A RetroSearch Logo

Home - News ( United States | United Kingdom | Italy | Germany ) - Football scores

Search Query:

Showing content from https://learn.microsoft.com/en-us/azure/azure-vmware/tutorial-nsx-t-network-segment below:

Tutorial - Add an NSX network segment in Azure VMware Solution - Azure VMware Solution

After deploying Azure VMware Solution, you can configure an NSX network segment from NSX Manager or the Azure portal. Once configured, the segments are visible in Azure VMware Solution, NSX Manager, and vCenter Server. NSX comes pre-provisioned by default with an NSX Tier-0 gateway in Active/Active mode and a default NSX Tier-1 gateway in Active/Standby mode. These gateways let you connect the segments (logical switches) and provide East-West and North-South connectivity.

Tip

The Azure portal presents a simplified view of NSX operations a VMware administrator needs regularly and targeted at users not familiar with NSX Manager.

In this tutorial, you learn how to:

Prerequisites

An Azure VMware Solution private cloud with access to the vCenter Server and NSX Manager interfaces. For more information, see the Configure networking tutorial.

Use Azure portal to add an NSX network segment
  1. In your Azure VMware Solution private cloud, under Workload Networking, select Segments > Add.

  2. Provide the details for the new logical segment and select OK.

    Note

    The Connected gateway is selected by default and is read-only. It shows Tier-1 Gateway and type of segment information.

The segment is now visible in Azure VMware Solution, NSX Manager, and vCenter Server.

Use NSX Manager to add network segment

The virtual machines (VMs) created in vCenter Server are placed onto the network segments created in NSX and are visible in vCenter Server.

  1. In NSX Manager, select Networking > Segments, and then select Add Segment.

  2. Enter a name for the segment.

  3. Select the Tier-1 Gateway (TNTxx-T1) as the Connected Gateway and leave the Type as Flexible.

  4. Select the preconfigured overlay Transport Zone (TNTxx-OVERLAY-TZ) and then select Set Subnets.

  5. Enter the gateway IP address and then select Add.

    Important

    The IP address needs to be on a non-overlapping RFC1918 address block, which ensures connection to the VMs on the new segment.

  6. Select Apply and then Save.

  7. Select No to decline the option to continue configuring the segment.

Verify the new network segment

Verify the presence of the new network segment. In this example, ls01 is the new network segment.

  1. In NSX Manager, select Networking > Segments.

  2. In vCenter Server, select Networking > SDDC-Datacenter.

Next steps

In this tutorial, you created an NSX network segment to use for VMs in vCenter Server.

You can now:


RetroSearch is an open source project built by @garambo | Open a GitHub Issue

Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo

HTML: 3.2 | Encoding: UTF-8 | Version: 0.7.4