Skip to content

Commit 84ff019

Browse files
committed
[AQ]edit pass: concepts-network-design-considerations
1 parent e3df99d commit 84ff019

File tree

1 file changed

+10
-10
lines changed

1 file changed

+10
-10
lines changed

articles/azure-vmware/concepts-network-design-considerations.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -8,9 +8,9 @@ ms.date: 1/10/2023
88

99
# Azure VMware Solution network design considerations
1010

11-
Azure VMware Solution offers a VMware private cloud environment that users and applications can access from on-premises and Azure-based environments or resources. Networking services such as Azure ExpressRoute and VPN connections deliver the connectivity.
11+
Azure VMware Solution offers a VMware private cloud environment that users and applications can access from on-premises and Azure-based environments or resources. Networking services such as Azure ExpressRoute and virtual private network (VPN) connections deliver the connectivity.
1212

13-
There are several networking considerations to review before you set up your Azure VMware Solution environment. This article provides solutions for use cases that you might encounter when you're using Azure VMware Solution to configure your networking.
13+
There are several networking considerations to review before you set up your Azure VMware Solution environment. This article provides solutions for use cases that you might encounter when you're using Azure VMware Solution to configure your networks.
1414

1515
## Azure VMware Solution compatibility with AS-Path Prepend
1616

@@ -41,7 +41,7 @@ To reach vCenter Server and NSX-T Manager, provide specific routes from on-premi
4141

4242
## Default route to Azure VMware Solution for internet traffic inspection
4343

44-
Certain deployments require inspecting all egress traffic from Azure VMware Solution toward the internet. Although it's possible to create network virtual appliances (NVAs) in Azure VMware Solution, there are use cases where these appliances already exist in Azure and can be applied to inspect internet traffic from Azure VMware Solution. In this case, a default route can be injected from the NVA in Azure to attract traffic from Azure VMware Solution and inspect it before the traffic goes out to the public internet.
44+
Certain deployments require inspecting all egress traffic from Azure VMware Solution toward the internet. Although it's possible to create network virtual appliances (NVAs) in Azure VMware Solution, there are use cases where these appliances already exist in Azure and can be applied to inspect internet traffic from Azure VMware Solution. In this case, a default route can be injected from the NVA in Azure to attract traffic from Azure VMware Solution and inspect the traffic before it goes out to the public internet.
4545

4646
The following diagram describes a basic hub-and-spoke topology connected to an Azure VMware Solution cloud and to an on-premises network through ExpressRoute. The diagram shows how the NVA in Azure originates the default route (`0.0.0.0/0`). Azure Route Server propagates the route to Azure VMware Solution through ExpressRoute.
4747

@@ -72,7 +72,7 @@ There are two requirements to hairpin network traffic to an NVA:
7272

7373
- The NVA should advertise a supernet for the Azure VMware Solution and on-premises prefixes.
7474

75-
You could use a supernet that includes both Azure VMware Solution and on-premises prefixes. Or you could use individual prefixes for Azure VMware Solution and on-premises (always less specific than the actual prefixes advertised over ExpressRoute). Keep in mind that all supernet prefixes advertised to Route Server will be propagated both to Azure VMware Solution and on-premises.
75+
You could use a supernet that includes both Azure VMware Solution and on-premises prefixes. Or you could use individual prefixes for Azure VMware Solution and on-premises (always less specific than the actual prefixes advertised over ExpressRoute). Keep in mind that all supernet prefixes advertised to Route Server will be propagated to both Azure VMware Solution and on-premises.
7676
- UDRs in the gateway subnet that exactly match the prefixes advertised from Azure VMware Solution and on-premises will cause hairpin traffic from the gateway subnet to the NVA.
7777

7878
This topology results in high management overhead for large networks that change over time. Consider these limitations:
@@ -82,16 +82,16 @@ This topology results in high management overhead for large networks that change
8282
- Because a single ExpressRoute gateway processes network traffic in both directions, performance might be limited.
8383
- There's an Azure Virtual Network limit of 400 UDRs.
8484

85-
The following diagram demonstrates how the NVA needs to advertise more generic (less specific) prefixes that include the networks from on-premises and Azure VMware Solution. Be careful with this approach. The NVA could potentially attract traffic that it shouldn't, because it's advertising wider ranges (for example, the whole `10.0.0.0/8` network).
85+
The following diagram demonstrates how the NVA needs to advertise prefixes that are more generic (less specific) and that include the networks from on-premises and Azure VMware Solution. Be careful with this approach. The NVA could potentially attract traffic that it shouldn't, because it's advertising wider ranges (for example, the whole `10.0.0.0/8` network).
8686

8787
:::image type="content" source="media/concepts-network-design/vmware-solution-to-on-premises-hairpin.png" alt-text="Diagram of Azure VMware Solution to on-premises communication with Route Server in a single region." lightbox="media/concepts-network-design/vmware-solution-to-on-premises-hairpin.png":::
8888

8989
### Transit spoke virtual network topology
9090

9191
> [!NOTE]
92-
> If advertising less specific prefixes is not possible because of the limits previously described, you can implement an alternative design that uses two separate virtual networks.
92+
> If advertising prefixes that are less specific isn't possible because of the previously described limits, you can implement an alternative design that uses two separate virtual networks.
9393
94-
In this topology, instead of propagating less specific routes to attract traffic to the ExpressRoute gateway, two different NVAs in separate virtual networks can exchange routes between each other. The virtual networks can propagate these routes to their respective ExpressRoute circuits via BGP and Azure Route Server. Each NVA has full control over which prefixes are propagated to each ExpressRoute circuit.
94+
In this topology, instead of propagating routes that are less specific to attract traffic to the ExpressRoute gateway, two different NVAs in separate virtual networks can exchange routes between each other. The virtual networks can propagate these routes to their respective ExpressRoute circuits via BGP and Azure Route Server. Each NVA has full control over which prefixes are propagated to each ExpressRoute circuit.
9595

9696
The following diagram demonstrates how a single `0.0.0.0/0` route is advertised to Azure VMware Solution. It also shows how the individual Azure VMware Solution prefixes are propagated to the on-premises network.
9797

@@ -104,12 +104,12 @@ There's an alternative to using an overlay. Apply secondary NICs in the NVA that
104104

105105
This topology requires a complex initial setup. The topology then works as expected with minimal management overhead. Setup complexities include:
106106

107-
- There's an extra cost for an additional transit virtual network that includes an Azure Route Server, ExpressRoute Gateway, and another NVA. The NVAs might also need to use large VM sizes to meet throughput requirements.
108-
- IPsec or VXLAN tunneling is required between the two NVAs, which means that the NVAs are also in the datapath. Depending on the type of NVA you're using, it can result in custom and complex configuration on those NVAs.
107+
- There's an extra cost for an additional transit virtual network that includes Azure Route Server, an ExpressRoute gateway, and another NVA. The NVAs might also need to use large VM sizes to meet throughput requirements.
108+
- IPsec or VXLAN tunneling is required between the two NVAs, which means that the NVAs are also in the datapath. Depending on the type of NVA that you're using, it can result in custom and complex configuration on those NVAs.
109109

110110
## Next steps
111111

112-
Now that you've covered network design considerations for Azure VMware Solution, you might want to learn more about:
112+
Now that you've covered network design considerations for Azure VMware Solution, you might want to learn more about these topics:
113113

114114
- [Azure VMware Solution networking and interconnectivity concepts](concepts-networking.md)
115115
- [Plan the Azure VMware Solution deployment](plan-private-cloud-deployment.md)

0 commit comments

Comments
 (0)