Skip to content

Virtually Caffeinated

A double-shot of knowledge

Menu
  • About Me
  • Bookmarks
  • Innovative Store

About Me

Profile
Jeremy Wheeler

I am a Solutions Architect with 30+ years in IT, specializing in cloud architecture, virtualization, and multi-cloud platforms like AWS, Azure, and Google Cloud. I’ve led enterprise projects like VMware’s Horizon Suite Sizing Estimator and have extensive experience with VMware Horizon, Citrix, Hyper-V, and programming languages like PowerShell, Python, and SQL. I run Smart AI Coach (https://smartaicoach.com/), helping individuals leverage AI for resumes, cover letters, and productivity. As a published author, VMware vExpert (2015-2020), and MIT-certified in AI, I am passionate about innovation and solving challenges.

  • Home
  • 2015
  • November
  • 25
  • Cloud Pod Architecture and Cisco Nexus 1000v Bug
Omnissa Horizon View

Cloud Pod Architecture and Cisco Nexus 1000v Bug

Jeremy Wheeler
November 25, 2015November 25, 2015 2 mins

A customer I worked with owns two vBLOCKS between two datacenters.  They run Nexus 1000v for the virtual networking component. They deployed VDI and when we enabled cloud pod architecture the Global data replication worked great, however all of our connection servers in the remote pod would show red or offline. I found that we could not telnet to the internal pod or remote pod connection servers over port 8472.  All other ports we were good on. VMware Support confirmed this issue is with the Nexus 1000v and found that there was a bug in the N1kv and a TCP Checksum Offload.

 

The specific ports in question are the following:

VMware View Port 8472 – The View Interpod API (VIPA) interpod communication channel runs on this port. View Connection Server instances use the VIPA interpod communication channel to launch new desktops, find existing desktops, and share health status data and other information.

Cisco Nexus 1000V Port 8472 – VXLAN

 

Cisco has a bug report posted about 8472 being dropped at the VEM for N1kV:

https://tools.cisco.com/quickview/bug/CSCup55389

 

The bug mentions TCP Checksum being the root cause and offloading only 8472 packets. If removing the N1KV isn’t an option, you can disable TCP Offloading.

Disable TCP Offloading

  1. In the Windows server, open the Control Panel and select Network Settings > Change Adapter Settings.

a

Right-click on each of the adapters (private and public), select Configure from the Networking menu, and then click the Advanced tab. The TCP offload settings are listed for the Citrix adapter.

b

I recommend applying the following:

  • IPv4 Checksum Offload
  • Large Receive Offload (was not present for our vmxnet3 advanced configuration)
  • Large Send Offload
  • TCP Checksum Offload

 

You would need to do this on each of the VMXnet3 Adapters on each connection server at both datacenters. Once disabled (it did cause nic to blip), we were able to Telnet between the datacenters on port 8472 again.

 

After making these adjustments you should be able to login to the View Admin portal and see all greens for remote connection servers. I have tested this and validated it and it works as intended. For more information I recommend you read VMware KB 2055140.

Share :
whosay

Written by  Jeremy Wheeler: Jeremy

I am a seasoned Solutions Architect with over 20 years of expertise in IT, specializing in cloud architecture, virtualization, and end-user computing solutions. My career highlights include working with top-tier technologies across multi-cloud platforms such as AWS, Azure, and Google Cloud. I have a proven track record of leading complex enterprise projects, including the development of tools like VMware’s Horizon Suite Sizing Estimator, which optimized hardware prediction accuracy for customers worldwide. With hands-on experience in virtualization technologies like VMware Horizon, Citrix, and Hyper-V, I excel in designing, deploying, and optimizing full-lifecycle solutions. My technical depth is complemented by 18 years of computer programming experience in PowerShell, Python, C++, .NET, SQL, and more. I am a published author and have contributed to industry literature, including works on desktop virtualization and user environment management. Recognized as a VMware vExpert for six consecutive years (2015-2020), I’ve also received multiple awards for excellence, such as VMware Spotlight and Our Best accolades. Currently, I leverage my knowledge to deliver innovative solutions, combining strategic insights and cutting-edge technologies like AI, as evidenced by my recent certification from MIT. Above all, I thrive on solving challenges and empowering teams to exceed customer expectations.

Post navigation

Previous: vROPS Python Adapter – A Hidden Treasure
Next: Horizon View CPA Uninitialized Failure

Related Post

Horizon Install Order and Silent Installs

AppVolumes and Horizon Recompose Workaround

Horizon 7.0.2, What’s New?

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Categories

Recent Posts

  • Preventing Hallucination in AI: A Guide Based on Industry Standards
  • Clash of the AI Titans: Gemini 2.5 vs. ChatGPT-4o – Which Reigns Supreme?
  • VMware Explore 2025: Shaping the Future of Multi-Cloud and Edge Technologies
  • AI Trends Shaping the Future in 2025
  • Omnissa vApp and AI: Transforming Application Delivery in 2025

Archives

RSS Press Releases

Copyright VMBUCKET.COM © 2020