{"id":1546,"date":"2022-05-10T09:45:23","date_gmt":"2022-05-10T08:45:23","guid":{"rendered":"https:\/\/vminded.com\/?p=1546"},"modified":"2022-05-10T09:45:25","modified_gmt":"2022-05-10T08:45:25","slug":"vmware-transit-connect-to-native-transit-gateway-intra-region-peering-in-vmware-cloud-on-aws","status":"publish","type":"post","link":"https:\/\/vminded.com\/index.php\/2022\/05\/10\/vmware-transit-connect-to-native-transit-gateway-intra-region-peering-in-vmware-cloud-on-aws\/","title":{"rendered":"VMware Transit Connect to native Transit Gateway intra-region peering in VMware Cloud on AWS"},"content":{"rendered":"\n<p><strong>VMware Transit Connect<sup>TM<\/sup> <\/strong>has been around now for more than a year and I must admit that it has been widely adopted by our customers and considered as a key feature.<\/p>\n\n\n\n<p>Over the time we have added multiple <a href=\"https:\/\/blogs.vmware.com\/cloud\/2021\/09\/23\/vmware-transit-connect-enhancements\/\" target=\"_blank\" rel=\"noreferrer noopener\">new capabilities<\/a> to this feature like support for connectivity to a <strong>Transit VPC<\/strong>, <strong>custom real-time Metering <\/strong> to get more <em>visibility<\/em> on usage and <em>billing<\/em>, connectivity to an <strong>external TGW<\/strong> (inter region), and more recently <strong>Intra-Region Peering with AWS TGW<\/strong> which has been announced at <strong>AWS re:Invent 2021<\/strong>, also referred to as\u00a0<a href=\"https:\/\/aws.amazon.com\/about-aws\/whats-new\/2021\/12\/aws-transit-gateway-intra-region-cloud-network\/\" target=\"_blank\" rel=\"noreferrer noopener\">intra-region peering<\/a>.<\/p>\n\n\n\n<p>Let&#8217;s focus in this post on the specific use case of allowing connectivity from workloads running on an SDDC to a <strong><a href=\"https:\/\/aws.amazon.com\/vpc\/\" target=\"_blank\" rel=\"noreferrer noopener\">VPC<\/a><\/strong> sitting behind a native <a href=\"https:\/\/aws.amazon.com\/transit-gateway\/?whats-new-cards.sort-by=item.additionalFields.postDateTime&amp;whats-new-cards.sort-order=desc\" target=\"_blank\" rel=\"noreferrer noopener\">Transit Gateway <\/a>&#8211; TGW.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-intra-region-vtgw-to-tgw-peering-lab-topology\">Intra-Region VTGW to TGW Peering lab Topology <\/h2>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"720\" height=\"291\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-27-at-08.51.38-1.png\" alt=\"\" class=\"wp-image-1549\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-27-at-08.51.38-1.png 720w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-27-at-08.51.38-1-300x121.png 300w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 984px) 61vw, (max-width: 1362px) 45vw, 600px\" \/><\/figure>\n\n\n\n<p>In this lab, I have deployed an SDDC and attached it to an SDDC Group with a vTGW (<a href=\"https:\/\/blogs.vmware.com\/cloud\/2020\/09\/28\/vmware-transit-connect-simplifying-networking-scale-vmware-cloud-aws-sddcs\/\" target=\"_blank\" rel=\"noreferrer noopener\">Transit Connect<\/a>) that I have peered to a native TGW in the <strong>same region<\/strong>.<\/p>\n\n\n\n<p>On the AWS native side, I have deployed 2 <strong><a href=\"https:\/\/aws.amazon.com\/ec2\/instance-types\/\" target=\"_blank\" rel=\"noreferrer noopener\">EC2<\/a><\/strong> instances (172.20.2.148 and 172.20.2.185)  in a native VPC (172.20.2.0\/24) and on the SDDC I have deployed a Debian10 Virtual Machine named <em>Deb10-App001 r<\/em>unning with IP <strong>172.18.12.100<\/strong>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Building the lab Topology<\/h2>\n\n\n\n<p>Let&#8217;s see how to put all things together and build the Lab!<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Attaching the native TGW to the SDDC Group<\/h3>\n\n\n\n<p>To start configuring this lab it&#8217;s very easy! <\/p>\n\n\n\n<p>I have first created an <strong>SDDC Group <\/strong>called &#8220;Multi T1&#8221; and attach my SDDC to it. SDDC Groups are a way to group SDDCs together for ease of management.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"http:\/\/blogs.vmware.com\/cloud\/wp-content\/blogs.dir\/136\/files\/2020\/09\/Sonali1.png\" alt=\"\"\/><\/figure>\n\n\n\n<p><strong>Transit Connect <\/strong>offers high bandwidth, resilient connectivity for SDDCs into an SDDC Group.<\/p>\n\n\n\n<p>Then I have edited my SDDC Group and selected the <strong>External TGW<\/strong> tab.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"487\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.30.00-1024x487.png\" alt=\"\" class=\"wp-image-1552\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.30.00-1024x487.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.30.00-300x143.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.30.00-768x365.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.30.00-1536x730.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.30.00-2048x973.png 2048w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.30.00-1200x570.png 1200w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p> <\/p>\n\n\n\n<p> I have Clicked on <strong>ADD TGW<\/strong>. The information needed are the <strong>AWS Account ID<\/strong> (ID of the AWS Account where the TGW resides), and the <strong>TGW ID <\/strong>that I have grabbed from my AWS Account. <\/p>\n\n\n\n<p>The <strong>TGW Location <\/strong>is the region where the native TGW being peered with resides. The <strong>VMC on AWS Region<\/strong> stands for Region where the vTGW resides.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"721\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.38.59-1024x721.png\" alt=\"\" class=\"wp-image-1555\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.38.59-1024x721.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.38.59-300x211.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.38.59-768x541.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.38.59-1536x1082.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.38.59-1200x845.png 1200w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.38.59.png 1556w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p>I have entered the information needed including the VPC CIDR (<strong>172.20.2.0\/24<\/strong>) that stands behind the peered TGW and confirmed both <strong>regions<\/strong> are <strong>identical<\/strong>.<\/p>\n\n\n\n<p>The process of establishing the peering connection starts. Keep in mind that the whole process may take up to 10&#8242; to complete.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"116\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.39.06-1-1024x116.png\" alt=\"\" class=\"wp-image-1563\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.39.06-1-1024x116.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.39.06-1-300x34.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.39.06-1-768x87.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.39.06-1-1536x174.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.39.06-1-2048x231.png 2048w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.39.06-1-1200x136.png 1200w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>After a couple of seconds the status changes to PENDING ACCEPTANCE.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"97\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.45.47-1024x97.png\" alt=\"\" class=\"wp-image-1562\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.45.47-1024x97.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.45.47-300x29.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.45.47-768x73.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.45.47-1536x146.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.45.47-2048x195.png 2048w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.45.47-1200x114.png 1200w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Accepting the peering attachment in AWS Account<\/h3>\n\n\n\n<p>Now it&#8217;s time to switch to the target AWS Account and Accept the peering from the AWS console. This is possible by going to the Transit Gateway attachments option in the VPC Menu.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"114\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.48.49-1024x114.png\" alt=\"\" class=\"wp-image-1561\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.48.49-1024x114.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.48.49-300x33.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.48.49-768x86.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.48.49-1536x171.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.48.49-2048x228.png 2048w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.48.49-1200x134.png 1200w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>I have selected <strong>Attach<\/strong> in the <strong>Actions<\/strong> drop down Menu.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"144\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.51.45-1024x144.png\" alt=\"\" class=\"wp-image-1565\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.51.45-1024x144.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.51.45-300x42.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.51.45-768x108.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.51.45-1536x215.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.51.45-2048x287.png 2048w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.51.45-1200x168.png 1200w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>And then to Click Accept.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"158\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.51.50-1024x158.png\" alt=\"\" class=\"wp-image-1566\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.51.50-1024x158.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.51.50-300x46.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.51.50-768x118.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.51.50-1536x237.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.51.50-1200x185.png 1200w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.51.50.png 1790w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>After a few minutes the attachment is established.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"183\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.54.23-1024x183.png\" alt=\"\" class=\"wp-image-1568\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.54.23-1024x183.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.54.23-300x54.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.54.23-768x137.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.54.23-1536x274.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.54.23-2048x365.png 2048w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.54.23-1200x214.png 1200w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Observe the change on vTGW console<\/h3>\n\n\n\n<p>In order to validate the connection is established, I have checked the route table of the vTGW and we can see that the <strong>new destination prefix<\/strong> of the native VPC have been added.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"451\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-17.25.41-1-1024x451.png\" alt=\"\" class=\"wp-image-1579\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-17.25.41-1-1024x451.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-17.25.41-1-300x132.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-17.25.41-1-768x338.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-17.25.41-1-1536x677.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-17.25.41-1-2048x903.png 2048w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-17.25.41-1-1200x529.png 1200w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p> <\/p>\n\n\n\n<p>We can also see from the <strong>Transit Connect <\/strong>menu of the SDDC that the CIDR block of the native VPC has been added to the Transit Connect routing tables in the <strong>Learned Routes<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"292\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-17.32.33-1024x292.png\" alt=\"\" class=\"wp-image-1580\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-17.32.33-1024x292.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-17.32.33-300x86.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-17.32.33-768x219.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-17.32.33-1536x438.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-17.32.33-2048x584.png 2048w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-17.32.33-1200x342.png 1200w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Adding a Route in the AWS native TGW route Table<\/h3>\n\n\n\n<p>To make sure the routing will work I have checked if a <strong>routing table<\/strong> is attached to the <strong>peering attachment<\/strong> and that there are routes to the SDDC subnets.<\/p>\n\n\n\n<p>The TGW would need the following route table:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"390\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-17.59.31-1024x390.png\" alt=\"\" class=\"wp-image-1614\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-17.59.31-1024x390.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-17.59.31-300x114.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-17.59.31-768x293.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-17.59.31-1536x585.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-17.59.31-2048x780.png 2048w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-17.59.31-1200x457.png 1200w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p>As seen in the following screen, I can confirm there is a route table attached to the peering attachment.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"288\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.58.08-1024x288.png\" alt=\"\" class=\"wp-image-1570\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.58.08-1024x288.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.58.08-300x84.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.58.08-768x216.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.58.08-1536x432.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.58.08-2048x576.png 2048w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-14.58.08-1200x338.png 1200w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>If I look at the <strong>routing table<\/strong> content, I can find both the VPC and Peering attachement in the <strong>Associations<\/strong> tab.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"785\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-16.41.29-1024x785.png\" alt=\"\" class=\"wp-image-1573\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-16.41.29-1024x785.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-16.41.29-300x230.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-16.41.29-768x589.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-16.41.29-1536x1177.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-16.41.29-1200x920.png 1200w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-16.41.29.png 1636w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><figcaption>Here are the peering in the native AWS TGW. We can see some VPNs as well as the VPC peering and vTGW peering<\/figcaption><\/figure>\n\n\n\n<p>If I look at the Route Table of the native Transit Gateway, I can see there are only one route entry:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"594\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-16.58.56-1024x594.png\" alt=\"\" class=\"wp-image-1590\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-16.58.56-1024x594.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-16.58.56-300x174.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-16.58.56-768x446.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-16.58.56-1536x891.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-16.58.56-2048x1188.png 2048w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-16.58.56-1200x696.png 1200w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><figcaption>This is the VPC subnet propagated automatically from the peering to the native VPC (172.20.2.0\/24)<\/figcaption><\/figure>\n\n\n\n<p>As the Transit Connect <strong>does not propagate<\/strong> its routes to the native TGW, we need to add the route back to the CIDRs of the SDDC. <\/p>\n\n\n\n<p><strong>Be careful because if you forget this step it won&#8217;t be able to route the packets back to the SDDC!<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"789\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-17.03.36-1024x789.png\" alt=\"\" class=\"wp-image-1591\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-17.03.36-1024x789.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-17.03.36-300x231.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-17.03.36-768x592.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-17.03.36-1200x924.png 1200w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-17.03.36.png 1472w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>After a couple of seconds, the route table is updated.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"535\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-17.05.00-1024x535.png\" alt=\"\" class=\"wp-image-1592\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-17.05.00-1024x535.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-17.05.00-300x157.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-17.05.00-768x401.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-17.05.00-1536x802.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-17.05.00-2048x1070.png 2048w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-17.05.00-1200x627.png 1200w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>All subnets should be added if connectivity is needed to them.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Add a route back to SDDC CIDRs into the native VPC route table<\/h3>\n\n\n\n<p>By default the native VPC <strong>will not have a route back<\/strong> to the SDDC CIDRs, so it needs to be added manually in order to make communication between both ends possible.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"581\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-17.39.39-1024x581.png\" alt=\"\" class=\"wp-image-1582\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-17.39.39-1024x581.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-17.39.39-300x170.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-17.39.39-768x436.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-17.39.39-1536x871.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-17.39.39-2048x1161.png 2048w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-17.39.39-1200x680.png 1200w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Add one or all SDDC CIDRs, depending on whether you want to make all or some of the segments in the SDDC accessible from the native VPC.<\/strong><\/p>\n\n\n\n<p>I have only added one segment called <strong>App01<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"546\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-17.42.31-1024x546.png\" alt=\"\" class=\"wp-image-1583\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-17.42.31-1024x546.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-17.42.31-300x160.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-17.42.31-768x410.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-17.42.31-1536x819.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-17.42.31-2048x1092.png 2048w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-29-at-17.42.31-1200x640.png 1200w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>NB<\/strong>: Virtual Machines on Layer-2 extended networks (including those with HCX MON enabled) are not able to use this path to talk with the native VPC.<\/p>\n\n\n\n<p><strong>Keep in mind that as you add prefixes to either the VMware Cloud on AWS or the AWS TGW topologies the various routing tables on both sides will have  to be updated.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Configure Security and Test Connectivity.<\/h2>\n\n\n\n<p>Now that network connectivity has been established let&#8217;s have a look at the additional steps that need to be completed before workloads can communicate across the expanded network. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Configure Compute Gateway FW rules in SDDC<\/h3>\n\n\n\n<p>First, the Compute Gateway (CGW) Firewall in the SDDC must be configured to allow traffic between the two destinations. <\/p>\n\n\n\n<p>You have the choice to define IP prefix ranges in the CGW to be very granular in your security policy. Another option is to use the system defined CGW Groups called &#8216;<strong>Transit Connect External TGW Prefixes<\/strong>&#8216; as sources and destinations in the rules. <\/p>\n\n\n\n<p>The system defined Group is created and updated automatically and it includes all CIDRs added and removed from the VTGW. Either choice works equally well depending on your requirements.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"666\" height=\"344\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-17.43.34-1.png\" alt=\"\" class=\"wp-image-1609\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-17.43.34-1.png 666w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-17.43.34-1-300x155.png 300w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 984px) 61vw, (max-width: 1362px) 45vw, 600px\" \/><\/figure>\n\n\n\n<p>I have created a Group will all prefixes from my SDDC called <strong>SDDC Subnets<\/strong> where I could find the IP address of my test VM.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"508\" height=\"424\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-17.42.02-3.png\" alt=\"\" class=\"wp-image-1612\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-17.42.02-3.png 508w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-17.42.02-3-300x250.png 300w\" sizes=\"auto, (max-width: 508px) 85vw, 508px\" \/><\/figure>\n\n\n\n<p>I decided to configure a Compute Gateway Firewall rule (2130) to allow traffic from the App01 compute segment to the native VPC and have enforced it at the INTRANET LEVEL. The second rule (2131) will allow for connectivity from the native VPC to the SDDC subnets.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"252\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-17.37.30-1024x252.png\" alt=\"\" class=\"wp-image-1600\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-17.37.30-1024x252.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-17.37.30-300x74.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-17.37.30-768x189.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-17.37.30-1536x378.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-17.37.30-1200x295.png 1200w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-17.37.30.png 1850w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Configure Security Groups in VPC<\/h3>\n\n\n\n<p>For the access to the EC2 instance running in the native VPC, make sure you have updated the security group to make sure the right protocol is permitted.<\/p>\n\n\n\n<p>My EC2 instance is deployed has an IP Address of 172.20.2.148 <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"428\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-18.11.25-1024x428.png\" alt=\"\" class=\"wp-image-1621\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-18.11.25-1024x428.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-18.11.25-300x125.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-18.11.25-768x321.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-18.11.25-1536x642.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-18.11.25-1200x501.png 1200w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-18.11.25.png 1776w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p>and has a security group attached to it with the following rules:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"782\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-18.10.19-1024x782.png\" alt=\"\" class=\"wp-image-1623\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-18.10.19-1024x782.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-18.10.19-300x229.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-18.10.19-768x587.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-18.10.19-1536x1173.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-18.10.19-1200x917.png 1200w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-18.10.19.png 1702w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Test connectivity<\/h3>\n\n\n\n<p>It&#8217;s time to test a ping from App001 VM in my SDDC which has ip address 172.18.12.100 to the IP Address of the EC2 instance.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"681\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-18.14.28-1024x681.png\" alt=\"\" class=\"wp-image-1625\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-18.14.28-1024x681.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-18.14.28-300x199.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-18.14.28-768x510.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-18.14.28-1536x1021.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-18.14.28-1200x798.png 1200w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-18.14.28.png 1944w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>We can also validate that a connectivity is possible from the EC2 instance to the VM running in the SDDC.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"813\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-18.20.21-1024x813.png\" alt=\"\" class=\"wp-image-1626\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-18.20.21-1024x813.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-18.20.21-300x238.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-18.20.21-768x610.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-18.20.21-1200x953.png 1200w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/05\/Screenshot-2022-05-05-at-18.20.21.png 1282w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>Win this post blog post we have established an<strong> intra-region VTGW to TGW<\/strong> peering, updated <strong>route tables<\/strong> on both the TGW and the native VPC, prepared all <strong>security policies <\/strong>appropriately in both the SDDC and on the AWS side, and verified <strong>connectivity <\/strong>end to end.&nbsp;<\/p>\n\n\n\n<p>This intra-region peering is opening a lot of new use case and connectivity capabilities in addition to the existing Inter-region peering.<\/p>\n\n\n\n<p>In my next post, I will show you how to peer vTGW with multiple TGW, stay tune!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>VMware Transit ConnectTM has been around now for more than a year and I must admit that it has been widely adopted by our customers and considered as a key feature. Over the time we have added multiple new capabilities to this feature like support for connectivity to a Transit VPC, custom real-time Metering to &hellip; <a href=\"https:\/\/vminded.com\/index.php\/2022\/05\/10\/vmware-transit-connect-to-native-transit-gateway-intra-region-peering-in-vmware-cloud-on-aws\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;VMware Transit Connect to native Transit Gateway intra-region peering in VMware Cloud on AWS&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1546","post","type-post","status-publish","format-standard","hentry","category-vmconaws"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>VMware Transit Connect to native Transit Gateway intra-region peering in VMware Cloud on AWS - vminded.com<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/vminded.com\/index.php\/2022\/05\/10\/vmware-transit-connect-to-native-transit-gateway-intra-region-peering-in-vmware-cloud-on-aws\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"VMware Transit Connect to native Transit Gateway intra-region peering in VMware Cloud on AWS - vminded.com\" \/>\n<meta property=\"og:description\" content=\"VMware Transit ConnectTM has been around now for more than a year and I must admit that it has been widely adopted by our customers and considered as a key feature. Over the time we have added multiple new capabilities to this feature like support for connectivity to a Transit VPC, custom real-time Metering to &hellip; Continue reading &quot;VMware Transit Connect to native Transit Gateway intra-region peering in VMware Cloud on AWS&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/vminded.com\/index.php\/2022\/05\/10\/vmware-transit-connect-to-native-transit-gateway-intra-region-peering-in-vmware-cloud-on-aws\/\" \/>\n<meta property=\"og:site_name\" content=\"vminded.com\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-10T08:45:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-10T08:45:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-27-at-08.51.38-1.png\" \/>\n<meta name=\"author\" content=\"Christophe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Christophe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/vminded.com\/index.php\/2022\/05\/10\/vmware-transit-connect-to-native-transit-gateway-intra-region-peering-in-vmware-cloud-on-aws\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/vminded.com\/index.php\/2022\/05\/10\/vmware-transit-connect-to-native-transit-gateway-intra-region-peering-in-vmware-cloud-on-aws\/\"},\"author\":{\"name\":\"Christophe\",\"@id\":\"https:\/\/vminded.com\/#\/schema\/person\/1800a04c708828d9b5c7b64f8eab3b3a\"},\"headline\":\"VMware Transit Connect to native Transit Gateway intra-region peering in VMware Cloud on AWS\",\"datePublished\":\"2022-05-10T08:45:23+00:00\",\"dateModified\":\"2022-05-10T08:45:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/vminded.com\/index.php\/2022\/05\/10\/vmware-transit-connect-to-native-transit-gateway-intra-region-peering-in-vmware-cloud-on-aws\/\"},\"wordCount\":1279,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/vminded.com\/#\/schema\/person\/1800a04c708828d9b5c7b64f8eab3b3a\"},\"image\":{\"@id\":\"https:\/\/vminded.com\/index.php\/2022\/05\/10\/vmware-transit-connect-to-native-transit-gateway-intra-region-peering-in-vmware-cloud-on-aws\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-27-at-08.51.38-1.png\",\"articleSection\":[\"VMConAWS\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/vminded.com\/index.php\/2022\/05\/10\/vmware-transit-connect-to-native-transit-gateway-intra-region-peering-in-vmware-cloud-on-aws\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/vminded.com\/index.php\/2022\/05\/10\/vmware-transit-connect-to-native-transit-gateway-intra-region-peering-in-vmware-cloud-on-aws\/\",\"url\":\"https:\/\/vminded.com\/index.php\/2022\/05\/10\/vmware-transit-connect-to-native-transit-gateway-intra-region-peering-in-vmware-cloud-on-aws\/\",\"name\":\"VMware Transit Connect to native Transit Gateway intra-region peering in VMware Cloud on AWS - vminded.com\",\"isPartOf\":{\"@id\":\"https:\/\/vminded.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/vminded.com\/index.php\/2022\/05\/10\/vmware-transit-connect-to-native-transit-gateway-intra-region-peering-in-vmware-cloud-on-aws\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/vminded.com\/index.php\/2022\/05\/10\/vmware-transit-connect-to-native-transit-gateway-intra-region-peering-in-vmware-cloud-on-aws\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-27-at-08.51.38-1.png\",\"datePublished\":\"2022-05-10T08:45:23+00:00\",\"dateModified\":\"2022-05-10T08:45:25+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/vminded.com\/index.php\/2022\/05\/10\/vmware-transit-connect-to-native-transit-gateway-intra-region-peering-in-vmware-cloud-on-aws\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/vminded.com\/index.php\/2022\/05\/10\/vmware-transit-connect-to-native-transit-gateway-intra-region-peering-in-vmware-cloud-on-aws\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/vminded.com\/index.php\/2022\/05\/10\/vmware-transit-connect-to-native-transit-gateway-intra-region-peering-in-vmware-cloud-on-aws\/#primaryimage\",\"url\":\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-27-at-08.51.38-1.png\",\"contentUrl\":\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-27-at-08.51.38-1.png\",\"width\":720,\"height\":291},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/vminded.com\/index.php\/2022\/05\/10\/vmware-transit-connect-to-native-transit-gateway-intra-region-peering-in-vmware-cloud-on-aws\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/vminded.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"VMware Transit Connect to native Transit Gateway intra-region peering in VMware Cloud on AWS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/vminded.com\/#website\",\"url\":\"https:\/\/vminded.com\/\",\"name\":\"vminded.com\",\"description\":\"feed your mind with virtual thoughts\",\"publisher\":{\"@id\":\"https:\/\/vminded.com\/#\/schema\/person\/1800a04c708828d9b5c7b64f8eab3b3a\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/vminded.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/vminded.com\/#\/schema\/person\/1800a04c708828d9b5c7b64f8eab3b3a\",\"name\":\"Christophe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/vminded.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8a35247a893da5c4bd4e7b117047b93859d3def341ac950cf2285f9d9b9220bf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8a35247a893da5c4bd4e7b117047b93859d3def341ac950cf2285f9d9b9220bf?s=96&d=mm&r=g\",\"caption\":\"Christophe\"},\"logo\":{\"@id\":\"https:\/\/vminded.com\/#\/schema\/person\/image\/\"},\"sameAs\":[\"http:\/\/vminded.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"VMware Transit Connect to native Transit Gateway intra-region peering in VMware Cloud on AWS - vminded.com","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/vminded.com\/index.php\/2022\/05\/10\/vmware-transit-connect-to-native-transit-gateway-intra-region-peering-in-vmware-cloud-on-aws\/","og_locale":"en_US","og_type":"article","og_title":"VMware Transit Connect to native Transit Gateway intra-region peering in VMware Cloud on AWS - vminded.com","og_description":"VMware Transit ConnectTM has been around now for more than a year and I must admit that it has been widely adopted by our customers and considered as a key feature. Over the time we have added multiple new capabilities to this feature like support for connectivity to a Transit VPC, custom real-time Metering to &hellip; Continue reading \"VMware Transit Connect to native Transit Gateway intra-region peering in VMware Cloud on AWS\"","og_url":"https:\/\/vminded.com\/index.php\/2022\/05\/10\/vmware-transit-connect-to-native-transit-gateway-intra-region-peering-in-vmware-cloud-on-aws\/","og_site_name":"vminded.com","article_published_time":"2022-05-10T08:45:23+00:00","article_modified_time":"2022-05-10T08:45:25+00:00","og_image":[{"url":"https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-27-at-08.51.38-1.png","type":"","width":"","height":""}],"author":"Christophe","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Christophe","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/vminded.com\/index.php\/2022\/05\/10\/vmware-transit-connect-to-native-transit-gateway-intra-region-peering-in-vmware-cloud-on-aws\/#article","isPartOf":{"@id":"https:\/\/vminded.com\/index.php\/2022\/05\/10\/vmware-transit-connect-to-native-transit-gateway-intra-region-peering-in-vmware-cloud-on-aws\/"},"author":{"name":"Christophe","@id":"https:\/\/vminded.com\/#\/schema\/person\/1800a04c708828d9b5c7b64f8eab3b3a"},"headline":"VMware Transit Connect to native Transit Gateway intra-region peering in VMware Cloud on AWS","datePublished":"2022-05-10T08:45:23+00:00","dateModified":"2022-05-10T08:45:25+00:00","mainEntityOfPage":{"@id":"https:\/\/vminded.com\/index.php\/2022\/05\/10\/vmware-transit-connect-to-native-transit-gateway-intra-region-peering-in-vmware-cloud-on-aws\/"},"wordCount":1279,"commentCount":1,"publisher":{"@id":"https:\/\/vminded.com\/#\/schema\/person\/1800a04c708828d9b5c7b64f8eab3b3a"},"image":{"@id":"https:\/\/vminded.com\/index.php\/2022\/05\/10\/vmware-transit-connect-to-native-transit-gateway-intra-region-peering-in-vmware-cloud-on-aws\/#primaryimage"},"thumbnailUrl":"https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-27-at-08.51.38-1.png","articleSection":["VMConAWS"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/vminded.com\/index.php\/2022\/05\/10\/vmware-transit-connect-to-native-transit-gateway-intra-region-peering-in-vmware-cloud-on-aws\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/vminded.com\/index.php\/2022\/05\/10\/vmware-transit-connect-to-native-transit-gateway-intra-region-peering-in-vmware-cloud-on-aws\/","url":"https:\/\/vminded.com\/index.php\/2022\/05\/10\/vmware-transit-connect-to-native-transit-gateway-intra-region-peering-in-vmware-cloud-on-aws\/","name":"VMware Transit Connect to native Transit Gateway intra-region peering in VMware Cloud on AWS - vminded.com","isPartOf":{"@id":"https:\/\/vminded.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/vminded.com\/index.php\/2022\/05\/10\/vmware-transit-connect-to-native-transit-gateway-intra-region-peering-in-vmware-cloud-on-aws\/#primaryimage"},"image":{"@id":"https:\/\/vminded.com\/index.php\/2022\/05\/10\/vmware-transit-connect-to-native-transit-gateway-intra-region-peering-in-vmware-cloud-on-aws\/#primaryimage"},"thumbnailUrl":"https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-27-at-08.51.38-1.png","datePublished":"2022-05-10T08:45:23+00:00","dateModified":"2022-05-10T08:45:25+00:00","breadcrumb":{"@id":"https:\/\/vminded.com\/index.php\/2022\/05\/10\/vmware-transit-connect-to-native-transit-gateway-intra-region-peering-in-vmware-cloud-on-aws\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/vminded.com\/index.php\/2022\/05\/10\/vmware-transit-connect-to-native-transit-gateway-intra-region-peering-in-vmware-cloud-on-aws\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/vminded.com\/index.php\/2022\/05\/10\/vmware-transit-connect-to-native-transit-gateway-intra-region-peering-in-vmware-cloud-on-aws\/#primaryimage","url":"https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-27-at-08.51.38-1.png","contentUrl":"https:\/\/vminded.com\/wp-content\/uploads\/2022\/04\/Screenshot-2022-04-27-at-08.51.38-1.png","width":720,"height":291},{"@type":"BreadcrumbList","@id":"https:\/\/vminded.com\/index.php\/2022\/05\/10\/vmware-transit-connect-to-native-transit-gateway-intra-region-peering-in-vmware-cloud-on-aws\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/vminded.com\/"},{"@type":"ListItem","position":2,"name":"VMware Transit Connect to native Transit Gateway intra-region peering in VMware Cloud on AWS"}]},{"@type":"WebSite","@id":"https:\/\/vminded.com\/#website","url":"https:\/\/vminded.com\/","name":"vminded.com","description":"feed your mind with virtual thoughts","publisher":{"@id":"https:\/\/vminded.com\/#\/schema\/person\/1800a04c708828d9b5c7b64f8eab3b3a"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/vminded.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/vminded.com\/#\/schema\/person\/1800a04c708828d9b5c7b64f8eab3b3a","name":"Christophe","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/vminded.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8a35247a893da5c4bd4e7b117047b93859d3def341ac950cf2285f9d9b9220bf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8a35247a893da5c4bd4e7b117047b93859d3def341ac950cf2285f9d9b9220bf?s=96&d=mm&r=g","caption":"Christophe"},"logo":{"@id":"https:\/\/vminded.com\/#\/schema\/person\/image\/"},"sameAs":["http:\/\/vminded.com"]}]}},"_links":{"self":[{"href":"https:\/\/vminded.com\/index.php\/wp-json\/wp\/v2\/posts\/1546","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/vminded.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/vminded.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/vminded.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/vminded.com\/index.php\/wp-json\/wp\/v2\/comments?post=1546"}],"version-history":[{"count":54,"href":"https:\/\/vminded.com\/index.php\/wp-json\/wp\/v2\/posts\/1546\/revisions"}],"predecessor-version":[{"id":1638,"href":"https:\/\/vminded.com\/index.php\/wp-json\/wp\/v2\/posts\/1546\/revisions\/1638"}],"wp:attachment":[{"href":"https:\/\/vminded.com\/index.php\/wp-json\/wp\/v2\/media?parent=1546"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/vminded.com\/index.php\/wp-json\/wp\/v2\/categories?post=1546"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/vminded.com\/index.php\/wp-json\/wp\/v2\/tags?post=1546"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}