As an admin, you can configure a physical server for NSX-T networking through the NSX Manager UI.
Alternatively, you can run the Ansible script to achieve the same goal. See Secure Workloads on Windows Server 2016/2019 Bare Metal Servers for configuring Windows physical servers using Ansible. However, it is recommended to use the NSX Manager UI to prepare physical servers for NSX-T networking.
Physical servers supports an overlay and VLAN transport zone. You can use the management interface to manage the physical server server. The application interface allows you to access the applications on the physical server. These NIC configurations are supported on a physical server:
- Single physical NICs provide an IP address for both the management and application IP interfaces.
- Dual physical NICs provide a physical NIC and a unique IP address for the management interface. Dual physical NICs also provide a physical NIC, and a unique IP address for the application interface.
- Multiple physical NICs in a bonded configuration provide dual physical NICs, and a unique IP address for both the management interface and the application interface. Such physical NIC bonds are only supported in Active/Standby mode, through OVS switch, only in Linux environments.
Note: Bonded configuration is not supported in Windows environments.
Unlike preparation of a standalone or a managed ESXi host that ends when it becomes a transport node, for a physical sever, complete server preparation extends to attaching the application interface of the physical server to an NSX-T segment.After preparing the host as a transport node, you must complete the following tasks to finish configuring a physical server.
- Create a segment port on an NSX-T segment.
- Attach application interface of the physical server to the segment port.
- A transport zone must be configured.
- An uplink profile must be configured, or you can use the default uplink profile.
- An IP pool must be configured, or DHCP must be available in the network deployment.
- At least one physical NIC must be available on the host node.
- Management IP address
- User name
- A segment (VLAN or Overlay), depending upon your requirement, must be available to attach to the application interface of the physical server.
- Verify that the required third-party packages are installed. Third party packages must be installed on the physical server so that its physical NICs are available during transport node configuration. See Install Third-Party Packages on a Physical Server.
- From a browser, log in with admin privileges to an NSX Manager at https://<nsx-manager-ip-address>.
- Go to .
- On the Host Transport Node page, click + Add Host Node.
- On the Host Details window, enter the following details.
Option Description Name and Description Enter the name to identify the physical server.
You can optionally add the description of the operating system used for the host or physical server server.
IP Addresses Enter the host or physical server server IP address. Operating System Select an operating system that mentions physical server. For example, if the operating system on the physical server is CentOS, select CentOS Physical Server. NSX-T identifies bare metal servers as physical servers.
Depending on your physical server, you can select any of the supported operating systems. See System Requirements.Important: Among the different flavors of Linux supported, you must know the distinction between a physical server server running a Linux distribution versus using a Linux distribution as a hypervisor host. For example, selecting Ubuntu Server as the operating system means setting up a physical server server running a Linux server, whereas selcting Ubuntu KVM means the Linux hypervisior deployed is Ubuntu.
Username and Password Enter the host user name and password. SHA-256 Thumbprint
This is an optional step.Enter the host thumbprint value for authentication.
If you leave the thumbprint value empty, you are prompted to accept the server provided value. It takes a few seconds for NSX-T Data Center to discover and authenticate the host.
- Click Next.
- On the Prepare Host window, enter the following details. You can only configure a single N-VDS switch for a single physical server.
Option Description Name Enter a name for the N-VDS host switch. Transport Zone From the drop-down menu, select a transport zone that this transport node. Uplink Profile Select an existing uplink profile from the drop-down menu or create a custom uplink profile. You can also use the default uplink profile. LLDP Profile By default, NSX-T only receives LLDP packets from a LLDP neighbor.
However, NSX-T can be set to send LLDP packets to and receive LLDP packets from a LLDP neighbor.
Uplinks-Physical NICs Mapping
Map physical NICs to uplinks.
- Click Next.
- As the host is configured, the physical server progress is displayed.
- On the Configure NSX window, verify status of host preparation. Based on whether you want to proceed with further configuration, these choices are available:
Description Click Select Segment If the physical server preparation was successful, click Select Segment. In the next part of the procedure, you select a segment to attach the physical server's application interface through the NSX agent. Proceed to the next step. Click Continue Later
If you click Continue Later button, then preparation ends without the application interface configured. You can later attach the segment port to the application interface. Go to . Configure application interface for the BMS.
If preparation failed, go to the Host Transport Node page (Failed state. Click Resolve to retry host preparation.). Identify the physical server, check if the Configuration State is in
- If you proceed to select a segment for the physical server, perform the following steps:
- From the list of segments connected to the transport zone you configured for the physical server, select the one to configure for the server.
- Click the vertical ellipses and click Edit to customize segment properties.
Note: Only properties related to a segment can be edited. Admin can modify: Segment Name, Connected Gateway, Subnet, Uplink Teaming Policy, IP Address Pool.
- To add a new segment port on an NSX-T segment, got to the Select Segment window, click Add Segment Port. The segment port page is auto-populated.
Option Description Name Enter the Segment Port name. ID The virtual interface UUID is auto-populated. Type Static is auto-populated as the node is of the type, physical server. Context ID Transport node UUID is auto-populated.Note: Alternatively, you can also run the API command, https://<NSX-Manager-IP-address>/PATCH /policy/api/v1/infra/segments/<segment-id>/ports/<port-id>.
Where, <port-id> is the virtual interface UUID, which is displayed on NSX Manager.
- To attach application interface of physical server to a segment port, go to the Set Segment Port window, expand the Attach Application Interface section and enter these details:
Note: The Attach Application Interface section is only applicable for physical servers.
Option Description Name You can change the system-generated application interface name.
On a Linux physical server, run ovs-vsctl show to verify the application interface name.
Context ID To enable the application interface configuration, enter the host node ID. Assign Existing IP Use an existing IP so that it can be used for migration of the application interface. Assign New IP Used when configuring an overlay network. Select an IP assignment method on the segment - IP pool, DHCP, or Static. When you assign a new IP address for the application interface, complete the configuration by providing the IP address, Routing Table and Default Gateway details.
- Click Save.
- View the summary of the network configuration represented by topology diagram.
- On the Host Transport Node page, select the physical server, and click Switch Visualization for the server. It must represent the network you configured on the physical server.
The physical server is configured for NSX-T networking.