Accessing this Lab

Updated on

This section talks about how to login and the pre-requisites before starting the Lab

Click GO

Once the login button is highlighted in blue, click GO! to start the experience.

Horizon Login

Use the Testdrive Credentials provided in the Credentials menu on the top right corner to sign-in to VMware Horizon.


  1. Click the copy icon next to the username to copy
  2. Paste it on the Horizon username field by clicking on it, followed by pressing CTRL+v (Windows) or Command (⌘) + v (macOS) on your keyboard
  3. Next, click the copy icon next to the password to copy
  4. Paste it on the Horizon password field by clicking on it, followed by pressing CTRL+v (Windows) or Command (⌘) + v (macOS) on your keyboard
  5. Click Login to access


Other pasting options:

  • Windows: use right-click on your mouse/ trackpad and select Paste
  • macOS: press and hold the control key while you click the Horizon username/password field and select Paste

Launch Desktop

Once logged in, search for 'NSX Security' on the Apps Tab and click on the Horizon Desktop to launch it on your Browser.

Access NSX Security Desktop

Now you'll be on the NSX Security desktop. At this point you can begin the walkthrough steps listed in the next section.

Advanced Lab Topology for Ransomware Protection

In the lab, to simulate an enterprise environment, the following VMs have been deployed: a VDI Desktop , Application server and a production data base server.  These three VMs are connected to NSX overlay segments.

A supplementary VM has been deployed to play the role of an attacker, an external resource from where the attacks are initiated. This VM is attached to a VLAN type port group to a virtual distributed switch. Agent operating system (OS) type and roles are as follows:













Acme-App01 Ubuntu Victim Internal





Lateral Security is new Battle ground with NSX Security

The goal of the NSX Security stack is to provide visibility and enforcement across the attack chain for any workload form factor across multiple clouds. The distributed Firewall in essence is a L2 to L7 Firewall that is transparently applied to the network interface of a workload, VMs of course, but also containers and physical bare metal servers. This enables customers to implement any level of segmentation without needing to make network changes, For example isolate production from development workloads, or micro-segment a multi-tier application. NSX Advanced Threat Prevention consists of IDS/IPS, Malware Prevention, Network Traffic Analysis and Network Detection and Response. NSX Intelligence provides complete East-West flow visibility and automated Firewall rule recommendations. For North-South protection, NSX Gateway Firewall is a software-only, layer 2-7 Firewall that enables you to achieve consistent network security coverage and unified management for all of your workloads, regardless of whether they’re running on physical servers, in a private or public cloud environment or in containers.

Previous Article NSX 4.1 Advanced Security Lab Walkthrough
Next Article Protect East-West Lateral Security with NSX Intelligence and NSX NDR