Skip to content

Commit c107e90

Browse files
authored
Update create-nsxt-segment-azure-portal-steps.md
Corrected VMware solution names.
1 parent ee9e36a commit c107e90

File tree

1 file changed

+13
-5
lines changed

1 file changed

+13
-5
lines changed

articles/azure-vmware/includes/create-nsxt-segment-azure-portal-steps.md

Lines changed: 13 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,14 @@ ms.date: 07/16/2021
77
author: suzizuber
88
ms.author: v-szuber
99
---
10+
title: Add an NSX-T Data Center network segment using Azure VMware Solution
11+
description: Steps to add an NSX-T Data Center network segment for Azure VMware Solution in the Azure portal.
12+
ms.topic: include
13+
ms.service: azure-vmware
14+
ms.date: 4/22/2023
15+
author: suzizuber
16+
ms.author: v-szuber
17+
---
1018

1119
<!-- Used in configure-dhcp-azure-vmware-solution.md and tutorial-nsx-t-network-segment.md -->
1220

@@ -18,19 +26,19 @@ ms.author: v-szuber
1826

1927
2. Provide the details for the new logical segment and select **OK**.
2028

21-
:::image type="content" source="../media/networking/add-new-nsxt-segment.png" alt-text="Screenshot showing how to add a new NSX-T segment in the Azure portal.":::
29+
:::image type="content" source="../media/networking/add-new-nsxt-segment.png" alt-text="Screenshot showing how to add a new NSX-T Data Center segment in the Azure portal.":::
2230

23-
- **Segment name** - Name of the segment that is visible in vCenter.
31+
- **Segment name** - Name of the segment that is visible in vCenter Server.
2432

2533
- **Subnet gateway** - Gateway IP address for the segment's subnet with a subnet mask. VMs are attached to a logical segment, and all VMs connecting to this segment belong to the same subnet. Also, all VMs attached to this logical segment must carry an IP address from the same segment.
2634

2735
- **DHCP** (optional) - DHCP ranges for a logical segment. You must configure a [DHCP server or DHCP relay](../configure-dhcp-azure-vmware-solution.md) to consume DHCP on Segments.
2836

2937
>[!NOTE]
30-
>The **Connected gateway** is selected by default and is read-only. It shows Tier-1 gateway and type of segment information.
38+
>The **Connected gateway** is selected by default and is read-only. It shows Tier-1 Gateway and type of segment information.
3139
>
32-
>- **T1** - Name of the Tier-1 gateway in NSX-T Manager. A private cloud comes with an NSX-T Tier-0 gateway in Active/Active mode and a default NSX-T Tier-1 gateway in Active/Standby mode. Segments created through the Azure VMware Solution console only connect to the default Tier-1 gateway, and the workloads of these segments get East-West and North-South connectivity. You can only create more Tier-1 gateways through NSX-T Manager. Tier-1 gateways created from the NSX-T Manager console are not visible in the Azure VMware Solution console.
40+
>- **T1** - Name of the Tier-1 Gateway in NSX-T Manager. A private cloud comes with an NSX-T Tier-0 Gateway in Active/Active mode and a default NSX-T Tier-1 Gateway in Active/Standby mode. Segments created through the Azure VMware Solution console only connect to the default Tier-1 Gateway, and the workloads of these segments get East-West and North-South connectivity. You can only create more Tier-1 Gateways through NSX-T Manager. Tier-1 Gateways created from the NSX-T Manager console are not visible in the Azure VMware Solution console.
3341
>
3442
>- **Type** - Overlay segment supported by Azure VMware Solution.
3543
36-
The segment is now visible in Azure VMware Solution, NSX-T Manger, and vCenter.
44+
The segment is now visible in Azure VMware Solution, NSX-T Manager, and vCenter Server.

0 commit comments

Comments
 (0)