Palo Alto / M81KR mezzanine and n1kv

Hi all

Whenever I try to install n1kv on a couple of blades B200 M2 with mezzanine M81KR, both boot from SAN, I get this error:

"the vDS operation failed on the host hostnamexxxx, error in the configuration of the host. Got (vim.fault.PlatformConfigFault) exception.

There is another B200 M2 blade in our configuration with card M72KR-Q (starting from local disks) and I can't install n1kv on no problem. I can also successfully install n1kv on C250 M2 in the same cluster and on a few other servers in a rack of an "other" provider.

Here are the versions of software installed on all servers, with the exception of B200 M2 with card M72KR-Q:

ESXi410-Update01 2011-02-14 T 11: 00:04 VMware ESXi 4.1 complete update 1
VEM410-201101108-BG-2011-04-12 T 14: 16:23 Cisco Nexus 1000V 4.2 (1) SV1 (4)

B200 M2 with card M72KR-Q running ESX, ESXi is not:

ESX410-Update01 2011-02-14 T 09: 44:23 VMware ESX 4.1 full update 1
VEM410-201101407-BG-2011-02-21 T 15: 27:56 Cisco Nexus 1000V 4.2 (1) SV1 (4)

I already looked into this thread, but these tips did not help either:

https://www.myciscocommunity.com/message/66949

Other tips? M81KR would really be the culprit? (hard to believe, as it is the flagship product)

Kind regards
Radek

Radek,

Ensure that the Service profile for the host you are trying to add to the 1000 v is not having all configured dynamic vNIC .  If so, this will cause also the host could not be added to the DVS with the M81KR.  Your dynamic vNIC policy must be set on "no vNIC dynamic connection policy.

Try what Manish suggested then by installing the appropriate software of VEM manually and then try to add the host.

Kind regards

Robert

Tags: Cisco DataCenter

Similar Questions

  • Equivalent of Palo Alto Cisco ASA packet - trace

    Hi all

    Does anyone know if the 3020 Palo Alto boxes have a feature equivalent to the ASA Cisco Packet-trace?

    Thank you very much

    I used the cli command "test security-policy-match" that identifies the specific policy rule corresponds to a pair of source and destination traffic counter.  You must ensure that you specify all of the fields (area, src/dst network, Protocol and ports.

  • Configuration of the L3 Switch to send the traffic to Palo Alto

    Please forgive my ignorance when it comes to Palo Alto. This is the first time that I do business with them. We need to ensure one VLAN located behind the Palo Alto. I am including a diagram to show a simulation of what we seek to do. We have by default VLAN1 which is our default data VLAN. We have 19 VLAN is VLAN we want it secure. The VLAN1 SVI IP is 10.1.1.1 and VLAN19 SVI IP is 10.1.2.1. On the Palo Alto, we have an IP interface was like 10.1.1.2 for default data VLAN and 10.1.2.2 for the VLAN secure. There are also a pair of HA with IPS 10.1.1.3 and 10.1.2.3 respectively. We have EIGRP that announces the network default VLAN1. Here's what we want to do. Anything from the 10.1.1.x network, go to the 10.1.2.x network, must pass through the Palo Alto. Whatever either from the 10.1.2.x network, must go through the Palo Alto as well. Nothing to any other network 10.1.1.x, takes the route by default (and), and anything from 10.1.2.x to anything else on 10.1.2.x should stay local to the LAN (not pass through Palo Alto. Need just for the MAC address arp). My question is, how do I tell my L3 switch to send all traffic created in the 10.1.2.x, through the Palestinian Authority? I can't do an IP route because from the local network VIRTUAL lives on these L3 switches and is a directly connected route. Really, I can't do the ACB on the switch, because that is really meant to routers. I can put a long match, for everything on the 10.1.2.x network (i.e. the route ip 10.1.2.7 255.255.255.255 10.1.1.2), but for some reason when do whatsoever of 10.1.2.x another thing goes on 10.1.2.x through the palo alto so. Anyone have any suggestions on what would be the best practice, from a network perspective, on how to do this? Thanks for any help!

    Looks like you want all traffic to and from the secure virtual local network to pass through the firewall of your description?

    I'm not familiar with Palo Alto firewall is so I don't know how they work in HA, IE. with other devices do you want to simply talk to a VIP which is responsible for two firewalls?

    In your example the two firewalls have an IP address per vlan, but always just use you one IP addresses for the end-end connectivity. I'll assume that you do, you may need to change, but when I say that I mean the one that reminds you of the devices for routing etc..

    So for all the traffic to and from the network 10.1.2.0/24 to go through the firewall, you must-

    (1) remove the battery switch the IVR for vlan 19. You need the firewall to be routing vlan not secure the 3750 s. You leave vlan 19 in the database for vlan.

    (2) point them vlan 19 customers as default gateway

    (3) addition of a route on the stack of 3750 for the network 10.1.2.0/24-

    IP route 10.1.2.0 255.255.255.0

    (4) if the 10.1.2.0/24 network needs to talk to other that 10.1.1.0/24 remote subnets, then for each of these networks the firewall should be a route. The syntax will not be IOS, but this should give you an idea-

    IP 10.1.1.1 road

    etc... for each remote network

    That means foregoing is all the traffic going and coming from 10.1.2.x customers to other subnets must go through the firewall. The customer traffic in the vlan secured to other clients in the vlan safe doesn't have to go the firewalls.

    Jon

  • L2l vpn with Firewall Palo Alto

    I'm setting up a tunnel of l2l with a firewall of palo alto and evil.  It is a fairly simple installation, we are traffic encryption public to the public for download of the side sftp asa.  Here are the parts relevant to the config and various outputs...  Remote admin side asserts that the phase 1 pass and we have a timeout of waiting for phase 2.  Any help would be appreciated.

    1.1.1.1 (customer2 destination address)
    1.1.1.2 (customer2 vpn gateway)
    2.2.2.0 (space local public ip)

    description of CustomerVPN2 name 1.1.1.1 customer VPN2

    Inside_nat0_outbound to access extended list ip 2.2.2.0 allow 255.255.255.240 host CustomerVPN2
    Outside_4_cryptomap to access extended list ip 2.2.2.0 allow 255.255.255.240 host CustomerVPN2

    card crypto Outside_map 4 corresponds to the address Outside_4_cryptomap
    crypto map Outside_map 4 set type of connection are created only
    card crypto Outside_map 4 set peer 1.1.1.2
    card crypto Outside_map 4 the value transform-set ESP-AES-256-SHA

    crypto ISAKMP policy 50
    preshared authentication
    aes-256 encryption
    sha hash
    Group 2
    life 86400

    tunnel-group 1.1.1.2 type ipsec-l2l
    1.1.1.2 tunnel-group ipsec-attributes
    pre-shared-key *.

    SH crypto isakmp (reviews listed as type: user)

    8 peer IKE: 1.1.1.2
    Type: user role: initiator
    Generate a new key: no State: MM_WAIT_MSG2

    Debug crypto ipsec (looks like he's trying all cryptographic cards except one)

    IPSec (crypto_map_check): crypto Outside_map 1 hole card no match for ACL Outside_1_cryptomap.

    IPSec (crypto_map_check): card crypto Outside_map 2 do not match for ACL Outside_2_cryptomap hole.

    IPSec (crypto_map_check): card crypto Outside_map 3 hole not correspond to ACL Outside_3_cryptomap.

    IPSec (crypto_map_check): card crypto Outside_map 3 hole not correspond to ACL OO_temp_Outside_map3.

    and finally.

    03 Oct 10:39:09 [IKEv1]: IP = 1.1.1.2, removing counterpart peer table faile
    d, no match!
    03 Oct 10:39:09 [IKEv1]: IP = 1.1.1.2, error: cannot delete PeerTblEntr

    Hey Evo,

    You asa public interface is the same as the public ip address that you are trying to encrypt?

    I think you need to create a Nat policy that can be a private ip address as well and then use it as your side of interesting traffic, because the Admin in Palo Alto is right about the vpn route accordingly.

    Here are some links for policy based Nat & paloalto side vpn screenshots and explanations.

    http://www.Cisco.com/en/us/products/ps6120/products_configuration_example09186a00807d2874.shtml

    http://www.danielelonghi.com/wp-content/uploads/2011/05/Howto-create-VPN-connection-between-JUNOS-and-paloalto.PDF

    http://netsecinfo.blogspot.com/2008/02/route-based-VPNs-explained.html

    Manish

  • Select Cisco ASA to replace Palo Alto PA 500

    Hello world

    Pls suggest a Cisco ASA (equivalent or superior) 5500 series to replace the PA500. Thank you

    Palo Alto PA500

    • Firewall of 250 Mbit/s throughput (App - ID1active)
    • 100 Mbps threat prevention throughput
    • 50 VPN IPSec Mbps throughput
    • 64 000 max sessions
    • 7 500 new sessions per second
    • Tunnels/tunnel VPN IPSec 250 interfaces
    • 100 users, SSL VPN
    • 3 virtual routers
    • Virtual systems (basic/max) N/A
    • 20 security zones
    • 1 000 maximum policies

    Hi you can opt for the Asa 5510 or Asa 5520 two of them correspond to your needs. Here is a link to their characteristics http://www.cisco.com/c/en/us/products/collateral/security/asa-5500-serie... Aditya cordially

  • Palo Alto Global protect VPN is not compatible with Windows RT

    I'm not able to use this VPN product with my Tablet Surface RT.  Any ideas?

    DH

    Contact Palo Alto Global Connect.  They know their best products.

  • Telepresence by PaloAlto problems

    Have a client who has a configuration of telepresence and has some strange problems with video through their firewall PaloAlto.

    Installed control VCS / Highway to pair with the motorway in a DMZ with dal interfaces configuration for the PaloAlto

    They can make and receive calls to most of the places with no problems, but a place they call SIP via an IP address is problems where the appeal will be based, but 15 minutes after the call, the call is dropped.

    Has anyone seen or heard talk about this type of behavior?  I am told that they are running the most recent code on the PaloAlto.

    Thank you

    It is certainly a problem of SIP timer. The default setting on the SIP VCS - E (Configuration/protocols/SIP) config for "Session Minimum refresh interval (seconds)" is 500, this particular period is 900 (15 minutes), would be interesting to know if the default was changed from 500 to 900 - not that it is very important, just curious, as if it didn't then the TTL is under substitution.

    If this happens to every single SIP call to external sites, then this tip to a local SIP timer problem and Yes, he would point to the Palestinian Authority.

    The following may be useful; "Palo Alto firewall issues and Cisco SIP" - whatever it is, they would need to do a follow-up of the newspaper on these calls to confirm the timer problem, but it's pretty clear that the 'keep alive' is not getting through.

    Another good resource is the Palo Alto community - whether they are able to get aid expertise here.

    If this is the case with only a specific site, well, then the problem is with the external site and workaround is to force H.323 by establishing a separate area of neighbor for this particular address with SIP off - (would be even better if they fixed dishes).

    This means that any SIP client can always call the address according to normal, but the VCS-E it will ensure interoperability of H.323. So for all the spirit and intent, the SIP client think it connects using the SIP, and, in fact, it is, but only for a very small part of the call leg. :)

    /Jens

    Please note the answers and score the questions as "answered" as appropriate.

  • Edge NSX Gateway substitutes

    The NSX Edge Gateway can be used for North - South services of firewall, NAT and so on.  If I already use Palo Alto firewall physical, and I want the devices that their BONES offer for North South Firewalling, can I use a firewall VIRTUAL in Palo Alto in conjunction with edge NSX to provide the NAT and firewall North-South instead of edge NSX?

    (I know firewall Palo Alto VM-1000 can be used to improve the NSX Distributed Firewall by installing it on every host - that is not what I mean here - I want to see if I can use Palo Alto for North South firewalls to get rid completely of edge NSX gateway)

    TheVMinator, I personally have not enough knowledge with Palo Alto firewall physical or PAN OS to determine how it should be best used with NSX. However, you mentioned wanting to reduce the complexity of the deployment of new tenants, and that can certainly be realized using ESG. One ESG configuration will easily allow up to 9 virtual tenants to deploy out of it, and if you need more than 9 tenants, you can deploy an ESG aggregation layer that will be able to support up to 9 ESG tenant for scalability. A diagram of this topology can be seen here,

    https://richdowling.WordPress.com/2014/10/09/objective-2-1-define-benefits-of-running-VMware-NSX-on-physical-network-fabrics/

    Combined with many other features ESG comes with, you may or may not, I think it is a must for any infrastructure NSX. Even if the physical firewall of Palo Alto offers many more capabilities than ESG firewall does, there very few reasons why you should avoid deploying ESG quite in my opinion.

  • Your computer has been locked and all your files encrypted with RSA 2048-bit encryption.

    My computer has been hit by a ransomware (which is reported by Palo Alto Networks March 4, http://researchcenter.paloaltonetworks.com/2016/03/new-os-x-ransomware-keranger-infect es-transmission-bittorrent-client-...)

    What should I do to save my files?

    And how to remove the virus permanently?

    If you do not have a backup that has not been attached while the virus was busy to encrypt your data, I think it's too late now.

    To be absolutely sure that there is nothing left on the computer, the only way is from scratch.

  • MouseOver woes... bearings stick and not mouseout/mouseouthandler()

    I've used this method before, but this time, it does not work for me. The files are:

    https://www.dropbox.com/s/ccgapo20p233h7z/rollover.zip

    Basically, there are a top navigation bar on the right. It's very simple. Six symbols. Everyone has half a second animation of discoloration of the black box in 0-100%. Stop actions on 0 and half a second. Have this on the root for each button on mouseOver:

    var myBtnExploration = sym.getSymbol ("btnExploration");

    myBtnExploration.play ();

    and to mouseout/mouseouthandler():

    var myBtnExploration = sym.getSymbol ("btnExploration");

    myBtnExploration.playReverse ();

    of course, references to the symbols are different for each button. Nothing crazy.

    So what happens sometimes is you overthrow the first button you select (any one) and the effect is very good. Anything after that and who knows. Usually, it sticks on the rollover on mouseout/mouseouthandler() State. Anyone know why this is happening and what could be the solution?

    Hi ladobeugm,

    Orders play() and playReverse() in conflict with the sym.stop () to the triggers that are in the start position. A school of Palo Alto psychologist would say that you practice the double bind: crazy 'Play!', 'Stop!', which is one of the best ways to do the things (and people)

    You can get rid of the triggers to 0 ms: simply uncheck the autoplay of each of your symbols buttons property (in the dialog box when you convert to symbol; or after editing the symbol).

    But you can not get rid of the triggers to 500 ms, at the end of the Tween. Play() and playReverse() have a second parameter, Boolean, which is true by default, which means 'play the relaxation to the starting position.

    Yes .playReverse (500, false); solves the problem.

    Gil

  • ACS 4.2 RSA Authentication and LDAP group mapping

    Hello

    I have a firewall, PaloAlto, with overall protection enabled (SSL - VPN) feature

    I use Cisco Secure ACS as a proxy for the RSA SecurID authentication.

    After authentication is try to map ad through LDAP query groups.

    The question I've found, is that the user I get with user authentication has no field:

    Show user ip-user-mapping all | mbm60380 game

    10.240.1.24 vsys1 UIA 2388 2388 domain\mbm60380

    10.240.1.1 vsys1 UIA 2101 2101 domain\mbm60380

    10.240.250.1 mbm60380 2590859 2590859 vsys2 GP

    But the list of users that I receive from the LDAP query includes the domain prefix:

    See the user group name domain\group1 property

    short name: domain\group1

    [1] domain\aag60368

    [2] domain\ced61081

    [3] domain\jas61669

    [4] domain\mbm60380

    [5] domain\pmc61693

    [6] domain\vcm60984

    I would like to create the user with the area of GBA but it must delete the domain before querying the RSA server, as it does not support field stripping.

    I tried to fix this on the Palo Alto firewall without success.

    I'm trying to run Cisco Secure ACS 4.2 changing, but it did not work either:

    RSA servers are configured as an external database.  They are not defined in the groups of network devices.

    Can I set up domain stripping for queries servers RSA?

    Thank you

    Hello

    I think it should work, but it is a bit awkward:

    Create an entry in the Distribution of Proxy in the Network Configuration.

    DOMAIN\\USER *.

    Prefix

    Before returning to the AAA server, from there to authenticate to the server RSA without the domain prefix.

    Make sense?

    Thank you

    Chris

  • Settings lost VPN - iOS 10.0.2

    I had stored in my iPad VPN settings. VPN connections worked well until the latest iOS update. Now ALL my VPN connections disappeared. To make it even worse-, I am unable to put once again, because there are new mandatory fields: VPN type and shared key. I don't have the slightest idea how to fill them because I never need them when connecting to the VPN through my iMac - please see the screenshot.

    It drives me crazy. I welcome any suggestion.

    Prepare for removal of PPTP VPN before upgrade you to iOS 10 and macOS Sierra

    Preparation for iOS system administrators 10 and macOS Sierra should stop using PPTP VPN connections. Learn about alternatives, you can use to protect your data.

    If you have configured a PPTP VPN server, 10 iOS and macOS users Sierra will not be able to connect to it. iOS 10 and macOS Sierra will remove any profile VPN PPTP connections when a user upgrades from their device.

    Even if the PPTP protocol is always available on iOS 9 or an earlier version or OS X El Capitan and earlier, we do not recommend that you use it for secure, private communication.

    Alternatives for PPTP VPN connections

    Try one of these other VPN protocols for authentication by user that are safer:

    • L2TP/IPSec
    • IKEv2/IPSec
    • Cisco IPSec
    • VPN SSL clients on the App Store, such as those of AirWatch, Aruba, Check Point, Cisco, F5 Networks, MobileIron, NetMotion, Open VPN, Palo Alto Networks, Pulse Secure and SonicWall
  • Truck Series 2

    Hallo from Germany,

    today in 2 weeks, we will begin our roadtrip across California, Nevada... and my plan is to buy a Apple Watch series 2 as a birthday gift and a memory for me :-)

    Now, I saw in the online store that I'm not able to take one in a store at the moment. Same delivery takes 3-5 weeks.

    Is that at the time, you are not able to buy a Apple Watch series 2 in stores now?  How it will be in 2 to 4 weeks? We will begin our trip to SFO and will travel to Las Vegas (10 / 11 + 10/12), Los Angeles (10/19) and back to SFO. (10/22 - 10/25) If I could even pick it up in Palo Alto :-)

    Do you have recommendations for me, how do I get one?

    Thanks for your help!

    Hello

    I'm afraid that nobody here can tell you what the stock availability will be like in 2-4 weeks, either online or in-store (there is a community of support based on the user).

    Your best option might be to check the stock availability in stores at the time of (or just before) visiting every location along your route.

  • VPN access no longer works after upgrade from 10 IOS!  Any input to fix?

    VPN access no longer works after update IOS 10!  With the help of an iPhone 5 or 6, our employees use their hotspot phone to connect to our VPN.  Suddenly, he broke Monday after the upgrade to IOS 10.  We have experienced many versions of IOS, and it has always worked.  Any patch available?

    Hello howlindaug,
    Thank you for using communities of Apple Support.

    If I understand your message that your employees will no longer be able to connect to your virtual private network with their iPhone 5 or 6 after the upgrade to iOS 10. Sierra Mac OS and iOS 10 delete a VPN profile PPTP connections when a user upgrades from their device. If your VPN is a PPTP connection, you'll want to use one of the options listed in the section below:

    Prepare for removal of PPTP VPN before upgrade you to iOS 10 and macOS Sierra

    Alternatives for PPTP VPN connections

    Try one of these other VPN protocols for authentication by user that are safer:

    • L2TP/IPSec
    • IKEv2/IPSec
    • Cisco IPSec
    • VPN SSL clients on the App Store, such as those of AirWatch, Aruba, Check Point, Cisco, F5 Networks, MobileIron, NetMotion, Open VPN, Palo Alto Networks, Pulse Secure and SonicWall

    Best regards.

  • EPIC Browser (proxy) does not work on the Sierra

    I was with Epic browser (a browser works as a proxy or vpn) smoothly for the past few days in China to access Google and Facebook and a few pages that I've updated my mac OS previous to new sierra of mac OS. and sorry to say that then is no more working including proxy facilities. I can't explain how much I need in China. Can ' someone tell me why or how to fix it? He shows me just like this after I installed the OS Sierra...

    Hello firdaus, MD.
    Thank you for using communities of Apple Support.

    If I understand your message that you are no longer able to access the web using an epic browser that works as a proxy or VPN. With the update of the Sierra of macOS, PPTP VPN have been removed. If this browser uses this type of VPN, you may want to use one of the options listed in the section below:

    Prepare for removal of PPTP VPN before upgrade you to iOS 10 and macOS Sierra

    Alternatives for PPTP VPN connections

    Try one of these other VPN protocols for authentication by user that are safer:

    • L2TP/IPSec
    • IKEv2/IPSec
    • Cisco IPSec
    • VPN SSL clients on the App Store, such as those of AirWatch, Aruba, Check Point, Cisco, F5 Networks, MobileIron, NetMotion, Open VPN, Palo Alto Networks, Pulse Secure and SonicWall

    Best regards.

Maybe you are looking for

  • To upgrade my iMac 27 "to the end of 2013

    To upgrade my iMac 27 "to the end of 2013, that I must have only in 8 GB, 16 GB or 32 GB? Or for example, I add two 8 GB to the two 4 GB that are already on it, which would make 24Go? Please could someone with experience on this technical question to

  • Delay loop

    Hi guys,. I am new to Labview, hope to get an idea how to proceed: I do driling process for all 200 holes.  Each hole takes about 2secs to drill, and the distance between the holes is 3 seconds. I am interested to get data for drilling only and negle

  • WLC v4.2.112.0 - IDS Signatures - Deauth/Auth and flooding of the Assoc

    Hi all My apologies if this has already asked. There seems to be several posts with people getting critical alarms and they are due to bugs in Cisco? Couple of points. I am under the above version and I'm getting a lot of IDS Deauth Auth and Assoc al

  • Posture of the ISE - check a specific MS KB

    Hello I ISE 1.2.1 works well with configured posture and now I´d like to check if a particular KB Microsoft is installed. How can I do this with the Posture of the ISE? Someone did he do already have? Kind regards.

  • TX help needed

    I need your help... because the T / X Pocket have the opportunity to use it as a phone?  If so, how can I get service in place?  I am a student and don't want to buy a cell phone if I have to.