Nutanix Flow Virtual Networking Guide v6 0 0
Nutanix Flow Virtual Networking Guide v6 0 0
Purpose.............................................................................................................. 5
Related Documentation.................................................................................... 6
ii
Network Load Balancer............................................................................................................... 66
Traffic Mirroring............................................................................................................................ 79
Floating IPs.............................................................................................................................................. 79
Floating IPs Summary View........................................................................................................ 80
Connectivity............................................................................................................................................. 81
Gateways Summary View............................................................................................................ 81
Gateway Details View...................................................................................................................82
VPN Connections Summary View.............................................................................................. 84
VPN Connection Details View..................................................................................................... 86
Subnet Extensions Summary View............................................................................................ 88
Subnet Extension Details View...................................................................................................90
BGP Sessions Summary View.................................................................................................... 92
BGP Session Details View...........................................................................................................94
Security Policies......................................................................................................................................96
Security Dashboard.................................................................................................................................96
Connections Management............................................................................136
Network Gateway Management........................................................................................................... 136
NAT and No-NAT Gateway Scaleout........................................................................................ 136
Creating a Network Gateway.....................................................................................................138
Updating a Network Gateway....................................................................................................144
Deleting a Network Gateway..................................................................................................... 145
iii
Virtual Private Network Connections.................................................................................................. 145
VPN Workflow............................................................................................................................. 146
Prerequisites for VPN Configurations......................................................................................147
Creating a VPN Connection...................................................................................................... 149
Updating VPN Connection.........................................................................................................151
Deleting a VPN Connection.......................................................................................................151
VPN Connection within Same Prism Central.......................................................................... 151
Layer 2 Network Extension.................................................................................................................. 153
Layer 2 Network Extension Over VPN..................................................................................... 155
Layer 2 Network Extension Over VTEP................................................................................... 160
PBR-based Tromboning in L2 Extended Subnet.................................................................... 168
Updating an Extended Subnet.................................................................................................. 170
Removing an Extended Subnet................................................................................................ 170
Border Gateway Protocol Sessions.................................................................................................... 171
Creating a BGP session............................................................................................................ 172
Updating a BGP session........................................................................................................... 175
Deleting a BGP session.............................................................................................................176
Copyright........................................................................................................177
PURPOSE
This Flow Virtual Networking Guide describes how to enable and deploy Nutanix Flow Virtual Networking on Prism
Central.
Documentation Description
Release Notes | Flow Virtual Networking Flow Virtual Networking Release Notes
Port And Protocols Port Reference: See this page for details of ports
that must be open in the firewalls to enable Flow
Virtual Networking to function.
Nutanix Security Guide Prism Element and Prism Central security, cluster
hardening, and authentication.
Flow Network Security Next Gen Flow Network Security Next-Gen is the next-
generation Nutanix microsegmentation solution
with an enhanced policy model, advance policy
operation, and enterprise readiness features. FNG
AOS guides and release notes Covers AOS Administration, Hyper-V Administration
for Acropolis, Command Reference, Powershell
Cmdlets Reference, AOS Family Release Notes,
and AOS release-specific Release Notes
Life Cycle Manager Guides How to upgrade core and other Nutanix software.
AHV guides and release notes Administration and release information about AHV.
Prism Central and Web Console guides and release Administration and release information about Prism
notes Central and Prism Element.
Note: Prism Central Backup and Restore (PCBR) supports Flow Virtual Networking. For more information, see
Prism Central Backup, Restore, and Migration documentation.
Deployment Workflow
The Flow Virtual Networking Network Controller is auto-enabled when you install an X-Large Prism Central
instance or upgrade the version of your existing X-Large Prism Central instance to pc.2023.3 or later. On Small and
Large Prism Central instances, you need to enable the Network Controller. Flow Virtual Networking is not supported
on X-Small Prism Central instances.
On Small and Large Prism Central instances, you need to enable the Network Controller. Flow Virtual Networking is
not supported on X-Small Prism Central instances.
For steps to enable the Network Controller, see Enabling the Network Controller on page 40.
When Flow Virtual Networking is enabled, the Network Controller and the network gateway appliance are installed.
The Network Controller is a collection of containerized services that run directly on the Prism Central VM(s). The
Network Controller orchestrates all the virtual networking operations.
• You can deploy Flow Virtual Networking Network Controller in a dark site (a site that does not have Internet
access) environment. For more information, see Deploying the Network Controller at a Dark Site on
page 44.
• You can upgrade the Network Controller. Nutanix releases an upgrade for the Network Controller with Prism
Central releases. For more information, see Upgrading the Network Controller on page 42.
• You can create and manage virtual private clouds (VPCs) and overlay subnets to leverage the underlying physical
networks that connect clusters and datacenters. For more information, see Virtual Private Cloud Management
on page 98.
You can also upgrade the network gateway version. For more information, see Network Gateway Upgrades on
page 51.
• Permit
• Deny
• Reroute including Redirect traffic to another /32 IPv4 address in another subnet.
Stateless policies require separate rules defined in both the forward and reverse direction if a Permit rule is overriding
a Drop rule. Otherwise, return traffic would be denied by the Drop rule. Use similar priorities to group these matching
forward and reverse entries.
Thus, Flow Virtual Networking allows you to create completely isolated virtual networks that are separated from the
physical network. These isolated virtual networks provide security by default.
Deployment Scale
Flow Virtual Networking supports the scale provided on the Nutanix Configuration Maximums page.
Note: For information on the algorithms supported by Flow Virtual Networking (Network Controller and network
gateway) APIs, see Nutanix Networking Versioned APIs (4.0.1-alpha-1).
• AWS
• CheckPoint
• Cisco ASA
• Fortinet
• Juniper SRX
• PaloAlto
• SonicWall NSv
• VyOS
The communication between VMs in the same subnets or different subnets in the same VPC (also called East-
West communication) is enabled using GEneric NEtwork Virtualization Encapsulation (Geneve). If a Prism Central
manages multiple clusters, then the VMs that belong to the same VPC could be deployed across different clusters.
The virtual switch on the AHV nodes provide distributed virtual switching and distributed virtual routing for all
VPCs.
The communication from a VM in a VPC to an endpoint outside the VPC (called external communication or North-
South communication) is enabled by an external network connection. Such a connection may be secured using VPN.
Note: You must configure the default route (0.0.0.0/0) to the external subnet as the next hop for connectivity outside
the cluster (north-south connectivity).
The following figure shows the logical connectivity of the VPCs to the external network, and subsequently to the
Internet.
Transit VPC
For external connectivity, connect a user VPC to a transit VPC or an Overlay External Subnet with
external connectivity. You could use a maximum of one NAT and one No-NAT external network for
a given VPC.
Transit VPC use a hub-and-spoke architecture. Transit VPCs are useful in the following cases.
• Use VLAN subnets with external connectivity for North-bound connections of a transit VPC.
• Use Overlay subnets with external connectivity (Overlay external subnet) for South-bound connections
from a transit VPC to non-transit or user VPCs. Overlay subnets with external connectivity can only
connect to transit VPCs.
• Use the Overlay subnet without external connectivity to connect a transit VPC with entities such as VMs.
• Configure Externally Routable Prefixes (ERPs) on the VPCs to ensure that the transit VPC has a route to
the Overlay subnets for the VPCs.
• When you connect a transit VPC to a VLAN backed No-NAT external network, deploy a Border Gateway
Protocol (BGP) gateway to advertise the networks that connect through the transit VPC. Scale out the
No-NAT gateways to provide maximum connectivity. For more information on scaling out No-NAT
gateways, see No-NAT Gateways section in the following pages.
• Floating IP addresses supported for Recovery Plans in Disaster Recovery do not work if the floating IP
addresses are configured for transit VPCs.
Note: When multiple regular VPCs with externally routable prefixes (ERPs) are connected by a transit VPC,
while adding ERPs for the transit VPC, add the ERPS of the regular VPCs that are required to be advertised by
the BGP Gateway of the transit VPC.
The BGP gateway of the transit VPC services only the transit VPCs and not the regular VPCs
connected by the transit VPC. Therefore, in a transit VPC that provides external connectivity to the
regular VPCs connected to it, the ERPs of the regular VPCs must be added as ERPs of the transit
VPC.
If an ERP of a regular VPC connected to the transit VPC is not added to the list of ERPs of the
transit VPC, the BGP gateway of the transit VPC does not advertise the ERP. Prism Central also
raises an alert with alert ID, 802007. For information on alerts, see Prism Central Alerts and
Events Reference Guide.
For example, two VPCs connect to the virtual router of the transit VPC through a No-NAT Overlay External Subnet.
The transit VPC connects to the network infrastructure through a No-NAT External Network (that may be a No-NAT
VLAN External Network). The VPCs also connect to the transit VPC through a NAT Overlay External Subnet. The
transit VPC connects to the internet through a NAT External Subnet (that may be a NAT VLAN External Network).
External Subnets
Subnets that provide external connectivity to a VPC are external subnets. External subnets may be subnets
within the deployment but not included in a specific VPC. External subnets may also be subnets that connect
to the endpoints outside the deployment such as another deployment or site.
External subnets can be deployed with NAT or without NAT. You can add a maximum of two external
subnets - one external subnet with NAT and one external subnet without NAT to a VPC. Both external
subnets cannot be of the same type. For example, you cannot add two external subnets, both with NAT.
You can deploy VLAN subnets (Network Controller based VLANs) or Overlay subnets as external subnets.
However, an Overlay subnet deployed as an external subnet (Overlay external subnet) can be attached to only
a transit VPC. You cannot attach an Overlay External subnet to a regular, non-transit VPC.
Figure 5: NAT
When VPC#1 and VPC #2 need access to a common segment of the overall organization's network, there would be
conflicts with overlapping IP addresses in the common segment, VPC#1, and VPC#2 subnets. Using a NAT external
subnet in this scenario eliminates the conflicts and connectivity issues. When the two VPCs (#1 and #2) communicate
with each other as well, conflicting IP address would lead to connectivity issues. Especially while connecting to
unknown subnets or the Internet, NAT provides security and masking.
NAT Gateways are used only when you use Network Address Translation (NAT) for an external subnet.
NAT Gateway
A NAT Gateway service provides the entities inside an internal network with connectivity to the Internet
without exposing the internal network and its entities. It performs the process of Network Address Translation
as a service.
A NAT Gateway service works as follows:
• A NAT Gateway service is deployed as an AHV host. You need an AHV host to implement a NAT
Gateway service because NAT gateway services involve and require operations like load balancing and
routing that are automatically performed by Flow Virtual Networking. One of the AHV hosts in a cluster
(that also hosts the Prism Central AZ) is deployed as the NAT Gateway.
• A NAT Gateway service is connected to the internal network with an internal subnet IP address and to the
external network with an externally-routable IP address.
The externally-routable IP address is an IP address selected from IP address pool of the external subnet
configured for the VPC.
No-NAT Gateway
Like the NAT Gateway service, the No-NAT gateway service also provide external connectivity.
However, it does not perform Network Address Translation.
• You can deploy a scale-out No-NAT gateway only if you attach a No-NAT VLAN external subnet (not an
Overlay external subnet).
• The externally-routable IP address may be an IP address from a private IP address space or a private
network (RFC1918) address.
• The No-NAT gateway IP address can be manually selected or chosen dynamically from the IP pool of the
external subnet.
Static IP Address
A static IP address is a fixed IP address that is manually assigned to an interface in a network. Static IP
addresses provide stable routes that do not have to be updated frequently in the routing table since the static
routes generated using static IP addresses do not need to be updated.
Usually in a large IP-based network (a network that uses IP addresses), a Dynamic Host Configuration
Protocol or DHCP server assigns IP addresses to interfaces of an entity (using DHCP client service on the
entity). However, some entities may require a static IP address that can be reached (manual remote access
or via VPN) quickly. A static IP address can be reached quickly because the IP address is fixed, assigned
manually and is stored in the routing table for a long duration. For example, a printer in an internal network
would need a static IP address so that it can be connected reliably. Static IP addresses can be used to generate
static routes which remain unchanged in routing tables, thus providing stable long-term connectivity to the
entity that has the static IP address assigned.
Virtual IP Address
Any IP address in a VPC subnet, that is assigned, manually or otherwise, to an entity like a VM may
be termed as a virtual IP address.
Do not confuse this virtual IP address with the virtual IP addresses assigned to Prism Central or Prism
Element cluster.
Static Route
Static routes are fixed routes that are created manually by the network administrator. Static routes are more
suited for small networks or subnets. Irrespective of the size of a network, static routes may be required in a
variety of cases. For example, in VPCs where you use virtual private networks (VPNs) or Virtual Tunnel End
Point (VTEP) over VxLAN transport connections to manage secure connections, you could use static routes
for specific connections such as site-to-site connections for disaster recovery. In such a case it is necessary to
have a known reliable route over which the disaster recovery operations can be performed smoothly. Static
routes are primarily used for:
• Facilitating the easy maintenance of the routing table in small networks that are not expected to grow.
• Routing to and from other internal route or stub networks. A stub network or an internal route network is a
network accessed using a single route and the router has only one neighbor.
• Use as a default or backup route. Such a route is not expected to specifically match any other route in the
routing table.
Traffic Behavior
Broadcast Traffic
Flow Virtual Networking forwards the broadcast traffic to all the guest VMs in the same subnet, irrespective
of which AHV hosts these VMs are running on.
Unicast Traffic
Flow Virtual Networking transmits unicast traffic based on the configured networking policies.
Unknown Unicast Traffic
Flow Virtual Networking drops unknown unicast traffic. It is not transmitted to any guest VM within or
outside the source AHV host.
Multicast Traffic
Inside a Flow Virtual Networking VPC, multicast traffic is forwarded only within a subnet and to all VMs in
that subnet. Currently there is no IGMP snooping within VPCs.
Note: Before you enable the Network Controller on a Small or Large Prism Central, ensure that the Prism Central
instance is registered to the same Prism Element cluster that hosts the Prism Central VM(s).
• For Flow Virtual Networking on a small Prism Central: Every Prism Central VM requires additional 3 GB
memory and 2 vCPUs.
• For Flow Virtual Networking on a large Prism Central: Every Prism Central VM requires additional 4 GB
memory and 3 vCPUs.
If the additional resources are not available on the hosting nodes, then Network Controller is not enabled.
• Resource Requirement Per AHV Host
When you enable the Network Controller on a Prism Central deployment, the deployment requires 2 GB of
memory per AHV host.
• Connectivity
Flow Virtual Networking requires reliable connectivity between Prism Central and registered AHV clusters.
Ensure that all AHV clusters reside at the same site or data center as their registered Prism Central instance. Do
not register AHV clusters to a Prism Central at a remote site when using Flow Virtual Networking Virtual Private
Clouds (VPCs). Each site requires a local Prism Central when using Flow Virtual Networking. You can exclude
specific AHV clusters from Flow Virtual Networking using CLI configurations.
Ensure connectivity:
Note: For dark site deployments, Nutanix provides a dark site bundle, which has the Docker images (normally
hosted on ECR) and the Network Controller package (normally hosted on LCM portal). These dark site bundles
can be downloaded using an internet-connected system outside the dark site.
Note:
If you try to configure an MTU value that does not fall within the range of 1500 ~ 9000 bytes on the
default virtual switch vs0, Prism displays an error and fails to apply the configuration.
By default, the Nutanix Controller VMs use the standard Ethernet MTU (maximum transmission unit) of 1,500
bytes for all the network interfaces. The system advertises the MTU of 1442 bytes to guest VMs using DHCP to
account for the extra 58 bytes used by Generic Network Virtualization Encapsulation (Geneve). However, some
VMs ignore the MTU advertisements in the DHCP response. Therefore, to ensure that Flow Virtual Networking
functions properly with such VMs, enable jumbo frame support on the physical network and the default virtual
switch vs0.
If you cannot increase the MTU of the physical network, decrease the MTU of every VM in a VPC to 1442 bytes
in the guest VM console.
Figure 8: Sample Configurations with and without Higher MTU - VS0, CVM and UVMs
Important: Before you upgrade the Prism Central version to upgrade the Network Controller, upgrade the AHV
version on the hosts with incompatible AHV versions using LCM to the AHV version compatible with the Network
Controller upgrade version.
For information on compatible AHV versions, see the Release Notes. For information on Prism Central, AHV
and AOS version compatibility, see the Compatibility and Interoperability Matrix.
Note: When the Network Controller is deployed with a compatible Prism Central deployment package but with
incompatible AHV package, the Network Controller is deployed with Prism Central, but not enabled.
• Ensure that all the AHV hosts in the AOS cluster are running the version compatible with the Network Controller
upgrade version.
Limitations
The following are the limitations of Flow Virtual Networking:
• Flow Virtual Networking is supported only on AHV clusters. It is not supported on ESXi or Hyper-V clusters.
• Flow Virtual Networking is supported in clusters with Compute-only nodes only if the clusters are running AOS
7.0 or later versions and Files 5.1 or later versions.
• Flow Virtual Networking is not enabled by default on a new Prism Element cluster registered with the Flow
Virtual Networking-enabled Prism Central if the Prism Element cluster has nodes with incompatible AHV
versions.
• Flow Virtual Networking does not support updating a VLAN Basic Subnet as an external subnet.
You cannot enable the external connectivity option in the Update Subnet dialog box. Therefore, you cannot
modify an existing VLAN-backed subnet to add external connectivity.
VLAN Basic Subnets for external connectivity are managed by the Flow Virtual Networking control plane.
Traditional AHV VLAN IPAM networks are managed by Acropolis.
Note: Do not configure the same VLAN as both a Flow Virtual Networking external network and an AHV IPAM
network, as this can lead to IP address conflicts.
• Flow Virtual Networking cannot be disabled if any external subnets and VPCs are in use. Delete the external
subnets and VPCs and then disable Flow Virtual Networking.
• Service Status—This section displays the status as Enabled when the Network Controller is enabled.
• Health Status—This section displays Good for a healthy Network Controller.
• Version—The version of Network Controller such as 4.0.0.
• Check for Updates—This link helps you check for available Network Controller upgrades through the LCM
page.
• Disable Network Controller—This link helps you disable the Network Controller. For more information, see
Disabling the Network Controller on page 41.
• Network Controller for VLAN Management—This section provides the Set as default check box is clear
by default to ensure that VLAN Basic (AHV based VLANs) is the default VLAN type. Select the Set as default
check box to make VLAN Subnets (Network Controller based VLANs) the default VLAN type.
This section also provides information about migration of VLAN Basic Subnets to VLAN Subnets. For
information on the types of networks that Flow Virtual Networking creates and manages, see Network Types on
page 38.
• Clusters and Compatibility—This section displays a table with information on the AOS and AHV versions of
the cluster and hosts in the clusters that the Network Controller spans over. If any cluster requires an upgrade, this
status is indicated in the Compatibility column of the table.
For information on migrating VMs from AHV-based VLANs or VLAN Basic Subnets to Overlay subnets, see
Migration of VMs between VLAN Basic Subnet and VPC Subnets on page 102.
For information on converting the AHV-based VLANs or VLAN Basic Subnets to Network Controller based VLANs
or VLAN Subnets, see Migration of VLAN Basic Subnets on page 107.
Network Controller
You can enable, disable or configure the Network Controller attributes in the Prism Central Settings >
Network Controller (formerly Advanced Networking) page in Prism Central.
Procedure
3. Click Prism Central Settings from the Navigation Bar of the Infrastructure application.
For more information on the Navigation Bar of Prism Central applications, see Application-specific
Navigation Bar in the Prism Central Infrastructure Guide).
The Prism Central Settings page opens.
Figure 11:
For information on how to enable the Network Controller, see Enabling the Network Controller on page 40
General
Resiliency Recommendations Displays the number of resiliency (Number) of 2 configured with the
features configured. View Details** option
Note:
• #Clicking the Disable option disables the Network Controller. Do not disable the Network Controller if
you have Flow Virtual Networking features enabled and running on the clusters. For more information
on disabling the Network Controller, see Disabling the Network Controller on page 41.
• *Clicking the Check for Updates option opens the LCM page in the Prism Central Admin Center
application. For information on checking for available upgrades, see Firmware and Software Updates
Management in the Life Cycle Management Guide.
• **Clicking the View Details option opens a dialog box displaying more information on the attribute
value. For example, when you click the View Details option for the Health attribute, the Network
Controller Health Checks pane appears. It displays detailed information on the health status of the
Network Controller, which is useful in troubleshooting the failure of Network Controller enablement.
For information on the attributes that appear when you click the View Details option for Health, see Network
Controller Health Checks Attributes on page 33.
For information on the attributes that appear when you click the View Details option for Resiliency
Recommendations, see Resiliency Recommendations on page 36.
The following sample image displays Network Controller health failure due to loss of connectivity between Prism
Central and the Prism Element cluster.
All host networking control plane Displays the status of the Network Success
agents are up Controller control plane agent
or
working on the AHV hosts.
Failed (followed by a dropdown list
(chevron down icon))
• If the status of the Network Controller is up health check is Failed, the dropdown lists Failed
subcomponents.
• If the status of the Prism Central to all Prism Element Cluster connectivity are up health check is
Failed, the dropdown lists Failed Clusters.
• If the status of the All host networking control plane agents are up health check is Failed, the dropdown
lists a table of Failed Hosts and the names of the Cluster that the failed hosts belong to.
Check alerts and logs for more information on the failures. For information on alerts and logs, see Troubleshooting
Tips on page 49.
Resiliency Recommendations
Click View Details under Resiliency Recommendations on the Network Controller page to open the
Resiliency Recommendations dialog box.
Nutanix recommends that you configure the following to improve resiliency:
Procedure
3. To change the default VLAN type in Prism Central Settings, do the following.
a. Click Prism Central Settings from the Navigation Bar of the Infrastructure application.
For more information on the Navigation Bar of Prism Central applications, see Application-specific
Navigation Bar in the Prism Central Infrastructure Guide).
The Prism Central Settings page opens.
b. Click Network Controller.
c. On the Network Controller (formerly Advanced Networking) page, VLAN Management attribute
sets the default VLAN type to Network Controller-based VLAN Subnet.
By default, the default VLAN type is the AHV-based VLAN Basic Subnet.
(Optional) To change the default VLAN type to Network Controller-based VLAN Subnet, select the
Configure Network Controller-Managed VLANs as default setting checkbox.
• Define ERPs, such as a NAT external subnet, for internal use cases, such as enabling external connectivity for
VMs in a VPC. ERPs must be unique and must not contain overlapping IP addresses.
• Assign floating IP addresses from an ERP to virtual routers or gateways in the VPC or overlay subnet and to the
external network. These floating IP addresses act as external addresses, allowing VMs in the VPC or overlay
subnet to communicate externally.
Overlapping ERPs
You can deploy overlapping ERPs in Nutanix clusters.
ERPs must have unique, non-overlapping IP addresses. No two ERPs can share the same set of IP addresses.
You can deploy overlapping ERPs under specific conditions. When you enable overlapping ERPs, the following
conditions must be met for VPCs to use the ERPs:
• The VPCs with overlapping ERPs must not match to the same external VLAN networks.
• The VPCs with overlapping ERPs must not match to the same Transit VPC.
These conditions ensure that overlapping ERPs remain in separate broadcast domains, preventing IP address conflicts
within a shared domain.
Procedure
2. Click Prism Central Settings from the Navigation Bar of the Infrastructure application.
The Prism Central Settings page opens.
4. In the Network Controller (formerly Advanced Networking) pane, click VPC Management (chevron
down button).
Procedure
2. Click Prism Central Settings from the Navigation Bar of the Infrastructure application.
The Prism Central Settings page opens.
4. In the Network Controller (formerly Advanced Networking) pane, click VPC Management (chevron
down button).
Network Types
Flow Virtual Networking Network Controller supports Overlay and VLAN type networks.
Overlay networks
You can create an IP-based Overlay subnet for a VPC. An Overlay network is a virtualized network that is configured
on top of an underlying virtual or physical network. Examples of Overlay networks are:
• You can create an Overlay subnet with external connectivity (Overlay external subnet) to connect a transit VPC to
other regular VPCs.
• You can create a special purpose multicast network as an Overlay network within an existing network.
• A peer-to-peer network or a VPN.
An important assumption for an Overlay network is that the underlying network is fully connected. Nutanix provides
the capability to create Overlay network-based VPCs.
For more information, see Overlay networks in Essential Concepts on page 12.
VLAN networks
Starting with Prism Central pc.2023.3 with AOS 6.7 and AHV 20230302.198, Network Controller 3.0.0 and later
versions support the creation of VLANs (VLAN Subnets) on the Flow Virtual Networking Network Controller.
The Network Controller also supports migration of VLAN Basic Subnets to VLAN Subnets subject to support and
limitations information provided in the VLAN Subnets Support section.
For information on migration of VLAN networks, see VM and Network Migration on page 102.
Note: Clusters with CO nodes do not support the creation of VLAN Subnets.
For more information, see VLANs (or VLAN Subnets) in Essential Concepts on page 12.
• IGMP Snooping
For more information on IGMP snooping in Nutanix networks, see the IGMP Snooping documentation.
• vNIC creation with Access VLAN mode
Network Controller VLAN Subnets support only access mode, and do not support VLAN trunk mode.
• vNIC Scale
The Network Controller only supports VMs with vNIC associated with either the AHV networking stack or the
Network Controller stack.
• DHCP options on managed VLAN Subnets
VLAN subnets that are managed networks (networks which use IPAM managed IP addresses) support DHCP
options.
• Traffic Mirroring
VLAN Subnets support Traffic Mirroring. For information on Traffic Mirroring, see Traffic Mirroring on AHV
Hosts in AHV Administration Guide and Traffic Mirroring in Prism Central Infrastructure Guide.
• Traffic Support
VLAN Subnets support broadcast, unicast including unknown unicast, and multicast traffic.
• IPFIX Exporter
VLAN Subnets support IPFIX Exporter.
• East/West (Intra-VPC) traffic - Network traffic that is sent and received on the AHV host internal port br0 by
default. The intra-VPC traffic is Geneve encapsulated and stays within the VPC. The intra-VPC traffic is also
called East/West traffic because it is sent between nodes within the cluster.
• North/South (ingress/egress) traffic: Network traffic that enters or exits the VPC. The external subnet determines
the virtual switch and VLAN for this traffic type
For information on configuring a virtual switch to route the network traffic of both types, see Configuring Virtual
Switch for VPC Traffic Types.
Procedure
2. Click Prism Central Settings from the Navigation Bar of the Infrastructure application.
The Prism Central Settings page opens.
Note:
You cannot disable the if any external subnets and VPCs are in use. Delete the external subnets and VPCs
and then disable Flow Virtual Networking.
Procedure
2. Click Prism Central Settings from the Navigation Bar of the Infrastructure application.
The Prism Central Settings page opens.
4. On the Network Controller (formerly Advance Networking) page, click Disable Network Controller.
Procedure
1. SSH to PE3.
2. Run the ncli cluster info or ncli cluster get-params command to get the cluster parameters.
Copy the cluster UUID (For example: 017457d3-1012-465c-9c54-aa145f2da7d9) from the displayed cluster
parameters.
5. Execute the config.add_to_excluded_clusters <cluster uuid> command, providing the cluster UUID that you
copied earlier.
An example of the PC alert, for the condition that PE3 VM is attached to an external network, is as follows:
<atlas> config.add_to_excluded_clusters 0005bf8d-2a7f-3b2e-0310-d8e34995511e
Cluster 0005bf8d-2a7f-3b2e-0310-d8e34995511e has 1 external subnet,
which will lose connectivity. Are you sure? (yes/no)
Note: To enable Flow Virtual Networking on the cluster, execute the config.remove_from_excluded_clusters
<cluster uuid> command, providing the cluster UUID.
What to do next
To verify if Flow Virtual Networking is disabled, SSH to PE3 and run the acli atlas_config.get command.
The output displays the enable_atlas_networking parameter as False if Flow Virtual Networking is disabled and as
True if Flow Virtual Networking is enabled on the Prism Element.
nutanix@cvm$ acli atlas_config.get
config {
anc_domain_name_server_list: “10.10.10.10”
enable_atlas_networking: False
logical_timestamp: 19
minimum_ahv_version: “20190916.101588"
ovn_cacert_path: “/home/certs/OvnController/ca.pem”
ovn_certificate_path: “/home/certs/OvnController/OvnController.crt”
ovn_privkey_path: “/home/certs/OvnController/OvnController.key”
ovn_remote_address: “ssl:anc-ovn-external.default.anc.aj.domain:6652"
}
You can now unregister the PC from the PE cluster. For steps to unregister a Prism Central from a Prism Element
cluster, see Unregistering a cluster from Prism Central
Note:
The network controller upgrade fails to start after the pre-check if one or more clusters have Flow Virtual
Networking enabled and are running an AHV version incompatible with the new network controller
upgrade version.
2. Select the Admin Center application from the Application Switcher Function, and click LCM from the
Navigation Bar.
The LCM page opens displaying the Best Practices tab.
6. Select the check box associated with Networking Controller and click View Upgrade Plan.
The Review Update Plan window opens.
Note: For dark site deployments, Nutanix provides a dark site bundle, which has the Docker images (normally
hosted on ECR) and the Network Controller package (normally hosted on LCM portal). These dark site
bundles can be downloaded using an internet-connected system outside the dark site.
• Update the LCM Framework. For more information, see Updating the LCM Framework Using a Web
Server in the Life Cycle Manager Dark Site Guide.
• Install and prepare the LCM Dark Site server. For more information, see Setting up a Local Web
Server in the Life Cycle Manager Dark Site Guide.
Take note of the FQDN or IP address of the LCM Dark Site server (Local Web Server). For example, in
this documentation, <LCM-web-server-ip> is used to indicate the IP address of the LCM Dark Site
server and ~/release is the path of the dark site server folder.
• Ensure that you have configured the Dark Site (Local Web Server) settings on the LCM > Settings
page.
Note: After you have downloaded the Nutanix Compatibility bundle tar.gz file, verify if the contents
match the following output:
[root@<LCM-web-server-ip> ~]$ tar -tvf
nutanix_compatibility_bundle.tar.gz
nutanix@cvm$
• On the Flow Virtual Networking Downloads page, ensure that Network Controller (formerly ANC)
is selected in the component selection dropdown menu. Download the Network Controller bundle: Copy
the Md5 value for the bundle.
Procedure
1. Log on to the LCM Dark Site server (Local Web Server) with root privileges.
2. Verify that the contents of the Network Controller bundle is similar to the following sample output for the
Network Controller 3.0.0 bundle:
[root@<LCM-web-server-ip> ~]$ tar -tzf 3.0.0.tar.gz
builds/
builds/atlas-controller/
builds/atlas-controller/3.0.0/
builds/atlas-controller/3.0.0/atlas_network_controller.tar.gz
builds/atlas-controller/3.0.0/metadata.sign
builds/atlas-controller/3.0.0/metadata.json
4. Run the following command after unpacking to ensure that the file permissions are not disrupted during the
unpacking:
chmod -R +r builds
6. SSH into the Prism Central VM as an admin user and run the following commands.
admin@pcvm$ mspctl controller airgap enable --url=http://<LCM-web-server-ip>/release
admin@pcvm$ mspctl controller airgap get
7. Verify that the source for deployment is configured as the dark site server.
Log on to the Prism Central VM through an SSH session as a nutanix user, and run the following command.
nutanix@pcvm$ configure_lcm --print | grep -i "msp\|atlas\|dark"
The following sample output shows that is_darksite is True.
msp: {"url": "BASE_URL/msp-builds/", "flags": [], "component": "msp", "tags": []}
nutanix@NTNX-10-19-57-54-A-PCVM:~$
Where BASE_URL is the source location for the bundles. This should match http://<LCM-web-server-ip>/release.
8. Enable Network Controller. For more information, see Enabling the Network Controller on page 40.
Procedure
1. In Prism Central, navigate to Admin Center > LCM > Inventory and click Perform Inventory.
The LCM > Updates tab displays the Networking Controller upgrade version bundle.
Important: When you upgrade Prism Central from a version earlier than pc.2024.3, update the existing Authorization
Policies that provide authorizations for Flow Virtual Networking users.
For information on the update, see Updated Authorization Policy Scope in Flow Virtual Networking Roles
and Permissions on page 46, and Updating Existing Authorization Policies after Prism Central
Upgrade on page 48.
• VPC Admin that has access to 83 operations across 21 entities pre-configured to manage Overlay or VPC
networking including create,update, and delete networks.
• Network Infra Admin that has access to 60 operations across 17 entities pre-configured to manage the network
infrastructure (underlay) on the AHV network stack.
• Network Shared Resources Viewer that has access to one operation, View, across one entity type, Subnet.
Nutanix recommends that you use this role to view Overlay External Subnets and VLAN External
Subnets.
For information on viewing the access permissions provided by each role, see Displaying Permissions in the
Security Guide.
Note: Ensure that you assign an Authorization Policy to any user that you create for Flow Virtual Networking
configurations and operations. For more information on Authorization Policies and their assignment, see
Authorization Policies in the Nutanix Security Guide.
(Old) Entity Type (New) Entity Type (New) Filter Search values (Entity)
For information on updating existing Authorization Policies that provide authorizations for Flow Virtual Networking
users, see Updating Existing Authorization Policies after Prism Central Upgrade on page 48.
• Advanced filter: This filter adds multiple Filters for an Entity Type using the AND operation. The AND
operation applies the ANDed filters together.
• Owner filter: This filter provides access to only self-owned entities. The Owner filter is available only for the
Subnet and VPC Entity Types.
For example, a user with Network Infra Admin role needs access only to self-owned or self-created Subnet >
Subnet Type > Overlay Subnet and VPC > VPC Type > Regular VPC entities, configure the access using
Advanced and add the Owner filter using the +Condition to AND the Owner filter in the Advanced Filter
dialog box.
Figure 14:
For more information on using these filters to configure or edit Authorization Policies, see Configuring an
Authorization Policy in the Security Guide.
Procedure
Figure 15:
5. Click Next.
Troubleshooting Tips
This section provides information to assist troubleshooting of Flow Virtual Networking deployments. This is
in addition to the information that the Prism Central Infrasturcture Guide provides.
Audit Logs
Prism Central generates audit logs for all the flow networking activities like it does for other activities on
Prism Central. For more information, see Audit Summary View in the Prism Central Infrastructure Guide.
Support Bundle Collection
To support troubleshooting for Flow Virtual Networking, you can collect logs.
To collect the logs, run the following commands on the Prism Central VM console:
nutanix@cvm$ logbay collect -t msp,anc
• msp tag will collect logs from the services running on MSP pods and persistent log volumes
(application-level logs)
• anc tag will collect the support bundle, which includes database dumps and OVN state
The command run generates a zip file at a location, for example: /home/nutanix/data/logbay/bundles/
<filename>.zip
Unzip the bundle and you'll find the anc logs under a directory specific to your MSP cluster, the worker VM
where the pod is running, and the logging persistent volume of that pod. For example:
./msp/f9684be8-b4e8-4524-74b4-076ed53ca1fd/10.48.128.185__worker_master_etcd/persistent/default/ovn/
anc-ovn_StatefulSet/
For more information on the task run, see the text file that the command generates at a location, for example:/
home/nutanix/data/logbay/taskdata/<taskID>/collection_result.txt
For more information on the logbay collect command, see the Logbay Log Collection (Command Line) topic
in the Nutanix Cluster Check Guide (NCC Guide).
Layer 2 Virtual Subnet Extension Alert
The L2StretchLocalIfConflict alert (Alert with Check ID - 801109) may occur while performing Layer 2
virtual subnet extensions. For more information, see KB-10395 for more information about its resolution.
Note: Upgrading the VPN appliance causes disruption of traffic for the duration of the upgrade operation.
Procedure
2. Select the Infrastructure application from Application Switcher Function, and navigate to Network &
Security > Connectivity from the Navigation Bar.
The Connectivity page opens displaying the Gateways tab.
3. Click the Gateway name link text to open the Gateway details page.
In the Gateway table, the Gateway name is a clickable link text.
The Gateway Version is listed in the Properties widget.
Procedure
Note:
Nutanix recommends that you select Enable LCM Auto Inventory in the LCM page in Prism Central
to continuously detect new Gateway upgrades as soon as they are available.
Note: Upgrading the VPN appliance causes disruption of traffic for the duration of the upgrade operation.
Procedure
2. Select the Admin Center application from the Application Switcher Function, and click LCM from the
Navigation Bar.
The LCM page opens displaying the Best Practices tab.
5. Click Proceed.
When you click Proceed, the system scans the registered Prism Central cluster for software versions that are
running currently. Then it checks for any available upgrades and displays the information on the LCM page under
Software.
Note: Skip this step if you have enabled auto-inventory in the LCM page in Prism Central.
7. Select the checkbox associated with the Gateway version you want to upgrade and click View Upgrade Plan.
The Review Upgrade Plan window opens.
Tip:
To go to the LCM page, select the Admin Center application from the Application Switcher
Function, and click LCM from the Navigation Bar.
In the Updates tab of the LCM page, Network Gateway now appears as an available update.
See the Life Cycle Manager Dark Site Guide for more information about Perform Inventory and the
Updates tab.
Procedure
• See KB-12393 and contact Nutanix Support to complete the Network Gateway version upgrade in the dark site.
• Subnets: This page displays the subnets and the operations you can perform on subnets. For more information,
see Subnets on page 55.
• Virtual Private Clouds: This page displays the VPCs and the operations you can perform on VPCs. For more
information, see Virtual Private Clouds Summary View on page 59.
• Floating IPs: This page displays a list of floating IP addresses that you are using in the network. It allows you to
request for floating IP addresses from the free pool of I addresses available to the clusters managed by the Prism
Central instance. For more information, see Floating IPs Summary View on page 80.
• Connectivity: This page allows you to manage the following networking capabilities. For more information, see
Connectivity on page 81.
• Gateways: This page provides a list of network Gateways you have created and configured, and the operations
you can perform on the network Gateways. For more information, see Gateways Summary View on
page 81.
• VPN Connections: This page provides a list of VPN connections you have created and configured, and
the operations you can perform on the VPN connections. For more information, see VPN Connections
Summary View on page 84.
• Subnet Extensions: This page provides a list of subnets that you have extended at the Layer 2 level using
VPN (point-to-point over Nutanix VPN) or VTEP (point-to-multi-point including third party). For more
information, see Subnet Extensions Summary View on page 88.
• BGP Sessions: This page provides a list of BGP sessions you have created and configured, and the operations
you can perform on the BGP sessions. For more information, see BGP Sessions Summary View on
page 92.
• Security Policies: This page provides a list of security policies you configured using Flow Segmentation. For
more information, see Security Policies on page 96.
• Security Dashboard: This page provides dynamic summary of the security posture across all registered clusters.
For more information, see Security Dashboard on page 96.
For information on how to configure network connections, see Network Configuration in the Prism Central
Infrastructure Guide..
Subnets (Overlay IP subnets), Virtual private clouds, floating IPs, and Connectivity are Flow virtual networking
features. These features support flexible app-driven networking that focuses on VMs and applications instead of
virtual LANs and network addresses. Flow virtual networking powers network virtualization to offer a seamless
network experience with enhanced security. It is disabled by default. It is a software-defined network virtualization
solution providing overlay capabilities for the on-premises AHV clusters.
Security policies drives the Flow Segmentation features for secure communications. For more information, see Flow
Microsegmentation Guide.
Virtual Switches
You can create and manage virtual switches in Prism Central.
The virtual switches that you create in Prism Central span multiple clusters managed by the Prism Central instance.
Note: A multicluster virtual switch is different from a single-cluster default virtual switch created in a Prism Element
cluster. A single-cluster default virtual switch that the cluster deployment process creates in the Prism Element web
console physically connects all the hosts and ports on the cluster in which it is created.
You can map only a (Network Controller-based) VLAN Subnet to a multicluster virtual switch. For more information
on VLAN Subnet association, see Assign a Subnet to a Virtual Switch. You cannot map a (AHV-based) VLAN
Basic Subnet or an individual Overlay subnet to a virtual switch that you create in Prism Central.
Note: While you create a VLAN Subnet, the multicluster virtual switches created in Prism Central are not displayed in
the Virtual Switch dropdown list in the Create Subnet page. Ensure that you clear the VLAN Basic Networking
checkbox in Advanced Configuration to display the multicluster virtual switches in the Virtual switch dropdown
list.
For information on single-cluster virtual switches, see About Virtual Switch in the AHV Administration Guide and
Creating or Updating a Virtual Switch in the Prism Element Web Console Guide.
Limitations
The limitations of Prism Central-based multicluster default virtual switches are as follows:
• Create a multicluster virtual switch. For more information, see Creating a Virtual Switch.
• View the list of multicluster virtual switches that were created in the Prism Central instance. For more
information, see Viewing Virtual Switches Summary Page.
• View a specific multicluster virtual switch that was created in the Prism Central instance. For more information,
see Viewing Virtual Switch Details.
• Update a multicluster virtual switch. For more information, see Updating a Virtual Switch.
• Delete a multicluster virtual switch. For more information, see Deleting a Virtual Switch.
Subnets
You can perform the following actions to manage a subnet from Prism Central.
• Creating a Subnet
• Updating a Subnet
• Deleting a subnet
Note: The fields vary based on the View by and Group by options. A dash (-) is displayed in a field when a value is
not available or applicable.
External Connectivity Displays whether or not the subnet has external (Yes/No)
connectivity configured.
VPC Displays the name of the VPC in which the subnet (Name of VPC)
is used.
Virtual Switch Displays the virtual switch that is configured for the (virtual switch name)
VLAN you selected. The default value is the default
virtual switch vs0.
IP Prefix Displays the IPv4 address of the network with the (IPv4 Address/Prefix)
prefix.
Cluster Displays the name of the cluster for which this (cluster name)
subnet is configured.
You can perform the following actions from the Subnets page:
Action Description
Update Click this action to update the subnet. For more information, see
Updating a Subnet on page 128.
Extend Click this action to create a subnet extension. For more information,
see Layer 2 Network Extension Over VPN on page 155.
Manage Categories Click this action to associate the subnet with a category or change the
categories that the subnet is associated with. For more information,
see Assigning a Category to an Entity in the Prism Central Admin Center
Guide.
Delete Click this action to delete the subnet. For more information, see
Deleting Subnets, Policies or Routes on page 130.
Name Filters based on the subnet name. It returns a list of (Subnet name string)
subnets that satisfy the name condition/string.
External Connectivity Filters based on whether the subnet has external (Yes/No)
connectivity configured or not.
VPC Filters based on the name of the VPC in which the (Name of VPC)
subnet is used.
Cluster Filters based on the name of the cluster for which (cluster name)
this subnet is configured.
Summary Tab
The Summary tab provides detailed information about the subnet in widgets. A dash (-) is displayed in a field when a
value is not available or applicable.
The Summary tab has the following widgets:
Domain Settings Provides the following DHCP settings configured for a VM in a subnet:
The Summary tab provides the following options, at the top of the page. For more information, see the Subnet
Actions table in Subnets Summary View on page 56.
• Update
• Extend
• Manage Categories
• Delete
Throughput Tab
The Throughput tab provides a graphical representation of the throughput of the subnet.
Note: The fields vary based on the View by and Group by options. A dash (-) is displayed in a field when a value is
not available or applicable.
Field Description
Associated External Subnets Displays the external subnet that the VPC is assigned to.
Inter VN Traffic Displays the traffic flowing between the virtual networks or VPCs.
Internet Traffic Displays the traffic flowing to and from the Internet.
IPv4/Subnet Displays the IPv4 network IP with subnet prefix. For example,
10.20.30.0/24.
You can perform the following actions for the VPCs from the Virtual Private Clouds page:
• Click the name of a VPC to open the VPC details page, which displays the detailed information about the VPC.
For more information, see Virtual Private Cloud Details View on page 61.
• Create a VPC by clicking Create VPC. For more information, see Creating a Virtual Private Cloud on
page 111.
• Update or delete an existing VPC using the Actions dropdown menu. The Actions dropdown appears when
one or more VPCs are selected. For more information, see Updating a Virtual Private Cloud on page 126 or
Deleting a Virtual Private Cloud on page 129.
• Filter the VPC list based on a variety of parameter values using Filters pane. For more information, see Filters
Pane - Virtual Private Clouds Page.
Name Filters based on the VPC name. It returns a list of IP (Virtual private cloud
addresses that satisfy the name condition/string. name string)
Associated External Filters based on the external subnet that the VPC is (External Subnet)
Subnets assigned to.
Summary Tab
The Summary tab provides detailed information about the VPC in widgets.
The Summary tab has the following widgets:
Transit VPC Displays Yes if the VPC is a Transit VPC. Displays No if the VPC is not a
Transit VPC.
Domain Name Servers Displays the IP address or the FQDN of the DNS servers used by the VPC.
(DNS)
Associations Provides the following:
• Subnets (Overlay) — Displays the number of subnets associated with the VPC.
• Policies — Displays the number of policies associated with the VPC.
• Routes — Displays the number of routes associated with the VPC.
• Assigned Floating IPs — Displays the floating IP addresses assigned to the VPC.
• Available Floating IPs — Displays the available floating IP addresses that can be
assigned to the VPC.
Subnets Tab
The Subnets tab displays the list of subnets added to the VPC.
The following table describes the fields that appear in the Subnets tab.
Field Description
You can perform the following actions for a subnet from the Subnets tab:
• Click the name of the subnet to open the subnet details page, which displays the detailed information about the
subnet. For more information, see Subnet Details View on page 58.
• Create a subnet by clicking Create Subnet. For more information, see Creating a Subnet on page 115.
• Update an existing subnet using the Delete option associated with the subnet. For more information, see
Updating a Subnet on page 128.
• Delete an existing subnet using the Delete option associated with the subnet. For more information, see Deleting
Subnets, Policies or Routes on page 130.
Policies Tab
The Policies tab displays information about the security-based traffic shaping policies you configured.
The following table describes the fields that appear in the Policies tab.
Note: The fields vary based on the View by option. A dash (-) is displayed in a field when a value is not available or
applicable.
Field Description
Action Displays the appropriate action for the implementation of the policy.
Rule Displays the Permit or Deny rule set for the priority.
Rule Type Displays whether the rule is system generated or user defined.
Traffic Displays the traffic type that the priority and rule should be applied to.
Source Displays the source IP or subnet for which you want to manage traffic.
Destination Displays the destination IP or subnet for which you want to set the
priority.
Source Subnet Displays the subnet IP and prefix designated as the source for the
policy.
Destination Subnet Displays the subnet IP and prefix designated as the destination for
the policy.
Protocol Displays the type of protocol for which the policy is configured.
Protocol Number Displays the protocol number for which the policy is configured.
ICMP Type Displays the type of ICMP message associated with the policy.
Packet Count Displays the total number of traffic packets that matches the given
policy. The count is updated periodically.
You can perform the following actions for a policy from the Policies tab:
• Create a policy by clicking Create Policy. For more information, see Creating a Policy on page 120.
• Update: Update the policy. For more information, see Updating a Subnet on page 128.
• Delete: Delete the policy. For more information, see Deleting Subnets, Policies or Routes on page 130.
• Clear Counters: Reset the counters for the selected policy.
• Clear All Counters: Reset the counters for all the policies.
Routes Tab
The Routes tab displays the list of static routes added to the VPC.
The following table describes the fields that appear in the Routes tab.
Note: The fields vary based on the View by option. A dash (-) is displayed in a field when a value is not available or
applicable.
Field Description
Next Hop Displays the next hop network or subnet for the traffic exiting the
VPC.
You can perform the following actions for a route from the Routes tab:
• Add Static Route: Create a static route. For more information, see Creating Static Routes on page 125.
• Update an existing static route. For more information, see Updating Static Routes on page 129.
• Delete a static route. For more information, see Deleting Subnets, Policies or Routes on page 130.
Metrics Tab
The Metrics tab displays detailed information about the VPC metrics.
The following table describes the fields that appear in the Metrics tab.
Field Description
Last (time_period) Select the period for which you want to display the metrics. The
dropdown menu provides the following options:
Direction of traffic Select the direction of traffic for which you want to display the metrics.
The dropdown menu provides the following options:
Rx and Tx Packets Displays graphically the received and transmitted packet volume on a
timeline as set in the Last (time_period) parameter.
Types of Load-balancers
Load-balancers are of the following types:
1. Layer 4 load-balancers: These load-balancers distribute the data traffic flowing through the network (IP) and
transport (FTP, TCP and UDP) layer of the network. Layer 4 load-balancers distribute the network load. This type
is called the network load-balancer.
2. Layer 7 load-balancers: These load-balancers distribute the protocol request traffic based on the data flows in the
application layer protocols (such as HTTP). Layer 7 load-balancers distribute the application load. This type is
called the application load-balancer.
• Distribute the network traffic load across multiple guest VMs efficiently, by allowing you to add and remove load-
balancers and their members based on demand for more efficient distribution of network load.
• Distribute the requests only to active VMs for better high availability and reliability.
• Monitor the health of target VMs to mark active and inactive targets.
The Network Load Balancer is a distributed load-balancer that is implemented in the AHV host to distribute
traffic across the network. Network Load Balancers improve the capacity, reliability, and overall fault tolerance of
the network and applications using the network. The Network Load Balancer feature implements high availability for
network and applications and improves the performance of the network and applications.
For load-balancing, the overlay subnet in the VPC assigns a virtual IP address to the load-balancer. The Network
Load Balancer feature provides the option of requesting an IP address on the Floating IP page from the NAT
external subnet range and assigning it to the load-balancer as virtual IP address to be used as external IP address, for a
NAT external subnet.
External Load Balancing
This load balancing involves the distribution of traffic flowing into the VPC from sources external to
the VPC.
Internal Load Balancing
This load balancing involves distributing the traffic flowing within the VPC, in other words, intra-VPC
traffic, among a set of VMs in the VPC. For such load balancing, the virtual IP address assigned to
the load-balancer need not be reachable from outside the VPC.
For information on creating, updating or deleting network load-balancers, see Network Load Balancer
Management on page 131.
Limitation
Traffic to the floating IP (for example, FIP1) on, for example, port 22 of the guest VM fails when a guest VM has the
following configurations:
• A floating IP (for example, FIP1) is configured on, for example, port 22.
• Load balancing is configured to use the same port, for example, port 22.
• A floating IP (for example, FIP2) is configured for load balancing to reach the guest VM from outside the VPC.
• The private IP address that is normally assigned to the guest VM within the VPC.
Procedure
2. Select the Infrastructure application from Application Switcher Function, and navigate to Network &
Security > Network Services from the Navigation Bar.
The Network Services dashboard opens in the Network Load Balancer tab by default. The Network Load
Balancer tab displays the list of load-balancer sessions.
This section provides the details of the Network Load Balancer summary view attributes.
The fields vary based on the View by and Group by options. A dash (-) is displayed in a field when a value is not
available or applicable.
Listener Protocol: Port Displays the transport protocol TCP or UDP:(Integer) Port number
and the port number configured
for the Listener. Example: TCP:80
Target VM NICs Health Displays the health status of the Status list as Healthy or
target VM NICs. The Network Unhealthy.
Controller checks the reachability of
the ports using TCP or UDP based
on the Listener Protocol selected
while creating the load-balancer
session.
If all the NICs have the same
status, then the status is displayed
as All <number of NICs>;status
as Healthy or Unhealthy>. For
example you have configured three
target VMs with one NIC each and
all the NICs are Healthy, then the
status is displayed as All 3 Healthy.
Actions
You can perform the following actions from the Network load-balancer tab:
• Click the name of a subnet to open the subnet details page, which displays detailed information about the subnet.
For more information, see Viewing Network Load Balancer Session Details on page 69.
• Create a load-balancer session by clicking Create Load Balancer Session. For more information, see
Creating a Load-balancer Session on page 131.
• Filter the subnets list based on a variety of parameter values using the Modify Filters pane. For more
information, see Network Load Balancer Summary View Filters Pane on page 69.
• Perform the following load-balancer session-specific actions on a single load-balancer session using the Actions
dropdown menu. The Actions dropdown appears when a load-balancer session is selected.
This section provides the details of the Network Load Balancer summary view filter pane.
You can filter the information in the Network Load Balancer page based on the following fields that are available
in the Filters pane. For information on the regular expressions that you can use for filtering, see the Filter Expressions
section in the Prism Central Infrastructure Guide.
Procedure
2. Select the Infrastructure application from Application Switcher Function, and navigate to Network &
Security > Network Services from the Navigation Bar.
The Network Services dashboard opens in the Network Load Balancer tab by default. The Network Load
Balancer tab displays the list of load-balancer sessions.
• Summary
• Target VM NICs
• Alerts
• Audits
This section provides the details of the Summary tab attributes in the Network Load Balancer details view.
The Summary tab provides detailed information in widgets.
A dash (-) is displayed in a field when a value is not available or applicable.
The Summary tab provides information in two widgets—Properties and Target VM Status.
Properties
This widget provides information in a two-column table divided into different sections
Target VM Status
This widget provides information as a donut usage chart with the data stacked adjacent to the chart.
• <50 %
• 50 - 75 %
• >75 %
• <50 %
• 50 - 75 %
• >75 %
• <2 ms
• 2 - 5 ms
• >5 ms
The Summary tab provides the following actions, at the top of the page. For information on these actions, see the
Network Load Balancer Summary View Attributes on page 67
• Update: Select the load-balancer session you want to update and select Update. For information, see Updating
a Load-balancer Session on page 134.
• Delete: Select the load-balancer session you want to delete and select Delete. For information, see Deleting a
Load-balancer Session on page 134.
This section provides the details of the Target VM NICs tab attributes in the Network Load Balancer details
view.
The Target VM NICs tab provides detailed information about the target VM NICs in a table.
A dash (-) is displayed in a field when a value is not available or applicable.
This section provides the details of the Alerts tab attributes in the Network Load Balancer details view.
The Alerts displays the list of alerts generated for the load-balancer sessions.
Note: The fields vary based on the View by and Group by options. A dash (-) is displayed in a field when a value is not
available or applicable.
Resolved At Displays the time stamp for the (Date and time stamp)
time of resolution.
Acknowledged Indicates whether the alert was Auto (date and time stamp) or
acknowledged or not. Displays Manual (date and time stamp)
blank (dash or “ -”) if the alert was
automatically acknowledged.
Acknowledged By Indicates whether the alert has been Blank (dash) or User name or role
acknowledged. name (string)
Acknowledged At Displays the time stamp for the (Date and time stamp)
time of acknowledgement.
Alert Type Displays the Alerts type code (Alert type string)
message. The last word in the
message indicated the severity- Example: networking_atlas-
based type such as WARNING or rules_LoadBalancerSessionTargetsUnhealthy_WARN
CRITICAL
Diagnostics
You can perform the following actions for alerts in the tab.
• Configure the email preferences to receive the alerts on email, using the Email Configuration button. For
information, see Configuring Email for Alerts on page 75.
• Resolve an alert by selecting the checkbox for an alert and selecting Actions > Resolve.
• Acknowledge an alert by selecting the checkbox for an alert and selecting Actions > Acknowledge.
You can select an alert to open the details page of the alert.
For more information, see the Prism Central Alerts and Events Reference Guide.
This section provides the steps to configure the email IDs that the notifications of the alerts must be sent
to.
Procedure
2. Select the Infrastructure application from Application Switcher Function, and navigate to Network &
Security > Network Services from the Navigation Bar.
The Network Services dashboard opens in the Network Load Balancer tab by default. The Network Load
Balancer tab displays the list of load-balancer sessions.
3. In the Network Load Balancer tab, click the name of the load-balancer session that you want to configure the
Alert Email Configuration for.
5. On the Alert Email Configuration dialog box, provide the necessary information.
For information on the attributes that you need to configure, see Email Configuration Attributes on page 75.
6. Click Save.
Email Configuration Attributes
Click Save on each tab to save the configuration made on that tab.
Settings tab
You can configure the following standard preferences for emails in this tab.
Email Preference
Every Single Alert Select the Every Single Alert checkbox to ensure
that the email recipients receive an email each for
every single alert.
Daily Digest Select the Daily Digest checkbox to ensure that the
email recipients receive a summary email sent every day
with all alerts.
If you have selected the Daily Digest checkbox, do the
following:
Email Recipients Enter the email IDs of the recipients. For multiple
email IDs, click Enter, Tab, Space or Comma after
entering each email ID and enter the next email ID.
Established Since Displays the date and time stamp of the time when the
tunnel connection is established.
• All
• Performance
• Capacity
• CPU Capacity
• Configuration
• Availability
• System Indicator
• Memory Capacity
• Storage Capacity
Cluster Select from this dropdown list, the checkboxes for the
appropriate cluster options or All.
The cluster options include All and Prism Central,
followed by a list of Prism Element clusters managed by
the Prism Central instance.
Alert Contains Enter the appropriate text content that filters the
alerts for inclusion in the email notification.
Email Recipients Enter the email IDs of the recipients. For multiple
email IDs, click Enter, Tab, Space or Comma after
entering each email ID and enter the next email ID.
Email Content tab
This tab lets you provide additional content in the email notifications.
Append Body Enter the text that you want to append to the text in the
email body text.
As you enter the text, it is displayed in the body section
of the Email Content field above.
This section provides the details of the Audit tab attributes in the Network Load Balancer details view.
The Audits tab displays the list of successful and audited actions generated for creation, update and deletion events
of the load-balancer sessions.
Note: The fields vary based on the View by options. A dash (-) is displayed in a field when a value is not available or
applicable.
The audited actions are available in the list only if these actions were successful. Failed actions are not provided in
this list.
The sidebar on the action details page provides the attributes of the action. For more information, see Audits Tab
Attributes on page 78.
The dashboard provides the attributes of the load-balancer session on which the audited action was performed.
Field Description
Load-balancer Session Name Displays the name of the load-balancer session that
the action was performed on.
Load-balancer Session UUID Displays the UUID of the load-balancer session.
Description Displays the description of the load-balancer
session.
VPC UUID Displays the UUID of the VPC that the load-
balancer session is configured in.
Listener Subnet UUID Displays the UUID of the Subnet in the VPC that
the load-balancer session is configured in.
Virtual IP Address Displays the virtual IP address assigned to the
Listener in the subnet.
Listener Protocol Displays whether the transport protocol configured
for the Listener is TCP or UDP.
Listener Port Ranges Displays the port ranges that are configured on the
target VM NICs.
Target VM NICs Comma-separated list of NIC UUID and associated port
of each NIC.
For example, d72f1940-xxxx-4exx-
axxx-73xx32exxxxx:8080
The Details page consists of a dashboard that provides detailed information about the audited Actions that are listed
on the Audits tab. To access the details page of an audited Action, click the name of an audited action to see the
details page of the audited action.
Traffic Mirroring
For information on Traffic Mirroring, see Traffic Mirroring on AHV Hosts in the AHV Administration Guide and
Traffic Mirroring in the Prism Central Infrastructure Guide.
Floating IPs
You can access the floating IP addresses you have created and configured, from the Floating IPs page.
For information on floating IP addresses and their role in flow virtual networking, see the SNAT and Floating IP
Address section in Essential Concepts on page 12.
Note: Floating IP addresses are not reachable (Pings fail) unless you associate them to primary or secondary IP
addresses of VMs. For more information, see Assigning Secondary IP Addresses to Floating IPs on
page 101.
For information on the limitation on using floating IP on a guest VM with load balancing configuration, see Network
Load Balancer in the Flow Virtual Networking Guide.
The Floating IPs page displays the list of floating IP addresses across all the registered clusters.
To access the Floating IPs page:
1. Log in to Prism Central.
2. Select the Infrastructure application from Application Switcher Function, and navigate to Network &
Security > Floating IPs from the Navigation Bar.
The Floating IPs page opens displaying the List tab. This tab provides a list of floating IPs you have created and
configured, and the operations you can perform on the IPs.
The following table describes the fields that appear in the Floating IPs page.
Note: The fields vary based on the View by option. A dash (-) is displayed in a field when a value is not available or
applicable.
You can perform the following actions for the floating IP addresses from the Floating IPs page:
• Request a floating IP address by clicking Request Floating IP. For more information, see Requesting
Floating IPs on page 114.
• Update or delete an existing floating IP address using the Actions dropdown menu. The Actions dropdown
appears when one or more addresses are selected.
• Update: Assign or change the assignment of the floating IP address. You can assign the floating IP address to
a IP address such as a private IP address in a VPC or the primary IP address of a VM or a secondary IP address
created on a VM.
• Delete: Delete the floating IP address. The deleted IP address returns to the IP address pool as unused. Before
you delete a floating IP address, ensure that it is not assigned to a private IP address or a VM. Change the
assignment to None if it is already assigned, using the Update option.
Floating IP Address Filters based on the floating IP address assigned. It (Floating IP address)
returns a list of IP addresses that satisfy the string.
External Subnet Filters based on the external subnet that the IP (External Subnet)
address is assigned to.
Connectivity
You can access network gateways, VPN connections, subnet extensions, and BGP sessions from the
Connectivity page.
You can perform the following actions for a gateway from the Gateways page:
• Click the name of a gateway to open the gateway details page, which displays the detailed information about the
gateway. For more information, see Gateway Details View on page 82.
• Create a local or remote gateway with VPN or VTEP service by clicking the Create Gateway dropdown menu.
For more information, see Creating a Network Gateway on page 138.
• Update or delete an existing gateway using the Actions dropdown menu. The Actions dropdown menu
appears when one or more gateways are selected. For more information, see Updating a Network Gateway on
page 144 or Deleting a Network Gateway on page 145.
• Filter the gateway list based on various parameter values using the Filters pane. For more information, see Filters
Pane - Gateways Page.
Table 16: Filter Pane Field Descriptions for the Gateways page
Properties widget
Type Displays the gateway type. (Local or Remote)
Attachment Type Displays the network entity like VLAN or VPC that (VLAN or VPC)
the gateway is attached to.
VPC or Subnet (VLAN) Displays the name of the attached VPC or VLAN (Name of VLAN or VPC)
subnet.
Vendor (Applicable only Displays the name of the vendor of the gateway (Name of Vendor)
if you select remote appliance at the remote site.
gateway)
Floating or Private IP Displays the Floating (for VPC) or Private (for (IP Address)
Address VLAN) IP address assigned to the gateway.
External IP (Applicable Displays the IP address assigned to the remote (IP Address that you
only if you select remote gateway. assigned to the remote
gateway) gateway.)
Status Displays the operational status of the gateway. (Up or Down)
Gateway Version Displays the version of the Nutanix gateway (Version)
appliance deployed.
Cluster Displays the name of the cluster on which the (Cluster name)
gateway is created.
Gateway VM Displays the name of the VM on which the (Name of VM - actionable
gateway is created. link. Click the name-link to
open the VM details page
of the gateway VM.)
Service Configuration widget
Service Displays the service used by the gateway. (VPN or VTEP or BGP)
VPN Service Configuration
External Routing Displays the type of routing associated with the (Static or eBGP with ASN)
gateway for external traffic routing.
Internal Routing Displays the type of routing associated with the (Static or eBGP with ASN)
gateway for internal traffic routing.
VPN Connections Displays the total number of VPN connections (Number - actionable link.
associated with the gateway. Click the link to open the
VPN connection details
page for the associated
VPN connection.)
View VPN Connections Click this link to open the VPN Connections tab. -
VTEP Service Configuration
You can perform the following actions for a gateway from the Summary tab:
• Update an existing gateway by clicking Update. For more information, see Updating a Network Gateway on
page 144.
• Delete the gateway by clicking Delete. For more information, see Deleting a Network Gateway on
page 145.
You can perform the following actions for a VPN connection from the VPN Connections page:
• Click the name of a VPN connection to open the VPN connection details page, which displays the detailed
information about the connection. For more information, see VPN Connection Details View on page 86.
• Create a VPN connection by clicking Create VPN Connection. For more information, see Creating a VPN
Connection on page 149.
• Update or delete an existing VPN connection using the Actions dropdown menu. The Actions dropdown
appears when one or more VPN connections are selected. For more information, see Updating VPN Connection
on page 151 or Deleting a VPN Connection on page 151.
• Filter the VPN connection list based on various parameter values using the Filters pane. For more information,
see Filters Pane - VPN Connections Page.
Table 19: Filter Pane Field Descriptions for the VPN Connections page
Name Filters based on the VPN connection name. It (VPN connection name
returns a list of VPN connections that satisfy the string)
name condition/string.
EBGP Status Filters based on the status of the EBGP gateway (Established or Not
connection. Established)
IPSEC Status Filters based on the connection status of IPSec (Connected or
tunnel. Disconnected)
Summary Tab
The Summary tab provides detailed information about a VPN connection in widgets.
The following table describes the fields that appear in the Summary tab.
You can perform the following actions from the Summary tab:
• View the detailed information of a VPN connection. For the list of available parameters, see the VPN Connection
Summary Tab table above.
• Update an existing VPN connection by clicking Update. For more information, see Updating VPN Connection
on page 151.
• Delete an existing VPN connection by clicking Delete. For more information, see Deleting a VPN Connection
on page 151.
Throughput Tab
The Throughput tab provides a graphical representation of the throughput of the VPN connection.
IPSec Logging
The IPSec Logging tab provides running logs for the IPSec tunnel of the VPN connection.
Interface Status Displays the status of the interface that is used by (Connected or Down)
the subnet extension.
You can perform the following actions for a subnet extension from the Subnet Extensions page:
• Click the name of a subnet extension to open the subnet extension details page, which displays the detailed
information about the extension. For more information, see Subnet Extension Details View on page 90.
• Extend a subnet Across Availability Zones or To a Third Party Data Center by clicking the Create
Subnet Extension dropdown menu. You can extend a subnet using VPN or VTEP service. For more
information, see Layer 2 Network Extension on page 153.
• Update or delete existing subnet extension using the Actions dropdown menu. The Actions dropdown appears
when one or more subnet extensions are selected. For more information, see Updating an Extended Subnet on
page 170 or Removing an Extended Subnet on page 170.
• Filter the subnet extension list based on various parameter values using the Filters pane. For more information,
see Filters Pane - Subnet Extensions Page.
Table 22: Filter Pane Field Descriptions for the Subnet Extensions page
Name Filters based on the subnet extension name. It (Subnet extension name
returns a list of subnet extensions that satisfy the string)
name condition/string.
Connection Status Filters based on the status of the connection that is (Connected or
created by the subnet extension. Disconnected)
Interface Status Filters based on the status of the interface that is (Connected or Not
used by the subnet extension. Available)
Summary Tab
The Summary tab provides detailed information about the subnet extension in widgets.
The subnet extension Summary tab has the following widgets:
Properties widget
VLAN ID (For VLAN subnets only) Displays the VLAN ID of (VLAN ID number)
the VLAN subnet that is extended.
VPC (For Overlay subnets only) Displays the name of (Name of VPC)
the VPC subnet that is extended.
Cluster (For VLAN subnets only) Displays the cluster that (Name of cluster)
the VLAN subnet belongs to.
IP Address Prefix Displays the network IP address with prefix, of (IP Address with prefix)
the VLAN subnet that is extended.
Virtual Switch (For VLAN subnets only) Displays the virtual (Virtual Switch name such
switch on which the VLAN subnet is configured. as vs0 or vs1)
Pool Range Displays the range of IP addresses in the pool (IP address range)
configured in the subnet that is extended.
(Interactive Graphic Pie Displays a dynamic pie chart that displays the (IP Address statistics)
Chart) statistic you hover on. Displays the following IP
address statistics outside the pie chart, that you
can hover on:
Interface Status Displays the status of the interface that is used by (Connected or Down)
the subnet extension.
Connection Status Displays the status of the connection that is (Not Available, Connected,
created by the subnet extension. Not Available or Disconnected)
status indicates that Prism Central is unable to
ascertain the status.
Local IP Address Displays the IP address that you entered in the (IP Address)
Local IP Address field while creating the subnet
extension.
Local Subnet Displays the name of the local subnet that the (Name of local subnet)
subnet extension uses.
Local Availability Zone (Only for Across Availability Zones type) (Name of the local
Displays the name of the local AZ that is hosting Availability Zone)
the subnet that is extended.
Remote Availability Zone (Only for Across Availability Zones type) (Name of the remote
Displays the name of the remote AZ that the Availability Zone)
subnet is extended to.
Remote Subnet (Only for Across Availability Zones type) (Name of remote subnet)
Displays the name of the remote subnet that the
subnet extension connects to.
Remote IP Address (Only for Across Availability Zones type) (IP Address)
Displays the IP address that you entered in the
Remote IP Address field while creating the
subnet extension.
Subnet Extension (properties) - (Only for To a Third Party Data Center type)
Local Gateway (Only for To a Third Party Data Center type) (Name of local gateway)
Displays the name of the local gateway used for
the subnet extension.
Remote Gateway (Only for To a Third Party Data Center type) (Name of remote gateway)
Displays the name of the remote gateway used
for the subnet extension.
You can perform the following actions from the Summary tab:
• View the detailed information of a subnet extension. For the list of available parameters, see the Subnet Extension
Details - Summary Tab Fields table above.
• Update an existing subnet extension by clicking Update. For more information, see Updating an Extended
Subnet on page 170.
• Delete an existing subnet extension by clicking Delete. For more information, see Removing an Extended
Subnet on page 170.
• MAC Address: This provides the MAC addresses of devices connected to the remote VTEP endpoint in the
subnet extension.
• Remote VTEP Endpoint: This provides the IP address of the remote VTEP endpoint in the subnet extension.
Throughput Tab
The Throughput tab provides a graphical representation of the throughput of the subnet extension.
Name Displays the name of the BGP session. (Name of BGP session)
Serviced VPC Displays the name of the VPC that the BGP (Name of VPC)
session services.
Local Gateway Displays the name of the local BGP gateway that (Name of local BGP
the BGP session uses. gateway)
Remote Gateway Displays the name of the remote BGP gateway (Name of remote BGP
that the BGP session uses. gateway)
Session Status Displays the status of the eBGP session. Established or Active
Route Priority Displays an integer number that denotes the (Integer Number)
route priority. When the route priority is assigned
dynamically, then the network controller assigns
integer numbers (usually between 600 and 800
starting with 700) in descending order with steps
of 5.
For example, the first session is assigned 700 as route
priority and then when you create the second session,
the controller assigns it a route priority of 695 and a
third session is assigned 690.
Greater the number, greater is the route priority. With
dynamically assigned priority, the priority is assigned
in the order of reducing priority to the order of BGP
sessions created. The BGP session created first gets
the highest priority 700, the second session get the
second highest priority 695 and so on.
You can manually assign a route priority as well by
assigning any number between 300 and 900.
You can perform the following actions for a gateway from the BGP Sessions page:
• Click the name of a BGP session to open the details page, which displays the detailed information about the BGP
session. For more information, see BGP Session Details View on page 94.
Name Filters based on the BGP session name. It returns a (BGP session name
list of BGP sessions that satisfy the name condition/ string)
string.
Session Status Filters based on the status of the eBGP session. (Established or Down)
Summary Tab
The Summary tab provides detailed information about the BGP session in widgets.
The BGP session Summary tab has the following widgets:
Properties widget
Session Status Displays the overall status of the BGP session. (Up or Down)
You can perform the following actions from the Summary tab:
• View the detailed information of a BGP session. For the list of available parameters, see the BGP Session Details
- Summary Tab Fields table above.
• Update an existing BGP session by clicking Update. For more information, see Updating a BGP session on
page 175.
• Delete an existing BGP session by clicking Delete. For more information, see Deleting a BGP session on
page 176.
Routes Tab
The Routes tab provides a list of the routes used by the BGP session with the corresponding Next Hop details. It has
the following lists:
• Advertised (default): The Routes tab opens in the Advertised list. The Advertised list provides a list of the
advertised routes with the corresponding Next Hop details.
• Received: This list provides list of the routes received from remote with the corresponding Next Hop details.
Security Policies
Security policies are defined using Nutanix Flow that provides a policy-driven security framework to inspect traffic
within the data center.
For information on how to create and apply security policies on Basic VLAN Subnets, see Flow Network Security
(formerly Flow Microsegmentation) Guide.
For information on how to create and apply security policies on (advanced) VLAN Subnets and Overlay Subnets, see
Flow Network Security Next-Gen Guide.
For information on how to view security policies in Prism Central, see Security Policies Summary View or
Security Policy Details View in the Prism Central Infrastructure Guide.
Security Dashboard
The Security Dashboard provides dynamic summary of the security posture across all registered clusters. The
Security Dashboard allows you to view the most critical security parameters like cluster-based issue summary, STIG
policy compliance, security hardening, and identified vulnerabilities. For more information, see Security Dashboard
in the Nutanix Security Guide.
VPC Workflow
You can deploy the following types virtual private clouds (VPCs) on a Nutanix cluster infrastructure to manage the
internal and external networking requirements using Flow Virtual Networking.
• VPCs: These are the VPCs that you create to isolate the groups of entities using overlay networks or subnets. This
is the default VPC type. For more information, see VPC in Essential Concepts on page 12.
• Transit VPC: This is a hub VPC that VPCs connect to using one or two (NAT or No-NAT) external networks as
spokes, in a a hub-and-spoke architecture to simplify the North-South connectivity. For more information, see
Transit VPC in Essential Concepts on page 12.
The workflow to create a complete network based on VPC is described below.
1. Create a VPC or a transit VPC: For more information, see Creating a Virtual Private Cloud on page 111.
2. Update an existing VPC or transit VPC: For more information, see Updating a Virtual Private Cloud on
page 126.
3. Add subnets to the VPC: For more information, see Creating a Subnet on page 115 to create a Subnet.
4. Update an existing subnet: For more information, see Updating a Subnet on page 128 to update a subnet.
5. Attach the subnet to VMs to VPCs: For more information, see Attaching a Subnet to a Virtual Machine on
page 119.
• Select Assign Static IP as the Assignment Type to add a static IP address as primary IP address of the VM,
when you attach a subnet to a VM.
• Select Assign with DHCP as the Assignment Type to allow DHCP to dynamically assign an IP address to the
VM.
• Select No Private IP as the Assignment Type if you do not want to assign an IP address to the vNIC of the VM.
For more information on attaching a subnet to a VM, see Creating a VM through Prism Central (AHV) in the
Prism Central Infrastructure Guide.
Note: You can configure secondary IP addresses only for VMs in an Overlay network.
Possible applications for secondary IP addresses include the following scenarios when you want to:
• Associate multiple floating IP addresses with one VM without creating multiple NICs (each with one primary IP
address) for the VM. You can assign one floating IP address to one secondary IP address that you create for the
single NIC. For information, see Requesting Floating IPs on page 114.
• Run appliances, such as load balancers, that have multiple IP addresses on each interface.
• Host applications in a High Availability (HA) configuration where the ownership of IP address moves from the
active entity to the standby entity when the active entity goes down.
• Host applications in a clustered configuration where the ownership of IP address follows the leader.
• Host Nutanix Files service in a VPC as a case of clustered application.
Note: In applications that use secondary IP addresses as virtual IP addresses and the NIC ownership of the secondary
IP address changes dynamically from one NIC to another, you must ensure that the ownership change is incorporated
in the applications' settings or configuration. A secondary IP address can only be assigned to one VM at a time. To
move the secondary IP address from the assigned VM to the another, first delete it from the assigned VM, then assign
it to another VM. If the applications do not incorporate these ownership changes, incorporate the changes manually to
ensure that the VPCs configured for such applications do not fail.
For information on configuring secondary IP addresses, see Creating Secondary IP Addresses on page 100.
IP Address Information
Click the See More link in the IP Address column in the VM details view to open the IP Address Information
dialog box. The IP Address Information dialog box displays the IP addresses configured on a VM
Note: The See More link in the IP Address column in the VM details view and the IP Address Information box are
available only if the VM has any secondary IP addresses configured.
Procedure
2. Select the Infrastructure application from Application Switcher Function, and navigate to Compute &
Storage > VMs from the Navigation Bar.
The VMs page opens displaying the List tab.
3. Select the checkbox associated with the VM that contains the vNIC for which you want to add a secondary IP
address.
5. Click Next.
The Resources tab opens.
7. Click the Edit icon for the subnet that you want to add the secondary IP addresses from.
The Update NIC window opens.
8. Check the Add Secondary IPs checkbox in the Update NIC window.
9. Add a comma-separated list of the secondary IP addresses that you want to add to the vNIC of the VM.
Note:
Ensure that the secondary IP addresses are within the same subnet that the primary IP address of the
NIC is from. The subnets are displayed in the Private IP Assignment section in the Update NIC
window.
Ensure that the secondary IP address is not the same as the IP address provided in the Private IP
Assignment field.
11. Click Next on the Resources and the Management tabs of the Update VM page.
If you need to make any other changes on the Resources and the Management tabs for any configurations other
than adding secondary IP addresses, make the changes and then click Next on these tabs.
What to do next
You can view the secondary IP addresses configured on the VM in the IP Address Information box.
Procedure
2. Select the Infrastructure application from Application Switcher Function, and navigate to Compute &
Storage > VMs from the Navigation Bar.
The VMs page opens displaying the List tab.
3. Click the target VM for which you want to assign a secondary IP address.
The VM details page opens displaying the Summary tab.
Parameter Description
<interface> The interface of the VM such as eth0. You can provide
subinterfaces such as eth0:1 and eth0:2.
<secondary IP address> The secondary IP address that you created and want to
associate with the interface.
<network mask> The network mask that is an expansion of the network
prefix of the network that the secondary IP address
belongs to. For example, if the secondary IP address
belongs to 10.0.0.0/24 then the network mask is
255.255.255.0.
7. Repeat the aforementioned steps for all the secondary IP addresses you want to associate with interfaces on the
VM.
Procedure
» Click Request Floating IP. In the Assign Floating IPs section of the Request Floating IP window, assign
floating IP addresses.
To assign floating IP addresses while requesting for them, you must have the secondary IP addresses
configured and ready when you are requesting the floating IP addresses.
» In the Floating IPs page, select the checkbox associated with the floating IP address you want to assign. Click
the Update option in the Actions dropdown menu.
Assign the secondary IP addresses you configured to the floating IP addresses you have.
• Migration of VMs between VLAN Basic Subnet and VPC Subnets on page 102
• Migration of VLAN Basic Subnets on page 107
Note: Flow Virtual Networking supports migration of VMs protected by protection policies from VLAN Basic
networks to VPC subnets.
Migration Types
There are two types of migrations that you can select in the migration workflow.
• Cold Migration. For this type of migration, the incoming and outgoing connection configurations are not
preserved. External connectivity for the subnet is irrelevant since the connections are not preserved.
If the source subnet is a managed subnet, the network ID and gateway is automatically populated based on the
cluster and subnet selection. If the source subnet is not a managed subnet, specify the network ID and the gateway.
In both the above cases, the network ID and gateway of both the source and target networks must be the same. For
example, if the network ID and gateway of the source are 10.10.10.0/32 and 10.10.10.1/32 then the target
subnet must have 10.10.10.0/32 and 10.10.10.1/32 as the network ID and gateway. If the network ID and
gateway are not the same then Prism central displays an error.
• During and after migration, you need to establish a subnet extension with Layer 2 connectivity between the
two migrating subnets.
For more information on virtually extending a subnet at layer 2, see Layer 2 Network Extension on
page 153.
• The external connection for the VPC must have NAT.
• The network ID and gateway of both the source and target networks must be the same. For example, if the
network ID and gateway of the source are 10.10.10.0/32 and 10.10.10.1/32 then the target subnet must
have 10.10.10.0/32 and 10.10.10.1/32 as the network ID and gateway. If the network ID and gateway
are not the same then Prism central displays an error.
• You cannot migrate a VM with multiple vNIC. This is because a VM with vNICs in Acropolis and the Network
Controller at the same time are not supported for migration. Therefore, ensure that the VM you want to migrate
between VLANs and VPCs do not have multiple vNICs.
• You cannot migrate a VM which has a single vNIC with multiple IP addresses. Therefore, ensure that the VM you
want to migrate between VLANs and VPCs has a single vNIC with a single IP address.
• You cannot perform cross-cluster live migration of VMs which are attached to Flow Network Security policies.
• Ensure that the IP addresses of the migrating VMs does not conflict with the IP addresses used by the VMs
existing in the destination subnet. If you migrate a VM with conflicting IP address (in other words, an IP address
that already belongs to another VM in the destination subnet) then an error is displayed and the migration fails for
that VM.
Procedure
2. Select the Infrastructure application from Application Switcher Function, and navigate to Network &
Security > Subnets from the Navigation Bar.
The Subnets page opens displaying the List tab.
3. Select the VLAN subnet that you want to migrate. Click Migrate.
5. On the Migrate VMs between VLAN Network and VPC Network page, select the Migration Type from
the drop-down list.
You can select one of the following migration types:
• Cold Migration. For this type of migration, the incoming and outgoing connection configurations are not
preserved.
• Live Migration without incoming connections. For this type of migration, only outgoing connection
configurations for the migrating VMs are preserved.
For more information, see Migration of VMs between VLAN Basic Subnet and VPC Subnets on
page 102.
6. To migrate VMs from VLAN to VPC, complete the configurations provided in the table and click Next.
You can also migrate VMs from VPC to VLAN.
Note: Click Swap Source and Destination link to toggle between Migrate VMs from VLAN to VPC and
Migrate VMs from VPC to VLAN.
Figure 19: Migrate VMs from VLAN Network to VPC Network - Configuration
Gateway IP Enter (for unmanaged networks) the Gateway IP address of the source
Gateway IP address with prefix in subnet. Use CIDR notation.
CIDR notation.
For example, 10.10.10.1/32.
When you select a managed subnet in
Subnet (VLAN) the Gateway IP
value is automatically populated.
IPAM (Display only) The IPAM status is displayed when Displays Managed
you select a managed subnet in the
Subnet (VLAN) parameter.
Destination Subnet
VPC Select the VPC that you want to VPC name (String)
migrate the VM to.
Subnet (Overlay) Select the Overlay subnet in the Name of the Overlay subnet
selected VPC that you want to
migrate the VM to.
Network Address/Prefix Enter (for unmanaged networks) the IP address of the source subnet. Use
network IP address with prefix in CIDR notation.
CIDR notation.
For example, 10.10.10.0/32.
When you select a managed subnet
in Subnet (VLAN) the Network
Address/ Prefix
Gateway IP Enter (for unmanaged networks) the Gateway IP address of the source
Gateway IP address with prefix in subnet. Use CIDR notation.
CIDR notation.
For example, 10.10.10.1/32.
When you select a managed subnet in
Subnet (VLAN) the Gateway IP
value is automatically populated.
IPAM (Display only) The IPAM status is displayed when Displays Managed
you select a managed subnet in the
Subnet (VLAN) parameter.
Important:
For Migrate VMs from VPC to VLAN provide the configurations provided in the table, with the
following differences.
• For Source Subnet, provide the VPC parameters which is the source.
• For Destination Subnet, provide the VLAN parameters which is the source.
For Migrate VMs from VPC to VLAN, the Source and destination subnets are reversed.
The selected VM or VMs are displayed on the Destination side of the tab.
You can select the migrating VM (Added on the Destination side) and click Assign New IP to assign a new
IP address to the migrating VM after migration.
Note: The IP address of the migrating VM is persisted after migration if the existing IP address is available in
the destination subnet. If you migrate a VM with conflicting IP address (in other words, an IP address that already
belongs to another VM in the destination subnet) then an error is displayed on the Migrate tab.
When the migration process is complete, the Migrate tab displays the status of the migration. It displays any
errors that may have occurred during migration, the reason for failure of any VM migration.
When the status changes to Migration Completed Successfully with date and time stamp, the Migration
Summary of VM table is displayed. You can filter the Migration Summary of VM by status using the status
drop-down. There are three states: Completed, Failed and Pending. Usually, the Migration Summary of VM
does not appear when the migration state of any migrating VM is Pending. Therefore, you may not find any VM
listed with Pending state in the summary. A VM migration with pending state is displayed in Tasks.
Figure 22: Migrate VMs from VLAN Network to VPC - Migration status
8. Click Close to close the Migrate VMs between VLAN Network and VPC Network window after migration
is complete and successful.
What to do next
You can view the migration history on the Subnets dashboard by clicking Migrate > View Migration
History. The migration history table displays several attributes of the migration tasks including Status of
the migration tasks and the Duration taken by the migration task to complete.
Migration Process
The migration process involves migrating one subnet at a time. It locks the VLAN Basic subnet on AHV and creates
a corresponding VLAN Subnet on Prism Central with the same UUID and properties or attributes as the VLAN Basic
Subnet. Next, the migration process updates and migrates all the vNICs to the VLAN Subnet. After all the vNICs are
migrated to the VLAN Subnet, the VLAN Basic Subnet on AHV is deleted.
Since the migration process retains the UUID of the VLAN Basic Subnet, any automations that use UUIDs are
protected from impact. The MAC addresses of the vNICs are also preserved after migration, thus reducing any impact
to configurations and automations that use these MAC addresses.
The Prism Central VM vNICs must always remain on a VLAN Basic Subnet. Therefore, when you migrate a VLAN
Basic Subnet that hosts Guests VMs and Prism Central VMs, the Prism Central VMs vNICs are migrated to a newly
created VLAN Basic Subnet on AHV host. The Prism Central VM is not migrated even if it is configured in the
VLAN Basic Subnet that is marked for migration.
Note: Migration is irreversible. You must create a VLAN Basic subnet and move the vNICs to that Subnet if you want
to use a VLAN Basic Subnet for vNICs that were previously migrated to a VLAN Subnet.
The migration process includes a pre-check that ascertains if all the necessary conditions for migration are met.
Note: Before you migrate a VLAN Basic Subnet to VLAN Subnet, migrate the attached FNS policy to FNS Next-
Gen on the Security Policies page.
• The migration pre-check determines whether the number of vNICs or subnets included in the migration is within
the scale numbers specified in vNIC Scale in Network Types on page 38.
• The migration pre-check determines whether the VLAN Basic Subnet to be migrated is associated with a Virtual
Switch. VLAN Basic Subnets that do not have a Virtual Switch reference cannot be migrated.
For more information on virtual switches and how to change the virtual switch that the VLAN Basic Subnet is
attached to, see Virtual Switch Management in the AHV Administration Guide.
Procedure
2. Select the Infrastructure application from Application Switcher Function, and navigate to Network &
Security > Subnets from the Navigation Bar.
The Subnets page opens displaying the List tab.
3. Click Migrate.
6. On the Add Subnets to migration page, from the list of subnets, select the check boxes for the VLAN Basic
Subnets that you need to migrate.
Click Add.
7. On the VLAN Basic to VLAN Migration page, click Begin Migration to start the migration process.
The Migrate (x) VLAN Subnet(s)? tab displays a message about the temporary downtime, that migration
cannot be aborted or paused and that migration of other subnets cannot begin until this migration process is
completed.
Click Migrate.
8. On the Migrating (x) Subnets tab displays the progress of the migration.
When the migration process is complete, the Migrating (x) Subnets tab displays the status of the migration. It
displays any errors that may have occurred during migration, the reason for failure of any VM migration.
You can filter the list of migrated VLANs using the drop-downs and filters in the table of migrated VLANs.
9. Click Close to close the VLAN Basic to VLAN Migration window after migration is complete and successful.
What to do next
You can view the migration history on the Subnets dashboard by clicking Migrate > View Migration
History.
Note: If you see that the migration of any of the VLAN Basic Subnets has failed, initiate the migration for those
VLAN Basic Subnets again by following all the above steps in this procedure.
VPC Management
This section provides information and procedures that you need to manage virtual private clouds (VPCs),
subnets, routing policies, and static routes.
A Virtual Private Cloud (VPC) is an independent and isolated IP address space that functions as a logically isolated
virtual network. A VPC could be made up of one or more subnets that are connected through a logical or virtual
router. VPCs allow you to manage the isolated and secure virtual network with enhanced automation and scaling. The
isolation is done using network namespace techniques like IP-based subnets or VLAN based networking.
Flow Virtual Networking supports the following two types of VPCs.
VPC
The default VPC type that is referred to as VPC in this documentation is the one you create to isolate selected
subnets of connected VMs. This is also called as User VPC or Guest VPC, specifically referred to as VPC.
The other VPC type is transit VPC, specifically referred to as transit VPC in this documentation.
Transit VPC
Overlay External Subnet for Transit VPCs
• You can only use a VLAN based network for the uplink (external connectivity) for a transit VPC. In other
words, a transit VPC cannot be connected to another transit VPC.
• You can configure an Overlay subnet with external connectivity in transit VPC. When you create an
Overlay external subnet, the workflow provides only transit VPCs in the VPC dropdown menu.
• You can configure an Overlay subnet with external connectivity (Overlay external subnet) with options
such as NAT or NONAT (NAT being default) and necessary gateways for the NAT or No-NAT option.
Procedure
2. From Application Switcher Function, select the Infrastructure application and navigate to Network &
Security > Virtual Private Clouds from the Navigation Bar.
The Virtual Private Clouds page opens displaying the List tab.
Transit VPC toggle switch Toggle the Transit VPC toggle switch to Yesif you want to create a
transit VPC instead of a regular VPC. For more information, see Virtual
Private Cloud Management on page 98 for information about the
difference between a VPC and a transit VPC.
External Connectivity This section lets you Associate External Subnets for the VPC.
A subnet with external connectivity (External Subnet) is required if the
VPC needs to send traffic to a destination outside of the VPC.
External Connectivity > External Subnet Displays the name of the external subnet that is associated with the VPC.
External Connectivity > Destination Displays the prefixes for which this external subnet is used as the next
Prefixes hop. The selection is based on the longest prefix match.
External Connectivity > SNAT IP / Displays the SNAT IP or Router IP addresses that the IPs assigned to
Router IP the VPC router in the external subnet. It is used as SNAT IP in case of
NAT external subnet. These addresses would be used by the physical
network router as the next hop for all the networks reachable inside the
VPC using a No-NAT external subnet.
External Connectivity > Actions Displays the actions (as icons) that you can perform on the external
subnet. The actions listed are: Edit and Delete
Associate External Subnet button Click the Associate External Subnet button to display the
Associate External Subnet window which allows you to configure
the external subnet parameters.
Associate External Subnet window details
Associate External Subnet > Subnet Select the type of subnet that you have configured as the external subnet.
Type The types you can select from are VLAN being the VLAN subnet and
Overlay subnets
Associate External Subnet > External Select an external subnet from the drop down list. By associating the
Subnet VPC with the external subnet you can provide external connectivity to
the VPC.
When you select the external subnet, the details of the subnet like
Network Address/Prefix, NAT-ed (which displays the NAT status of
the subnet as Yes or No, and (for only VLAN type subnet) VLAN ID of
the VLAN External Subnet are displayed in a table below the External
Subnet dropdown list field.
External Gateway Configuration > Displayed only when you select a NAT or no-NAT VLAN external
Number of Active Hosts subnet from the Associate External Subnet > External Subnet
dropdown menu)
Select the number of NAT or no-NAT gateways required You can select
up to four gateways. The default number of gateways or active hosts is
pre-selected as two.
NAT or no-NAT gateway services are deployed on existing AHV
hosts in the cluster with the external subnet. For more information, see
NAT and No-NAT Gateway Scaleout on page 136 and Essential
Concepts on page 12.
Domain Name Servers (DNS) (Optional) DNS is advertised to Guest VMs via DHCP. This can be
overridden in the subnet configuration.
Click + Server IP to add DNS server IPs under IP Address and click
the check mark.
You can Edit or Delete an IP address you added using the options
under Actions.
5. Click Create.
• A floating IP (for example, FIP1) is configured on, for example, port 22.
• Load balancing is configured to use the same port, for example, port 22.
• A floating IP (for example, FIP2) is configured for load balancing to reach the guest VM from outside the VPC.
• The private IP address that is normally assigned to the guest VM within the VPC.
Procedure
2. Select the Infrastructure application from Application Switcher Function, and navigate to Network &
Security > Floating IPs from the Navigation Bar.
The Floating IPs page opens displaying the List tab.
Note: Clear the Assign Floating IPs checkbox if you want to assign the requested IP addresses after you receive
it. For more information, see Floating IPs Summary View on page 80.
Number of Floating IPs Enter the number of Floating IPs you want to request. You can request a maximum
of 50 floating IP addresses.
Define Custom Floating IPs Select this check box if you want to select specific IP addresses from the IP address
pool range of the external subnet.
When you select the check box, the Enter Floating IPs to be requested field is
displayed below the check box text. Enter the specific IP addresses that you want to
request as Floating IPs in this field.
Assign Floating IPs Select this check box if you want to assign the Floating IPs to specific VMs in the
table.
Based on the number you entered in the Number of Floating IPs field, the system
provides an equivalent number of rows of Search VMs and IP Address in the table.
Under Search VMs, select the VM to which you want to assign a floating IP
address. Under IP Address, select the IP address on the VM (primary or secondary
IP address) to which you want to assign the floating IP.
You can assign multiple floating IP addresses to multiple secondary IP addresses
that you can create on the NIC of the VM.
For information on configuring secondary IP addresses, see Creating Secondary
IP Addresses on page 100.
5. Click Save.
What to do next
When you receive the floating IP address you requested, you can see it, assign it (if not already assigned
while requesting) or delete it in the Floating IPs view.
Creating a Subnet
Procedure
Note: Provision any single VLAN ID either in the AHV network stack or in the Flow
Virtual Networking (brAtlas) networking stack. Do not use the same VLAN ID in
both the stacks.
IP Address management (Mandatory for Overlay type subnets) This section provides the Network IP Prefix
and Gateway IP fields for the subnet.
(Optional for VLAN type subnet) Select this checkbox to display the Network IP
Prefix and Gateway IP fields and configure the IP address details.
Clearing this checkbox hides these fields. In this case, it is assumed that this virtual
LAN is managed outside the cluster.
Note: The DHCP Settings option is only available for VLAN subnets if you select
this option.
DHCP Settings (Optional for both VLAN and Overlay subnets) Select this checkbox to display fields
for defining a domain.
Selecting this checkbox displays fields to specify DNS servers and domains. Clearing
this checkbox hides those fields.
For more information, see Setting the DHCP Options on page 118.
Cluster (VLAN subnet (VLAN subnet only) This option is available only for VLAN subnet configuration.
only) Select the cluster that you want to assign to the subnet.
Note:
NAT (Option under External Connectivity) If you turn on the External Connectivity
toggle switch, you can choose whether to connect to external networks with or without
enabling NAT. Select the NAT checkbox to enable NAT for external connectivity for
VPCs.
Virtual Switch (VLAN subnet only) Select the virtual switch that is configured for the VLAN you
selected. The default value is the default virtual switch vs0. This option is displayed
only if you add a VLAN ID in the VLAN ID field.
VPC (Overlay subnet only)
Select the Virtual Private Cloud (VPC) that you want to assign to the subnet from the
drop down list.
You can create VPCs and assign them to Overlay subnets.
IP Address Pool Defines a range of addresses for automatic assignment to virtual NICs.
This field is optional for both VLAN and Overlay. For VLAN, this field is displayed
only if you select the IP Address Management option.
Note: Configure this field for VLAN or Overlay to complete the creation of the VPC,
if you do not need external connectivity for this subnet. You must configure this field
only if you need external connectivity for this subnet.
Click the Create Pool button and enter the following in the Add IP Pool page:
• Enter the starting IP address of the range in the Start Address field.
• Enter the ending IP address of the range in the End Address field.
• Under Actions, click the check mark to submit the starting and ending IP addresses
you entered.
Click the X mark to remove the entries.
Advanced Configuration (VLAN subnet only) Select the VLAN Basic Networking checkbox to create the
—VLAN Basic Basic VLAN on AHV networking (see Basic VLANs or VLAN Basic Subnet in
Networking Essential Concepts on page 12 and Network Types on page 38).
4. Click Create.
Procedure
Domain Search Enter a comma separated list of domain names. Use only the domain name
format.
Domain Name Enter the domain name in the domain name format.
Example: nutanix.com
TFTP Server Name Enter a valid TFTP host server name of the TFTP server where you host the host
boot file. The IP address of the TFTP server must be accessible to the virtual
machines to download a boot file.
Example: tftp_vlan103
• (Optional and for VLAN networks only) Check the Override DHCP Server dialog box and enter an IP address
in the DHCP Server IP Address field.
You can configure a DHCP server using the Override DHCP Server option only in case of VLAN networks.
The DHCP Server IP address (reserved IP address for the Acropolis DHCP server) is visible only to VMs
on this network and responds only to DHCP requests. If this box is not checked, the DHCP Server IP
Address field is not displayed and the DHCP server IP address is generated automatically. The automatically
generated address is network_IP_address_subnet.254, or if the default gateway is using that address,
network_IP_address_subnet.253.
Usually the default DHCP server IP is configured as the last usable IP in the subnet (For eg., its 10.0.0.254 for
10.0.0.0/24 subnet). If you want to use a different IP address in the subnet as the DHCP server IP, use the override
option.
Procedure
2. Select the Infrastructure application from Application Switcher Function, and navigate to Compute &
Storage > VMs from the Navigation Bar.
The VMs page opens displaying the List tab.
3. Select the VM you want to attach a subnet to, and click Update from the Actions dropdown menu.
The Update VM page opens displaying the Configuration tab.
4. Click Next.
The Resources tab opens.
Creating a Policy
Procedure
2. Select the Infrastructure application from Application Switcher Function, and navigate to Network &
Security > Virtual Private Clouds from the Navigation Bar.
The Virtual Private Clouds page opens displaying the List tab.
3. Click the name of the VPC for which you want to create a policy.
The Summary tab opens displaying the detailed information about the VPC in widgets.
The following table describes the fields that appear in the Create Policy window.
Note:
Source Subnet IP Only required if you selected the Source as Custom. Provide the None
subnet IP and prefix that you want to designate as the source for
the policy. Use the CIDR notation format to provide the subnet
IP. For example, 10.10.10.0/24.
Destination The destination is the destination IP or subnet for which you Any
want to set the priority.
Destination can be:
Destination Subnet IP Only required if you selected the Destination as Custom. None
Protocol You can also set the priority of the policy for certain protocols. Any
Select one of the following options:
Protocol Number This field is displayed only if you select Protocol Number None
as the value in the Protocol field. The number you provide
must be the IANA designated number that indicates respective
protocol. For more information, see IANA Protocol Numbers.
Deny The Deny action denies traffic and service based on the
parameters set.
Note: You can apply the Forward action only if you have
installed or upgraded the Network Controller to version 3.0.0
or later for the respective Prism Central version pc.2023.3 or
later.
7. Click Create.
Procedure
3. Click the name of the VPC for which you want to create a static route.
The Summary tab opens displaying the detailed information about the VPC in widgets.
8. Click Save.
Procedure
2. From Application Switcher Function, select the Infrastructure application and navigate to Network &
Security > Virtual Private Clouds from the Navigation Bar.
The Virtual Private Clouds page opens displaying the List tab.
3. Select the checkbox associated with the VPC you want to update, and click Update from the Actions dropdown
menu.
The Update VPC window opens.
Note: You cannot update the Associate External Subnet > Number of Active Hosts, in other words, the
number of No-NAT gateways selected for the VPC.
To update the Number of Active Hosts for the already selected external, No-NAT VLAN network, do the
following.
Important: You cannot edit or update the subnet type. For example, if the subnet type is already configured as VLAN,
you cannot modify it to an Overlay type subnet.
Procedure
2. From Application Switcher Function, select the Infrastructure application and navigate to Network &
Security > Subnets from the Navigation Bar.
The Subnets page opens displaying the List tab.
3. Select the checkbox associated with the subnet you want to update, and click Update from the Actions
dropdown menu.
The Update Subnet window opens.
5. Click Update to ensure that the updates are saved in the configuration.
Category Management
A category is a key-value pair that groups similar entities. Associating a policy with a category ensures that the policy
applies to all the entities in the group regardless of how the group scales with time. For example, you can associate
a group of VMs with the Department: Marketing category, where Department is a category that includes a value
Marketing along with other values such as Engineering and Sales.
Currently, you can associate only VMs with a category. Categories are implemented in the same way on on-premises
Prism Central instances. For information on configuring categories, see the Prism Central Infrastructure Guide.
Updating a Policy
Procedure
2. Select the Infrastructure application from Application Switcher Function, and navigate to Network &
Security > Virtual Private Clouds from the Navigation Bar.
The Virtual Private Clouds page opens displaying the List tab.
3. Click the name of the VPC for which you want to update the policy.
The Summary tab opens displaying the detailed information about the VPC in widgets.
7. Click Update.
Procedure
2. Select the Infrastructure application from Application Switcher Function, and navigate to Network &
Security > Virtual Private Clouds from the Navigation Bar.
The Virtual Private Clouds page opens displaying the List tab.
3. Click the name of the VPC for which you want to update a static route.
The Summary tab opens displaying the detailed information about the VPC in widgets.
Note: You must configure the default route (0.0.0.0/0) to the external subnet as the next hop for connectivity
outside the cluster (north-south connectivity).
For details about the fields that you can update, see Creating Static Routes on page 125.
7. Click Save.
Important: Prism Central does not allow you to delete a VPC if the VPC is associated with any subnets and/or VPNs.
You can delete the VPC after you remove all the subnets or VPN associations from the VPC.
Procedure
2. Select the Infrastructure application from Application Switcher Function, and navigate to Network &
Security > Virtual Private Clouds from the Navigation Bar.
The Virtual Private Clouds page opens displaying the List tab.
Procedure
2. Select the Infrastructure application from Application Switcher Function, and navigate to Network &
Security > Virtual Private Clouds from the Navigation Bar.
The Virtual Private Clouds page opens displaying the List tab.
3. Click the name of the VPC for which you want to delete an entity.
The Summary tab opens displaying the detailed information about the VPC in widgets.
5. Select the checkbox associated with the entity you want to delete, and click Delete from the Actions dropdown
menu.
Procedure
2. Select the Infrastructure application from Application Switcher Function, and navigate to Network &
Security > Network Services from the Navigation Bar.
The Network Services dashboard opens in the Network Load Balancer tab by default.
4. Enter the appropriate information for the attributes of the load-balancer session, on the Create Load Balancer
Session page.
The creation visualizer:
The visualizer on the right sidebar of the Create Load Balancer Session page allows you to visualize the
configuration of various entities involved in the creation of a load-balancer session. The values entered or selected
for the attributes on the Create Load Balancer Session page are automatically incorporated in the visualizer,
thus providing an updated view of the creation process.
The visualizer is statically placed such that it is available on all the tabs of the Create Load Balancer Session
page.
For information on the fields in the Create Load Balancer Session page, see
General tab
Name Provide a name for the load-balancing session.
Description Provide a description of the load-balancer.
VPC Select the VPC from the dropdown list. The
selected VPC is the client VPC for the load-
balancer session. The load-balancer session
distributes the traffic of the selected VPCs.
Listener Tab
Traffic Filtering
This section lets you configure the filtering parameters for the load-balancer listener.
Virtual IP Assignment
This section lets you configure the subnet and the IP address for the load-balancer listener service. The IP address
assigned to the listener is the virtual IP address of the load-balancer session.
External Connectivity
This section lets you configure the external connectivity for the load-balancer if it is an external load-balancer.
Target VM NICs
The widget displays an Add button. Click Add to display the open the Add Target VM NICs dialog box.
Add Target VM NICs In the VM list, select the checkboxes for the required
VMs. The load-balancer uses the selected VMs as target
(backend) VMs for load balancing.
Click Add.
Health Check
This section lets you configure the health check attributes listed below. The health check attributes are pre-
configured with default values. The health check is run for the target VM configured in the preceding section.
Check Run Every Provides the time interval (in seconds) between
subsequent health check runs.
Click the up or down arrow to increase or decrease the
health check run time interval respectively. You can also
enter the time interval directly.
The default check run time interval is five seconds.
Timeout After Provides the timeout interval (in seconds) when the
health check run times out and fails.
Click the up or down arrow to increase or decrease the
timeout for the health check run, respectively. You can
also enter the timeout time directly.
The default timeout interval is two seconds.
Marked Unhealthy After Provides the number of consecutive failed health check
runs necessary for the target VM to be marked as
healthy.
The default number of consecutive failed health runs (or
consecutive failures) is three.
Procedure
2. Select the Infrastructure application from Application Switcher Function, and navigate to Network &
Security > Network Services from the Navigation Bar.
The Network Services dashboard opens in the Network Load Balancer tab by default.
3. Select the checkbox associated with the load-balancer session you want to update, and click Update from the
Actions dropdown menu.
The Update Load Balancer Session window opens.
5. Click Update Session to ensure that the updates are saved in the configuration.
2. Select the Infrastructure application from Application Switcher Function, and navigate to Network &
Security > Network Services from the Navigation Bar.
The Network Services dashboard opens in the Network Load Balancer tab by default.
3. Select the checkbox associated with the load-balancer session you want to delete, and click Delete from the
Actions dropdown menu.
The Delete <load-baancer-session-name> window opens and displays the following message:
This action will delete the load-balancer session and associated target mappings. Any
active sessions would be terminated.
5. Click Update Session to ensure that the updates are saved in the configuration.
Note:
You can enable network segmentation on a Layer 2 Network Extension (or extended subnet) that does not
have a gateway. For more information on Layer 2 Network Extensions, see Layer 2 Network Extension
on page 153. For more information, see Segmenting a Stretched L2 Network for Disaster Recovery in the
Securing Traffic through Network Segmentation topic of the Nutanix Security Guide.
The Layer 2 Network Extension is also known as Layer 2 Stretch.
• For information on network gateways and their management, see Network Gateway Management on
page 136.
• For information on virtual private network connections, see Virtual Private Network Connections on
page 145.
• For information on Layer 2 Network Extensions, see Layer 2 Network Extension on page 153.
• For information on Border Gateway Protocol (BGP) sessions, see Border Gateway Protocol Sessions on
page 171.
Warning:
• Ensure that you add static routes to the NAT network for Prism Central, Network Time Protocol (NTP),
Domain Name System (DNS), and other peer VPN, VTEP, or BGP IP addresses, when you deploy
network gateways for VPN, VTEP, or BGP in a VPC with the following conditions:
• The network gateways are connected to both NAT and no-NAT external networks.
• The no-NAT network is the default next hop.
Without these static IP configurations, the peer gateways on the assigned floating IP addresses cannot
reach the network gateways and their status is displayed as Down in Prism Central.
• Connectivity to NTP servers at time.google.com and DNS at 8.8.8.8 is mandatory for the network
gateway VM to become active. If you do not have access to these resources, the status of the network
gateway is displayed as Down. If you cannot open access to these services on the Internet, contact
Nutanix support to change the DNS and NTP server configuration of the network gateway VM.
Note: You can create one network gateway with only one service such as VPN, VXLAN or BGP. The same network
gateway cannot host two services at the same time. Once you create a network gateway with one service, you cannot
change the service. For example, if you create a network gateway with BGP service, you cannot change it to VPN
service after the network gateway is created.
You can create multiple network gateways for a VPC. Since a VPC is configured only on a Prism Central, the VPC is
available to all the clusters registered to that Prism Central.
Note:
A best practice is to configure the remote gateway before you configure the local gateway especially when
the gateway configuration involves entering unique parameters like eBGP ASNs in the local and remote
gateways.
• (Local only) Gateway VM which the network gateway appliance deploys when you create the local network
gateway.
• Service Configuration where you configure the service that you want the (local and remote) gateway to use, like
VPN service, VTEP (VXLAN) service or BGP service.
Perform the following steps to create a VPN, VTEP or BGP service gateway.
Procedure
2. Select the Infrastructure application from Application Switcher Function, and navigate to Network &
Security > Connectivity from the Navigation Bar.
The Gateways page opens displaying the list of network gateways you have created and configured, and the
operations you can perform on the network gateways.
VM Deployment
Name Enter a name for the network gateway. (Name)
Gateway Attachments (for Local gateway type only) Select the gateway (VLAN or VPC)
attachment as VPC or VLAN. The VPN VM is deployed
on a VPC VM or a cluster that has the selected VLAN
respectively.
1. If you select VPC, then VPC Attachment is
displayed. VPC is the default value for the Gateway
Attachments field. The Gateway VM is deployed on
the cluster and associated with the VPC selected in the
VPC Attachment section.
Subnet Select the subnet you want to attach the Gateway VM to, (Name of the VLAN subnet)
from the drop down list.
Redistribute (VLAN only) Select this checkbox to enable the (Check mark or blank)
Connected Routes redistribution of connected routes into the eBGP.
(Applicable only if
VLAN type gateway
attachment is selected)
Note: Make sure that this ASN does not conflict with
any of the other on-premises BGP ASNs.
eBGP Password (For eBGP in Local gateway type only) Enter the eBGP Password: The password
password for the eBGP route. must be between 1 and 80
characters.
• a-z
• A-Z
• 0-9
• ~!@#%^&*()_-
+=:;{}[]|<>,./?
$
• Password length:
Minimum 1 and
maximum 64
characters.
• Characters allowed for
BGP passwords
• a-z
• A-Z
• 0-9
• ~!@#%^&*()_-
+=:;{}[]|<>,./?
$
• Password length:
Minimum 1 and
maximum 80
characters.
VPN Service Configuration - Internal Routing Configuration (This section is available for VLAN attachment type
only.)
+Add Prefix (For Static routing selected in Routing Protocol) Click (prefix like /24)
(Applicable to Static this to enter a Local Prefix and click the check mark under
routing) Actions to add the prefix.
If you click the X mark under Actions, the local prefix
you entered is not added.
The prefixes you add are advertised to all the connected
peers via eBGP.
The prefix must be a valid IP address with the host bits not
set.
You can add multiple local prefix IP addresses.
Area ID (Applicable to (OSPF only) Enter the OSPF area ID in the IPv4 address (IPv4 address format)
OSPF protocol) format.
Password Type (OSPF only) Select the password type you want to set for (Password)
the OSPF route. The options are:
1. MD5: Select this option to encrypt the packets with
MD5 hash that can be decrypted with the MD5
password at the destination.
2. Plain Text: Select this option to set a clear-text
password.
3. None: Select this if you do to set an open route without
password protection
• a-z
• A-Z
• 0-9
• For Plain Text: The password must be 1-8 characters
long.
Characters allowed for OSPF passwords (Plain text): a-
z.
Peer IP (for iBGP) Enter the IP Address of the On-prem router used to (IP Address)
exchange routes with the network gateway.
Password Enter a password with 1-80 characters. (Password)
Note: Make sure that this ASN does not conflict with
any of the other local or remote BGP ASNs.
Once you enter the ASN, you cannot change the
ASN using the Update Gateway page.
eBGP ASN (Only (For eBGP only) Enter the ASN for your on-premises (Number)
available if eBGP gateway. If you do not have a BGP environment in
routing protocol is your on-premises site, you can choose any number. For
selected) example, you can choose a number in the 1-65000 range.
Note: Make sure that this ASN does not conflict with
any of the other on-premises BGP ASNs.
Note: Make sure that this ASN does not conflict with
any of the other on-premises BGP ASNs.
5. Click Create.
The gateways you create are displayed in the Gateways page.
2. Select the Infrastructure application from Application Switcher Function, and navigate to Network &
Security > Connectivity from the Navigation Bar.
The Gateways page opens displaying the list of network gateways you have created and configured, and the
operations you can perform on the network gateways.
3. Select the checkbox associated with the gateway you want to update, and click Update from the Actions
dropdown menu.
The Update Gateway window opens.
Note: You cannot modify some parameters. Such parameters are greyed and in-actionable. If you need to modify
such parameters, consider creating a new gateway with the appropriate parameters and deleting the current gateway.
5. Click Save.
Important: You must first delete all the VPN or VTEP connections, BGP sessions or subnet extensions associated
with the gateway to be able to delete a network gateway.
Procedure
2. Select the Infrastructure application from Application Switcher Function, and navigate to Network &
Security > Connectivity from the Navigation Bar.
The Gateways page opens displaying the list of network gateways you have created and configured, and the
operations you can perform on the network gateways.
3. Select the checkbox associated with the gateway you want to delete, and click Delete from the Actions
dropdown menu.
VPN Workflow
If you need to connect one Nutanix deployment in one site to another deployment in a different site, you can create a
VPN endpoint in each of the sites. A VPN endpoint consists of a local VPN gateway, remote VPN gateway and VPN
connection. You can configure multiple VPN endpoints for a site.
Each endpoint must have configurations for a local VPN gateway, remote VPN gateway (pointer information for the
peer local VPN in the remote site endpoint) and a VPN connection (connecting the two endpoints). Then, based on
the VPN connection configuration as initiator or acceptor, one endpoint initiates a tunnel and the endpoint at the other
end accepts the tunnel connection and, thus, establishes the VPN tunnel.
1. Gateways: Every VPN endpoint for each site consists of two VPN gateway configurations - Local and Remote.
Local gateway is a VM that runs the VPN protocols (IKEv2, IPSec) and routing (BGP and OSPF). Remote
gateway is a pointer - database entry - that provides information about the peer remote VPN endpoint. One of
the key information contained in the remote gateway is the source IP of the remote VPN endpoint. For security
reasons, the local VPN gateway will accept IKEv2 packets originating only from this Source IP.
VPN gateways are of the following types:
• On premises Nutanix VPN Gateway: Represents the VPN gateway appliance at your on-premises local or
remote site if you are using the Nutanix VPN solution.
• On premises Third Party Gateway: Represents the VPN gateway appliance at your on-premises site if you are
using your own VPN solution (provided by a third-party vendor).
To configure third party VPN Gateways, see the relevant third party documentation.
2. VPN Connection: Represents the VPN IPSec tunnel established between local gateway and remote gateway.
When you create a VPN connection, you need to select two gateways between which you want to create the VPN
connection.
VPN appliances perform the following:
1. Implementation of IKEv2 and IPSec protocols.
2. Routing: Between remote sites, Flow virtual networking advertises prefixes using eBGP. Optionally it uses Static
routing. Within a site, Flow virtual networking uses iBGP or OSPF to share prefixes between the Nutanix VPN
appliance and the edge router.
• AES128
• AES256
• 3DES
• AES256GCM128
Authentication Algorithms
• MD5
• SHA1
• SHA256
• SHA384
• SHA512
DH Groups
General Requirements
• Ensure that you have enabled Flow virtual networking with microservices Infrastructure.
• Ensure that you have floating IP addresses when you create VPN gateways.
Flow virtual networking automatically allocates a floating IP to a VPN gateway if you do not provide one during
the VPN gateway creation. To provide floating IP during the VPN gateway creation, you can request floating IPs.
For more information, see Requesting Floating IPs on page 114.
• Ensure that you have one of the following, depending on whether you are using iBGP or OSPF:
• Peer IP (for iBGP): The IP address of the router to exchange routes with the VPN gateway VM.
• Area ID (for OSPF): The OSPF area ID for the VPN gateway in the IP address format.
• Nutanix recommends setting the guest VM NIC MTU to 1,356 bytes for all VMs inside a VPC that send traffic
over Nutanix VPN connections. This prevents fragmentation and accounts for the encapsulation overhead for
VPN connections in a VPC. For more information, see the Flow Virtual Networking MTUs table.
Accounting for the 1356 byte MTU: Assuming a 1,500 byte network MTU, subtract 58 bytes for Geneve VPC
encapsulation and 86 bytes for IPsec encapsulation, leaving 1,356 bytes for guest VM frames.
• Public IP address of the VPN Gateway Device: A public WAN IP address that you want the on-premises
gateway to use to communicate with the Xi VPN gateway appliance.
• Static IP Address: A static IP address that you want to allocate to the VPN gateway VM. Use a floating IP
address requested as the static IP address.
• IP Prefix Length: The subnet mask in CIDR format of the subnet on which you want to install the VPN
gateway VM. You can use an overlay subnet used for a VPC and assigned to the VM that you are using for the
VPN gateway.
• Default Gateway IP: The gateway IP address for the on-premise VPN gateway appliance.
• Gateway ASN: ASN must not be the same as any of your on-premises BGP ASNs. If you already have a BGP
environment in your on-premises site, the customer gateway is the ASN for your organization. If you do not
have a BGP environment in your on-premises site, you can choose any number. For example, you can choose a
number in the 0-65000 range.
Note: In a VPN connection do not configure both the gateways (local gateway and remote gateway) in an endpoint as
Initiators or as Acceptors. If you configure the local gateway as Initiator then configure the remote gateway as Acceptor
in one endpoint and vice-versa in the (other) remote endpoint.
Open UDP ports 500 and 4500 on both directions Enable the business application policies to Allow the
commonly-used business application ports.
Procedure
2. Select the Infrastructure application from Application Switcher Function, and navigate to Network &
Security > Connectivity from the Navigation Bar.
The Gateways page opens displaying the list of network gateways you have created and configured, and the
operations you can perform on the network gateways.
5. In the Create VPN Connection window, provide the values in the respective fields.
Connection Handshake This defines the type of handshake that the connection must use. There are two types
of connection handshakes:
1. Initiator: The local VPN gateway acts as the initiator of the connection and thus
initializes the VPN tunnel.
2. Acceptor: The local VPN gateway accepts or rejects incoming connection
requests from other gateways.
Note: In a VPN connection do not configure both the gateways (local gateway
and remote gateway) in an endpoint as Initiators or as Acceptors. If you configure
the local gateway as Initiator then configure the remote gateway as Acceptor in
one endpoint and vice-versa in the (other) remote endpoint.
Remote Gateway For a specific VPN connection, set the remote gateway as Initiator or Acceptor when
you configure the VPN connection on the Remote Gateway.
VPN Gateway Select the appropriate VPN Gateway as the remote gateway for the VPN connection.
VTI Prefix - Remote The VPN Tunnel Interface IP address with prefix for the local gateway. Provide a
Gateway IPv4 Address with /<prefix>. Example: 10.25.25.2/30.
This is the VPN Tunnel Interface IP address with prefix for the local gateway. The
subnet for this IP address must be a /30 subnet with two usable IP addresses. One of
the IP addresses is used for Local Gateway. Use the other IP address for the Remote
Gateway.
Advanced Settings Set the traffic route priority for the VPN connection. The route priority uses
Dynamic route priority because the priority is dependent on the routing protocol
configured in the VPN gateway.
Route Priority - Dynamic Set the route priority as an integer number. The greater the number, higher is the
Route Priority priority.
6. Click Save.
The VPN connection you create is displayed in the VPN Connections page.
What to do next
The VPN connection you create is displayed in the VPN Connections page. Optionally, create static
routes from the VPCs to the VPN connection. For information on static routes, see What to do next section
in VPN Connection within Same Prism Central on page 151 for information.
Procedure
2. Select the Infrastructure application from Application Switcher Function, and navigate to Network &
Security > Connectivity from the Navigation Bar.
The Gateways page opens displaying the list of network gateways you have created and configured, and the
operations you can perform on the network gateways.
4. Select the VPN Connection you want to update, and click Update from the Actions dropdown menu.
The Update VPN Connection window opens.
6. Click Save.
Procedure
2. Select the Infrastructure application from Application Switcher Function, and navigate to Network &
Security > Connectivity from the Navigation Bar.
The Gateways page opens displaying the list of network gateways you have created and configured, and the
operations you can perform on the network gateways.
4. Select the VPN Connection you want to delete, and click Delete from the Actions dropdown menu.
5. In the confirmation dialog box, click Delete to delete the VPN connection.
Click Cancel to exit without deleting the connection.
Procedure
a. Create a local VPN gateway with dynamically assigned address for vpc-a, for example, named local-vpn-a.
Note or write down the assigned IP address.
b. Create a local VPN gateway with dynamically assigned address for vpc-b, for example, named local-vpn-b.
Note or write down the assigned IP address.
For more information on creating a VPN gateway, see Creating a Network Gateway on page 138.
a. Create a remote VPN gateway with the IP address noted in 1.a on page 152 for vpc-a, for example, named
remote-vpn-a.
b. create a local VPN gateway with the IP address noted in 1.b on page 152 for vpc-b, for example, named
remote-vpn-b.
For more information on creating a VPN gateway, see Creating a Network Gateway on page 138.
3. Create a VPN connection between vpc-a and vpc-b named, for example, vpn-conn-a-to-b.
Ensure that the VTI IP addresses for the local and remote gateways is unique with /30 prefix.
Note: The VPN Tunnel Interface IP address with prefix for the local gateway. The subnet for this IP address must
be a /30 subnet with two usable IP addresses. One of the IP addresses is used for Local Gateway. Use the other IP
address for the Remote Gateway.
Ensure that you select local-vpn-a as the local gateway with Connection Handshake set as Acceptor.
Ensure that you select remote-vpn-b as the remote gateway.
4. Create a VPN connection between vpc-b and vpc-a named, for example, vpn-conn-b-to-a.
Ensure that the VTI IP addresses with /30 prefix for local and remote gateways are the reverse (vice versa) of
what you configured for the VPN connection in previous step. For example, if in previous step you configured the
VTI IP addresses as 10.20.20.5/30 for local and 10.20.20.6/30 for remote then for VPN connection in this step,
configure 10.20.20.6/30 for local gateway and 10.20.20.5/30 for remote gateway respectively. These IP addresses
do not need to be reachable anywhere else in the network. However, ensure that these IP addresses do not overlap
with any other IP addresses assigned in the network.
Ensure that you select local-vpn-b as the local gateway with Connection Handshake set as Initiator.
Ensure that you select remote-vpn-a as the remote gateway.
What to do next
Optionally, create static routes for the subnets in the two VPCs to the VPN connections. The static routes
ensure that the subnets communicate with the VPN connection.
For example,
• Create static routes in vpc-a with Destination Prefix: subnet-b (in vpc-b), Next Hop: vpn-conn-a-to-b
• Create static routes in vpc-b with Destination Prefix: subnet-a (in vpc-a), Next Hop: vpn-conn-a-to-b
Note: One or more on-premises cluster or sites managed by one Prism Central instance is defined as an Availability
Zone or AZ. In this section, Availability Zone or AZ refers to and must be understood as one or more on-premises
clusters or sites managed by one Prism Central. Local AZ refers to local on-premises clusters or sites managed by a
Prism Central instance and remote AZ refers to another on-premises cluster or site managed by another Prism Central
instance.
With Layer 2 Network Extension, you can migrate a set of applications to the remote AZ while retaining their
network bindings such as IP address, MAC address, and default gateway. Since the subnet extension mechanism
allows VMs to communicate over the same broadcast domain, it eliminates the need to re-architect the network
topology, which could otherwise result in downtime.
Layer 2 Network Extension assumes that there are underlying existing layer 3 connectivity already available between
the Availability Zones. You can extend a subnet from a remote AZ to the primary (Local) AZ (and other remote AZs
in case of VTEP-based subnet extensions)
• You can extend a Layer 2 subnet across two Nutanix AZs over either VPN or Virtual tunnel End Point (VTEP).
For more information, see Layer 2 Network Extension Over VPN on page 155.
• You can extend a Layer 2 subnet between a Nutanix AZ and one or more non-Nutanix datacenters only over
VTEP. For more information, see Layer 2 Network Extension Over VTEP on page 160.
You can extend subnets for the following configurations.
Note: If your cluster is ESXi, use vCenter Server to manually configure the port group attached to the subnet
you want to extend. Set the security settings, Promiscuous mode and Forged transmits to Accept on the
vSwitch.
• Ensure that the Prism Central version supports Layer 2 Network Extension. For more information, see Features in
Flow Virtual Networking in Release Notes | Flow Virtual Networking for the relevant Network Controller version.
For instructions on how to upgrade a Prism Central instance through the Prism Central web console, see Prism
Central Upgrade and Installation in Prism Central Infrastructure Guide.
• Ensure that you pair the Prism Central at the local AZ with the Prism Central at the remote AZ to use Create
Subnet Extension wizard to extend a subnet across the AZs and facilitate bidirectional communication between
these clusters or sites. Using paired availability zones, it is possible to configure both VXLAN over VPN and
VTEP based subnet extension. You can also extend subnets using the manual gateway and connection workflows
instead of pairing the AZs.
For instructions about how to pair the local and remote AZs, see Pairing Availability Zones on page 156.
• Ensure that you set up a default static route with 0.0.0.0/0 prefix and the external network next hop for the
VPC you use for any subnet extension. This allows NTP and DNS access for the Network Gateway appliance.
• When using Nutanix IPAM, ensure that the address ranges in the paired subnets are unique to avoid conflict
between VM IP addresses across extended subnets.
Note: Starting with Network Controller 6.0.0, you cannot update Overlay subnets that are configured in a layer 2
subnet extension, with overlapping IP addresses in the IP pools of the Overlay subnets.
• If the source and target sites use third-party IPAM, ensure that there are no conflicting IP address assignments
across the two sites.
Note: If the source and target sites use Nutanix IPAM, the Prism Central web console displays a message that
indicates an IP address conflict if one exists.
• If connectivity between sites already provides encryption, consider using VTEP only subnet extension to reduce
encryption overhead.
• Use the Subnet Extension to a Third Party Data-Center workflow in the following scenarios
• To extend a subnet to more than one other AZ. This is also known as point to multi-point.
• To extend subnets between clusters managed by the same Prism Central.
• To avoid tromboning or hair-pinning of traffic, provide valid gateway IP address for the local and remote sides
of the subnet extension. If you want to route the traffic only from one side (local or remote, thus causing traffic
tromboning or hair-pinning to that side) of the subnet extension, then provide a valid gateway IP address only on
that side. See for more information.
• You can create point-to-point Layer 2 Network Extensions between two AZs over VPN or VTEP by opening the
Create Subnet Extension Across Availability Zones window. For more information, see Extending a Layer 2
Subnet Over VPN on page 157 for VPN-based extensions. For more information on VTEP-based extensions,
see Extending a Layer 2 Subnet Across Availability Zones Over VTEP on page 161.
• You can create point-to-point or point-to-multipoint Layer 2 Network Extensions to third party datacenters over
VTEP by opening the Create Subnet Extension To A Third Party Data-Center window. For more information,
see Extending a Subnet to Third Party Datacenters Over VTEP on page 165.
• You can update a subnet extension that extends across AZs using the Update Subnet Extension Across
Availability Zones window. The Update Subnet Extension Across Availability Zones has the same parameters
and fields as the Create Subnet Extension Across Availability Zones window. You can open the Update
Subnet Extension Across Availability Zones window by:
• Selecting the subnet extended across AZs in the Subnet Extensions and clicking the Update button.
• Clicking the subnet extended across AZs in the Subnet Extensions and clicking the Update button on the
Summary tab.
You can update a subnet extension that extends to multiple AZs or third party datacenters using the Update Subnet
Extension To A Third Party Data-Center window. Update Subnet Extension To A Third Party Data-Center
window has the same parameters and fields as the Create Subnet Extension To A Third Party Data-Center
window. You can open the Update Subnet Extension To A Third Party Data-Center window by:
• Selecting the subnet extended to third datacenters in the Subnet Extensions and clicking the Update button.
• Clicking the subnet extended to third datacenters in the Subnet Extensions and clicking the Update button on
the Summary tab.
See Updating an Extended Subnet on page 170.
• When the two Availability Zones (where the subnets to be extended belong) do not have any underlying secure
connectivity. For example, when connecting over the Internet, VPN (IPSec) provides the necessary connectivity
and encryption (security).
• Sometimes when you need to move (lift-and-shift) workloads from a VLAN subnet to a VPC subnet retaining the
same VM IP addresses . You need connectivity from other subnets to workloads that have already migrated to
VPC. In such cases, VPN provides the Layer 3 connectivity and encryption between the VPC segment of extended
subnet to other VLAN subnets.
• For general prerequisites to extend subnets, see Layer 2 Network Extension on page 153.
• Set up VPN gateway services and a VPN connection between local AZ and the remote AZ. The subnet extension
feature supports only the Nutanix VPN solution (not a third-party VPN solution) at the both the local and remote
Note: Ensure that the VPN gateway version is 5.0 or higher. For instructions about how to upgrade the network
gateway at the local and remote sites, see Updating a Network Gateway.
• Configure subnets with the same IP CIDR prefix at the source and target sites. For example, if the IP prefix at one
site is 30.0.0.0/24, the IP prefix at the other site must also be 30.0.0.0/24. The network and mask must match at
both AZs.
• Configure distinct DHCP pools for the source and target sites with no IP address overlap. Separate DHCP pools
ensure no IP address conflicts occur for dynamically assigned IP addresses between the two AZs.
• Procure two free IP addresses, one from each subnet, for the Network Gateway in the subnets to be extended.
These IP addresses are configured as local IP address and remote IP address for the subnet extension in the
Subnet Extension wizard. These two free IP addresses are the externally accessible IP addresses for the local
gateway, and the remote gateway. Those two usable IP addresses are already contained inside the VPN connection
and must not conflict with the following:
Limitation
To use subnet extension over a VPN, both sites must use the VPN service of the Nutanix Network Gateway. Consider
VTEP-only subnet extension to connect to non-Nutanix third party sites.
Note: For DRaaS, pair the on-premises AZ (Prism Central instance) only to Nutanix Cloud AZ. For reverse
synchronization, you need not pair again from Nutanix Cloud AZ; Nutanix Cloud AZ captures the paring configuration
from the on-premises AZ that pairs Nutanix Cloud AZ.
To pair an AZ with another AZ or Nutanix Cloud AZ, perform the following procedure at:
» On-prem to on-prem AZ, on-prem AZ to NC2 AZ, or NC2 AZ to NC2 AZ – Select the Infrastructure
application from Application Switcher Function, and go to Administration > Availability Zones from
the Navigation Bar.
» Nutanix Cloud AZ to on-prem AZ (DRaaS) – Click the Navigation icon to access the Navigation Bar, and
go to Administration > Availability Zones.
The Availability Zones page opens, displaying the paired AZs.
» (On-prem to on-prem AZ, on-prem AZ to NC2 AZ, or NC2 AZ to NC2 AZ) Availability Zone Type:
Select Physical Location from the dropdown menu.
» (Nutanix Cloud AZ to on-prem AZ (DRaaS)) Availability Zone Type: Select XI from the dropdown
menu.
b. (On-prem to on-prem AZ, on-prem AZ to NC2 AZ, or NC2 AZ to NC2 AZ) IP Address for Remote PC:
Enter the IP address of Prism Central running on the recovery AZ.
c. Perform one of the following:
» (On-prem to on-prem AZ, on-prem AZ to NC2 AZ, or NC2 AZ to NC2 AZ) Username: Enter the username
of Prism Central running on the recovery AZ.
» (Nutanix Cloud AZ to on-prem AZ (DRaaS)) Username: Enter the username of your Nutanix Cloud
Services account.
d. Perform one of the following:
» (On-prem to on-prem AZ, on-prem AZ to NC2 AZ, or NC2 AZ to NC2 AZ) Password: Enter the
password of Prism Central running on the recovery AZ.
» (Nutanix Cloud AZ to on-prem AZ (DRaaS)) Password: Enter the password of your Nutanix Cloud
Services account.
3. Click Connect.
Both AZs are paired with each other.
When a paired AZ is unreachable due to service interruption, missing connection, or the expired access tokens on
that AZ, the Connectivity Status of that AZ shows Not Reachable (see Availability Zones View in Nutanix
Disaster Recovery Guide) and the following alert is generated in Alerts.
Availability Zone Connection Failure: The remote availability zone AZ_URL is
unreachable.
The disaster recovery operations might fail due to the unreachability. To make the paired AZ reachable, unpair the
primary AZ with the recovery AZ and then pair it with with the recovery AZ again.
Procedure
2. Select the Infrastructure application from Application Switcher Function, and navigate to Network &
Security > Connectivity from the Navigation Bar.
The Gateways page opens displaying the list of network gateways you have created and configured, and the
operations you can perform on the network gateways.
Note: Configure the following fields for the Local and the Remote sides of the dialog box.
Availability Zone (For Local) Local AZ is pre-selected default. (Local: Local AZ)
(For Remote) Select the appropriate AZ (Remote: Dropdown list of AZs.)
from the drop-down list of AZs.
Subnet Type Select the type of subnet that you want to (VLAN or Overlay)
extend.
Cluster Displayed if your selected VLAN subnet. (Name of cluster selected from
Select the cluster from the dropdown list of dropdown list)
clusters.
VPC Displayed if your selected Overlay subnet. (Name of VPC selected from
Select the appropriate VPC from the dropdown list)
dropdown list of VPCs.
Subnet Select the subnet that needs to be extended. (Name of subnet selected from
dropdown list)
(Network Information frame) Displays the details of the VLAN or Overlay (Network information)
network that you selected in the preceding
fields.
Gateway IP Address/Prefix Displays the gateway IP address for the (IP Address)
subnet. This field is already populated
based on the subnet selected. For more
information, see PBR-based Tromboning
in L2 Extended Subnet on page 168.
(Local or Remote) IP Address Enter a unique and available IP address (IP Address)
that are externally accessible IP addresses
in Local IP Address and Remote IP
Address.
VPN Connection Select the appropriate VPN Connection (Name of VPN connection selected
from the dropdown list that Flow virtual from the dropdown list)
networking must use for the subnet
extension. For instructions to create
VPN connection, see Creating a VPN
Connection on page 149.
6. Click Save.
A successful subnet extension is listed on the Subnet Extension page.
• For general prerequisites to extend subnets, see Layer 2 Network Extension on page 153 .
• Set up VTEP local and remote gateway services on local and remote AZs. In case of point-to-multipoint
extension, ensure that you create local and remote VTEP gateways on all the remote AZs that the subnet needs to
be extended to.
• For each extended subnet within the same Network Gateway appliance ensure that you have unique VxLAN
Network Identifiers (VNIs) that you can use for the VTEP subnet extensions. VNI may be any number between 0
and 16777215.
Procedure
2. Select the Infrastructure application from Application Switcher Function, and navigate to Network &
Security > Connectivity from the Navigation Bar.
The Gateways page opens displaying the list of network gateways you have created and configured, and the
operations you can perform on the network gateways.
6. Enter or select the necessary values for the parameters in the Local and Remote (AZ) sections as described in
the table.
Availability Zone Displays the name of the paired availability zone at the local AZ.
Subnet Type Select the type of the subnet - VLAN or Overlay that you are extending.
Cluster Select the name of the cluster in the local AZ that the subnet is configured for.
Subnet Select the name of the subnet at the local AZ for network. The VLAN ID and
the IPAM - managed or unmanaged are displayed in the box below the Subnet
field.
Gateway IP Address. Enter the gateway IP address of the subnet you want to extend. Ensure that you
provide the IP address in <IP-address/network-prefix> format. for example the
gateway IP is 10.20.20.1 in a /24 subnet then provide the gateway IP address as
10.20.20.1/24.
Local IP Address Enter a unique and available (unused) IP address from the subnet provided in
Subnet for the Network Gateway appliance.
Remote IP Address Enter a unique and available (unused) IP address from the subnet provided in
Subnet for the remote Network Gateway appliance.
Local VTEP Gateway Select the local VTEP gateway you created on the local AZ. For more
information on creating VTEP gateways, see Creating a Network Gateway
on page 138.
Remote VTEP Gateway Select the VTEP gateway you created on the remote AZ. For more information
about creating VTEP gateways, see Creating a Network Gateway on
page 138.
Connection Properties
VxLAN Network Identifier Enter a unique number from the range 0-16777215 as VNI. Ensure that this
(VNI) number is not reused anywhere in the local or remote VTEP Gateways.
MTU The default MTU is 1392 to account for 108 bytes of overhead and the standard
physical MTU of 1500 bytes. VPC Geneve encapsulation requires 58 bytes and
VXLAN encapsulation requires 50. However, you can enter any valid MTU
value for the network, taking this overhead into account. For example, if the
physical network MTU and vs0 MTU are 1600 bytes, the Network Gateway
MTU can be set to 1492 to account for 108 bytes of overhead. Ensure that the
MTU value does not exceed the MTU of the AHV Host interface and all the
network interfaces between the local and remote AZs.
7. Click Save.
After the subnet is extended, the extension appears in the Subnet Extensions page.
Procedure
2. Select the Infrastructure application from Application Switcher Function, and navigate to Network &
Security > Connectivity from the Navigation Bar.
The Gateways page opens displaying the list of network gateways you have created and configured, and the
operations you can perform on the network gateways.
Figure 32: Example of Create VTEP Extension To A Third Party Data-Center with VLAN
Subnet
5. Enter or select the necessary values for the parameters in the Local, Remote (AZ), and Connection
Properties sections as described in the table.
Local
Availability Zone Displays the name of the paired availability zone at the local AZ.
Subnet Type Select the type of the subnet - VLAN or Overlay that you are
extending.
Cluster Select the name of the cluster in the local AZ that the subnet is
configured for.
Subnet Select the name of the subnet at the local AZ for network. The
VLAN ID and the IPAM - managed or unmanaged are displayed
in the box below the Subnet field.
Gateway IP Address Enter the gateway IP address of the subnet you want to extend.
Ensure that you provide the IP address in <IP-address/network-
prefix> format. For example the gateway IP is 10.20.20.1
in a /24 subnet then provide the gateway IP address as
10.20.20.1/24.
Local IP Address Enter a unique and available (unused) IP address from the subnet
provided in Subnet.
Local VTEP Gateway Select the local VTEP gateway you created on the local AZ.
For more information on creating a remote VTEP gateway, see
Creating a Network Gateway on page 138.
Remote
Remote VTEP Gateway Select the remote VTEP gateway you created on the local AZ.
For more information on creating a remote VTEP gateway, see
Creating a Network Gateway on page 138.
Connection Properties
VxLAN Network Identifier (VNI) Enter a unique number from the range 0-16777215 as VNI.
Ensure that this number is not reused anywhere in the networks
that the Prism Central and Cluster are a part of.
MTU The default MTU is 1392 to account for 108 bytes of overhead
and the standard physical MTU of 1500 bytes. VPC GENEVE
encapsulation requires 58 bytes and VXLAN encapsulation
requires 50. However, you can enter any valid MTU value for
the network, taking this overhead into account. For example,
if the physical network MTU and vs0 MTU are 1600 bytes,
the Network Gateway MTU can be set to 1492 to account for
108 bytes of overhead. Ensure that the MTU value does not
exceed the MTU of the AHV Host interface and all the network
interfaces between the local and remote AZs.
6. Click Save.
After the subnet is extended, the extension appears in the Subnet Extensions page.
Note: The Forward action ensures that traffic from both VPCs on either side of a Layer 2 extended subnet exits
through a single specified subnet gateway (referred to as the egress gateway). To achieve this, you must configure the
Forward IP field with the appropriate next hop IP address that routes traffic to the egress gateway.
This section does not cover all the possible scenarios for determining the correct next hop IP address you
can provide in the Forward IP field. You must identify the appropriate IP address based on your specific
network configuration. This could include the subnet gateway, the VTEP Local Gateway IP address of the
other endpoint in the Layer 2 extended subnet, or the IP address of any intervening firewall VM that routes
traffic to the VTEP Local Gateway at the other endpoint, as applicable to your cluster networks.
• AZ1: On-premises
Note: When you configure a routing policy with the Forward action, ensure that you add the appropriate next hop IP
address in the Forward IP field.
VPC Prod-AZ1 Subnet gateway10.1.1.1 External VLAN AZ1 gateway 10.1.0.1 (VLAN
AZ1 being the underlay network with external
connectivity for VPC Prod AZ1)
External VLAN AZ1 gateway 10.1.0.1 External VLAN AZ2 gateway 10.2.0.1 (VLAN
AZ2 being the underlay network with external
connectivity for VPC Prod AZ2)
Procedure
• For information on extending a subnet over a VPN, see Extending a Layer 2 Subnet Over VPN on page 157
• For information on extending a subnet over VTEP, see Extending a Layer 2 Subnet Across Availability Zones
Over VTEP on page 161
• For information on extending a subnet across third party datacenters over VTEP, see Extending a Subnet to
Third Party Datacenters Over VTEP on page 165
Note: Removing an extended subnet from a cluster or AZ (either source or target AZs) automatically deletes the
extended subnet from the corresponding source or target AZs.
Procedure
4. Select the checkbox associated with the subnet extension you want to remove, and click Delete from the
Actions dropdown menu.
What to do next
Check the list in the Subnet Extensions tab to confirm that the subnet extension is removed.
Note: The BGP session ignores (or does not advertise) the received routes if the VPC is not associated with a
routable (i.e. no-NAT) external subnet.
7. All received routes are added to the VPC routing table on FIFO (First In First Out) basis. Route installation
priority is not dependent on destination IP address prefix length.
Procedure
2. Select the Infrastructure application from Application Switcher Function, and navigate to Network &
Security > Connectivity from the Navigation Bar.
The Gateways page opens displaying the list of network gateways you have created and configured, and the
operations you can perform on the network gateways.
5. In the Create BGP Session window that opens, provide the necessary values in the respective fields.
For information on the fields and their values, see Create BGP Session Attributes on page 173.
Password (Optional) Enter a password for the session. Characters allowed for BGP
passwords
• a-z
• A-Z
• 0-9
• ~!@#%^&*()_-+=:;{}[]|<>,./?$
• Password length: Minimum 1 and maximum 80 characters.
Click Show to make the password visible.
6. Click Save.
Advertised Externally Routable Select All in VPC from the type (Type-selection:ERP list)
Prefixes selection dropdown list to advertise
all the Externally Routable Prefixes
(ERPs) configured in the VPC.
The ERPs configured in the VPC
automatically appear in the adjacent
ERP list field.
Select Custom from the type
selection dropdown list to advertise
the specific ERPs that you enter in
the adjacent ERP list field.
The Custom selection acts as a filter
for advertising routes. When you
select Custom and enter the ERPs to
advertise, the BGP session advertises
only those ERP routes. This approach
lets you selectively advertise routes
to BGP peers.
Password (Optional) Enter a password for the Characters allowed for BGP
session. Click Show to view the passwords
password.
• a-z
The password is required only for
the BGP gateway VMs that are • A-Z
configured in VLAN Subnets.
• 0-9
The NAT process breaks the
password verification in VPC- • ~!@#%^&*()_-+=:;{}
attached BGP gateway VMs. []|<>,./?$
Therefore, passwords cannot be
• Password length: Minimum 1 and
provided for BGP sessions with
maximum 80 characters.
gateway VMs in NAT-ed VPC
subnets.
Note: You can only update the Name, Dynamic Route Priority, and Password. Local BGP Gateway, and
Remote BGP Gateway are unavailable for update. If you need to modify such information, consider creating a new
BGP session with the appropriate parameters and deleting the current BGP session.
Procedure
2. Select the Infrastructure application from Application Switcher Function, and navigate to Network &
Security > Connectivity from the Navigation Bar.
The Gateways page opens displaying the list of network gateways you have created and configured, and the
operations you can perform on the network gateways.
4. Select the checkbox associated with the BGP session that you want to update, and click Update from the
Actions dropdown menu.
The Update BGP Session window opens.
Procedure
2. Select the Infrastructure application from Application Switcher Function, and navigate to Network &
Security > Connectivity from the Navigation Bar.
The Gateways page opens displaying the list of network gateways you have created and configured, and the
operations you can perform on the network gateways.
4. Select the checkbox associated with the BGP session that you want to delete, and click Delete from the Actions
dropdown menu.
Prism Central displays the Delete BGP Session <bgp_session_name> window with a checkbox for the message
that warns you that all the active routes associated with the BGP session to be removed, causing a drop in traffic.
Further, it asks you to confirm if you want to continue to delete the BGP session.
5. Select the checkbox in the warning message to make the Delete button available.