Skip to content

Commit ab881d0

Browse files
Merge pull request #143883 from shortpatti/simplified-nsx-for-avs2
new article for configuring NSX-T components in AVS
2 parents 2b73bed + a3c83ff commit ab881d0

22 files changed

+194
-11
lines changed

articles/azure-vmware/concepts-identity.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.date: 02/02/2021
77

88
# Azure VMware Solution identity concepts
99

10-
Azure VMware Solution private clouds are provisioned with a vCenter server and NSX-T Manager. You use vCenter to manage virtual machine (VM) workloads. You use the NSX-T manager to extend the private cloud.
10+
Azure VMware Solution private clouds are provisioned with a vCenter server and NSX-T Manager. You use vCenter to manage virtual machine (VM) workloads. You use the NSX-T Manager to extend the private cloud.
1111

1212
Access and identity management use CloudAdmin group privileges for vCenter and restricted administrator rights for NSX-T Manager. It ensures that your private cloud platform upgrades automatically with the newest features and patches. For more information, see [private cloud upgrades concepts article][concepts-upgrades].
1313

@@ -44,7 +44,7 @@ The table shows **CloudAdmin** and **CloudGlobalAdmin** privileges.
4444

4545
## NSX-T Manager access and identity
4646

47-
Use the "administrator" account to access NSX-T Manager. It has full privileges and lets you create and manage T1 routers, logical switches, and all services. The privileges give you access to the NSX-T T0 router. A change to the T0 router could result in degraded network performance or no private cloud access. Open a support request in the Azure portal to request any changes to your NSX-T T0 router.
47+
Use the *administrator* account to access NSX-T Manager. It has full privileges and lets you create and manage Tier-1 (T1) Gateways, segments (logical switches), and all services. The privileges give you access to the NSX-T Tier-0 (T0) Gateway. A change to the T0 Gateway could result in degraded network performance or no private cloud access. Open a support request in the Azure portal to request any changes to your NSX-T T0 Gateway.
4848

4949
## Next steps
5050

articles/azure-vmware/concepts-networking.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ The use cases for Azure VMware Solution private clouds include:
3434
In the virtual network to private cloud implementation, you can manage your Azure VMware Solution private cloud, consume workloads in your private cloud, and access Azure services over the ExpressRoute connection.
3535

3636
The diagram below shows the basic network interconnectivity established at the time of a private cloud deployment. It shows the logical, ExpressRoute-based networking between a virtual network in Azure and a private cloud. The interconnectivity fulfills three of the primary use cases:
37-
* Inbound access to vCenter server and NSX-T manager that is accessible from VMs in your Azure subscription and not from your on-premises systems.
37+
* Inbound access to vCenter server and NSX-T Manager that is accessible from VMs in your Azure subscription and not from your on-premises systems.
3838
* Outbound access from VMs to Azure services.
3939
* Inbound access and consumption of workloads running a private cloud.
4040

@@ -64,4 +64,5 @@ Now that you've covered Azure VMware Solution network and interconnectivity conc
6464
[enable Global Reach]: ../expressroute/expressroute-howto-set-global-reach.md
6565

6666
<!-- LINKS - internal -->
67-
67+
[concepts-upgrades]: ./concepts-upgrades.md
68+
[concepts-storage]: ./concepts-storage.md

articles/azure-vmware/concepts-private-clouds-clusters.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ This article describes all of these concepts.
2020
2121
## Private clouds
2222

23-
Private clouds contain vSAN clusters built with dedicated, bare-metal Azure hosts. Each private cloud can have multiple clusters managed by the same vCenter server and NSX-T manager. You can deploy and manage private clouds in the portal, CLI, or PowerShell.
23+
Private clouds contain vSAN clusters built with dedicated, bare-metal Azure hosts. Each private cloud can have multiple clusters managed by the same vCenter server and NSX-T Manager. You can deploy and manage private clouds in the portal, CLI, or PowerShell.
2424

2525
As with other resources, private clouds are installed and managed from within an Azure subscription. The number of private clouds within a subscription is scalable. Initially, there's a limit of one private cloud per subscription.
2626

@@ -68,6 +68,7 @@ Now that you've covered Azure VMware Solution private cloud concepts, you may wa
6868
- [How to enable Azure VMware Solution resource](enable-azure-vmware-solution.md).
6969

7070
<!-- LINKS - internal -->
71+
[concepts-networking]: ./concepts-networking.md
7172

7273
<!-- LINKS - external-->
7374
[VCSA versions]: https://kb.vmware.com/s/article/2143838
Lines changed: 177 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,177 @@
1+
---
2+
title: Configure NSX network components in Azure VMware Solution
3+
description: Learn how to use the Azure VMware Solution console to configure NSX-T network segments.
4+
ms.topic: how-to
5+
ms.date: 02/16/2021
6+
---
7+
8+
# Configure NSX network components in Azure VMware Solution
9+
10+
An Azure VMware Solution private cloud comes with NSX-T as a software-defined network (SDDC) by default. It comes pre-provisioned with an NSX-T Tier-0 gateway in Active/Active mode and a default NSX-T Tier-1 gateway in Active/Standby mode. These gateways let you connect the segments (logical switches) and provide East-West and North-South connectivity.
11+
12+
After the Azure VMware Solution private cloud is deployed, you can configure the necessary NSX-T objects from the Azure VMware Solution console under **Workload Networking**. The console presents the simplified view of NSX-T operations that a VMware administrator needs daily and targeted at users not familiar with NSX-T.
13+
14+
You'll have four options to configure NSX-T components in the Azure VMware Solution console:
15+
- **Segments** - Create segments that display in NSX-T Manager and vCenter.
16+
- **DHCP** - Create a DHCP server or DHCP relay if you plan to use DHCP.
17+
- **Port mirroring** – Create port mirroring to help troubleshoot network issues.
18+
- **DNS** – Create a DNS forwarder to send DNS requests to a designated DNS server for resolution.
19+
20+
>[!NOTE]
21+
>You'll still have access to the NSX-T Manager console, where you can use the advanced settings mentioned and other NSX-T features.
22+
23+
:::image type="content" source="media/configure-nsx-network-components-azure-portal/nsxt-workload-networking.png" alt-text="Screenshot showing four options in the Azure VMware Solution console for configuring NSX-T.":::
24+
25+
## Prerequisites
26+
Virtual machines (VMs) created or migrated to the Azure VMware Solution private cloud should be attached to a segment.
27+
28+
## Create an NSX-T segment in the Azure portal
29+
You can create and configure an NSX-T segment from the Azure VMware Solution console in the Azure portal. These segments are connected to the default Tier-1 gateway, and the workloads on these segments get East-West and North-South connectivity. Once you create the segment, it displays in NSX-T Manager and vCenter.
30+
31+
>[!NOTE]
32+
>If you plan to use DHCP, you'll need to [configure a DHCP server or DHCP relay](#create-a-dhcp-server-or-dhcp-relay-in-the-azure-portal) before you can create and configure an NSX-T segment.
33+
34+
1. In your Azure VMware Solution private cloud, under **Workload Networking**, select **Segments** > **Add**.
35+
36+
:::image type="content" source="media/configure-nsx-network-components-azure-portal/add-new-nsxt-segment.png" alt-text="Screenshot showing how to add a new segment.":::
37+
38+
1. Provide the details for the new logical segment.
39+
40+
:::image type="content" source="media/configure-nsx-network-components-azure-portal/create-new-segment-details.png" alt-text="Screenshot showing the details of the new segment.":::
41+
42+
- **Segment name** - Name of the logical switch that is visible in vCenter.
43+
- **Subnet gateway** - Gateway IP address for the logical switch's subnet with a subnet mask. VMs are attached to a logical switch, and all VMs connecting to this switch belong to the same subnet. Also, all VMs attached to this logical segment must carry an IP address from the same segment.
44+
- **DHCP** (optional) - DHCP ranges for a logical segment. A [DHCP server or DHCP relay](#create-a-dhcp-server-or-dhcp-relay-in-the-azure-portal) must be configured to consume DHCP on Segments.
45+
- **Connected gateway** - *Selected by default and read only.* Tier-1 gateway and type of segment information.
46+
- **T1** - Name of the Tier-1 gateway in NSX-T Manager. An Azure VMware Solution private cloud comes with an NSX-T Tier-0 gateway in Active/Active mode and a default NSX-T Tier-1 gateway in Active/Standby mode. Segments created through the Azure VMware Solution console only connect to the default Tier-1 gateway, and the workloads of these segments get East-West and North-South connectivity. You can only create more Tier-1 gateways through NSX-T Manager. Tier-1 gateways created from the NSX-T Manager console are not visible in the Azure VMware Solution console.
47+
- **Type** - Overlay segment supported by Azure VMware Solution.
48+
49+
1. Select **OK** to create the segment and attach it to the Tier-1 gateway.
50+
51+
The segment is now visible in the Azure VMware Solution console, NSX-T Manger, and vCenter.
52+
53+
## Create a DHCP server or DHCP relay in the Azure portal
54+
You can create a DHCP server or relay directly from the Azure VMware Solution console in the Azure portal. The DHCP server or relay connects to the Tier-1 gateway, which gets created when you deploy Azure VMware Solution. All the segments where you gave DHCP ranges will be part of this DHCP. After you've created a DHCP server or DHCP relay, you must define a subnet or range on segment level to consume it.
55+
56+
1. In your Azure VMware Solution private cloud, under **Workload Networking**, select **DHCP** > **Add**.
57+
58+
2. Select either **DHCP Server** or **DHCP Relay** and then provide a name for the server or relay and three IP addresses.
59+
60+
>[!NOTE]
61+
>For DHCP relay, only one IP address is required for a successful configuration.
62+
63+
:::image type="content" source="media/configure-nsx-network-components-azure-portal/add-dhcp-server-relay.png" alt-text="Screenshot showing how to add a DHCP server or DHCP relay in Azure VMware Solutions.":::
64+
65+
4. Complete the DHCP configuration by [providing DHCP ranges on the logical segments](#create-an-nsx-t-segment-in-the-azure-portal) and then select **OK**.
66+
67+
## Configure port mirroring in the Azure portal
68+
You can configure port mirroring to monitor network traffic that involves forwarding a copy of each packet from one network switch port to another. This option places a protocol analyzer on the port that receives the mirrored data. It analyzes traffic from a source, a VM, or a group of VMs, and then sent to a defined destination.
69+
70+
To set up port mirroring in the Azure VMware Solution console, you'll:
71+
72+
* [Step 1. Create source and destination VMs or VM groups](#step-1-create-source-and-destination-vms-or-vm-groups) – The source group has a single VM or multiple VMs where the traffic is mirrored.
73+
74+
* [Step 2. Create a port mirroring profile](#step-2-create-a-port-mirroring-profile) – You'll define the traffic direction for the source and destination VM groups.
75+
76+
### Step 1. Create source and destination VMs or VM groups
77+
78+
In this step, you'll create a source VM group and a destination VM group.
79+
80+
1. In your Azure VMware Solution private cloud, under **Workload Networking**, select **Port mirroring** > **VM groups** > **Add**.
81+
82+
:::image type="content" source="media/configure-nsx-network-components-azure-portal/add-port-mirroring-vm-groups.png" alt-text="Screenshot showing how to create a VM group for port mirroring.":::
83+
84+
1. Provide a name for the new VM group, select the desired VMs from the list, and then **Ok**.
85+
86+
:::image type="content" source="media/configure-nsx-network-components-azure-portal/add-vm-group.png" alt-text="Screenshot showing the list of VMs to add to the VM group.":::
87+
88+
1. Repeat these steps to create the destination VM group.
89+
90+
### Step 2. Create a port mirroring profile
91+
92+
In this step, you'll define a profile for the source and destination VM groups' traffic direction.
93+
94+
>[!NOTE]
95+
>Make sure you have both the source and destination VM groups created.
96+
97+
1. Select **Port mirroring** > **Add** and then provide:
98+
99+
:::image type="content" source="media/configure-nsx-network-components-azure-portal/add-port-mirroring-profile.png" alt-text="Screenshot showing the information required for the port mirroring profile.":::
100+
101+
- **Port mirroring name** - Descriptive name for the profile.
102+
- **Direction** - Select from Ingress, Egress, or Bi-directional.
103+
- **Source** - Select the source VM group.
104+
- **Destination** - Select the destination VM group.
105+
- **Description** - Enter a description for the port mirroring.
106+
107+
1. Select **OK** to complete the profile.
108+
109+
The profile and VM groups are visible in the Azure VMware Solution console.
110+
111+
## Configure a DNS forwarder in the Azure portal
112+
You'll configure a DNS forwarder where specific DNS requests get forwarded to a designated DNS server for resolution. A DNS forwarder is associate with a **default DNS zone** and up to three **FQDN zones**.
113+
114+
>[!TIP]
115+
>You can also use the [NSX-T Manager console to configure a DNS forwarder](https://docs.vmware.com/en/VMware-NSX-T-Data-Center/2.5/administration/GUID-A0172881-BB25-4992-A499-14F9BE3BE7F2.html).
116+
117+
To set up a DNS forwarder in the Azure VMware Solution console, you'll:
118+
119+
* [Step 1. Configure a default DNS zone and FQDN zone](#step-1-configure-a-default-dns-zone-and-fqdn-zone) – When a DNS query is received, a DNS forwarder compares the domain name with the domain names in the FQDN DNS zone.
120+
121+
* [Step 2. Configure DNS service](#step-2-configure-dns-service) - You'll configure the DNS forwarder service.
122+
123+
### Step 1. Configure a default DNS zone and FQDN zone
124+
You'll configure a default DNS zone and FQDN zone to send DNS queries to the upstream server. When a DNS query is received, the DNS forwarder compares the domain name in the query with the FQDN DNS zones' domain names. If a match is found, the query is forwarded to the DNS servers specified in the FQDN DNS zone. If no match is found, the query is forwarded to the DNS servers specified in the default DNS zone.
125+
126+
>[!NOTE]
127+
>A default DNS zone must be defined before you configure an FQDN zone.
128+
129+
1. In your Azure VMware Solution private cloud, under **Workload Networking**, select **DNS** > **DNS zones** > **Add**.
130+
131+
:::image type="content" source="media/configure-nsx-network-components-azure-portal/nsxt-workload-networking-dns-zones.png" alt-text="Screenshot showing how to add DNS zones and a DNS service.":::
132+
133+
1. Select **Default DNS zone** and provide:
134+
135+
:::image type="content" source="media/configure-nsx-network-components-azure-portal/nsxt-workload-networking-configure-dns-zones.png" alt-text="Screenshot showing how to add a default DNS zone.":::
136+
137+
1. A name for the DNS zone.
138+
139+
1. Up to three DNS server IP addresses in the format of **8.8.8.8**.
140+
141+
1. Select **FQDN zone** and provide:
142+
143+
:::image type="content" source="media/configure-nsx-network-components-azure-portal/nsxt-workload-networking-configure-fqdn-zone.png" alt-text="Screenshot showing how to add an FQDN zone. ":::
144+
145+
1. A name for the DNS zone.
146+
147+
1. The FQDN domain.
148+
149+
1. Up to three DNS server IP addresses in the format of **8.8.8.8**.
150+
151+
1. Select **OK** to finish adding the default DNS zone and DNS service.
152+
153+
### Step 2. Configure DNS service
154+
155+
1. Select the **DNS service** tab, select **Add**, and then provide:
156+
157+
:::image type="content" source="media/configure-nsx-network-components-azure-portal/nsxt-workload-networking-configure-dns-service.png" alt-text="Screenshot showing the information required for the DNS service.":::
158+
159+
1. A name for the DNS service.
160+
161+
1. Enter the IP address for the DNS service.
162+
163+
1. Select the default DNS zone that you created under the DNS zones tab.
164+
165+
1. Select the FQDN zones that you added under the DNS zones tab.
166+
167+
1. Select the **Log level**.
168+
169+
>[!TIP]
170+
>**Tier-1 Gateway** is selected by default and reflects the gateway created when deploying Azure VMware Solution.
171+
172+
1. Select **OK**.
173+
174+
The DNS service was added successfully.
175+
176+
:::image type="content" source="media/configure-nsx-network-components-azure-portal/nsxt-workload-networking-configure-dns-service-success.png" alt-text="Screenshot showing the DNS service added successfully.":::
177+

articles/azure-vmware/deploy-azure-vmware-solution.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -63,13 +63,13 @@ In this example, the 10.74.72.0/22 network was input during deployment derives t
6363

6464
## Connect and sign in to vCenter and NSX-T
6565

66-
Log into the jump box you created in the earlier step. Once you've logged in, open a web browser and navigate to and log into both vCenter and NSX-T admin console.
66+
Log into the jump box you created in the earlier step. Once you've logged in, open a web browser and navigate to and log into both vCenter and NSX-T Manager.
6767

68-
You can identify the vCenter, and NSX-T admin console's IP addresses and credentials in the Azure portal. Select your private cloud and then in the **Overview** view, select **Identity > Default**.
68+
You can identify the vCenter, and NSX-T Manager console's IP addresses and credentials in the Azure portal. Select your private cloud and then in the **Overview** view, select **Identity > Default**.
6969

7070
## Create a network segment on Azure VMware Solution
7171

72-
You use NSX-T to create new network segments in your Azure VMware Solution environment. You defined the networks you want to create in the [planning section](production-ready-deployment-steps.md). If you haven't defined them, go back to the [planning section](production-ready-deployment-steps.md) before proceeding.
72+
You use NSX-T Manager to create new network segments in your Azure VMware Solution environment. You defined the networks you want to create in the [planning section](production-ready-deployment-steps.md). If you haven't defined them, go back to the [planning section](production-ready-deployment-steps.md) before proceeding.
7373

7474
>[!IMPORTANT]
7575
>Make sure the CIDR network address block you defined doesn't overlap with anything in your Azure or on-premises environments.

articles/azure-vmware/deploy-vm-content-library.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ In this article, we'll walk through the procedure for creating a content library
1313

1414
## Prerequisites
1515

16-
An NSX-T logical switch segment and a managed DHCP service are required to complete this tutorial. For more information, see the [How to manage DHCP in Azure VMware Solution](manage-dhcp.md) article.
16+
An NSX-T segment (logical switch) and a managed DHCP service are required to complete this tutorial. For more information, see the [How to manage DHCP in Azure VMware Solution](manage-dhcp.md) article.
1717

1818
## Create a content library
1919

articles/azure-vmware/includes/add-network-segment-steps.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.date: 11/09/2020
1313

1414
1. Select **Add Segment** and enter a name for the segment.
1515

16-
1. Select the Tier1 Gateway (TNTxx-T1) as the **Connected Gateway** and leave the **Type** as Flexible.
16+
1. Select the Tier-1 Gateway (TNTxx-T1) as the **Connected Gateway** and leave the **Type** as Flexible.
1717

1818
1. Select the pre-configured overlay **Transport Zone** (TNTxx-OVERLAY-TZ) and then select **Set Subnets**.
1919

articles/azure-vmware/index.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -82,6 +82,8 @@ landingContent:
8282
url: ../migrate/how-to-create-azure-vmware-solution-assessment.md?context=/azure/migrate/context/migrate-context.json
8383
- text: Manage DHCP
8484
url: manage-dhcp.md
85+
- text: Configure NSX network components
86+
url: configure-nsx-network-components-azure-portal.md
8587
- text: Deploy disaster recovery for VMs
8688
url: disaster-recovery-for-virtual-machines.md
8789
- text: Deploy VM via content library
55.7 KB
Loading
61.9 KB
Loading

0 commit comments

Comments
 (0)