Site icon Digital Thought Disruption

NSX-T to Azure SDN Multitenancy: Mapping VMware Networks to Azure Local

TL;DR / Quick Summary

Provides best practices for scalable, secure tenant segmentation

Compares NSX-T multitenancy models (Tier-1, Tier-0, VRFs) to Azure Local SDN constructs

Maps NSX gateway architectures to VNets, subnets, and SDN policies in Azure Local

Highlights benefits, trade-offs, and practical design guidance

Introduction: From NSX-T Complexity to Azure SDN Clarity

Multitenancy is a foundational design principle in enterprise cloud networking. NSX-T enables rich multitenant designs through Tiered Gateways and logical segmentation, but translating this model into a cloud-native SDN like Azure Local can be daunting.

Architects must balance security, operational overhead, and performance isolation while adapting to different native constructs. This post offers a practical migration lens — comparing NSX-T’s architecture to Azure Local SDN, with added insights into scalability, routing, and tenant governance.

Feel free to check in on this series:

NSX-T Multitenancy Models: Foundation

Multiple Tier-1 Gateways per Tenant

Each tenant is assigned one or more Tier-1 gateways connected upstream to a Tier-0, managing localized east-west traffic within the tenant’s domain.

Benefits:

Downsides & Challenges:

Best Practices:

Dedicated Tier-0 Gateways per Tenant

In this design, each tenant is given a unique Tier-0 gateway, offering complete segmentation down to routing domain and egress control.

Benefits:

Downsides & Challenges:

Best Practices:

Dedicated VRF Lite Gateway per Tenant

VRF Lite enables multiple routing instances (VRFs) on a single Tier-0. A single edge uplink device can serve multiple tenants with logically isolated control planes.

Benefits:

Downsides & Challenges:

Best Practices:

Azure Local SDN: Multitenant Mapping

Azure Local SDN uses Virtual Networks (VNets), subnets, and intent-based routing policies to recreate similar segmentation. While not 1:1 in structure, a well-designed Azure SDN can achieve secure tenant isolation and flexible routing with less complexity.

Azure Local SDN Virtual Subnet per Tenant

This model uses a shared VNet with a unique subnet allocated per tenant, with custom NSGs and route tables per subnet.

Benefits:

Downsides & Challenges:

Best Practices:

Azure Stack SDN Virtual network per Tenant

This design maps to the NSX-T “dedicated Tier-0” model. Each tenant receives a separate VNet with their own IP address space and access controls.

Benefits:

Downsides & Challenges:

Best Practices:

Automate tenant provisioning via Azure Bicep or Terraform
Use Hub-and-Spoke with NVA or Azure Firewall in the hub
Peer VNets with UseRemoteGateways for shared egress

Best Practices for Multitenancy Design

Hybrid Strategy: Consider ExpressRoute or S2S VPN for hybrid NSX ↔ Azure coexistence

Zero Trust by Default: Use NSGs, policies, and route filtering to deny by default

Declarative Networking: Adopt SDN controllers (e.g., Azure WAC SDN extension) for consistent provisioning

Automation-First: Use IaC tools to avoid drift and manual misconfigurations

Audit Routinely: Monitor route propagation and verify tenant data paths with logs or traffic analyzers

Summary:

This article explores how to translate VMware NSX-T multitenancy architectures—such as Tier-1/Tier-0 gateways and VRF Lite—into Azure Local SDN equivalents using VNets, subnets, and intent-based policies. It breaks down the benefits and challenges of each approach, comparing routing, isolation, and scalability models across platforms. Whether you’re migrating workloads or designing greenfield environments, this guide provides actionable insights, diagrams, and best practices to ensure secure, scalable tenant segmentation in Azure Local SDN.

*The thoughts and opinions in this article are mine and hold no reflect on my employer*

Exit mobile version