Skip to content

EVS Network Architecture & Getting Started

This architecture and deployment guide for Amazon Elastic VMware Service documents complex networking requirements for deploying VMware Cloud Foundation on AWS infrastructure. The guide addresses a dual-audience challenge: AWS cloud architects need VMware context, while VMware administrators need AWS networking guidance. I worked with Product leadership to transparently document architectural constraints, including boot volume encryption limitations, securing engineering commitment for post-GA improvements while setting accurate customer expectations.

Documentation produced:

  • Network architecture guidance (BGP routing, VPC Route Server configuration)
  • Security boundary documentation (network ACLs vs. security groups)
  • Step-by-step deployment procedures with constraint documentation
  • Prerequisites and architectural limitations with business impact considerations

Tools & formats used:

  • AWS documentation platform (AsciiDoc)
  • Network architecture diagrams
  • Cross-references to VMware and AWS documentation

Customer success impact:

  • Transparent constraint documentation preventing compliance mismatches
  • Clear BGP routing requirements reducing deployment failures
  • Dual-audience approach serving both AWS and VMware administrators
  • Accurate expectations set upfront reducing support escalations

PDF Snapshot: Download EVS Architecture Guide Sample

Live Documentation:



EVS Consolidated Domain Architecture

Amazon EVS deploys a consolidated domain architecture that combines AWS networking infrastructure with VMware Cloud Foundation components. The diagram above illustrates the complete architecture, showing the NSX overlay network (T-0 and T-1 gateways) connecting to logical network segments where customer workloads run, alongside VCF management appliances (NSX Manager, vCenter Server, SDDC Manager, VMware Cloud Builder). The lower section shows the Amazon EVS networks layer, including VTEP networks, management networks, vMotion network, NSX Edge uplink networks, and vSAN network—all running across distributed ESXi hosts provisioned as Amazon EC2 instances.

Related Architecture Documentation:


Getting started with Amazon Elastic VMware Service

Section titled “Getting started with Amazon Elastic VMware Service”

Set up a VPC Route Server instance with endpoints and peers

Section titled “Set up a VPC Route Server instance with endpoints and peers”

Amazon EVS uses Amazon VPC Route Server to enable BGP-based dynamic routing to your VPC underlay network. You must specify a route server that shares routes to at least two route server endpoints in the service access subnet. The peer ASN configured on the route server peers must match, and the peer IP addresses must be unique.

For more information about setting up VPC Route Server, see the Route Server get started tutorial.


Create a network ACL to control Amazon EVS VLAN subnet traffic

Section titled “Create a network ACL to control Amazon EVS VLAN subnet traffic”

Amazon EVS uses a network access control list (ACL) to control traffic to and from Amazon EVS VLAN subnets.

For more information, see Create a network ACL for your VPC in the Amazon VPC User Guide.

If you plan to configure HCX internet connectivity, ensure that the network ACL rules that you configure allow the necessary inbound and outbound connections for HCX components. For more information about HCX port requirements, see the VMware HCX User Guide.


Service implementation: environment configuration

Section titled “Service implementation: environment configuration”

Step 6: Configure networks and connectivity

On the Configure networks and connectivity page, do the following:

a. For HCX connectivity requirements, select whether you want to use HCX with private connectivity or over the internet.

b. For VPC, choose the VPC that you previously created.

c. (For HCX internet connectivity only) For HCX network ACL, choose which network ACL your HCX VLAN will be associated with.

d. For Service access subnet, choose the private subnet that was created when you created the VPC.

e. For Security group (optional), you can choose up to two security groups that control communication between the Amazon EVS control plane and VPC. Amazon EVS uses the default security group if no security group is chosen.

f. Under Management connectivity, enter the CIDR blocks to be used for the Amazon EVS VLAN subnets. For HCX uplink VLAN CIDR block, if configuring a public HCX VLAN, you must specify a CIDR block with a netmask length of exactly /28. Amazon EVS throws a validation error if any other CIDR block size is specified for the public HCX VLAN. For a private HCX VLAN and all other VLANs CIDR blocks, the minimum netmask length that you can use is /28 and the maximum is /24.

g. Under Expansion VLANs, enter the CIDR blocks for additional Amazon EVS VLAN subnets that can be used to expand VCF capabilities within Amazon EVS, such as enabling NSX Federation.

h. Under Workload/VCF connectivity, enter the CIDR block for the NSX uplink VLAN, and choose two VPC Route Server peer IDs that peer to Route Server endpoints over the NSX uplink.

i. Choose Next.