What s New in VMware vcloud Director 8.20

Similar documents
WHITE PAPER SEPTEMBER 2017 VCLOUD DIRECTOR 9.0. What s New

What s New with VMware vcloud Director 8.0

Dedicated Hosted Cloud with vcloud Director

VMware vcloud Director for Service Providers

VMware vcloud Director Configuration Maximums vcloud Director 9.1 and 9.5 October 2018

Customer Onboarding with VMware NSX L2VPN Service for VMware Cloud Providers

Storage Considerations for VMware vcloud Director. VMware vcloud Director Version 1.0

VMware vshield Edge Design Guide

Workload Mobility and Disaster Recovery to VMware Cloud IaaS Providers

VMware vrealize Suite and vcloud Suite

vrealize Operations Management Pack for NSX for vsphere 3.5 Release Notes

Installing and Configuring vcloud Connector

Cloud Provider Pod Designer User Guide. November 2018 Cloud Provider Pod 1.0.1

IBM Cloud for VMware Solutions NSX Edge Services Gateway Solution Architecture

vcloud Director Administrator's Guide

Installing and Configuring vcloud Connector

Certified Reference Design for VMware Cloud Providers

vcloud Air - Virtual Private Cloud OnDemand Networking Guide

CLOUD PROVIDER POD. for VMware. Release Notes. VMware Cloud Provider Pod January 2019 Check for additions and updates to these release notes

Scalable Licensing with Selective Monitoring in VMware vrealize Operations

VMware vcloud Networking and Security Overview

VVD for Cloud Providers: Scale and Performance Guidelines. October 2018

VMware Cloud Provider Pod Designer User Guide. October 2018 Cloud Provider Pod 1.0

vsphere Replication for Disaster Recovery to Cloud

DISASTER RECOVERY- AS-A-SERVICE FOR VMWARE CLOUD PROVIDER PARTNERS WHITE PAPER - OCTOBER 2017

CLOUD PROVIDER POD RELEASE NOTES

vcloud Director Tenant Portal Guide vcloud Director 8.20

vcloud Director User's Guide 04 OCT 2018 vcloud Director 9.5

vshield Administration Guide

vcenter Operations Management Pack for NSX-vSphere

vrealize Operations Management Pack for NSX for vsphere 3.5.0

Cross-vCenter NSX Installation Guide. Update 3 Modified on 20 NOV 2017 VMware NSX for vsphere 6.2

How to Use a Tomcat Stack on vcloud to Develop Optimized Web Applications. A VMware Cloud Evaluation Reference Document

vcloud Director Administrator's Guide

Recommended Configuration Maximums. NSX for vsphere Updated on August 08, 2018

Cross-vCenter NSX Installation Guide. Update 6 Modified on 16 NOV 2017 VMware NSX for vsphere 6.3

VMware vfabric Data Director Installation Guide

21CTL Disaster Recovery, Workload Mobility and Infrastructure as a Service Proposal. By Adeyemi Ademola E. Cloud Engineer

Cross-vCenter NSX Installation Guide. Update 4 VMware NSX for vsphere 6.4 VMware NSX Data Center for vsphere 6.4

vsphere Replication for Disaster Recovery to Cloud

Advanced Architecture Design for Cloud-Based Disaster Recovery WHITE PAPER

VMware vcloud Air. Enterprise IT Hybrid Data Center TECHNICAL MARKETING DOCUMENTATION

Architecting Tenant Networking with VMware NSX in VMware vcloud Director

Recommended Configuration Maximums

vcloud Director Administrator's Guide vcloud Director 9.0

vrealize Operations Management Pack for NSX for vsphere 3.0

vrealize Operations Management Pack for NSX for vsphere 2.0

DEPLOYING A VMWARE VCLOUD DIRECTOR INFRASTRUCTURE-AS-A-SERVICE (IAAS) SOLUTION WITH VMWARE CLOUD FOUNDATION : ARCHITECTURAL GUIDELINES

vsphere Replication for Disaster Recovery to Cloud vsphere Replication 6.5

vcloud Director Tenant Portal Guide 04 OCT 2018 vcloud Director 9.5

TECHNICAL WHITE PAPER - MAY 2017 MULTI DATA CENTER POOLING WITH NSX WHITE PAPER

NSX Administration Guide. Update 3 Modified on 20 NOV 2017 VMware NSX for vsphere 6.2

vsphere Replication for Disaster Recovery to Cloud vsphere Replication 8.1

VMware vcloud Architecture Toolkit Hybrid VMware vcloud Use Case

Monitoring Hybrid Cloud Applications in VMware vcloud Air

Recommended Configuration Maximums

What s New in VMware vcloud Automation Center 5.1

VMware vfabric Data Director Installation Guide

vcloud Air - Dedicated Disaster Recovery User's Guide

vcenter Operations Management Pack for vcns

IaaS Integration for Multi- Machine Services. vrealize Automation 6.2

AT&T CLOUD SERVICES. AT&T Synaptic Compute as a Service SM. Using VMware vcloud Connector

CLOUD PROVIDER POD RELEASE NOTES

VMWARE HORIZON CLOUD WITH VMWARE IDENTITY MANAGER QUICK START GUIDE WHITE PAPER MARCH 2018

Introducing VMware Validated Designs for Software-Defined Data Center

VMware Cloud Provider Platform

Introducing VMware Validated Designs for Software-Defined Data Center

vcloud Director Administrator's Guide vcloud Director 8.10

Introducing VMware Validated Design Use Cases

Introducing VMware Validated Design Use Cases. Modified on 21 DEC 2017 VMware Validated Design 4.1

VMware vshield App Design Guide TECHNICAL WHITE PAPER

VMware vcloud Air Key Concepts

Using the vcenter Orchestrator Plug-In for vcloud Director 1.0

VMware vcloud Service Definition for a Public Cloud. Version 1.6

vcloud Director User's Guide

vcloud Air - Dedicated Disaster Recovery Release Notes

vcloud Air Advanced Networking Services Guide

vshield Quick Start Guide

Ordering and deleting Single-node Trial for VMware vcenter Server on IBM Cloud instances

VMWARE SOLUTIONS AND THE DATACENTER. Fredric Linder

VMware vcloud Air User's Guide

IaaS Integration for Multi-Machine Services

What s New in VMware vsphere 5.1 Platform

NSX-T Data Center Migration Coordinator Guide. 5 APR 2019 VMware NSX-T Data Center 2.4

vcloud Director User's Guide

Introducing VMware Validated Designs for Software-Defined Data Center

Using VMware vrealize Orchestrator with VMware vcloud Availability for vcloud Director Version 1.0 April 2017

VMware vsphere 5.0 Evaluation Guide

CONFIDENTLY INTEGRATE VMWARE CLOUD ON AWS WITH INTELLIGENT OPERATIONS

Securing VMware NSX MAY 2014

VM-SERIES FOR VMWARE VM VM

Using vrealize Operations Tenant App as a Service Provider

vrealize Orchestrator Load Balancing

VMware Skyline Collector Installation and Configuration Guide. VMware Skyline 1.4

vrealize Production Test Upgrade Assessment Guide

What s New in VMware vsphere 5.1 VMware vcenter Server

vrealize Operations Management Pack for NSX for vsphere Release Notes

Getting Started with VMware View View 3.1

PROVIDING SECURE ACCESS TO VMWARE HORIZON 7 AND VMWARE IDENTITY MANAGER WITH THE VMWARE UNIFIED ACCESS GATEWAY REVISED 2 MAY 2018

vrealize Orchestrator Load Balancing

Transcription:

What s New in VMware vcloud Director 8.20 Feature Overview TECHNICAL WHITE PAPER

Table of Contents Introduction.... 3 Feature Updates.... 3 Advanced NSX Networking Features.... 3 Custom Role-Based Access Control for Service Provider and Tenant Roles.... 11 VM to ESXi Host Affinity Rules... 13 Architecture Updates.... 14 Importing Existing vcenter Managed Infrastructure into vcloud Director.... 14 Automatic Import of VMs.... 16 HTML5 User Interface... 17 Additional Changes................................................... 18 Summary.... 18 More Information.... 18 About the Author.... 18 TECHNICAL WHITE PAPER / 2

Introduction The VMware vcloud Director 8.20 solution makes it easy for cloud service providers to manage and operate virtual data centers (VDCs) for multiple consumers. The solution can automate the creation of VDCs based on consumer resource needs and assign the appropriate policies necessary to maintain a proper allocation of resources. The vcloud Director solution also provides a unique portal for consumers to manage various cloud services and workloads on their own. vcloud Director 8.20 is a milestone release that adds new networking services that support advanced workload management, improve security, and provide multiple ways to connect remotely with a hybrid cloud model. Feature Updates vcloud Director 8.20 includes major functional updates. The solution now integrates more closely with VMware NSX network virtualization, which means that end users will be able customize many network settings. Advanced NSX Networking Features Service providers can now abstract and define more NSX features for individual tenants. This allows them to create new advanced service offerings that give tenants and organization VDC users more power to manage their workloads. This release makes the following NSX networking services available to tenants via self-service: Dynamic routing Add Open Shortest Path First (OSPF) and Border Gateway Protocol (BGP) algorithms to automatically create routing tables between dynamic VMware NSX Edge gateways. Distributed firewall Define granular security policies on workloads connected on the same organization network, including firewall rules for traffic flowing within the organization VDC. Tenant layer 2 (L2) VPN access Stretch on-premises workloads to vcloud Director organization networks to enable a hybrid cloud. Tenant SSL VPN Access workloads placed in an organization s VDCs remotely via an SSL client. Load balancing Distribute incoming traffic to workloads dynamically to help applications maintain SLAs. These services (except for the distributed firewall) are accessible by right-clicking the NSX Edge gateway and selecting Edge Gateway Services. If you are upgrading from an older version of vcloud Director software and have existing NSX Edge gateways deployed, you can convert these to NSX Edge gateway services by right-clicking the NSX Edge gateway and selecting Convert to Advanced Gateway. This action will redeploy the NSX Edge gateway, upgrade it to a higher version of NSX Edge software if it is version 5.5 or earlier, and enable the new HTML user interface (UI) for configuring the advanced NSX features. Figure 1. Convert a VMware NSX Edge Gateway to an Advanced Gateway TECHNICAL WHITE PAPER / 3

Dynamic Routing vcloud Director 8.20 adds support for configuring dynamic routing between different NSX Edge gateways. Previously, it only supported static routes between different vapp networks connected to the same or different organization VDC network. Defining routing paths is helpful in situations where two vapps need to talk to each other but are located on different L2 segments. Static routing can be defined at each NSX Edge gateway to determine what the next hop for the traffic originating from a specific vapp will be. Dynamic routing reduces the need to configure manual routes when a virtual machine (VM) in an organization VDC network needs to talk to another VM in a different organization VDC network. Dynamic routing uses algorithms (vcloud Director software supports both OSPF and BGP) to share network routing tables between various NSX Edge gateways that have dynamic routing enabled. This reduces the overall time organization administrators spend maintaining network routing tables. In a hybrid cloud scenario, if the tenant using the organization network has an enterprise on-premises network connected via Multiprotocol Label Switching (MPLS) or Internet Protocol Security (IPSec), the dynamic routing protocols will help define the best route for transferring packets between the two data centers. You can configure dynamic routing by right-clicking an NSX Edge gateway and selecting the Routing tab. Figure 2. VMware NSX Edge Gateway Dynamic Routing Global Configuration TECHNICAL WHITE PAPER / 4

Figure 3. VMware NSX Edge Gateway Dynamic Routing BGP Configuration Distributed Firewall This vcloud Director release introduces the ability for a tenant to configure NSX distributed firewall rules on VMs in an organization VDC. The distributed firewall rules define the ways that traffic can flow between VMs on an organization VDC network. In previous vcloud Director versions, you could configure the firewall on the NSX Edge gateway to control the traffic flowing between the external networks and the routed organization VDC networks, also known as north-south traffic. But this firewall could not define rules of traffic flow between VMs within the same organization VDC network or networks within the same organization VDC. Essentially, there was no way to limit east-west traffic flow. The new distributed firewall available in vcloud Director 8.20 brings this east-west traffic under control via NSX network virtualization functions. The distributed firewall also further secures vcloud Director workloads by providing more granular security control. To access the distributed firewall function, a user in the organization must have enough privileges to manage the firewall. You can access distributed firewall settings by logging in to the vcloud Director portal and rightclicking Org vdc > Manage Firewall. This will open a new tab. Figure 4. Distributed Firewall Configuration TECHNICAL WHITE PAPER / 5

NSX kernel modules controlled with VMware NSX Manager software reside within each of the VMware ESXi hosts. Once you create firewall rules, they get published to every ESXi host that s supporting the organization VDC. The vcloud Director portal allows organizations to define these rules in a similar fashion to the firewall on the NSX Edge gateway. You can create the rules using individual IP or MAC addresses, or a predefined group of IP/MAC address sets. You can apply the rules to individual ports or select from a predefined list of services (e.g., SNMP, ICMP, HTTP, etc.). Apart from individual services, the vcloud Director portal has predefined service groups (e.g., Microsoft Exchange, Oracle, etc.). Figure 5. Distributed Firewall Services Tenant L2 VPN Access L2 VPN access now allows tenants or users to create a tunnel between networks in an organization VDC to an on-premises network at their enterprise location. This tunnel creates an L2 broadcast domain between two sites and makes the two networks look seamless across the cloud by putting VMs on both sites on the same IP subnet. vcloud Director software uses the NSX L2 VPN server at the NSX Edge gateway and allows configuration by an authorized tenant user. An enterprise user consuming the organization VDC can connect to the L2 VPN server by using NSX network virtualization on-premises or by using the standalone NSX Edge appliance to talk to the NSX server. Once the client has configured the NSX L2 VPN server, the tenant can decide which L2 segment on-premises it wants to extend to the cloud. The client can extend an existing on-premises VXLAN or VLAN to the organization VDC network. The subnets on both ends (cloud and on-premises) must be the same. Alternatively, you can configure the organization VDC network as a client with the L2 server onsite. You can only extend routed organization VDC networks using the L2 VPN tunnel. To extend an organization VDC network, you must convert it to a subinterface type, which allows vcloud Director software to identify the network it will use to extend via L2 VPN. The vcloud Director solution, with the help of NSX network virtualization, will create a trunk interface type for this network. Figure 6. L2 VPN: Convert an Organization Network to Subinterface TECHNICAL WHITE PAPER / 6

When creating a new organization VDC-routed network, select Create as Subinterface. Figure 7. L2 VPN: Enable Subinterface When Creating Organization Network To enable the L2 VPN tunnel, the server site needs an encryption protocol and an authorization key, along with the networks (and interfaces) to be stretched. On the client site, you must select the same encryption protocol with appropriate authentication details and the network extended to the tunnel. The L2 VPN can stretch networks regardless of whether the individual segments are VXLAN or VLAN. Tenant SSL VPN Access This vcloud Director release adds support for SSL VPN access, in addition to IPSec and L2 VPN options. With SSL VPN enabled, remote clients can connect to the SSL server configured on the NSX Edge gateway to access applications or organization VDC networks. When an SSL connection is established from a remote client, the SSL server gives each connected client an IP address on the private network. This enables hybrid cloud deployments in which a remote client can connect to the workloads sitting in the cloud inside an organization VDC. While an L2 VPN stretches an existing IP subnet across sites, an SSL VPN creates an interface with the same IP range for every incoming connection and releases it once the remote client has disconnected. An L2 VPN tunnel is always active once you have configured the two sites, but an SSL VPN tunnel can terminate once the client disconnects. TECHNICAL WHITE PAPER / 7

To configure an SSL VPN server, the server needs a public IP address (on the NSX Edge gateway), a pool of IP addresses to assign to incoming client connections, an authentication protocol, and a list of users who will be accessing it. You can configure SSL servers by navigating to Edge Gateway > Edge Gateway Services > SSL VPN Plus. Figure 8. SSL VPN Server Settings TECHNICAL WHITE PAPER / 8

Load Balancing The NSX Edge load balancer now helps evenly distribute incoming traffic to a VDC workload with a pool of servers. Pools support a common application and can be based on HTTP, HTTPS, TCP, or UDP. A pool of servers is defined using the Pools configuration, which also allows you to specify the IP addresses of the VMs that will be sharing the incoming traffic workload. Figure 9. VMware NSX Edge Gateway Load Balancer Configuration Figure 10. Edit a Pool TECHNICAL WHITE PAPER / 9

The load balancer also needs an IP address where the incoming traffic will originate. You can define this using a virtual IP address and it is typically a public IP address that s configured for the NSX Edge gateway interface. The virtual server maps the public IP address for incoming traffic to the pool of servers. Figure 11. Edit a Virtual Server You can manage the way the incoming traffic is redirected to the pool of servers with the Application Profiles settings. You can define an application profile according to multiple parameters, including redirection of URLs and the maintenance of persistent connections based on a source IP address, cookie, or session ID. Figure 12. Application Profiles TECHNICAL WHITE PAPER / 10

Figure 13. Edit an Application Profile You can also assess the health of the pool of back-end servers using the Service Monitor setting. Figure 14 shows the overall process for configuring a load balancer on the NSX Edge gateway. Figure 14. Edge Load Balancer Workflow Custom Role-Based Access Control for Service Provider and Tenant Roles A service provider administrator must perform many tasks to onboard new tenants to the cloud, maintain existing tenants, and maintain the underlying VMware infrastructure. By mapping specific roles to the meta-functions that the service provider administrator will perform, service providers can improve their security practices and operational visibility while maintaining compliance. TECHNICAL WHITE PAPER / 11

vcloud Director 8.20 allows the creation of custom roles for service provider tenants. You can define the roles based on functional tasks and subtasks within the vcloud Director system administration. To create a custom role, first select a function, then assign a user the new role. For example, if system administrators are going to use the VMware vsphere platform to define and manage service provider VDCs in the data center, their custom role will be assigned the provider VDC, the VMware vcenter Server application, datastores, provider network, and hosts functions. Figure 15. System Users Role Definitions Similarly, you can create custom roles for organization administrators. Although organization administrators are already created with predefined roles out-of-the-box, creating custom roles provides more granular access control. In addition, with custom roles, service providers can restrict access to just the features and functions that the tenant has signed up for. This feature helps restrict tenant access to tiered services. TECHNICAL WHITE PAPER / 12

VM to ESXi Host Affinity Rules VM to host affinity rules allows you to pin certain VMs to a group of ESXi hosts backing the organization VDC resources. The affinity rules ensure that the VMs defined in the rule set are placed within the defined set of hosts. A provider VDC is associated with a cluster of ESXi hosts. These clusters normally have VMware vsphere Distributed Resource Scheduler TM (DRS) enabled. When a tenant instantiates a VM for deployment, DRS uses an algorithm to select an appropriate ESXi host for the VM, and the total workload in that cluster is distributed evenly among the ESXi hosts. However, there may be certain scenarios where you need to place a VM in an organization VDC on a specific host not recommended by DRS. These scenarios include latency-sensitive applications or applications with licensing requirements that you need to place on a specific ESXi host or hosts. Because affinity rules require visibility between both the VM, which is a tenant object, and an ESXi host, only system administrators can create them. Take these steps to create affinity rules: 1. Create an ESXi host group in the vcenter Server application, which will create a host group inside the cluster that s backing the provider VDC. Log in to the vcenter Server application and navigate to Cluster > Manage Settings > Configuration > Host Groups. 2. Create a VM group in the vcloud Director portal, which will list the VMs that require affinity to the host group. Log in to the vcloud Director portal and navigate to Provider vdc > Resource Pools Tabs > Open the Resource Pool > VM Groups. 3. Create a new affinity rule in the Resource Pools section to associate the VM group with the host group. Figure 16. VM Host Affinity Rule TECHNICAL WHITE PAPER / 13

Architecture Updates vcloud Director 8.20 also adds many updates to its architecture, including the way it manages the inventory of objects with the vcenter Server application and an additional API to configure networking services. Importing Existing vcenter Managed Infrastructure into vcloud Director The vcloud Director solution interacts with the underlying vcenter Server application to deploy and manage VMs. The vcenter Server application is responsible for placing these VMs on the appropriate ESXi hosts based on the distributed resource cluster s calculations. The vcloud Director solution synchronizes with the vcenter Server application to keep track of the state and inventory of VMs. At the same time, vcloud Director software creates resource pools as container objects to place VMs created in an organization VDC. The resource pools have the allocation definitions assigned for compute, network, and storage, which means that vcloud Director software only synchronizes inventory under these resource pools. vcloud Director software will not recognize existing VMs that the vcenter Server application is managing. This release makes it possible to import existing VMs in the vcenter Server application to an organization VDC in the vcloud Director portal. This will help service providers bring the multitenancy vcloud Director platform into already managed vcenter Server environments. Imported VMs must be mapped to tenants or organization VDCs within the vcloud Director solution. Figure 17 explains the resource pool structure needed. Figure 17. Resource Pool Structure Required for Import TECHNICAL WHITE PAPER / 14

To import existing VMs, first create a new provider VDC with RP1 as the resource pool. Once created, to adopt RP2 in the organization VDC, trigger the following API: POST Content-Type: application/vnd.vmware.admin.createvdcparams+xml <?xml version= 1.0 encoding= UTF-8?> <CreateVdcParams name= org26vdc1 xmlns= http://www.vmware.com/vcloud/v1.5 > <Description>Example VDC</Description> <AllocationModel>AllocationVApp</AllocationModel> <ComputeCapacity> <Cpu> <Units>MHz</Units> <Allocated>2048</Allocated> <Limit>2048</Limit> </Cpu> <Memory> <Units>MB</Units> <Allocated>2048</Allocated> <Limit>2048</Limit> </Memory> </ComputeCapacity> <NicQuota>0</NicQuota> <NetworkQuota>100</NetworkQuota> <VdcStorageProfile> <Enabled>true</Enabled> <Units>MB</Units> <Limit>20480</Limit> <Default>true</Default> <ProviderVdcStorageProfile href= https://vcloud.example.com/api/admin/pvdcstorageprofile/101 /> </VdcStorageProfile> <ResourceGuaranteedMemory>1</ResourceGuaranteedMemory> <ResourceGuaranteedCpu>1</ResourceGuaranteedCpu> <VCpuInMhz>2048</VCpuInMhz> <IsThinProvision>false</IsThinProvision> <NetworkPoolReference href= https://vcloud.example.com/api/admin/extension/networkpool/313 /> <ProviderVdcReference name= Main Provider href= https://vcloud.example.com/api/admin/providervdc/35 /> <ResourcePoolRefs> <vmext:vimobjectref > <vmext:vimserverref href= https://vcloud.example.com/api/admin/extension/vimserver/36 name= VC type= application/vnd.vmware.admin.vmwvirtualcenter+xml /> <vmext:moref>resgroup-70</vmext:moref> <vmext:vimobjecttype>resource_pool</vmext:vimobjecttype> </vmext:vimobjectref> </ResourcePoolRefs> <UsesFastProvisioning>true</UsesFastProvisioning> </CreateVdcParams> TECHNICAL WHITE PAPER / 15

In the preceding example, the existing resource pool setting on RP2 will be overwritten by the one defined by the allocation setting on the provider VDC and will be added to RP1. Also, because vcloud Director software creates vapp constructs, it will automatically add them around imported VMs. Automatic Import of VMs When you create a VM in a resource pool that s backing an organization VDC, vcloud Director software will automatically import the VMs as vapps in the organization VDC cloud. As part of its periodic inventory update with the vcenter Server application, any time vcloud Director software sees any new VM objects in a resource pool that maps to a tenant organization, it will automatically import them, generate a vapp construct around them, and start to include them as managed objects in its updated inventory. This feature helps achieve consistency across vsphere and vcloud Director environments. Not all service providers will want to always have automatic import running, so the feature has an on/off switch to enable or disable it. You can apply automatic import of VMs at the system, organization, or organization VDC level, with the settings overwriting each other in that order. You can change the system setting by navigating to the System > Administration > System Settings > General > Miscellaneous section. To change the settings on an organization VDC, make a GET API call: GET https://[vcd-cell-address]/api/admin/vdc/[org-vdc-id] Change the VmDiscoveryEnabled tag to True via a PUT request: PUT https://[vcd-cell-address]/api/admin/vdc/[org-vdc-id] Accept:application/*+xml;version=27.0 x-vcloud-authorization:[authorization code] Content-Type:application/vnd.vmware.admin.vdc+xml <?xml version= 1.0 encoding= UTF-8?> <AdminVdc xmlns= http://www.vmware.com/vcloud/v1.5 name= vdc-test > <AllocationModel>AllocationVApp</AllocationModel> <ComputeCapacity> <Cpu> <Units>MHz</Units> <Allocated>0</Allocated> <Limit>0</Limit> <Reserved>0</Reserved> <Used>0</Used> <Overhead>0</Overhead> </Cpu> <Memory> <Units>MB</Units> <Allocated>0</Allocated> <Limit>0</Limit> <Reserved>0</Reserved> <Used>0</Used> <Overhead>0</Overhead> </Memory> TECHNICAL WHITE PAPER / 16

</ComputeCapacity> <NicQuota>0</NicQuota> <NetworkQuota>1024</NetworkQuota> <UsedNetworkCount>0</UsedNetworkCount> <VmQuota>100</VmQuota> <ProviderVdcReference href= https://[vdc-celladdress]/api/admin/providervdc/[pvdc id] name= [pvdc name] type= application/vnd.vmware.admin.providervdc+xml /> <VmDiscoveryEnabled>true</VmDiscoveryEnabled> </AdminVdc> There are still some scenarios in which importing a VM might not work. Typically, the VM being imported needs to conform its hardware settings to the organization VDC that it s being mapped into. If not, vcloud Director software will not be able to import the VM and will log the reason in the events log. Example scenarios include a VM that has a disk drive stored in a datastore that the organization VDC doesn t have access to; or a VM that is attached to a virtual network that s not mapped to the organization VDC network; or a VM with a hardware profile that is higher or lower than the parent provider VDC. HTML5 User Interface With this release, parts of the vcloud Director UI have been rearchitected to begin the transition from the current Flex-based technology to an interface based on HTML5. All the NSX Edge gateway networking services and distributed firewall configurations available to organizations have been moved to the HTML5 interface, while the rest of the UI elements are still Flex-based. When logging in to the vcloud Director portal, you will still see the old UI, until you navigate to an NSX Edge gateway that s been converted to an advanced gateway. Users do not need to re-enter login credentials, and the user experience will be seamless. To access the new UI, right-click the NSX Edge gateway and select Configure Services. Another way to see the new UI is to right-click an organization VDC and select Manage Firewall. Figure 18. New User Interface for an NSX Edge Gateway Converted to an Advanced Gateway TECHNICAL WHITE PAPER / 17

Additional Changes In addition to the feature and architectural updates already mentioned in this document, this vcloud Director release includes other useful functionality. For instance, upgrading vcloud Director installations with multiple cells is now much easier with upgrade automation scripts. This release also allows network pools backed by vcloud Director network isolation (vcdni) to be converted to VXLAN-backed network pools. Summary VMware vcloud Director 8.20 is packed with major new features that will help service providers and their consumers further secure their workloads with the distributed firewall functions; better manage their workloads in the cloud with advanced load-balancing capabilities; and deploy multiple hybrid channels to the cloud using L2 or SSL VPN services. More Information For more information about the VMware vcloud Director solution, visit the product pages at https://www.vmware.com/products/vcloud-director.html. Access the documentation for vcloud Director software at https://www.vmware.com/support/pubs/vcd_sp_pubs.html. Access reference design and architecture documentation at https://www.vmware.com/cloud-computing/cloud-architecture/vcat-sp.html. To purchase the vcloud Director solution or to find out how you can join the VMware vcloud Air Network service provider program, visit http://www.vmware.com/go/partner-enrollment. About the Author Boskey Savla is a senior technical marketing manager for the vcloud Air Network group at VMware. She works on developing resources for vcloud Air Network partners with various VMware product stacks, focusing on the VMware vcloud Director software solution. She has more than 12 years of experience in systems and solution engineering. She has worked with various VMware partners in certifying and architecting Software-Defined Data Centers and hybrid cloud solutions. TECHNICAL WHITE PAPER / 18

VMware, Inc. 3401 Hillview Avenue Palo Alto CA 94304 USA Tel 877-486-9273 Fax 650-427-5001 www.vmware.com Copyright 2017 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. VMware products are covered by one or more patents listed at http://www.vmware.com/go/patents. VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. Item No: VM-3202 vcloud Director WP 02/17