Amazon EVS Getting Started Guide
This guide for Amazon Elastic VMware Service documents the networking requirements for deploying VMware Cloud Foundation (VCF) on AWS infrastructure. It’s written for VMware administrators coming from on-premises environments who are new to AWS networking constructs.
I owned the guide end-to-end: defined cross-service requirements, designed the information architecture, authored the content, and coordinated SME validation and cross-service documentation updates.
I translated VMware-based networking requirements into AWS terms while defining the new Layer 2 networking constructs introduced by EVS. To reduce failed deployments and configuration mismatches, I surfaced architectural constraints early so customers can validate service fit and compliance requirements before provisioning.
The scope of this work spanned Private Preview (Q4 2024), Public Preview (Q2 2025), and General Availability (Q3 2025). For each launch, I partnered with EVS and EC2 product, UX, engineering, and solutions architects to close documentation gaps, reduce Day 1 friction, and coordinate cross-service updates.
For more information about EVS console and API work, see EVS Day 1 Deployment Experience (Console + User Guide) and EVS CreateEnvironment API Reference.
Deliverables & Impact
Section titled “Deliverables & Impact”Role: Owned end-to-end (requirements discovery, information architecture, authoring, SME validation, cross-service coordination) Audience: On-prem VMware administrators deploying VCF on AWS via EVS
Documentation produced:
- Network architecture guidance (BGP routing model, VPC Route Server endpoints/peers/propagation requirements)
- Security boundary model (where NACLs apply and why security groups do not on EVS VLAN subnets)
- Step-by-step deployment procedure (environment creation with embedded constraint checks)
- Prerequisites and architectural limitations (go/no-go constraints with business/compliance implications)
Impact:
- Reduced failed deployments by surfacing hard requirements before provisioning (e.g., Route Server endpoint/peer/ASN rules)
- Prevented security boundary misconfigurations by clarifying NACL vs. security group enforcement on EVS VLAN subnets
Documentation Samples
Section titled “Documentation Samples”PDF excerpt: Download EVS Deployment Guide Sample
Live AWS docs:
Documentation excerpt (curated)
Section titled “Documentation excerpt (curated)”Getting started with Amazon Elastic VMware Service
Section titled “Getting started with Amazon Elastic VMware Service”Prerequisites
Section titled “Prerequisites”Before getting started, you must complete the Amazon EVS prerequisite tasks. For more information, see Setting up Amazon EVS.
Network infrastructure: dynamic routing
Section titled “Network infrastructure: dynamic routing”Set up a VPC Route Server instance with endpoints and peers
Section titled “Set up a VPC Route Server instance with endpoints and peers”Amazon EVS uses Amazon VPC Route Server to enable BGP-based dynamic routing to your VPC underlay network. You must specify a route server that shares routes to at least two route server endpoints in the service access subnet. The peer ASN configured on the route server peers must match, and the peer IP addresses must be unique.
For more information about setting up VPC Route Server, see the Route Server get started tutorial.
Security architecture: layer 2 isolation
Section titled “Security architecture: layer 2 isolation”Create a network ACL to control Amazon EVS VLAN subnet traffic
Section titled “Create a network ACL to control Amazon EVS VLAN subnet traffic”Amazon EVS uses a network access control list (ACL) to control traffic to and from Amazon EVS VLAN subnets.
For more information, see Create a network ACL for your VPC in the Amazon VPC User Guide.
If you plan to configure HCX internet connectivity, ensure that the network ACL rules that you configure allow the necessary inbound and outbound connections for HCX components. For more information about HCX port requirements, see the VMware HCX User Guide.
Service implementation: environment configuration
Section titled “Service implementation: environment configuration”Create an Amazon EVS environment
Section titled “Create an Amazon EVS environment”Step 6: Configure networks and connectivity
On the Configure networks and connectivity page, do the following:
a. For HCX connectivity requirements, select whether you want to use HCX with private connectivity or over the internet.
b. For VPC, choose the VPC that you previously created.
c. (For HCX internet connectivity only) For HCX network ACL, choose which network ACL your HCX VLAN will be associated with.
d. For Service access subnet, choose the private subnet that was created when you created the VPC.
e. For Security group (optional), you can choose up to two security groups that control communication between the Amazon EVS control plane and VPC. Amazon EVS uses the default security group if no security group is chosen.
f. Under Management connectivity, enter the CIDR blocks to be used for the Amazon EVS VLAN subnets. For HCX uplink VLAN CIDR block, if configuring a public HCX VLAN, you must specify a CIDR block with a netmask length of exactly /28. Amazon EVS throws a validation error if any other CIDR block size is specified for the public HCX VLAN. For a private HCX VLAN and all other VLANs CIDR blocks, the minimum netmask length that you can use is /28 and the maximum is /24.
g. Under Expansion VLANs, enter the CIDR blocks for additional Amazon EVS VLAN subnets that can be used to expand VCF capabilities within Amazon EVS, such as enabling NSX Federation.
h. Under Workload/VCF connectivity, enter the CIDR block for the NSX uplink VLAN, and choose two VPC Route Server peer IDs that peer to Route Server endpoints over the NSX uplink.
i. Choose Next.