To extend a Layer 2 network from NSX-V to NSX-T, create an Edge cluster for bridging. Add one Edge node in this Edge cluster if Edge HA is not required, or two Edge nodes if Edge HA is required.

You must deploy an NSX-T Edge VM on a host that is prepared for NSX-V.

The Edge bridge cluster is independent of the Edge cluster that you use for routing and north-south connectivity with the physical routers. A recommended practice is to deploy one NSX Edge node to bridge one L2 network. The number of Edge nodes required in the Edge bridge cluster depends on the number of L2 networks you want to extend from NSX-V to NSX-T, and whether HA is configured on the Edge bridge nodes.

Caution: Remember that the NSX-T Edge VM, which is used as a bridge, is deployed on an NSX-V prepared host. This Edge VM might potentially hit a Distributed Firewall deny rule in NSX-V. To avoid this issue, add the NSX-T Edge VM to the NSX-V Distributed Firewall Exclusion List, or make sure that the NSX-V Distributed Firewall rule allows communication to the NSX-T Edge VM.
Prepare a plan to determine the infrastructure required for your bridging requirements. For example:
  • How many L2 networks you want to bridge?
  • Do you plan to extend all networks in a single batch or one network at a time?
  • Do you plan to configure High Availability on the Edge nodes for bridging?
  • Do you have enough capacity on the NSX-V prepared host to deploy the number of Edge nodes you require for bridging?

For detailed instructions on deploying an NSX Edge node in NSX-T by using an OVA file, see Deploy NSX Edge Nodes.

In step 10 of this hyperlinked topic, select the networks for the Edge interfaces, as explained in the following example.

Example

Consider that your goal is to extend a Logical Switch named Vwire-1 in NSX-V with an overlay segment named Segment-1 in NSX-T.

To do this bridging, deploy a single NSX Edge node using an OVA file or from the NSX Manager user interface and name this node as EN1.

NSX-V configuration is as follows:
  • Vwire-1 is connected to vSphere Distributed Switch VDS-1.
  • The virtual wire port group on VDS-1 for Vwire-1 is vxw-dvs-36-virtualwire-1-sid-10600-Vwire-1.

During deployment of Edge node (EN1), select the VDS port groups (networks) for the Edge interfaces as follows.

Edge Interface Source Network Destination Network
vNIC1 Network 0

dvPG-Management

vNIC2 Network 1

dvPG-Trunk

vNIC3 Network 2

vxw-dvs-36-virtualwire-1-sid-10600-Vwire-1

vNIC4 Network 3 Not used for this bridging example

Figure below shows the logical view of the vNIC configuration on the NSX-T Edge VM.

Figure 1. Logical View of vNIC Configuration on NSX-T Edge VM

Figure shows the logical view of the networks that are connected to the vNICs of the NSX-T Edge VM.