Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • VMware NSX Cookbook
  • Toc
  • feedback
VMware NSX Cookbook

VMware NSX Cookbook

By : Bayu Wibowo, Tony Sangha
5 (4)
close
VMware NSX Cookbook

VMware NSX Cookbook

5 (4)
By: Bayu Wibowo, Tony Sangha

Overview of this book

This book begins with a brief introduction to VMware's NSX for vSphere Network Virtualization solutions and how to deploy and configure NSX components and features such as Logical Switching, Logical Routing, layer 2 bridging and the Edge Services Gateway. Moving on to security, the book shows you how to enable micro-segmentation through NSX Distributed Firewall and Identity Firewall and how to do service insertion via network and guest introspection. After covering all the feature configurations for single-site deployment, the focus then shifts to multi-site setups using Cross-vCenter NSX. Next, the book covers management, backing up and restoring, upgrading, and monitoring using built-in NSX features such as Flow Monitoring, Traceflow, Application Rule Manager, and Endpoint Monitoring. Towards the end, you will explore how to leverage VMware NSX REST API using various tools from Python to VMware vRealize Orchestrator.
Table of Contents (14 chapters)
close

Introduction


VMware NSX has two types of firewall, namely the NSX Edge Firewall and the NSX Distributed Firewall(DFW). The Edge Firewall is optimized for north-south (client to server) traffic whereas the DFW is optimized for east-west (server-to-server) traffic:

In this chapter, we will be focusing on the NSX DFW. NSX DFW enables the creation of small segments (microsegments) in virtualized environments through VMware NSX DFW native technology as well as integration (service-chaining) with third-party vendors. The NSX DFW is implemented in the vSphere hypervisor, and rules are enforced on each virtual machine's network adapter or virtual Network Interface Card (vNIC) regardless of how the virtual machine is connected (VLAN or VXLAN) or where it resides.

Note

DFW functionality is independent of the network type whether it is on a VXLAN-backed PortGroup (logical switch) or a VLAN-backed PortGroup. Virtual machines must be connected to the vDS to use NSX services and features. The NSX DFW functionality...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech
bookmark search playlist download font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete