Episode 13 - Revolutionizing Networking with VCD 10.5: Deep Dive into NSX and Upcoming Events

Ready to revolutionize your networking game? We've got a phenomenal session in store that's chock-full of insights on the incredible new networking features of VCD 10.5. From the NSX Federation and self-service HTTP policies for tenants to the magic of NSX Advanced Load Balancer, this episode is a treasure trove of networking knowledge. We'll also talk about the support for up to four NSX manager instances in a single virtual data center group, and what it means for you. Plus, we'll discuss upcoming conferences such as VMware Explorer and how you can connect with us there.But that's not all. We've taken a deep dive into the world of NSX, discussing the boons of stateless T0 and how it can be configured in an active-active manner. We also explore the limitations of configuring a NAT rule and why the NSX V2T migration is so critical. We wrap up with a sneak peek into our forthcoming sessions featuring Sascha's take on CSE, Tanzu, and their integrations, and Alain's special on Showback, Chargeback, Aria Operations. This episode is a must-listen for all network professionals and tech enthusiasts. Listen in, and elevate your networking know-how to new heights!

Speaker 1: Hello and welcome to
another episode of the VCD

Roundtable. After our last
episode, where we covered

everything new around VCD 10.5,
today's session is exclusively

around VCD and networking and
all the new good and fancy

features we get with version
10.5 and some of the features

which came before and which we
just wanted to recap a bit and

talk a bit about Before we get
started. A reminder VCD not VCD

VMware Explorer is just around
the corner, in a few weeks in

Las Vegas and then a couple of
months back in Barcelona. We'd

like to meet up with everybody,
so reach out to us on social

media and then we can see what
we can do at one of these

conferences to get together.
With that being said, who's on

the session today? Let me get
started with myself. I know

that's not how you should do it,
but it's the easiest way around

. My name is Steve Sanford. I'm
CEO of the Common Division Group

, one of the lead architects
around anything, service

provider and cloud director in
our team. I'm more focused on

the business side how we do
product packaging and a bunch of

other things, but also when it
comes to, let's say, the more

legacy designs. With that being
said, I'm handing over to Sascha

for his introduction for today
Hi my name is Sascha Schwung.

Speaker 2: I'm a partner and
cloud architect at Common

Division doing a lot of stuff
about architecture of cloud,

director environments,
Greenfield, V2T, migrations and

also the Tanzu stuff. So
container service extension and

so on. I will hand over to Tobi.

Speaker 3: My name is Tobi
Barschek. I'm a solution

architect and partner at Common
Division main focus on the whole

networking story. So Steven,
nsx, nsx-lb, but also, on the

other hand, the whole cloud
director story and I would like

to hand over to Matthias.

Speaker 4: Hi, I'm Matthias
partner, common Division cloud

architect, focusing on VCD, nsx
and the automation around those

products. I love that one legacy
architecture. If you believe

that VCD-1.5, I go to Inkvines.
Don't worry, joach, please

continue yeah.

Speaker 5: I'm not zero. Oh my
that old. I'm Joach Leib. I'm a

technical product manager at
VMware, covering cloud director

and all the different
integrations and extensions that

we have, and with that back to
you.

Speaker 1: Yves, good, yeah. So
VCD since version 1.0, I

remember the early, early, early
, early, early days. Back then

we thought it's the perfect tool
for enterprises and commercial.

Now we think it's the perfect
tool for the first providers and

we try to get away from the
other ones, but they'll still

think it's a mistake. But
anyways, nevertheless, let's

talk about the networking pieces
of NSX-10.5. And let me just

throw out one of the items which
we started to cover already in

the 10.5 what's New session the
NSX Federation piece and VDC

groups and everything else. So
who's going to pick up that

topic to be first? Because I
guess it's better that I'm not

talking about that one.

Speaker 3: Yeah, and I will
start. So we have now, finally,

the whole support for NSX
Federation. So what does this

mean? On one hand, we have now
the ability to import more than

one NSX manager into our VCD
environment, what is not really

100% true, because at the end,
we need to have the whole

Federation configured outside of
our cloud director environment

and then we need just to import
the global Federation manager

node to our VCD and VCD will now
be able to discover hey, okay,

this is a federated environment
and he can then utilize the NSX

Federation environment in his
data center groups. And this is

already one important part of
what we need. To be fair, we

need it mainly since NSX T or
now the final name is just NSX4

is there to be able to utilize
the distributed firewall and

stuff like this. So we need to
go with a clear data center

group, absolutely independent if
we just have one or VDC or if

we have multiple organization.
Virtual data centers. Federation

also is only supported If we
have the ability to utilize data

center groups and NSX
Federation. There is one

limitation that's called
limitation we can only have at

the moment. We can only have up
to four NSX manager instances in

a single virtual data center
group, which means more than

four locations with different
managed by dedicated NSX

environments, are currently not
supported inside Cloud Director.

I'm not really have the limit
out of my head what is supported

from an NSX team perspective,
but I have something in mind up

to eight, I think up to eight
environments are currently

supported in Federation from an
NSX point of view. From a Cloud

Director point of view, in a
single organization, we see we

can have up to four NSX manager
instances. So we have now a

clear possibility to really
support availability groups

fully separated, not what we
have done mainly in the past,

saying okay, we have our regions
and we have our availability

zones, but at the end we have
just a single NSX environment

stretched across the regions,
stretched across availability

zones. We can now really have
dedicated environments in each

region, each availability zone,
and then have the global NSX

Federation supported inside
Cloud Director. So that's the

starting point and, from my
perspective, one of the biggest

improvements regarding the whole
networking story in 10.5.

Sarsha, would you like to add
something?

Speaker 2: No, I think yeah,
federation use that, all about

it and it will become very
interesting for most of the

customers. I want to add the
parts that NSX Advanced Load

Balancer. So now with 10.5, we
have the self-service HTTP

policies so that tenants or
customers can manage their own

policies. So with the starting
of NSX ALB we had it still as a

provider managed service so the
provider can configure all the

HTTP policies, but now with 10.5
, all tenants are able to

configure their own HTTP
policies over Cloud Director and

I think that is a very
important part in the first step

to really use the load balancer
with more features than only

load balancing. Though that was
a big question in the last

months from customers and
service providers, because many

service providers said I don't
want to manage this for the

customers or I'm not able to
manage all of this for the

customers, and now we have it
that the customer can do it by

self-service and from my
perspective, that is the first

step in the right direction to
give the customers more options

to configure their load
balancers and I hope there will

become more features added to
the self-service over Cloud

Director from NSX ALB.

Speaker 4: Yes, maybe coming
back a little bit on this

exploration, because what Toby
mentioned is the whole story

about availability zones and if
you have a federated

infrastructure, from my
perspective the combination with

VCDA enables customers or
tenants to build a new product.

I can build my own self-service
asynchronous replication from

one availability zone to another
without re-IPing my systems if

I need to start to fail over and
stuff. I think that's an

interesting new approach,
especially for service providers

, and repackage or provide new
products to their customers. So

I think that kind of business
thinking will change products we

will see provided by SAPs in
the future. Yeah, in terms of

additional features in the
networking space, I would like

to go the firewall part, because
what many tenants or what

service providers told me what
many tenants are asking for? How

can I add an IP address into a
firewall rule as a source or

destination? So in the good old
days it was not possible because

you just had to add the IP
address into a group and so on

and so forth. Now with TEN5 and
the new UI, we have the ability

to add individual IP addresses
as a source and or destination

into a firewall rule and I think
that's a really nice

improvement enabling tenants
creating more granular firewall

rules to improve their security.
I think that adds a lot of

easier management of firewall
rules sets.

Speaker 5: Yeah, there are some
additional improvements in the

firewall UI. That's something
where we get a lot of feedback,

of course, from partners,
service provider partners and

their customers. So, for example
, it's easier to order specific

rules in the firewall UI now,
and just that handling gets

better and better and there's
also one pretty huge improvement

for when it comes to the
firewall rules. So from a VCD

product perspective, we are of
course working very closely with

the NSX team to in future adopt
the tenancy capabilities or the

NSX projects concept to map
them to tenants in Cloud

Director, but that will take
another couple of versions to be

released. So until then in past
it was very hard to create some

specific logging mechanisms or
dashboards for, especially for

the firewall. Now, with VCD 10.5
, we introduced some logging ID

for a firewall rule that maps to
the rule ID in NSX and that now

allows to really have some
tenant specific information in

each log message that comes from
the firewall and with that you

can use your favorite logging
analyzer tool that you want to

create some filters or
dashboards to really to create

some log lists just for firewall
rules of a specific tenant

Really powerful and very, very
often requested feature.

Speaker 4: The last step would
be having a multi-tenant locking

infrastructure. That would be
awesome, but you can still have

one instance per tenant. That
works perfectly fine.

Speaker 1: Good IP spaces. Who
wants to cover IP spaces and the

news around that one?

Speaker 4: Yes. So the news
around IP spaces is mainly the

migration UI wizard enabling the
service provider to migrate the

provider gateway, configured IP
ranges or assigned IP addresses

into the new IP space mechanism
. So that's the enhancement in

10.5. Again, ip spaces. What is
possible to do with IP spaces?

Pretty short, the service
provider configures IP ranges

which can be requested by
tenants as floating IP addresses

for their needs. Like I would
like to instantiate a new

service, I need a new public IP
address. I can just request one

floating IP address or I can
just subnet certain ranges and

enable customers to request IP
ranges within their own cloud

directory UI. In the past, if a
tenant needed a new IP address

or a new IP range like it's
either public or private I

always had to discuss with my
service provider please assign

an IP address or please assign
an IP range, which costs. Like

you need to open a ticket
additional work, someone has to

do it, work on the ticket. So it
was a pretty lengthy process.

And now, if the tenant needs an
additional IP address, just

click request new and use it.
And, as Fabian would like to say

, kachin, right, with the usage
meter. You just charge for the

public IP address or even an IP
range. I think that's pretty

cool. That's the whole story
around IP spaces. I can just say

please use it. They are an
awesome feature from my

perspective. And now with 10.5,
just use the UI wizard and

migrate over your legacy stuff
or your legacy IP management

within VCD to the new IP spaces
environment.

Speaker 5: Also be aware that
the latest version of the

Terraform provider now supports
IP spaces, so that you can

automate them through the
Terraform infrastructure as code

concept.

Speaker 4: Yeah, thanks for that
.

Speaker 1: Good, so BGP is
another topic. We wanted to

cover some of the BGP changes.

Speaker 4: Yeah, so BGP? The big
enhancements from my

perspective in BGP is just the
ability to manage route maps and

community lists from the VCD UI
. In the past those BGP features

provided by the ZX were
consumed as a managed service.

That's the nice term, for the
service provider configures the

stuff, or as Eve refers to it,
as fully featured API

integration. Now we can use
those two additional tabs to

consume or to configure route
maps and community lists from

the Cloud Director UI. Do we
have anything to add on that?

Speaker 3: Yes, just a small
limitation at the moment,

because we should really have
this in mind. What Matthias

mentioned absolutely correctly,
but please have in mind, only on

provider managed gatevisper. At
the moment this IP spaces, as

mentioned before, ip as a
service. We should change to IP

spaces. Then we have now the
capability inside Cloud Director

, on a provider managed gateway,
that or on a provider gateway,

not on a provider managed
gateway on a provider gateway

with BGP enabled, that we can
configure all of the enhanced

BGP stuff directly in the Cloud
Director UI.

Speaker 4: You mean a dedicated
gateway? Yes, all right. I think

that's mainly covering the BGP
part. If you have a dedicated

provider gateway or dedicated T0
, you have the BGP enabled

within the VCD UI. With 10.5,
you have two additional tabs One

is a community list and the
other one is a roadmap.

Speaker 1: Good what I still
have on my list. I mean, I know

you covered already quite a bit
of the firewall rules, Matthias,

and you also already have not
one of us to ensure the

auto-configured nut rules.

Speaker 4: So I haven't
mentioned those. So what is

about the auto rules? You can,
if you enable it, and of course

you need to have to use IP
spaces, otherwise it's not

working. You can enable the
automated rule configuration for

NAT rules like source and
destination NAT on edge gateways

and provider gateways within
the environment. That's the

whole idea with it, because you
can enable those rules to

automatically configure NATing
based on external and internal

scopes. That's the idea behind
that. In the past you had to do

it manually, especially the no
NAT rules, the no NAT rules,

yeah.

Speaker 2: If you mentioned the
part with the firewall rules UI

that we can now add source and
destination IP ranges directly

in the firewall rules and don't
need to specify IP sets before.

So, yeah, many times we created
firewall rules and need to go

back to create an IP space for
that. So that's a really good

improvement of the firewall
rules UI in 10.05 from my

perspective.

Speaker 1: The other thing which
I had on my list for today's

session, and again, I'm not sure
if we want to cover all the

networking pieces, but someone
added to the list stateless T0.

Why and how?

Speaker 3: I think it was Sasha
and myself. So, sasha, it's now

your part.

Speaker 2: You can talk better
about that. We have another part

. Later on we will talk about
V2T migration. What have you

said?

Speaker 3: What's the idea
behind? So in the past, it was

always only possible if you go
with the T0 active standby

configuration to utilize NAT
configuration on your T0 gateway

. This is since the release of
NSX4, which is the new name of

NSXT or the final name of NSXT,
whatever you would like to call

it we have now the possibility
to utilize or to configure

stateful and stateless NAT
directly on our T0 gateway, also

in an active-active manner. So
we don't need to reconfigure our

T0 gateway to an active standby
. We can leave it in a negative

configuration but still have the
capability of utilizing NAT on

one hand and on the other hand
and that's from my perspective,

the more or the better
improvement is also that we have

now the capability of utilizing
proxy app and this is what

Sasha will cover from the
migration perspective that we

now can also utilize proxy app
on an active-active

configuration. So this is the
improvement from an NSX

perspective and before I hand
over to Sasha, I would like to

add a big limitation I
discovered last week and this is

also not 100%, not related to
Cloud Director, because this is,

from my perspective and big
issue and I would already call

it a bug inside NSX if you
create a NAT rule. I'm really

talking now about the NAT rule
because it is possible in the

firewall rules, but it is not
possible in a NAT rule. If you

would like to configure NAT rule
, let's, for example, go with

passive FTP or passive FTP and
you would like to open a port

range in your NAT rule, saying,
hey, I would like to have from

50,000 up to 51,000, all of the
ports open and I would like to

create a single NAT rule, which
is possible in, or was possible

in, nsxv. This is not possible
at the moment in NSXT. So if you

would like to open, for example
, 1000 ports for your passive

FTP, at the moment you need to
create 1000 NAT rules not an

ideal solution. So now I'm
finished. I would like to hand

over to Sasha.

Speaker 4: Just one thing behind
that headline, because on top

in NSXV I have the ability to
migrate a stateful T0 into a

stateless T0, which enables
certain features within NSX,

like also firewall and stuff
like this. Guys, you need to be

careful because the T0 is always
provider managed, keep that in

mind. And the stateless T0
always requires stateless T1. So

the question is, and we need to
figure out, what if I import a

stateless T0 into VCD and then
create an edge gateway, because

that's a T1 behind the T0. So
it's not pretty clear within the

release notes and, just being
honest, we don't know what the

real behavior will be. Maybe
Yerke has a few insights, maybe

yes, maybe no. So be careful
with the whole stateless T0

story. If you want to use
stateless T0 and all these

features, you need to have a
stateless T1 behind that. So

currently we suggest please
import the segments as external

networks and provide those to
the customer. The whole network

stack needs to be consumed as a
managed service from a tenant

perspective. Be careful with
those configurations. And last

but not least, stateless T0 is a
one-way ticket to help. If you

migrate a stateful T0 into a
stateless, it remains a

stateless. There is no way back
except of delete stuff, but if

you use Terraform that's pretty
fastly done. Remove and rebuild

objects. All right, sachin,
that's your turn.

Speaker 2: Yeah. So I want to
say, with the proxy app, that's

very important for the NSX V2T
migrations, so we don't have to

go with an active, passive T0.
And that is a big benefit now

for the upcoming NSX V2T
migrations though, that we can

work with active, active T0s
there. And, yeah, we are still

doing a lot of V2T migrations.
And I think, yeah, we have the

migration tool. We currently
have support with the migration

tool. We heard that there is
something with the migration

tool in the future that will
become out of support, so that

we have no longer support for
the migration tool. So I want to

say it's very important to
start latest now to do your NSX

V2T migration. That is a very
important part that we can do

the migration with the full
support of VMware, with the

migration tool.

Speaker 4: So the proxy app
Sacha just to add a bit more

precision to the phrasing proxy
app is available on an active

active state for T0. T0, yeah.
So because we now need to be

very precisely on the phrasing,
because that not anybody thinks

like, oh, I need to use a T0
stateless for proxy app, which

might not be ideal because it's
again a one-by-tick to hell.

Speaker 3: And also one last
thing, because this was

something Sacha and I discussed
last time. Yes, you can

reconfigure an active standby T0
gateway to an active active T0.

But please have in mind that
you need to disconnect all of

your tier one gateways, so this
is nothing which can be done

quickly in place. So you need to
have a maintenance window where

all of the tier one gateways
gets disconnected. Then you can

reconfigure your tier zero and
reattach your tier one gateways.

Speaker 4: But that's just a
minor impact. All right, cool. I

think that's a bit summing up
the whole networking space. A

lot of cool features, especially
in terms of new stuff in

security, logging, monitoring,
ip spaces. But again, we added a

lot of topics to the how do we
call it? A managed service

consumption of certain
networking features. So again,

always keep in mind what can be
done from a tenant perspective,

what needs to be consumed as a
fully managed service and create

new product packaging using the
new NSX Federation and create

availability so that they will
customers to migrate workloads

and create their own HA
solutions within your own SP

space. So, summing up, I assume
famous last words, some closing

statements. Maybe, europe, you
want to start.

Speaker 5: Yeah, very happy
about the finally improvements

in the firewall UI because that
has been a lot of feedback that

we got over the last couple of
months, so happy to get that in,

toby.

Speaker 3: Yeah, also thanks for
your attention and, on the

other hand, more than happy that
more and more of the networking

story becomes now part of Cloud
Director or inside the Cloud

Director UI. So let's see what
will come in the future. Sosha.

Speaker 2: Yeah, thank you for
joining us and we'll be happy to

join you or meet you in Las
Vegas. Reach out to us and let's

have a meeting in Vegas.

Speaker 1: Was. That being said,
I think nothing else for me to

add. Again, would love to
welcome most of you in Vegas for

individual sessions, meetings,
et cetera. I think we covered

quite a bit on the networking
piece. Just to give you a bit of

a heads up, in one of our next
episodes Sosha is going to cover

a lot more around CSE, tanzu
and those integrations, and we

will also do a little special
special with Alain from our team

who is going to cover more on
Showbag, chargebag, aria

operations, integration and a
lot of these different things,

and so we have already quite a
few topics lined up for some of

the next sessions. Looking
forward to it and, with that

being said, goodbye and hope to
see you all in Vegas in a few

days.

Creators and Guests

Matthias Eisner
Host
Matthias Eisner
VCI, VCP 3-6, VCP6-Cloud, VCP-NV, VCAP4-6-DCA, VCAP4-6-DCD, VCIX-NV, VMware Enthusiast, I love vRA, vCD, vRO, NSX and vR Ops; vExpert DCV, NSX & Cloud
Yves Sandfort
Host
Yves Sandfort
Yves Sandfort - VMware cloud and infrastructure architect and evangelist, CEO comdivision group. VCDX-CMA,VCIX-CMA, VCIX-DCV, vExpert, Nutanix NTC, pilot
Episode 13 - Revolutionizing Networking with VCD 10.5: Deep Dive into NSX and Upcoming Events
Broadcast by