Part 13 – Creating NSX‑T Overlay and VLAN Segments


In this post, we’ll attach our Overlay segments — App, Web, and DB — to simulate a Layer 2 domain within NSX‑T. These segments form the foundation of east‑west traffic in your virtualized environment.

Logic Behind Segments

Each NSX‑T segment behaves like an access port on a physical switch. Instead of configuring interfaces on a physical router, we define default gateways inside NSX‑T.

For example:

  • All VMs in the App segment will use the gateway defined in the App segment itself.
  • This abstracts physical routing and enables overlay-based mobility

Segment Types in NSX‑T

Create Overlay Backed Segments

Log into NSX-T Manager VIP and navigate to Networking >Segments >Segments > Add Segment

Example: Overlay Web Segment connected to T1-GW

Click Save.

The IP here will be used as a gateway for our Web Servers

Repeat for App and DB Segments

Each segment connects to t1-gw-01 and uses Prod-Overlay-TZ.

Create VLAN Backed Segments

If you need to connect to physical VLANs:

Click Save. Ensure VLAN 30 exists on your physical switch infrastructure.

Verifying the Topology

Navigate to: Networking > Network Topology
You’ll now see:

  • T1 Gateway (t1-gw-01)
  • Connected segments: App, Web, DB
  • Route flow from segments → T1 → T0 → VyOS → External worl

With Overlay and VLAN segments configured, your NSX‑T lab now supports:

  • Layer 2 isolation
  • East‑west traffic
  • Gateway abstraction
  • Tunnel‑based mobility

This setup mirrors real‑world enterprise segmentation and prepares your lab for advanced services like DFW, LB, and micro‑segmentation.

(Visited 662 times, 1 visits today)

By Ash Thomas

Ash Thomas is a seasoned IT professional with extensive experience as a technical expert, complemented by a keen interest in blockchain technology.

Leave a Reply