Configure Access to the NSX Manager
Table of Contents
10.0 (EoL)
Expand all | Collapse all
-
- Objects > Addresses
- Objects > Address Groups
- Objects > Regions
- Objects > Dynamic User Groups
- Objects > Application Groups
- Objects > Application Filters
- Objects > Services
- Objects > Service Groups
- Objects > Devices
- Objects > External Dynamic Lists
- Objects > Custom Objects > Spyware/Vulnerability
- Objects > Custom Objects > URL Category
- Objects > Security Profiles > Antivirus
- Objects > Security Profiles > Anti-Spyware Profile
- Objects > Security Profiles > Vulnerability Protection
- Objects > Security Profiles > File Blocking
- Objects > Security Profiles > WildFire Analysis
- Objects > Security Profiles > Data Filtering
- Objects > Security Profiles > DoS Protection
- Objects > Security Profiles > Mobile Network Protection
- Objects > Security Profiles > SCTP Protection
- Objects > Security Profile Groups
- Objects > Log Forwarding
- Objects > Authentication
- Objects > Decryption > Forwarding Profile
- Objects > Schedules
-
-
- Firewall Interfaces Overview
- Common Building Blocks for Firewall Interfaces
- Common Building Blocks for PA-7000 Series Firewall Interfaces
- Tap Interface
- HA Interface
- Virtual Wire Interface
- Virtual Wire Subinterface
- PA-7000 Series Layer 2 Interface
- PA-7000 Series Layer 2 Subinterface
- PA-7000 Series Layer 3 Interface
- Layer 3 Interface
- Layer 3 Subinterface
- Log Card Interface
- Log Card Subinterface
- Decrypt Mirror Interface
- Aggregate Ethernet (AE) Interface Group
- Aggregate Ethernet (AE) Interface
- Network > Interfaces > VLAN
- Network > Interfaces > Loopback
- Network > Interfaces > Tunnel
- Network > Interfaces > SD-WAN
- Network > VLANs
- Network > Virtual Wires
-
- Network > Network Profiles > GlobalProtect IPSec Crypto
- Network > Network Profiles > IPSec Crypto
- Network > Network Profiles > IKE Crypto
- Network > Network Profiles > Monitor
- Network > Network Profiles > Interface Mgmt
- Network > Network Profiles > QoS
- Network > Network Profiles > LLDP Profile
- Network > Network Profiles > SD-WAN Interface Profile
-
-
- Device > Setup
- Device > Setup > Management
- Device > Setup > Interfaces
- Device > Setup > Telemetry
- Device > Setup > Content-ID
- Device > Setup > WildFire
- Device > Setup > DLP
- Device > Log Forwarding Card
- Device > Config Audit
- Device > Administrators
- Device > Admin Roles
- Device > Access Domain
- Device > Authentication Sequence
- Device > Device Quarantine
-
- Security Policy Match
- QoS Policy Match
- Authentication Policy Match
- Decryption/SSL Policy Match
- NAT Policy Match
- Policy Based Forwarding Policy Match
- DoS Policy Match
- Routing
- Test Wildfire
- Threat Vault
- Ping
- Trace Route
- Log Collector Connectivity
- External Dynamic List
- Update Server
- Test Cloud Logging Service Status
- Test Cloud GP Service Status
- Device > Virtual Systems
- Device > Shared Gateways
- Device > Certificate Management
- Device > Certificate Management > Certificate Profile
- Device > Certificate Management > OCSP Responder
- Device > Certificate Management > SSL/TLS Service Profile
- Device > Certificate Management > SCEP
- Device > Certificate Management > SSL Decryption Exclusion
- Device > Certificate Management > SSH Service Profile
- Device > Response Pages
- Device > Server Profiles
- Device > Server Profiles > SNMP Trap
- Device > Server Profiles > Syslog
- Device > Server Profiles > Email
- Device > Server Profiles > HTTP
- Device > Server Profiles > NetFlow
- Device > Server Profiles > RADIUS
- Device > Server Profiles > TACACS+
- Device > Server Profiles > LDAP
- Device > Server Profiles > Kerberos
- Device > Server Profiles > SAML Identity Provider
- Device > Server Profiles > DNS
- Device > Server Profiles > Multi Factor Authentication
- Device > Local User Database > Users
- Device > Local User Database > User Groups
- Device > Scheduled Log Export
- Device > Software
- Device > Dynamic Updates
- Device > Licenses
- Device > Support
- Device > Policy Recommendation
-
- Network > GlobalProtect > MDM
- Network > GlobalProtect > Clientless Apps
- Network > GlobalProtect > Clientless App Groups
- Objects > GlobalProtect > HIP Profiles
-
- Use the Panorama Web Interface
- Context Switch
- Panorama Commit Operations
- Defining Policies on Panorama
- Log Storage Partitions for a Panorama Virtual Appliance in Legacy Mode
- Panorama > Setup > Interfaces
- Panorama > High Availability
- Panorama > Administrators
- Panorama > Admin Roles
- Panorama > Access Domains
- Panorama > Device Groups
- Panorama > Plugins
- Panorama > Log Ingestion Profile
- Panorama > Log Settings
- Panorama > Server Profiles > SCP
- Panorama > Scheduled Config Export
End-of-Life (EoL)
Configure Access to the NSX Manager
- Panorama > VMware NSX > Service Managers
To enable Panorama to communicate with the NSX Manager, Add and configure
the settings as described in the following table.
Service Managers | Description |
---|---|
Service Manager Name | Enter a name to identify the VM-Series firewall
as a service. This name displays on the NSX Manager and is used
to deploy the VM-Series firewall on-demand. Supports up to
63 characters; use only letters, numbers, hyphens, and underscores. |
Description | (Optional) Enter a label to describe
the purpose or function of this service. |
NSX Manager URL | Specify the URL that Panorama will use to
establish a connection with the NSX Manager. |
NSX Manager Login | Enter the authentication
credentials—username and password—configured on the NSX Manager.
Panorama uses these credentials to authenticate with the NSX Manager. |
NSX Manager Password | |
Confirm NSX Manager Password | |
Service Definitions | Specify the service definitions associated
with this service manager. Each service manager supports up to 32
service definitions. |
After committing the changes to Panorama, the VMware Service
Manager window displays the connection status between Panorama and
the NSX Manager.
Sync Status | Description |
---|---|
Status | Displays the connection status between Panorama
and the NSX Manager. A successful connection displays as Registered—Panorama
and the NSX Manager are synchronized and the VM-Series firewall
is registered as a service on the NSX Manager. For an unsuccessful
connection, the status can be:
|
Synchronize Dynamic Objects | Click Synchronize Dynamic Objects to
refresh the dynamic object information from the NSX Manager. Synchronizing
dynamic objects enables you to maintain context on changes in the
virtual environment and allows you to safely enable applications
by automatically updating the Dynamic Address Groups used in policy rules. On
Panorama, you can view only the IP addresses that are dynamically
registered from the NSX Manager. Panorama does not display the dynamic
IP addresses that are registered directly to the firewalls. If you
use VM Information Sources (not supported on the VM-Series NSX edition
firewalls) or the XML API to register IP addresses dynamically to
the firewalls, you must log in to each firewall to view the complete
list of dynamic IP addresses (both those that Panorama pushed and
those that are locally registered) on the firewall. |
NSX Config-Sync | Select NSX Config-Sync to
synchronize the service definitions configured on Panorama with
the NSX Manager. If you have any pending commits on Panorama, this
option is not available. If the synchronization fails, view
the details in the error message to know whether the error is on
Panorama or on the NSX Manager. For example, when you delete a service
definition on Panorama, the synchronization with the NSX Manager
fails if the service definition is referenced in a rule on the NSX
Manager. Use the information in the error message to determine the
reason for failure and where you need to take corrective action
(on Panorama or on the NSX Manager). |