You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-vmware/includes/create-nsxt-segment-azure-portal-steps.md
+13-5Lines changed: 13 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,6 +7,14 @@ ms.date: 07/16/2021
7
7
author: suzizuber
8
8
ms.author: v-szuber
9
9
---
10
+
title: Add an NSX-T Data Center network segment using Azure VMware Solution
11
+
description: Steps to add an NSX-T Data Center network segment for Azure VMware Solution in the Azure portal.
12
+
ms.topic: include
13
+
ms.service: azure-vmware
14
+
ms.date: 4/22/2023
15
+
author: suzizuber
16
+
ms.author: v-szuber
17
+
---
10
18
11
19
<!-- Used in configure-dhcp-azure-vmware-solution.md and tutorial-nsx-t-network-segment.md -->
12
20
@@ -18,19 +26,19 @@ ms.author: v-szuber
18
26
19
27
2. Provide the details for the new logical segment and select **OK**.
20
28
21
-
:::image type="content" source="../media/networking/add-new-nsxt-segment.png" alt-text="Screenshot showing how to add a new NSX-T segment in the Azure portal.":::
29
+
:::image type="content" source="../media/networking/add-new-nsxt-segment.png" alt-text="Screenshot showing how to add a new NSX-T Data Center segment in the Azure portal.":::
22
30
23
-
-**Segment name** - Name of the segment that is visible in vCenter.
31
+
-**Segment name** - Name of the segment that is visible in vCenter Server.
24
32
25
33
-**Subnet gateway** - Gateway IP address for the segment's subnet with a subnet mask. VMs are attached to a logical segment, and all VMs connecting to this segment belong to the same subnet. Also, all VMs attached to this logical segment must carry an IP address from the same segment.
26
34
27
35
-**DHCP** (optional) - DHCP ranges for a logical segment. You must configure a [DHCP server or DHCP relay](../configure-dhcp-azure-vmware-solution.md) to consume DHCP on Segments.
28
36
29
37
>[!NOTE]
30
-
>The **Connected gateway** is selected by default and is read-only. It shows Tier-1 gateway and type of segment information.
38
+
>The **Connected gateway** is selected by default and is read-only. It shows Tier-1 Gateway and type of segment information.
31
39
>
32
-
>-**T1** - Name of the Tier-1 gateway in NSX-T Manager. A private cloud comes with an NSX-T Tier-0 gateway in Active/Active mode and a default NSX-T Tier-1 gateway in Active/Standby mode. Segments created through the Azure VMware Solution console only connect to the default Tier-1 gateway, and the workloads of these segments get East-West and North-South connectivity. You can only create more Tier-1 gateways through NSX-T Manager. Tier-1 gateways created from the NSX-T Manager console are not visible in the Azure VMware Solution console.
40
+
>-**T1** - Name of the Tier-1 Gateway in NSX-T Manager. A private cloud comes with an NSX-T Tier-0 Gateway in Active/Active mode and a default NSX-T Tier-1 Gateway in Active/Standby mode. Segments created through the Azure VMware Solution console only connect to the default Tier-1 Gateway, and the workloads of these segments get East-West and North-South connectivity. You can only create more Tier-1 Gateways through NSX-T Manager. Tier-1 Gateways created from the NSX-T Manager console are not visible in the Azure VMware Solution console.
33
41
>
34
42
>-**Type** - Overlay segment supported by Azure VMware Solution.
35
43
36
-
The segment is now visible in Azure VMware Solution, NSX-T Manger, and vCenter.
44
+
The segment is now visible in Azure VMware Solution, NSX-T Manager, and vCenter Server.
0 commit comments