What’s New in VCF 9 (with NSX)
VMware Cloud Foundation (VCF) 9 introduces a series of impactful enhancements for network virtualization, with NSX taking center stage. This release brings higher scalability, smarter automation, and simplified operations that matter to network engineers, virtualization admins, and architects in on-premises environments.
Key advancements:
- NSX 4.x Integration
VCF 9 now fully supports NSX 4.x, providing access to the latest in networking and security. This version enables smoother upgrades, improved lifecycle management, and new features not available in previous releases. - Federation and Multi-Site Capabilities
NSX Federation is more deeply integrated, enabling the management of distributed security policies, overlays, and segmentation across multiple sites with a unified control plane. - Enhanced Distributed Firewall (DFW) and L7 Policies
The DFW now supports application-layer (L7) rules and expanded service insertion for north-south and east-west traffic, making microsegmentation and compliance strategies more effective. - Overlay Networking at Scale
Improved support for VXLAN and Geneve overlays enables faster provisioning and increased throughput, crucial for modern virtual data centers. - VRF-Lite and Multi-Tenancy
Native support for VRF-Lite provides better options for tenant isolation, overlapping IPs, and custom segmentation without complex workarounds. - NSX Intelligence and Distributed Analytics
NSX Intelligence offers real-time flow analytics and security recommendations, making it easier to understand traffic and optimize policies. - Lifecycle Management and Automation
SDDC Manager delivers streamlined deployment, patching, and rollback for all NSX components, with improved automation via GUI and API. - API-First, Automation-Ready
Every aspect of NSX in VCF 9 is accessible by API, PowerCLI, Python SDK, and Ansible, supporting a true infrastructure-as-code approach. - Improved GUI and Usability
The NSX and SDDC Manager interfaces have been redesigned for simpler workflows, faster onboarding, and more intuitive error reporting.
Summary:
VCF 9 with NSX offers a unified, scalable, and automation-ready network virtualization platform, whether you’re building a new SDDC or upgrading an existing one.
VCF 9 + NSX Architecture Overview
Before diving into detailed deployment, here’s how VCF 9 orchestrates NSX in a modern, on-premises SDDC.

Logical relationship between VCF 9, NSX, and SDDC core components.
Step-by-Step NSX Deployment in VCF 9
This guide walks through a full-featured NSX deployment, from initial setup to advanced automation.
1. NSX Manager Deployment
Using SDDC Manager GUI:
- Log in to SDDC Manager.
- Navigate to the Workload Domain for NSX deployment.
- Click “Add NSX.”
- Specify the cluster, IP/FQDN, credentials, network pool, and license.
- Click Deploy. SDDC Manager automates the full NSX Manager deployment.
PowerCLI Example:
Connect-SddcManager -Server "sddc-manager.lab.local" -User "admin" -Password "yourPassword"
New-NSXManagerDeployment -Domain "Workload-Domain-1" `
-NSXManagerIP "10.10.10.50" `
-SubnetMask "255.255.255.0" `
-Gateway "10.10.10.1" `
-LicenseKey "XXXXX-XXXXX-XXXXX-XXXXX"
Ansible Example:
- name: Deploy NSX Manager in VCF 9
hosts: localhost
tasks:
- name: Provision NSX Manager
vmware.vmware_rest.nsx_manager:
hostname: "{{ vcf_manager }}"
username: "{{ vcf_user }}"
password: "{{ vcf_pass }}"
nsx_manager_spec:
hostname: "nsx-mgr.lab.local"
ip_address: "10.10.10.50"
admin_password: "ComplexPassword123!"
Deployment Topology:

2. Deploying NSX Edge Cluster
Edge nodes handle north-south routing, NAT, load balancing, and other advanced networking functions.
GUI Steps:
- In NSX Manager, go to System > Fabric > Nodes > Edge Transport Nodes.
- Click “Add Edge Node” and enter the VM details, assign to a cluster, map networks, and assign to an Edge Cluster.
- Repeat for additional nodes for high availability.
PowerCLI Example:
New-NsxEdgeNode -Name "Edge-01" -Cluster "Edge-Cluster-1" `
-IPAddress "10.10.20.10" -MgmtGateway "10.10.20.1" `
-TransportZone "TZ-Overlay"
Python SDK Example:
from com.vmware.nsx_client import EdgeNodes
edge_node = EdgeNodes.create({
"display_name": "Edge-01",
"ip_address": "10.10.20.10",
"transport_zone_id": "tz-overlay-id"
})
Diagram:

3. NSX Transport Zones and Overlay Networking
Transport zones define which hosts participate in a given NSX overlay or VLAN-backed network.
GUI Steps:
- Go to System > Fabric > Transport Zones.
- Click “Add” and define the overlay and VLAN transport zones.
- Assign hosts and edge nodes to the correct transport zones.
PowerCLI Example:
New-NsxTransportZone -Name "TZ-Overlay" -Type "OVERLAY"
Add-NsxHostToTransportZone -Host "esxi-01.lab.local" -TransportZone "TZ-Overlay"
Example:

4. Deploying Tier-0 and Tier-1 Gateways
Tier-0 Gateways connect your SDDC to the physical network. Tier-1 Gateways provide east-west routing and microsegmentation.
GUI Steps:
- In NSX Manager, go to Networking > Tier-0 Gateways, click “Add,” set edge cluster, interfaces, and BGP configuration.
- Add Tier-1 Gateway under Networking > Tier-1 Gateways, and link it to Tier-0.
PowerCLI Example:
New-NsxTier0Gateway -Name "T0-GW" -EdgeCluster "Edge-Cluster-1"
New-NsxTier1Gateway -Name "T1-GW" -LinkedTier0Gateway "T0-GW"
Diagram:

5. Distributed Firewall & Microsegmentation
The NSX Distributed Firewall allows for granular east-west security and compliance.
GUI Steps:
- In NSX Manager, go to Security > Distributed Firewall.
- Add rules based on VM tags, security groups, or IP sets for granular segmentation.
PowerCLI Example:
New-NsxFirewallRule -Name "Allow-Web" -Section "App-Segment" `
-Source "Web-Servers" -Destination "App-Servers" -Service "HTTP,HTTPS" -Action "ALLOW"
Policy Table:

6. Advanced Features: Federation, L7 Policies, VRF-Lite, Intelligence
- Federation: Enables cross-site policy management and disaster recovery. Set up via NSX Global Manager and local site pairing.
- L7 Firewall: Apply application-aware firewall rules for granular security.
- VRF-Lite: Configure multiple virtual routing and forwarding instances for tenant isolation.
- NSX Intelligence: Visualizes and analyzes traffic, provides microsegmentation recommendations.
GUI steps and automation for these features follow similar patterns as above.
7. Automation: Infrastructure as Code
Every step above is fully automatable. For production, build reusable scripts/playbooks for deployment, configuration, and validation. Use:
- PowerCLI for rapid scripting and integration with existing VMware tools.
- Python SDK for advanced workflows, integrations, and reporting.
- Ansible for declarative, repeatable, and idempotent infrastructure provisioning.
Examples provided in each section above. Mix and match based on your organization’s automation strategy.
8. Security and Compliance Context
NSX microsegmentation enables Zero Trust and compliance strategies (such as PCI and HIPAA). While not the central focus, always design policies with least privilege and auditability in mind.
Conclusion
VCF 9 with NSX provides a unified, scalable, and automation-centric platform for next-generation on-premises data centers. With full-featured NSX integration, advanced security, and robust automation support, engineers and architects can deliver high-performance, resilient, and secure networks with unprecedented speed and consistency.
Disclaimer
The views expressed in this article are those of the author and do not represent the opinions of VMware, my employer or any affiliated organization. Always refer to the official VMware documentation before production deployment.