You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-vmware/enable-hcx-access-over-internet.md
+16-7Lines changed: 16 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,18 +6,22 @@ ms.date: 06/27/2022
6
6
---
7
7
# Enable HCX access over the internet
8
8
9
-
This article describes how to access the HCX over a Public IP address using Azure VMware Solution. It also explains how to pair HCX sites, and create service mesh from on-premises to Azure VMware Solutions private cloud using Public IP. The service mesh allows you to migrate a workload from an on-premises datacenter to Azure VMware Solutions private cloud over the public internet.
9
+
In this article, you'll learn how to perform HCX migration over a Public IP address using Azure VMware Solution.
10
+
>[!IMPORTANT]
11
+
>Before configuring a Public IP on your Azure VMware Solution private cloud, please consult your Network Administrator to understand the implications and the impact to your environment.
12
+
13
+
You'll also learn how to pair HCX sites and create service mesh from on-premises to an Azure VMware Solution private cloud using a Public IP. The service mesh allows you to migrate a workload from an on-premises datacenter to an Azure VMware Solution private cloud over the public internet. This solution is useful when the customer is not using ExpressRoute or VPN connectivity with the Azure cloud.
14
+
10
15
11
16
> [!IMPORTANT]
12
-
> This solution is useful where the customer is not using Express Route or VPN connectivity with the Azure cloud. The on-premises HCX appliance should be reachable from the internet to establish HCX communication from on-premises to Azure VMware Solution private cloud.
17
+
> The on-premises HCX appliance should be reachable from the internet to establish HCX communication from on-premises to the Azure VMware Solution private cloud.
13
18
14
19
## Configure Public IP block
15
20
16
-
Configure a Public IP block through portal by using the Public IP feature of the Azure VMware Solution private cloud.
21
+
To perform HCX Migration over the public internet, you'll need a minimum of six Public IP addresses. Five of these Public IP addresses will be used for the Public IP segment, and one will be used for configuring Network Address Translation (NAT). You can obtain the Public IP block by reserving a /29 from the Azure VMware Solution portal. Configure a Public IP block through portal by using the Public IP feature of the Azure VMware Solution private cloud.
17
22
18
23
1. Sign in to Azure VMware Solution portal.
19
24
1. Under **Workload Networking**, select **Public IP (preview)**.
20
-
21
25
1. Select **+Public IP**.
22
26
1. Enter the **Public IP name** and select the address space from the **Address space** drop-down list according to the number of IPs required, then select **Configure**.
23
27
>[!Note]
@@ -35,13 +39,15 @@ Before you create a Public IP segment, get your credentials for NSX-T Manager fr
35
39
1. Copy the NSX-T Manager admin user password.
36
40
1. Browse the NSX-T Manger and paste the admin password in the password field, and select **Login**.
37
41
1. Under the **Networking** section select **Connectivity** and **Segments**, then select **ADD SEGMENT**.
38
-
1. Provide Segment name, select Tier-1 router as connected gateway, and provide public segment under subnets.
42
+
1.6. Provide Segment name, select Tier-1 router as connected gateway, and provide the reserved Public IP under subnets. The Public IP block for this Public IP segment shouldn't include the first and last Public IPs from the overall Public IP block. For example, if you reserved 20.95.1.16/29, you would input 20.95.1.16/30.
39
43
1. Select **Save**.
40
44
41
45
## Assign public IP to HCX manager
42
46
HCX manager of destination Azure VMware Solution SDDC should be reachable from the internet to do site pairing with source site. HCX Manager can be exposed by way of DNAT rule and a static null route. Because HCX Manager is in the provider space, not within the NSX-T environment, the null route is necessary to allow HCX Manager to route back to the client by way of the DNAT rule.
43
47
44
48
### Add static null route to the T1 router
49
+
The static null route is used to allow HCX private IP to route through the NSX T1 for public endpoints.
50
+
45
51
1. Sign in to NSX-T manager, and select **Networking**.
46
52
1. Under the **Connectivity** section, select **Tier-1 Gateways**.
47
53
1. Edit the existing T1 gateway.
@@ -61,7 +67,8 @@ HCX manager of destination Azure VMware Solution SDDC should be reachable from t
61
67
1. Select **CLOSE EDITING**.
62
68
63
69
### Add NAT rule to T1 gateway
64
-
70
+
>[!Note]
71
+
>The NAT rules should use a different Public IP address than your Public IP segment.
65
72
1. Sign in to NSX-T Manager, and select **Networking**.
66
73
1. Select **NAT**.
67
74
1. Select the T1 Gateway.
@@ -70,7 +77,9 @@ HCX manager of destination Azure VMware Solution SDDC should be reachable from t
70
77
1. The DNAT Rule Destination is the Public IP for HCX Manager. The Translated IP is the HCX Manager IP in the cloud.
71
78
1. The SNAT Rule Source is the HCX Manager IP in the cloud. The Translated IP is the non-overlapping /32 IP from the Static Route.
72
79
1. Make sure to set the Firewall option on DNAT rule to **Match External Address**.
73
-
1. Create T1 Gateway Firewall rules to allow only expected traffic to the Public IP for HCX Manager and drop everything else.
80
+
1. Create T1 Gateway Firewall rules to allow only expected traffic to the Public IP for HCX Manager and drop everything else.
81
+
1. Create a Gateway Firewall rule on the T1 that allows your On-Premise as the **Source IP** and the Azure VMware Solution reserved Public as the **Destination IP**. This rule should be the highest priority.
82
+
1. Create a Gateway Firewall rule on the T1 that denies all other traffic where the **Source IP** is and “Any” and **Destination IP** is the Azure VMware Solution reserved Public IP.
74
83
75
84
>[!NOTE]
76
85
> HCX manager can now be accessed over the internet using public IP.
0 commit comments