Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Table of Contents
Lab Overview - HOL-2082-02-HBD - VMware Cloud Provider Platform - vCloud Director
multisite with NSX............................................................................................................. 2
Lab Guidance .......................................................................................................... 3
Module 1 - vCloud Director and NSX Cross-VDC Networking (60 minutes) ....................... 9
Introduction........................................................................................................... 10
Overview of Cross-vCenter Networking and Security ........................................... 12
vCloud Director Cross-VDC Design with Cross VC NSX.......................................... 19
Conclusion........................................................................................................... 133
HOL-2082-02-HBD Page 1
HOL-2082-02-HBD
Lab Overview -
HOL-2082-02-HBD -
VMware Cloud Provider
Platform - vCloud Director
multisite with NSX
HOL-2082-02-HBD Page 2
HOL-2082-02-HBD
Lab Guidance
Note: It will take around 45-60 minutes to complete this lab.
Lab Abstract: In this lab, we will be reviewing the necessary steps to support Cross-
VDC Networking in MultiSite NSX environment inside of VMware vCloud Director 9.5.
These are fairly straightforward since it aligns to the standard requirements set forth
from Cross-vCenter NSX.
This lab manual can be downloaded from the Hands-on Labs Document site found here:
http://docs.hol.vmware.com
This lab may be available in other languages. To set your language preference and have
a localized manual deployed with your lab, you may utilize this document to help guide
you through the process:
http://docs.hol.vmware.com/announcements/nee-default-language.pdf
HOL-2082-02-HBD Page 3
HOL-2082-02-HBD
1. The area in the RED box contains the Main Console. The Lab Manual is on the tab
to the Right of the Main Console.
2. A particular lab may have additional consoles found on separate tabs in the upper
left. You will be directed to open another specific console if needed.
3. Your lab starts with 90 minutes on the timer. The lab can not be saved. All your
work must be done during the lab session. But you can click the EXTEND to
increase your time. If you are at a VMware event, you can extend your lab time
twice, for up to 30 minutes. Each click gives you an additional 15 minutes.
Outside of VMware events, you can extend your lab time up to 9 hours and 30
minutes. Each click gives you an additional hour.
During this module, you will input text into the Main Console. Besides directly typing it
in, there are two very helpful methods of entering data which make it easier to enter
complex data.
HOL-2082-02-HBD Page 4
HOL-2082-02-HBD
You can also click and drag text and Command Line Interface (CLI) commands directly
from the Lab Manual into the active window in the Main Console.
You can also use the Online International Keyboard found in the Main Console.
1. Click on the Keyboard Icon found on the Windows Quick Launch Task Bar.
HOL-2082-02-HBD Page 5
HOL-2082-02-HBD
In this example, you will use the Online Keyboard to enter the "@" sign used in email
addresses. The "@" sign is Shift-2 on US keyboard layouts.
HOL-2082-02-HBD Page 6
HOL-2082-02-HBD
When you first start your lab, you may notice a watermark on the desktop indicating
that Windows is not activated.
One of the major benefits of virtualization is that virtual machines can be moved and
run on any platform. The Hands-on Labs utilizes this benefit and we are able to run the
labs out of multiple datacenters. However, these datacenters may not have identical
processors, which triggers a Microsoft activation check through the Internet.
Rest assured, VMware and the Hands-on Labs are in full compliance with Microsoft
licensing requirements. The lab that you are using is a self-contained pod and does not
have full access to the Internet, which is required for Windows to verify the activation.
Without full access to the Internet, this automated process fails and you see this
watermark.
HOL-2082-02-HBD Page 7
HOL-2082-02-HBD
Please check to see that your lab is finished all the startup routines and is ready for you
to start. If you see anything other than "Ready", please wait a few minutes. If after 5
minutes your lab has not changed to "Ready", please ask for assistance.
HOL-2082-02-HBD Page 8
HOL-2082-02-HBD
Module 1 - vCloud
Director and NSX Cross-
VDC Networking (60
minutes)
HOL-2082-02-HBD Page 9
HOL-2082-02-HBD
Introduction
This Module contains the following lessons:
• Learn to configure Cross vDC Networking with NSX Multisite inside of VMware
vCloud Director
Thank You!
Special thanks go to Daniel Paluszek, Wissam Mahmassani, and Abhinav Mishra for their
work on building/testing this solution as well as documenting it in a series of videos and
blog posts:
https://blogs.vmware.com/cloudprovider/2018/11/vmware-vcloud-director-9-5-cross-vdc-
networking-blog-series-high-level-provider-design.html
https://www.paluszek.com/wp/2019/01/11/cross-vdc-networking/
https://nsxy.blog/2018/11/01/vcloud-director-cross-vdc-design-with-cross-vc-nsx/
Introduction
HOL-2082-02-HBD Page 10
HOL-2082-02-HBD
In this lab, we will be reviewing the necessary steps to support Cross-VDC Networking
inside of VMware vCloud Director 9.5. The goal of this high-level design is to provide
optimal availability of network services from the Provider and Tenant layer.
HOL-2082-02-HBD Page 11
HOL-2082-02-HBD
Resource Pooling - Logical networking and security across multiple vCenters allow for
the ability to access and pool resources form multiple vCenter domains. Resources are
no longer isolated based on vCenter and/or vCD boundaries which hence allows the
ability to access and pool resources form multiple vCenter domains achieving better
utilization and less idle hosts.
HOL-2082-02-HBD Page 12
HOL-2082-02-HBD
HOL-2082-02-HBD Page 13
HOL-2082-02-HBD
Cross VDC will help tenants and providers to continue operations in case of a partial or
complete network failure. Workloads on Site-A can leverage the Tenant-X-Org-VDC edge
on Site-B in the case where the Tenant-X-Org-VDC Edge fails on Site-A.
HOL-2082-02-HBD Page 14
HOL-2082-02-HBD
NSX Data Center for vSphere allows you to manage multiple environments from a single
primary NSX Manager.
In a cross-vCenter NSX environment, you can have multiple vCenter Servers, each of
which must be paired with its own NSX Manager. One NSX Manager is assigned the role
of primary NSX Manager, and the others are assigned the role of secondary NSX
Manager.
The primary NSX Manager is used to deploy a universal controller cluster that provides
the control plane for the cross-vCenter NSX environment. The secondary NSX Managers
do not have their own controller clusters.
The primary NSX Manager can create universal objects, such as universal logical
switches. These objects are synchronized to the secondary NSX Managers by the NSX
Universal Synchronization Service. You can view these objects from the secondary NSX
Managers, but you cannot edit them there. You must use the primary NSX Manager to
manage universal objects.
HOL-2082-02-HBD Page 15
HOL-2082-02-HBD
On both primary and secondary NSX Managers, you can create objects that are local to
that specific environment, such as logical switches, and logical (distributed) routers.
They exist only within the environment in which they were created. They are not visible
on the other NSX Managers in the cross-vCenter NSX environment.
NSX Managers can be assigned the standalone role. A standalone NSX Manager
manages an environment with a single NSX Manager and single vCenter. A standalone
NSX Manager cannot create universal objects.
Note: If you change the role of a primary NSX Manager to standalone and any
universal objects exist in the NSX environment, the NSX Manager is assigned the
transit role. The universal objects remain, but they cannot be changed, and no other
universal objects can be created. You can delete universal objects from the transit role.
Use the transit role temporarily, for example, when changing which NSX Manager is the
primary.
Each cross-vCenter NSX environment has one universal controller cluster associated
with the primary NSX Manager. Secondary NSX Managers do not have a controller
cluster. As the universal controller cluster is the only controller cluster for the cross-
vCenter NSX environment, it maintains information about universal logical switches
and universal logical routers as well as logical switches and logical routers that are
local to each NSX Manager. In order to avoid any overlap in object IDs, separate ID pools
are maintained for universal objects and local objects.
HOL-2082-02-HBD Page 16
HOL-2082-02-HBD
In a cross-vCenter NSX environment, there can be only one universal transport zone.
The universal transport zone is created on the primary NSX Manager, and is
synchronized to the secondary NSX Managers. Clusters that need to participate in
universal logical networks must be added to the universal transport zone from their
NSX Managers.
Universal logical switches allow layer 2 networks to span multiple sites. When you
create a logical switch in a universal transport zone, you create a universal logical
switch. This switch is available on all clusters in the universal transport zone. The
universal transport zone can include clusters in any vCenter in the cross-vCenter NSX
environment. The segment ID pool is used to assign VNIs to logical switches, and the
universal segment ID pool is used to assign VNIs to universal logical switches. These
pools must not overlap. You must use a universal logical router to route between
universal logical switches. If you need to route between a universal logical switch and a
logical switch, you must use an Edge Services Gateway.
If you do not enable local egress the locale ID is ignored and all ESXi hosts connected
to the universal logical router will receive the same routes. Whether or not to enable
local egress in a cross-vCenter NSX environment is a design consideration, but it is not
required for all cross-vCenter NSX configurations.
HOL-2082-02-HBD Page 17
HOL-2082-02-HBD
HOL-2082-02-HBD Page 18
HOL-2082-02-HBD
HOL-2082-02-HBD Page 19
HOL-2082-02-HBD
HOL-2082-02-HBD Page 20
HOL-2082-02-HBD
HOL-2082-02-HBD Page 21
HOL-2082-02-HBD
HOL-2082-02-HBD Page 22
HOL-2082-02-HBD
HOL-2082-02-HBD Page 23
HOL-2082-02-HBD
HOL-2082-02-HBD Page 24
HOL-2082-02-HBD
HOL-2082-02-HBD Page 25
HOL-2082-02-HBD
1. Click on Controller-1B
2. Click on DELETE
Note: depending on the screen resolution being presented to you via HOL, you may not
be able to see Controller-1B to select it. You may need to go back to the desktop in the
lab and change your resolution to atleast 1280x720 (1280x800 is preferred).
HOL-2082-02-HBD Page 26
HOL-2082-02-HBD
HOL-2082-02-HBD Page 27
HOL-2082-02-HBD
HOL-2082-02-HBD Page 28
HOL-2082-02-HBD
HOL-2082-02-HBD Page 29
HOL-2082-02-HBD
1. Expand ACTIONS
2. Click on Assign Primary Role
HOL-2082-02-HBD Page 30
HOL-2082-02-HBD
1. Expand ACTIONS
2. Click on Add Secondary Manager
HOL-2082-02-HBD Page 31
HOL-2082-02-HBD
HOL-2082-02-HBD Page 32
HOL-2082-02-HBD
HOL-2082-02-HBD Page 33
HOL-2082-02-HBD
Note: In case you see error while adding Secondary NSX manager., please retry. Due
to the nested environment in Hands On Lab, sometimes this error is seen. In should
work seamlessly in production environments.
HOL-2082-02-HBD Page 34
HOL-2082-02-HBD
So far, we've assigned Site-A NSX Manager in Primary Role while linking Site-B NSX
Manager as the secondary instance.
From here, we need to establish Universal Segment ID pool and Transport Zone.
HOL-2082-02-HBD Page 35
HOL-2082-02-HBD
1. Click on ADD
HOL-2082-02-HBD Page 36
HOL-2082-02-HBD
HOL-2082-02-HBD Page 37
HOL-2082-02-HBD
Update Segment ID
HOL-2082-02-HBD Page 38
HOL-2082-02-HBD
HOL-2082-02-HBD Page 39
HOL-2082-02-HBD
HOL-2082-02-HBD Page 40
HOL-2082-02-HBD
HOL-2082-02-HBD Page 41
HOL-2082-02-HBD
In the next few screens, we will go through the steps to assign the correlated NSX
Manager to each vCenter instance that’s participating in the Cross-VDC networking
solution.
1. Click on vCenter vcsa-01a.corp.local (click the name, not the radio button next
to it)
HOL-2082-02-HBD Page 42
HOL-2082-02-HBD
HOL-2082-02-HBD Page 43
HOL-2082-02-HBD
1. Click on EDIT
HOL-2082-02-HBD Page 44
HOL-2082-02-HBD
Hint: you can highlight the bolded text above and drag and drop onto the
respective field in the lab window if you don't want to type it all out.
HOL-2082-02-HBD Page 45
HOL-2082-02-HBD
HOL-2082-02-HBD Page 46
HOL-2082-02-HBD
1. Click on vCenter vcsa-01b.corp.local (click the name, not the radio button)
HOL-2082-02-HBD Page 47
HOL-2082-02-HBD
1. Click on EDIT
HOL-2082-02-HBD Page 48
HOL-2082-02-HBD
HOL-2082-02-HBD Page 49
HOL-2082-02-HBD
HOL-2082-02-HBD Page 50
HOL-2082-02-HBD
HOL-2082-02-HBD Page 51
HOL-2082-02-HBD
HOL-2082-02-HBD Page 52
HOL-2082-02-HBD
HOL-2082-02-HBD Page 53
HOL-2082-02-HBD
HOL-2082-02-HBD Page 54
HOL-2082-02-HBD
1. Select vcsa-01a.corp.local
2. On the right panel, Scroll down to the bottom
HOL-2082-02-HBD Page 55
HOL-2082-02-HBD
HOL-2082-02-HBD Page 56
HOL-2082-02-HBD
HOL-2082-02-HBD Page 57
HOL-2082-02-HBD
1. Click on Finish
HOL-2082-02-HBD Page 58
HOL-2082-02-HBD
This is a very simple process – really just enable it on a per orgVDC basis.
HOL-2082-02-HBD Page 59
HOL-2082-02-HBD
HOL-2082-02-HBD Page 60
HOL-2082-02-HBD
HOL-2082-02-HBD Page 61
HOL-2082-02-HBD
1. Check the checkbox Enable Cross VDC Networking (Using Network Pool
"Universal"
2. Click OK
Next we will create an Edge Services Gateway that we will later use as an egress point.
HOL-2082-02-HBD Page 62
HOL-2082-02-HBD
Open T1-OVDC-A
1. Click on T1-OVDC-A
HOL-2082-02-HBD Page 63
HOL-2082-02-HBD
HOL-2082-02-HBD Page 64
HOL-2082-02-HBD
1. Click Site-A-ExtNet
2. Click Add
3. Click Next
HOL-2082-02-HBD Page 65
HOL-2082-02-HBD
1. Click Site-A-ExtNet
2. Click 192.168.100.1
3. Check the box to use the default gateway for DNS relay (optional)
4. Click Next
HOL-2082-02-HBD Page 66
HOL-2082-02-HBD
HOL-2082-02-HBD Page 67
HOL-2082-02-HBD
HOL-2082-02-HBD Page 68
HOL-2082-02-HBD
HOL-2082-02-HBD Page 69
HOL-2082-02-HBD
HOL-2082-02-HBD Page 70
HOL-2082-02-HBD
HOL-2082-02-HBD Page 71
HOL-2082-02-HBD
1. Select vcsa-01b.corp.local
2. Select NSX Transport Zone: Universal-TZ
3. Click on Next
HOL-2082-02-HBD Page 72
HOL-2082-02-HBD
HOL-2082-02-HBD Page 73
HOL-2082-02-HBD
1. Click on Finish
HOL-2082-02-HBD Page 74
HOL-2082-02-HBD
This is a very simple process – really just enable it on a per orgVDC basis.
HOL-2082-02-HBD Page 75
HOL-2082-02-HBD
HOL-2082-02-HBD Page 76
HOL-2082-02-HBD
1. Check the checkbox Enable Cross VDC Networking (Using Network Pool
"Universal"
2. Click OK
HOL-2082-02-HBD Page 77
HOL-2082-02-HBD
There are specific rights and roles required for Cross-VDC networking that are not
enabled by default for the organization administrator. In the next few screens, we will go
over the roles and permissions that need to be enabled for Cross-VDC Networking.
HOL-2082-02-HBD Page 78
HOL-2082-02-HBD
Click on Default Rights Bundle (you can either click the name or the radio button next
to it)
1. Click on EDIT
HOL-2082-02-HBD Page 79
HOL-2082-02-HBD
HOL-2082-02-HBD Page 80
HOL-2082-02-HBD
1. View
2. Manage Multisite System Operations
3. Manage Edit site
HOL-2082-02-HBD Page 81
HOL-2082-02-HBD
Scroll down to the bottom to add permissions for VDC Group. Check the checkbox to add
permissions
HOL-2082-02-HBD Page 82
HOL-2082-02-HBD
HOL-2082-02-HBD Page 83
HOL-2082-02-HBD
1. Click on SAVE
HOL-2082-02-HBD Page 84
HOL-2082-02-HBD
HOL-2082-02-HBD Page 85
HOL-2082-02-HBD
1. Click on EDIT
HOL-2082-02-HBD Page 86
HOL-2082-02-HBD
HOL-2082-02-HBD Page 87
HOL-2082-02-HBD
1. Expand Multisite
2. Check the checkbox to add permissions to View
3. Check the checkbox to add permissions to Manage Multisite System
Operations
4. Check the checkbox to add permissions to Manage Edit site
HOL-2082-02-HBD Page 88
HOL-2082-02-HBD
1. Scroll down to the bottom to add permissions for VDC Group. Check the checkbox
to add permissions
2. View VDC Group
3. Manage Configure VDC Group
4. Click on SAVE
HOL-2082-02-HBD Page 89
HOL-2082-02-HBD
HOL-2082-02-HBD Page 90
HOL-2082-02-HBD
1. Click on SAVE
HOL-2082-02-HBD Page 91
HOL-2082-02-HBD
HOL-2082-02-HBD Page 92
HOL-2082-02-HBD
1. Click on Organization Administrator (you can click the name or the radio
button next to it)
HOL-2082-02-HBD Page 93
HOL-2082-02-HBD
1. Click on EDIT
HOL-2082-02-HBD Page 94
HOL-2082-02-HBD
1. Expand Multisite
2. Check the checkbox to add permissions to View
3. Check the checkbox to add permissions to Manage Multisite System
Operations
4. Check the checkbox to add permissions to Manage Edit site
HOL-2082-02-HBD Page 95
HOL-2082-02-HBD
HOL-2082-02-HBD Page 96
HOL-2082-02-HBD
1. Click on PUBLISH (you may need to click the radio button next to Organization
Administrator to see the Publish option)
HOL-2082-02-HBD Page 97
HOL-2082-02-HBD
1. Click on SAVE
HOL-2082-02-HBD Page 98
HOL-2082-02-HBD
HOL-2082-02-HBD Page 99
HOL-2082-02-HBD
1. Click on EDIT
1. Expand Multisite
2. Check the checkbox to add permissions to View
3. Check the checkbox to add permissions to Manage Multisite System
Operations
4. Check the checkbox to add permissions to Manage Edit site
1. Click on PUBLISH (you may need to click the radio button next to Organization
Administrator to see the Publish option)
1. Click on SAVE
1. Click the Command & Control button in the upper right-hand corner of the
browser window
2. Select New incognito window
1. Click on the RegionA folder in the bookmarks bar and select vCD SiteA -
Tenant1
2. Username: t1admin
3. Password: VMware1!
4. Click Login
Go to Multisite section
Note: if you get a warning asking if you want to keep the file, click Keep
Note: if you get a warning asking if you want to keep the file, click Keep
4. Click Next
5. Click Submit
6. Click Finish
4. Click Next
5. Click Submit
6. Click Finish
Datacenters
Note that you can group from 2-4 sites together to form a datacenter group. In this lab,
we only have two.
1. Click Details
Network Topology
Notice the simple network diagram between the two sites. Also notice the warning that
there is no external connectivity. We need to add an Egress Point for the Datacenter
Group to be able to communicate with external resources.
Note: it may take a few minutes for the Add Egress Point option to show up (after the
Create VDC Group task completes)
You should see the Edge Services Gateway you configured earlier.
It will take a few minutes to configure the new Egress Point. When it is complete, the
Network Topology will be visible. Notice the new network topology shows the Edge
Services Gateway as the Egress Point for the Datacenter Group. Next we will create a
Stretched Network so VMs in either site can communicate with Layer 2 adjacency.
1. Click ADD
2. Give the network a name, for eg: StretchNet
3. Add the gateway in CIDR format: 192.168.130.1/24
4. Click CREATE
Go to Datacenters
View Networks
1. Click on Networks
Notice that the Stretched Network is now visible. You can now connect VM NICS to this
network from any site in the Datacenter Group and they will be on the same stretched
VXLAN.
Conclusion
Congratulations!! You just finished going through the concepts and step-by-
step to configure Cross-VDC Networking with Multisite NSX inside of VMware
vCloud Director.
Conclusion
Thank you for participating in the VMware Hands-on Labs. Be sure to visit
http://hol.vmware.com/ to continue your lab experience online.
Version: 20191021-190326