Breadcrumb Build – Region A VVD Virtual Infrastructure on VxRail Part 5: Logical Networking for the Management VxRail

Welcome to Part 5 of my VVD on VxRail Breadcrumb Build Series

Via previous posts we have gotten vSphere up and running and deployed NSX for the management VxRail. The next major task is to configure the logical networking, including the Load Balancer for the PSCs and the Edge Gateways and UDLR for North/South routing into the environment.

Warning: This is a very, very long post, so if you are following along then hang on to your hats and keep the coffee on standby as we spend a pretty long time in the networking weeds 🙂

Anything in the format [input_value] represents a value from your preparation that you should insert (without the square brackets of course)

Deploy the PSC LB

  • Networking & Security -> NSX Edges -> Add
    • Name and Desc
      • Install Type: Edge Services Gateway
      • Name : [psc-lb-edgename]
      • Hostname: [psc-lb-virtual-fqdn]
      • Deploy NSX Edges: Selected
      • Enable High Availability: Selected
      • Enable HA Logging: INFO
    • Settings
      • User Name: admin
      • Password: [mgmt-nsx-edge-complex-password]
      • Enable SSH access: Selected
      • Enable FIPS Mode: Deselected
      • Enable auto rule generation Selected
      • Edge Control Level logging INFO
    • Configure Deployment
      • Appliance Size: Large
      • Cluster/Resource Pool: [mgmt-cluster]
      • Datastore: [mgmt-vsan-datastore]
      • Add two appliances with same settings
    • Configure Interfaces
      • Nam: [psc-lb-edgename]
      • Type: Internal
      • Connected to: [mgmt-portgroup]
      • Connectivity Status: Connected
      • Primary IP Address: [psc-lb-virtual-ip]
      • Subnet Prefix Length: [mgmt-prefix-length]
      • MTU: 9000
      • Send ICMP Redirect: Selected
    • Firewall and HA
      • Configure Firewall default policy: Selected
      • Default Traffic Policy: Accept
      • Logging: Disable
      • vNIC: Any
      • Declare Dead Time: 15
    • Configure Gateway
      • NSX Edges -> Double Click [psc-lb-edgename] -> Manage -> Routing -> Global Configuration -> Edit -> [mgmt-gateway] -> Publish
    • Enable the Load Balancer
      • NSX Edges -> Double Click [psc-lb-edgename] -> Manage -> Load Balancer -> Global Configuration -> Edit -> Enable Load Balancer -> OK

Create PSC App Profiles

  • Networking & Security -> NSX Edges -> Double Click [psc-lb-edgename] -> Manage -> Load Balancer -> Application Profiles -> Add
    • Profile1
      • Name: psc-tcp
      • Type: TCP
      • Enable SSL Passthrough: Deselected
      • Persistence: Source IP
      • Expires in (Seconds): 60
    • Profile 2
      • Name: psc-https
      • Type: HTTPS
      • Enable SSL Passthrough: Selected
      • Persistence: Source IP
      • Expires in (Seconds): 60

Create PSC Server Pools

  • Networking & Security -> NSX Edges -> Double Click [psc-lb-edgename] -> Manage -> Load Balancer -> Pools -> Add
  • Pool 1
    • Name: psc-https-443
    • Algorithm: ROUND-ROBIN
    • Monitors: default_tcp_monitor
    • Member
      • Name: psc01
      • IP Address/VC Container: [mgmt-psc-ip]
      • State: Enable
      • Port
        • Monitor Port: 443
        • Weight: 1
    • Member
      • Name: psc02
      • IP Address/VC Container: [sec-psc-ip]
      • State: Enable
      • Port
        • Monitor Port: 443
        • Weight: 1
  • Pool 2
    • Name: psc-tcp-389
    • Algorithm: ROUND-ROBIN
    • Monitors: default_tcp_monitor
    • Member
      • Name: psc01
      • IP Address/VC Container: [mgmt-psc-ip]
      • State: Enable
      • Port
        • Monitor Port : 389
        • Weight: 1
    • Member
      • Name: psc02
      • IP Address/VC Container: [sec-psc-ip]
      • State: Enable
      • Port
        • Monitor Port: 389
        • Weight: 1

Create PSC Virtual Servers

  • Networking & Security -> NSX Edges -> Double Click [psc-lb-edgename] -> Manage -> Load Balancer -> Virtual Servers -> Add
  • Virtual Server 1
    • Enable Virtual Server: Selected
    • Application Profile: psc-tcp
    • Name: psc-tcp-389
    • Description: 389-LDAP,2012-Control Interface,2014-RPC Port,2020- Authentication,636-SSL LDAP
    • IP Address: [psc-lb-virtual-ip]
    • Protocol: TCP
    • Port: 389,636,2012,2014,2020
    • Default Pool: psc-tcp-389
  • Virtual Server 2
    • Enable Virtual Server: Selected
    • Application Profile: psc-https
    • Name: psc-https-443
    • Description: Data from the vSphere Web Client
    • IP Address: [psc-lb-virtual-ip]
    • Protocol: HTTPS
    • Port: 443
    • Default Pool: psc-https-443

Update DNS Records

  • Update DNS Records for [psc-lb-virtual-fqdn] to point at[psc-lb-virtual-ip]

NSX Dynamic Routing

  • Create a Universal Logical Switch for Use as the Transit Network
    • Networking & Security -> Logical Switches -> New Logical Switch
      • Name: Universal Transit Network
      • Transport Zone: Mgmt Universal Transport Zone
      • Replication Mode: Hybrid

Deploy NSX Edge Devices for North-South Routing

  • Networking & Security -> NSX Edges -> Add
    • First ESG
      • Name and Desc
        • Install Type: Edge Services Gateway
        • Name: [mgmt-esg01-edgename]
        • Deploy NSX Edges: Selected
        • Enable High Availability: Deselected
      • Settings
        • User Name: admin
        • Password: [mgmt-nsx-edge-complex-password]
        • Enable SSH access: Selected
        • Enable FIPS Mode: Deselected
        • Enable auto rule generation: Selected
        • Edge Control Level logging: INFO
      • Configure Deployment
        • Appliance Size: Large
        • Cluster/Resource Pool: [mgmt-cluster]
        • Datastore: [mgmt-vsan-datastore]
      • Configure Interfaces
        • Name: Uplink01
        • Type: Uplink
        • Connected to: Uplink01
        • Connectivity Status: Connected
        • Primary IP Address: [mgmt-esg01-uplink01-ip]
        • Subnet Prefix Length: [mgmt-uplink01-prefix-length]
        • MTU: 9000
        • Send ICMP Redirect: Selected
      • Configure Interfaces
        • Name: Uplink02
        • Type: Uplink
        • Connected to: Uplink02
        • Connectivity Status: Connected
        • Primary IP Address: [mgmt-esg01-uplink02-ip]
        • Subnet Prefix Length: [mgmt-uplink02-prefix-length]
        • MTU: 9000
        • Send ICMP Redirect: Selected
      • Configure Interfaces
        • Name: Mgmt-UDLR
        • Type: Internal
        • Connected to: Universal Transit Network
        • Connectivity Status: Connected
        • Primary IP Address: [mgmt-esg01-utn-ip]
        • Subnet Prefix Length: [mgmt-utn-prefix-length]
        • MTU: 9000
        • Send ICMP Redirect: Selected
      • Default Gateway
        • Deselect Configure Default Gateway
      • Firewall and HA -> Next
  • Networking & Security -> NSX Edges -> Add
    • Second ESG
      • Name and Desc
        • Install Type: Edge Services Gateway
        • Name: [mgmt-esg02-edgename]
        • Deploy NSX Edges: Selected
        • Enable High Availability: Deselected
      • Settings
        • User Name: admin
        • Password: [mgmt-nsx-edge-complex-password]
        • Enable SSH access: Selected
        • Enable FIPS Mode: Deselected
        • Enable auto rule generation: Selected
        • Edge Control Level logging: INFO
      • Configure Deployment
        • Appliance Size: Large
        • Cluster/Resource Pool: [mgmt-cluster]
        • Datastore: [mgmt-vsan-datastore]
      • Configure Interfaces
        • Name: Uplink01
        • Type: Uplink
        • Connected to: Uplink01
        • Connectivity Status: Connected
        • Primary IP Address: [mgmt-esg02-uplink01-ip]
        • Subnet Prefix Length: [mgmt-uplink01-prefix-length]
        • MTU: 9000
        • Send ICMP Redirect: Selected
      • Configure Interfaces
        • Name: Uplink02
        • Type: Uplink
        • Connected to: Uplink02
        • Connectivity Status: Connected
        • Primary IP Address: [mgmt-esg02-uplink02-ip]
        • Subnet Prefix Length: [mgmt-uplink02-prefix-length]
        • MTU: 9000
        • Send ICMP Redirect: Selected
      • Configure Interfaces
        • Name: Mgmt-UDLR
        • Type: Internal
        • Connected to: Universal Transit Network
        • Connectivity Status: Connected
        • Primary IP Address: [mgmt-esg02-utn-ip]
        • Subnet Prefix Length: [mgmt-utn-prefix-length]
        • MTU: 9000
        • Send ICMP Redirect: Selected
      • Default Gateway
        • Deselect Configure Default Gateway
      • Firewall and HA -> Next

Anti-Affinity rules for N/S Edges

  • Select [mgmt-cluster] -> Configure -> VM/Host Rules -> Add
    • Name: anti-affinity-rule-ecmpedges
    • Enable rule: Selected
    • Type: Separate Virtual Machine
    • Add both [mgmt-esg01-edgename] and [mgmt-esg02-edgename]

Disable the N/S Edges Firewall Service

  • Networking & Security -> NSX Edges -> Double Click [mgmt-esg01-edgename] -> Manage -> Firewall -> Stop -> Publish
  • Repeat for [mgmt-esg02-edgename]

Enable and Configure Routing

In this section you configure static routes for networks that you intend to advertise from south of the Management UDLR. These networks are used for VXLAN traffic for management and workloads

  • For [mgmt-esg01-edgename]
    • Networking & Security -> NSX Edges -> Double Click Edge -> Manage -> Routing -> Global Configuration -> Start ECMP
    • Dynamic Routing Configuration -> Edit -> Router ID = Uplink01 -> OK – >Publish
    • Routing -> Static Routes – Add
      • Network: [mgmt-cross-region-vxlan-network]/[mgmt-cross-region-vxlan-prefix-length]
      • Next Hop: [mgmt-udlr-utn-uplink-ip]
      • Interface: Mgmt-UDLR
      • Admin Distance 210
    • Routing -> Static Routes – Add
      • Network:[mgmt-regiona-vxlan-network]/[mgmt-regiona-vxlan-prefix-length]
      • Next Hop: [mgmt-udlr-utn-uplink-ip]
      • Interface: Mgmt-UDLR
      • Admin Distance 210
    • Publish
    • Routing -> BGP -> Edit
      • Enable BGP: Selected
      • Enable Graceful Restart: Selected
      • Enable Default Originate: Deselected
      • Local AS: [mgmt-esg01-local-as]
    • BGP -> Add
      • Neighbour 1 (TOR1)
        • IP Address: [tor1-bgp-ip]
        • Remote AS: [tor1-local-as]
        • Weight: 60
        • Keep Alive Time: 4
        • Hold Down Time: 12
        • Password: [tor1-bgp-password]
      • Neighbour 2 (TOR2)
        • IP Address: [tor2-bgp-ip]
        • Remote AS : [tor2-local-as]
        • Weight: 60
        • Keep Alive Time: 4
        • Hold Down Time: 12
        • Password: [tor2-bgp-password]
      • Neighbour 3 (UDLR)
        • IP Address: [mgmt-udlr-bgp-protocol-ip]
        • Remote AS: [mgmt-udlr-local-as]
        • Weight: 60
        • Keep Alive Time: 1
        • Hold Down Time: 3
        • Password: [mgmt-udlr-bgp-password]
    • Publish
    • Routing -> Route Redistribution -> Edit -> Select BGP -> OK
    • Route Redistribution -> Add
      • Prefix: Any
      • Learner Protocol: BGP
      • OSPF: Deselected
      • Static Routes: Selected
      • Connected: Selected
      • Action: Permit
    • Publish
  • For [mgmt-esg02-edgename]
    • Networking & Security -> NSX Edges -> Double Click Edge -> Manage -> Routing -> Global Configuration -> Start ECMP
    • Dynamic Routing Configuration -> Edit -> Router ID = Uplink01 -> OK – >Publish
    • Routing -> Static Routes – Add
      • Network: [mgmt-cross-region-vxlan-network]/[mgmt-cross-region-vxlan-prefix-length]
      • Next Hop: [mgmt-udlr-utn-uplink-ip]
      • Interface: Mgmt-UDLR
      • Admin Distance 210
    • Routing -> Static Routes – Add
      • Network: [mgmt-regiona-vxlan-network]/[mgmt-regiona-vxlan-prefix-length]
      • Next Hop: [mgmt-udlr-utn-uplink-ip]
      • Interface: Mgmt-UDLR
      • Admin Distance 210
    • Publish
    • Routing -> BGP -> Edit
      • Enable BGP: Selected
      • Enable Graceful Restart: Selected
      • Enable Default Originate: Deselected
      • Local AS: [mgmt-esg02-local-as]
    • BGP -> Add
      • Neighbour 1 (TOR1)
        • IP Address: [tor1-bgp-ip]
        • Remote AS: [tor1-local-as]
        • Weight: 60
        • Keep Alive Time: 4
        • Hold Down Time: 12
        • Password: [tor1-bgp-password]
      • Neighbour 2 (TOR2)
        • IP Address: [tor2-bgp-ip]
        • Remote AS : [tor2-local-as]
        • Weight: 60
        • Keep Alive Time: 4
        • Hold Down Time: 12
        • Password: [tor2-bgp-password]
      • Neighbour 3 (UDLR)
        • IP Address: [mgmt-udlr-bgp-protocol-ip]
        • Remote AS: [mgmt-udlr-local-as]
        • Weight: 60
        • Keep Alive Time: 1
        • Hold Down Time: 3
        • Password: [mgmt-udlr-bgp-password]
    • Publish
    • Routing -> Route Redistribution -> Edit -> Select BGP -> OK
    • Route Redistribution -> Add
      • Prefix: Any
      • Learner Protocol: BGP
      • OSPF: Deselected
      • Static Routes: Selected
      • Connected: Selected
      • Action: Permit
    • Publish

Deploy Management UDLR

  • Networking & Security -> NSX Edges -> Add
    • Name and Description
      • Universal Logical (Distributed) Router: Selected
      • Name: Mgmt-UDLR
      • Deploy Edge Appliance: Selected
      • Enable High Availability: Selected
      • Enable HA Logging: Selected
      • Log Level: INFO
    • Settings
      • User Name: admin
      • Password: [mgmt-nsx-edge-complex-password]
      • Enable SSH access: Selected
      • Enable FIPS Mode: Deselected
      • Edge Control Level logging: INFO
    • Configure Deployment
      • Cluster/Resource Pool: [mgmt-cluster]
      • Datastore: [mgmt-vsan-datastore]
      • Add two appliances
    • Configure Interfaces
      • HA Interface Configuration -> Select -> [mgmt-portgroup]
    • Configure Interfaces
      • Name: Uplink
      • Type: Uplink
      • Connected to: Universal Transit Network
      • Connectivity Status: Connected
      • Primary IP Address: [mgmt-udlr-utn-uplink-ip]
      • Subnet Prefix Length: [mgmt-utn-prefix-length]
      • MTU: 9000
    • Default Gateway
      • Deselect Configure Default Gateway
    • Finish
  • Enable SSH
    • Double click Mgmt-UDLR -> Manage -> Firewall
      • Add Rule
        • Name: enableSSH
        • Source: Any
        • Destination: Any
        • Service: SSH
        • Action: Accept

Configure UDLR for Dynamic Routing

  • Networking & Security -> NSX Edges -> Double Click Mgmt-UDLR -> Manage -> Routing -> Global Configuration -> Routing Configuration -> Edit -> Enable ECMP -> OK
  • Dynamic Routing Configuration -> Edit -> RouterID -> Select [Uplink] -> OK -> Publish
  • Routing -> BGP -> Edit
    • Enable BGP: Selected
    • Enable Graceful Restart: Selected
    • Local AS: [mgmt-udlr-local-as]
    • Add Member for [mgmt-esg01-edgename]
      • IP Address: [mgmt-esg01-utn-ip]
      • Forwarding Address: [mgmt-udlr-utn-uplink-ip]
      • Protocol Address: [mgmt-udlr-bgp-protocol-ip]
      • Remote AS: [mgmt-esg01-local-as]
      • Weight: 60
      • Keep Alive Time: 1
      • Hold Down Time: 3
      • Password: [mgmt-esg01-bgp-password]
    • Add Member for [mgmt-esg02-edgename]
      • IP Address: [mgmt-esg02-udlr-ip]
      • Forwarding Address: [mgmt-udlr-utn-uplink-ip]
      • Protocol Address: [mgmt-udlr-bgp-protocol-ip]
      • Remote AS: [mgmt-esg02-local-as]
      • Weight: 60
        Keep Alive Time: 1
        Hold Down Time: 3
        Password: [mgmt-esg02-bgp-password]
  • Publish
  • Route Redistribution -> Edit
    • OSPF: Deselected
    • BGP: Selected
  • Route Redistribution -> Route Redistribution Table -> OSPF Entry -> Edit
    • Learner Protocol: BGP
  • Publish

Exclude Management vCenter from Firewall


  • Networking & Security -> Firewall Settings -> Exclusion List -> Add -> Add [mgmt-vcenter-vmname] ->OK

Create IP Sets for Components of the Management Cluster

  • Networking & Security -> Groups and Tags -> IP Sets
  • Create IP Sets as follows
    • PSCs: [mgmt-psc-ip],[sec-psc-ip],[psc-lb-virtual-ip]
    • vCenters: [mgmt-vcenter-ip],[sec-vcenter-ip]
    • vRA-App: [vra_appliance01-ip],[vra_appliance03-ip],[vra_appliance03-ip]
    • vRA-IaaS: [vra-dem01-ip],[vra-dem02-ip],[vra-manager01-ip],[vra-manager02-ip],[vra-web01-ip,[vra-web02-ip]
    • vRA-Agents: [vra-agent01-ip],[vra-agent02-ip]
    • vRB: [vrb-ip]
    • vRB-Collectors: [vrb-collector01-ip]
    • vDP: [vdp-ip]
    • vROPS: [vrops-ip]
    • vROPS-Collectors: [vrops-collector01-ip]
    • vRLI: [vrli-ip]
    • vRLCM: [vrlcm-ip]
    • UMDS: [update-manager-ip]
    • VXRM: [vxrm-ip]
    • SDDC: [mgmt-networks],[mgmt-vxlan-network]
    • Administrators: [administrator-network]

Create NSX Security Groups

  • Networking & Security -> Groups and Tags -> Security Groups
  • Create security groups with their corresponding IP sets as members
    • PSCs
    • vCenters
    • vRA-App
    • vRA-IaaS
    • vRA-Agents
    • vRB
    • vRB-Collectors
    • vDP
    • vROPS
    • vROPS-Collectors
    • vRLI
    • vRLCM
    • UMDS
    • VXRM
    • SDDC
    • Administrators
  • Create security groups with the listed security groups as members
    • Windows Servers: vRA-IaaS, vRA-Agents
    • VMware Appliances: PSCs, vCenters , vRA-App, vRB, vRB-Collectors, vDP, vROP, vROPS-Collectors, vRLI, vRLCM

Create Distributed Firewall Rules

  • Networking & Security -> Firewall -> Add Section
    • Name: VMware Management Services
    • Mark for Universal Synchronization
  • Add Rule
    • Name: Allow SSH to admins
    • Source: Administrators
    • Destination: VMware Appliances, UMDS
    • Service: SSH
    • Publish
  • Add Rule
    • Name: Allow SDDC to any
    • Source: SDDC
    • Destination: Any
    • Service: Any
    • Publish
  • Add Rule
    • Name: Allow PSC to admins
    • Source: Administrators
    • Destination: PSCs
    • Service: HTTPS
    • Publish
  • Add Rule
    • Name: Allow SSH to admins
    • Source: Administrators
    • Destination: VMware Appliances, UMDS, VXRM
    • Service: HTTPS
    • Publish
  • Add Rule
    • Name: Allow VAMI to admins
    • Source: Administrators
    • Destination: VMware Appliances
    • Service: TCP:5480
    • Publish
  • Add Rule
    • Name: Allow VxRail UI to admins
    • Source: Administrators
    • Destination: VXRM
    • Service: HTTPS
    • Publish
  • Add Rule
    • Name: Allow vRA Portal to end users
    • Source: Any
    • Destination: vRA-App, vRA-IaaS, vRB
    • Service: HTTP, HTTPS
    • Publish
  • Add Rule
    • Name: Allow vRA Console Proxy to end users
    • Source: Any
    • Destination: vRA-App
    • Service: TCP:8444
    • Publish
  • Add Rule
    • Name: Allow RDP to admins
    • Source: Administrators
    • Destination: Windows Servers
    • Service: RDP
    • Publish
  • Add Rule
    • Name: Allow Orchestrator to admins
    • Source: Administrators
    • Destination: vRA-App
    • Service: TCP:8281,8283
    • Publish
  • Add Rule
    • Name: Allow vRB Data Collector to admins
    • Source: Administrators
    • Destination: vRB-Collectors
    • Service: HTTP, HTTPS
    • Publish
  • Add Rule
    • Name: Allow vROPs to admins
    • Source: Administrators
    • Destination: vROPs, vROPS-Collectors
    • Service: HTTP, HTTPS
    • Publish
  • Add Rule
    • Name: Allow vRLI to admins
    • Source: Administrators
    • Destination: vRLI
    • Service: HTTP, HTTPS
    • Publish
  • Add Rule
    • Name: Allow VDP to administrator
    • Source: Administrators
    • Destination: VMware Appliances
    • Service: TCP:8543
    • Publish
  • Change Rule **
    • Section: Default Section Layer3
    • Action: Block
    • Publish

** Double check your homework before you do this step. If you got missed an earlier step or put in the wrong details for IP Sets and Security Groups could lock yourself out from all of your hard work. Just in case you do get stuck, check out this ProTip https://feardamhan.com/2019/02/04/pro-tip-nsx-distributed-firewall-rule-locked-you-out-of-vcenter/

Deploy Application Virtual Networks

  • Networking & Security -> Logical Switches
    • New Logical Switch
      • Name: Mgmt-CrossRegion-VXLAN
      • Transport Zone: Mgmt Universal Transport Zone
      • Replication Mode:Hybrid
    • New Logical Switch
      • Name: Mgmt-RegionA-VXLAN
      • Transport Zone: Mgmt Universal Transport Zone
      • Replication Mode: Hybrid
    • Logical Switches -> Select Mgmt-CrossRegion-VXLAN -> Actions -> Connect Edge -> Select Mgmt-UDLR -> Next -> Edit NSX Edge Interface
      • Name: Mgmt-CrossRegion-VXLAN
      • Type: Internal
      • Connected To: Mgmt-CrossRegion-VXLAN
      • Connectivity Status: Connected
      • Primary IP Address: [mgmt-udlr-cross-region-vxlan-ip]
      • Subnet Prefix Length: [mgmt-cross-region-vxlan-prefix-length]
      • Finish
    • Logical Switches -> Select Mgmt-RegionA-VXLAN -> Actions -> Connect Edge -> Select Mgmt-UDLR -> Next -> Edit NSX Edge Interface
      • Name: Mgmt-RegionA-VXLAN
      • Type: Internal
      • Connected To: Mgmt-RegionA-VXLAN
      • Connectivity Status: Connected
      • Primary IP Address: [mgmt-udlr-regiona-vxlan-ip]
      • Subnet Prefix Length: [mgmt-regiona-vxlan-prefix-length]
      • Finish
    • MTU for the Logical Switches
      • Networking & Security -> NSX Edges -> Double Click Mgmt-UDLR -> Manage -> Settings -> Interfaces
      • MTU Mgmt-RegionA-VXLAN: 9000
      • MTU Mgmt-CrossRegion-VXLAN: 9000

Deploy the Management NSX Load Balancer

  • Networking & Security -> NSX Edges -> Add
    • Name and Desc
      • Install Type: Edge Services Gateway
      • Name: [mgmt-lb-edgename]
      • Hostname: [mgmt-lb-virutal-fqdn]
      • Deploy NSX Edges: Selected
      • Enable High Availability: Selected
      • Enable HA Logging: INFO
  • Settings
    • User Name: admin
    • Password: [mgmt-nsx-edge-complex-password]
    • Enable SSH access: Selected
    • Enable FIPS Mode: Deselected
    • Enable auto rule generation: Selected
    • Edge Control Level logging: INFO
  • Configure Deployment
    • Appliance Size: Large
    • Cluster/Resource Pool: [mgmt-cluster]
    • Datastore: [mgmt-vsan-datastore]
    • Add two appliances with same settings
  • Configure Interfaces
    • Name: OneArmLB
    • Type: Internal
    • Connected to: Mgmt-CrossRegion-VXLAN
    • Connectivity Status: Connected
    • Primary IP Address : [mgmt-lb-virtual-ip]
    • Subnet Prefix Length: [mgmt-cross-region-vxlan-prefix-length]
    • MTU: 9000
    • Send ICMP Redirect: Selected
  • Firewall and HA
    • Configure Firewall default policy: Selected
    • Default Traffic Policy: Accept
    • Logging: Disable
    • vNIC: Any
    • Declare Dead Time: 15
  • Configure Gateway
    • NSX Edges -> Double Click [mgmt-lb-edgename] -> Manage -> Routing -> Global Configuration -> Edit -> [mgmt-udlr-cross-region-vxlan-ip] -> Publish
  • Enable the Load Balancer
    • NSX Edges -> Double Click [mgmt-lb-edgename] -> Manage -> Load Balancer -> Global Configuration -> Edit -> Enable Load Balancer ->OK

Err….you still with me?

If you got through all of the above and haven’t overdosed on coffee, then kudos to you! You should now have:

  • a load balanced PSC
  • a load balancer for the management components
  • a configured firewall on the Management VxRail
  • a BGP network that looks a little something like the below!

And thats a wrap for the Management VxRail Virtual Infrastructure Implementation. Next up we do the same thing for the Shared Edge / Compute (aka Workload) VxRail.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

Blog at WordPress.com.

Up ↑

%d bloggers like this: