The following tunnel connectivity issues are observed and Hosts and Edge Nodes are configured to use the same VLAN for TEP traffic:
Tunnels between the edge node and prepped ESXi host will be down if the edge node's TEP interface uses a vSphere-created distributed virtual port group (DVPG) and shares the same TEP VLAN as the host.
Workaround:
Multiple workarounds are available for this issue, listed in order of preference based on NSX version.
Pre-Condition: Edge TEP is connected to standard distributed Port Groups
If NSX on DVPG is disabled, follow the steps in the technical documentation to activate it:
Reference Guide: (Activate NSX on Distributed Virtual Port Groups (DVPGs))
Note on exclusion lists: If the affected VDS is used exclusively by NSX (for example, all VMs are on a different VDS using VLAN-backed distributed port groups), an exclusion list is not required to activate NSX on DVPG. Before proceeding, verify this by reviewing the transport node profile to confirm which VDS is in scope and whether any non-NSX workloads share that VDS.
Create a trunked VLAN backed segment and connect that segment to the Edge TEP interface.
Steps:
Note: If using a VLAN segment on an NSX prepared VDS, adding only a single VLAN to the segment will result in the segment processing traffic for that VLAN only and stripping the tag for ingress traffic and adding the tag for egress traffic. This will result in the edge TEPs being unable to communicate as they require a trunked segment. This can be achieved by applying a range to the VLAN value (inclusive of your required VLAN).
Note on VCF-controlled environments: In VCF-controlled environments, this workaround cannot be applied as a simple in-place configuration change. The TEP VLAN is held in the edge configuration as deployed by VCF, so moving the Edge TEP from a DVPG to a trunked VLAN-backed segment requires redeploying the edges through VCF. If a redeploy is not feasible, use Workaround 1 instead.
Place the TEP traffic of the Edge Node on a different VLAN than the Host's TEP VLAN.
Steps:
Note: This workaround requires a separate subnet/VLAN.
Create a new NVDS/VDS for the ESXi Host and assign a different uplink (vmnic) to the NVDS/VDS. Apply the same uplink profile (including VLAN) and IP pool to the new uplink.
Note: This workaround requires additional vmnic(s) for the new NVDS/VDS.
Pre-Condition: Edge TEP is connected to standard distributed Port Groups
Create a trunked VLAN backed segment and connect that segment to the Edge TEP interface.
Steps:
Note: If using a VLAN segment on an NSX prepared VDS, adding only a single VLAN to the segment will result in the segment processing traffic for that VLAN only and stripping the tag for ingress traffic and adding the tag for egress traffic. This will result in the edge TEPs being unable to communicate as they require a trunked segment. This can be achieved by applying a range to the VLAN value (inclusive of your required VLAN).
Place the TEP traffic of the Edge Node on a different VLAN than the Host's TEP VLAN.
Steps:
Note: This workaround requires a separate subnet/VLAN.
Create a new NVDS/VDS for the ESXi Host and assign a different uplink (vmnic) to the NVDS/VDS. Apply the same uplink profile (including VLAN) and IP pool to the new uplink.
Note: This workaround requires additional vmnic(s) for the new NVDS/VDS.
Create a trunked VLAN backed segment and connect that segment to the Edge TEP interface.
Steps:
Note: If using a VLAN segment on an NSX prepared VDS, adding only a single VLAN to the segment will result in the segment processing traffic for that VLAN only and stripping the tag for ingress traffic and adding the tag for egress traffic. This will result in the edge TEPs being unable to communicate as they require a trunked segment. This can be achieved by applying a range to the VLAN value (inclusive of your required VLAN).
Place the TEP traffic of the Edge Node on a different VLAN than the Host's TEP VLAN.
Steps:
Note: This workaround requires a separate subnet/VLAN.
Create a new NVDS/VDS for the ESXi Host and assign a different uplink (vmnic) to the NVDS/VDS. Apply the same uplink profile (including VLAN) and IP pool to the new uplink.
Note: This workaround requires additional vmnic(s) for the new NVDS/VDS.
For detailed information about this feature NSX on DVPGs, please refer to the following technical doc links:
Activate NSX on Distributed Virtual Port Groups (DVPGs)
Activate NSX on Distributed Virtual Port Groups