Edwin,
That's probably not the whole picture - a public IP is not required to be routed
through the CGW, the CGW is where you land a tunneled interface from your premises. Internal addresses will flow through the tunnel, which means that the VoIP traffic in question
shouldn't need to NAT, as long as it knows how to get to VMC on AWS.
Are you landing the CGW on a NSX-V ESG, or on their perimeter device?
If so, is the NSX-V ESG configured to use a route-based VPN or policy based?
Is the NSX-V ESG advertising the VMC networks to the greater network?
Another side note - you may want to run jitter/latency testing before putting a VoIP workload on AWS - if the customer is not well placed for that, they may want to consider a public VIF direct connect to ensure that it doesn't fall out of tolerance.
------------------------------
Nicholas Schmidt
Engineer
AK
------------------------------
Original Message:
Sent: 01-30-2020 09:16 PM
From: Edwin Arcilla
Subject: Anyone using VMC for hosting VoIP workloads?
I have a customer that wants to use VMC to host their VM's. Several of their VM's handle some type of VoIP workload traffic. The VoIP VM's are public facing VM's without a NAT, currently on vCD w/NSX-V (not sure which exact version). I'm not a VoiP expert by any means but from my understanding, NAT'ing doesn't pass VoIP or SIP type traffic. In VMC/NSX-T, a public IP is required to be routed through the CGW using NAT. My question is if anyone is using VMC for VoIP traffic, how are they handling the NAT configuration?
------------------------------
Edwin Arcilla
VMware Solutions Architect
Rackspace
San Diego CA
------------------------------