You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# customer intent: As a cloud administrator, I want to learn about Azure VMware Solution Generation 2 private cloud design considerations so that I can make informed decisions about my Azure VMware Solution deployment.
8
8
---
9
9
@@ -18,24 +18,24 @@ This article outlines key design considerations for Azure VMware Solution Genera
18
18
19
19
The following functionality is limited during this time. These limitations will be lifted in the future:
20
20
21
-
- You cannot delete your Resource Group, which contains your Private Cloud.
22
-
- You can only deploy **1 Private Cloud per Azure Virtual Network**.
23
-
- You can only create **1 Private Cloud per Resource Group**. Multiple Private Clouds in a single Resource Group are not supported.
24
-
- Your Private Cloud and Virtual Network for your Private Cloud must be in the *same* Resource Group.
25
-
- You cannot move your Private Cloud from one Resource Group to another after the Private Cloud is created.
21
+
- You cannot delete your Resource Group, which contains your private cloud.
22
+
- You can only deploy **1 private cloud per Azure Virtual Network**.
23
+
- You can only create **1 private cloud per Resource Group**. Multiple private clouds in a single Resource Group are not supported.
24
+
- Your private cloud and Virtual Network for your private cloud must be in the *same* Resource Group.
25
+
- You cannot move your private cloud from one Resource Group to another after the private cloud is created.
26
26
- Virtual Network Service Endpoints direct connectivity from Azure VMware Solution workloads is not supported.
27
27
-**vCloud Director** using Private Endpoints is supported. However, vCloud Director using Public Endpoints is not supported.
28
28
-**vSAN Stretched Clusters** is not supported.
29
29
- Public IP down to the VMware NSX Microsoft Edge for configuring internet will not be supported.
30
30
- Support for **AzCLI**, **PowerShell**, and **.NET SDK** are not available during Public Preview.
31
-
-**Run Commands** interacting with customer segments aren't supported including run commands interacting with Zerto, Jetstream, and other 3rd-party integrations.
31
+
-**Run commands** interacting with customer segments aren't supported, including Zerto, JetStream, and other 3rd-party integrations.
32
32
33
33
## Unsupported integrations during Public Preview
34
34
35
35
The following 1st-party and 3rd-party integrations won't be available during Public Preview:
36
36
-**Azure Elastic SAN**
37
37
-**Zerto DR**
38
-
-**Jetstream DR**
38
+
-**JetStream DR**
39
39
40
40
## Routing and subnet considerations
41
41
@@ -46,16 +46,14 @@ The private cloud connects to your Azure virtual network using standard Azure ne
46
46
> [!Note]
47
47
> Permitted ranges for your address block are the RFC 1918 private address spaces (10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16), except for 172.17.0.0/16. Replication network is not applicable to AV64 nodes and is planned for general deprecation at a future date.
48
48
49
-
Avoid using the following IP schemas reserved for VMware NSX usage:
49
+
Avoid using the following IP schema reserved for VMware NSX usage:
50
50
51
51
- 169.254.0.0/24 - used for internal transit network
52
52
- 169.254.2.0/23 - used for inter-VRF transit network
53
53
- 100.64.0.0/16 - used to connect T1 and T0 gateways internally
54
54
- 100.73.x.x – used by Microsoft’s management network
55
55
56
-
Example /22 CIDR network address block: 10.31.0.0/22
57
-
58
-
The subnets:
56
+
Example /22 CIDR network address block **10.31.0.0/22** is divided into the following subnets:
| esx-cust-vmk1 | /24 | vmk1 is the management interface used by customers to access the host. IPs from the vmk1 interface come from these subnets. All of the vmk1 traffic for all hosts comes from this subnet range. | 10.31.1.0/24 |
0 commit comments