VMware 3v0-42-23 practice test

VMware NSX 4.x Advanced Design

Last exam update: Nov 18 ,2025
Page 1 out of 4. Viewing questions 1-15 out of 51

Question 1

Which of the following considerations should be taken into account when designing Geneve
tunneling?

  • A. The number of transport nodes in the NSX environment.
  • B. The available bandwidth on the physical network links between the transport nodes.
  • C. The size of the virtual machines running in the NSX environment.
  • D. The physical location of the transport nodes within the data center.
Mark Question:
Answer:

B


Explanation:
When designing Geneve tunneling in VMware NSX 4.x, one of the key considerations is ensuring that
there is sufficient bandwidth on the physical network links between transport nodes. This is because
Geneve (Generic Network Virtualization Encapsulation) tunnels encapsulate traffic from virtual
machines and send it across the physical network infrastructure. If the physical network links do not
have enough bandwidth to handle this encapsulated traffic, it could lead to congestion, packet drops,
and degraded performance.
Detailed Breakdown:
Geneve Tunneling Overview :
Geneve is a tunneling protocol used by VMware NSX to encapsulate Layer 2 or Layer 3 traffic inside
UDP packets. This allows for overlay networking where multiple logical networks can be created over
a shared physical network infrastructure.
Each tunnel endpoint resides on a transport node (e.g., ESXi hosts, Edge nodes, etc.), and these
endpoints communicate with each other over the physical network using Geneve encapsulation.
Why Bandwidth Matters (Option B) :
Since Geneve adds an additional header to the original packet, it increases the overall size of the
packet being transmitted. This means that more data needs to traverse the physical network links.
If the physical links between transport nodes are already heavily utilized or do not have sufficient
capacity, adding Geneve-encapsulated traffic could exacerbate existing bottlenecks.
Therefore, when designing the NSX environment, it’s crucial to assess the current utilization of the
physical network and ensure that there is adequate headroom for the increased load due to Geneve
tunneling.
Other Options Analysis :
A . The number of transport nodes in the NSX environment :
While the number of transport nodes does affect the complexity of the NSX deployment (more
nodes mean more tunnels to manage), it doesn’t directly impact the design of Geneve tunneling
itself. The primary concern here would be scalability rather than the tunneling protocol's efficiency.
C . The size of the virtual machines running in the NSX environment :
The size of the VMs (CPU, memory, disk space) has no direct bearing on Geneve tunneling. What
matters is the amount of network traffic generated by those VMs, not their resource allocation.
D . The physical location of the transport nodes within the data center :
Although the physical location of transport nodes might influence latency and routing decisions, it
isn’t a primary factor when specifically considering Geneve tunneling design. However, proximity
could indirectly affect performance if distant nodes introduce higher latencies or require traversing
slower WAN links.
Reference:
VMware NSX-T Data Center Installation Guide 4.x :
This guide provides detailed steps and considerations for deploying NSX-T environments, including
setting up transport zones and configuring Geneve tunnels. It emphasizes the importance of
assessing network bandwidth requirements during the planning phase.
VMware NSX-T Data Center Design Guide 4.x :
The design guide discusses best practices for designing scalable and performant NSX environments.
It highlights the need to evaluate the underlying physical network infrastructure to support overlay
traffic efficiently.
VMware Knowledge Base Articles :
Various KB articles related to NSX troubleshooting often mention issues arising from insufficient
bandwidth on physical links when dealing with high volumes of encapsulated traffic.
By focusing on available bandwidth (Option B), you ensure that the physical network can
accommodate the additional overhead introduced by Geneve tunneling, thereby maintaining
optimal performance and reliability in your NSX environment.

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

A Solutions Architect is designing an NSX solution for a customer. Which of the following would be an
example of a logical design for this project?

  • A. A set of instructions for installing and configuring the NSX software.
  • B. A detailed diagram of the interfaces for the NSX Edge components in the data center.
  • C. A high-level overview of the NSX solution, including objectives of the implementation.
  • D. A detailed description of the NSX configuration, including VLAN and IP address assignments.
Mark Question:
Answer:

C


Explanation:
A logical design defines the high-level structure and objectives of an NSX implementation without
getting into the specifics of configuration details (which are part of the physical design).
Logical Design Includes:
Network Segmentation Strategy
Traffic Flow Considerations (East-West & North-South)
Security & Micro-Segmentation Policies
Integration with Physical and Cloud Networks
Incorrect Options:
(A - Instructions for Installation) → This belongs to the implementation phase (not logical design).
(B - Interface Diagrams) → These belong to the physical design.
(D - VLAN & IP Assignments) → These are detailed configuration steps, not part of high-level design.
VMware NSX 4.x Reference:
VMware NSX-T Reference Design Guide
NSX-T Data Center Logical & Physical Design Considerations

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

Which three VMware guidelines are recommended when designing VLANs and subnets for a single
region and single availability zone? (Choose three.)

  • A. Use the RFC1918 IPv4 address space for these subnets and allocate one octet by region and another octet by function.
  • B. Use the RFC2460 IPv6 address space for these subnets and allocate one set by region and another set by function.
  • C. Use only /16 subnets to reduce confusion and mistakes when handling IPv4 subnetting.
  • D. Use only /24 subnets to reduce confusion and mistakes when handling IPv4 subnetting.
  • E. Use the IP address of the floating interface for Virtual Router Redundancy Protocol (VRRP) or Hot Standby Routing Protocol (HSRP) as the gateway.
Mark Question:
Answer:

A, D, E


Explanation:
RFC1918 Address Space (A)
VMware recommends using private IPv4 address ranges from RFC1918. This ensures internal
network segmentation without public exposure.
Allocating one octet for region and another for function helps with structured IP management.
Subnet Sizing (D)
Using /24 subnets is preferred in NSX-T design because:
It simplifies management by offering 256 usable IP addresses per subnet.
It prevents overlapping IP issues and ensures better compatibility with firewalls and routers.
Floating Interface for VRRP/HSRP (E)
NSX-T supports redundant gateways using VRRP (Virtual Router Redundancy Protocol) or HSRP (Hot
Standby Routing Protocol).
The floating IP acts as a redundant gateway, ensuring seamless failover in multi-gateway
environments.
Incorrect Options:
(B - IPv6 RFC2460) → NSX primarily uses IPv4 for most enterprise deployments. IPv6 support is
limited and requires additional configuration.
(C - /16 Subnets) → Using /16 subnets is impractical for micro-segmentation as it creates larger
broadcast domains and increases network overhead.
VMware NSX 4.x Reference:
VMware NSX-T Data Center Design Guide
NSX-T Best Practices for VLAN and Subnet Design

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 4

A global bank has decided to overhaul its network infrastructure and adopt VMware NSX to enhance
security and streamline management. The bank handles sensitive financial data and has a massive
customer base, making it a potential target for cyber threats. Therefore, security is of paramount
importance in this project.
A Network Solutions Architect is tasked with developing an NSX security design that incorporates
security policy methodologies and adheres to NSX security best practices. They must ensure the
micro-segmentation of network components, implement distributed firewalling, and create security
policies that align with the bank's data protection requirements.
When considering NSX security VMware practices for the bank's deployment, what aspect is
essential for enhancing the security posture?

  • A. Avoid the use of distributed firewalls as they can complicate the network design.
  • B. Implement a Zero Trust model and enforce policies at the Gateway level.
  • C. Implement a Zero Trust model and enforce policies at the workload level.
  • D. Deploy NSX in a single, large segment for simplicity.
Mark Question:
Answer:

C


Explanation:
Implementing a Zero Trust Model at the Workload Level (Correct Answer C):
Micro-segmentation and NSX Distributed Firewall (DFW) allow enforcement of security policies at
the workload level.
This ensures that even if one workload is compromised, lateral movement is restricted.
Incorrect Options:
(A - Avoiding Distributed Firewalls) → This contradicts NSX best practices. DFW is a core security
feature that minimizes attack surfaces.
(B - Gateway-Level Security Only) → A gateway firewall alone cannot enforce granular micro-
segmentation.
(D - Single Large Segment) → This increases the blast radius and is against Zero Trust principles.
VMware NSX 4.x Reference:
VMware NSX-T Security Reference Guide
Zero Trust Security Model in NSX-T

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

How can a multi-tier architecture benefit a customer’s design?

  • A. It offers better control over the placement of stateful services.
  • B. It provides a cost-effective solution for simple networks.
  • C. It simplifies the network topology by consolidating all services into a single tier.
  • D. It eliminates the need for EVPN in the network design.
Mark Question:
Answer:

A


Explanation:
Multi-Tier Architecture & Stateful Services (Correct Answer - A):
In NSX-T, a multi-tier architecture consists of Tier-0 (T0) and Tier-1 (T1) Gateways, allowing better
control and placement of stateful services such as:
Load Balancers (LBs)
NAT (Network Address Translation)
Firewall Rules (DFW, Gateway FW)
VPN Services
Tier-1 Gateways can be configured to handle stateful services, while Tier-0 Gateways focus on
routing North-South traffic efficiently.
Incorrect Options:
(B - Cost-Effective for Simple Networks):
Multi-tier architecture is not necessarily cost-effective for simple networks. Instead, a single-tier
deployment might be more suitable.
(C - Simplifies Network Topology by Consolidation):
Multi-tier segregates services rather than consolidating them. It separates East-West and North-
South traffic flows for better performance.
(D - Eliminates the Need for EVPN):
Ethernet VPN (EVPN) is a control plane solution for VXLAN overlay networks, mainly used in multi-
site or multi-data center deployments. It is independent of the multi-tier architecture.
VMware NSX 4.x Reference:
VMware NSX-T Multi-Tier Design Guide
NSX-T Data Center Routing and Gateway Configuration Best Practices

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

A Solutions Architect is designing an NSX solution for a customer who needs to extend their on-
premises VLANs to a public cloud environment. The customer wants to use L2 bridging to extend the
VLANs across the environments.
Which of the following design considerations should the Solutions Architect keep in mind when using
L2 bridging solutions in NSX for this use case?

  • A. L2 bridging requires the use of Geneve encapsulation for traffic to traverse the public internet.
  • B. L2 bridging can cause delays in traffic and should only be used for low-latency applications.
  • C. L2 bridging should only be used when the on-premises and cloud environments are in the same geographical location.
  • D. L2 bridging requires the same IP subnet to be used in both the on-premises and cloud environments.
Mark Question:
Answer:

D


Explanation:
L2 Bridging & Subnet Consistency (Correct Answer - D):
NSX L2 Bridging allows VLAN-backed workloads to communicate with overlay-backed workloads by
extending Layer 2 segments between on-premises and cloud environments.
A fundamental requirement is that both locations use the same IP subnet to ensure seamless
communication without additional routing.
Incorrect Options:
(A - Requires Geneve Encapsulation Over Public Internet):
L2 bridging is different from L3 VPN or Geneve overlay networks. Geneve is used for NSX overlay
transport, but L2 bridging does not require Geneve over the internet.
(B - Only for Low-Latency Applications):
L2 bridging can introduce latency, but it is not restricted to low-latency applications. However, it
should be used carefully in high-latency environments.
(C - Must Be in the Same Geographical Location):
While proximity reduces latency, it is not mandatory. Cross-region Layer 2 extensions can be
implemented with VXLAN or NSX-T bridging, but performance considerations are crucial.
VMware NSX 4.x Reference:
NSX-T L2 Bridging Best Practices
NSX-T Multi-Cloud Design Guide

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

Which of the following is a requirement for using NSX Federation for disaster recovery?

  • A. All sites must have the same NSX version and build.
  • B. All sites must have the same physical hardware.
  • C. All sites must be located in the same geographical region.
  • D. All sites must have the same IP address space.
Mark Question:
Answer:

A


Explanation:
NSX Federation Requirements (Correct Answer - A):
NSX Federation allows managing multiple NSX-T Data Center instances centrally across multiple
locations.
To ensure seamless disaster recovery, all sites must run the same NSX version and build to support:
Global Policies & Rules Consistency
Inter-Site Transport Zone Communication
Seamless Failover & Policy Replication
Incorrect Options:
(B - Same Physical Hardware Required):
NSX Federation does not require identical hardware. However, each site should meet the minimum
hardware specifications for compatibility.
(C - Must Be in the Same Region):
Federation supports multi-region deployments, allowing disaster recovery across different
geographical locations.
(D - Must Have the Same IP Address Space):
Each NSX site can have different IP address spaces, as NSX Federation supports routing between sites
using Tier-0 Gateways and BGP.
VMware NSX 4.x Reference:
NSX-T Federation Deployment Guide
NSX-T Multi-Location Disaster Recovery Architecture

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

A Network Solutions Architect is tasked with designing an optimized and high-performing NSX
solution, keeping in mind the need for DPU-based acceleration. The architect needs to consider the
use of Geneve Offload, Receive Side Scaling (RSS), Geneve Rx Filters, SSL Offload, and the effects of
Multi-TEP, MTU size, and NIC speed on throughput. Furthermore, the architect also needs to
consider the key performance factors for compute nodes and NSX Edge nodes.
The company CTO is worried about potential network bottlenecks as they continue to grow.
Which strategy should the architect recommend to address the CTO's concern?

  • A. Increase the MTU size but use only a single TEP.
  • B. Increase the MTU size and use Multi-TEP with high-speed NICs.
  • C. Decrease the MTU size and use a single TEP.
  • D. Keep the MTU size constant and reduce NIC speed.
Mark Question:
Answer:

B


Explanation:
Increase MTU & Multi-TEP (Correct Answer - B):
Increasing the MTU size (Jumbo Frames 1600-9000 bytes) helps reduce fragmentation and improve
Geneve performance.
Multi-TEP (Tunnel Endpoints) enables load balancing of overlay traffic across multiple NICs,
enhancing throughput.
High-speed NICs (25G/40G/100G) improve data plane performance by reducing packet processing
overhead.
Incorrect Options:
(A - MTU Increase But Single TEP):
A single TEP creates a bottleneck as all overlay traffic is routed through one NIC.
(C - Decrease MTU & Use Single TEP):
Reducing MTU increases fragmentation, negatively impacting performance.
(D - Keep MTU & Reduce NIC Speed):
Slower NIC speeds increase latency and reduce throughput, which contradicts the goal.
VMware NSX 4.x Reference:
NSX-T Performance Optimization Guide
VMware NSX Best Practices for DPU-Based Acceleration

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

A Solutions Architect has been tasked with designing a comprehensive security policy methodology
for a large financial institution. The institution has multiple departments and requires strict
segregation of network traffic to ensure data confidentiality and regulatory compliance. The security
policy should provide granular control over network traffic and enforce consistent security measures
across the entire infrastructure.
Which feature of the NSX security policy should the architect recommend to achieve regulatory
compliance for the financial institution?

  • A. Intrusion Detection and Prevention
  • B. Identity-Based Firewalling
  • C. Micro-Segmentation
  • D. Network Introspection
Mark Question:
Answer:

C


Explanation:
Micro-Segmentation for Granular Security (Correct Answer - C):
Micro-segmentation in NSX-T enables granular firewall policies at the workload level, ensuring strict
segregation of traffic across different departments.
It allows zero trust security, ensuring only authorized communications occur between workloads,
reducing attack surfaces.
This is particularly critical for financial institutions that need regulatory compliance (e.g., PCI-DSS,
GDPR, ISO 27001).
Incorrect Options:
(A - Intrusion Detection & Prevention - IDS/IPS):
IDS/IPS provides threat detection, but it does not segment workloads or enforce access control.
(B - Identity-Based Firewalling):
NSX Identity Firewall (IDFW) can be useful for user-based policies but is not a replacement for
network segmentation.
(D - Network Introspection):
NSX Network Introspection is used for third-party security integrations, not as a primary
segmentation strategy.
VMware NSX 4.x Reference:
VMware NSX-T Security Reference Guide
Micro-Segmentation Best Practices in NSX-T

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

A company is planning to deploy NSX to provide a multi-tenant environment for their customers. The
solutions architect is responsible for designing the network services to ensure that each tenant's
traffic is isolated and secure.
Which of the following NSX features should the solutions architect use to achieve this goal?

  • A. Load Balancing
  • B. VLAN
  • C. NAT
  • D. Distributed Firewall
Mark Question:
Answer:

D


Explanation:
Distributed Firewall for Multi-Tenant Security (Correct Answer - D):
NSX Distributed Firewall (DFW) enables tenant isolation at the virtual machine level.
It enforces security policies directly on vNICs, ensuring East-West traffic control without needing
hardware firewalls.
This ensures multi-tenancy compliance, preventing cross-tenant communication unless explicitly
allowed.
Incorrect Options:
(A - Load Balancing):
NSX Load Balancer improves application availability but does not provide traffic isolation.
(B - VLAN):
VLANs provide basic segmentation but do not offer granular control like DFW.
(C - NAT):
NAT provides IP address translation but does not ensure tenant security.
VMware NSX 4.x Reference:
NSX-T Data Center Multi-Tenancy Design Guide
NSX-T Distributed Firewall Best Practices

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 11

Which three VMware guidelines are recommended when designing VLANs and subnets for a single
region and single availability zone? (Choose three.)

  • A. Use the RFC1918 IPv4 address space for these subnets and allocate one octet by region and another octet by function.
  • B. Use the RFC2460 IPv6 address space for these subnets and allocate one set by region and another set by function.
  • C. Use only /16 subnets to reduce confusion and mistakes when handling IPv4 subnetting.
  • D. Use only /24 subnets to reduce confusion and mistakes when handling IPv4 subnetting.
  • E. Use the IP address of the floating interface for Virtual Router Redundancy Protocol (VRRP) or Hot Standby Routing Protocol (HSRP) as the gateway.
Mark Question:
Answer:

A, D, E


Explanation:
Recommended Network Design Guidelines:
(A - Use RFC1918 Addressing):
VMware NSX-T recommends using RFC1918 private address space for internal networks to avoid
public address conflicts.
(D - Use /24 Subnets):
/24 subnets are preferred as they provide 256 usable IPs, simplifying management and subnetting.
(E - Floating Interface for VRRP/HSRP):
NSX Gateway HA uses VRRP (Virtual Router Redundancy Protocol) or HSRP (Hot Standby Routing
Protocol) for gateway failover, ensuring redundancy.
Incorrect Options:
(B - Use IPv6 RFC2460 Addressing) → IPv6 is optional in NSX, but IPv4 remains the primary
addressing method.
(C - Use /16 Subnets) → Using /16 subnets results in large broadcast domains and unnecessary
complexity.
VMware NSX 4.x Reference:
NSX-T Network Design Best Practices
NSX-T Gateway HA & VRRP Configuration Guide

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 12

A large multinational company is expanding its data center due to increased demand for online
services.
The company is considering shifting from an NSX Edge VM design to a bare-metal NSX Edge design to
accommodate new hardware acquisitions and maximize performance.
Which is a potential benefit for the company in shifting from an NSX Edge VM design to a bare-metal
NSX Edge design?

  • A. It will maximize performance by reducing virtualization overhead.
  • B. It will allow for the implementation of more VLANs.
  • C. It will automatically distribute stateful services across Edge nodes.
  • D. It will eliminate the need for stateful services.
Mark Question:
Answer:

A


Explanation:
Performance Benefits of Bare-Metal NSX Edge (Correct Answer - A):
Bare-metal NSX Edge Nodes provide higher performance by eliminating the virtualization overhead
associated with Edge VMs running inside ESXi/KVM hosts.
This increases throughput and reduces latency, making it ideal for high-bandwidth applications (e.g.,
Load Balancing, VPN, and NAT).
Incorrect Options:
(B - More VLANs):
The number of VLANs is not limited by the NSX Edge type. VLAN scalability depends on physical
network design.
(C - Automatic Stateful Service Distribution):
Stateful services (NAT, FW, LB, VPN) do not auto-distribute. Stateful HA must be manually configured.
(D - Eliminates Stateful Services):
Stateful services (e.g., NAT, Load Balancer, Firewall) are still required, regardless of Edge deployment
mode.
VMware NSX 4.x Reference:
VMware NSX-T Bare-Metal Edge Deployment Guide
NSX-T Edge Node Performance Optimization

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 13

What are the design considerations for segment and transport zone design?

  • A. Server hardware, operating system, and application requirements
  • B. VLAN design, subnet design, and routing design
  • C. Number of virtual machines, network performance, and security requirements
  • D. Network topology, availability, and scalability requirements
Mark Question:
Answer:

D


Explanation:
NSX-T Segment and Transport Zone Design Considerations (Correct Answer - D):
Network topology influences how segments and transport zones are structured.
Availability ensures failover and redundancy are properly planned in transport zones.
Scalability is crucial when designing segments to accommodate growth without redesign.
Incorrect Options:
(A - Server hardware, OS, and application requirements):
These impact workload performance but are not primary factors in transport zone design.
(B - VLAN design, subnet design, and routing design):
These are part of traditional network design, but NSX-T segments use overlay networks instead.
(C - Number of VMs, network performance, and security):
While relevant, these factors alone do not define transport zone and segment architecture.
VMware NSX 4.x Reference:
NSX-T Data Center Logical Design Best Practices
Transport Zone and Overlay Segment Design Guide

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 14

Which combination of stateful services are available in an NSX Gateway?

  • A. NAT, DHCP, Load Balancer
  • B. Load Balancer, Firewall, Reflexive NAT
  • C. NAT, DNS, Firewall
  • D. TLS Inspection, DHCP, DNS
Mark Question:
Answer:

A


Explanation:
Stateful Services in NSX Gateway (Correct Answer - A):
NSX-T Gateways (T0/T1) support the following stateful services:
NAT (Network Address Translation)
DHCP (Dynamic Host Configuration Protocol)
Load Balancing
Incorrect Options:
(B - Reflexive NAT instead of Stateful NAT):
Reflexive NAT is a stateless service, whereas stateful NAT is required for advanced networking.
(C - DNS Service on Gateway):
NSX Gateways do not provide DNS services; they rely on external DNS servers.
(D - TLS Inspection and DNS on Gateway):
TLS inspection is an IDS/IPS feature, not an NSX-T gateway service.
VMware NSX 4.x Reference:
NSX-T Edge and Gateway Services Guide
VMware NSX-T Advanced Load Balancer Documentation

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 15

What is the effect of stateful services placement on NSX Edge design?

  • A. It has stateless services applications that cannot run with stateful applications.
  • B. It affects the scalability of the Edge cluster and performance of Edge nodes.
  • C. It reduces the need for load balancing in the Edge cluster.
  • D. It determines the complexity of the Edge cluster and size of Edge node.
Mark Question:
Answer:

B


Explanation:
Impact of Stateful Services on NSX Edge Cluster (Correct Answer - B):
Stateful services (NAT, FW, LB, VPN) require additional processing power, impacting Edge node
performance.
More stateful services means higher CPU and memory utilization, affecting scalability.
Edge Cluster design must balance stateful workloads to avoid performance degradation.
Incorrect Options:
(A - Stateless services cannot run with stateful applications):
Stateful and stateless services can coexist on NSX Edge, but require careful placement.
(C - Reduces the need for load balancing):
Load balancing is still needed, even if stateful services exist.
(D - Determines complexity of Edge cluster size):
While it adds complexity, the primary impact is on performance and scalability.
VMware NSX 4.x Reference:
NSX-T Edge Cluster Design and Performance Best Practices
VMware NSX-T Scaling Stateful Services Guide

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2