The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
This chapter describes how to troubleshoot various issues that could occur while the Cisco VSG is communicating with the Virtual Supervisor Module (VSM), Virtual Ethernet Module (VEM), Cisco Virtual Netework Management Center (VNMC), or the vCenter Server.
This chapter includes the following sections:
This section describes how to troubleshoot issues with the Cisco VSG and VSM interactions.
The port profile used to bring up the data interface of the Cisco VSG should not have any vn service or org configured.
This example shows how to use a port profile to bring up the Cisco VSG data interface:
Make sure that you add the Cisco VSG service VLAN and HA VLAN as part of the allowed VLAN under the uplink port profile. Without adding this information into the allowed VLAN, Cisco VSGs may not pair. If you have a Cisco VSG on one VEM and the VMs to be firewalled are on another VEM, you must make sure that the Cisco VSG service VLAN is added as the allowed VLAN under the uplink port profile.
The example shows that VLAN 753 and 754 are added as part of the trunk. The VLAN 751 is used for control (VSM), the VLAN 752 for packet, the VLAN 754 for the Cisco VSG service, and the VLAN 753 for the Cisco VSG high availability.
For the port profiles that are used to protect the VMs, make sure that you provide the correct vn service IP (the exact data 0 IP address of the Cisco VSG), and the service VLAN and the security profile name. Make sure under the org that you have configured the tenant name as root/Tenant-cisco.
This section describes how to troubleshoot issues with Cisco VSG and VEM interactions.
This section includes the following topics:
Sometimes, when the policies are configured on the Cisco VSG and the data traffic is sent from the VMs, traffic flows through the Cisco Nexus 1000V switch as if the firewall service is not enabled on the port.
Verify if the LTL is found as follows:
The VSG Licenses Available message should display a nonzero value in the output.
Note All vemcmd commands can be executed by logging into the ESX via SSH.
When policies are configured on the Cisco VSG to permit a certain type of traffic, but the traffic does not reach the destination, a complete failure can result.
The Virtual Ethernet Modules (VEMs) have not learned the MAC address of the Cisco VSG.
Check if the Cisco VSG MAC address is learned on all the VEMs that host the protected VMs involved in the communication by entering the vemcmd show vsn config command on the VEM.
This example shows how to display the Cisco VSG configuration:
The following conditions should be displayed on the command output:
You can find the MAC address of the Cisco VSG by entering the show interface data 0 command.
This example shows how to display information on the interface for the Cisco VSG:
If the learned MAC address in the vemcmd show vsn config command is 00:00:00:00:00:00, manually check if the Cisco VSG service (data) interface is bound to the proper port profile and has the right VLAN configured.
You can check the Cisco VSG service interface assignment on the VEM by entering the vemcmd show command.
This example shows how to check the Cisco VSG service interface assignment on the VEM:
The Cisco VSG VM name should be displayed as part of the output.
You can display the port profile that is associated with the Cisco VSG’s service interface by entering the show port-profile name pp-name command on the VSM.
If the Cisco VSG is bound to the proper port profile and has the correct service VLAN, check the upstream switches. Ensure that this service VLAN is configured across all ports in all upstream switches to which all the VEMs (those talking to that Cisco VSG) are connected.
You can ensure that the service VLAN is configured and enabled (active) on the VSM by entering the show vlan command.
This example shows how to display the VLAN configurations:
Make sure that the following occurs:
You can confirm the configuration by entering the show running-config port-profile system-data-uplink command.
This example shows how to confirm the configuration:
After performing VMotion of the traffic VM, the security posture as defined by the policies in the Cisco VSG can be disrupted.
This example shows how to display the Cisco VSG MAC information:
– The VNS Licenses Available message should display a nonzero value.
– The learned MAC address should not be 00:00:00:00:00:00 for the layer 2 adjacent node.
– The learned MAC address should match with the MAC address of the Cisco VSG that is intended to protect the VMs.
This example shows how to find the MAC address of the Cisco VSG on the corresponding Cisco VSG:
This example shows how to check the Cisco VSG service interface assignment on the VEM:
The Cisco VSG VM name should be displayed as part of the output.
You can view the port-profile information for the Cisco VSG's service interface by entering the show port-profile name pp-name command on the VSM.
If the Cisco VSG is bound to the proper port profile and has the correct service VLAN, check the upstream switches. Ensure the service VLAN is configured across all ports in all upstream switches to which all the VEMs (those talking to that Cisco VSG) are connected.
When policy decisions are inconsistent with the port-profile changes, either of these conditions can exist:
Because of the existing flows, the old policy decision is continued.
Administrators must clear the flows in the vPath and Cisco VSG when the policy is modified.
You can use the vpath ping command to determine the connectivity between the Cisco VSG and the VEM.
This example shows how to ping the Cisco VSG connections and if they are reachable:
This example shows how to display VSN ping options:
This example shows how to display VSN ping options for all source modules:
This example shows how to set up a ping for all source modules from a specified IP address:
This example shows to set up a ping for all vPath source modules for a specified IP address:
This example shows how to set up a ping for all source modules of a specified IP address with a time-out and a count:
After registering the VSM to the Cisco VNMC, you can check the status of the VSM and Cisco VNMC policy agents by entering the show vnm-pa status comamand.
This example shows how to check the status:
If there is a failure, there can be several reasons. One failure could be because the Cisco VNMC is unreachable or dead. Ping to the Cisco VNMC IP to check for a response. If there is no response, look at the network connectivity.
Another reason could occur because of the wrong shared secret.
This example shows the results of this type of failure:
Provide the correct password and register again.
On the Cisco VNMC GUI, on the Administration > Service Registery > Clients tab, make sure that the registered VSM is shown as registered under the Oper State column.
On the Cisco VNMC GUI, make sure that the org is configured in the same way as in the port profile. The registered VSM should also be available under the Resources > Virtual Supervisor Modules. If the org is not properly configured on the port profile, the Config State will display as “org-not-found” under the port profiles tab of the registered VSM. After editing the port profile with the correct org name, the Config State changes to OK.
After registering the Cisco VSG to the Cisco VNMC, you can check the status by entering the show vnm-pa status command.
This example shows how to check the Cisco VSG registration status:
If there is a failure, there can be several reasons. One failure could be because the Cisco VNMC is unreachable or dead. Ping to the Cisco VNMC IP to check for a response. If there is no response, look at the network connectivity.
Another reason could occur because of the wrong shared secret.
This example shows how to display the results of this type of failure:
Provide the correct password and register again.
On the Cisco VNMC GUI, on the Administration > Service Registery > Clients tab, make sure that the registered VSM is shown as registered under the Oper State column.
To enable the Cisco VNMC to communicate with the vCenter Server, you must have installed the Cisco VNMC's vCenter extension XML plug-in.
The vCenter Server is added to the Cisco VNMC with the provided IP address and name under Administration > VM Managers > Add VM manager. The Operational State of the newly added vCenter Server indicates that it is up.
Other possible operational states could be unreachable or bad credentials. If the state is unreachable, the vCenter Server is down or could not be reached. To check if you can access the vCenter server on the Cisco VNMC, use SSH to the Cisco VNMC with the user as admin and the VNMC password.
You can check reachability by entering the connect local-mgmt command.
This example shows how to access the vCenter Server:
Use the ping command to check if you can reach the vCenter Server (assuming that the vCenter Server does not block the ping command).
On the Cisco VNMC GUI, go to Administration > VMManagers tab and expand the VM Managers. Click on the vCenter Server object and review the right pane. If the state shows as bad-credentials, you have not registered the vCenter Server extension XML plugin for that vCenter Server. Go to the vCenter Server that is being added and install the vCenter Server extension XML plugin. For instructions, see “Chapter 7 - Configuring VM Managers” of the Cisco Virtual Network Management Center GUI Configuration Guide.
You can run a series of checks to ensure that interactions between the Cisco VSG and VEM are seamless.
Run the following verifications:
This example shows how to display the Cisco VSG configuration:
If a specific Cisco VSG is not alive (wherein ‘Unreach’ or ‘??’ is displayed), use the show vservice detail node_ipaddr node ip command for further analysis.