based on a hash of the source and destination IP address of
each packet.
Option Description
URI The left part of the URI (before the question mark) is hashed and divided by
the total weight of the running servers. The result designates which server
will receive the request. This option ensures that a URI is always directed to
the same server as long as the server does not go down.
HTTPHEADER HTTP header name is looked up in each HTTP request. The header name in
parenthesis is not case sensitive which is similar to the ACL 'hdr()' function.
If the header is absent or does not contain any value, the round robin
algorithm is applied. The HTTP HEADER algorithm parameter has one option
headerName=<name>. For example, you can use host as the HTTP HEADER
algorithm parameter.
URL URL parameter specified in the argument is looked up in the query string
of each HTTP GET request. If the parameter is followed by an equal sign
= and a value, then the value is hashed and divided by the total weight of
the running servers. The result designates which server receives the request.
This process is used to track user identifiers in requests and ensure that a
same user ID is always sent to the same server as long as no server goes up
or down. If no value or parameter is found, then a round robin algorithm is
applied. The URL algorithm parameter has one option urlParam=<url>.
d Enter the port at which the member is to receive traffic from the load balancer.
e Enter the monitor port at which the member is to receive health monitor requests.
f In the Weight text box, type the proportion of traffic this member is to handle. Must be an
integer in the range 1-256.
g (Optional) In the Max Connections text box, type the maximum number of concurrent
connections the member can handle.
When the number of incoming requests exceeds the maximum, requests are queued and
the load balancer waits for a connection to be released.
h (Optional) In the Min Connections text box, type the minimum number of concurrent
connections a member must always accept.
7 (Optional) To make client IP addresses visible to the back end servers, select Transparent.
When Transparent is not selected (the default value), back end servers see the IP address of
the traffic source as the internal IP address of the load balancer.
When Transparent is selected, the source IP address is the actual IP address of the client
and the edge gateway must be set as the default gateway to ensure that return packets go
through the edge gateway.
What to do next
Add virtual servers for your load balancer. A virtual server has a public IP address and services all
incoming client requests. See Add a Virtual Server.
Procedure
What to do next
Associate the new application rule to a virtual server added for the load balancer. See Add a
Virtual Server.
By default, the load balancer closes the server TCP connection after each client request.
Procedure
4 On the General tab, configure the following options for the virtual server:
Option Description
Application Profile Select an application profile to be associated with the virtual server.
IP Address Type or browse to select the IP address that the load balancer listens on.
Protocol Select the protocol that the virtual server accepts. You must select the same
protocol used by the selected Application Profile.
Port Type the port number that the load balancer listens on.
Default Pool Choose the server pool that the load balancer will use.
Connection Limit (Optional) Type the maximum concurrent connections that the virtual server
can process.
Connection Rate Limit (CPS) (Optional) Type the maximum incoming new connection requests per
second.
5 (Optional) To associate application rules with the virtual server, click the Advanced tab and
complete the following steps:
The application rules created for the load balancer appear. If necessary, add application
rules for the load balancer. See Add an Application Rule.
What to do next
Create an edge gateway firewall rule to permit traffic to the new virtual server (the destination IP
address). See Add an NSX Data Center for vSphere Edge Gateway Firewall Rule
As described in the NSX Administration Guide, the NSX edge gateway supports these VPN
services:
n SSL VPN-Plus, which allows remote users to access private corporate applications.
n IPsec VPN, which offers site-to-site connectivity between an NSX edge gateway and remote
sites which also have NSX or which have third-party hardware routers or VPN gateways.
n L2 VPN, which allows extension of your organization virtual data center by allowing
virtual machines to retain network connectivity while retaining the same IP address across
geographical boundaries.
Note vCloud Director does not support multiple VPN tunnels between the same two edge
gateways. If there is an existing tunnel between two edge gateways and you want to add
another subnet to the tunnel, delete the existing VPN tunnel and create a new one that includes
the new subnet.
After you configure VPN tunnels for an edge gateway, you can use a VPN client from a remote
location to connect to the organization virtual data center that is backed by that edge gateway.
In your vCloud Director environment, the edge gateway SSL VPN-Plus capability supports
network access mode. Remote users must install an SSL client to make secure connections and
access the networks and applications behind the edge gateway. As part of the edge gateway
SSL VPN-Plus configuration, you add the installation packages for the operating system and
configure certain parameters. See Add an SSL VPN-Plus Client Installation Package for details.
Prerequisites
Verify that all SSL certificates needed for the SSL VPN-Plus have been added to the Certificates
screen. See SSL Certificate Management.
Note On an edge gateway, port 443 is the default port for HTTPS. For the SSL VPN
functionality, the edge gateway HTTPS port must be accessible from external networks. The
SSL VPN client requires the edge gateway IP address and port that are configured in the Server
Settings screen on the SSL VPN-Plus tab to be reachable from the client system. See Configure
SSL VPN Server Settings.
Procedure
4 Add a Private Network for Use with SSL VPN-Plus on an Edge Gateway
Use the Private Networks screen on the SSL VPN-Plus tab to configure the private
networks. The private networks are the ones you want the VPN clients to have access
to, when the remote users connect using their VPN clients and the SSL VPN tunnel. The
enabled private networks will be installed in the routing table of the VPN client.
6 Add SSL VPN-Plus Users to the Local SSL VPN-Plus Authentication Server
Use the Users screen on the SSL VPN-Plus tab to add accounts for your remote users to the
local authentication server for the edge gateway SSL VPN service.
Procedure
What to do next
On the General screen, configure the default SSL VPN-Plus settings. See Customize the General
SSL VPN-Plus Settings for an Edge Gateway.
If your edge gateway is configured with multiple, overlay IP address networks on its external
interface, the IP address you select for the SSL VPN server can be different than the default
external interface of the edge gateway.
While configuring the SSL VPN server settings, you must choose which encryption algorithms to
use for the SSL VPN tunnel. You can choose one or more ciphers. Carefully choose the ciphers
according to the strengths and weaknesses of your selections.
By default, the system uses the default, self-signed certificate that the system generates for each
edge gateway as the default server identity certificate for the SSL VPN tunnel. Instead of this
default, you can choose to use a digital certificate that you have added to the system on the
Certificates screen.
Prerequisites
n Verify that you have met the prerequisites described in Configure SSL VPN-Plus.
n If you choose to use a service certificate different than the default one, import the required
certificate into the system. See Add a Service Certificate to the Edge Gateway.
Procedure
2 Click Enabled.
The TCP port number is used by the SSL client installation package. By default, the system
uses port 443, which is the default port for HTTPS/SSL traffic. Even though a port number is
required, you can set any TCP port for communications.
Note The SSL VPN client requires the IP address and port configured here to be reachable
from the client systems of your remote users. If you change the port number from the
default, ensure that the IP address and port combination are reachable from the systems of
your intended users.
Logging is enabled by default. You can change the level of messages to log or disable
logging.
7 (Optional) If you want to use a service certificate instead of the default system-generated
self-signed certificate, click Change server certificate, selection a certificate, and click OK.
What to do next
Note The edge gateway IP address and the TCP port number you set must be reachable by
your remote users. Add an edge gateway firewall rule that allows access to the SSL VPN-Plus IP
address and port configured in this procedure. See Add an NSX Data Center for vSphere Edge
Gateway Firewall Rule.
Add an IP pool so that remote users are assigned IP addresses when they connect using SSL
VPN-Plus. See Create an IP Pool for Use with SSL VPN-Plus on an Edge Gateway.
Each IP pool added in this screen results in an IP address subnet configured on the edge
gateway. The IP address ranges used in these IP pools must be different from all other networks
configured on the edge gateway.
Note SSL VPN assigns IP addresses to the remote users from the IP pools based on the order
the IP pools appear in the on-screen table. After you add the IP pools to the on-screen table, you
can adjust their positions in the table using the up and down arrows.
Prerequisites
Procedure
Option Action
Gateway Enter the IP address that you want the edge gateway to create and assign
as the gateway address for this IP pool.
When the IP pool is created, a virtual adapter is created on the edge
gateway virtual machine and this IP address is configured on that virtual
interface. This IP address can be any IP within the subnet that is not also in
the range in the IP Range field.
Primary DNS (Optional) Enter the name of the primary DNS server that will be used for
name resolution for these virtual IP addresses.
Secondary DNS (Optional) Enter the name of the secondary DNS server to use.
DNS Suffix (Optional) Enter the DNS suffix for the domain the client systems are hosted
on, for domain-based host name resolution.
WINS Server (Optional) Enter the WINS server address for the needs of your organization.
4 Click Keep.
Results
What to do next
Add private networks that you want accessible to your remote users connecting with SSL VPN-
Plus. See Add a Private Network for Use with SSL VPN-Plus on an Edge Gateway.
Add a Private Network for Use with SSL VPN-Plus on an Edge Gateway
Use the Private Networks screen on the SSL VPN-Plus tab to configure the private networks.
The private networks are the ones you want the VPN clients to have access to, when the remote
users connect using their VPN clients and the SSL VPN tunnel. The enabled private networks will
be installed in the routing table of the VPN client.
The private networks is a list of all reachable IP networks behind the edge gateway that you
want to encrypt traffic for a VPN client, or exclude from encrypting. Each private network that
requires access through an SSL VPN tunnel must be added as a separate entry. You can use
route summarization techniques to limit the number of entries.
n SSL VPN-Plus allows remote users to access private networks based on the top-down order
the IP pools appear in the on-screen table. After you add the private networks to the on-
screen table, you can adjust their positions in the table using the up and down arrows.
n If you select to enable TCP optimization for a private network, some applications such as
FTP in active mode might not work within that subnet. To add an FTP server configured in
active mode, you must add another private network for that FTP server and disable TCP
optimization for that private network. Also, the private network for that FTP server must be
enabled and appear in the on-screen table above the TCP-optimized private network.
Prerequisites
Procedure
Option Action
Option Action
Send Traffic Specify how you want the VPN client to send the private network and
Internet traffic.
n Over Tunnel
The VPN client sends the private network and Internet traffic over the
SSL VPN-Plus enabled edge gateway.
n Bypass Tunnel
The VPN client bypasses the edge gateway and sends the traffic directly
to the private server.
Enable TCP Optimization (Optional) To best optimize the Internet speed, when you select Over
Tunnel for sending the traffic, you must also select Enable TCP
Optimization
Selecting this option enhances the performance of TCP packets within the
VPN tunnel but does not improve performance of UDP traffic.
Conventional full-access SSL VPNs tunnel sends TCP/IP data in a
second TCP/IP stack for encryption over the Internet. This conventional
method encapsulates application layer data in two separate TCP streams.
When packet loss occurs, which can happen even under optimal
Internet conditions, a performance degradation effect called TCP-over-TCP
meltdown occurs. In TCP-over-TCP meltdown, two TCP instruments correct
the same single packet of IP data, undermining network throughput and
causing connection timeouts. Selecting Enable TCP Optimization eliminates
the risk of this TCP-over-TCP problem occurring.
Ports When you select Over Tunnel, type a range of port numbers that you want
opened for the remote user to access the internal servers, such as 20-21 for
FTP traffic and 80-81 for HTTP traffic.
To give unrestricted access to users, leave the field blank.
4 Click Keep.
What to do next
Add an authentication server. See Configure an Authentication Service for SSL VPN-Plus on an
Edge Gateway.
Important Add the corresponding firewall rules to allow network traffic to the private networks
you have added in this screen. See Add an NSX Data Center for vSphere Edge Gateway Firewall
Rule.
You can have only one local SSL VPN-Plus authentication server configured on the edge
gateway. If you click + LOCAL and specify additional authentication servers, an error message is
displayed when you try to save the configuration.
The maximum time to authenticate over SSL VPN is three (3) minutes. This maximum is
determined by the non-authentication timeout, which is 3 minutes by default and is not
configurable. As a result, if you have multiple authentication servers in chain authorization and
user authentication takes more than 3 minutes, the user will not be authenticated.
Prerequisites
n Add a Private Network for Use with SSL VPN-Plus on an Edge Gateway.
n If you intend to enable client certificate authentication, verify that a CA certificate has
been added to the edge gateway. See Add a CA Certificate to the Edge Gateway for SSL
Certificate Trust Verification.
Procedure
2 Click Local.
Option Description
Enable password policy Turn on enforcement of the password policy settings you configure here.
Password Length Enter the minimum and maximum allowed number of characters for
password length.
Minimum no. of alphabets (Optional) Type the minimum number of alphabetic characters, that are
required in the password.
Minimum no. of digits (Optional) Type the minimum number of numeric characters, that are
required in the password.
Minimum no. of special characters (Optional) Type the minimum number of special characters, such as
ampersand (&), hash tag (#), percent sign (%) and so on, that are
required in the password.
Password should not contain user (Optional) Enable to enforce that the password must not contain the user
ID ID.
Password expires in (Optional) Type the maximum number of days that a password can exist
before the user must change it.
Expiry notification in (Optional) Type the number of days prior to the Password expires in
value at which the user is notified the password is about to expire.
Option Description
Enable account lockout policy Turn on enforcement of the account lockout policy settings you
configure here.
Retry Count Enter the number of times a user can try to access their account.
Retry Duration Enter the time period in minutes in which the user account gets locked on
unsuccessful login attempts.
For example, if you specify the Retry Count as 5 and Retry Duration
as 1 minute, the account of the user is locked after 5 unsuccessful login
attempts within 1 minute.
Lockout Duration Enter the time period for which the user account remains locked.
After this time has elapsed, the account is automatically unlocked.
Options Description
Use this server for secondary (Optional) Specify whether to use the server as the second level of
authentication authentication.
Terminate session if authentication (Optional) Specify whether to end the VPN session when authentication
fails fails.
e Click Keep.
4 (Optional) To enable client certification authentication, click Change certificate, then turn on
the enablement toggle, select the CA certificate to use, and click OK.
What to do next
Add local users to the local authentication server so that they can connect with SSL VPN-Plus.
See Add SSL VPN-Plus Users to the Local SSL VPN-Plus Authentication Server.
Create an installation package containing the SSL Client so remote users can install it on their
local systems. See Add an SSL VPN-Plus Client Installation Package.
Add SSL VPN-Plus Users to the Local SSL VPN-Plus Authentication Server
Use the Users screen on the SSL VPN-Plus tab to add accounts for your remote users to the
local authentication server for the edge gateway SSL VPN service.
Note If a local authentication server is not already configured, adding a user on the Users screen
automatically adds a local authentication server with default values. You can then use the edit
button on the Authentication screen to view and edit the default values. For information about
using the Authentication screen, see Configure an Authentication Service for SSL VPN-Plus on an
Edge Gateway.
Prerequisites
Procedure
Option Description
Option Description
Password never expires (Optional) Specify whether to keep the same password for this user forever.
Allow change password (Optional) Specify whether to let the user change the password.
Change password on next login (Optional) Specify whether you want this user to change the password the
next time the user logs in.
4 Click Keep.
What to do next
Add local users to the local authentication server so that they can connect with SSL VPN-Plus.
See Add SSL VPN-Plus Users to the Local SSL VPN-Plus Authentication Server.
Create an installation package containing the SSL Client so the remote users can install it on their
local systems. See Add an SSL VPN-Plus Client Installation Package.
You can add an SSL VPN-Plus client installation package to the edge gateway. New users are
prompted to download and install this package when they log in to use the VPN connection for
the first time. When added, these client installation packages are then downloadable from the
FQDN of the edge gateway's public interface.
You can create installation packages that run on Windows, Linux, and Mac operating systems. If
you require different installation parameters per SSL VPN client, create an installation package
for each configuration.
Prerequisites
Procedure
1 On the SSL VPN-Plus tab in the tenant portal, click Installation Packages.
Option Description
Gateway Enter the IP address or FQDN of the edge gateway public interface.
The IP address or FQDN that you enter is bound to the SSL VPN client.
When the client is installed on the local system of the remote user, this IP
address or FQDN is displayed on that SSL VPN client.
To bind additional edge gateway uplink interfaces to this SSL VPN client,
click the Add ( ) button to add rows and type in their interface
IP addresses or FQDNs, and ports.
Port (Optional) To modify the port value from the displayed default, double-click
the value and enter a new value.
Windows Select the operating systems for which you want to create the installation
Linux packages.
Mac
Option Description
Start client on logon Starts the SSL VPN client when the remote user logs in to their local system.
Allow remember password Enables the client to remember the user password.
Enable silent mode installation Hides installation commands from remote users.
Hide SSL client network adapter Hides the VMware SSL VPN-Plus Adapter which is installed on the computer
of the remote user, together with the SSL VPN client installation package.
Hide client system tray icon Hides the SSL VPN tray icon which indicates whether the VPN connection is
active or not.
Create desktop icon Creates an icon on the user desktop to invoke the SSL client.
Enable silent mode operation Hides the window that indicates that installation is complete.
Server security certificate validation The SSL VPN client validates the SSL VPN server certificate before
establishing the secure connection.
5 Click Keep.
What to do next
Edit the client configuration. See Edit SSL VPN-Plus Client Configuration.
Prerequisites
Procedure
n In split tunnel mode, only the VPN traffic flows through the edge gateway.
n In full tunnel mode, the edge gateway becomes the default gateway for the remote user
and all traffic, such as VPN, local, and Internet, flows through the edge gateway.
3 If you select full tunnel mode, enter the IP address for the default gateway used by the
clients of the remote users and, optionally, select whether to exclude local subnet traffic from
flowing through the VPN tunnel.
Enable auto reconnect is enabled by default. If auto reconnect is enabled, the SSL VPN client
automatically reconnects users when they get disconnected.
5 (Optional) Optionally enable the ability for the client to notify remote users when a client
upgrade is available.
This option is disabled by default. If you enable this option, remote users can choose to install
the upgrade.
Prerequisites
Procedure
2 Edit the general settings as required for the needs of your organization.
Option Description
Prevent multiple logon using same Turn on to restrict a remote user to having only one active login session
username under the same user name.
Compression Turn on to enable TCP-based intelligent data compression and improve data
transfer speed.
Enable Logging Turn on to maintain a log of the traffic that passes through the SSL VPN
gateway.
Logging is enabled by default.
Force virtual keyboard Turn on to require remote users to use a virtual (on-screen) keyboard only
to enter login information.
Randomize keys of virtual keyboard Turn on to have the virtual keyboard use a randomized key layout.
User notification Type the message to be displayed to remote users after they log in.
Enable public URL access Turn on to allow remote users to access sites that are not explicitly
configured by you for remote user access.
Enable forced timeout Turn on to have the system disconnect remote users after the time period
that you specify in the Forced timeout field is over.
Setting up an IPsec VPN connection from a remote network to your organization virtual data
center is the most common scenario. The NSX software provides an edge gateway IPsec
VPN capabilities, including support for certificate authentication, preshared key mode, and IP
unicast traffic between itself and remote VPN routers. You can also configure multiple subnets
to connect through IPsec tunnels to the internal network behind an edge gateway. When you
configure multiple subnets to connect through IPsec tunnels to the internal network, those
subnets and the internal network behind the edge gateway must not have address ranges that
overlap.
Note If the local and remote peer across an IPsec tunnel have overlapping IP addresses, traffic
forwarding across the tunnel might not be consistent depending on whether local connected
routes and auto-plumbed routes exist.
n AES (AES128-CBC)
n AES256 (AES256-CBC)
n AES-GCM (AES128-GCM)
Note Dynamic routing protocols are not supported with IPsec VPN. When you configure
an IPsec VPN tunnel between an edge gateway of the organization virtual data center and
a physical gateway VPN at a remote site, you cannot configure dynamic routing for that
connection. The IP address of that remote site cannot be learned by dynamic routing on the
edge gateway uplink.
As described in the IPSec VPN Overview topic in the NSX Administration Guide, the maximum
number of tunnels supported on an edge gateway is determined by its configured size: compact,
large, x-large, quad large.
To view the size of your edge gateway configuration, navigate to the edge gateway and click the
edge gateway name.
Note If a firewall is between the tunnel endpoints, after you configure the IPsec VPN service,
update the firewall rules to allow the following IP protocols and UDP ports:
n IP Protocol ID 50 (ESP)
n IP Protocol ID 51 (AH)
Procedure
2 Configure the IPsec VPN Site Connections for the Edge Gateway
Use the IPsec VPN Sites screen in the vCloud Director tenant portal to configure settings
needed to create an IPsec VPN connection between your organization virtual data center
and another site using the edge gateway IPsec VPN capabilities.
Procedure
What to do next
Use the IPsec VPN Sites screen to configure an IPsec VPN connection. At least one connection
must be configured before you can enable the IPsec VPN service on the edge gateway. See
Configure the IPsec VPN Site Connections for the Edge Gateway.
Configure the IPsec VPN Site Connections for the Edge Gateway
Use the IPsec VPN Sites screen in the vCloud Director tenant portal to configure settings needed
to create an IPsec VPN connection between your organization virtual data center and another
site using the edge gateway IPsec VPN capabilities.
When you configure an IPsec VPN connection between sites, you configure the connection
from the point of view of your current location. Setting up the connection requires that you
understand the concepts in the context of the vCloud Director environment so that you configure
the VPN connection correctly.
n The local and peer subnets specify the networks to which the VPN connects. When you
specify these subnets in the configurations for IPsec VPN sites, enter a network range and
not a specific IP address. Use CIDR format, such as 192.168.99.0/24.
n The peer ID is an identifier that uniquely identifies the remote device that terminates the VPN
connection, typically its public IP address. For peers using certificate authentication, this ID
must be the distinguished name set in the peer certificate. For PSK peers, this ID can be any
string. An NSX best practice is to use the public IP address of the remote device or FQDN as
the peer ID. If the peer IP address is from another organization virtual data center network,
you enter the native IP address of the peer. If NAT is configured for the peer, you enter the
peer's private IP address.
n The peer endpoint specifies the public IP address of the remote device to which you are
connecting. The peer endpoint might be a different address from the peer ID if the peer's
gateway is not directly accessible from the Internet, but connects through another device. If
NAT is configured for the peer, you enter the public IP address that the devices uses for NAT.
n The local ID specifies the public IP address of the edge gateway of the organization virtual
data center. You can enter an IP address or hostname along with the edge gateway firewall.
n The local endpoint specifies the network in your organization virtual data center on which
the edge gateway transmits. Typically the external network of the edge gateway is the local
endpoint.
Prerequisites
n If you intend to use a global certificate as the authentication method, verify that certificate
authentication is enabled on the Global Configuration screen. See Specify Global IPsec VPN
Settings.
Procedure
Option Action
Enable perfect forward secrecy Enable this option to have the system generate unique public keys for all
(PFS) IPsec VPN sessions your users initiate.
Enabling PFS ensures that the system does not create a link between the
edge gateway private key and each session key.
The compromise of a session key will not affect data other than the
data exchanged in the specific session protected by that particular key.
Compromise of the server's private key cannot be used to decrypt archived
sessions or future sessions.
When PFS is enabled, IPsec VPN connections to this edge gateway
experience a slight processing overhead.
Important The unique session keys must not be used to derive any
additional keys. Also, both sides of the IPsec VPN tunnel must support PFS
for it to work.
Local ID Enter the external IP address of the edge gateway instance, which is the
public IP address of the edge gateway.
The IP address is the one used for the peer ID in the IPsec VPN configuration
on the remote site.
Local Endpoint Enter the network that is the local endpoint for this connection.
The local endpoint specifies the network in your organization virtual data
center on which the edge gateway transmits. Typically, the external network
is the local endpoint.
If you add an IP-to-IP tunnel using a pre-shared key, the local ID and local
endpoint IP can be the same.
Local Subnets Enter the networks to share between the sites and use a comma as a
separator to enter multiple subnets.
Enter a network range (not a specific IP address) by entering the IP address
using CIDR format. For example, 192.168.99.0/24.
Peer Endpoint Enter the IP address or FQDN of the peer site, which is the public-facing
address of the remote device to which you are connecting.
Note When NAT is configured for the peer, enter the public IP address that
the device uses for NAT.
Option Action
Peer Subnets Enter the remote network to which the VPN connects and use a comma as a
separator to enter multiple subnets.
Enter a network range (not a specific IP address) by entering the IP address
using CIDR format. For example, 192.168.99.0/24.
Encryption Algorithm Select the encryption algorithm type from the drop-down menu.
Note The encryption type you select must match the encryption type
configured on the remote site VPN device.
Pre Shared Key (PSK) specifies that the secret key shared between the
edge gateway and the peer site is to be used for authentication.
n Certificate
Change Shared Key (Optional) When you are updating the settings of an existing connection,
you can turn on this option on to make the Pre-Shared Key field available so
that you can update the shared key.
Pre-Shared Key If you selected PSK as the authentication type, type an alphanumeric secret
string which can be a string with a maximum length of 128 bytes.
Note The shared key must match the key that is configured on the
remote site VPN device. A best practice is to configure a shared key when
anonymous sites will connect to the VPN service.
Display Shared Key (Optional) Enable this option to make the shared key visible in the screen.
Diffie-Hellman Group Select the cryptography scheme that allows the peer site and this edge
gateway to establish a shared secret over an insecure communications
channel.
5 Click Keep.
What to do next
Configure the connection for the remote site. You must configure the IPsec VPN connection on
both sides of the connection: your organization virtual data center and the peer site.
Enable the IPsec VPN service on this edge gateway. When at least one IPsec VPN connection is
configured, you can enable the service. See Enable the IPsec VPN Service on an Edge Gateway.
Prerequisites
n Verify that at least one IPsec VPN connection is configured for this edge gateway. See the
steps described in Configure the IPsec VPN Site Connections for the Edge Gateway.
Procedure
2 Click IPsec VPN Service Status to enable the IPsec VPN service.
Results
A global pre-shared key is used for those sites whose peer endpoint is set to any.
Prerequisites
n If you intend to enable certificate authentication, verify that you have at least one service
certificate and corresponding CA-signed certificates in the Certificates screen. Self-signed
certificates cannot be used for IPsec VPNs. See Add a Service Certificate to the Edge
Gateway.
Procedure
The global pre-shared key (PSK) is shared by all the sites whose peer endpoint is set to
any. If a global PSK is already set, changing the PSK to an empty value and saving it has
no effect on the existing setting.
c (Optional) Optionally enable Display Shared Key to make the pre-shared key visible.
What to do next
You can optionally enable logging for the IPsec VPN service of the edge gateway. See Statistics
and Logs for an Edge Gateway.
Configure L2 VPN
The edge gateways in a vCloud Director environment support L2 VPN. With L2 VPN, you can
extend your organization virtual data center by enabling virtual machines to maintain network
connectivity while retaining the same IP address across geographical boundaries. You can
configure the L2 VPN service on an edge gateway.
NSX Data Center for vSphere provides the L2 VPN capabilities of an edge gateway. With L2
VPN, you can configure a tunnel between two sites. Virtual machines remain on the same subnet
despite being moved between these sites, which enables you to extend your organization virtual
data center by stretching its network using L2 VPN. An edge gateway at one site can provide all
services to virtual machines on the other site.
To create the L2 VPN tunnel, you configure an L2 VPN server and L2 VPN client. As described
in the NSX Administration Guide, the L2 VPN server is the destination edge gateway and the
L2 VPN client is the source edge gateway. After configuring the L2 VPN settings on each edge
gateway, you must then enable the L2 VPN service on both the server and the client.
Note A routed organization virtual data center network created as a subinterface must exist on
the edge gateways.
Procedure
What to do next
Configure the L2 VPN server. See Configure the Edge Gateway as an L2 VPN Server.
As described in the NSX Administration Guide, you can connect multiple peer sites to this L2 VPN
server.
Note Changing site configuration settings causes the edge gateway to disconnect and
reconnect all existing connections.
Prerequisites
n Verify that the edge gateway has a routed organization virtual data center network that is
configured as a subinterface on the edge gateway.
n If you want to bind a service certificate to the L2 VPN connection, verify that the server
certificate has already been uploaded to the edge gateway. See Add a Service Certificate to
the Edge Gateway.
n You must have the listener IP of the server, listener port, encryption algorithm, and at least
one peer site configured before you can enable the L2 VPN service.
Procedure
2 On the Server Global tab, configure the L2 VPN server's global configuration details.
Option Action
Listener Port Edit the displayed value as appropriate for the needs of your organization.
The default port for the L2 VPN service is 443.
Option Action
Encryption Algorithm Select the encryption algorithm for the communication between the server
and the client.
Service Certificate Details Click Change server certificate to select the certificate to be bound to the
L2 VPN server.
In the Change Server Certificate window, turn on Validate Server
Certificate, select a server certificate from the list, and click OK.
Option Action
User ID Enter the user name and password with which the peer site is to be
Password authenticated.
Confirm Password User credentials on the peer site must be the same as the credentials on the
client side.
Stretched Interfaces Select at least one subinterface to be stretched with the client.
The subinterfaces available for selection are those organization virtual data
center networks configured as subinterfaces on the edge gateway.
Egress Optimization Gateway (Optional) If the default gateway for virtual machines is the same across the
Address two sites, enter the gateway IP addresses of the subinterfaces for which you
want the traffic locally routed or blocked over the L2 VPN tunnel.
6 Click Keep.
What to do next
Enable the L2 VPN service on this edge gateway. See Enable the L2 VPN Service on an Edge
Gateway.
Prerequisites
n If this L2 VPN client is connecting to an L2 VPN server that uses a server certificate, verify
that the corresponding CA certificate is uploaded to the edge gateway to enable server
certificate validation for this L2 VPN client. See Add a CA Certificate to the Edge Gateway for
SSL Certificate Trust Verification.
Procedure
2 On the Client Global tab, configure the global configuration details of the L2 VPN client.
Option Description
Server Address Enter the IP address of the L2 VPN server to which this client is to be
connected.
Server Port Enter the L2 VPN server port to which the client should connect.
The default port is 443.
Encryption Algorithm Select the encryption algorithm for communicating with the server.
Egress Optimization Gateway (Optional) If the default gateway for virtual machines is the same across
Address the two sites, type the gateway IP addresses of the subinterfaces or the IP
addresses to which traffic should not flow over the tunnel.
User Details Enter the user ID and password for authentication with the server.
5 If this L2 VPN client edge does not have direct access to the Internet, and must reach the L2
VPN server edge by using a proxy server, specify the proxy settings.
Option Description
6 To enable server certification validation, click Change CA certificate and select the
appropriate CA certificate.
What to do next
Enable the L2 VPN service on this edge gateway. See Enable the L2 VPN Service on an Edge
Gateway.
Note If HA is already configured on this edge gateway, ensure that the edge gateway has more
than one internal interface configured on it. If only a single interface exists and that has already
been used by the HA capability, the L2 VPN configuration on the same internal interface fails.
Prerequisites
n If this edge gateway is an L2 VPN server, the destination NSX edge, verify that the required
L2 VPN server settings and at least one L2 VPN peer site are configured. See the steps
described in Configure the Edge Gateway as an L2 VPN Server.
n If this edge gateway is an L2 VPN client, the source NSX edge, verify that the L2 VPN client
settings are configured. See the steps described in Configure the Edge Gateway as an L2
VPN Client.
Procedure
Results
What to do next
Create NAT or firewall rules on the Internet-facing firewall side to enable the L2 VPN server to
connect to the L2 VPN client.
Prerequisites
Procedure
1 Scroll down to the bottom of the L2 VPN screen, and click Delete configuration.
Results
The L2 VPN service is disabled and the configuration details are removed from the edge
gateway.
The edge gateways in your vCloud Director environment support self-signed certificates,
certificates signed by a Certification Authority (CA), and certificates generated and signed by
a CA. Yyou can generate certificate signing requests (CSRs), import the certificates, manage the
imported certificates, and create certificate revocation lists (CRLs).
n IPsec VPN tunnels between an organization virtual data center network and a remote
network.
n SSL VPN-Plus connections between remote users to private networks and web resources in
your organization virtual data center.
n The virtual servers and pools servers configured for load balancing in your organization
virtual data center
The main benefit of implementing client certificates is that a reference client certificate for each
remote user can be stored and checked against the client certificate presented by the remote
user. To prevent future connections from a certain user, you can delete the reference certificate
from the security server list of client certificates. Deleting the certificate denies connections from
that user.
A CSR is an encoded file that you need to generate on an NSX edge gateway which requires an
SSL certificate. Using a CSR standardizes the way that companies send their public keys together
with information that identifies their company names and domain names.
You generate a CSR with a matching private-key file that must remain on the edge gateway.
The CSR contains the matching public key and other information such as the name, location, and
domain name of your organization.
Procedure
Option Description
Common Name Enter the fully qualified domain name (FQDN) for the organization that you
will be using the certificate for (for example, www.example.com).
Do not include the http:// or https:// prefixes in your common name.
Organization Unit Use this field to differentiate between divisions within your vCloud
Director organization with which this certificate is associated. For example,
Engineering or Sales.
Organization Name Enter the name under which your company is legally registered.
The listed organization must be the legal registrant of the domain name in
the certificate request.
Locality Enter the city or locality where your company is legally registered.
State or Province Name Enter the full name (do not abbreviate) of the state, province, region, or
territory where your company is legally registered.
Country Code Enter the country name where your company is legally registered.
Private Key Algorithm Type the key type, either RSA or DSA, for the certificate.
RSA is typically used. The key type defines the encryption algorithm for
communication between the hosts.
5 Click Keep.
The system generates the CSR and adds a new entry with type CSR to the on-screen list.
Results
In the on-screen list, when you select an entry with type CSR, the CSR details are displayed in the
screen. You can copy the displayed PEM formatted data of the CSR and submit it to a certificate
authority (CA) to obtain a CA-signed certificate.
What to do next
Use the CSR to create a service certificate using one of these two options:
n Transmit the CSR to a CA to obtain a CA-signed certificate. When the CA sends you the
signed certificate, import the signed certificate into the system. See Import the CA-Signed
Certificate Corresponding to the CSR Generated for an Edge Gateway.
n Use the CSR to create a self-signed certificate. See Configure a Self-Signed Service
Certificate.
Prerequisites
Verify that you obtained the CA-signed certificate that corresponds to the CSR. If the private key
in the CA-signed certificate does not match the one for the selected CSR, the import process
fails.
Procedure
3 Select the CSR in the on-screen table for which you are importing the CA-signed certificate.
n If the data is in a PEM file on a system you can navigate to, click the Upload button to
browse to the file and select it.
n If you can copy and paste the PEM data, paste it into the Signed Certificate (PEM
format) field.
d Click Keep.
Note If the private key in the CA-signed certificate does not match the one for the CSR
you selected on the Certificates screen, the import process fails.
Results
The CA-signed certificate with type Service Certificate appears in the on-screen list.
What to do next
Attach the CA-signed certificate to your SSL VPN-Plus or IPsec VPN tunnels as required. See
Configure SSL VPN Server Settings and Specify Global IPsec VPN Settings.
If the service certificate is available on the Certificates screen, you can specify that service
certificate when you configure the VPN-related settings of the edge gateway. The VPN presents
the specified service certificate to the clients accessing the VPN.
Prerequisites
Verify that at least one CSR is available on the Certificates screen for the edge gateway. See
Generate a Certificate Signing Request for an Edge Gateway.
Procedure
3 Select the CSR in the list that you want to use for this self-signed certificate and click Self-
sign CSR.
4 Type the number of days that the self-signed certificate is valid for.
5 Click Keep.
The system generates the self-signed certificate and adds a new entry with type Service
Certificate to the on-screen list.
Results
The self-signed certificate is available on the edge gateway. In the on-screen list, when you select
an entry with type Service Certificate, its details are displayed in the screen.
You usually add the root certificate of your company or organization as a CA certificate. A
typical use is for SSL VPN, where you want to authenticate VPN clients using certificates. Client
certificates can be distributed to the VPN clients and when the VPN clients connect, their client
certificates are validated against the CA certificate.
Note When adding a CA certificate, you typically configure a relevant Certificate Revocation List
(CRL). The CRL protects against clients that present revoked certificates. See Add a Certificate
Revocation List to an Edge Gateway.
Prerequisites
Verify that you have the CA certificate data in PEM format. In the user interface, you can either
paste in the PEM data of the CA certificate or browse to a file that contains the data and is
available in your network from your local system.
Procedure
3 Click CA certificate.
n If the data is in a PEM file on a system you can navigate to, click the Upload button to
browse to the file and select it.
n If you can copy and paste the PEM data, paste it into the CA Certificate (PEM format)
field.
6 Click Keep.
Results
The CA certificate with type CA Certificate appears in the on-screen list. This CA certificate is now
available for you to specify when you configure the VPN-related settings of the edge gateway.
As described in the NSX Administration Guide, the CRL contains the following items:
When a potential user attempts to access a server, the server allows or denies access based on
the CRL entry for that particular user.
Procedure
3 Click CRL.
n If the data is in a PEM file on a system you can navigate to, click the Upload button to
browse to the file and select it.
n If you can copy and paste the PEM data, paste it into the CRL (PEM format) field.
Include the -----BEGIN X509 CRL----- and -----END X509 CRL----- lines.
6 Click Keep.
Results
Prerequisites
Verify that you have the service certificate and its private key in PEM format. In the user
interface, you can either paste in the PEM data or browse to a file that contains the data and
is available in your network from your local system.
Procedure
n If the data is in a PEM file on a system you can navigate to, click the Upload button to
browse to the file and select it.
n If you can copy and paste the PEM data, paste it into the Service Certificate (PEM
format) field.
n If the data is in a PEM file on a system you can navigate to, click the Upload button to
browse to the file and select it.
n If you can copy and paste the PEM data, paste it into the Private Key (PEM format) field.
Include the -----BEGIN RSA PRIVATE KEY----- and -----END RSA PRIVATE
KEY----- lines.
8 Click Keep.
Results
The certificate with type Service Certificate appears in the on-screen list. This service certificate
is now available for you to select when you configure the VPN-related settings of the edge
gateway.
You create an IP set by using the Grouping Objects page of the vCloud Director tenant portal.
The Grouping Objects page is available on both the Services and Edge Gateway screens.
Procedure
Option Action
The IP sets that are already defined are displayed on the screen.
4 Enter a name, optionally, a description for the IP set, and the IP addresses to be included in
the set.
5 (Optional) If you are specifying the IP set using the Grouping Objects page on the Services
screen, use the Inheritance toggle to enable inheritance and allow visibility at the underlying
scopes.
Results
The new IP set is available for selection as the source or destination in firewall rules or in DHCP
relay configurations.
You create a MAC set using the Grouping Objects page of the vCloud Director tenant portal. The
Grouping Objects page is available on both the Services and Edge Gateway screens.
Procedure
Option Action
The MAC sets that are already defined are displayed on the screen.
4 Enter a name for the set, optionally, a description, and the MAC addresses to be included in
the set.
5 (Optional) If you are specifying the MAC set using the Grouping Objects page on the
Services screen, use the Inheritance toggle to enable inheritance and allow visibility at
underlying scopes.
Results
The new MAC set is available for selection as the source or destination in firewall rules.
You can view the available services using the Grouping Objects page of the vCloud Director
tenant portal. The Grouping Objects page is available on both the Services and Edge Gateway
screens.
You cannot add new services to the list using the tenant portal. The set of services available for
your use is managed by your vCloud Director system administrator.
Procedure
Option Action
Results
You can view the available service groups using the Grouping Objects page of the vCloud
Director tenant portal. The Grouping Objects page is available on both the Services and Edge
Gateway screens.
You cannot create service groups using the tenant portal. The set of service groups available for
your use is managed by your vCloud Director system administrator.
Procedure
Option Action
Results
The available service groups are displayed on the screen. The Description column displays the
services that are grouped in each service group.
View Statistics
You can view statistics on the Edge Gateway Services screen.
Procedure
3 Navigate through the tabs depending on the type of statistics you want to see.
Option Description
Connections The Connections screen provides operational visibility. The screen displays
graphs for the traffic flowing through the interfaces of the selected edge
gateway and connection statistics for the firewall and load balancer services.
Select the period for which you want to view the statistics.
IPsec VPN The IPsec VPN screen displays the IPsec VPN status and statistics, and
status and statistics for each tunnel.
L2 VPN The L2 VPN screen displays the L2 VPN status and statistics.
Enable Logging
You can enable logging for an edge gateway. In addition to enabling logging for the features for
which you want to collect log data, to complete the configuration, you must have a Syslog server
to receive the collected log data. When you configure a Syslog server on the Edge Settings
screen, you are able to access the logged data from that Syslog server.
Prerequisites
This operation requires the rights included in the predefined Organization Administrator role or
an equivalent set of rights.
Procedure
2 On the Edge Settings tab, click the Edit Syslog server button.
You can customize the Syslog server for the networking-related logs of your edge gateway
for those services that have logging enabled.
If the vCloud Director system administrator has already configured a Syslog server for
the vCloud Director environment, the system uses that Syslog server by default and its IP
address is displayed on the Edge Settings screen.
n On the NAT tab, click the DNAT Rule button, and turn on the Enable logging toggle.
n On the NAT tab, click the SNAT Rule button, and turn on the Enable logging toggle.
n On the Routing tab, click Routing Configuration, and under Dynamic Routing
Configuration, turn on the Enable logging toggle.
Logs the dynamic routing activities. From the Log Level drop-down menu, you can select
the lower bound of the message status level to log.
n On the Load Balancer tab, click Global Configuration, and turn on the Enable logging
toggle.
Logs the traffic flow for the load balancer. From the Log Level drop-down menu, you can
select the lower bound of the message status level to log.
n On the VPN tab, navigate to IPSec VPN > Logging Settings, and turn on the Enable
logging toggle.
Logs the traffic flow between the local subnet and peer subnet. From the Log Level
drop-down menu, you can select the lower bound of the message status level to log.
n On the SSL VPN-Plus tab, click General Settings, and turn on the Enable logging toggle.
Maintains a log of the traffic passing through the SSL VPN gateway.
n On the SSL VPN-Plus tab, click Server Settings, and turn on the Enable logging toggle.
Logs the activities that occur on the SSL VPN server, for Syslog. From the Log Level
drop-down menu, you can select the lower bound of the message status level to log.
Procedure
Option Description
Username Enter the credentials for the SSH access to this edge gateway.
Password By default, the SSH user name is admin.
Retype Password
Password Expiry Enter the expiration period for the password, in days.
Login Banner Enter the text to be displayed to users when they begin an SSH connection
to the edge gateway.
What to do next
Configure the appropriate NAT or firewall rules to allow an SSH access to this edge gateway.
A common use case for security tags is to dynamically group objects to simplify firewall rules.
For example, you might create several different security tags based on the type of activity you
expect to occur on a given virtual machine. You create a security tag for database servers and
another one for email servers. Then you apply the appropriate tag to virtual machines that house
database servers or email servers. Later, you can assign the tag to a security group, and write
a firewall rule against it, applying different security settings depending on whether the virtual
machine is running a database server or an email server. Later, if you change the functionality of
the virtual machine, you can remove the virtual machine from the security tag rather than editing
the firewall rule.
You create a security tag and assign it to a virtual machine or a group of virtual machines.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and under Networking, select Security.
4 Click the Create ( ) button, and enter a name for the security tag.
6 (Optional) Assign the security tag to a virtual machine or a group of virtual machines.
In the Browse objects of type drop-down menu, Virtual Machines is selected by default.
a Select a virtual machine from the left panel.
b Assign the security tag to the selected virtual machine by clicking the right arrow.
The virtual machine moves to the right panel and is assigned the security tag.
7 When you complete assigning the tag to the selected virtual machines, click Keep.
Results
The security tag is created, and if you chose, is assigned to selected virtual machines.
What to do next
Security tags are designed to work with a security group. For more information about creating
security groups, see Create a Security Group.
If you have created security tags, you can assign them to virtual machines. You can use security
tags to group virtual machines for writing firewall rules. For example, you might assign a security
tag to a group of virtual machines with highly sensitive data.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and under Networking, select Security.
4 From the list of security tags, select the security tag that you want to edit, and click the Edit
( ) button..
5 Select virtual machines from the left panel, and assign the security tag to them by clicking the
right arrow.
The virtual machines in the right panel are assigned the security tag.
6 Select virtual machines in the right panel, and remove the tag from them by clicking the left
arrow.
The virtual machines in the left panel do not have the security tag assigned.
Results
What to do next
Security tags are designed to work with a security group. For more information about creating
security groups, see Create a Security Group.
Prerequisites
A security tag must have been created and applied to a virtual machine or to a security group.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and under Networking, select Security.
a On the Security Tags tab, select the security tag for which you want to see assignments,
and click the Edit icon.
b Under the Assign/Unassign VMs, you can see the list of virtual machines assigned to the
security tag.
c Click Discard.
c From the list under Include Members, you can see the security tag assigned to a security
group.
Results
You can view the existing security tags and associated virtual machines and security groups. This
way, you can determine a strategy for creating firewall rules based on security tags and security
groups.
If you change the environment or function of a virtual machine, you might also want to use a
different security tag so that firewall rules are correct for the new machine configuration. For
example, if you have a virtual machine where you no longer store sensitive data, you might want
to assign a different security tag so that firewall rules that apply to sensitive data is no longer run
against the virtual machine.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and under Networking, select Security.
4 From the list of security tags, select the security tag that you want to edit.
7 Assign the tag to or remove the assignment from the virtual machines that you select.
What to do next
If you edit a security tag, you might also need to edit an associated security group or firewall
rules. For more information about security groups, see Working with Security Groups
You might want to delete a security tag if the function or environment of the virtual machine
changes. For example, if you have a security tag for Oracle databases, but you decide to use
a different database server, you can remove the security tag so that firewall rules that apply to
Oracle databases no longer run against the virtual machine.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore, and under Networking, select Security.
4 From the list of security tags, select the security tag that you want to delete.
Results
What to do next
If you delete a security tag, you might also need to edit an associated security group or firewall
rules. For more information about security groups, see Working with Security Groups.
Security groups can have dynamic membership criteria based on security tags, virtual machine
name, virtual machine guest OS name, or virtual machine guest host name. For example, all
virtual machines that have the security tag "web" will be automatically added to a specific
security group destined for Web servers. After creating a security group, a security policy is
applied to that group.
Prerequisites
If you want to use security tags with security groups, Create and Assign Security Tags.
Procedure
b Select the organization VDC for which you want to apply security settings, and click
Configure Services.
The description displays in the list of security groups, so adding a meaningful description can
make it easy to identify the security group at a glance.
The options are Security Tag, VM Guest OS Name, VM Name, and VM Guest Host Name.
e Enter a value.
a From the Browse objects of type drop-down menu, select the type of objects, such as
Virtual Machines, Org VDC networks, IP sets, MAC sets, or Security tags.
b To include an object in the Include Members list, select the object from the left panel, and
move it to the right panel by clicking the right arrow.
a From the Browse objects of type drop-down menu, select the type of objects, such as
Virtual Machines, Org VDC networks, IP sets, MAC sets, or Security tags.
b To include an object in the Exclude Members list, select the object from the left panel, and
move it to the right panel by clicking the right arrow.
Results
The security group can now be used in rules, such as firewall rules.
Procedure
b Select the organization VDC for which you want to apply security settings, and click
Configure Services.
The details for the security group display below the list of security groups.
4 (Optional) Edit the name and the description of the security group.
The options are Security Tag, VM Guest OS Name, VM Name, and VM Guest Host Name.
e Enter a value.
6 (Optional) Edit a dynamic member set by clicking the Edit ( ) icon next to the member set
that you want to edit.
b Click OK.
7 (Optional) Delete a dynamic member set by clicking the Delete ( ) icon next to the member
set that you want to delete.
8 (Optional) Edit the included members list by clicking the Edit ( ) icon next to the Include
Members list.
a From the Browse objects of type drop-down menu, select the type of objects, such as
Virtual Machines, Org VDC networks, IP sets, MAC sets, or Security tags.
b To include an object in the include members list, select the object from the left panel, and
move it to the right panel by clicking the right arrow.
c To exclude an object from the include members list, select the object from the right panel,
and move it to the left panel by clicking the left arrow.
9 (Optional) Edit the excluded members list by clicking the Edit ( ) icon next to the Exclude
Members list.
a From the Browse objects of type drop-down menu, select the type of objects, such as
Virtual Machines, Org VDC networks, IP sets, MAC sets, or Security tags.
b To include an object in the exclude members list, select the object from the left panel, and
move it to the right panel by clicking the right arrow.
c To exclude an object from the exclude members list, select the object from the right
panel, and move it to the left panel by clicking the left arrow.
Procedure
b Select the organization VDC for which you want to apply security settings, and click
Configure Services.
Results
Procedure
5 Enter an IP address or an IP addresses range for the virtual machines that the group includes,
and click Add.
Results
You created a firewall group and added it to the NSX-T edge gateway.
What to do next
Procedure
3 If the Firewall screen is not already visible, click the Firewall tab.
A row for the new rule is added above the selected rule.
Option Description
State To enable the rule upon creation, turn on the State toggle.
Applications (Optional) To select a specific port profile to which the rule applies, turn on
the Applications toggle and click Save.
Enable logging. To have the address translation performed by this rule logged, turn on the
Enable logging toggle.
7 Click Save.
Results
After the firewall rules are created, they appear in the Edge Gateway Firewall Rules list. You can
move up, move down, edit, or delete the rules as needed.
When you configure a SNAT or a DNAT rule on an edge gateway in the vCloud Director
environment, you always configure the rule from the perspective of your organization VDC. An
SNAT rule translates the source IP address of packets sent from an organization VDC network
out to an external network or to another organization VDC network. A DNAT rule translates the
IP address and, optionally, the port of packets received by an organization VDC network that are
coming from an external network or from another organization VDC network.
Prerequisites
The public IP addresses must have been added to the edge gateway interface on which you
want to add the rule.
Procedure
Option Description
State To enable the rule upon creation, turn on the State toggle.
External IP Enter the public IP address of the edge gateway for which you are
configuring the SNAT rule.
Internal IP Enter the IP address or a range of IP addresses of the virtual machines for
which you are configuring SNAT, so that they can send traffic to the external
network.
Enable logging. To have the address translation performed by this rule logged, turn on the
Enable logging toggle.
Option Description
State To enable the rule upon creation, turn on the State toggle.
External IP Enter the public IP address of the edge gateway for which you are
configuring the DNAT rule.
The IP addresses that you enter must belong to the suballocated IP range of
the edge gateway.
Application (Optional) Select a specific application port profile to which to apply the rule.
The application port profile includes a port and a protocol that the incoming
traffic uses on the edge gateway to connect to the internal network.
Internal IP Enter the IP address or a range of IP addresses of the virtual machines for
which you are configuring DNAT, so that they can receive traffic from the
external network.
Internal Port (Optional) Select the port or port range into which the DNAT rule is
translating for the packets inbound to the virtual machines.
Enable logging. To have the address translation performed by this rule logged, turn on the
Enable logging toggle.
6 Click Save.
As part of your DNS forwarder service configuration, you can also add conditional forwarder
zones. A conditional forwarder zone is configured as a list containing up to five FQDN DNS
zones. If a DNS query matches a domain name from that list, the query is forwarded to the
servers from the corresponding forwarder zone.
Procedure
5 Enter a name and, optionally, a description for the default DNS zone.
7 Click Save.
d Enter one or more domain names, separated by a comma, and click Save.
Application port profiles include a combination of a protocol and a port, or a group of ports, that
is used for firewall and NAT services on the edge gateway. In addition to the default port profiles
that are preconfigured for NSX-T Data Center, you can create custom application port profiles.
When you create a custom application port profile on an edge gateway, it becomes visible to all
the other NSX-T Data Center edge gateways that are in the same organization VDC.
Procedure
5 Enter a name and, optionally, a description for the application port profile.
What to do next
Use application port profiles to create firewall and NAT rules. See Add an NSX-T Edge Gateway
Firewall Rule and Add an SNAT or a DNAT Rule to an NSX-T Edge Gateway.
When you create a named disk, it is associated with an Organization VDC but not with a virtual
machine. After you create the disk in a VDC, the disk owner or an administrator can attach it to
any virtual machine deployed in the VDC. The disk owner can also modify the disk properties,
detach it from a virtual machine, and remove it from the VDC. System administrators and
organization administrators have the same rights to use and modify the disk as the disk owner.
To create a named disk, you must specify its name and size. You can optionally include a
description and select a storage profile to be used by the disk.
Prerequisites
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore and under Storage, select Named Disks from the left panel.
2 Click New.
4 Select the storage policy from the Storage Policy drop-down menu.
6 Select the bus type and subtype, from the Bus Type and Bus Sub-Type drop-down menus,
respectively, and click Save.
What to do next
Use the vCloud API to attach the independent disk to a virtual machine. See vCloud API
Programming Guide for Service Providers on VMware {code}.
Prerequisites
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore and under Storage, select Named Disks from the left panel.
3 Edit the settings such as name, description, storage policy, and size in bytes.
4 Click Save.
Prerequisites
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore and under Storage, select Named Disks from the left panel.
2 Click the radio button next to the name of the named disk that you want to attach to a virtual
machine, and click Attach.
3 From the drop-down menu, select a virtual machine to which to attach the named disk, and
click Apply.
Results
What to do next
You can attach more named disks to the VM, or detach them as needed.
Prerequisites
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore and under Storage, select Named Disks from the left panel.
3 Click OK.
Prerequisites
This operation requires the rights included in the predefined Organization Administrator role or
an equivalent set of rights.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore.
3 To view the details about a storage policy, click the name of the storage policy.
4 Review the details on the General and Metadata tabs, and click OK.
Prerequisites
This operation requires the rights included in the predefined Organization Administrator role or
an equivalent set of rights.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore.
Results
You can review the properties of the virtual data center, such as name, description, and status.
Metrics information about the data center includes the allocation model and vCPU, as well as
CPU, and memory usage.
Prerequisites
This operation requires the rights included in the predefined Organization Administrator role or
an equivalent set of rights.
Procedure
1 On the Virtual Datacenters dashboard screen, click the card of the virtual data center you
want to explore.
The system administrator can publish one or more dedicated vCenter Server instances to
your organization. You can use the containing proxies to access the UI or API of the proxied
components.
To configure your browser to use your published proxies, you copy the URL of the proxy auto-
config (PAC) file into your browser.
Note When the system administrator publishes a dedicated vSphere data center to your
organization, or adds a proxy to one of your dedicated vSphere data centers, it is possible that
it takes a few minutes for the browser to refetch the PAC from the provided URL. To force a
refresh of the browser, you can repeat this procedure.
Prerequisites
n Verify that the system administrator published at least one dedicated and enabled vCenter
Server instance to your organization.
n Verify that the system administrator published the SDDC_VIEW and Token: Manage rights
to your organization, and your role includes these rights.
n Verify that the system administrator published and enabled the CPOM extension plug-in to
your organization. This plug-in provides the function for viewing and using dedicated vSphere
data centers in the vCloud Director Tenant Portal.
Procedure
2 On the Dedicated vSphere Datacenters pane, click Click here to view Proxy Configuration
Guide.
4 Follow the instructions to configure your browser to point to the PAC URL.
a On the target vSphere data center card, click Actions, and click Import Certificate.
Prerequisites
Before you log in to the UI of a proxied component, you must configure your access to the
proxy. See Configure Your Browser with Your Proxy Settings.
Procedure
A new card opens and prompts you for authentication against the proxy.
6 In the User Name text box, paste the copied user name.
7 In the Password text box, paste the copied password and click OK.
Results
You can access only vApp templates that are included in catalogs items that have been shared to
you. For more information about sharing catalogs, see Share a Catalog.
Prerequisites
This operation requires the rights included in the predefined vApp Author role or an equivalent
set of rights.
Procedure
1 From the main menu ( ), select Libraries, and select vApp Templates from the left panel.
2 (Optional) Configure the grid view to contain elements you want to see.
a From the grid view, click the grid editor icon ( ) below the list of vApp templates.
b Select the elements you want to include in the grid view, such as version, status, catalog,
owner, and so on.
c Click OK.
The grid displays the elements you selected for each vApp template in the list.
3 To view the virtual machines included in a vApp template, click the vApp template name.
The virtual machines that the vApp template includes display in a grid.
4 (Optional) To select the elements you want to see in the grid view, click the grid editor icon
b Click OK.
vCloud Director supports the Open Virtualization Format (OVF) and Open Virtualization
Appliance (OVA) specifications. If you upload an OVF file that includes OVF properties for
customizing its virtual machines, those properties are preserved in the vApp template. For
information about creating OVF packages, see the OVF Tool User Guide and VMware vCenter
Converter User's Guide
Prerequisites
This operation requires the rights included in the predefined Catalog Author role or an equivalent
set of rights.
Procedure
1 From the main menu ( ), select Libraries, and select vApp Templates from the left panel.
2 Click Add.
3 Enter a URL address for the OVF file, or click the Upload icon ( ) to browse to a location
accessible from your computer and select the OVF/OVA template file.
The location might be your local hard drive, a network share, or a CD/DVD drive. The
supported file extensions include .ova, .ovf, .vmdk, .mf, .cert, and .strings. If you select
to upload an OVF file, which references more files than you are trying to upload, for example,
a VMDK file, you must browse and select all files.
4 Verify the details of the OVF/OVA template you are about to deploy and click Next.
5 Enter a name and, optionally a description for the vApp template, and click Next.
6 From the Catalog drop-down menu, select the catalog, to which you want to add the
template.
Results
Starting with vCloud Director 10.0, you can allow the users to change the predefined VM
placement or VM sizing policies while editing a VM.
Note After you upgrade to vCloud Director 10.0, all pre-existing template taggings become
modifiable. If you want to disallow the changes to the predefined VM placement or VM sizing
policies, you must deselect the Modifiable check box for the policies that you want to be
unchangeable.
Prerequisites
n Verify that you have at least one vApp template in your vCloud Director environment.
Procedure
1 From the main menu ( ), select Libraries, and select vApp Templates from the left panel.
2 Select the radio button next to the vApp template you want to tag, and click Tag with
Compute Policies.
3 If you want to assign a VM placement policy to a VM in the vApp template, select a policy
from the VM Placement Policy drop-down menu on the row corresponding to the VM.
4 If you want to assign a VM sizing policy to a VM in the vApp template, select a policy from
the VM Sizing Policy drop-down menu on the row corresponding to the VM.
5 (Optional) To allow the users to change the predefined VM placement or VM sizing policies
while editing a VM, select the Modifiable check box under the policy drop-down menu.
6 Click Tag.
Prerequisites
This operation requires the rights included in the predefined Catalog Author role or an equivalent
set of rights.
Procedure
1 From the main menu ( ), select Libraries, and select vApp Templates from the left panel.
2 Click the list bar ( ) on the left of the vApp template you want to download, and select
Download.
Note You can download vApp templates from your organization catalogs. If you are
an organization administrator, you can download vApp templates from a public catalog.
Otherwise, the Download button is dimmed.
3 (Optional) To preserve the UUIDs and MAC addresses of the virtual machines in the
downloaded OVA package, select the Preserve identity information check box.
The OVA file is saved to the default download location of your Web browser.
Prerequisites
This operation requires the rights included in the predefined vApp Author role or an equivalent
set of rights.
Procedure
1 From the main menu ( ), select Libraries, and select vApp Templates from the left panel.
2 Click the list bar ( ) on the left of the vApp template you want to delete, and select Delete.
Prerequisites
This operation requires the rights included in the predefined Catalog Author role or an equivalent
set of rights.
Procedure
1 From the main menu ( ), select Libraries, and select Media & Other from the left panel.
2 Click Add.
3 From the Catalog drop-down menu, select a catalog to which you want to upload the media
file.
If you do not enter a name, the name text box is populated automatically after the name of
the media file.
5 Click the upload icon ( ) to browse and select the disk image file, for example an .iso file.
6 Click OK.
After the upload starts, the media file appears in the grid.
What to do next
Depending on the file size, it might take some time for the upload to complete. You can monitor
the status of the upload in the Recent Tasks view. For more information, see View Tasks.
Prerequisites
This operation requires the rights included in the predefined Catalog Author role or an equivalent
set of rights.
Procedure
1 From the main menu ( ), select Libraries, and select Media & Other from the left panel.
2 Click the list bar ( ) on the left of the media file you want to delete, and select Delete.
Prerequisites
This operation requires the rights included in the predefined Catalog Author role or an equivalent
set of rights.
Procedure
1 From the main menu ( ), select Libraries, and select Media & Other from the left panel.
2 Click the list bar ( ) on the left of the media file you want to download, and select
Download.
The download task starts, and the file is saved to the default download location of your web
browser.
What to do next
Depending on the file size, it might take some time for the download to complete. You can
monitor the status of the download in the Recent Tasks panel. For more information, see View
Tasks.
vCloud Director contains private catalogs, shared catalogs, and externally accessible catalogs.
Private catalogs include vApp templates and media files that you can share with other users in
the organization. If a system administrator enables catalog sharing for your organization, you
can share an organization catalog to create a catalog accessible to other organizations in the
vCloud Director installation. If a system administrator enables external catalog publishing for
your organization, you can publish an organization catalog for access by organizations outside
the vCloud Director installation. An organization outside the vCloud Director installation must
subscribe to an externally published catalog to access its contents.
You can upload an OVF package directly to a catalog, save a vApp as a vApp template, or
import a vApp template from vSphere. See Create a vApp Template from an OVF File and Save a
vApp as a vApp Template to a Catalog.
Members of an organization can access vApp templates and media files that they own or that
are shared with them. Organization administrators and system administrators can share a catalog
with everyone in an organization or with specific users and groups in an organization. See Share
a Catalog.
n View Catalogs
n Create a Catalog
n Share a Catalog
n Delete a Catalog
n Publish a Catalog
n Update the Location URL and the Password for a Subscribed Catalog
View Catalogs
You can access catalogs shared with you within your organization. You can access public
catalogs if an organization administrator has made them accessible within your organization.
Catalog access is controlled by catalog sharing, not by the rights in your role. You can access
only those catalogs or catalog items that are shared with you. For more information, see Share a
Catalog.
Procedure
1 From the main menu ( ), select Libraries, and select Catalogs from the left panel.
2 (Optional) Configure the grid view to contain elements you want to see.
a From the grid view, click the grid editor icon ( ) displayed below the list of catalogs.
b Select the elements you want to include in the grid view, such as version, description,
status, and so on.
c Click OK.
The grid displays the elements you selected for each catalog.
3 (Optional) From the grid view, use the list bar ( ) to display the actions you can take for
each catalog.
Create a Catalog
You can create new catalogs and associate them with a storage policy.
Prerequisites
This operation requires the rights included in the predefined Catalog Author role or an equivalent
set of rights.
Procedure
1 From the main menu ( ), select Libraries, and select Catalogs from the left panel.
4 (Optional) Select whether you want to assign a storage policy to the catalog, and select a
storage policy.
5 Click OK.
Results
The new catalog appears in the grid view on the Catalogs tab.
Share a Catalog
You can share a catalog with all members of your organization, or with specific members.
Prerequisites
n This operation requires the rights included in the predefined Catalog Author role or an
equivalent set of rights.
Procedure
1 From the main menu ( ), select Libraries, and select Catalogs from the left panel.
2 Click the list bar ( ) on the left of the catalog you want to share, and select Share.
The list of users who can access the catalog appears in the grid view of the Share Catalog
window.
Option Description
Share with everyone in this Grant access to all users and groups in the organization.
organization
Share with specific users and groups Select the users or groups to whom you want to grant catalog access, and
click Add.
Option Description
Read Only Users with access to this catalog have read access to the vApp templates
and ISO files of the catalog.
Read/Write Users with access to this catalog have read access to the vApp templates
and ISO files of the catalog and can add vApp templates and ISO files to the
catalog.
Full Control Users with access to this catalog have full control of the contents and
settings of the catalog.
5 Click OK.
The users or groups that now have access to the catalog appear in the grid view of the Share
Catalog dialog box.
6 (Optional) Select to share read-only access to the administrators of all other organizations
7 Click Save.
Results
On the Catalogs tab, the Shared status for this catalog in the grid view changes.
Delete a Catalog
You can delete a catalog from your organization.
Prerequisites
This operation requires the rights included in the predefined Catalog Author role or an equivalent
set of rights.
Note The catalog must not contain any vApp templates or media files. You can move these
items to a different catalog or delete them.
Procedure
1 From the main menu ( ), select Libraries, and select Catalogs from the left panel.
2 Click the list bar ( ) on the left of the catalog you want to delete, and select Delete.
Procedure
1 From the main menu ( ), select Libraries, and select Catalogs from the left panel.
2 Click the list bar ( ) on the left of a catalog, and select Metadata.
The name must be unique within the metadata names attached to this object.
b Select the metadata type, such as Text, Number, Date and Time, or Yes or No.
d Click Save.
c Click Save.
b Click Save.
Publish a Catalog
If the system administrator has granted you catalog access, you can publish a catalog externally
to make its vApp templates and media files available for subscription by organizations outside
the vCloud Director installation.
Prerequisites
Verify that the system administrator enabled external catalog publishing for the organization
and granted you catalog access.
Procedure
1 From the main menu ( ), select Libraries, and select Catalogs from the left panel.
2 Click the list bar ( ) on the left of the catalog you want to publish, and select Publish
Settings.
3 Select Enable Publishing and, optionally, enter a password for catalog access.
4 Click Save.
Prerequisites
n This operation requires the rights included in the predefined Organization Administrator role
or an equivalent set of rights.
n The system administrator must grant your organization permission to subscribe to external
catalogs.
Procedure
1 From the main menu ( ), select Libraries, and select Catalogs from the left panel.
6 Select whether you want to automatically download the content from the external catalog.
7 Click OK.
Prerequisites
n This operation requires the rights included in the predefined Organization Administrator role
or an equivalent set of rights.
n The system administrator must grant your organization permission to subscribe to external
catalogs.
Procedure
1 From the main menu ( ), select Libraries, and select Catalogs from the left panel.
2 Click the list bar ( ) on the left of a subscribed catalog, and select Subscribe settings.
3 Update the location URL and the password for this subscribed catalog.
4 Select whether you want to download the content from the external catalog automatically.
5 Click Save.
Prerequisites
n This operation requires the rights included in the predefined Organization Administrator role
or an equivalent set of rights.
n The system administrator must grant your organization permission to subscribe to external
catalogs.
Procedure
1 From the main menu ( ), select Libraries, and select Catalogs from the left panel.
2 Click the list bar ( ) on the left of a subscribed catalog, and select Sync.
An organization virtual data center template specifies a configuration for an organization virtual
data center and, optionally, an Edge Gateway, and organization virtual data center network.
System administrators can enable organization administrators to create these resources in their
organizations by creating organization virtual data center templates and sharing them with those
organizations.
By creating and sharing virtual data center templates, system administrators enable self-service
provisioning of organization virtual data centers while retaining administrative control over
allocation of system resources, such as provider virtual data centers and external networks.
System administrators create organization virtual data center templates and provide different
organizations with access to the templates.
If your organization has been provided with access to virtual data center templates, you can use
the vCloud Director Tenant Portal to create virtual data centers from the available templates.
View the virtual data center templates before you create a new organization virtual data center
from the virtual data center template.
Prerequisites
This operation requires the rights included in the predefined Organization Administrator role or
a role that has rights to view and instantiate organization virtual data center templates.
Procedure
u From the main menu ( ), select Libraries, and select VDC Templates from the left panel.
What to do next
Review the descriptions of the organization virtual data center templates and select the template
from which you want to create a new organization virtual data center.
Prerequisites
This operation requires the rights included in the predefined Organization Administrator role or
a role that has rights to view and instantiate organization virtual data center templates.
Procedure
1 From the main menu ( ), select Libraries, and select VDC Templates from the left panel.
4 Click Create.
Results
The creation of the new organization virtual data center is instantiated and might take a few
minutes. You can see the progress of the task in the Recent Tasks panel.
What to do next
You can manage your newly created organization virtual data center by creating virtual
machines, vApps, managing the network and security settings, and so on.
Important You must be an organization administrator to manage the users, groups, and roles
within your organization. Your system administrator can publish one or more global tenant roles
to your tenant, and as an organization administrator, you can see them in the list of roles. Such
roles are for example, Catalog Author, vApp Author, vApp User, Organization Administrator,
and so on. You cannot modify the predefined global tenant roles, but you can create and update
similar custom tenant roles and assign them to users within your tenant.
n Managing Users
n Managing Groups
Managing Users
From the tenant portal you can create, edit, import, and delete users. In addition, you can also
unlock user accounts in case a user tried to log in with an incorrect password and as a result has
locked their own user account.
Create a User
You can create a user within your vCloud Director organization.
Prerequisites
This operation requires the rights included in the predefined Organization Administrator role or
an equivalent set of rights.
Procedure
3 Click Create.
4 (Optional) Enter a user name and the password setting of the user.
The Available roles menu consist of a list of predefined roles and any custom roles that you
or the system administrator might have created.
vApp Author The rights associated with the predefined vApp Author role allow a user to
use catalogs and create vApps.
Console Access Only The rights associated with the predefined Console Access Only role allow a
user to view virtual machine state and properties and to use the guest OS.
vApp User The rights associated with the predefined vApp User role allow a user to use
existing vApps.
Organization Administrator A user with the predefined Organization Administrator role can use the
vCloud Director tenant portal or the vCloud API to manage users and
groups in their organization and assign them roles, including the predefined
Organization Administrator role. An organization administrator can use
the vCloud API to create or update role objects that are local to the
organization. Roles created or modified by an organization administrator
are not visible to other organizations.
Defer to Identity Provider Rights associated with the predefined Defer to Identity Provider role are
determined based on information received from the user's OAuth or SAML
Identity Provider. To qualify for inclusion when a user is assigned the Defer
to Identity Provider role, a role name supplied by the Identity Provider
must be an exact, case-sensitive match for a role, or name defined in your
organization.
Catalog Author The rights associated with the predefined Catalog Author role allow a user
to create and publish catalogs.
7 (Optional) Enter the contact information, such as name, email address, phone number, and
instant messaging ID.
The quota determines how many virtual machines and running virtual machines the user can
manage. Select Unlimited if you want to provide the user with an unlimited number of virtual
machines.
9 Click Save.
Import Users
You can add users to your organizations by importing an LDAP user or a SAML user and
assigning them a certain role.
Prerequisites
n This operation requires the rights included in the predefined Organization Administrator role
or an equivalent set of rights.
n Verify that you have a valid connection to an LDAP server or that you Chapter 16 Enable Your
Organization to Use a SAML Identity Provider.
Procedure
You will only view the source LDAP server or SAML server that you configured as identity
provider.
Source Action
SAML Import users from a SAML server. Enter the user names of the users that you
want to import.
User names must be in the name identifier format supported by the SAML
identity provider configured for this organization.
Note If you are using vCenter Single Sign-On as the SAML identity provider,
the user names that you import from a vCenter Single Sign-On domain must
be in User Principal Name (UPN) format, for example [email protected].
5 Select the role which you want to assign to the users that you import.
6 Click Save.
Modify a User
As an organization administrator, you can modify the password, the contact, and the virtual
machine quota settings of an existing user. In addition, you can also change the role of the user.
Prerequisites
This operation requires the rights included in the predefined Organization Administrator role or
an equivalent set of rights.
Procedure
3 Click the radio button next to the name of the user that you want to edit and click Modify.
d Update the contact information, such as name, email address, phone number, and instant
messaging ID.
5 Click Save.
Prerequisites
This operation requires the rights included in the predefined Organization Administrator role or
an equivalent set of rights.
Procedure
3 To disable a user account, click the radio button next to the user name, click Disable, and
confirm that you want to disable the account.
4 To enable a user account that you have already disabled, click the radio button next to the
user name, and click Enable.
Delete a User
You can remove a user from the vCloud Director organization by deleting the user account.
Prerequisites
n This operation requires the rights included in the predefined Organization Administrator role
or an equivalent set of rights.
Procedure
3 Click the radio button next to the name of the user that you want to delete and click Delete.
4 To confirm that you want to delete the user account, click OK.
Prerequisites
This operation requires the rights included in the predefined Organization Administrator role or
an equivalent set of rights.
Procedure
3 Click the radio button next to the user name, click Unlock.
Managing Groups
If you have a valid connection to an LDAP server or have enabled your organization to use a
SAML identity provider, you can import an LDAP group or a SAML group. You can also edit or
delete an imported group.
Import a Group
To add a group of users, you can import an LDAP group or a SAML group.
Prerequisites
n This operation requires the rights included in the predefined Organization Administrator role
or an equivalent set of rights.
n Verify that you have a valid connection to an LDAP server or that you Chapter 16 Enable Your
Organization to Use a SAML Identity Provider.
Procedure
4 Select a source from which you want to import the user group.
You will only view the source LDAP server or SAML server that you configured as identity
provider.
Source Action
SAML Import user groups from a SAML server. Enter the names of the groups that
you want to import.
Use a new line for each group name.
5 Select the role which you want to assign to the group of users that you import.
6 Click Save.
Delete a Group
You can remove a group from your vCloud Director organization by deleting their LDAP group.
When you delete an LDAP group, users who have a vCloud Director account based solely on
their membership in that group are stranded and cannot log in.
Prerequisites
This operation requires the rights included in the predefined Organization Administrator role or
an equivalent set of rights.
Procedure
3 Click the radio button next to the name of the group that you want to delete, and click
Delete.
Edit a Group
You can edit a group from the vCloud Director tenant portal.
Prerequisites
This operation requires the rights included in the predefined Organization Administrator role or
an equivalent set of rights.
Procedure
3 Click the radio button next to the name of the group that you want to delete, and click Edit.
5 Click Save.
System administrators and organization administrators must assign each user or group a role.
The same user can have a different role in different organizations. System administrators can
create roles and modify existing ones for the whole system, while organization administrators
can create and modify roles only for the organization that they administer.
The vCloud Director tenant portal allows organization administrators to manage the roles in their
organization. If a system administrator publishes one or more predefined tenant roles to your
organization, as an organization administrator you can see these roles, but you cannot modify
them. You can, however, create custom tenant roles with similar rights and assign them to the
users within your organization.
For information about the predefined roles and their rights, see Predefined Roles and Their
Rights.
System Administrator
The System Administrator role exists only in the provider organization. The System
Administrator role includes all rights in the system. For a list of rights available only to the
System administrator role, see the vCloud Director Service Provider Admin Portal Guide.
The System administrator credentials are established during installation and configuration. A
System Administrator can create additional system administrator and user accounts in the
provider organization.
Multisite System
Used for running the heartbeat process for multisite deployments. This role has only a single
right, Multisite: System Operations, which gives a permission to make a vCloud API request
that retrieves the status of the remote member of a site association.
Organization Administrator
After creating an organization, a System Administrator can assign the role of Organization
Administrator to any user in the organization. A user with the predefined Organization
Administrator role can manage users and groups in their organization and assign them roles,
including the predefined Organization Administrator role. Roles created or modified by an
Organization Administrator are not visible to other organizations.
Catalog Author
The rights associated with the predefined Catalog Author role allow a user to create and
publish catalogs.
vApp Author
The rights associated with the predefined vApp Author role allow a user to use catalogs and
create vApps.
vApp User
The rights associated with the predefined vApp User role allow a user to use existing vApps.
The rights associated with the predefined Console Access Only role allow a user to view
virtual machine state and properties and to use the guest OS.
Rights associated with the predefined Defer to Identity Provider role are determined based
on information received from the user's OAuth or SAML Identity Provider. To qualify for
inclusion when a user or group is assigned the Defer to Identity Provider role, a role or group
name supplied by the Identity Provider must be an exact, case-sensitive match for a role or
group name defined in your organization.
n If the user is defined by an OAuth Identity Provider, the user is assigned the roles named
in the roles array of the user's OAuth token.
n If the user is defined by a SAML Identity Provider, the user is assigned the roles named
in the SAML attribute whose name appears in the RoleAttributeName element, which is in
the SamlAttributeMapping element in the organization's OrgFederationSettings.
If a user is assigned the Defer to Identity Provider role but no matching role or group name
is available in your organization, the user can log in to the organization but has no rights. If
an Identity Provider associates a user with a system-level role such as System Administrator,
the user can log in to the organization but has no rights. You must manually assign a role to
such users.
Except the Defer to Identity Provider role, each predefined role includes a set of default
rights. Only a System Аdministrator can modify the rights in a predefined role. If a System
administrator modifies a predefined role, the modifications propagate to all instances of the role
in the system.
Catalog: Publish ✓ ✓
Catalog: Sharing ✓ ✓
Disk: Create ✓ ✓ ✓
Disk: Delete ✓ ✓ ✓
General: Administrator ✓
Control
General: Administrator ✓
View
Organi
zation
New in this Admini Catalog Console
release Right Name strator Author vApp Author vApp User Access Only
Organization Network: ✓
View
Organization vDC ✓
Distributed Firewall:
Configure Rules
Organization vDC ✓
Distributed Firewall: View
Rules
Organi
zation
New in this Admini Catalog Console
release Right Name strator Author vApp Author vApp User Access Only
Organi
zation
New in this Admini Catalog Console
release Right Name strator Author vApp Author vApp User Access Only
Organization: Edit ✓
Association Settings
Organization: Edit ✓
Federation Settings
Organization: Edit ✓
Password Policy
Organization: Edit ✓
Properties
Organization: View ✓ ✓ ✓
UI Plugins: View ✓ ✓ ✓ ✓
Organi
zation
New in this Admini Catalog Console
release Right Name strator Author vApp Author vApp User Access Only
vApp: Copy ✓ ✓ ✓ ✓
vApp: Delete ✓ ✓ ✓ ✓
vApp: Download ✓ ✓ ✓
vApp: Manage VM ✓ ✓ ✓ ✓ ✓
Password Settings
vApp: Sharing ✓ ✓ ✓ ✓
vApp: Upload ✓ ✓ ✓
Organi
zation
New in this Admini Catalog Console
release Right Name strator Author vApp Author vApp User Access Only
vApp: VM Metadata To ✓ ✓ ✓
vCenter
Prerequisites
This operation requires the rights included in the predefined Organization Administrator role or
an equivalent set of rights.
Procedure
3 Click Add.
5 Expand the rights for the role and select the rights for the role.
The rights are grouped in categories and subcategories that allow either viewing or managing
objects.
Option Description
Access Control Rights controlling the access to view and manage certain objects.
Compute Rights controlling access and management of the organization and provider
virtual data centers, the vApps, organization virtual data centers templates,
virtual machine groups, and virtual machine monitoring.
Extensions Rights controlling the access to any additional plug-ins and vCloud Director
extensions.
Option Description
Infrastructure Rights controlling the access and management of the infrastructure objects,
such as datastores, disks, hosts, and so on.
Libraries Rights controlling access and management of any catalogs and catalog
items.
6 Click Save.
Prerequisites
This operation requires the rights included in the predefined Organization Administrator role or
an equivalent set of rights.
Procedure
3 Click the radio button next to the role that you want to edit, and click Edit.
5 Click Save.
Delete a Role
Organization administrators can use the tenant portal to delete role objects in the organizations
they administer.
Prerequisites
This operation requires the rights included in the predefined Organization Administrator role or
an equivalent set of rights.
Procedure
3 Click the radio button next to the role that you want to delete, and click Delete.
When you import users and groups, the system extracts a list of attributes from the SAML token,
if available, and uses them for interpreting the corresponding pieces of information about the
user attempting to log in.
Group information is necessary if the user is not directly imported but is expected to be able to
log in by virtue of membership in imported groups. A user might belong to multiple groups, and
can have multiple roles during a session.
If an imported user or group is assigned the Defer to Identity Provider role, the roles are
assigned based on the information gathered from the Roles attribute in the token. If a different
attribute is used, this attribute name can be configured by using the API only, and only the Roles
attribute is configurable. If the Defer to Identity Provider role is used, but no role information can
be extracted, the user can log in but does not have any rights to perform any activities.
Prerequisites
n This operation requires the rights included in the predefined Organization Administrator role
or an equivalent set of rights.
n Verify that you have access to an SAML 2.0 compliant identity provider.
n Verify that you receive the required metadata from your SAML identity provider. You must
import the metadata to vCloud Director either manually or as an XML file. The metadata must
include the following information:
For information on configuring and acquiring metadata from a SAML provider, see the
documentation for your SAML identity provider.
Procedure
3 Click Edit.
The Entity ID is the unique identifier of your organization to your identity provider. You can
use the name of your organization, or any other string that satisfies the requirements of your
SAML identity provider.
Important Once you specify an Entity ID, you cannot delete it. To change the Entity ID, you
must do a full SAML reconfiguration for your organization. For information about Entity IDs,
see Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) 2.0.
5 Click the Metadata link to download the SAML metadata for your organization.
6 Review the Certificate Expiration date and, optionally, click Regenerate to regenerate the
certificate used to sign federation messages.
The certificate is included in the SAML metadata, and is used for both encryption and
signing. Either or both encryption and signing might be required depending on how trust
is established between your organization and your SAML identity provider.
7 On the Identity Provider tab, enable the Use SAML Identity Provider toggle.
8 Copy and paste the SAML metadata you received from your identity provider to the text box,
or click Upload to browse to and upload the metadata from an XML file.
9 Click Save.
What to do next
n Configure your SAML provider with vCloud Director metadata. See your SAML identity
provider documentation and the vCloud Director Installation and Upgrade Guide.
n Import users and groups from your SAML identity provider. See Chapter 15 Managing Users,
Groups and Roles
n Understanding Leases
n Modify the vApp and vApp Template Lease Policies Within Your Organization
n Modify the Default Quotas for the Virtual Machines in Your Organization
n Modify the Password and User Account Policies Within Your Organization
Prerequisites
This operation requires the rights included in the predefined Organization Administrator role or
an equivalent set of rights.
Procedure
The list of general settings, such as organization name, default URL, full name, and description
displays.
3 To modify the full name and the description of the organization, click Edit.
vCloud Director sends alert emails when having important information to report, for example,
when a data store is running out of space. By default, an organization sends email alerts to the
system administrators or a list of email addresses specified at the system level by using an SMTP
server specified at the system level. You can modify the email settings at the organization level if
you want vCloud Director to send alerts for that organization to a different set of email addresses
than those specified at the system level or you want the organization to use a different SMTP
server to send alerts than the server specified at the system level.
Prerequisites
This operation requires the rights included in the predefined Organization Administrator role or
an equivalent set of rights.
Procedure
3 Click Edit.
b If you select to use a custom SMTP server, enter the DNS host name or IP address of the
SMTP server in the SMTP server name text box.
d (Optional) Select whether to require authentication and enter a user name and password.
b Enter the email address that appears as the sender for organization emails.
e (Optional) If you select to send notifications to specific email addresses, enter the email
addresses by separating them with a comma.
6 Click Save.
Prerequisites
This operation requires the rights included in the predefined Organization Administrator role or
an equivalent set of rights.
Procedure
3 Click Test.
4 Enter a destination email address and the SMTP server password to test the SMTP settings,
and click the Test button.
Prerequisites
This operation requires the rights included in the predefined Organization Administrator role or
an equivalent set of rights.
Procedure
3 Select to enable the domain join for the virtual machines in the organization.
The credentials that you enter apply to a regular domain user, not a domain administrator.
6 Click Save.
The vCloud Director Tenant Portal provides organization administrators with a way to associate
organizations at associated sites.
For more information about site associations, see the vCloud Director Service Provider Admin
Portal Guide.
To create an association between two organizations (we will call them Org-A and Org-B here),
you must be an organization administrator for both organizations so that you can log in to
each organization, retrieve its local association data, and submit the retrieved data to the other
organization.
Important The process of associating two organizations can be logically decomposed into two
complementary pairing operations. The first operation (in this example) pairs Org-A at Site-A with
Org-B at Site-B. You must then pair Org-B at Site-B with Org-A at Site-A. Until both pairings are
complete, the association is incomplete.
Prerequisites
Procedure
1 Log in to the vCloud Director tenant portal of Org-A at Site-A to retrieve its local association
data.
a Click Administration.
c To download the data in XML format, click Export local association data.
2 Log in to the vCloud Director tenant portal of Org-B at Site-B to submit the local association
data from Org-A at Site-A.
a Click Administration.
Submit the association data you downloaded in Step 1 to Org-B by clicking the upload
arrow below the New Association XML text box and selecting the local association data
you downloaded in Step 1.
f To view details of the associated organization or delete the association, click the
Organization Name card.
3 Complete the association by repeating Step 1 and Step 2 to retrieve the local association data
from Org-B and submit it to Org-A.
Understanding Leases
Creating an organization involves specifying leases. Leases provide a level of control over an
organization's storage and compute resources by specifying the maximum amount of time that
vApps can be running and that vApps and vApp templates can be stored.
The goal of a runtime lease is to prevent inactive vApps from consuming compute resources. For
example, if a user starts a vApp and goes on a vacation without stopping it, the vApp continues
to consume resources.
A runtime lease begins when a user starts a vApp. When a runtime lease expires, vCloud Director
stops the vApp.
The goal of a storage lease is to prevent unused vApps and vApp templates from consuming
storage resources. A vApp storage lease begins when a user stops the vApp. Storage leases do
not affect running vApps. A vApp template storage lease begins when a user adds the vApp
template to a vApp, adds the vApp template to a workspace, downloads, copies, or moves the
vApp template.
When a storage lease expires, vCloud Director marks the vApp or vApp template as expired, or
deletes the vApp or vApp template, depending on the organization policy you set.
Prerequisites
This operation requires the rights included in the predefined Organization Administrator role or
an equivalent set of rights.
Procedure
You can view the default policies that your system administrator has set.
3 Click Edit.
vApp leases provide a level of control over the organization storage and compute resources
by specifying the maximum amount of time that vApps can be running and that vApps can be
stored. You can also specify what happens to the vApps when their storage lease expires.
a To define how long vApps can run before they are automatically stopped, enter the
maximum runtime lease.
c To define how long stopped vApps remain available before being automatically cleaned
up, enter the maximum storage lease.
d Select a storage cleanup action, such as to delete permanently the vApps or move them
to the expired items.
vApp template leases provide a level of control over the organization storage and compute
resources by specifying the maximum amount of time that vApp templates can be stored.
You can also specify what happens to the vApp templates when their storage lease expires.
a To define how long the vApp templates remain available before being automatically
cleaned up, enter the maximum storage lease.
b Select a storage cleanup action, such as to delete permanently the vApp templates or
move them to the expired items.
6 Click OK.
Quotas determine how many virtual machines each user in the organization can store and power
on in the organization virtual data centers. The quotas that you specify act as the default for all
new users added to the organization. Quotas set at the user level take precedence over quotas
set at the organization level.
Prerequisites
This operation requires the rights included in the predefined Organization Administrator role or
an equivalent set of rights.
Procedure
You can view the default policies that your system administrator has set.
3 Click Edit.
4 Choose between an unlimited number of virtual machines and a number that you specify.
5 Choose between an unlimited number of powered on virtual machines and a number that you
specify.
6 Click OK.
The password and user account policies define the vCloud Director behavior when a user enters
an invalid password.
Prerequisites
This operation requires the rights included in the predefined Organization Administrator role or
an equivalent set of rights.
Procedure
You can view the default policies that your system administrator has set.
3 Click Edit.
5 Enter the number of invalid login attempts before the account is locked.
6 Enter the time interval in minutes, in which the user with locked account cannot log back in.
7 Click OK.
n Execute a Service
Prerequisites
This operation requires the Service Library rights to be included in the predefined user role.
Procedure
1 From the main menu ( ), select Libraries, and under Services select Service Library.
The list of service items displays in a card view of 12 items per page, sorted by names in
alphabetical order. Each card shows the name of the service and a tag that corresponds to
the service category where the vRealize Orchestrator is imported.
2 In the Search text box on the top of the page, enter the first word of either the name of the
service or the name of the category, to which the service belongs.
a Select whether you want to search among the names of the service or among the
categories.
The search results display in a card view of twelve items per page, sorted by names in
alphabetical order.
Execute a Service
You can execute a service from the Service Library page in the vCloud Director Tenant Portal.
Prerequisites
This operation requires the Service Library rights to be included in the predefined user role.
Procedure
1 From the main menu ( ), select Libraries, and under Services select Service Library.
The list of service items displays in a card view of 12 items per page, sorted by names in
alphabetical order. Each card shows the name of the service and a tag that corresponds to
the service category where the vRealize Orchestrator is imported.
A new dialog opens. You must enter values for the required input parameters of the service.
What to do next
You can monitor the status of the execution in the Recent Tasks view. For more information, see
View Tasks.
Prerequisites
This operation requires the Custom Entity rights to be included in the predefined user role.
Procedure
1 From the main menu ( ), select Libraries, and under Services select Custom Entity
Definitions.
The list of custom entities displays in a card view of 12 items per page, sorted by names in
alphabetical order. Each card shows the name of the custom entity, the vRealize Orchestrator
type to which the entity is mapped, the type of the entity, and a description, if available.
2 In the Search text box on the top of the page, enter a word or a character of the name of the
entity you want to find.
The search results display in a card view of twelve items per page, sorted by names in
alphabetical order.
Prerequisites
This operation requires the Custom Entity rights to be included in the predefined user role.
Procedure
1 From the main menu ( ), select Libraries, and under Services select Custom Entity
Definitions.
The list of custom entities displays in a card view of 12 items per page, sorted by names in
alphabetical order. Each card shows the name of the custom entity, the vRealize Orchestrator
type to which the entity is mapped, the type of the entity, and a description, if available.
2 In the card of the selected custom entity, select Actions > Edit.
Prerequisites
This operation requires the Custom Entity rights to be included in the predefined user role.
Procedure
1 From the main menu ( ), select Libraries, and under Services select Custom Entity
Definitions.
The list of custom entities displays in a card view of 12 items per page, sorted by names in
alphabetical order. Each card shows the name of the custom entity, the vRealize Orchestrator
type to which the entity is mapped, the type of the entity, and a description, if available.
Step
Name and Enter a name and, optionally a description for the new entity.
Description Enter a name for the entity type, for example sshHost.
vRO From the drop-down menu, select the vRealize Orchestrator that you will use to map the custom
entity definition.
Note If you have more than one vRealize Orchestrator server, you must create a custom entity
definition for each one of them separately.
Type Click the view list icon ( ) to browse through the available vRealize Orchestrator object types
grouped by plug-ins. For example, SSH > Host.
If you know the name of the type, you can enter it directly in the text box. For example SSH:Host.
Review Review the details that you specified and click Done to complete the creation.
Results
Prerequisites
This operation requires the Custom Entity rights to be included in the predefined user role.
Procedure
1 From the main menu ( ), select Libraries, and under Services select Custom Entity
Definitions.
The list of custom entities displays in a card view of 12 items per page, sorted by names in
alphabetical order. Each card shows the name of the custom entity, the vRealize Orchestrator
type to which the entity is mapped, the type of the entity, and a description, if available.
3 Click the list bar ( ) on the left of each entity to display the associated workflows.
Clicking on a workflow initiates a workflow run which takes the entity instance as an input
parameter.
Prerequisites
This operation requires the Custom Entity rights to be included in the predefined user role.
Procedure
1 From the main menu ( ), select Libraries, and under Services select Custom Entity
Definitions.
The list of custom entities displays in a card view of 12 items per page, sorted by names in
alphabetical order. Each card shows the name of the custom entity, the vRealize Orchestrator
type to which the entity is mapped, the type of the entity, and a description, if available.
2 In the card of the selected custom entity, select Actions > Associate Action.
3 Follow the steps of the Associate Custom Entity to VRO Workflow wizard.
Step Details
Select VRO Workflow Select one of the listed workflows. These are the workflows that are available in the
Service Library page.
Select Workflow Input Select an available input parameter from the list. You associate the type of the vRealize
Parameter Orchestrator workflow with the type of the custom entity definition.
Review Association Review the details that you specified and click Done to complete the association.
Example
For example, if you have a custom entity of type SSH:Host, you can associate it with the Add a
Root Folder to SSH Host workflow by selecting the sshHost input parameter, which matches the
type of the custom entity.
Prerequisites
This operation requires the Custom Entity rights to be included in the predefined user role.
Procedure
1 From the main menu ( ), select Libraries, and under Services select Custom Entity
Definitions.
The list of custom entities displays in a card view of 12 items per page, sorted by names in
alphabetical order. Each card shows the name of the custom entity, the vRealize Orchestrator
type to which the entity is mapped, the type of the entity, and a description, if available.
2 In the card of the selected custom entity, select Actions > Dissociate Action.
3 Select the workflow you want to remove and click Dissociate Action.
The vRealize Orchestrator workflow is no longer associated with the custom entity.
Prerequisites
This operation requires the Custom Entity rights to be included in the predefined user role.
Procedure
1 From the main menu ( ), select Libraries, and under Services select Custom Entity
Definitions.
The list of custom entities displays in a card view of 12 items per page, sorted by names in
alphabetical order. Each card shows the name of the custom entity, the vRealize Orchestrator
type to which the entity is mapped, the type of the entity, and a description, if available.
2 In the card of the selected custom entity, select Actions > Publish.
3 Choose whether you want to publish the custom entity definition to service providers, all
tenants, or only to selected tenants.
Prerequisites
This operation requires the Custom Entity rights to be included in the predefined user role.
Procedure
1 From the main menu ( ), select Libraries, and under Services select Custom Entity
Definitions.
The list of custom entities displays in a card view of 12 items per page, sorted by names in
alphabetical order. Each card shows the name of the custom entity, the vRealize Orchestrator
type to which the entity is mapped, the type of the entity, and a description, if available.
2 In the card of the selected custom entity, select Actions > Delete.