VMFS Recovery™
Recover data from damaged or formatted VMFS disks or VMDK files
Recover data from damaged or formatted VMFS disks or VMDK files
Last updated: May 19, 2026

NSX-T vs NSX-V: NSX-T vs NSX Architecture, Feature Differences, and NSX-V to NSX-T Migration — Complete Technical Comparison

NSX‑V is legacy, tied to vCenter. NSX‑T is the successor, built for multi‑hypervisor, multi‑cloud, and containerized environments. The shift is architectural: NSX‑T decouples from vCenter, supports Kubernetes, and scales beyond vSphere. For IT teams, this means re‑evaluating features, compatibility, and migration paths. This guide compares NSX‑T vs NSX‑V directly, then outlines practical steps for moving forward.

What Is VMware NSX? Software‑Defined Networking for the Datacenter

NSX Core Concept: Network Virtualization

VMware NSX virtualizes core networking functions — switches, routers, firewalls, VPNs, load balancers — in software, independent of physical hardware. It creates a network hypervisor layer above the physical infrastructure, enabling programmatic provisioning, cloning, and automation similar to vSphere for compute. Virtual networks can be spun up or torn down in seconds via API or the NSX UI, making physical topology irrelevant to the logical layer.

The Two NSX Generations: Why They Exist on Different Code Bases

NSX has two distinct product lines:

  • NSX‑V → tightly integrated with vSphere, dependent on vCenter. Released in 2012 after VMware’s Nicira acquisition.
  • NSX‑T → built from scratch as a multi‑hypervisor, cloud‑agnostic SDN platform. Designed for Kubernetes, public cloud, and heterogeneous environments.

They share the same vision but not the same code. VMware never merged them — instead, NSX‑V was deprecated and all customers were directed to NSX‑T as the strategic platform.

NSX‑T and NSX‑V: Architecture Comparison

NSX‑V Architecture: vSphere‑Dependent and vCenter‑Tied

  • Manager → Single NSX‑V Manager bound one‑to‑one with vCenter.
  • Controllers → Three dedicated VMs for state management.
  • Management plane → Embedded in vCenter Web Client.
  • Overlay protocol → VXLAN (24‑bit segment ID, ~16M segments).
  • Routing → Centralized NSX Edge (north‑south), distributed logical router (east‑west).
  • Hypervisor support → ESXi only.
  • Deployment → ESXi VMs only, requires vCenter.
  • OS → VMware Photon OS.
  • Transport zone → Per‑vCenter, VXLAN‑based.

NSX‑T Architecture: Decoupled, Multi‑Platform, API‑First

  • Manager → Three‑node cluster (since 2.4, Manager + Controllers unified). Supports multiple vCenters simultaneously.
  • OS → Ubuntu.
  • No vCenter dependency → vCenter acts only as a compute manager.
  • Overlay protocol → GENEVE (extensible, carries metadata per packet).
  • Routing → Tier‑0 (provider/underlay) + Tier‑1 (tenant) two‑tier design for multi‑tenancy/cloud scale.
  • Hypervisor support → ESXi, KVM, bare metal, Kubernetes, OpenStack, Docker.
  • Controllers → Distributed within NSX Manager cluster, no separate controller VMs.

NSX-T vs NSX-V: Head-to-Head Feature Comparison

FeatureNSX-VNSX-T (NSX Data Center)
vCenter dependencyRequired (1:1 binding)Optional (compute manager only)
Multi-vCenter supportNo — one NSX Manager per vCenterYes — one NSX Manager for multiple vCenters
Hypervisor supportESXi onlyESXi, KVM, bare metal, containers
Kubernetes / containersNoYes (NSX Container Plugin, NCP)
Public cloud supportNoYes (AWS, Azure, GCP integration)
Overlay protocolVXLANGENEVE
Controller architectureSeparate 3-VM controller clusterUnified in NSX Manager (since 2.4)
Routing architectureTraditional (single-tier)Tier-0 / Tier-1 (multi-tenant two-tier)
Management UIvSphere Web Client integratedStandalone NSX Manager UI + API
API-first designNoYes (REST API, Terraform, Ansible)
Distributed FirewallYesYes (enhanced, multi-platform)
IDS/IPSNo (separate product)Yes (native, distributed)
Micro-segmentation scopeVMware VMs onlyVMs, containers, bare metal, multi-cloud
NSX Federation (multi-site)NoYes
NSX IntelligenceNoYes (flow visualization, policy recommendations)
VPN supportSSL VPN, IPsecRoute-based IPsec, L2 VPN
Load balancerFull (SSL terminate/proxy, HAproxy rules)Simplified (advanced requires Avi Networks)
Migration toolN/ABuilt-in NSX-V to NSX-T Migration Coordinator
End of supportJanuary 2022 (general), January 2023 (technical)Active — current product line
License keyShared with NSX-TSame license key as NSX-V

NSX‑T vs NSX‑V: Head‑to‑Head Feature Comparison

Overlay Encapsulation: VXLAN vs GENEVE

  • NSX‑V → VXLAN, 24‑bit segment ID (~16M segments).
  • NSX‑T → GENEVE, extensible header with variable‑length options, supports richer metadata.
  • Control plane → VXLAN fixed format; GENEVE leaves control plane flexible.
  • MTU requirement → Both need MTU 1600+ to handle encapsulation overhead.

Routing Architecture: Traditional vs Tier‑0/Tier‑1

  • NSX‑V → Single‑tier distributed routing, vSphere‑centric.
  • NSX‑T → Two‑tier model:
    • Tier‑0 → Provider‑managed, north‑south routing to physical underlay.
    • Tier‑1 → Tenant‑managed, east‑west routing between segments.
  • Benefit → Enables multi‑tenancy with strict routing isolation, critical for cloud providers and enterprises with departmental segmentation.

Security: Distributed Firewall Evolution

  • NSX‑V → DFW limited to VMware VMs on ESXi. IDS/IPS required third‑party tools.
  • NSX‑T → DFW extends to ESXi, KVM, containers, bare‑metal. Consistent policy across workloads.
  • Adds native IDS/IPS with virtual patching — detects vulnerability signatures without external appliances.

NSX‑V to NSX‑T Migration: The Mandatory Transition

Why NSX‑V to NSX‑T Migration Is No Longer Optional

  • End of Support → NSX‑V general support ended Jan 16, 2022; technical guidance ended Jan 16, 2023.
  • No patches or fixes → Running NSX‑V now means no security updates or bug fixes.
  • Compliance risk → Unsupported networking infrastructure in production is a liability.
  • Only path forward → NSX‑T is the sole supported option.

NSX‑T Migration Coordinator: The Built‑In Tool

  • Integrated into NSX Manager.
  • Migrates VXLAN → GENEVE segments.
  • Lifts NSX‑V firewall rules into NSX‑T policy.
  • Maps NSX‑V Edge → NSX‑T Tier‑0/Tier‑1 gateways.
  • Runs phased, rollback‑capable migrations after full environment assessment.

NSX‑V to NSX‑T Migration: Planning Steps

  • Phase 1 — Assessment → Inventory all NSX‑V constructs (switches, routers, Edge gateways, DFW rules, security groups).
  • Phase 2 — Parallel Deployment → Deploy NSX‑T Manager cluster, add vCenter as compute manager, configure transport nodes separately. Phase 3 — Pilot Migration → Migrate non‑production workloads, validate routing, firewall, and connectivity.
  • Phase 4 — Production Migration → Use Migration Coordinator in phases; migrate Edge services last.
  • Phase 5 — Decommission NSX‑V → Uninstall from ESXi hosts, deregister NSX‑V Manager from vCenter.

NSX-V to NSX-T Migration: Key Technical Considerations

CauseSymptomFix
VMware Tools not installed / outdatedQuiesce checkbox grayed out or fails at runtimeInstall/update VMware Tools to 10.2+
VSS component missing from VMware ToolsSnapshot succeeds but no VSS writer dataReinstall VMware Tools with VSS component
Dynamic disks in Windows VMSilent VSS failure; empty vss_manifests.zipConvert to basic disks or exclude from quiescing
IDE disks presentApplication-consistent quiescing blockedMigrate disks to SCSI
disk.EnableUUID = false in VMXVSS runs but snapshot is not truly consistentSet disk.EnableUUID = true
Broken VSS inside guest OSAll quiesced snapshots failRun vssadmin list writers; repair or reboot VM
Pre-freeze script exits non-zeroQuiesced snapshot abortedFix script logic; check exit codes
Freeze timeout exceededSnapshot aborted after I/O hold limitIncrease VM resources (vCPU/RAM); reduce application load during backup window
Fault Tolerance enabledQuiescing incompatible with FTDisable FT or use crash-consistent backup

NSX‑T vs NSX: Current State of the NSX Portfolio

What “VMware NSX” Means Post‑Broadcom

  • Broadcom’s acquisition consolidated VMware’s catalog into subscription bundles.
  • NSX‑T is the current, supported release under the VMware NSX Data Center brand.
  • NSX‑V is fully deprecated and no longer in the active product catalog.
  • NSX is available either as a standalone per‑core subscription or bundled within VMware Cloud Foundation (VCF).
  • In 2025, evaluating “NSX‑T vs NSX” effectively means choosing between NSX Data Center (successor to NSX‑T) and alternative SDN platforms — NSX‑V is no longer viable.

VMFS, VMDK, and Data Recovery in NSX Environments

How NSX Migrations Create VM Data Risk

  • Both NSX‑V and NSX‑T run VMs on VMFS datastores with VMDK disk images.
  • During NSX‑V → NSX‑T migration, ESXi hosts reboot to install NSX‑T kernel modules.
  • Normally non‑disruptive (vMotion evacuates VMs), but misconfigured vMotion networks can fail mid‑transfer.
  • Result → VM left in inconsistent state across two hosts.
  • Concurrent datastore access with conflicting NSX configs can trigger VMFS locking conflicts, risking metadata corruption.

Recovering VM Data After NSX Migration Failures with DiskInternals VMFS Recovery™

DiskInternals VMFS Recovery™ provides the recovery path when VMFS corruption or locking occurs:

  • Mounts VMDKs without a running ESXi host.
  • Reconstructs VMFS volumes with damaged metadata.
  • Recovers orphaned VMX configuration files mid‑migration.
  • Connects directly to ESXi hosts via IP/credentials for remote datastore scanning.

Workflow:

  1. 1. Connect to affected VMFS volume.
  2. 2. Run full scan.
  3. 3. Locate VMX and VMDK files in recovery browser.
  4. 4. Preview file integrity.
  5. 5. Extract to safe destination for re‑registration.

Ready to get your data back?

To start recovering your data, documents, databases, images, videos, and other files, press the FREE DOWNLOAD button below to get the latest version of DiskInternals VMFS Recovery® and begin the step-by-step recovery process. You can preview all recovered files absolutely for FREE. To check the current prices, please press the Get Prices button. If you need any assistance, please feel free to contact Technical Support. The team is here to help you get your data back!

FAQ

  • Is NSX-V still supported?

    No. NSX-V reached end of general support on January 16, 2022, and end of technical guidance on January 16, 2023. Running NSX-V in production environments provides no security patches, no bug fixes, and no VMware support.
  • Can I use my NSX-V license for NSX-T?

    Yes. VMware uses the same license key for both NSX-V and NSX-T. An existing NSX-V license key works in NSX-T without conversion.
  • What replaced NSX-V?

    NSX-T Data Center, now branded VMware NSX Data Center under Broadcom, is the official replacement. VMware provides the Migration Coordinator tool within NSX-T to assist with the transition.
  • Does NSX-T require vCenter?

    No. vCenter is optional in NSX-T — it functions as a compute manager but is not a management dependency. NSX-T can be deployed without vCenter, using ESXi hosts directly as transport nodes.
  • What is the difference between VXLAN (NSX-V) and GENEVE (NSX-T)?

    • VXLAN, used in NSX‑V, is a fixed‑format overlay protocol with a 24‑bit segment ID supporting up to 16 million logical networks.
    • GENEVE, used in NSX‑T, is more flexible — it allows variable‑length options in the header to carry extra metadata per packet.
    • VXLAN’s design is rigid, while GENEVE is defined only as an encapsulation format, leaving the control plane free to evolve.
    • Both require MTU 1600+ to handle encapsulation overhead beyond standard 1500‑byte frames.
    • In practice, VXLAN is simpler and vSphere‑bound, while GENEVE enables NSX‑T to scale across multi‑cloud and containerized environments.
  • How long does NSX-V to NSX-T migration take?

    • The timeline depends heavily on environment size and complexity — small clusters can migrate in days, while large enterprise deployments may take weeks.
    • The assessment phase (inventorying NSX‑V constructs) usually takes the longest, as accuracy here prevents rollback later.
    • Parallel deployment and pilot migration can be completed in a few days if resources are available.
    • Production migration is phased, often scheduled over multiple maintenance windows to minimize disruption.
    • In practice, most organizations plan for several weeks end‑to‑end, with downtime minimized by vMotion and rollback options in the Migration Coordinator.
  • Can I migrate from NSX-T back to NSX-V?

    No. Migration is one-directional only — NSX-V to NSX-T. There is no rollback path from NSX-T to NSX-V, and NSX-V is end-of-life.

Related articles

FREE DOWNLOADVer 4.26, WinBUY NOWFrom $699

Please rate this article.
51 reviews