The number of T0/T1 Service routers 4 or bridges 0 with Gateway Firewall features enabled on edge XXX-XXX-XXX has exceeded the maximum threshold of 98%. Maximum number of Service routers and bridges supported with Gateway Firewall feature enabled is 5.
VMware NSX 4.2.1.X
This is a known issue with the Event ID: gateway_firewall.sr_limit_per_edge_exceeded which was introduced in VMware NSX 4.2.1.
Note: For optimal performance and throughput, it is recommended to follow the guidelines below based on NSX 4.2.1 Configuration Limits.
| Edge Form Factor | Max number of Gateway Firewalls | Description |
| Medium | 5 |
Deployed either as T0, T1 or Bridge mode on the same edge node. Note: TLS Inspection or Advanced Threat Prevention (ATP) features cannot be enabled on Gateway Firewalls deployed on a Medium Edge node. |
| Large or Extra Large | 100 |
Can be a combination of either T0, T1, or Bridges. Note: Only 10 Gateway Firewalls can be deployed per Large Edge Node with Advanced Threat Prevention (ATP) features activated. |
| Baremetal | 100 |
Can be a combination of either T0, T1, or Bridges. Note: Only 25 Gateway Firewalls can be deployed per Baremetal Edge Node with Advanced Threat Prevention (ATP) features activated. |
This is a known issues impacting VMware NSX 4.2.1.X and fixed in version 4.2.2.1 and 9.x.
Workaround: Suppress or disable the alarm if it is triggered while your T0/T1/Bridge with GFW enabled are within the specified limits.