Event ID: gateway_firewall.sr_limit_per_edge_exceeded
Added in release: 4.2.1
Alarm Description:
Impact : Dataplane functions may be impacted due to high scale. Increased time for configuration to get realized.
VMware NSX 4.2.1 and above
There are more Tier-0 or Tier-1 gateways configured than the Edge Form Factor maximum.
Note: For optimal performance and throughput, it is recommended to follow the guidelines below based on NSX 4.2.1 Configuration Limits.
| Edge Form Factor | Max number of Gateway Firewalls | Description |
| Medium | 5 |
Deployed either as T0, T1 or Bridge mode on the same edge node. Note: TLS Inspection or Advanced Threat Prevention (ATP) features cannot be enabled on Gateway Firewalls deployed on a Medium Edge node. |
| Large or Extra Large | 100 |
Can be a combination of either T0, T1, or Bridges. Note: Only 10 Gateway Firewalls can be deployed per Large Edge Node with Advanced Threat Prevention (ATP) features activated. |
| Baremetal | 100 |
Can be a combination of either T0, T1, or Bridges. Note: Only 25 Gateway Firewalls can be deployed per Baremetal Edge Node with Advanced Threat Prevention (ATP) features activated. |
Reduce the number of gateways configured on the edge node. Map additional gateways to a new edge in the cluster.
Disable the Gateway Firewall feature on the Tier-0/Tier-1 Gateway or Bridge if only the System Default rules are present and no user-defined rules are configured.
There is a known issue with this alarm that may lead to a false positive trigger. This is documented under KB KB#382701.