Skip to content

Latest commit

 

History

History

Network Design Guide

Azure VMware Solution Landing Zone Accelerator Network Design Guide

This guide covers network design for Azure VMWare Solution. It encompasses four design areas, summarized below.

  1. Connectivity with on-premises datacenters. Connectivity between Azure VMware Solution private clouds and on-prem sites supports a broad set of use cases, such as HCX migrations, hybrid applications, remote vSphere or NSX-T Data Center administration. Azure VMware Solution supports multiple options for hybrid connectivity, including Azure ExpressRoute circuits and internet-based IPSec VPNs.

  2. Connectivity with Azure Virtual Networks. Azure VMware Solution runs on bare-metal VMware VSphere clusters that can be connected to native Azure Virtual Networks (VNets) through Azure ExpressRoute. ExpressRoute connections between Azure VMware Solution private clouds and Azure VNET enable building applications that span the two environments or using “jump-box” virtual machines in Azure to log into vCenter Server and NSX-T Management console for administration purposes.

  3. Inbound internet connectivity. Inbound internet connectivity enables applications running on Azure VMware Solution to be exposed to the internet behind public IP addresses. Internet-facing applications are almost invariably published through security devices (application delivery controllers, web application firewalls, L3/L4 next-gen firewalls, …). Design decisions about inbound connectivity are primarily driven by the placement of such devices (in Azure VMware Solution or in Azure VNets).

  4. Outbound internet connectivity. Outbound internet connectivity is needed when applications running on Azure VMware Solution require access to public endpoints. Typical use cases include downloading software updates, consuming public web sites or APIs, internet browsing (for example, when Azure VMware Solution is used to run VDI solutions). Azure VMware Solution provides several options to implement outbound internet connectivity, which may or may not rely on Azure native resources. Security requirements (firewalling, forward proxying, …) typically drive design decisions in this area. Azure VMware Solution provides native functionalities to address the most common/basic requirements in each design area, with little or no dependence on customer-managed Azure-native resources. However, in enterprise scenarios, it is common for Azure VMware Solution to be part of a larger infrastructure that includes native Azure IaaS and PaaS services. In such cases, some out-of-the-box connectivity features provided Azure VMware Solution may be replaced by more advanced solutions based on Azure native resources, such as 1st party network services (Azure Firewall, Azure Application Gateway, …) or 3rd party NVAs.

Designing Azure VMware Solution network solutions is a complex endeavor. A solid understanding of Azure VMware Solution networking basics is needed for an effective use of this guide.

Design area prioritization

The four design areas are not independent of each other. Design decisions made for one area may limit the options available in other areas. It is recommended to tackle the four areas in the order they have been introduced in the previous section.

figure1 Figure 1. Design area prioritization recommended in this guide.

As shown in the flow chart of Figure 1, this guide advocates the following approach to network design for Azure VMware Solution.

  1. Design connectivity with on-premises datacenters first. The key decisions for this area are (i) what connectivity service to leverage between on-prem sites and the edge of the Microsoft network (internet vs. Expressroute) and (ii) whether traffic should be routed directly to Azure VMware Solution (recommended) or through virtual devices running in Azure VNets. Read the Design phase #1: Connectivity with on-prem sites article to learn what options Azure VMware Solution supports and how to choose one.

  2. Identify the VNet connectivity option aligned to the design choices made in Phase #1. Determine which additional routing/security configuration may be needed in Azure VNets to incorporate requirements such as firewall inspection for traffic between Azure VMware Solution and Azure native VMs. Read the Design phase #2: Azure VNet connectivity article to learn how design decisions for connectivity with on-prem sites influence the way an Azure VMware Solution private cloud connects to Azure VNets.

  3. Decide how internet-facing applications running on Azure VMware Solution should be published (inbound internet connectivity). Azure VMware Solution allows using Azure Public IPs associated with either virtual appliances running in Azure VMware Solution, or virtual appliances running in an Azure VNet. Both options can be used irrespective of the decisions made for connectivity with on-prem sites and Azure VNets in Phase #1 and Phase #2. Read the Design phase #3: Internet inbound connectivity article to learn what options for inbound internet connectivity Azure VMware Solution supports, and how to choose one.

  4. Decide how Azure VMware Solution workloads will connect to the internet (outbound internet connectivity). This design decision may be constrained by the choices made for outbound internet connectivity (Phase #3). If Azure Public IPs to the NSX-T edge are used for inbound connectivity, then they must be used for outbound connections too. If not, more options exist. Read the Design phase #4: Internet outbound connectivity article to learn about supported options and how to choose one.

Next Steps