The architect of a multi-site VMware Cloud Foundation solution is tasked with ensuring that the prerequisites for vSAN data at rest encryption have been achieved. The existing design calls for use of the vSphere Native Key Provider. NSX-T is configured with Federation, and both sites benefit from a stretched TO and T1 network topology.
A new security policy requires the use of vSphere Virtual Machine encryption, in addition to the at-rest encryption already configured. During a failover test from Site-A to Site-B using Site Recovery Manager, the virtual machines were unable to power-on.
How does the design need to be changed to support the new requirement?
According to VMware Cloud Foundation Planning and Preparation Workbook, a statement that is true regarding NSX Manager configuration in a VMware Cloud Foundation environment is:
The cluster virtual IP address (VIP) address must be used for API and GUI access to NSX Managers
Currently there are no comments in this discussion, be the first to comment!