You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
There are two ways to interconnectivity in the Azure VMware Solution private cloud:
14
+
Azure VMware Solution private cloud offers two types of interconnectivity:
15
15
16
-
-[**Basic Azure-only interconnectivity**](#azure-virtual-network-interconnectivity)lets you manage and use your private cloud with only a single virtual network in Azure. This implementation is best suited for Azure VMware Solution evaluations or implementations that don't require access from on-premises environments.
16
+
-[**Basic Azure-only interconnectivity**](#azure-virtual-network-interconnectivity)allows you to manage and use your private cloud with a single virtual network in Azure. This setup is ideal for evaluations or implementations that don't require access from on-premises environments.
17
17
18
18
-[**Full on-premises to private cloud interconnectivity**](#on-premises-interconnectivity) extends the basic Azure-only implementation to include interconnectivity between on-premises and Azure VMware Solution private clouds.
19
-
20
-
This article covers the key concepts that establish networking and interconnectivity, including requirements and limitations. In addition, this article provides you with the information you need to know to work with Azure VMware Solution to configure your networking.
19
+
20
+
This article explains key networking and interconnectivity concepts, including requirements and limitations. It also provides the information you need to configure your networking with Azure VMware Solution.
21
21
22
22
## Azure VMware Solution private cloud use cases
23
23
24
24
The use cases for Azure VMware Solution private clouds include:
25
+
25
26
- New VMware vSphere VM workloads in the cloud
26
27
- VM workload bursting to the cloud (on-premises to Azure VMware Solution only)
27
28
- VM workload migration to the cloud (on-premises to Azure VMware Solution only)
@@ -33,41 +34,41 @@ The use cases for Azure VMware Solution private clouds include:
33
34
34
35
## Azure virtual network interconnectivity
35
36
36
-
You can interconnect your Azure virtual network with the Azure VMware Solution private cloud implementation. You can manage your Azure VMware Solution private cloud, consume workloads in your private cloud, and access other Azure services.
37
+
You can interconnect your Azure virtual network with the Azure VMware Solution private cloud implementation. This connection allows you to manage your Azure VMware Solution private cloud, consume workloads in your private cloud, and access other Azure services.
37
38
38
-
The diagram below shows the basic network interconnectivity established at the time of a private cloud deployment. It shows the logical networking between a virtual network in Azure and a private cloud. This connectivity is established via a backend ExpressRoute that is part of the Azure VMware Solution service. The interconnectivity fulfills the following primary use cases:
39
+
The following diagram illustrates the basic network interconnectivity established during a private cloud deployment. It shows the logical networking between a virtual network in Azure and a private cloud. This connectivity is established via a backend ExpressRoute that is part of the Azure VMware Solution service. The interconnectivity supports the following primary use cases:
39
40
40
-
- Inbound access to vCenter Server and NSX-T Manager that is accessible from VMs in your Azure subscription.
41
+
- Inbound access to vCenter Server and NSX-T Manager from VMs in your Azure subscription.
41
42
- Outbound access from VMs on the private cloud to Azure services.
42
-
- Inbound access of workloads running in the private cloud.
43
+
- Inbound access to workloads running in the private cloud.
43
44
44
45
> [!IMPORTANT]
45
-
> When connecting **production** Azure VMware Solution private clouds to an Azure virtual network, an ExpressRoute virtual network gateway with the Ultra Performance Gateway SKU should be used with FastPath enabled to achieve 10Gbps connectivity. Less critical environments can use the Standard or High Performance Gateway SKUs for slower network performance.
46
+
> When connecting **production** Azure VMware Solution private clouds to an Azure virtual network, use an ExpressRoute virtual network gateway with the Ultra Performance Gateway SKU and enable FastPath to achieve 10Gbps connectivity. For less critical environments, use the Standard or High Performance Gateway SKUs for slower network performance.
46
47
47
48
> [!NOTE]
48
-
> If connecting more than four Azure VMware Solution private clouds in the same Azure region to the same Azure virtual network is a requirement, use [AVS Interconnect](connect-multiple-private-clouds-same-region.md) to aggregate private cloud connectivity within the Azure region.
49
+
> If you need to connect more than four Azure VMware Solution private clouds in the same Azure region to the same Azure virtual network, use [AVS Interconnect](connect-multiple-private-clouds-same-region.md) to aggregate private cloud connectivity within the Azure region.
49
50
50
-
:::image type="content" source="media/concepts/adjacency-overview-drawing-single.png" alt-text="Diagram showing the basic network interconnectivity established at the time of an Azure VMware Solution private cloud deployment." border="false" lightbox="media/concepts/adjacency-overview-drawing-single.png":::
51
+
:::image type="content" source="media/concepts/adjacency-overview-drawing-single.png" alt-text="Diagram illustrating basic network interconnectivity during an Azure VMware Solution private cloud deployment." border="false" lightbox="media/concepts/adjacency-overview-drawing-single.png":::
51
52
52
53
## On-premises interconnectivity
53
54
54
-
In the fully interconnected scenario, you can access the Azure VMware Solution from your Azure virtual network(s) and on-premises. This implementation is an extension of the basic implementation described in the previous section. An ExpressRoute circuit is required to connect from on-premises to your Azure VMware Solution private cloud in Azure.
55
+
In the fully interconnected scenario, you can access the Azure VMware Solution from your Azure virtual network(s) and on-premises. This implementation extends the basic implementation described in the previous section. An ExpressRoute circuit is required to connect from on-premises to your Azure VMware Solution private cloud in Azure.
55
56
56
-
The diagram below shows the on-premises to private cloud interconnectivity, which enables the following use cases:
57
+
The following diagram shows the on-premises to private cloud interconnectivity, which enables the following use cases:
57
58
58
59
- Hot/Cold vSphere vMotion between on-premises and Azure VMware Solution.
59
60
- On-premises to Azure VMware Solution private cloud management access.
60
61
61
-
:::image type="content" source="media/concepts/adjacency-overview-drawing-double.png" alt-text="Diagram showing the virtual network and on-premises to private cloud interconnectivity." border="false" lightbox="media/concepts/adjacency-overview-drawing-double.png":::
62
+
:::image type="content" source="media/concepts/adjacency-overview-drawing-double.png" alt-text="Diagram displaying virtual network and on-premises to private cloud interconnectivity." border="false" lightbox="media/concepts/adjacency-overview-drawing-double.png":::
62
63
63
-
For full interconnectivity to your private cloud, you need to enable ExpressRoute Global Reach and then request an authorization key and private peering ID for Global Reach in the Azure portal. The authorization key and peering ID are used to establish Global Reach between an ExpressRoute circuit in your subscription and the ExpressRoute circuit for your private cloud. Once linked, the two ExpressRoute circuits route network traffic between your on-premises environments to your private cloud. For more information on the procedures, see the [tutorial for creating an ExpressRoute Global Reach peering to a private cloud](tutorial-expressroute-global-reach-private-cloud.md).
64
+
For full interconnectivity to your private cloud, enable ExpressRoute Global Reach and then request an authorization key and private peering ID for Global Reach in the Azure portal. Use the authorization key and peering ID to establish Global Reach between an ExpressRoute circuit in your subscription and the ExpressRoute circuit for your private cloud. Once linked, the two ExpressRoute circuits route network traffic between your on-premises environments and your private cloud. For more information on the procedures, see the [tutorial for creating an ExpressRoute Global Reach peering to a private cloud](tutorial-expressroute-global-reach-private-cloud.md).
64
65
65
66
> [!IMPORTANT]
66
-
> Customers should not advertise bogon routes over ExpressRoute from on-premises or their Azure VNet. Examples of bogon routes include 0.0.0.0/5 or 192.0.0.0/3.
67
-
67
+
> Don't advertise bogon routes over ExpressRoute from on-premises or your Azure VNet. Examples of bogon routes include 0.0.0.0/5 or 192.0.0.0/3.
68
68
69
69
## Route advertisement guidelines to Azure VMware Solution
70
-
You need to follow these guidelines while advertising routes from your on-premises and Azure VNET to Azure VMware Solution over ExpressRoute:
70
+
71
+
Follow these guidelines when advertising routes from your on-premises and Azure VNET to Azure VMware Solution over ExpressRoute:
71
72
72
73
|**Supported**|**Not supported**|
73
74
| ---------------| ---------------|
@@ -78,13 +79,13 @@ For full interconnectivity to your private cloud, you need to enable ExpressRout
78
79
> [!NOTE]
79
80
> The customer-advertised default route to Azure VMware Solution can't be used to route back the traffic when the customer accesses Azure VMware Solution management appliances (vCenter Server, NSX-T Manager, HCX Manager). The customer needs to advertise a more specific route to Azure VMware Solution for that traffic to be routed back.
0 commit comments