Connect NSX-T Segments with Tier-1 Gateway – VMware NSX-T Part 16

In our previous article, we have created multiple NSX-T Segments and also created NSX-T Tier 1 Gateway.  As of now, VM’s connected to the same NSX-T segments can talk to each other but not able to talk to the VM’s in other segments.  In the below example, We have a T1 router deployed. NSX-T segments created and also VM’s connected to the segments but we didn’t Connect NSX-T Segments with Tier-1 Gateway to enable routing between the VM’s in the different segments. How do we enable routing between VM’s in different segments?

Tier-1 routing layer interfaces with the logical switches defined by the tenant administrators, and provides a one-hop routing function between the NSX-T segments.  So we need to connect NSX-T segments with Tier-1 gateway by creating gateway ports on the NSX-T segments. In this article, we will discuss details procedure to create Gateway ports on NSX-T segments to connect the NSX-T segments with the Tier-1 gateway to allow routing between the VM’s in different NSX-T segments.

How to Connect NSX-T Segments with Tier-1 Gateway

To Create Gateway ports in NSX-T segments, log in to NSX-T Manager with admin credentials. Click -> Networking -> Segements-> Select the Segments -> Click Edit

Connect NSX-T Segments with Tier-1 Gateway

 

Select the Tier-1 Gateway “MD-T1-LR-01” from the “Connected Gateway & Type”. We have already created the Tier-1 gateway in our previous post.

Click on Set Subnets

Connect NSX-T Segments with Tier-1 Gateway

In the Set Subnets page -> Click ADD SUBNET

Connect NSX-T Segments with Tier-1 Gateway

Enter the gateway address 172.16.10.1/24 in the Gateway field for segment “NSX-WEBLS-172.16.10.1” on the Set Subnets page. Click ADD.

Connect NSX-T Segments with Tier-1 Gateway

Click APPLY to set the gateway address for the subnet for the NSX-T segment.

Connect NSX-T Segments with Tier-1 Gateway

Click SAVE and click CLOSE EDITING.

Connect NSX-T Segments with Tier-1 Gateway

similarly, configure the gateway ports and set the subnets for all other NSX-T segments.

Connect NSX-T Segments with Tier-1 Gateway

In the above steps, by creating a gateway port in each segment. we have connected NSX-T segments with Tier-1 gateway. Each of the segments is now directly connected to the Tier-1router.  Tier-1 router provides east-west routing between the directly connected logical switches.

NSX-T Tier 1 Logical routerTest East-West Connectivity

Below are the IP address of each of VM’s

Web-01 -> 172.16.10.11 (Connect to segment “NSX-WebLS-172.16.10.0”)

Web-02 -> 172.16.10.12 (Connect to segment “NSX-WebLS-172.16.10.0”)

App-01 -> 172.16.20.11 (Connect to segment “NSX-APPLS-172.16.20.0”)

DB-01 -> 172.16.30.11 (Connect to segment  “NSX-DBLS-172.16.30.0”)

Ping Tests :

Ping between the virtual machine web-02 (172.16.10.11)  and app-01 (172.16.20.11) connected in different segments is Successful

Ping between the virtual machine web-02 (172.16.10.11)  and DB-01 (172.16.30.11) connected in different segments is  Successful

Ping between the virtual machine app-01 (172.16.20.11)  and web-01 (172.16.10.11) connected in different segments is Successful

Ping between the virtual machine app-01 (172.16.20.11)  and DB-01 (172.16.30.11) connected in different segments is  Successful

Ping between the virtual machine DB-01 (172.16.30.11)  and web-01 (172.16.10.11) connected in different segments is Successful

Ping between the virtual machine DB-01 (172.16.30.11)  and App-01 (172.16.20.11) connected in different segments is  Successful

 

We have created the gateway ports in the segment to connect NSX-T Segments with the Tier-1 Gateway. Now we are able to ping and reach the virtual machines connected to different segments. Tier-1 router provides east-west connectivity between the segments connected directly. I hope this article is informative for you. Thanks for Reading!!!. Be social and share it with social media, if you feel worth sharing it.