vCloudOne

Architecting Enterprise SDDC: Amazon EVS Professional Implementation

Amazon EVS: The Complete Professional Prerequisite Guide

March 25, 2026 | Deployment & Hybrid Cloud Architecture | VCF 5.x

Amazon Elastic VMware Service (EVS) enables organizations to run VMware Cloud Foundation (VCF) directly on AWS bare-metal infrastructure. For a successful VCF bring-up, the AWS "underlay" must be precisely architected to handle management, storage, and workload traffic across a complex VLAN structure.

This guide provides the exhaustive checklist for networking, DNS, and IP pool planning required for a production-ready EVS Software-Defined Data Center (SDDC).

1 Phase 1: Bare-Metal Readiness

1.1 Validating Instance Quotas

Amazon EVS utilizes the **i4i.metal** instance type. A minimum of **4 nodes** is required for the initial VCF management domain cluster. Ensure your AWS Service Quotas for Running Dedicated i4i.metal Hosts is set to at least 4 per region before proceeding.

2 Phase 2: Multi-VLAN Networking (Underlay)

A production EVS environment requires **10 dedicated VLANs/Subnets**. These ranges must be non-overlapping and reserved within your VPC CIDR (typically a /16).

VLAN NameDescriptionRequired SizeRecommended CIDR
ManagementESXi Hosts, vCenter, SDDC ManagerMin /2410.0.10.0/24
vMotionLive VM Migration TrafficMin /2410.0.11.0/24
vSANSoftware-Defined Storage TrafficMin /2410.0.12.0/24
Host Overlay (TEP)NSX Host Geneve EncapsulationMin /2410.0.13.0/24
Edge OverlayNSX Edge Geneve EncapsulationMin /2410.0.14.0/24
Uplink 1North-South Traffic (Tier-0)Min /2710.0.15.0/27
Uplink 2North-South Traffic (Tier-0 Redundancy)Min /2710.0.15.32/27
Service AccessAWS Route Server & DNS Resolver endpointsMin /2810.0.1.0/24
HCX Management(Optional) HCX Cloud ManagerMin /2810.0.20.0/28
HCX Interconnect(Optional) HCX Migration TrafficMin /2810.0.21.0/28
Deployment Note: These VLANs are provisioned during the EVS bring-up process. Only the **Service Access Subnet** should be pre-created manually in the VPC Console.

3 Phase 3: Route 53 DNS & Management Resolution

VCF is highly sensitive to name resolution. You must provision Forward (A) and Reverse (PTR) records for every management appliance and host before the bring-up process begins.

ComponentForward FQDN (Example)Reverse Record (PTR)
Cloud Buildercloud-builder.vcloudone.internal10.0.10.9
SDDC Managersddc-manager.vcloudone.internal10.0.10.10
vCenter Servervcenter.vcloudone.internal10.0.10.11
NSX Manager 01nsx-mgr-01.vcloudone.internal10.0.10.12
NSX Manager 02nsx-mgr-02.vcloudone.internal10.0.10.13
NSX Manager 03nsx-mgr-03.vcloudone.internal10.0.10.14
NSX Edge 01nsx-edge-01.vcloudone.internal10.0.10.21
NSX Edge 02nsx-edge-02.vcloudone.internal10.0.10.22
ESXi Host 01-04esxi-0[1-4].vcloudone.internal10.0.11.21-24
HCX Manager(Optional) hcx.vcloudone.internal10.0.20.10

4 Phase 4: VPC Route Server & BGP

4.1 BGP Peering Configuration

The **VPC Route Server** acts as the BGP bridge between the NSX overlay and the AWS VPC routing table. Associate the Route Server with your evs-underlay-vpc and configure peering with the NSX Edges (using ASN 65000 for the Edge cluster and 64512 for the Route Server).

Important: Enable **Route Propagation** on your VPC Main Route Table so that VMware workload segments are reachable from AWS native services.

Automation: Advanced Terraform Deployment

The following template automates the VPC, Service Access Subnet, Inbound Resolver, and VPC Route Server setup required for EVS.

main.tf (Full SDDC Underlay) v1.5
# 1. Create Base VPC Underlay
resource "aws_vpc" "evs_vpc" {
  cidr_block = "10.0.0.0/16"
  enable_dns_hostnames = true
  enable_dns_support = true
}

# 2. Inbound DNS Resolver for SDDC Components
resource "aws_route53_resolver_endpoint" "evs_dns" {
  direction = "INBOUND"
  security_group_ids = [aws_security_group.dns_sg.id]
  ip_address { subnet_id = aws_subnet.service_access.id; ip = "10.0.1.100" }
  ip_address { subnet_id = aws_subnet.service_access.id; ip = "10.0.1.110" }
}

# 3. VPC Route Server for NSX Edge Peering
resource "aws_vpc_route_server" "evs_rs" {
  amazon_side_asn = 64512
}

resource "aws_vpc_route_server_peer" "nsx_edge_01" {
  route_server_id = aws_vpc_route_server.evs_rs.route_server_id
  peer_address = "10.0.10.251"
  bgp_options { peer_asn = 65000 }
}

Download Enterprise EVS Kit

Access the full modular Terraform project for DNS, Peering, IAM, and Networking.

Download Deployment Project (.zip)