Skip to content

SSL Load Balancer in VMware Cloud Director with NSX-ALB (AVI)

With the NSX Advanced Load Balancer integration in Cloud Director 10.2 or later, you can enable SSL offloading to secure your customer's websites. This article explains how to request a Let's Encrypt certificate, import it to VMware Cloud Director and enable SSL offloading in NSX-ALB. This allows tenants to publish websites in a secure manner.


NSX-ALB should be integrated and fully configured in VMware Cloud Director, as explained in this article. The versions used in this article are: Cloud Director 10.3, NSX-T and NSX-ALB 21.1.1

Step 1 - Allow Tenants to Upload Certificates (System Administrator)

To secure websites with SSL, the tenant has to import a server certificate to the integrated Certification Library. The Manage Certificate Library right is required to upload certificates. This right is not included in the "Default Rights Bundle", which is shipped with Cloud Director. When the tenant tries to import a certificate (Administration > Certificate Management > Certificate Library), the IMPORT button is missing.

As a VCD System Administrator, you can regulate which rights are included in roles, and which rights are available to a customer. The customer needs both, a role that includes the "Manage Certificate Library" right, and the right must be published to a customer with a role bundle.

  1. Open VCD as System Administrator and navigate to Administration > Tenant Access Control > Global Roles and edit the "Organization Administrator" role.
  2. Make sure that the Manage Certificates Library role (ADMINISTRATION > General) is included.
  3. Navigate to Administration > Tenant Access Control > Right Bundles and edit the "Default Rights Bundle".
  4. Add the Manage Certificates Library right to the bundle.
  5. That's it. Tenants should now be able to import certificates with the Org Admin. The tenant can also create custom roles and include the right himself.

Step 2 - Create a Certificate

There are various options available to get a certificate. For this article, I'm using a Let's Encrypt certificate. Let's Encrypt is a non-profit certificate authority that provides X.509 certificates at no charge. I've created a certificate with certbot in standalone mode. See the official website for different supported deployment options.

To request Let's Encrypt certificates you need a domain and you must be able to create A records. I've created a domain that is pointed to the public IP address of a Linux box.

Verify that no webserver is running at port 80 (HTTP). This allows me to run certbot in standalone mode.

# ss -tl
State     Recv-Q    Send-Q       Local Address:Port        Peer Address:Port
LISTEN    0         80       *
LISTEN    0         128      *
LISTEN    0         128          *
LISTEN    0         128       *
LISTEN    0         128                   [::]:ssh                 [::]:*
LISTEN    0         128                  [::1]:6010                [::]:*

Install Certbot (Debian 10):

# apt install snapd
# snap install core
# snap refresh core
# snap install --classic certbot

Request a Certificate:

# certbot certonly --standalone
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Please enter the domain name(s) you would like on your certificate (comma and/or
space separated) (Enter 'c' to cancel):
Requesting a certificate for

Successfully received certificate.
Certificate is saved at: /etc/letsencrypt/live/
Key is saved at:         /etc/letsencrypt/live/
This certificate expires on 2022-01-25.
These files will be updated when the certificate renews.
Certbot has set up a scheduled task to automatically renew this certificate in the background.

Copy fullchain.pem and privkey.pem from the path in the output.


Step 3 - Import the Certificate to Cloud Director

Log in to VCD as Organization Administrator and navigate to Administration > Certificate Management > Certificate Library and press IMPORT.

Give the Certificate a Name

At the second step, import the certificate chain (fullchain.pem).

At the third step, import the private key (privkey.pem).

Press IMPORT to finish the wizard.


Note: If you get the error message "Bad request: Specified key is not a valid PKCS8 encoded private key", you have to transform the private key to PKCS8.

This can be easily done with the OpenSSL CLI tool.:

# openssl pkcs8 -topk8 -inform PEM -outform PEM -nocrypt -in privkey.pem -out pkcs8.pem

Step 4 - Create Load Balancer Pool and Virtual Service

I've deployed two Virtual Machines running an nginx Webserver which are used as Pool for the Virtual Service. As Organization Administrator and Navigate to Networking > Edge Gateway > Load Balancer > Pools

Press ADD to Create a Load Balancer Pool and configure the Pool. Please note that backend traffic is not encrypted. SSL offloading happens in the Load Balancer. The pool configuration is identical to configuration Non-SSL Virtual Services.

  • General Settings Tab
  • Name: alpine-nginx
  • Default Server Port: 80
  • Load Balancer Algorithmn: Round Robin
  • Persistence: None
  • Active Health Monitor: HTTP (This will send periodic HTTP HEAD request to each server in the Pool to check the availability)
  • In the Members Tab, add two entries and enter the IP Addresses from the Virtual Machines running the Webserver.
  • Press SAVE to create the pool

Navigate to Networking > Edge Gateway > Load Balancer > Virtual Services and press ADD.

  • Name: alpine-nginx-https
  • Service-Engine-Group: seg-tenant-fgr
  • Load Balancer Pool: alpine-nginx
  • Virtual IP: (Available Address from the pool, assigned to the tenant's edge gateway)
  • Service Type: HTTPS
  • Certificate: Select the previously added certificate
  • Port: 443
  • SSL: Enabled

Press SAVE to create the Virtual Service.

Verify that you can access your website.


# curl -v --resolve
* Expire in 0 ms for 6 (transfer 0x55bf66426fb0)
* Added to DNS cache
* Hostname was found in DNS cache
* Trying
* Expire in 200 ms for 4 (transfer 0x55bf66426fb0)
* Connected to ( port 443 (#0)
* ALPN, offering h2
* ALPN, offering http/1.1
* successfully set certificate verify locations:
* CAfile: none
CApath: /etc/ssl/certs
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
* TLSv1.3 (IN), TLS handshake, Server hello (2):
* TLSv1.2 (IN), TLS handshake, Certificate (11):
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
* TLSv1.2 (IN), TLS handshake, Server finished (14):
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
* TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1):
* TLSv1.2 (OUT), TLS handshake, Finished (20):
* TLSv1.2 (IN), TLS handshake, Finished (20):
* SSL connection using TLSv1.2 / ECDHE-RSA-AES128-GCM-SHA256
* ALPN, server accepted to use http/1.1
* Server certificate:
* subject:
* start date: Oct 27 18:30:36 2021 GMT
* expire date: Jan 25 18:30:35 2022 GMT
* subjectAltName: host "" matched cert's ""
* issuer: C=US; O=Let's Encrypt; CN=R3
* SSL certificate verify ok.
> GET / HTTP/1.1
> Host:
> User-Agent: curl/7.64.0
> Accept: */*
< HTTP/1.1 200 OK
< Content-Type: text/html
< Content-Length: 31
< Connection: keep-alive
< Server: nginx
< Date: Sat, 30 Oct 2021 18:59:02 GMT
< Last-Modified: Thu, 28 Oct 2021 16:30:39 GMT
< ETag: "617ad02f-1f"
< Accept-Ranges: bytes
< Strict-Transport-Security: max-age=31536000; includeSubDomains
<h1>Welcome to alpine02!</h1>

* Connection #0 to host left intact


Leave a Reply

Your email address will not be published. Required fields are marked *