Skip to content

Commit 3cb758c

Browse files
authored
Update native-network-design-consideration.md
1 parent 06f643d commit 3cb758c

File tree

1 file changed

+15
-16
lines changed

1 file changed

+15
-16
lines changed

articles/azure-vmware/native-network-design-consideration.md

Lines changed: 15 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
2-
title: Azure VMware Solution Generation 2 private cloud design considerations (Public preview)
2+
title: Azure VMware Solution Generation 2 private cloud design considerations (preview)
33
description: Learn about Azure VMware Solution Generation 2 private cloud design considerations.
44
ms.topic: conceptual
55
ms.service: azure-vmware
6-
ms.date: 4/3/2025
6+
ms.date: 4/15/2025
77
# customer intent: As a cloud administrator, I want to learn about Azure VMware Solution Generation 2 private cloud design considerations so that I can make informed decisions about my Azure VMware Solution deployment.
88
---
99

10-
# Design considerations for Azure VMware Solution Generation 2 Private Clouds (Public preview)
10+
# Design considerations for Azure VMware Solution Generation 2 Private Clouds (preview)
1111

1212
This article outlines key design considerations for Azure VMware Solution Generation 2 (Gen 2) private clouds. It explains the capabilities this generation brings to VMware-based private cloud environments, enabling access for your applications from both on-premises infrastructure and Azure-based resources. There are several considerations to review before you set up your Azure VMware Solution Gen 2 private cloud. This article provides solutions for use cases that you might encounter when you're using the private cloud type.
1313

@@ -20,22 +20,22 @@ The following functionality is limited during this time. These limitations will
2020

2121
- You cannot delete your Resource Group, which contains your Private Cloud.
2222
- You can only deploy **1 Private Cloud per Azure Virtual Network**.
23-
- You can only create **1 SDDC per Resource Group**. Multiple Private Clouds in a single Resource Group are not supported.
23+
- You can only create **1 Private Cloud per Resource Group**. Multiple Private Clouds in a single Resource Group are not supported.
2424
- Your Private Cloud and Virtual Network for your Private Cloud must be in the *same* Resource Group.
2525
- You cannot move your Private Cloud from one Resource Group to another after the Private Cloud is created.
2626
- Virtual Network Service Endpoints direct connectivity from Azure VMware Solution workloads is not supported.
2727
- **vCloud Director** using Private Endpoints is supported. However, vCloud Director using Public Endpoints is not supported.
2828
- **vSAN Stretched Clusters** is not supported.
29-
- Public IP down to the NSX Microsoft Edge for configuring internet will not be supported.
29+
- Public IP down to the VMware NSX Microsoft Edge for configuring internet will not be supported.
3030
- Support for **AzCLI**, **PowerShell**, and **.NET SDK** are not available during Public Preview.
3131
- **Run Commands** interacting with customer segments aren't supported including run commands interacting with Zerto, Jetstream, and other 3rd-party integrations.
3232

3333
## Unsupported integrations during Public Preview
3434

3535
The following 1st-party and 3rd-party integrations won't be available during Public Preview:
36-
- **ElasticSAN**
37-
- **Zerto**
38-
- **Jetstream**
36+
- **Azure Elastic SAN**
37+
- **Zerto DR**
38+
- **Jetstream DR**
3939

4040
## Routing and subnet considerations
4141

@@ -46,7 +46,7 @@ The private cloud connects to your Azure virtual network using standard Azure ne
4646
> [!Note]
4747
> Permitted ranges for your address block are the RFC 1918 private address spaces (10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16), except for 172.17.0.0/16. Replication network is not applicable to AV64 nodes and is planned for general deprecation at a future date.
4848
49-
Avoid using the following IP schemas reserved for NSX usage:
49+
Avoid using the following IP schemas reserved for VMware NSX usage:
5050

5151
- 169.254.0.0/24 - used for internal transit network
5252
- 169.254.2.0/23 - used for inter-VRF transit network
@@ -59,19 +59,18 @@ The subnets:
5959

6060
| **Network Usage** | **Subnet** | **Description** | **Example** |
6161
| :-- | :-- | :-- | :-- |
62-
| NSX Network | /27 | NSX Manager network. | 10.31.0.0/27 |
63-
| vCSA Network | /27 | vCenter network. | 10.31.0.32/27 |
64-
| esx-cust-fdc | /27 | The management appliances (vCenter and NSX manager) are behind the "esx-cust-fdc” subnet, programmed as secondary IP ranges on this subnet. | 10.31.0.64/27 |
65-
| cust-fds | /27 | Used by Azure VMware Solution to program routes created in NSX into the virtual network. | 10.31.0.96/27 |
66-
| services | /27 | Used for Azure VMware Solution provider services. Also used to configure private DNS resolution for your private cloud. | 10.31.0.160/27 |
67-
| esx-lrnsxuplink, esx-lrnsxuplink-1 | /28 | Subnets off each of the T0s per edge. These subnets are used to program NSX network segments as secondary IPs addresses. | 10.31.0.224/28, 10.31.0.240/28 |
62+
| VMware NSX Network | /27 | NSX Manager network. | 10.31.0.0/27 |
63+
| vCSA Network | /27 | vCenter Server network. | 10.31.0.32/27 |
64+
| esx-cust-fdc | /27 | The management appliances (vCenter Server and NSX manager) are behind the "esx-cust-fdc” subnet, programmed as secondary IP ranges on this subnet. | 10.31.0.64/27 |
65+
| cust-fds | /27 | Used by Azure VMware Solution Gen 2 to program routes created in VMware NSX into the virtual network. | 10.31.0.96/27 |
66+
| services | /27 | Used for Azure VMware Solution Gen 2 provider services. Also used to configure private DNS resolution for your private cloud. | 10.31.0.160/27 |
67+
| esx-lrnsxuplink, esx-lrnsxuplink-1 | /28 | Subnets off each of the T0 Gateways per edge. These subnets are used to program VMware NSX network segments as secondary IPs addresses. | 10.31.0.224/28, 10.31.0.240/28 |
6868
| esx-cust-vmk1 | /24 | vmk1 is the management interface used by customers to access the host. IPs from the vmk1 interface come from these subnets. All of the vmk1 traffic for all hosts comes from this subnet range. | 10.31.1.0/24 |
6969
| esx-vmotion-vmk2 | /24 | vMotion VMkernel interfaces. | 10.31.2.0/24 |
7070
| esx-vsan-vmk3 | /24 | vSAN VMkernel interfaces and node communication. | 10.31.3.0/24 |
7171
| Reserved | Reserved Space. | /27 | 10.31.0.128/27 |
7272
| Reserved | Reserved Space. | /27 | 10.31.0.192/27 |
7373

74-
7574
## Next steps
7675

7776
- Get started with configuring your Azure VMware Solution service principal as a prerequisite. To learn how, see the [Enabling Azure VMware Solution service principal](native-first-party-principle-security.md) quickstart.

0 commit comments

Comments
 (0)