{"id":1368,"date":"2019-01-21T17:10:49","date_gmt":"2019-01-21T22:10:49","guid":{"rendered":"https:\/\/ithinkvirtual.com\/?p=1368"},"modified":"2019-02-15T14:38:19","modified_gmt":"2019-02-15T19:38:19","slug":"nsx-t-home-lab-part-1-configuring-sophos-xg-firewall","status":"publish","type":"post","link":"https:\/\/ithinkvirtual.com\/2019\/01\/21\/nsx-t-home-lab-part-1-configuring-sophos-xg-firewall\/","title":{"rendered":"NSX-T Home Lab – Part 1: Configuring Sophos XG Firewall"},"content":{"rendered":"\n

Intro<\/h4>\n\n\n\n

Welcome to Part 1 of my NSX-T Home Lab Series.  In my previous post<\/a>, I went over the gist of what I plan to do for my nested NSX-T<\/a> Home Lab.  In this post, I will cover the setup and configuration of a Sophos XG firewall Home Edition<\/a> which will serve as the router for my nested lab environment.  My physical Home Lab is configured with Virtual Distributed Switches, or VDS (sometimes seen as DVS) for short, and since this is a nested lab environment that will not have any physical uplinks connected, I will need to create a new VDS without physical uplinks connected to it along with a portgroup for the nested environment and then configure access to the environment from my LAN.  All traffic will flow through virtual router\/firewall to communicate to and from the nested lab.<\/p>\n\n\n\n

Prerequisites:<\/strong><\/p>\n\n\n\n