LogoLogo
HI GIO User Guide EN
HI GIO User Guide EN
  • HI GIO Cloud Help Center
    • HI GIO Cloud Website
    • HI GIO Cloud Sales Portfolio
  • COMPUTE
    • 1. Working with VM
      • Create a New Virtual Machine from ISO
      • Create a Virtual Machine from a Template
      • Install VMware Tools in a Virtual Machine
      • View VM
      • Performing Power Operations on Virtual Machines
      • Editing the properties of a new VM
      • Create VM's Template
      • Force change root/administrator's password
      • Safely remove Disk in Windows OS
    • 2. Working with vAPP
      • Create a vAPP
      • Start and Stop Order of Virtual Machines in a vApp
    • 3. HI GIO Auto Scale
    • 4. HI GIO API
      • API creates VM from Template
      • API reconfigures VM's Disk
      • API reconfigures VM's Networks
      • API token login
      • API reconfigures VM's Memory
      • API reconfigures VM's CPU
      • API power on/off VM
    • 5. HI GIO KMS Service
    • 6. Encryption Management Service
  • HI GIO S3 STORAGE
    • Login to HI GIO S3 Storage Portal
    • How to get the S3 Key
    • Mount HI GIO S3 Storage into Windows
    • Bucket Management
      • How to create the new Bucket
      • Setup Public or Private ACL for Bucket
      • Versioning
      • Lifecycle Rule
      • Bucket Policy
    • Management File, Folder
      • Create the Folder
      • Upload Folder/File
      • Download Folder/Files
      • Get the link Download of Files
      • File Versioning
    • Connect S3 Services with Veeam Backup
      • Connect HI GIO S3 with Veeam Backup
    • Backup DATA from NAS to HI GIO S3 Service
      • Backup Data from Synology NAS with ClouSync
      • Backup Data from Synology NAS with Hyper Backup
    • S3 Data Encryption – SSE-C and SSE-S3
  • BACK-UP AS A SERVICE
    • 1. HI GIO BaaS
      • BaaS Support Matrix
      • Install Veeam Agent for Linux
      • Install Veeam Agent for Windows
      • Update Veeam Service Provider Console Management Agent v.7 & Backup Agent v.6
      • Create backup job on Linux OS via Veeam agent console
      • Create backup job on Windows OS via Veeam agent console
      • Create backup job for Linux via Portal
      • Create backup job for Windows via Portal
      • Restore Linux VM on HIGIO Cloud via Media file (ISO file)
      • Restore Windows VM on HI GIO Cloud via Media file (ISO file)
      • How to configure receive Alarm from BaaS
      • Workaround
        • Veeam Agent Installation for CentOS 9 Stream
        • Veeam Agent Installation for CentOS 8 Stream
        • Veeam Agent Installation for RHEL 9.2
    • 2. HI GIO Backup
      • Restore Entire VM via vCD's portal
      • Instant Recovery
    • 3. HI GIO M365 BaaS
  • HI GIO DRaaS
    • How To Install vCDA On-Premises appliance
    • How To Use vCDA On-Premises
    • Stretching layer 2 networks for HI GIO's DRaaS
      • Preparing the configure
      • Deploy NSX Autonomous Edge (on-premises site)
      • Register & configure the Networks of the NSX Autonomous Edge On-Premises
      • Create a L2 VPN server session (HI GIO site).
      • Create a L2 VPN - Client session (on-premises site)
      • (Optional) Deploy the secondary NSX Autonomous Edge in HA mode (on-premises site)
    • FAILOVER SCENARIO
      • ENVIRONMENT
      • FAILOVER
        • Step 1: Create a protection job (from on-premises site)
        • Step 2: Configure the Network Settings for On-Premises to Cloud Replications
        • Step 3P - Partial failover VMs (VM - APP1) from on-premise site to HI GIO site
        • Step 3F - Full failover vAPP1 (VM - APP1 & VM - DB1) from on-premise site to HI GIO
        • Step 4: Reverse replication of the VM from HI GIO Cloud to On-Premises
        • Step 5: Migrate the VMs back from HI GIO Cloud to On-Premises
        • Step 6: Reprotect the VMs from On-Premises to HI GIO Cloud
        • FAQs
  • NETWORK
    • 1. Working with Network
      • Working with Organization VDC Networks
      • How to create NAT rules on Edge Gateway
      • Using Edge Gateway Firewall
      • Using Distributed Firewall in a Data Center Group
    • 2. VPN
      • IPSec parameters
      • IPSec VPN
      • IPSec Remote Access VPN Clients on Windows
    • 3. Load Balancer
      • Import SSL Certificate
      • Create Pools on Load Balancing
      • Create Virtual Service (VS) on Load Balancing
      • Open Firewall Rule To Public Service To Internet
      • Monitor Traffic Analytics
      • How to Use WAF on HI GIO Portal
  • MANAGEMENT
    • 1. IAM Portal
      • Activate HI GIO - IAM account
      • HI GIO Portal – Tenant User Guide
      • Setup Password Lifetime
      • Setup Passkey
      • HI GIO's VM monitoring
      • HI GIO's Monitoring Alert - Email notification channel
      • HI GIO's Monitoring Alert - Telegram notification channel
    • 2. Create a Catalog
  • HI GIO Kubernetes
    • 1. Steps To Create Kubernetes Cluster on HI GIO Portal
    • 2. How to resize Kubernetes Cluster on HI GIO portal
    • 3. Extending disk size for nodes in Kubernetes Cluster on HI GIO Portal
    • 4. How to upgrade Kubernetes Cluster in HI GIO Portal
    • 05. Deploy demo app with persistence volume and publish app via ingress controller
    • 06. How to configure HI GIO Kunernetes cluster autoscale
Powered by GitBook
On this page
  • Overview
  • Procedure
Export as PDF
  1. HI GIO DRaaS
  2. Stretching layer 2 networks for HI GIO's DRaaS

(Optional) Deploy the secondary NSX Autonomous Edge in HA mode (on-premises site)

PreviousCreate a L2 VPN - Client session (on-premises site)NextFAILOVER SCENARIO

Last updated 4 months ago

Overview

Optionally, use the following steps to deploy a secondary NSX-T Autonomous Edge (Layer 2 VPN client) in HA mode in your on-premises environment:

#

OVF Template Name

Port Group

Primary Node

Second Node (optional)

Remark

1

Network 0

Management

192.168.137.79

192.168.137.80

2

Network 1

Uplink

192.168.138.77

–

must to have access to internet

3

Network 2

Trunk

–

–

4

Network 3

– (HA, optional)

192.168.137.81

192.168.137.82

Procedure

1

Step 1: Follow the steps in until you reach the Customize template step.

2

Step 2: On the Customize template step, do the following instead:

  • In the Application section, do the following:

    • Set the System Root User Password.

    • Set the CLI "admin" User Password.

    • Select the Is Autonomous Edge checkbox.

    • Leave the remaining fields empty.

NSX Edge core services do not start unless you enter passwords meeting these requirements:

At least 12 characters

At least one uppercase letter

At least one lowercase letter

At least one digit

At least one special character

At least five different characters

  • In the Network Properties section, do the following:

    • Set the Hostname.

    • Set the Management Network IPv4 Address. This is the management IP for the autonomous edge.

    • Set the Management Network Netmask. This is the management network prefix length.

    • Set the Default IPv4 Gateway. This is the default gateway of the management network.

  • In the DNS section, do the following:

    • In the DNS Server list field, enter the DNS server IP addresses separated by spaces.

    • In the Domain Search List field, enter the domain name.

  • In the Services Configuration section, do the following:

    • Enter the NTP Server List.

    • Enter the NTP Servers, separated by spaces.

    • Select the Enable SSH checkbox.

    • Select the Allow Root SSH logins checkbox.

  • Leave External section empty.

  • In the HA section, do the following:

-Enter the HA Port details in the following format: VLAN_ID, Exit Interface, IP, Prefix Length.

For example: 137,eth2,192.168.137.81,24. Replace the following values:

VLAN ID: VLAN ID of the uplink VLAN

Exit Interface: interface ID reserved for uplink traffic

IP: IP address reserved for the uplink interface

Prefix Length: prefix length for the uplink network

-In the HA Port Default Gateway field, enter the default gateway of the management network

-Select the Secondary API Node checkbox.

-In the Primary Node Management IP field, enter the management IP address of the primary autonomous edge.

-In the Primary Node Username field, enter the username of the primary autonomous edge (for example, "admin").

-In the Primary Node Password field, enter the password of the primary autonomous edge.

-In the Primary Node Management Thumbprint field, enter the API thumbprint of the primary autonomous edge.

You can get this by connecting using SSH to the primary autonomous edge using admin credentials and running the command: “get certificate api thumbprint”

3

Step 3: Complete the remaining OVF template deployment steps to deploy the secondary autonomous edge (on-premises Layer 2 VPN client).

PowerOn the second NSX autonomous edge

4

Step 4: Validate:

It will take some minutes to sync.

Log in to both NSX autonomous nodes, check High Availability, L2VPN\

-Primary node:

-Secondary node:

-Port ID, Tunnel ID, exit interfaces are same on both nodes.

5

Step 5: Failover test:

To test the NSX autonomous failover:

-Ping from on-premises to HI GIO cloud.

-Shutdown NSX autonomous primary node

-Result:

NSX autonomous secondary status will change to ACTIVE, L2 VPN = UP

The connection drop ~ 5-10 seconds

After powering on the NSX autonomous primary node, the HA status between the nodes was re-established. The secondary edge remains active, and the primary will become active only in case of additional failure.

Deploy NSX Autonomous Edge (on-premises site)