GigaVUE V Series in VMware
Prerequisites for Integrating V Series Nodes with vCenter
Few VMware vCenter versions are supported, with the GigaVUE V Series nodes hosted on ESXi hosts. Refer to the Release Notes for the hardware requirements on which VMware ESXi runs V Series Node.
Note: To support internationalized characters in the VMware vCenter environment ensure that the vCenter character encoding is set to UTF-8.
The following are the prerequisites for integrating V Series nodes with ESXi:
-
VMware ESXi Standard Version must be either 6.7 u3 or 7.0.
-
VMware vCenter Server Version must be either 6.7 u3 or 7.0.
Note: Both VMware ESXi Standard Version and VMware vCenter Server Version must be same. For example. if the VMware ESXi Standard Version is 6.7 u3 , the VMware vCenter Server Version must also be 6.7 u3 .
-
ESXi hosts must have the minimum vCPU and memory resources.
-
GigaVUE-FM version 5.12.xx or later.
-
V Series 2.x device OVA image file.
-
All the target VMs must have VMware guest tools or Open VM tools if workload VMs is selected based on IP address.
-
Port number 8889 must be available for GigaVUE-FM to access V Series nodes.
The V Series 2 Node OVA image files can be downloaded from the Gigamon Customer Portal.
Network Firewall Requirements for ESXi
Following are the Network Firewall Requirements for V Series 2 node deployment.
Direction |
Type |
Protocol |
Port |
Source/Destination |
Purpose |
||||||||||||||||||||||||
GigaVUE‑FM |
|||||||||||||||||||||||||||||
Inbound |
|
TCP |
|
Administrator Subnet |
Management connection to GigaVUE‑FM |
||||||||||||||||||||||||
Outbound |
HTTPS |
TCP |
443 |
All ESXi hosts IP and vCenter IP |
Allows GigaVUE‑FM to communicate with vCenter and all ESXi hosts and NSX-T managers to import the V Series OVA files |
||||||||||||||||||||||||
Outbound |
Custom TCP Rule |
TCP |
8889 |
V Series 2 Node IP |
Allows GigaVUE‑FM to communicate with V Series node |
||||||||||||||||||||||||
V Series 2 node |
|||||||||||||||||||||||||||||
Inbound |
Custom TCP Rule |
TCP |
8889 |
GigaVUE-FM IP |
Allows GigaVUE‑FM to communicate with V Series node |
||||||||||||||||||||||||
Inbound |
|
|
|
Ingress Tunnel |
Allows to UDPGRE Tunnel to communicate and tunnel traffic to V Series nodes |
||||||||||||||||||||||||
Outbound |
Custom UDP Rule |
UDP (VXLAN) |
VXLAN (default 4789) |
Tool IP |
Allows V Series node to communicate and tunnel traffic to the Tool |
||||||||||||||||||||||||
Outbound (optional) |
ICMP |
ICMP |
|
Tool IP |
Allows V Series node to health check tunnel destination traffic |
Recommended Instance Types for ESXi
The instance size of the V Series is configured on the OVF file and packaged as part of the OVA image file. The following table lists the available instance types and sizes based on memory and the number of vCPUs for a single V series node. Instances sizes can be different for V Series nodes in different ESXi hosts and the default size is Small.
Type |
Memory |
vCPU |
Disk space |
vNIC |
---|---|---|---|---|
Small |
4GB |
2 vCPU |
8GB |
1 Management interface, 1 Tunnel interface, and 8 vTAP interfaces |
Medium |
8GB |
4 vCPU |
||
Large |
16GB |
8 vCPU |
Note: Refer to Support, Sales, or Professional Services for deployment optimization.
Required VMware Virtual Center Privileges
This section lists the minimum privileges required for the GigaVUE-FM user in Virtual Center. You assign privileges to Virtual Center users by selecting Roles > Administration > Role, and then use the Edit Role dialog box in vCenter. Roles should be applied at the vSphere Virtual Center level and not the Data Center or Host levels.
The following table lists the minimum required permissions for GigaVUE-FM to manage the virtual center.
Category |
Required Privilege |
Purpose |
---|---|---|
Host |
Configuration
|
VSS Tapping |
Inventory
|
Pin V Series Node to the host in cluster configurations. This prevents automatic migration. |
|
Datastore |
|
V Series Node Deployment |
Distributed Switch |
|
VDS Tapping |
Network |
|
V Series Node Deployment/VSS Tapping V Series Node Deployment |
Resource |
|
V Series Node Deployment |
vApp |
|
V Series Node Deployment V Series Node Deployment |
Virtual machine |
Configuration
|
V Series Node Deployment V Series Node Deployment/VSS Tapping |
Interaction
|
V Series Node Deployment V Series Node Deployment V Series Node Deployment |
|
Inventory
|
V Series Node Deployment V Series Node Deployment |
|
Provisioning
|
V Series Node Deployment |
Prerequisites for Integrating V Series Nodes with NSX-T
Refer to the Release Notes for the hardware requirements on which VMware NSX-T runs V Series Node.
The following are the prerequisites for integrating V Series nodes with NSX-T:
-
VMware vCenter Standard Version must be 6.7 u3, and 7.0 with the required privileges. Refer to Required VMware Virtual Center Privileges for more information on vCenter privileges.
-
Before deploying V Series nodes through GigaVUE-FM, Service segments must be created in the NSX-T manager.
-
NSX-T versions must be 2.5.1, 2.5.2, 3.0, 3.0.2, 3.1.2. If you have other versions, please contact Gigamon support.
Note: NSX-T is different than the ESXi implementation for hosting the V Series OVA file on an image server. In that you need to have an image server to host the V Series image file. The default http port supported is 80. However, if the image server listens on any port other than the default http port then, the port number should be provided in the image URL. For example: If the image server listens on port 8080, then the image URL should be http://IP_Address:8080/path_to_ova .
-
GigaVUE-FM version 5.12.xx or later.
-
V Series 2.2 device OVA image file.
-
Port number 8889 must be available for GigaVUE-FM to access V Series nodes.
Note: You cannot have both GigaVUE-VM and V Series node visibility solutions deployed on the same vCenter.
The V Series 2.x Node OVA image files can be downloaded from the Gigamon Customer Portal.
Network Firewall Requirements for NSX-T
Following are the Network Firewall Requirements for V Series 2 node deployment.
Direction |
Type |
Protocol |
Port |
Source/Destination |
Purpose |
||||||||||||||||||||||||
GigaVUE‑FM |
|||||||||||||||||||||||||||||
Inbound |
|
TCP |
|
Administrator Subnet |
Management connection to GigaVUE‑FM |
||||||||||||||||||||||||
Outbound |
HTTPS |
TCP |
443 |
All ESXi hosts IP and vCenter IP |
Allows GigaVUE‑FM to communicate with vCenter and all ESXi hosts and NSX-T managers to import the V Series OVA files |
||||||||||||||||||||||||
Outbound |
Custom TCP Rule |
TCP |
8889 |
V Series 2 Node IP |
Allows GigaVUE‑FM to communicate with V Series node |
||||||||||||||||||||||||
V Series 2 node |
|||||||||||||||||||||||||||||
Inbound |
Custom TCP Rule |
TCP |
8889 |
GigaVUE-FM IP |
Allows GigaVUE‑FM to communicate with V Series node |
||||||||||||||||||||||||
Inbound |
|
|
|
Ingress Tunnel |
Allows to UDPGRE Tunnel to communicate and tunnel traffic to V Series nodes |
||||||||||||||||||||||||
Outbound |
Custom UDP Rule |
UDP (VXLAN) |
VXLAN (default 4789) |
Tool IP |
Allows V Series node to communicate and tunnel traffic to the Tool |
||||||||||||||||||||||||
Outbound (optional) |
ICMP |
ICMP |
|
Tool IP |
Allows V Series node to health check tunnel destination traffic |
Recommended Instance Types for NSX-T
The instance size of the V Series is configured on the OVF file and packaged as part of the OVA image file. The following table lists the available instance types and sizes based on memory and the number of vCPUs for a single V series node. Instances sizes can be different for V Series nodes in different NSX-T hosts and the default size is Small.
Type |
Memory |
vCPU |
Disk space |
Recommended Traffic Volume |
---|---|---|---|---|
Small |
4GB |
2 vCPU |
8GB |
upto 2G |
Medium |
8GB |
4 vCPU |
8GB |
upto 4G |
Large |
16GB |
8 vCPU |
8GB |
More than 4G |
For more specific throughput information on specific applications, please contact Gigamon Support.