Plan network topology for Azure VMware Solution deployment

Completed

Azure VMware Solution provides a private cloud environment you can access from both on-premises and Azure-based environments or resources. The next step in Azure VMware Solution deployment involves a plan for network topology.

The Azure VMware Solution environment in Azure needs to pass network traffic to Azure services and on-premises VMware environments. A dedicated Azure ExpressRoute circuit provides connectivity to Azure resources and services from Azure VMware Solution. A separate, customer-provided Azure ExpressRoute circuit provides connectivity to on-premises VMware environments. To accomplish network connectivity, specific IP address ranges and firewall ports must be enabled. When Azure VMware Solution is deployed, private networks are created for the following vSphere components:

  • Management
  • Provisioning
  • VMware vMotion

You use these private networks to access vCenter Server, NSX Manager, and vMotion.

IP segments

IP addressing must be planned out before the Azure VMware Solution private cloud deployment. The service requires a /22 CIDR network address block that you provide. The /22 CIDR is required for the management components of Azure VMware Solution. Workload segments, on which virtual machines (VMs) are deployed, will have a different IP address range. You can do that by creating network segments within NSX Manager.

The management CIDR is automatically carved up in smaller segments. Those IP segments are used for vCenter Server, VMware HCX, NSX, and VMware vMotion. Azure VMware Solution, your existing Azure environment, and your on-premises environment will need to exchange routes to migrate VMs into Azure. The /22 CIDR network address block you define must not overlap with network address blocks already configured on-premises or in Azure.

A VM IP segment must be built to create the first NSX segment in the Azure VMware Solution private cloud. The VM IP segment allows for deployment of VMs onto Azure VMware Solution. Optionally, network segments can be extended from an on-premises VMware environment to Azure VMware Solution using VMware HCX Layer 2 Network Extension. On-premises networks must connect to a vSphere Distributed Switch (vDS) because vSphere Standard Switches can't be extended using VMware HCX.

Example subnet breakdown

The following table shows an example of how the /22 CIDR network address block (10.5.0.0/22 in this example) is carved into different IP segments:

Network usage Subnet Example
Private cloud management /26 10.5.0.0/26
HCX migrations /26 10.5.0.64/26
Global Reach reserved /26 10.5.0.128/26
ExpressRoute reserved /27 10.5.0.192/27
ExpressRoute peering /27 10.5.0.224/27
ESXi management /25 10.5.1.0/25
vMotion network /25 10.5.1.128/25
Replication network /25 10.5.2.0/25
vSAN /25 10.5.2.128/25
HCX uplink /26 10.5.3.0/26
Reserved 3 /26 blocks 10.5.3.64/26, 10.5.3.128/26, 10.5.3.192/26

Azure VMware Solution network connectivity

After deploying Azure VMware Solution, establishing network connectivity becomes the next step for a successful deployment.

The Azure VMware Solution private cloud is deployed on dedicated bare-metal servers that are exclusively assigned to a single customer. To use Azure resources, these servers need to connect to the Azure network backbone. The Azure VMware Solution provides an Azure ExpressRoute circuit that allows communication between the Azure VMware Solution private cloud and Azure services. To connect with on-premises environment via ExpressRoute, you can configure ExpressRoute Global Reach to your existing ExpressRoute circuit.

ExpressRoute and routing requirements

There are two types of interconnectivity for Azure VMware Solution:

  • Basic Azure-only interconnectivity: Azure VMware Solution connects to an Azure virtual network by using an ExpressRoute connection that deploys with the resource. The Azure VMware Solution-provided ExpressRoute circuit establishes connectivity to and from the Azure VMware Solution private cloud for other Azure services, like Azure Monitor and Microsoft Defender for Cloud.
  • Full on-premises to private cloud interconnectivity: This connectivity model extends the basic interconnectivity implementation to include interconnectivity between on-premises and Azure VMware Solution private clouds. You can configure this connection via a customer-provided ExpressRoute circuit, among other methods. You can use an existing circuit or purchase a new one.

ExpressRoute Global Reach serves as the default choice for hybrid connectivity in Azure VMware Solution. However, there are scenarios where Global Reach might not be applicable – either due to its unavailability in your region or specific network or security requirements that cannot be met by Global Reach. In such cases, you can consider transiting data over ExpressRoute Private Peering, or using IPSec VPN.

The customer-provided ExpressRoute circuit isn't a part of the Azure VMware Solution private cloud deployment.

Prerequisites for ExpressRoute Global Reach

There are a few prerequisites before you configure ExpressRoute Global Reach.

  • A separate, customer-provided ExpressRoute circuit is required. This circuit is used to connect on-premises environments to Azure.
  • All gateways, including the ExpressRoute provider's service, must support 4-byte Autonomous System Numbers (ASNs). Azure VMware Solution uses 4-byte public ASNs for advertising network routes.

Required network ports

If on-premises network infrastructure is restrictive, the following ports must be allowed:

Source Destination Protocol Port
Azure VMware Solution private cloud DNS server On-premises DNS server UDP 53
On-premises DNS server Azure VMware Solution DNS server UDP 53
On-premises network Azure VMware Solution vCenter Server TCP (HTTP/HTTPS) 80, 443
Azure VMware Solution private cloud management network On-premises Active Directory TCP 389/636
Azure VMware Solution private cloud management network On-premises Active Directory Global Catalog TCP 3268/3269
On-premises network HCX Cloud Manager TCP (HTTPS) 9443
On-premises Admin Network HCX Cloud Manager SSH 22
HCX Manager Interconnect (HCX-IX) TCP (HTTPS) 8123
HCX Manager Interconnect (HCX-IX), Network Extension (HCX-NE) TCP (HTTPS) 9443
Interconnect (HCX-IX) Layer 2 connectivity TCP (HTTPS) 443
HCX Manager, Interconnect (HCX-IX) ESXi Hosts TCP 80, 443, 902
Interconnect (HCX-IX), Network Extension (HCX-NE) at Source Interconnect (HCX-IX), Network Extension (HCX-NE) at Destination UDP 4500
On-premises Interconnect (HCX-IX) Cloud Interconnect (HCX-IX) UDP 500
On-premises vCenter Server network Azure VMware Solution management network TCP 8000
HCX Connector connector.hcx.vmware.com hybridity.depot.vmware.com TCP 443

DHCP and DNS resolution considerations

Virtual machines (VMs) running in Azure VMware Solution require name resolution. VMs might also need DHCP services for lookup and IP-address assignments. You can configure an on-premises VM or an Azure VM to facilitate name resolution. You can use the DHCP service built into NSX or you can choose to use a local DHCP server in the Azure VMware Solution private cloud. Configuring DHCP in Azure VMware Solution won't require routing broadcasts of DHCP traffic over the WAN back to the on-premises environment.

In the next unit, we'll go through the deployment of Azure VMware Solution. We outline all the steps so you can deploy the service in your environment.