Deploy and use standalone edge for VPN L2 in VMC.

For VMC you can create one VPN Layer 2.

There are 3 ways to configure L2 by deploying appropriate appliances:

  • Deploy autonomous edge
  • Deploy HCX L2 extensions
  • Deploy standalone edge

Autonomous edge:

It is quite easy when you are using the NSX Autonomous edge. There are several well described steps how to deploy and configure (using web interface) this appliance.

From VPN -> layer 2 blade you can find link to VMware autonomous edge appliances:

Downloaded image should have the nsx-autonomous-edge-ovf-XXXX name. 

Compatibility can be found:

https://docs.vmware.com/en/VMware-Cloud-on-AWS/services/com.vmware.vmc-aws.networking-security/GUID-ACC0D32B-F8A6-4D64-84C2-B3CF72508507.html

Good example on how to install and configure autonomous edge you can find here: https://davidwzhang.com/2020/02/24/setting-up-l2vpn-in-vmc-on-aws/

 Benefits:

  • Easy to deploy and configure
  • Fast start after failure
  • Stable
  • No need to have distributed switches in on-prem environment

Disadvantages:

  • Limitation to 8 extended network
  • Just one L2VPN can be set up

HCX L2 extension:

Similarly to the above, HCX can be deployed and configured in a quite straightforward way. You need to fulfill all the requirements described here: 

Benefits:

  • Advanced network technologies used by that appliance (to optimize network traffic)
  • Nice boundled in HCX as part of implementation
  • Stable
  • Can be restarted in a few second on another ESXi node in case of node failure
  • Many appliances can be deployed (on both sides – on-prem and in VMC)

Disadvantages:

  • Distributed switches are needed
  • HCX appliances need some resources (usually it is not an issue, but need to be calculated before implementation)

NSX L2 edge:

Search for the newest NSX-l2t-client-large image and download it.

Deploy the OVF template as usual:

Pay attention to IP address (should be the same as the uplink interface and “Remote Private IP” in console.cloud.vmware.com VPN blade. 

Peer Address and peer code should be also readed from the VPN blade (and configuration file).

Be sure that the values are set correctly.

There is another option you can set: “Enable TCP Loose settings”. This option is important if you want to keep your connection after the system has been migrated to VMC.

Also set HA Index to 0 (or other appropriate value).

After deployment you can login to the appliance and start ssh by:

Above VTI is one configured during appliance installation (and configuration wizard).

After a while (couple of minutes) the tunnel should be in up state:

Also from appliance the tunnel should be visible:

To add an additional vlan:segment pair you can add in the following way:

command : sub-interface pairs VLAN:segment.

Following command can be useful:

  • enable / conf t
  • show sub-interface
  • Configure set of pairs: for i in {100..115}; do echo sub-interface pairs $i:$i; done
  • Remove sub-interface: no sub-interface pairs vlan:tunnel_id

 Benefits:

  • Easy to deploy and configure
  • Fast start after failure
  • Stable
  • No need to have distributed switches in on-prem environment

Disadvantages:

  • Not as easy to configure as autonomous edge
  • Just one L2VPN can be set up
  • Potential problem with support (needs to be verified if it is still supported by VMware)
No Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

VMware
VCF, backup configuration

Backup implementation for VMware component is fairly easy. Just the requirements is to configure SFTP server in proper way and make it network available to the VMware components. SDDC Manager and NSX Manager backup In VCF Operations it is possible to configure backup for SDDC Manager and NSX Manager. Go …

VMware
VCF Automation, fresh environment configuration with identity providers and access control.

Introduction Login Login as user admin to the Organization name: system or if selected manual: Check the connections (in Administration section), where you should see connection to the vCenter and NSX-t manager as those are provided automatically via VCF Operations: the same for VCF Instances: Also check your networking: Identity …

VMware
VCF SoS

SoS (Supportability and Serviceability) command can be used for troubleshooting purpose to generate VCF (per component) log bundle, massively enable/disable ssh service on ESXi, vCenter, password and certificates expiry status, verify cluster health and many other. while troubleshooting, the following commands can be helpful: