Skip to content

Commit 67cf9ed

Browse files
committed
incorported review changes
1 parent 1c78f5a commit 67cf9ed

File tree

1 file changed

+33
-32
lines changed

1 file changed

+33
-32
lines changed

articles/azure-vmware/enable-vmware-cds-with-azure.md

Lines changed: 33 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -1,44 +1,44 @@
11
---
2-
title: Enable VMware Cloud director service with Azure VMware solution (Public Preview)
3-
description: This article explains how to use Azure VMware solution to enable enterprise customers to leverage Azure VMware solutions for private clouds underlying resources for virtual datacenters.
2+
title: Enable VMware Cloud director service with Azure VMware Solution (Public Preview)
3+
description: This article explains how to use Azure VMware Solution to enable enterprise customers to leverage Azure VMware Solution for private clouds underlying resources for virtual datacenters.
44
ms.topic: how-to
55
ms.date: 08/09/2022
66
---
77

8-
# Enable VMware Cloud director service with Azure VMware solution (Public Preview)
8+
# Enable VMware Cloud director service with Azure VMware Solution (Preview)
99

10-
VMware Cloud Director Service (CDs) (VMware Cloud Director service | Managed Service | Cloud Solutions & Services) with Azure VMware Solutions enables enterprise customers, to use APIs or the Cloud Director services portal to self-service provision and manage virtual datacenters through multi-tenancy with reduced time and complexity.
10+
VMware Cloud Director Service (CDs) (VMware Cloud Director service | Managed Service | Cloud Solutions & Services) with Azure VMware Solution enables enterprise customers, to use APIs or the Cloud Director services portal to self-service provision and manage virtual datacenters through multi-tenancy with reduced time and complexity.
1111

12-
In this article, you'll learn how to enable VMware Cloud Director service (CDs) with Azure VMware solution for enterprise customers to use Azure VMware Solutions resources and Azure VMware solutions private clouds with underlying resources for virtual datacenters.
12+
In this article, you'll learn how to enable VMware Cloud Director service (CDs) with Azure VMware Solution for enterprise customers to use Azure VMware Solution resources and Azure VMware Solution private clouds with underlying resources for virtual datacenters.
1313

1414
>[!IMPORTANT]
15-
> Cloud director service (CDs) is now available to use with Azure VMware solutions under the Enterprise Agreement (EA) model only. It's not suitable for MSP / Hoster to resell Azure VMware Solution capacity to customers at this point. For more information, see [Azure Service terms](https://www.microsoft.com/licensing/terms/productoffering/MicrosoftAzure/EAEAS#GeneralServiceTerms).
15+
> Cloud Director service (CDs) is now available to use with Azure VMware Solution under the Enterprise Agreement (EA) model only. It's not suitable for MSP / Hoster to resell Azure VMware Solution capacity to customers at this point. For more information, see [Azure Service terms](https://www.microsoft.com/licensing/terms/productoffering/MicrosoftAzure/EAEAS#GeneralServiceTerms).
1616
1717
## Reference architecture
18-
The following diagram shows typical architecture for Cloud Director Services with Azure VMware solutions and how they are connected. Communications to Azure VMware Solution endpoints from cloud Director service are supported by an SSL reverse proxy.
18+
The following diagram shows typical architecture for Cloud Director Services with Azure VMware Solution and how they're connected. Communications to Azure VMware Solution endpoints from Cloud Director service are supported by an SSL reverse proxy.
1919

20-
:::image type="content" source="media/vmware-cds/reference-architecture-diagram.png" alt-text="Diagram showing typical architecture and how CDS is connected with Azure VMware solutions" border="false" lightbox="media/vmware-cds/reference-architecture-diagram-expanded.png":::
20+
:::image type="content" source="media/vmware-cds/reference-architecture-diagram.png" alt-text="Diagram showing typical architecture and how CDS is connected with Azure VMware Solution" border="false" lightbox="media/vmware-cds/reference-architecture-diagram-expanded.png":::
2121

2222
VMware Cloud Director supports multi-tenancy by using organizations. A single organization can have multiple organization virtual data centers (VDC). Each Organization’s VDC can have their own dedicated Tier-1 router (Edge Gateway) which is further connected with the provider’s managed shared Tier-0 router.
2323

2424
## Connect tenants and their organization virtual datacenters to Azure vNet based resources
2525

2626
VMware Cloud Director supports multi-tenancy by using organizations. A single organization can have multiple organization virtual data centers (VDC). Each Organization’s VDC can have their own dedicated Tier-1 router (Edge Gateway) which is further connected with the provider’s managed shared Tier-0 router.
27-
To provide access to vNET based Azure resources, each tenant can have their own dedicated Azure vNET with Azure VPN gateway. A Site-to-site VPN between customer Organization VDC and Azure vNET is established. To achieve this connectivity, the provider will provide public IP to the organization VDC. Organization VDC’s Administrator can configure IPSEC VPN connectivity from Cloud Director Service portal.
27+
To provide access to vNET based Azure resources, each tenant can have their own dedicated Azure vNET with Azure VPN gateway. A Site-to-site VPN between customer organization VDC and Azure vNET is established. To achieve this connectivity, the provider will provide public IP to the organization VDC. Organization VDC’s Administrator can configure IPSEC VPN connectivity from Cloud Director Service portal.
2828

29-
:::image type="content" source="media/vmware-cds/site-to-site-vpn-diagram.png" alt-text="Diagram showing site to site VPN connection and how CDS is connected with Azure VMware solutions." border="false" lightbox="media/vmware-cds/site-to-site-vpn-diagram-expanded.png":::
29+
:::image type="content" source="media/vmware-cds/site-to-site-vpn-diagram.png" alt-text="Diagram showing site to site VPN connection and how CDS is connected with Azure VMware Solution." border="false" lightbox="media/vmware-cds/site-to-site-vpn-diagram-expanded.png":::
3030

31-
As shown in diagram above, Organization 01 has two organization Virtual datacenters (VDCs), VDC1 and VDC2. The virtual datacenter of each organization has its own Azure vNETs connected with their respective organization VDC Edge gateway through IPSEC VPN.
31+
As shown in the diagram above, Organization 01 has two organization Virtual datacenters (VDCs): VDC1 and VDC2. The virtual datacenter of each organization has its own Azure vNETs connected with their respective organization VDC Edge gateway through IPSEC VPN.
3232
Providers provide public IP addresses to the organization VDC Edge gateway for IPSEC VPN configuration. ORG VDC Edge gateway’s firewall blocks all traffic by default, specific allow rules needs to be added on Organization Edge gateway firewall.
3333

3434
Organization VDCs can be part of a single organization but it still provides isolation between them. For example, VM1 hosted in organization VDC1 cannot ping Azure VM JSVM2 for tenant2.
3535

36-
### Prerequisite
36+
### Prerequisites
3737
- Organization VDC is configured with an Edge gateway and has Public IPs assigned to it to establish IPSEC VPN by provider.
3838
- Tenants have created a routed Organization VDC network in tenant’s Virtual datacenter.
3939
- Test VM1 and VM2 are created in the Organization VDC1 and VDC2 respectively. Both VMs are connected to the routed orgVDC network in their respective VDCs.
40-
- A dedicated [Azure vNET](tutorial-configure-networking.md#create-a-vnet-manually) is configured for each tenant. For this example, we created Tenant1-vNet and Tenant2-vNet for tenant1 and tenant2 respectively.
41-
- Create [Azure Virtual network gateway](tutorial-configure-networking.md#create-a-virtual-network-gateway) for vNETs created earlier.
40+
- Have a dedicated [Azure vNET](tutorial-configure-networking.md#create-a-vnet-manually) configured for each tenant. For this example, we created Tenant1-vNet and Tenant2-vNet for tenant1 and tenant2 respectively.
41+
- Create an [Azure Virtual network gateway](tutorial-configure-networking.md#create-a-virtual-network-gateway) for vNETs created earlier.
4242
- Deploy Azure VMs JSVM1 and JSVM2 for tenant1 and tenant2 for test purposes.
4343

4444
> [!Note]
@@ -90,18 +90,18 @@ Cloud Director Service supports a policy-based VPN. Azure VPN gateway configures
9090
### Configure VPN on organization VDC Edge router
9191
1. Log in to Organization CDS tenant portal and select tenant’s edge gateway.
9292
1. Select **IPSEC VPN** option under **Services** and then select **New**.
93-
1. Under general setting, provide **Name** and select desired security profile. Ensure that security profile settings (IKE, Tunnel and DPD configuration) are same on both sides of the IPsec tunnel.
93+
1. Under general setting, provide **Name** and select desired security profile. Ensure that security profile settings (IKE, Tunnel, and DPD configuration) are same on both sides of the IPsec tunnel.
9494
1. Modify Azure VPN gateway to match the Security profile, if necessary. You can also do security profile customization from CDS tenant portal.
9595

9696
>[!Note]
97-
> VPN tunnel would not establish if these settings were mismatched.
97+
> VPN tunnel won't establish if these settings were mismatched.
9898
1. Under **Peer Authentication Mode**, provide the same pre-shared key that is used at the Azure VPN gateway.
9999
1. Under **Endpoint configuration**, add the Organization’s public IP and network details in local endpoint and Azure VNet details in remote endpoint configuration.
100100
1. Under **Ready to complete**, review applied configuration.
101101
1. Select **Finish** to apply configuration.
102102

103103
### Apply firewall configuration
104-
Organization VDC Edge router firewall denies traffic by default. We need to apply specific rules to enable connectivity. Follow the steps below to apply firewall rules.
104+
Organization VDC Edge router firewall denies traffic by default. We need to apply specific rules to enable connectivity. Use the following steps to apply firewall rules.
105105

106106
1. Add IP set in CDS portal
107107
1. Log in to Edge router then select **IP SETS** under the **Security** tab in left plane.
@@ -120,24 +120,25 @@ Organization VDC Edge router firewall denies traffic by default. We need to appl
120120
1. Select **View statistics**.
121121
Status of tunnel should show **UP**.
122122
4. Verify IPsec connection
123-
1. Log in to Azure VM deployed in tenants vNET and ping tenant’s test VM IP address in tenant’s OrgVDC. For example, ping VM1 from JSVM1. Similarly, you should be able to ping VM2 from JSVM2.
124-
1. You can verify isolation between tenants Azure vNETs. Tenant1’s VM1 won't be able to ping Tenant2’s Azure VM JSVM2 in tenant2 Azure vNETs.
123+
1. Log in to Azure VM deployed in tenants vNET and ping tenant’s test VM IP address in tenant’s OrgVDC.
124+
For example, ping VM1 from JSVM1. Similarly, you should be able to ping VM2 from JSVM2.
125+
1. You can verify isolation between tenants Azure vNETs. Tenant1’s VM1 won't be able to ping Tenant2’s Azure VM JSVM2 in tenant2 Azure vNETs.
125126

126-
## Connect Tenant’s workload to public internet
127+
## Connect Tenant’s workload to public Internet
127128

128-
- Tenants can use public IP to do SNAT configuration to enable internet access for VM hosted in organization VDC. To achieve this connectivity, the provider can provide public IP to the organization VDC.
129-
- Each organization VDC can be created with dedicated T1 router (Created by Provider) with reserved Public & Private IP for NAT configuration. Tenants can use public IP SNAT configuration to enable internet access for VM hosted in organization VDC.
130-
- OrgVDC Administrator can create a routed OrgVDC network connected to their OrgVDC edge gateway. To provide Internet access.
131-
- OrgVDC admin can configure SNAT, to provide a specific VM or can use network CIDR to provide public connectivity.
132-
- OrgVDC Edge has default DENY ALL firewall rule. Organization administrators will need to open appropriate ports to allow through firewall by adding a new firewall rule. Virtual machines configured on such OrgVDC network used in SNAT configuration should be able to access the internet.
129+
- Tenants can use public IP to do SNAT configuration to enable Internet access for VM hosted in organization VDC. To achieve this connectivity, the provider can provide public IP to the organization VDC.
130+
- Each organization VDC can be created with dedicated T1 router (created by provider) with reserved Public & Private IP for NAT configuration. Tenants can use public IP SNAT configuration to enable Internet access for VM hosted in organization VDC.
131+
- OrgVDC administrator can create a routed OrgVDC network connected to their OrgVDC Edge gateway. To provide Internet access.
132+
- OrgVDC administrator can configure SNAT to provide a specific VM or use network CIDR to provide public connectivity.
133+
- OrgVDC Edge has default DENY ALL firewall rule. Organization administrators will need to open appropriate ports to allow access through the firewall by adding a new firewall rule. Virtual machines configured on such OrgVDC network used in SNAT configuration should be able to access the Internet.
133134

134135
### Prerequisites
135136
1. Public IP is assigned to the organization VDC Edge router.
136-
To verify, log in to the organization's VDC. Under **Networking**> **Edges**, select **Edge Gateway** and then select **IP allocations** under **IP management**. You should see a range of assigned IP address there.
137+
To verify, log in to the organization's VDC. Under **Networking**> **Edges**, select **Edge Gateway**, then select **IP allocations** under **IP management**. You should see a range of assigned IP address there.
137138
2. Create a routed Organization VDC network. (Connect OrgvDC network to the edge gateway with public IP address assigned)
138139

139140
### Apply SNAT configuration
140-
1. Log in to Organization VDC. Navigate to your Edge gateway and then select NAT under services.
141+
1. Log in to Organization VDC. Navigate to your Edge gateway and then select **NAT** under **Services**.
141142
2. Select **New** to add new SNAT rule.
142143
3. Provide **Name** and select **Interface type** as SNAT.
143144
4. Under **External IP**, enter public IP address from public IP pool assigned to your orgVDC Edge router.
@@ -149,24 +150,24 @@ Organization VDC Edge router firewall denies traffic by default. We need to appl
149150
8. Select **Save** to save the configuration.
150151

151152
### Apply firewall rule
152-
1. Log in to Organization VDC and navigate to **Edge Gateway** and then select **IP set** under security.
153+
1. Log in to Organization VDC and navigate to **Edge Gateway**, then select **IP set** under security.
153154
2. Create an IPset. Provide IP address of your VM (you can use CIDR also). Select save.
154-
3. Under **services**, select **Firewall** and then select **Edit rules**.
155+
3. Under **services**, select **Firewall**, then select **Edit rules**.
155156
4. Select **New ON TOP** and create a firewall rule to allow desired port and destination.
156157
1. Select the **IPset** your created earlier as source. Under **Action**, select **Allow**.
157158
1. Select **Keep** to save the configuration.
158159
1. Log in to your test VM and ping your destination address to verify outbound connectivity.
159160

160-
## Migrate workloads to Cloud Director Service on Azure VMware Solutions
161+
## Migrate workloads to Cloud Director Service on Azure VMware Solution
161162

162163
VMware Cloud Director Availability can be used to migrate VMware Cloud Director workload into Cloud Director service on Azure VMware Solution. Enterprise customers can drive self-serve one-way warm migration from the on-premises Cloud Director Availability vSphere plugin, or they can run the Cloud Director Availability plugin from the provider-managed Cloud Director instance and move workloads into Azure VMware Solution.
163164

164165
For more information about VMware Cloud Director Availability, see [VMware Cloud Director Availability | Disaster Recovery & Migration](https://www.vmware.com/products/cloud-director-availability.html)
165166

166167
## FAQs
167-
**Question**: In which Azure regions, VMware cloud director service is supported?
168+
**Question**: What are the supported Azure regions for the VMware Cloud Director service?
168169

169-
**Answer**: This offering is supported in all Azure regions where Azure VMware solutions are available. Ensure that the region you wish to connect to Cloud Director service is within a 150-milliseconds round trip time for latency with cloud director service.
170+
**Answer**: This offering is supported in all Azure regions where Azure VMware Solution is available except for Brazil and South Africa. Ensure that the region you wish to connect to Cloud Director service is within a 150-milliseconds round trip time for latency with Cloud Director service.
170171

171172
## Next steps
172173
[What Is VMware Cloud Director service and How Does It Work](https://docs.vmware.com/en/VMware-Cloud-Director-service/services/getting-started-with-vmware-cloud-director-service/GUID-149EF3CD-700A-4B9F-B58B-8EA5776A7A92.html)

0 commit comments

Comments
 (0)