Associating an NSX-T service profile with a VDOM
You can associate NSX-T service profiles with individual VDOMs of FortiGate instances to redirect traffic from one VDOM to another.
To associate an NSX-T service profile with a VDOM:
- Create a service profile for each VDOM in the VMware NSX-T:
- Go to Security > Settings (Network Introspection Settings) > Service Profiles.
- Click ADD SERVICE PROFILE.
- In the Service Profile Name field, enter the desired name.
- From the Vendor Template dropdown list, select the desired template.
- Click SAVE.
- Repeat the process for other VDOMs as desired.
- Create a service chain for each VDOM:
- Go to Security > Settings (Network Introspection Settings) > Service Chains.
- Click ADD CHAIN.
- In the Name field, enter the desired name.
- From the Service Segments dropdown list, select the desired service segment.
- In the Forward Path field, add the service profile that you created in step 1.
- Add other service profiles in sequence as needed.
- Enable Inverse Forward Path.
- Click SAVE.
- Configure the NSX-T connector:
- In FortiManager in the same ADOM as the NSX-T connector, go to Policy & Objects > Object Configurations > Endpoint/Identity.
- Select the NSX-T connector, then click Configure.
- Select a service, then click Configure.
- Click Add to add a new service chain.
- From the Device dropdown list, select the device to which to apply the service chain.
- From the Index and Reverse Index dropdown lists, select the newly created service profile.
- From the Chain ID and VDOM dropdown lists, select the chain ID and VDOM to apply the service chain to.
- Click OK.
-
Import the device settings to the FortiGate:
- In FortiManager, go to Device Manager.
- Select the FortiGate to apply the newly created policy to.
- Run the install wizard to import the changed device settings.
- In NSX-T Manager, go to Security > Network Introspection (E-W).
- Click ADD POLICY.
- Select the chain that corresponds to the VDOM where traffic will be redirected.
- In the policy options menu, click Add Rule to add the new rule to the policy.
NSX-T allows you to create rules that apply to the same security group under different policies. See Add Redirection rules for E-W traffic. This configuration is not recommended while using VDOMs, as it may lead to unintended behavior.
See East-West Network Security - Chaining Third-party Services for information on configuring redirection rules.
- Click Publish to apply changes.