Management applications, such as VMware vRealize Automation, VMware vRealize Operations Manager, or VMware vRealize Orchestrator, leverage a traditional 3-tier client-server architecture with a presentation tier (user interface), functional process logic tier, and data tier. This architecture requires a load balancer for presenting end-user facing services.

Table 1. Design Decisions on Isolating Management Applications

Decision ID

Design Decision

Design Justification

Design Implications


Place the following management applications on an application virtual network.

  • Update Manager Download Service

  • vRealize Suite Lifecycle Manager

  • vRealize Operations Manager

  • vRealize Operations Manager remote collector

  • vRealize Log Insight

  • vRealize Automation

  • vRealize Automation Proxy Agent

  • vRealize Business for Cloud

  • vRealize Business data collector

Access to the management applications is only through published access points.

The application virtual network is fronted by an NSX Edge device for load balancing and the distributed firewall to isolate applications from each other and external users. Direct access to application virtual networks is controlled by distributed firewall rules.


Create two application virtual networks.

  • One application virtual network is reserved for management applications in that region that do not require failover.

  • One application virtual network is reserved for management application failover between regions.

Using only two application virtual networks simplifies the design by sharing Layer 2 networks with applications based on their needs.

Creating the two application virtual networks provides support for seamless migration to the dual-region validated design in the future.

A single /24 subnet is used for each application virtual network. IP management becomes critical to ensure no shortage of IP addresses occurs .

Having software-defined networking based on NSX in the management stack makes all NSX features available to the management applications.

This approach to network virtualization service design improves security and mobility of the management applications, and reduces the integration effort with existing customer networks.

Figure 1. Application Virtual Network Components and Design

Application Virtual Network Components and Design

Certain configuration choices might later facilitate the tenant onboarding process.

  • Create the primary NSX ESG to act as the tenant PLR and the logical switch that forms the transit network for use in connecting to the UDLR.

  • Connect the primary NSX ESG uplinks to the external networks

  • Connect the primary NSX ESG internal interface to the transit network.

  • Create the NSX UDLR to provide routing capabilities for tenant internal networks and connect the UDLR uplink to the transit network.

  • Create any tenant networks that are known up front and connect them to the UDLR.