{"id":608,"date":"2020-05-03T15:10:18","date_gmt":"2020-05-03T07:10:18","guid":{"rendered":"https:\/\/www.insecurewire.com\/?p=608"},"modified":"2020-05-03T15:10:18","modified_gmt":"2020-05-03T07:10:18","slug":"running-a-nested-multi-site-vmware-nsx-v-6-4-lab","status":"publish","type":"post","link":"https:\/\/www.insecurewi.re\/index.php\/2020\/05\/03\/running-a-nested-multi-site-vmware-nsx-v-6-4-lab\/","title":{"rendered":"Running A Nested Cross VCenter NSX-V 6.4 Lab"},"content":{"rendered":"<p>During the COVID-19 lockdown I&#8217;ve had some time to finally learn and build a cross site &#8220;routed&#8221; NSX-V lab environment! NSX allows for microsegementation and Layer 2 over Layer 3 with VXLAN. You can also provide distributed virtual firewalling out of the box. Below is a summary of the lab design and notes. I will link to the sources I used for reference.<\/p>\n<p><strong>ESXi Physical Host<\/strong><br \/>\nThis lab is for a cross VCenter NSX-V which can all be done nested and virtually. I decided to build nested on an ESXi 6.7 HP DL380 G7 \/w 2x Xeon CPU, 120gb of RAM and 3TB of disk. To setup the nested switching environment I created three vswitches on the physical lab esxi host. One is for MGMT of the host and access to the lab from the physical network. The other two vswitches are for the nested lab (no physical uplinks), one for each site, in my lab we have sites PER and SYD (Perth and Sydney) part of the fictional LAB CORP. Using a port group with VLAN tag of 4095 gives you a dot1q trunk port within ESXi, which allows you to use VLANs effectivley with an external router.<br \/>\nI have deployed the following VMs to the physical host:<br \/>\n&#8211; 2 x PFsense routers for simulated L3 routing, DC cross connect or WAN and Internet Uplink for each site.<br \/>\n&#8211; 6 x ESXi 6.7u2 nested hosts. 3 for each DC.<br \/>\n&#8211; 2 x VCSA 6.7 (VCenter) one for each site &#8211; one 3 x host cluster per site.<br \/>\n&#8211; 2 x Windows Domain DC for lab.internal domain &#8211; provide DNS, DHCP, NTP etc services.<br \/>\n<a href=\"https:\/\/www.insecurewire.com\/wp-content\/uploads\/2020\/05\/crossvc.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.insecurewi.re\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/www.insecurewire.com\/wp-content\/uploads\/2020\/05\/crossvc-1024x584.png\" alt=\"Cross VCenter\" width=\"720\" height=\"411\" class=\"aligncenter size-large wp-image-615\" data-srcset=\"https:\/\/www.insecurewi.re\/wp-content\/uploads\/2020\/05\/crossvc-1024x584.png 1024w, https:\/\/www.insecurewi.re\/wp-content\/uploads\/2020\/05\/crossvc-300x171.png 300w, https:\/\/www.insecurewi.re\/wp-content\/uploads\/2020\/05\/crossvc-768x438.png 768w, https:\/\/www.insecurewi.re\/wp-content\/uploads\/2020\/05\/crossvc-100x57.png 100w, https:\/\/www.insecurewi.re\/wp-content\/uploads\/2020\/05\/crossvc-700x399.png 700w, https:\/\/www.insecurewi.re\/wp-content\/uploads\/2020\/05\/crossvc.png 1174w\" data-sizes=\"auto, (max-width: 720px) 100vw, 720px\" \/><\/a><br \/>\n<strong>Logical Networking:<\/strong><br \/>\nWe have the following network subnets.<br \/>\n<strong>Perth &#8211; Site A<\/strong><br \/>\nMGMT 10.0.0.0\/24<br \/>\nNSX Transit 192.168.8.0\/24<br \/>\nDC Interconnect 10.2.0.1\/30<br \/>\nNSX Routed Uplink 192.168.2.0\/24<br \/>\nVXLAN VMKernel 192.168.3.0\/24<\/p>\n<p><strong>Sydney &#8211; Site B<\/strong><br \/>\nMGMT 10.3.0.0\/24<br \/>\nNSX Transit 192.168.9.0\/24<br \/>\nDC Interconnect 10.2.0.2\/30<br \/>\nNSX Routed Uplink 192.168.7.0\/24<br \/>\nVXLAN VMKernel 192.168.22.0\/24<\/p>\n<p><strong>NSX Subnets (Universal Logical Switches):<\/strong><br \/>\nWeb Tier &#8211; 172.16.50.0\/24<br \/>\nApp Tier &#8211; 172.16.60.0\/24<br \/>\nDB Tier &#8211; 172.16.70.0\/24<br \/>\nAs this is not production and just a lab you can see I have used many \/24&#8217;s for simplicity sake. The L3 router is PFSense at each location with a L2 interconnect between to the two sites to simulate a private WAN service. The goal with this lab is to be able to stetch Layer 2 domain across Router L3 uplinks using VXLAN as the encapsulation protocol.<br \/>\n<a href=\"https:\/\/www.insecurewire.com\/wp-content\/uploads\/2020\/05\/NSX-V-Lab-Small.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.insecurewi.re\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/www.insecurewire.com\/wp-content\/uploads\/2020\/05\/NSX-V-Lab-Small-1024x729.jpg\" alt=\"NSX-V Lab Small\" width=\"720\" height=\"513\" class=\"aligncenter size-large wp-image-636\" \/><\/a><\/p>\n<p><strong>NSX Lab Architecture:<\/strong><br \/>\n2 x NSX Managers &#8211; Perth is Primary, Sydney is Secondary.<br \/>\n3 x Controller nodes hosted in the Perth cluster.<br \/>\nOnce NSX is setup on the Perth cluster set it as primary and then add the Sydney manager and change it to secondary.<br \/>\nControl plane mode is set to unicast due to lab nature (setting transport zone under nsx logical network settings).<br \/>\nCreate universal logical switches for App, Web, DB, Transit-Per, Transit-Syd and HA.<br \/>\n1 x Universal Distributed Logical Router with Local Egress Enabled. Two control VMs one per site, each site uses its on transit logical switch.<br \/>\nNorth south routing will be via the local ESG at each site. This lab is using active \/ active egress.<br \/>\n2 x Edge services gateways, one per site. In the lab environment I used OSPF on ESG to peer routes between the PFsense Router and the UDLR control vm for each site.<br \/>\n2 x DVS for each site. One is MgmtDVS the other NSX Overlay. Set the NSX DVS to have default MTU of 1600.<br \/>\nVXLAN MTU on the VMkernel must be at least 1600 bytes. The Pfense interfaces will also need this. I also set the nested vSwitch on the physical ESXi host to support 1600 MTU.<br \/>\nBe sure to disable the automatic NAT on your PFSense routers. This caused me issues when VXLAN was trying to operate cross site. The issue was the auto NAT was translating the VXLAN traffic source IP, essentially breaking it.<br \/>\nVM East West traffic that is destined for local site VM will route via the logical switch \/ site local UDLR (this is called local egress). Traffic destined for VMs on a different site will use VXLAN to encapsulate layer 2 over the L3 path.<br \/>\nEach sites PFSense router has its own Internet connection. Each sites ESG has a default route pointing to PFSense interface for Internet connectivity. The following screenshots are of &#8216;show ip route&#8217; output on both Perth and Sydney ESG&#8217;s:<br \/>\n<a href=\"https:\/\/www.insecurewire.com\/wp-content\/uploads\/2020\/05\/per-edge-ip-route.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.insecurewi.re\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/www.insecurewire.com\/wp-content\/uploads\/2020\/05\/per-edge-ip-route.png\" alt=\"per-edge-ip-route\" width=\"660\" height=\"294\" class=\"aligncenter size-full wp-image-628\" data-srcset=\"https:\/\/www.insecurewi.re\/wp-content\/uploads\/2020\/05\/per-edge-ip-route.png 660w, https:\/\/www.insecurewi.re\/wp-content\/uploads\/2020\/05\/per-edge-ip-route-300x134.png 300w, https:\/\/www.insecurewi.re\/wp-content\/uploads\/2020\/05\/per-edge-ip-route-100x45.png 100w\" data-sizes=\"auto, (max-width: 660px) 100vw, 660px\" \/><\/a><br \/>\n<a href=\"https:\/\/www.insecurewire.com\/wp-content\/uploads\/2020\/05\/syd-edge-ip-route.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.insecurewi.re\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/www.insecurewire.com\/wp-content\/uploads\/2020\/05\/syd-edge-ip-route.png\" alt=\"syd-edge-ip-route\" width=\"663\" height=\"294\" class=\"aligncenter size-full wp-image-629\" data-srcset=\"https:\/\/www.insecurewi.re\/wp-content\/uploads\/2020\/05\/syd-edge-ip-route.png 663w, https:\/\/www.insecurewi.re\/wp-content\/uploads\/2020\/05\/syd-edge-ip-route-300x133.png 300w, https:\/\/www.insecurewi.re\/wp-content\/uploads\/2020\/05\/syd-edge-ip-route-100x44.png 100w\" data-sizes=\"auto, (max-width: 663px) 100vw, 663px\" \/><\/a><\/p>\n<p><strong>Testing VXLAN:<\/strong><br \/>\nSSH to a nested ESXi host (enable SSH first). Use the vmkping command in vxlan mode to test the MTU and path connectivity. In this example we are using an ESXi host on Sydney cluster to ping vxlan vmk on a Perth host.<br \/>\n<code>[root@esxi-nest-01b:~] vmkping ++netstack=vxlan -I vmk2 192.168.22.22 -s 1572 -d<br \/>\nPING 192.168.22.22 (192.168.22.22): 1572 data bytes<br \/>\n1580 bytes from 192.168.22.22: icmp_seq=0 ttl=64 time=1.172 ms<\/code><\/p>\n<p><strong>Resources I followed to build this lab:<\/strong><br \/>\n<a href=\"https:\/\/sivasankar.org\/2018\/2139\/vmware-nsx-v-detailed-installation-and-configuration-series\/\" rel=\"noopener noreferrer\" target=\"_blank\">Sivar Sankars NSX-V Series<\/a><br \/>\n<a href=\"https:\/\/rutgerblom.com\/2019\/01\/30\/cross-vcenter-nsx-part-3\/\" rel=\"noopener noreferrer\" target=\"_blank\">Rutger Blom Cross VCenter Series<\/a><br \/>\n<a href=\"https:\/\/vdives.com\/2019\/07\/21\/nsx-v-lab-esg-routing-configuration\/\" rel=\"noopener noreferrer\" target=\"_blank\">vDives NSX Routing<\/a><br \/>\n<a href=\"https:\/\/www.jeffreykusters.nl\/2018\/05\/22\/vlans-vxlans-ospf-nested-vmware-homelab\/\" rel=\"noopener noreferrer\" target=\"_blank\">Jeffery Kusters Blog<\/a><\/p>\n<p>It should be noted that VMware will retire NSX-V in the future. The clear sucessor is NSX-T. The reason I used NSX-V in this lab is that its a good starting point learning overlay networking technologies. It&#8217;s also hard to get the NSX-T OVA&#8217;s without a subscription \/ license on the VMware download portal. All in all never having used NSX-V before, but reading and knowing about the concepts, it took me around a week to get this lab perfect. A fun and rewarding exercise during the corona lockdown.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>During the COVID-19 lockdown I&#8217;ve had some time to finally learn and build a cross site &#8220;routed&#8221; NSX-V lab environment! NSX allows for microsegementation and&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[37,17],"tags":[136,198],"class_list":["post-608","post","type-post","status-publish","format-standard","hentry","category-nsx","category-vmware","tag-nsx","tag-vmware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Running A Nested Cross VCenter NSX-V 6.4 Lab - Insecure Wire<\/title>\n<meta name=\"description\" content=\"During the COVID-19 lockdown I&#039;ve had some time to finally learn and build an multi site &quot;routed&quot; NSX-V lab environment! I really wanted to see how VXLAN works. Lets get into the details of how I built this lab environment:\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.insecurewi.re\/index.php\/2020\/05\/03\/running-a-nested-multi-site-vmware-nsx-v-6-4-lab\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Running A Nested Cross VCenter NSX-V 6.4 Lab - Insecure Wire\" \/>\n<meta property=\"og:description\" content=\"During the COVID-19 lockdown I&#039;ve had some time to finally learn and build an multi site &quot;routed&quot; NSX-V lab environment! I really wanted to see how VXLAN works. Lets get into the details of how I built this lab environment:\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.insecurewi.re\/index.php\/2020\/05\/03\/running-a-nested-multi-site-vmware-nsx-v-6-4-lab\/\" \/>\n<meta property=\"og:site_name\" content=\"Insecure Wire\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-03T07:10:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.insecurewire.com\/wp-content\/uploads\/2020\/05\/crossvc-1024x584.png\" \/>\n<meta name=\"author\" content=\"nikonau\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/insecurewire\" \/>\n<meta name=\"twitter:site\" content=\"@insecurewire\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"nikonau\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.insecurewi.re\/index.php\/2020\/05\/03\/running-a-nested-multi-site-vmware-nsx-v-6-4-lab\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.insecurewi.re\/index.php\/2020\/05\/03\/running-a-nested-multi-site-vmware-nsx-v-6-4-lab\/\"},\"author\":{\"name\":\"nikonau\",\"@id\":\"https:\/\/www.insecurewi.re\/#\/schema\/person\/8ba08b41fc754b971a948ead6ccb777d\"},\"headline\":\"Running A Nested Cross VCenter NSX-V 6.4 Lab\",\"datePublished\":\"2020-05-03T07:10:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.insecurewi.re\/index.php\/2020\/05\/03\/running-a-nested-multi-site-vmware-nsx-v-6-4-lab\/\"},\"wordCount\":867,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.insecurewi.re\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.insecurewi.re\/index.php\/2020\/05\/03\/running-a-nested-multi-site-vmware-nsx-v-6-4-lab\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.insecurewire.com\/wp-content\/uploads\/2020\/05\/crossvc-1024x584.png\",\"keywords\":[\"nsx\",\"VMware\"],\"articleSection\":[\"NSX\",\"VMware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.insecurewi.re\/index.php\/2020\/05\/03\/running-a-nested-multi-site-vmware-nsx-v-6-4-lab\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.insecurewi.re\/index.php\/2020\/05\/03\/running-a-nested-multi-site-vmware-nsx-v-6-4-lab\/\",\"url\":\"https:\/\/www.insecurewi.re\/index.php\/2020\/05\/03\/running-a-nested-multi-site-vmware-nsx-v-6-4-lab\/\",\"name\":\"Running A Nested Cross VCenter NSX-V 6.4 Lab - Insecure Wire\",\"isPartOf\":{\"@id\":\"https:\/\/www.insecurewi.re\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.insecurewi.re\/index.php\/2020\/05\/03\/running-a-nested-multi-site-vmware-nsx-v-6-4-lab\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.insecurewi.re\/index.php\/2020\/05\/03\/running-a-nested-multi-site-vmware-nsx-v-6-4-lab\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.insecurewire.com\/wp-content\/uploads\/2020\/05\/crossvc-1024x584.png\",\"datePublished\":\"2020-05-03T07:10:18+00:00\",\"description\":\"During the COVID-19 lockdown I've had some time to finally learn and build an multi site \\\"routed\\\" NSX-V lab environment! I really wanted to see how VXLAN works. Lets get into the details of how I built this lab environment:\",\"breadcrumb\":{\"@id\":\"https:\/\/www.insecurewi.re\/index.php\/2020\/05\/03\/running-a-nested-multi-site-vmware-nsx-v-6-4-lab\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.insecurewi.re\/index.php\/2020\/05\/03\/running-a-nested-multi-site-vmware-nsx-v-6-4-lab\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.insecurewi.re\/index.php\/2020\/05\/03\/running-a-nested-multi-site-vmware-nsx-v-6-4-lab\/#primaryimage\",\"url\":\"https:\/\/www.insecurewire.com\/wp-content\/uploads\/2020\/05\/crossvc-1024x584.png\",\"contentUrl\":\"https:\/\/www.insecurewire.com\/wp-content\/uploads\/2020\/05\/crossvc-1024x584.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.insecurewi.re\/index.php\/2020\/05\/03\/running-a-nested-multi-site-vmware-nsx-v-6-4-lab\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.insecurewi.re\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Running A Nested Cross VCenter NSX-V 6.4 Lab\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.insecurewi.re\/#website\",\"url\":\"https:\/\/www.insecurewi.re\/\",\"name\":\"Insecure Wire\",\"description\":\"A Network Engineer\u2019s Perspective.\",\"publisher\":{\"@id\":\"https:\/\/www.insecurewi.re\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.insecurewi.re\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.insecurewi.re\/#organization\",\"name\":\"Insecure Wire\",\"url\":\"https:\/\/www.insecurewi.re\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.insecurewi.re\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.insecurewi.re\/wp-content\/uploads\/2023\/10\/cloud.png\",\"contentUrl\":\"https:\/\/www.insecurewi.re\/wp-content\/uploads\/2023\/10\/cloud.png\",\"width\":32,\"height\":32,\"caption\":\"Insecure Wire\"},\"image\":{\"@id\":\"https:\/\/www.insecurewi.re\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/insecurewire\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.insecurewi.re\/#\/schema\/person\/8ba08b41fc754b971a948ead6ccb777d\",\"name\":\"nikonau\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.insecurewi.re\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2d1b9d9dc90da4f6d3da31b870f418c6b3553ba9be48d53e8ee3a35b0adb1d35?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2d1b9d9dc90da4f6d3da31b870f418c6b3553ba9be48d53e8ee3a35b0adb1d35?s=96&d=mm&r=g\",\"caption\":\"nikonau\"},\"sameAs\":[\"https:\/\/x.com\/https:\/\/twitter.com\/insecurewire\"],\"url\":\"https:\/\/www.insecurewi.re\/index.php\/author\/nikon\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Running A Nested Cross VCenter NSX-V 6.4 Lab - Insecure Wire","description":"During the COVID-19 lockdown I've had some time to finally learn and build an multi site \"routed\" NSX-V lab environment! I really wanted to see how VXLAN works. Lets get into the details of how I built this lab environment:","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.insecurewi.re\/index.php\/2020\/05\/03\/running-a-nested-multi-site-vmware-nsx-v-6-4-lab\/","og_locale":"en_US","og_type":"article","og_title":"Running A Nested Cross VCenter NSX-V 6.4 Lab - Insecure Wire","og_description":"During the COVID-19 lockdown I've had some time to finally learn and build an multi site \"routed\" NSX-V lab environment! I really wanted to see how VXLAN works. Lets get into the details of how I built this lab environment:","og_url":"https:\/\/www.insecurewi.re\/index.php\/2020\/05\/03\/running-a-nested-multi-site-vmware-nsx-v-6-4-lab\/","og_site_name":"Insecure Wire","article_published_time":"2020-05-03T07:10:18+00:00","og_image":[{"url":"https:\/\/www.insecurewire.com\/wp-content\/uploads\/2020\/05\/crossvc-1024x584.png","type":"","width":"","height":""}],"author":"nikonau","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/insecurewire","twitter_site":"@insecurewire","twitter_misc":{"Written by":"nikonau","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.insecurewi.re\/index.php\/2020\/05\/03\/running-a-nested-multi-site-vmware-nsx-v-6-4-lab\/#article","isPartOf":{"@id":"https:\/\/www.insecurewi.re\/index.php\/2020\/05\/03\/running-a-nested-multi-site-vmware-nsx-v-6-4-lab\/"},"author":{"name":"nikonau","@id":"https:\/\/www.insecurewi.re\/#\/schema\/person\/8ba08b41fc754b971a948ead6ccb777d"},"headline":"Running A Nested Cross VCenter NSX-V 6.4 Lab","datePublished":"2020-05-03T07:10:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.insecurewi.re\/index.php\/2020\/05\/03\/running-a-nested-multi-site-vmware-nsx-v-6-4-lab\/"},"wordCount":867,"commentCount":0,"publisher":{"@id":"https:\/\/www.insecurewi.re\/#organization"},"image":{"@id":"https:\/\/www.insecurewi.re\/index.php\/2020\/05\/03\/running-a-nested-multi-site-vmware-nsx-v-6-4-lab\/#primaryimage"},"thumbnailUrl":"https:\/\/www.insecurewire.com\/wp-content\/uploads\/2020\/05\/crossvc-1024x584.png","keywords":["nsx","VMware"],"articleSection":["NSX","VMware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.insecurewi.re\/index.php\/2020\/05\/03\/running-a-nested-multi-site-vmware-nsx-v-6-4-lab\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.insecurewi.re\/index.php\/2020\/05\/03\/running-a-nested-multi-site-vmware-nsx-v-6-4-lab\/","url":"https:\/\/www.insecurewi.re\/index.php\/2020\/05\/03\/running-a-nested-multi-site-vmware-nsx-v-6-4-lab\/","name":"Running A Nested Cross VCenter NSX-V 6.4 Lab - Insecure Wire","isPartOf":{"@id":"https:\/\/www.insecurewi.re\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.insecurewi.re\/index.php\/2020\/05\/03\/running-a-nested-multi-site-vmware-nsx-v-6-4-lab\/#primaryimage"},"image":{"@id":"https:\/\/www.insecurewi.re\/index.php\/2020\/05\/03\/running-a-nested-multi-site-vmware-nsx-v-6-4-lab\/#primaryimage"},"thumbnailUrl":"https:\/\/www.insecurewire.com\/wp-content\/uploads\/2020\/05\/crossvc-1024x584.png","datePublished":"2020-05-03T07:10:18+00:00","description":"During the COVID-19 lockdown I've had some time to finally learn and build an multi site \"routed\" NSX-V lab environment! I really wanted to see how VXLAN works. Lets get into the details of how I built this lab environment:","breadcrumb":{"@id":"https:\/\/www.insecurewi.re\/index.php\/2020\/05\/03\/running-a-nested-multi-site-vmware-nsx-v-6-4-lab\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.insecurewi.re\/index.php\/2020\/05\/03\/running-a-nested-multi-site-vmware-nsx-v-6-4-lab\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.insecurewi.re\/index.php\/2020\/05\/03\/running-a-nested-multi-site-vmware-nsx-v-6-4-lab\/#primaryimage","url":"https:\/\/www.insecurewire.com\/wp-content\/uploads\/2020\/05\/crossvc-1024x584.png","contentUrl":"https:\/\/www.insecurewire.com\/wp-content\/uploads\/2020\/05\/crossvc-1024x584.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.insecurewi.re\/index.php\/2020\/05\/03\/running-a-nested-multi-site-vmware-nsx-v-6-4-lab\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.insecurewi.re\/"},{"@type":"ListItem","position":2,"name":"Running A Nested Cross VCenter NSX-V 6.4 Lab"}]},{"@type":"WebSite","@id":"https:\/\/www.insecurewi.re\/#website","url":"https:\/\/www.insecurewi.re\/","name":"Insecure Wire","description":"A Network Engineer\u2019s Perspective.","publisher":{"@id":"https:\/\/www.insecurewi.re\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.insecurewi.re\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.insecurewi.re\/#organization","name":"Insecure Wire","url":"https:\/\/www.insecurewi.re\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.insecurewi.re\/#\/schema\/logo\/image\/","url":"https:\/\/www.insecurewi.re\/wp-content\/uploads\/2023\/10\/cloud.png","contentUrl":"https:\/\/www.insecurewi.re\/wp-content\/uploads\/2023\/10\/cloud.png","width":32,"height":32,"caption":"Insecure Wire"},"image":{"@id":"https:\/\/www.insecurewi.re\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/insecurewire"]},{"@type":"Person","@id":"https:\/\/www.insecurewi.re\/#\/schema\/person\/8ba08b41fc754b971a948ead6ccb777d","name":"nikonau","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.insecurewi.re\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2d1b9d9dc90da4f6d3da31b870f418c6b3553ba9be48d53e8ee3a35b0adb1d35?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2d1b9d9dc90da4f6d3da31b870f418c6b3553ba9be48d53e8ee3a35b0adb1d35?s=96&d=mm&r=g","caption":"nikonau"},"sameAs":["https:\/\/x.com\/https:\/\/twitter.com\/insecurewire"],"url":"https:\/\/www.insecurewi.re\/index.php\/author\/nikon\/"}]}},"_links":{"self":[{"href":"https:\/\/www.insecurewi.re\/index.php\/wp-json\/wp\/v2\/posts\/608","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.insecurewi.re\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.insecurewi.re\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.insecurewi.re\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.insecurewi.re\/index.php\/wp-json\/wp\/v2\/comments?post=608"}],"version-history":[{"count":0,"href":"https:\/\/www.insecurewi.re\/index.php\/wp-json\/wp\/v2\/posts\/608\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.insecurewi.re\/index.php\/wp-json\/wp\/v2\/media?parent=608"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.insecurewi.re\/index.php\/wp-json\/wp\/v2\/categories?post=608"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.insecurewi.re\/index.php\/wp-json\/wp\/v2\/tags?post=608"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}