|
| 1 | +--- |
| 2 | +title: Configure NSX network components in Azure VMware Solution |
| 3 | +description: Learn how to use the Azure VMware Solution console to configure NSX-T network segments. |
| 4 | +ms.topic: how-to |
| 5 | +ms.date: 02/16/2021 |
| 6 | +--- |
| 7 | + |
| 8 | +# Configure NSX network components in Azure VMware Solution |
| 9 | + |
| 10 | +An Azure VMware Solution private cloud comes with NSX-T as a software-defined network (SDDC) by default. It comes pre-provisioned with an NSX-T Tier-0 gateway in Active/Active mode and a default NSX-T Tier-1 gateway in Active/Standby mode. These gateways let you connect the segments (logical switches) and provide East-West and North-South connectivity. |
| 11 | + |
| 12 | +After the Azure VMware Solution private cloud is deployed, you can configure the necessary NSX-T objects from the Azure VMware Solution console under **Workload Networking**. The console presents the simplified view of NSX-T operations that a VMware administrator needs daily and targeted at users not familiar with NSX-T. |
| 13 | + |
| 14 | +You'll have four options to configure NSX-T components in the Azure VMware Solution console: |
| 15 | +- **Segments** - Create segments that display in NSX-T Manager and vCenter. |
| 16 | +- **DHCP** - Create a DHCP server or DHCP relay if you plan to use DHCP. |
| 17 | +- **Port mirroring** – Create port mirroring to help troubleshoot network issues. |
| 18 | +- **DNS** – Create a DNS forwarder to send DNS requests to a designated DNS server for resolution. |
| 19 | + |
| 20 | +>[!NOTE] |
| 21 | +>You'll still have access to the NSX-T Manager console, where you can use the advanced settings mentioned and other NSX-T features. |
| 22 | + |
| 23 | +:::image type="content" source="media/configure-nsx-network-components-azure-portal/nsxt-workload-networking.png" alt-text="Screenshot showing four options in the Azure VMware Solution console for configuring NSX-T."::: |
| 24 | + |
| 25 | +## Prerequisites |
| 26 | +Virtual machines (VMs) created or migrated to the Azure VMware Solution private cloud should be attached to a segment. |
| 27 | + |
| 28 | +## Create an NSX-T segment in the Azure portal |
| 29 | +You can create and configure an NSX-T segment from the Azure VMware Solution console in the Azure portal. These segments are connected to the default Tier-1 gateway, and the workloads on these segments get East-West and North-South connectivity. Once you create the segment, it displays in NSX-T Manager and vCenter. |
| 30 | + |
| 31 | +>[!NOTE] |
| 32 | +>If you plan to use DHCP, you'll need to [configure a DHCP server or DHCP relay](#create-a-dhcp-server-or-dhcp-relay-in-the-azure-portal) before you can create and configure an NSX-T segment. |
| 33 | +
|
| 34 | +1. In your Azure VMware Solution private cloud, under **Workload Networking**, select **Segments** > **Add**. |
| 35 | + |
| 36 | + :::image type="content" source="media/configure-nsx-network-components-azure-portal/add-new-nsxt-segment.png" alt-text="Screenshot showing how to add a new segment."::: |
| 37 | + |
| 38 | +1. Provide the details for the new logical segment. |
| 39 | + |
| 40 | + :::image type="content" source="media/configure-nsx-network-components-azure-portal/create-new-segment-details.png" alt-text="Screenshot showing the details of the new segment."::: |
| 41 | + |
| 42 | + - **Segment name** - Name of the logical switch that is visible in vCenter. |
| 43 | + - **Subnet gateway** - Gateway IP address for the logical switch's subnet with a subnet mask. VMs are attached to a logical switch, and all VMs connecting to this switch belong to the same subnet. Also, all VMs attached to this logical segment must carry an IP address from the same segment. |
| 44 | + - **DHCP** (optional) - DHCP ranges for a logical segment. A [DHCP server or DHCP relay](#create-a-dhcp-server-or-dhcp-relay-in-the-azure-portal) must be configured to consume DHCP on Segments. |
| 45 | + - **Connected gateway** - *Selected by default and read only.* Tier-1 gateway and type of segment information. |
| 46 | + - **T1** - Name of the Tier-1 gateway in NSX-T Manager. An Azure VMware Solution private cloud comes with an NSX-T Tier-0 gateway in Active/Active mode and a default NSX-T Tier-1 gateway in Active/Standby mode. Segments created through the Azure VMware Solution console only connect to the default Tier-1 gateway, and the workloads of these segments get East-West and North-South connectivity. You can only create more Tier-1 gateways through NSX-T Manager. Tier-1 gateways created from the NSX-T Manager console are not visible in the Azure VMware Solution console. |
| 47 | + - **Type** - Overlay segment supported by Azure VMware Solution. |
| 48 | + |
| 49 | +1. Select **OK** to create the segment and attach it to the Tier-1 gateway. |
| 50 | + |
| 51 | + The segment is now visible in the Azure VMware Solution console, NSX-T Manger, and vCenter. |
| 52 | + |
| 53 | +## Create a DHCP server or DHCP relay in the Azure portal |
| 54 | +You can create a DHCP server or relay directly from the Azure VMware Solution console in the Azure portal. The DHCP server or relay connects to the Tier-1 gateway, which gets created when you deploy Azure VMware Solution. All the segments where you gave DHCP ranges will be part of this DHCP. After you've created a DHCP server or DHCP relay, you must define a subnet or range on segment level to consume it. |
| 55 | + |
| 56 | +1. In your Azure VMware Solution private cloud, under **Workload Networking**, select **DHCP** > **Add**. |
| 57 | + |
| 58 | +2. Select either **DHCP Server** or **DHCP Relay** and then provide a name for the server or relay and three IP addresses. |
| 59 | + |
| 60 | + >[!NOTE] |
| 61 | + >For DHCP relay, only one IP address is required for a successful configuration. |
| 62 | +
|
| 63 | + :::image type="content" source="media/configure-nsx-network-components-azure-portal/add-dhcp-server-relay.png" alt-text="Screenshot showing how to add a DHCP server or DHCP relay in Azure VMware Solutions."::: |
| 64 | + |
| 65 | +4. Complete the DHCP configuration by [providing DHCP ranges on the logical segments](#create-an-nsx-t-segment-in-the-azure-portal) and then select **OK**. |
| 66 | + |
| 67 | +## Configure port mirroring in the Azure portal |
| 68 | +You can configure port mirroring to monitor network traffic that involves forwarding a copy of each packet from one network switch port to another. This option places a protocol analyzer on the port that receives the mirrored data. It analyzes traffic from a source, a VM, or a group of VMs, and then sent to a defined destination. |
| 69 | + |
| 70 | +To set up port mirroring in the Azure VMware Solution console, you'll: |
| 71 | + |
| 72 | +* [Step 1. Create source and destination VMs or VM groups](#step-1-create-source-and-destination-vms-or-vm-groups) – The source group has a single VM or multiple VMs where the traffic is mirrored. |
| 73 | + |
| 74 | +* [Step 2. Create a port mirroring profile](#step-2-create-a-port-mirroring-profile) – You'll define the traffic direction for the source and destination VM groups. |
| 75 | + |
| 76 | +### Step 1. Create source and destination VMs or VM groups |
| 77 | + |
| 78 | +In this step, you'll create a source VM group and a destination VM group. |
| 79 | + |
| 80 | +1. In your Azure VMware Solution private cloud, under **Workload Networking**, select **Port mirroring** > **VM groups** > **Add**. |
| 81 | + |
| 82 | + :::image type="content" source="media/configure-nsx-network-components-azure-portal/add-port-mirroring-vm-groups.png" alt-text="Screenshot showing how to create a VM group for port mirroring."::: |
| 83 | + |
| 84 | +1. Provide a name for the new VM group, select the desired VMs from the list, and then **Ok**. |
| 85 | + |
| 86 | + :::image type="content" source="media/configure-nsx-network-components-azure-portal/add-vm-group.png" alt-text="Screenshot showing the list of VMs to add to the VM group."::: |
| 87 | + |
| 88 | +1. Repeat these steps to create the destination VM group. |
| 89 | + |
| 90 | +### Step 2. Create a port mirroring profile |
| 91 | + |
| 92 | +In this step, you'll define a profile for the source and destination VM groups' traffic direction. |
| 93 | + |
| 94 | +>[!NOTE] |
| 95 | +>Make sure you have both the source and destination VM groups created. |
| 96 | +
|
| 97 | +1. Select **Port mirroring** > **Add** and then provide: |
| 98 | + |
| 99 | + :::image type="content" source="media/configure-nsx-network-components-azure-portal/add-port-mirroring-profile.png" alt-text="Screenshot showing the information required for the port mirroring profile."::: |
| 100 | + |
| 101 | + - **Port mirroring name** - Descriptive name for the profile. |
| 102 | + - **Direction** - Select from Ingress, Egress, or Bi-directional. |
| 103 | + - **Source** - Select the source VM group. |
| 104 | + - **Destination** - Select the destination VM group. |
| 105 | + - **Description** - Enter a description for the port mirroring. |
| 106 | + |
| 107 | +1. Select **OK** to complete the profile. |
| 108 | + |
| 109 | + The profile and VM groups are visible in the Azure VMware Solution console. |
| 110 | + |
| 111 | +## Configure a DNS forwarder in the Azure portal |
| 112 | +You'll configure a DNS forwarder where specific DNS requests get forwarded to a designated DNS server for resolution. A DNS forwarder is associate with a **default DNS zone** and up to three **FQDN zones**. |
| 113 | + |
| 114 | +>[!TIP] |
| 115 | +>You can also use the [NSX-T Manager console to configure a DNS forwarder](https://docs.vmware.com/en/VMware-NSX-T-Data-Center/2.5/administration/GUID-A0172881-BB25-4992-A499-14F9BE3BE7F2.html). |
| 116 | +
|
| 117 | +To set up a DNS forwarder in the Azure VMware Solution console, you'll: |
| 118 | + |
| 119 | +* [Step 1. Configure a default DNS zone and FQDN zone](#step-1-configure-a-default-dns-zone-and-fqdn-zone) – When a DNS query is received, a DNS forwarder compares the domain name with the domain names in the FQDN DNS zone. |
| 120 | + |
| 121 | +* [Step 2. Configure DNS service](#step-2-configure-dns-service) - You'll configure the DNS forwarder service. |
| 122 | + |
| 123 | +### Step 1. Configure a default DNS zone and FQDN zone |
| 124 | +You'll configure a default DNS zone and FQDN zone to send DNS queries to the upstream server. When a DNS query is received, the DNS forwarder compares the domain name in the query with the FQDN DNS zones' domain names. If a match is found, the query is forwarded to the DNS servers specified in the FQDN DNS zone. If no match is found, the query is forwarded to the DNS servers specified in the default DNS zone. |
| 125 | + |
| 126 | +>[!NOTE] |
| 127 | +>A default DNS zone must be defined before you configure an FQDN zone. |
| 128 | +
|
| 129 | +1. In your Azure VMware Solution private cloud, under **Workload Networking**, select **DNS** > **DNS zones** > **Add**. |
| 130 | + |
| 131 | + :::image type="content" source="media/configure-nsx-network-components-azure-portal/nsxt-workload-networking-dns-zones.png" alt-text="Screenshot showing how to add DNS zones and a DNS service."::: |
| 132 | + |
| 133 | +1. Select **Default DNS zone** and provide: |
| 134 | + |
| 135 | + :::image type="content" source="media/configure-nsx-network-components-azure-portal/nsxt-workload-networking-configure-dns-zones.png" alt-text="Screenshot showing how to add a default DNS zone."::: |
| 136 | + |
| 137 | + 1. A name for the DNS zone. |
| 138 | + |
| 139 | + 1. Up to three DNS server IP addresses in the format of **8.8.8.8**. |
| 140 | + |
| 141 | +1. Select **FQDN zone** and provide: |
| 142 | + |
| 143 | + :::image type="content" source="media/configure-nsx-network-components-azure-portal/nsxt-workload-networking-configure-fqdn-zone.png" alt-text="Screenshot showing how to add an FQDN zone. "::: |
| 144 | + |
| 145 | + 1. A name for the DNS zone. |
| 146 | + |
| 147 | + 1. The FQDN domain. |
| 148 | + |
| 149 | + 1. Up to three DNS server IP addresses in the format of **8.8.8.8**. |
| 150 | + |
| 151 | +1. Select **OK** to finish adding the default DNS zone and DNS service. |
| 152 | + |
| 153 | +### Step 2. Configure DNS service |
| 154 | + |
| 155 | +1. Select the **DNS service** tab, select **Add**, and then provide: |
| 156 | + |
| 157 | + :::image type="content" source="media/configure-nsx-network-components-azure-portal/nsxt-workload-networking-configure-dns-service.png" alt-text="Screenshot showing the information required for the DNS service."::: |
| 158 | + |
| 159 | + 1. A name for the DNS service. |
| 160 | + |
| 161 | + 1. Enter the IP address for the DNS service. |
| 162 | + |
| 163 | + 1. Select the default DNS zone that you created under the DNS zones tab. |
| 164 | + |
| 165 | + 1. Select the FQDN zones that you added under the DNS zones tab. |
| 166 | + |
| 167 | + 1. Select the **Log level**. |
| 168 | + |
| 169 | + >[!TIP] |
| 170 | + >**Tier-1 Gateway** is selected by default and reflects the gateway created when deploying Azure VMware Solution. |
| 171 | +
|
| 172 | +1. Select **OK**. |
| 173 | + |
| 174 | + The DNS service was added successfully. |
| 175 | + |
| 176 | + :::image type="content" source="media/configure-nsx-network-components-azure-portal/nsxt-workload-networking-configure-dns-service-success.png" alt-text="Screenshot showing the DNS service added successfully."::: |
| 177 | + |
0 commit comments