NSX for vSphere 6.1.3 Release Notes
NSX for vSphere 6.1.3 | 27 May 2015 | Build 2591148
|
What's in the Release Notes
The release notes cover the following topics:
Important
NSX-v 6.1.3 is no longer available for download due to the upgrade
issue noted in VMware
Knowledge Base article 2117804. See also
VMware Knowledge Base
article 2119020.
Please observe the following recommendations if you are considering an
installation or upgrade of NSX for vSphere software:
- To install a fresh NSX-v deployment, use NSX-v 6.1.4.
- To upgrade from NSX-v 6.1.2 or earlier, download NSX-v 6.1.4 and
upgrade to 6.1.4 directly.
- If your installation is running NSX 6.1.3, do not upgrade
to NSX 6.1.4. As of 27 May 2015, there are no critical issues reported
against NSX-v 6.1.3. If you require an upgrade from NSX-v 6.1.3 in
order to get one of the fixes provided in NSX-v 6.1.4, please contact
VMware support for assistance with your upgrade, and read
VMware
Knowledge Base article 2117804.
-
If you have already upgraded from NSX 6.1.3 to NSX 6.1.4, see
VMware Knowledge Base article
2117804.
What's New
NSX vSphere 6.1.3 introduces the following features:
- Dynamic routing protocols are supported on sub-interfaces.
- ECMP and Logical Firewall are supported at the same time with logical routing.
NSX vSphere 6.1.3 is compatible with vSphere 6.0. However, the new vSphere features introduced in vSphere 6.0 have not been tested with NSX vSphere.
These new vSphere features should not be used in environments where NSX vSphere is installed as they are unsupported. For a list of specific NSX vSphere
limitations with respect to vSphere 6.0, see the VMware Knowledge Base article
2110197.
System Requirements and Installation
VMware Product Interoperability Matrix provides details about the compatibility of current and
previous versions of VMware products and components, such as VMware vCenter Server.
To upgrade NSX vSphere to 6.1.3, follow the steps below:
- Upgrade NSX Manager and all NSX components to 6.1.3. See the NSX Installation and Upgrade Guide for instructions.
If you do not want to upgrade vCenter Server and ESXi to 6.0, you are done with the upgrade procedure.
If you want to upgrade vCenter Server and ESXi, complete the remaining steps in this procedure.
- Upgrade vCenter Server to 6.0. See VMware vSphere 6.0 Documentation for instructions.
- To upgrade without any downtime, identify a subset of the hosts in your environment that you can start upgrading. Place these hosts in maintenance mode.
- Upgrade ESXi to 6.0. See VMware vSphere 6.0 Documentation for instructions.
Depending on the host settings and upgrade method, the hosts are either automatically rebooted or you have to manually reboot them. When the hosts boot up, NSX Manager pushes the ESXi 6.0 VIBs to the hosts.
- When the hosts show reboot required on the Hosts and Clusters tab in the left hand side of the vSphere Web Client, reboot the hosts a second time.
NSX VIBs for ESXi 6.0 are now enabled.
- Take the upgraded hosts out of maintenance mode.
- Repeat steps 3 through 6 for the next subset of hosts till all the hosts in your environment are upgraded.
Resolved Issues
Resolved issues are grouped as follows:
Resolved Installation and Upgrade Issues
- Unable to upgrade to NSX vSphere Controllers from vCNS 5.0.x or 5.1.x
If the vCNS to NSX vSphere migration path started from vCNS version 5.0.x or 5.1.x, NSX vSphere Controller deployment failed due to database schema changes across releases.
This issue was resolved in NSX 6.1.3.
- Host prep/VIB installation failed when ESXi host was configured for lockdown mode
Host preparation and installation of VXLAN VIBs failed when ESXi host was configured for lockdown mode.
This issue was resolved in NSX 6.1.3.
Resolved NSX Edge Issues
- Server Certificate Validation for SSL VPN Linux and OS X clients
We've taken customer feedback and improved the way we manage trust for our Mac and Linux SSLVPN clients. We're now making use of standard tools available on these platforms to establish better trust with our SSLVPN server. The Windows VPN client already takes advantage of the platform trust store when installed with "Check Certificates" enabled. For more information, see the See the NSX Administration Guide.
This issue was resolved in NSX 6.1.3.
- On OSPF-enabled NSX Edge Services Gateways, OSPF adjacency was not established and its negotiation was stuck in the 2-way state
OSPF adjacency failed to come up and remained stuck in two-way state.
Dynamic routing protocols were not supported to run on sub interfaces.
This issue was resolved in NSX 6.1.3.
- Enabling Equal-Cost Multi-Path routing (ECMP) on a Logical Router disabled firewall
When ECMP was enabled on the Global Routing tab, firewall was automatically disabled.
This issue was resolved in NSX 6.1.3.
- Configuring Layer 2 Bridging on a Distributed Logical Router failed
Configuring Layer 2 Bridging on a Distributed Logical Router in NSX for vSphere 6.1.2 failed with error User is not authorized to access object edge-XX and feature edge.bridging . See the VMware Knowledge Base article 2099414 for details.
This issue was resolved in NSX 6.1.3.
- Two unequal cost paths installed in FIB
When NSX Edge has a static route for a network and it also learns a dynamic route for the same route, the static route is chosen correctly over the dynamic route as static route is preferred. However, when the interface corresponding to the static route was toggled, the FIB incorrectly ended up installing two paths to this network.
This issue was resolved in NSX 6.1.3.
- SSL VPN Mac client for OS X Yosemite displayed certificate authentication error
Since Yosemite did not use /Library/StartupItems/ as a startup item, the VMware startup script was not executed when the machine booted up.
This issue was resolved in NSX 6.1.3.
Resolved Firewall Issues
- Firewall Rule publish failed due to whitespace insertion
Firewall Rule publish was failing because IP translation inserted whitespaces in generated IP ranges when nested security groups had excluded members in it.
This issue was resolved in NSX 6.1.3.
- Virtual machines experienced a network interruption of up to 30 seconds after being vMotioned from one ESXi host to another when Distributed Firewall rules had security groups in the Source and/or Destination fields
For more information, see the VMware Knowledge Base article 2110197.
This issue was resolved in NSX 6.1.3.
- Firewall IP ruleset with spaces was accepted by firewall UI but not published to hosts
An IP ruleset with intervening spaces, such as '10.10.10.2 ,10.10.10.3' was accepted in the firewall UI, but the rules were not published to the hosts.
This issue was resolved in NSX 6.1.3.
- Simultaneous deployment of a high number of virtual machines resulted in a network adapter connection failure
HA aborted several failover attempts for virtual machines after deployment and no dvPort data was loaded. The affected virtual machines were marked to start with their network adapters disconnected.
This issue was resolved in NSX 6.1.3.
Resolved User Interface Issues
- Adding Logical Switch to a Security Group failed
Adding a new Logical Switch or editing an existing Logical Switch as the include or exclude value in a Service Composer security group failed to complete, and the UI appeared to hang.
This issue was resolved in NSX 6.1.3.
- Cannot view VM settings from Web Client if VM had security
tags
Viewing a VM's settings from the vSphere Web Client
failed for users with no NSX role and displayed the error status
code = 403, status message = [Forbidden] if the VM included
security tag information.
This issue was resolved in NSX 6.1.3.
Known Issues
Known issues are grouped as follows:
Installation and Upgrade Issues
SSO cannot be reconfigured after upgrade
When the SSO server configured on NSX Manager is the one native on vCenter server, you cannot reconfigure SSO settings on NSX Manager after vCenter Server is upgraded to version 6.0 and NSX Manager is upgraded to version 6.1.3.
Workaround: None.
Service Deployment UI displays error vAppConfig not present for VM
Workaround: If you see the above error, check for the following:
- Deployment of the service virtual machine is complete.
- No tasks such as cloning, re-configuring, etc is in progress for that virtual machine in the vCenter Server task pane.
After steps 1 and 2 are complete, delete the service virtual machine. On the Service Deployment UI, the deployment is seen as Failed . On clicking the Red icon, an
alarm regarding the agent VM not available is displayed for the host. When you resolve the alarm, the virtual machine is redeployed and powered on.
vSphere Web Client does not display Networking and Security tab after backup and restore
When you perform a backup and restore operation after upgrading to NSX vSphere 6.1.3, the vSphere Web Client does not display the Networking and Security tab.
Workaround: When an NSX Manager backup is restored, you are logged out of the Appliance Manager. Wait a few minutes before logging in to the vSphere Web Client.
Versioned deployment spec needs to be updated to 6.0.* if using vCenter Server 6.0 and ESX 6.0.
The workaround depends on whether partners are currently on vCloud Networking and Security or NSX for vSphere.
- Partners that have NetX solutions registered with vCloud networking and Security must update registration to include a VersionedDeploymentSpec for 6.0.* with the corresponding OVF using REST API calls.
- Upgrade vSphere from 5.5 to 6.0.
- Add versioned deployment specification for 6.0.x using the following API call:
POST https://<vCNS-IP>/api/2.0/si/service/<service-id>/servicedeploymentspec/versioneddeploymentspec
<versionedDeploymentSpec>
<hostVersion>6.0.x</hostVersion>
<ovfUrl>http://sample.com/sample.ovf</ovfUrl>
<vmciEnabled>true</vmciEnabled>
</versionedDeploymentSpec>
The URL for the OVF file is provided by the partner.
- Update service by using the following REST call
POST https://<vsm-ip>/api/2.0/si/service/config?action=update
- Resolve the EAM alarm by following the steps below.
- In vSphere Web Client, click Home and then click Administration.
- In Solution, select vCenter Server Extension.
- Click vSphere ESX Agent Manager and then click the Manage tab.
- On failed agency status, right click and select Resolve All Issues.
- If partners that have NetX solutions registered with NSX upgrade vSphere to 6.0, they must update registration to include a VersionedDeploymentSpec for 6.0.* with the corresponding OVF.
Follow the steps below:
- Add versioned deployment specification for 6.0.* using the following steps.
- In vSphere Web Client, click Home and then click Networking and Security.
- Click Service Definitions and then Click "Service Name".
- Click Manage and then click Deployment.
- Click + and add ESX versions as 6.0.* and the OVF URL with the corresponding service virtual machine URL.
- Click OK.
- Resolve the issue by following the steps below.
- Click Installation.
- Click Service Deployments.
- Select the deployment and click Resolve.
After upgrading NSX vSphere from 6.0.7 to 6.1.3, vSphere Web Client crashes on login screen
After upgrading NSX Manager from 6.0.7 to 6.1.3, you will see exceptions displayed on the vSphere Web Client UI
login screen. You will not be able to login and perform operations on either vCenter or NSX Manager.
Workaround: Log into VCVA as root and restart the vSphere Web Client service.
If vCenter is rebooted during NSX vSphere upgrade process, incorrect Cluster Status is displayed
When you do host prep in an environment with multiple NSX prepared clusters during an upgrade and the vCenter Server gets rebooted after at
least one cluster has been prepared, the other clusters may show Cluster Status as Not Ready instead of showing an Update link. The hosts
in vCenter may also show Reboot Required.
Workaround: Do not reboot vCenter during Host Preparation.
After upgrading from vCloud Networking and Security 5.5.3 to NSX vSphere 6.0.5 or later, NSX Manager does not start up if you are using an SSL certificate with DSA-1024 keysize
SSL certificates with DSA-1024 keysize are not supported in NSX vSphere 6.0.5 onwards, so the upgrade is not successful.
Workaround: Import a new SSL certificate with a supported keysize before starting the upgrade.
NSX Edge upgrade fails if L2 VPN is enabled on the Edge
L2 VPN configuration update from 5.x or 6.0.x to 6.1 is not supported. Hence, Edge upgrade fails if it has L2 VPN configured on it.
Workaround: Delete L2 VPN configuration before upgrading NSX Edge. After the upgrade, re-configure L2 VPN.
SSL VPN does not send upgrade notification to remote client
SSL VPN gateway does not send an upgrade notification to the user. The administrator has to manually communicate that the SSL VPN gateway (server) is updated to the remote user and that they must update their clients.
After upgrading NSX from version 6.0 to 6.0.x or 6.1, NSX Edges are not listed on the UI
When you upgrade from NSX 6.0 to NSX 6.0.x or 6.1, the vSphere Web Client plug-in may not upgrade correctly. This may result in UI display issues such as missing NSX Edges.
This issue is not seen if you are upgrading from NSX 6.0.1 or later.
Workaround: Follow the steps below.
- In vCenter mob, click Content.
- In the Value column, click ExtensionManager.
- Look for [extensionList["com.vmware.vShieldManager"] and copy the string.
- In the Methods area, click UnregisterExtension.
- In the Value field, paste the string that you copied in step 3.
- Click Invoke Method.
This ensures deployment of the latest plug-in package.
vSphere Distributed Switch MTU does not get updated
If you specify an MTU value lower than the MTU of the vSphere distributed switch when preparing a cluster, the vSphere Distributed Switch does not get updated to this value. This is to ensure that existing traffic with the higher frame size isn't unintentionally dropped.
Workaround: Ensure that the MTU you specify when preparing the cluster is higher than or matches the current MTU of the vSphere distributed switch. The minimum required MTU for VXLAN is 1550.
If not all clusters in your environment are prepared, the Upgrade message for Distributed Firewall does not appear on the Host Preparation tab of Installation page
When you prepare clusters for network virtualization, Distributed Firewall is enabled on those clusters. If not all clusters in your environment are prepared, the upgrade message for Distributed
Firewall does not appear on the Host Preparation tab.
Workaround: Use the following REST call to upgrade Distributed Firewall:
PUT https://vsm-ip/api/4.0/firewall/globalroot-0/state
If a service group is modified after the upgrade to add or remove services, these changes are not reflected in the firewall table
User created service groups are expanded in the Edge Firewall table during upgrade - i.e., the Service column in the firewall table displays all services within the service group. If the service group is modified after the upgrade to add or remove services, these changes are not reflected in the firewall table.
Workaround: Create a new service group with a different name and then consume this service group in the firewall rule.
Guest Introspection installation fails with error
When installing Guest Introspection on a cluster, the install fails with the following error:
Invalid format for VIB Module
Workaround: In the vCenter Web Client, navigate to vCenter Home > Hosts and Clusters and reboot the hosts that have Reboot Required next to them in the left hand side inventory.
Service virtual machine deployed using the Service Deployments tab on the Installation page does not get powered on
Workaround: Follow the steps below.
- Manually remove the service virtual machine from the
ESX Agents resource pool in the cluster.
- Click Networking and Security and then click Installation.
- Click the Service Deployments tab.
- Select the appropriate service and click the Resolve icon.
The service virtual machine is redeployed.
If a service profile created in 6.0.x is bound to both security group and distributed portgroup or logical switch, Service Composer firewall rules are out of sync after upgrade to NSX 6.1.x
If a service profile binding was done to both security group and distributed portgroup or logical switch in 6.0.x, Service Composer rules are out of sync after the upgrade to 6.1. Rules cannot be published from the Service Composer UI.
Workaround: Follow the steps below.
- Unbind the service profile from the distributed portgroup or logical switch through the Service Definition UI.
- Create a new security group with the required distributed portgroup or logical switch as a member of that security group.
- Bind the service profile to the new security group through the Service Definition UI.
- Synchronize the firewall rules through the Service Composer UI.
General Issues
Unable to power on guest virtual machine
When you power on a guest virtual machine, the error All required agent virtual machines are not currently deployed may be displayed.
Workaround: Follow the steps below.
- In the vSphere Web Client, click Home and then click Administration.
- In Solution, select vCenter Server Extension.
- Click vSphere ESX Agent Manager and then click the Manage tab.
- Click Resolve.
Security policy name does not allow more than 229 characters
The security policy name field in the Security Policy tab of Service Composer can accept up to 229 characters. This is because policy names are prepended internally with a prefix.
Workaround: None.
NSX Manager Issues
After NSX Manager backup is restored, REST call shows status of fabric feature "com.vmware.vshield.vsm.messagingInfra" as "Red"
When you restore the backup of an NSX Manager and check the status of fabric feature "com.vmware.vshield.vsm.messagingInfra" using a REST API call, it is displayed as "Red" instead of "Green".
Workaround: Use the following REST API call to reset communication between NSX Manager and a single host or all hosts in a cluster.
POST https://<nsxmgr-ip>/api/2.0/nwfabric/configure?action=synchronize
<nwFabricFeatureConfig>
<featureId>com.vmware.vshield.vsm.messagingInfra</featureId>
<resourceConfig>
<resourceId>HOST/CLUSTER MOID</resourceId>
</resourceConfig>
</nwFabricFeatureConfig>
Syslog shows host name of backed up NSX Manager on the restored NSX Manager
Suppose the host name of the first NSX Manager is A and a backup is created for that NSX Manager. Now a second NSX Manager is installed and configured to the same IP address as the old Manager according to backup-restore docs, but host name is B. Restore is run on this NSX Manager. The restored NSX Manager shows host name A just after restore and host name B again after reboot.
Workaround: Host name of second NSX Manager should be configured to be same as the backed up NSX Manager.
CA signed certificate import needs an NSX Manager reboot before becoming effective
When you import an NSX Manager certificate signed by CA, the newly imported certificate does not become effective until NSX Manager is rebooted.
Workaround: Reboot NSX Manager by logging in to the NSX Manager virtual appliance or by using the reboot CLI command.
Networking and Security Tab not displayed in vSphere Web Client
After vSphere is upgraded to 6.0, you cannot see the Networking and Security Tab when you log in to the vSphere Web Client with the root user name.
Workaround: Log in as administrator@vsphere.local or as any other vCenter user which existed on vCenter Server before the upgrade and whose role was defined in NSX Manager.
Service Composer goes out of sync when policy changes are made while one of the Service Managers is down.
This is related to instances of multiple Services/Service Managers registered and policies created referencing those services.
If changes are made in Service Composer to such a policy when one of those Service Managers is down, the changes fail because of callback
failure to the Service Manager that is down. As a result, Service Composer goes out of sync.
Workaround: Ensure the Service Manger is responding and then issue a force sync from Service Composer.
Cannot remove and re-add a host to a cluster protected by Guest Introspection and third-party security solutions
If you remove a host from a cluster protected by Guest Introspection and third-party security solutions by disconnecting it and then removing it from vCenter Server, you may experience problems if you try to re-add the same host to the same cluster.
Workaround: To remove a host from a protected cluster, first put the host in maintenance mode. Next, move the host into an unprotected cluster or outside all clusters and then disconnect and remove the host.
vMotion of NSX Manager may display error Virtual ethernet card Network adapter 1 is not supported
You can ignore this error. Networking will work correctly after vMotion.
NSX Edge Issues
Upgrading an NSX 6.1.3 intallation to 6.1.4
renders NSX unable to delete existing NSX Edge Gateways
In NSX installations upgraded from 6.1.3 to 6.1.4, the existing NSX
Edge Gateways cannot be deleted after the upgrade to 6.1.4. To fix
this problem, see
VMware Knowledge Base
article 2117804 and contact VMware support for assistance. See
also VMware Knowledge Base
article 2119020 for information about NSX 6.1.3.
When a BGP neighbor filter rule is modified, the existing filters may not be applied for up to 40 seconds
When BGP filters are applied to an NSX Edge running IBGP, it may take up to 40 seconds for the filters to be applied on the IBGP session. During this time, NSX Edge may advertise routes which are denied in the BGP filter for the IBGP peer.
Workaround: None.
After enabling ECMP on a Logical Router, northbound Edge does not receive prefixes from the Logical Router
Workaround: Follow the steps below:
- Disable ECMP on the Logical Router.
- Disable OSPF.
- Enable ECMP.
- Enable OSPF.
If Certificate Authentication is enabled under Authentication configuration of SSL VPN-Plus service, connection to the SSL VPN server from an older version of Windows client fails
If Certificate Authentication is enabled, the TLS handshake between an older version of Windows client and the latest version of SSL VPN fails. This prevents the Windows client from connecting to SSL VPN. This issue does not occur for Linux & Mac clients or for a browser based connection to SSL VPN.
Workaround: Upgrade the Windows client to the latest version i.e. 6.1.3.
Upgrade of standalone NSX Edge as L2 VPN client is not supported
Workaround: You must deploy a new standalone Edge OVF and reconfigure the appliance settings.
When the direct aggregate network in local and remote subnet of an IPsec VPN channel is removed,
the aggregate route to the indirect subnets of the peer Edge also disappear
When there is no default gateway on Edge and you remove all of the direct connect
subnets in local subnets and part of the remote subnets at the same time when configuring IPsec,
the remaining peer subnets become unreachable by IPsec VPN.
Workaround: Disable and re-enable IPsec VPN on NSX Edge.
SSL VPN Plus logon/logoff script modify not working
The modify script is correctly reflected on the vSphere Web Client but not on the gateway.
Workaround: Delete the original script and add again.
Adding a route that is learned through protocol as connected results in the local Forwarding Information Base (FIB) table showing both connected and dynamically learned routes
If you add a route already learned through protocol as connected, the local FIB shows both connected and dynamically learned routes. The dynamically learned route is shown as preferred over the route directly connected.
Workaround: Withdraw the learned route from the route advertisement so that it gets deleted from the FIB table and configure only the connected route.
If an NSX Edge virtual machine with one sub interface backed by a logical switch is deleted through the vCenter Web Client user interface, data path may not work for a new virtual machine that connects to the same port
When the Edge virtual machine is deleted through the vCenter Web Client user interface (and not from NSX Manager), the vxlan trunk configured on dvPort over opaque channel does not get reset. This is because trunk configuration is managed by NSX Manager.
Workaround: Manually delete the vxlan trunk configuration by following the steps below:
- Navigate to the vCenter Managed Object Browser by typing the following in a browser window:
https://vc-ip/mob?vmodl=1
- Click Content.
- Retrieve the dvsUuid value by following the steps below.
- Click the rootFolder link (for example, group-d1(Datacenters)).
- Click the data center name link (for example, datacenter-1).
- Click the networkFolder link (for example, group-n6).
- Click the DVS name link (for example, dvs-1)
- Copy the value of uuid.
- Click DVSManager and then click updateOpaqueDataEx.
- In selectionSet, add the following XML
<selectionSet xsi:type="DVPortSelection">
<dvsUuid>value</dvsUuid>
<portKey>value</portKeyv <!--port number of the DVPG where trunk vnic got connected-->
</selectionSet>
- In opaqueDataSpec, add the following XML
<opaqueDataSpec>
<operation>remove</operation>
<opaqueData>
<key>com.vmware.net.vxlan.trunkcfg</key>
<opaqueData></opaqueData>
</opaqueData>
</opaqueDataSpec>
- Set isRuntime to false.
- Click Invoke Method.
- Repeat steps 5 through 8 for each trunk port configured on the deleted Edge virtual machine.
When Default Originate is enabled, BGP filter for deny default route does not get applied
When BGP Default Originate is enabled on an NSX Edge, a default route gets advertised to all BGP neighbors unconditionally. If you do not want a BGP neighbor to install the default route advertised by this BGP speaker, you must configure an inbound policy on that BGP neighbor to reject the default route.
Workaround: Configure an inbound policy on the appropriate BGP neighbor to reject the default route.
Cannot add non-ASCII characters in bridge or tenant name for Logical Router
NSX controller APIs do not support non-ASCII characters.
Workaround: Use ASCII characters in bridge and tenant names. You can then edit the names to include non-ASCII characters.
SNAT and Load Balancer (with L4 SNAT) configured on a sub interface do not work
SNAT rule configuration passes on NSX Edge but the data path for the rule does not work due to RP Filter checks.
Workaround: Contact VMware Support for help in relaxing the RP filter check on NSX Edge.
When egress optimization is enabled for L2 VPN, load balancer with pool members stretched across site are shown as down
With egress optimization, both L2 VPN client and server have the same internal IP address. Because of this, any packet from a pool member to the load balancer does not reach NSX Edge.
Workaround: Do one of the following.
- Disable egress optimization.
- Assign an IP address for load balancer that is different from the egress-optimized IP address.
Static routes do not get pushed to hosts when a next hop address is not specified
The UI allows you to create a static route on an NSX Edge device without specifying a next hop address. If you do not specify a next hop address, the static route does not get pushed to hosts.
Workaround: Always specify a next hop address for static routes.
Cannot configure NSX firewall using security groups or other grouping objects defined at global scope
Administrator users defined at the NSX Edge scope cannot access objects defined at the global scope. For example, if user abc is defined at Edge scope and security group sg-1 is defined at global scope, then abc will not be able to use sg-1 in firewall configuration on the NSX Edge.
Workaround: The administrator must use grouping objects defined at NSX Edge scope only, or must create a copy of the global scope objects at the NSX Edge scope.
Logical Router LIF routes are advertised by upstream Edge Services Gateway even if Logical Router OSPF is disabled
Upstream Edge Services Gateway will continue to advertise OSPF external LSAs learned from Logical Router connected interfaces even when Logical Router OSPF is disabled.
Workaround: Disable redistribution of connected routes into OSPF manually and publish before disabling OSPF protocol. This ensures that routes are properly withdrawn.
When HA is enabled on Edge Services Gateway, OSPF hello and dead interval configured to values other than 30 seconds and 120 seconds respectively can cause some traffic loss during failover
When the primary NSX Edge fails with OSPF running and HA enabled, the time required for standby to take over exceeds the graceful restart timeout and results in OSPF neighbors removing learned routes from their Forwarding Information Base (FIB) table. This results in dataplane outage until OSPF re converges.
Workaround: Set the default hello and dead interval timeouts on all neighboring routers to 30 seconds for hello interval and 120 seconds for dead interval. This enables graceful failover without traffic loss.
The UI allows you to add multiple IP addresses to a Logical Router interface though it is not supported
This release does not support multiple IP addresses for a logical router interface.
Workaround: None.
SSL VPN does not support Certificate Revocation Lists (CRL)
A CRL can be added to NSX Edge, but this CRL is not consumed by SSL VPN.
Workaround: CRL is not supported, but you can enable user authentication with client certificate authentication.
Must use IP address, not hostname, to add an external authentication server to SSL VPN-Plus
You cannot use the FQDN or hostname of the external authentication server.
Workaround: You must use the IP address of the external authentication server.
Firewall Issues
UI shows error Firewall Publish Failed despite successful publish
If Distributed Firewall is enabled on a subset of clusters in your environment and you update an application group that is used in one or more active firewall rules, any publish action on the UI will display an error message containing IDs of the hosts belonging to the clusters where NSX firewall is not enabled.
Despite error messages, rules will be successfully published and enforced on the hosts where Distributed Firewall is enabled.
Workaround: Contact VMware Support to clear the UI messages.
If you delete the firewall configuration using a REST API call, you cannot load and publish saved configurations
When you delete the firewall configuration, a new default section is created with a new section ID. When you load a saved draft (that has the same section name but an older section ID), section names conflict and display the following error:
Duplicate key value violates unique constraint firewall_section_name_key
Workaround: Do one of the following:
- Rename the current default firewall section after loading a saved configuration.
- Rename the default section on a loaded saved configuration before publishing it.
When IPFIX configuration is enabled for Distributed Firewall, firewall ports in the ESXi management interface for NetFlow for vDS or SNMP may be removed
When a collector IP and port is defined for IPFIX, the firewall for ESXi management interface is opened up in the outbound direction for the specified UDP collector ports. This
operation may remove the dynamic ruleset configuration on ESXi management interface firewall for the following services if they were previously configured on the ESXi host:
- Netflow collector port configuration on vDS
- SNMP target port configuration
Workaround: To add the dynamic ruleset rules back, you must refresh the netFlow settings for vDS in the vCenter Web Client. You must also add the snmp target again using esxcli system
snmp commands. This will need to be repeated if the ESXi host is rebooted after IPFIX configuration is enabled or if the esx-vsip VIB is uninstalled from the host.
Logical Switch Issues
Creating a large number of logical switches with high concurrency using an API call may result in some failures
This issue may occur if you create a large number of logical switches using the following API call:
POST https://<nsxmgr-ip>/api/2.0/vdn/scopes/scopeID/virtualwires
Some logical switches may not be created.
Workaround: Re-run the API call.
Service Deployment Issues
Data Security service status is shown as UP even when IP connectivity is not established
Data Security appliance may have not received the IP address from DHCP or is connected to an incorrect port group.
Workaround: Ensure that the Data Security appliance gets the IP from DHCP/IP Pool and is reachable from the management network. Check if the ping to the Data Security appliance is successful from NSX/ESX.
Old service virtual machines not functioning
Old service virtual machines that were left behind on hosts during host removal from the vCenter Server remain disconnected and are unable to function when the host is added back to the same vCenter Server.
Workaround: Follow the steps below:
- Move the host from the protected cluster to either an unprotected cluster or outside all clusters. This will uninstall the service virtual machines from the host.
- Remove the host from the vCenter Server.
Service insertion Issues
Deleting security rules via REST displays error
If a REST API call is used to delete security rules created by Service Composer, the corresponding rule set is not actually deleted in the service profile cache resulting in an ObjectNotFoundException error.
Workaround: None.
Security policy configured as a port range causes firewall to go out of sync
Configuring security policies as a port range (for example, "5900-5964") will cause the firewall to go out of sync with a NumberFormatException error.
Workaround: You must configure firewall security policies as a comma-separated protocol port list.
Document Revision History
27 May 2015: Noted issue 1446544 / 1445066. (6.1.3-to-6.1.4 upgrades not recommended.)
23 March 2015: First Edition for NSX 6.1.3.
|