7.1

Table Of Contents
7 Restart the vRealize Orchestrator server service.
8 Restart the vRealize Orchestrator conguration interface.
9 Click Plug-Ins and verify that the status changed to Installation OK.
10 Start the vRealize Orchestrator client application, log in, and use the  tab to navigate through
the library to the NSX folder.
You can browse through the workows that the NSX plug-in provides.
What to do next
Create a vRealize Orchestrator endpoint in vRealize Automation to use for running workows. See “Create
a vRealize Orchestrator Endpoint,” on page 162.
Run a vRealize Orchestrator and NSX Security Workflow
Before you use the NSX security policy features from vRealize Automation, an administrator must run the
Enable security policy support for overlapping subnets workow in vRealize Orchestrator.
Security policy support for the overlapping subnets workow is applicable to an NSX 6.1 and later
endpoint. Run this workow only once to enable this support.
Prerequisites
n
Verify that a vSphere endpoint is registered with an NSX endpoint. See “Create a vSphere Endpoint,”
on page 160.
n
Log in to the vRealize Orchestrator client as an administrator.
n
Verify that you ran the Create NSX endpoint vRO work ow.
Procedure
1 Click the  tab and select NSX > NSX  for VCAC.
2 Run the Create NSX endpoint workow and respond to prompts.
3 Run the Enable security policy support for overlapping subnets workow.
4 Select the NSX endpoint as the input parameter for the workow.
Use the IP address you specied when you created the vSphere endpoint to register an NSX instance.
After you run this workow, the distributed rewall rules dened in the security policy are applied only on
the vNICs of the security group members to which this security policy is applied.
What to do next
Apply the applicable security features for the blueprint.
Checklist for Preparing External IPAM Provider Support
You can obtain IP addresses and ranges for use in network prole denition from a supported external
IPAM provider, such as Infoblox.
Before you can use an external IPAM provider endpoint in a vRealize Automation network prole, you
must download or otherwise obtain a vRealize Orchestrator IPAM provider package, import the package
and run required workows in vRealize Orchestrator, and register the IPAM solution as a
vRealize Automation endpoint in vRealize Orchestrator.
For an overview of the provisioning process for using an external IPAM provider to supply a range of
possible IP addresses, see “Checklist for Provisioning a vRealize Automation Deployment Using an External
IPAM Provider,” on page 225.
Configuring vRealize Automation
14 VMware, Inc.