Network readiness checklist –VMware Cloud on AWS Outposts

Organizations can use the following checklist to gather information that is used to configure Outposts:

ParameterDescription
Number of CNDsTwo recommended
Organization ASNExisting organization BGP ASN
Number of uplinksNumber of uplinks between each CND and OND (1, 2, 4, 6, or 8 recommended)
Uplink speed1 Gbps, 10 Gbps, 40 Gbps, or 100 Gbps
Fiber typeSingleMode Fiber (SMF) or Multi-Mode Fiber (MMF)
Optical standardLX, SX, IR, SR, LR, IR4, LR4, ESR4, SR4, MSA, CWDM4
Service link VLANAny VLAN between 1 and 4094
LGW VLANAny VLAN between 1 and 4094
LACP LAG 1Uplinks between Outposts Network Device 1 and Customer Network Device 1
LACP LAG 1Uplinks between Outposts Network Device 2 and Customer Network Device 2
Service link BGP subnet 1/30 or /31 Subnet 1
Service link BGP subnet 2/30 or /31 Subnet 3
LGW BGP subnet 1/30 or /31 Subnet 2
LGW BGP subnet 2/30 or /31 Subnet 4
Service link ASNPrivate ASN for service link
LGW ASNPrivate ASN for LGW
Service link infra subnetA CIDR (/26 required, advertised as two contiguous /27 subnets).
Private connectivity subnetA subnet created in the AWS Region that acts as an AWS Outposts service link anchor

Table 10.6 – Network readiness checklist

AWS Outposts connectivity to AWS Region

VMC on AWS Outposts requires a persistent connection to a nearby AWS Region designated as the home region. A service link connection is set up between the Outposts rack and the home region for management and control plane traffic. The service link can also be used for data plane traffic between AWS Outposts and AWS Region workloads. Continuous service link connectivity with a minimum bandwidth of 500 Mbps (1 Gbps is recommended) is required, which can be established using either of the following options:

  • Public connectivity to the AWS Region:
    • Via the internet on-premises
    • Via the internet using an AWS Direct Connect Public Virtual Interface (VIF)
  • Private connectivity to the AWS Region:
    • Using an AWS Direct Connect private VIF

Public connectivity

VMC on AWS Outposts public service link connectivity is established using an internet connection at the on-premises organization location. The AWS Outposts rack connects to service link public endpoint IPs using a group of encrypted tunnels using Transport Layer Security (TLS). The following diagram shows VMC on AWS Outposts establishing a service link using the public connectivity model.

Figure 10.11 – VMware Cloud on AWS Outposts service link public connectivity

Figure 10.11 depicts VMware Cloud on AWS Outposts installed on-premises at the organization, with a service link established over the internet to the AWS Outposts service anchor point public endpoint in the AWS Region. It is critical to have reliable underlying service link connectivity to the AWS Region to ensure that VMC on AWS Outposts remains operational. Therefore, organizations should ensure the availability of resilient and reliable internet connectivity that Outposts can leverage.

For enhanced security, organizations must allow outbound connections from Outposts toward the AWS Region so that the service link tunnel can only initiate connections from Outposts to the Region, as indicated in the following table:

ProtocolSource PortSource AddressDestination PortDestination Address
UDP443Outposts service link /26443AWS Region’s (homed to Outposts) public routes
TCP1025-65535Outposts service link /26443AWS Region’s (homed to Outposts) public routes

Table 10.7 – Prerequisite firewall rules for public connectivity

Leave a Reply

Your email address will not be published. Required fields are marked *