The purpose of this section is to provide a migration path for those VDI VMs from Agent-less to Agent without protection lost.
Configuration matrix before and after migration:
Configuration item | Before migration | After migration |
---|---|---|
NSX binding (NSX-V version 6.4.13) | Yes | No |
Config NSX security group | Required | No |
Config NSX security Policy assignment | Binding with default Default (EBT) | No |
Guest VM type | VDI (Instant Clone or Linked Clone) | VDI (Instant Clone or Linked Clone) |
(Instant Clone or Linked Clone) | (Instant Clone or Linked Clone) | |
Guest VM activation method | Event-Based Tasks | Event-Based Tasks |
Guest VM security Policy assignment | Event-Based Tasks | Event-Based Tasks |
Guest VM template with VMware tool and vShield Endpoint Thin Agent - NSX File introspection (vspeflt.sys) driver installed | Required | No |
Guest VM template with DS Agent pre-installed but not activated | No | Required |
Support communication Direction | Bidirectional | Bidirectional or Agent/Appliance Initiated |
Migration procedure:
- Before migration
- The Guest VM activation and security policy assigned by "Computer Created(by System)" or "Computer Powered On (by System)" EBT:
- The Security feature configured to "Appliance preferred" under Security Policy > Protection Source when in Combined Mode:
- The NSX security policy binding to Default (EBT):
- Ensure Guest VM is activated and security policy is successfully assigned under the DSVA protection.
- Install DSA to VM template.
- Active Guest VM with Combined Mode
- Configure security policy to "Agent preferred".
- Remove Agent-less protection per vCenter Cluster base.
- Remove DSVA and GI from NSX > Installation and Upgrade Menu > Service Deployment.
- Remove Security Policies and Security Group from NSX > Security > Service Composer. Below are the prerequisites:
- All Guest VMs should be Agent protection ready.
- DSVA and GI should be deleted for all vCenter Cluster.
- Remove NSX binding from DSM > Computers > vCenter connector.
- Check all VDI VMs migration to Agent-based protection.
The purpose of this section is to keep the Computer tree management behavior the same as op-premise DSM with vCenter connector after migration to Agent-based solution on Cloud One - Workload Security.
Configuration matrix before and after migration:
Configuration item | Before migration | After migration |
---|---|---|
DSM server type | On-premise | Cloud One - Workload Security |
Protection mode | Agent-less (DSVA Appliance) | Agent (DSA) |
vCenter connector | Yes | Yes |
Data Center Gateway (DCGW) | No | Required |
NSX binding (NSX-T version 3.2.0.1) | Yes | No |
Config NSX security group | Required | No |
Config NSX security Policy assignment | Synchronize Deep Security Policies with NSX Service Profiles | No |
Guest VM type | VDI (Instant Clone or Linked Clone) | VDI (Instant Clone or Linked Clone) |
Guest VM activation method | policy synchronization | Deployment script |
Guest VM security Policy assignment | policy synchronization | Deployment script |
Guest VM template with VMware tool and vShield Endpoint Thin Agent - NSX File introspection (vspeflt.sys) driver installed | Required | No |
Guest VM template with DS Agent pre-installed but not activated | No | Required |
Support communication Direction | Bidirectional | Agent/Appliance Initiated |
- Before migration
- The vCenter connector with NSX-T binding and enabled Policy Synchronization from on-premise DSM to NSX-T:
- Follow the DS 20.0 OLH document on "Deploy the appliance (NSX-T 3.x) ".
- Create a group for protection.
- Configure east-west security.
- Configure Endpoint Protection.
- All Guest VMs will be activated automatically after DSVA deployment.
- Prepare Data Center Gateway and create vCenter connector on Cloud one - Workload Security.
- Follow the instructions on how to install and configure a data center gateway.
- Refer to the download links for the data center gateway software.
- Add vCenter connector to Cloud One - Workload Security.
- Install DSA to VM template and use the deployment script to activate DSA.
- Download and install the DSA package.
- Keep the DSA service running but not activated.
- Configure the deployment script (Platform, Security Policy,Relay group...). Save to file and put the script into VM template.
- Power off template and create new snapshot.
- Leverage the VDI Guest Customization > ClonePrep (for Instant Clone type VM) or QuickPrep (for Linked-Clone type VM) to execute.
- Recompose the VDI pool with new snapshot.
- After recomposing the VDI VM
- Remove Agent-less solution from on-premise DSM.
- Follow the Deep Security 20.0 document to on Uninstalling Deep Security from your NSX environment.
The purpose of this section is provide simple and quick way to migration to Cloud One - Workload Security with Agent-based protection.
Configuration matrix before and after migration:
Configuration item | Before migration | After migration |
---|---|---|
DSM server type | On-premise | Cloud One - Workload Security |
Protection mode | Agent-less (DSVA Appliance) | Agent (DSA) |
vCenter connector | Yes | No |
NSX binding (NSX-T version 3.2.0.1) | Yes | No |
Config NSX security group | Required | No |
Config NSX security Policy assignment | Synchronize Deep Security Policies with NSX Service Profiles | No |
Guest VM type | VDI (Instant Clone or Linked Clone) | VDI (Instant Clone or Linked Clone) |
Guest VM activation method | policy synchronization | Deployment script |
Guest VM security Policy assignment | policy synchronization | Deployment script |
Guest VM template with VMware tool and vShield Endpoint Thin Agent - NSX File introspection (vspeflt.sys) driver installed | Required | No |
Guest VM template with DS Agent pre-installed but not activated | No | Required |
Support communication Direction | Bidirectional | Agent/Appliance Initiated |
- Before migration
- The vCenter connector should have NSX-T binding and the Policy Synchronization should beenabled from on-premise DSM to NSX-T.
- Follow the Deep Security 20.0 document on Deploying the appliance (NSX-T 3.x).
- Create a group for protection.
- Configure east-west security.
- Configure Endpoint Protection.
- All Guest VMs will be activated automatically after the DSVA deployment success.
- Install DSA to VM template and activate DSA using the deployment script.
- Download and install the DSA package.
- Keep the DSA service running but not activated.
- Configure the deployment script (Platform, Security Policy, Relay group...). Save to file and put the script into VM template.
- Power off template and create new snapshot.
- Leverage the VDI Guest Customization > ClonePrep (for Instant Clone type VM) or QuickPrep (for Linked-Clone type VM) to execute the deployment.
- Recompose the VDI pool with new snapshot.
- Recompose the VDI pool with new snapshot
- Remove Agent-less solution from on-premise DSM.
- Follow the Deep Security 20.0 document to on Uninstalling Deep Security from your NSX environment.