Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying VMware NSX Cookbook
  • Table Of Contents Toc
  • Feedback & Rating feedback
VMware NSX Cookbook

VMware NSX Cookbook

By : Bayu Wibowo, Tony Sangha
5 (4)
close
close
VMware NSX Cookbook

VMware NSX Cookbook

5 (4)
By: Bayu Wibowo, Tony Sangha

Overview of this book

This book begins with a brief introduction to VMware's NSX for vSphere Network Virtualization solutions and how to deploy and configure NSX components and features such as Logical Switching, Logical Routing, layer 2 bridging and the Edge Services Gateway. Moving on to security, the book shows you how to enable micro-segmentation through NSX Distributed Firewall and Identity Firewall and how to do service insertion via network and guest introspection. After covering all the feature configurations for single-site deployment, the focus then shifts to multi-site setups using Cross-vCenter NSX. Next, the book covers management, backing up and restoring, upgrading, and monitoring using built-in NSX features such as Flow Monitoring, Traceflow, Application Rule Manager, and Endpoint Monitoring. Towards the end, you will explore how to leverage VMware NSX REST API using various tools from Python to VMware vRealize Orchestrator.
Table of Contents (14 chapters)
close
close

Creating Security Policy Rules from the Service Composer menu


In the previous recipe, we created DFW rules using the Firewall Table menu, which is more suitable for static environments. In this recipe, we will create security policy rules from Service Composer, which is more suitable for the application-based policies approach.

Getting ready

In the Service Composer, a security group of what we want to protect must be created first, then a security policy can be created and applied to that security group. In our example, we need to create three security groups and three security policies: one for the Web tier, one for the App tier, and one for the DB tier.

How to do it...

In this recipe, we will create the security group from Service Composer using various methods, and then create a security policy utilizing the newly-created security groups.

Creating a Security Group using Static Inclusion

In this section, we will create a security group, SG-DB-Tier, for the database VM and use static membership...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech

Create a Note

Modal Close icon
You need to login to use this feature.
notes
bookmark search playlist download font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Delete Note

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Edit Note

Modal Close icon
Write a note (max 255 characters)
Cancel
Update Note

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY