<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>endriopettini Tracker</title>
    <link>https://communities.vmware.com/wbsdv95928/tracker</link>
    <description>endriopettini Tracker</description>
    <pubDate>Sat, 11 Nov 2023 22:19:25 GMT</pubDate>
    <dc:date>2023-11-11T22:19:25Z</dc:date>
    <item>
      <title>Re: ESXi multiple networks - different DHCP scope</title>
      <link>https://communities.vmware.com/t5/Networking-Members/ESXi-multiple-networks-different-DHCP-scope/m-p/2986004#M399</link>
      <description>&lt;P&gt;To have your endpoints automatically use your Windows Active Directory (AD) server (192.168.1.86) as the DNS1 server, you would typically need to configure your DHCP server to provide the AD server's IP address as the DNS server to DHCP clients. Since your router is currently handling DHCP, you would need to configure DHCP options on your router.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here are the steps to configure DHCP options on many routers:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. Access your router's web-based management interface. You usually do this by entering the router's IP address (often 192.168.1.1 or similar) in a web browser.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. Log in to the router's administration console using the router's username and password.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3. Locate the DHCP settings. This might be under a "LAN," "Network," or "DHCP Server" section, depending on your router's firmware.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;4. Look for an option to specify DNS servers. You may need to set the primary DNS server to the IP address of your AD server (192.168.1.86).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;5. Save your changes and restart the DHCP service on your router if necessary.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;By configuring your router's DHCP server to provide the AD server's IP address as the primary DNS server, your endpoints should automatically use the AD server for DNS resolution when they obtain their IP addresses via DHCP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regarding your question about VMware ESXi, ESXi itself doesn't handle DHCP services or DNS settings for endpoints unless you have a specific DHCP server running within a virtual machine on the ESXi host. However, if you want to isolate a group of VMs within a specific vCenter folder and have them use different network parameters, you can achieve this through network segmentation:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. **Create a Separate Port Group**: In your vSphere environment, create a separate port group within your vSwitch or Distributed Switch. Assign this port group to the VMs you want to have different network parameters.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. **Configure DHCP**: If you want these VMs to use different DHCP settings, configure a DHCP server within this isolated network segment (port group). You can run a DHCP server on a VM within this segment, or if your router supports multiple DHCP scopes, configure a separate scope for this segment.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3. **DNS Configuration**: For DNS settings, you can either configure them manually on the individual VMs or configure the DHCP server in this segment to provide the desired DNS server IP addresses.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;By segmenting your network in this way, you can have specific VMs use different network parameters while still being part of the same ESXi host and vCenter environment.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Sep 2023 10:52:38 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Networking-Members/ESXi-multiple-networks-different-DHCP-scope/m-p/2986004#M399</guid>
      <dc:creator>endriopettini</dc:creator>
      <dc:date>2023-09-10T10:52:38Z</dc:date>
    </item>
    <item>
      <title>Re: Connecting ESXi hosts to 17 or more vDS</title>
      <link>https://communities.vmware.com/t5/Networking-Members/Connecting-ESXi-hosts-to-17-or-more-vDS/m-p/2986003#M398</link>
      <description>&lt;P&gt;In a VMware vSphere environment, connecting an ESXi host to more than the recommended maximum of 16 VMware Distributed Switches (vDS) can lead to unexpected behavior and is generally not a supported configuration. The maximum limit of 16 vDS per host is defined for various reasons, including management and resource allocation considerations.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;While some of these vDS may not have active physical uplinks, they are still part of the host's configuration and consume resources such as memory and CPU cycles. Going significantly beyond the recommended limits can potentially lead to performance issues, management complexity, and unintended consequences.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;While it may be technically possible to connect an ESXi host to more than 16 vDS by creating additional vDS with no active physical uplinks, doing so is not advisable from a best practices standpoint. VMware recommends adhering to the documented configuration limits to ensure stability and predictability in your virtualization environment.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you find yourself in a situation where you believe you need to exceed these limits for a specific use case or requirement, it's a good idea to reach out to VMware support or consult with a VMware representative for guidance. They can provide insights into whether there are alternative solutions or configurations that can meet your needs while staying within supported limits.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Sep 2023 10:50:51 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Networking-Members/Connecting-ESXi-hosts-to-17-or-more-vDS/m-p/2986003#M398</guid>
      <dc:creator>endriopettini</dc:creator>
      <dc:date>2023-09-10T10:50:51Z</dc:date>
    </item>
    <item>
      <title>Re: VXLAN without NSX</title>
      <link>https://communities.vmware.com/t5/Networking-Members/VXLAN-without-NSX/m-p/2986002#M397</link>
      <description>&lt;P&gt;In a VMware vMSC (vSphere Metro Storage Cluster) setup using VXLAN for network virtualization and spanning multiple datacenters with Cisco Catalyst switches and ISL (Inter-Switch Link) connectivity, you can indeed configure VXLAN without VMware NSX by relying on the capabilities of the physical network switches. Below are the key steps you would typically need:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. **VXLAN Configuration on ESXi Hosts**:&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;- Ensure that ESXi hosts in both datacenters have VXLAN enabled and are running compatible versions of VMware vSphere.&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;- Create and configure a VMware Distributed Switch (VDS) that spans both datacenters. This VDS will be used for VXLAN traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. **Distributed Switch Configuration**:&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;- Create a Distributed Port Group on the VDS specifically for VXLAN traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;- Enable IGMP Snooping on the Distributed Switch if required for multicast group management (which is common in VXLAN deployments).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3. **Physical Switch Configuration**:&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;- On the Cisco Catalyst switches, enable VXLAN support, which typically involves configuring the following:&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;- VLANs: Ensure that the VLANs used for VXLAN are properly configured on the switches.&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;- Multicast Support: Configure multicast group addresses for VXLAN traffic and ensure proper multicast routing if needed.&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;- MTU Size: Ensure that the MTU size is consistent across your entire network, including both ESXi hosts and physical switches. VXLAN adds encapsulation, so you might need a larger MTU size.&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;- ISL Configuration: As you mentioned, you have ISL between datacenters. Ensure that ISL is correctly configured to allow VXLAN traffic to traverse between the datacenters.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;4. **VTEP Configuration (VXLAN Tunnel Endpoints)**:&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;- Configure Virtual Tunnel Endpoint (VTEP) interfaces on the physical switches. These interfaces are responsible for encapsulating and decapsulating VXLAN traffic as it enters and exits the physical network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;5. **VXLAN Segment Configuration**:&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;- Define VXLAN segments or VNIs (VXLAN Network Identifiers) as needed to segment your network. Each segment represents a separate logical network on top of the physical infrastructure.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;6. **Routing Configuration (if required)**:&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;- If you need to route traffic between VXLAN segments or VNIs across datacenters, you'll need to configure routing on the physical switches.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;7. **Testing and Validation**:&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;- Thoroughly test your VXLAN setup to ensure that traffic flows as expected between virtual machines in different VXLAN segments and across datacenters.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;8. **Monitoring and Troubleshooting**:&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;- Implement monitoring and logging to assist in troubleshooting and maintaining the VXLAN network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Remember that VXLAN configurations can be complex, and they should align with your specific network design and requirements. It's also crucial to consult the documentation for your Cisco Catalyst switches and follow best practices provided by VMware for VXLAN deployments in a vMSC environment.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Sep 2023 10:49:24 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Networking-Members/VXLAN-without-NSX/m-p/2986002#M397</guid>
      <dc:creator>endriopettini</dc:creator>
      <dc:date>2023-09-10T10:49:24Z</dc:date>
    </item>
    <item>
      <title>Re: VDS Load Balancing for LAG / LACP</title>
      <link>https://communities.vmware.com/t5/Networking-Members/VDS-Load-Balancing-for-LAG-LACP/m-p/2986001#M396</link>
      <description>&lt;P&gt;It depends heavily on your environment; if your traffic is primarily at the L2 level, it makes more sense to use the MAC-based algorithm as it involves one less level of processing. Some devices offer the option to use both IP and MAC, which is another way to effectively balance traffic for both layers of the OSI model (L2 and L3).&lt;/P&gt;</description>
      <pubDate>Sun, 10 Sep 2023 10:46:42 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Networking-Members/VDS-Load-Balancing-for-LAG-LACP/m-p/2986001#M396</guid>
      <dc:creator>endriopettini</dc:creator>
      <dc:date>2023-09-10T10:46:42Z</dc:date>
    </item>
    <item>
      <title>Re: NSX ISP</title>
      <link>https://communities.vmware.com/t5/Brazilian-Portuguese-Discussions/NSX-ISP/m-p/2985997#M7093</link>
      <description>&lt;P&gt;O VMware NSX é uma plataforma de virtualização de rede que oferece recursos avançados de rede virtualizada e segurança para data centers e ambientes de nuvem. Em um ambiente de provedor de serviços de Internet (ISP), a função principal do NSX pode ser fornecer serviços de rede virtualizados para clientes, melhorar a segurança da rede e simplificar a operação da rede. Aqui estão algumas das principais funções do NSX em um ambiente ISP:&lt;/P&gt;&lt;P&gt;1. **Virtualização de Rede**: O NSX permite que os ISPs criem redes virtuais isoladas para cada cliente ou grupo de clientes. Isso ajuda a segmentar o tráfego e garantir que os clientes não interfiram uns nos outros.&lt;/P&gt;&lt;P&gt;2. **Gerenciamento de VLAN**: O NSX pode ser usado para criar redes virtuais usando VLANs, o que ajuda na segmentação de tráfego e na atribuição de VLANs específicas a clientes ou serviços.&lt;/P&gt;&lt;P&gt;3. **Roteamento Virtual**: O NSX oferece recursos avançados de roteamento virtual, permitindo que os ISPs configurem rotas personalizadas para seus clientes e otimizem o tráfego na rede.&lt;/P&gt;&lt;P&gt;4. **Firewall Virtual**: O NSX inclui um firewall virtual que pode ser usado para aplicar políticas de segurança em nível de aplicativo, segmentando e protegendo o tráfego de clientes contra ameaças.&lt;/P&gt;&lt;P&gt;5. **Balanceamento de Carga Virtual**: O NSX suporta balanceamento de carga virtual, que pode ser útil para distribuir o tráfego entre vários servidores ou recursos de clientes.&lt;/P&gt;&lt;P&gt;6. **Isolamento de Ambiente**: O NSX ajuda a isolar os ambientes de clientes uns dos outros, aumentando a segurança e evitando conflitos de IP ou problemas de segurança.&lt;/P&gt;&lt;P&gt;7. **Orquestração e Automatização**: O NSX geralmente é integrado a ferramentas de orquestração e automação, o que permite que os ISPs provisionem e gerenciem facilmente recursos de rede para clientes sob demanda.&lt;/P&gt;&lt;P&gt;8. **Monitoramento e Visibilidade**: O NSX oferece ferramentas de monitoramento e visibilidade que permitem aos ISPs acompanhar o desempenho da rede e identificar problemas rapidamente.&lt;/P&gt;&lt;P&gt;9. **Recuperação de Desastres**: O NSX também pode ser usado para configurar soluções de recuperação de desastres, como replicação de máquinas virtuais e failover de rede para garantir alta disponibilidade dos serviços de rede.&lt;/P&gt;&lt;P&gt;Em resumo, a principal função do VMware NSX em um ambiente ISP é virtualizar e automatizar a rede para oferecer serviços de rede flexíveis, seguros e escaláveis para os clientes, ao mesmo tempo em que simplifica a operação e a gestão da rede.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Sep 2023 10:33:06 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Brazilian-Portuguese-Discussions/NSX-ISP/m-p/2985997#M7093</guid>
      <dc:creator>endriopettini</dc:creator>
      <dc:date>2023-09-10T10:33:06Z</dc:date>
    </item>
    <item>
      <title>Re: Implementação de NSX</title>
      <link>https://communities.vmware.com/t5/Brazilian-Portuguese-Discussions/Implementa%C3%A7%C3%A3o-de-NSX/m-p/2985996#M7092</link>
      <description>&lt;P&gt;Excelente post.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Vai me ajudar muito.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Sep 2023 10:29:01 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Brazilian-Portuguese-Discussions/Implementa%C3%A7%C3%A3o-de-NSX/m-p/2985996#M7092</guid>
      <dc:creator>endriopettini</dc:creator>
      <dc:date>2023-09-10T10:29:01Z</dc:date>
    </item>
    <item>
      <title>Re: Problemas NSX</title>
      <link>https://communities.vmware.com/t5/Brazilian-Portuguese-Discussions/Problemas-NSX/m-p/2985994#M7091</link>
      <description>&lt;LI-SPOILER&gt;&amp;nbsp;&lt;/LI-SPOILER&gt;&lt;P&gt;Falha de operação de MTU e VXLAN entre vendors.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Sep 2023 10:26:52 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Brazilian-Portuguese-Discussions/Problemas-NSX/m-p/2985994#M7091</guid>
      <dc:creator>endriopettini</dc:creator>
      <dc:date>2023-09-10T10:26:52Z</dc:date>
    </item>
  </channel>
</rss>

