Keeping Travelers on the Move With NSX -VMware Radius
Keeping Travelers on the Move With NSX
Amadeus provides solutions to the travel industry, from airlines and hotels to railways and cruise lines, with help from VMware NSX.
Keeping Travelers on the Move With NSX -VMware Radius
Amadeus provides solutions to the travel industry, from airlines and hotels to railways and cruise lines, with help from VMware NSX.
Two vCPU NSX controller for lab environment -VMGuru
When installing NSX in a environment, you will at some point need to deploy NSX controllers. By default these controllers are equiped with four vCPU’s, which is fine for a production environment. Butif you want to play around withNSX in a lab environment like I wanted to, then you might not have the hardware (in my case 1 CPU, 2 cores) to support those four vCPU’s. In this article I will describe how I managed to deploy a two vCPU NSX controller for lab environment. Before we start I need to…Read More
2016 Network Virtualization and SDN Controllers Report -SDxCentral
Comprehensive overview of 2016 Network Virtualization and SDN Controller products from Ericsson, HPE, Huawei, Juniper, Sonus and Tempered Networks.
NSX SpoofGuard Automatic Approvals through your IPAM -VMGuru
VMware NSX provides a (heavily underestimated) SpoofGuard functionality, which prevents virtual machines to use IP addresses that are not approved by the network engineers. It guards for, guess what,
East-West Encryption: The Next Security Frontier? -SDxCentral
VMware says it is looking at East-West encryption inside the data center, adding another layer of security to the SDDC.
How to change logging level in NSX -wojcieh.net
Troubleshooting issues aren’t always fun and easy way to do. Especially in complex environments where multiple issues might occur at the same time. Having a way to easily find root cause is crucial. Today I will show you how to change logging level in NSX and its components.
Learning NSX-Part-7-Distributed Logical Router Tidbits -Virtual Reality
In last post of this series we discussed about Logical Switching and understood when do we use logical switching. Also we deployed our first logical switch and moved a VM over to the newly created switch. In this post we … Continue reading →
Set Edge Default Route / Default Gateway using vRealize Orchestrator -Jeff’s VirtualDataCave
As part of some workflow I am building for a customer, I needto automate assigning the default route (default gateway) for an vCNS Edge appliance, using vRealize Orchestrator. Problem The provided NSXDefaultRoute, which can be used with NSXEdgeManager.setDefaultRoute() per the documentation, has read only properties and the NSX Orchestrator Plugin 1.0.4 provides no further […]]> Scenario As part of some workflow I am building for a customer, I needto automate assigning the default…Read More
[Watch] NSX Series 02 – Microsegmentation in a single DC
This is the second of a series of 5 demos that show how the NSX Security Model works through several use cases. Don’t just believe what you see, try it yourself for free with VMware Hands-On-Labs (see below): HOL-SDC-1603 VMware NSX Introduction http://labs.hol.vmware.com/HOL/catalogs/lab/2125 HOL-SDC-1625 VMware NSX Advanced http://labs.hol.vmware.com/HOL/catalogs/lab/2102 .
[Watch] NSX Series 01 – DFW Overview
This is the first of a series of 5 demos that show how the NSX Security Model works through several use cases. Don’t just believe what you see, try it yourself for free with VMware Hands-On-Labs (see below): HOL-SDC-1603 VMware NSX Introduction http://labs.hol.vmware.com/HOL/catalogs/lab/2125 HOL-SDC-1625 VMware NSX Advanced http://labs.hol.vmware.com/HOL/catalogs/lab/2102 .
Protecting Citizen Data with VMware NSX and Horizon in a Zero Trust Environment
Jefferson County (Jeffco) is modernizing and automating its infrastructure and is PCI compliant. Within its SDDC environment, Jeffco is developing a Zero Trust model of security. Quickly self-deploying VMware NSX for micro-segmentation and multi-tenancy, Jeffco is also protecting more of its citizen data soon through its secure user, Horizon and NSX, solution for virtual desktops.
How VMware’s cross-cloud NSX will work -Network World
VMware this week announced plans to extend NSX, its software defined networking product, to public IaaS cloud computing platforms, allowing customers to manage multiple cloud environments with a single network management portal. But how will it work?
“NSX Reference Poster” via justait.net
During the past few weeks, my NSX partner in crime, the Sr. Consultant Anderson Duboc and I have been working on a NSX Reference Poster …Read More
“Configure EMCP on VMware NSX” via letsv4real.com
In this post we will be deploying an additional Edge Services Gateway (ESG) so that we can take advantage of Equal-Cost Multipath (ECMP) from the distributed logical router to the ESG. The advantage of using ECMP is that you can split the traffic from VMs evenly between the ESGs and have multiple bidirectional links. Let’s…Read More
Opinion – NSX’s tipping point, aka, it’s first “vMotion” — via Virtualize the Net
As I study for my VCP6-NV (6.2) beta exam and I read Elver’s excellent book, my thoughts wander off to the VMworld 2016 vExpert party and Pat Gelsinger explaining that he thought NSX hadn’t reached it’s big “oh wow!” moment yet – like when you showed someone a vSphere vMotion for the first time.
“Multi-site with Cross-VC NSX and Palo Alto Networks Security” via vpierre.it
In a prior post, Multi-site with Cross-VC NSX: Consistent Security and Micro-segmentation Across Sites, we discussed how Cross-VC NSX provides micro-segmentation and consistent security across multiple sites. We looked at five reasons to seriously consider Cross-VC NSX for a multi-site solution in terms of security alone: centralized management, consistent security across vCenter domains/sites, security policies follow the workload(s), ease of security automation across vCenter domains/sites, and enhanced disaster recovery use case. In this post, we’ll discuss how advanced third party security services can also be leveraged in a Cross-VC NSX environment.
“Replace NSX Manager SSL Certificate” via Virtualising Middle Earth
This process was used to replace the self-signed certificate on NSX Manager 6.2 with a Certificate Authority (CA) signed certificate. I have a Microsoft Windows 2012 R2 Root CA already in-place. You need to create a customised vSphere 6.0 CA template prior to submitting the Certificate Signing Request (CSR) created on the NSX Manager. Follow…Read More
Multi-site with Cross-VC NSX and Palo Alto Networks Security
A demo showing how a multi-site Cross-VC NSX can be used with third party security services; an example is demonstrated using Palo Alto Networks. Cross-VC NSX provide for consistent security across multiple vCenter domains and sites with Universal Distributed Firewall. Further, third party security services such as Palo Alto Networks can be leveraged for Application/L7-level security.
“Learning NSX-Part-6-Logical Switching and Transport Zones” via Virtual Reality
In last post of this series we briefly looked what is VXLAN (In actual it’s an ocean of knowledge in itself) and also we configured VXLAN on our cluster/hosts. In this post we will be talking about Logical switching and … Continue reading →
“Restoring NSX from Old Backup – With Control VM” via Elver’s Opinion
Ok, yesterday I posted Restoring NSX from Old Backup – Impact on Distributed Network where restore. 5 sigma is probably not as good as 6 sigma (whatever that is) so this post is with its Control VM. That’s right, his diagram is the same diagram from yesterday, with no Control VM. That’s because the logical diagram depicts the Data Plane, not the Control Plane (gotcha). However, the Control VM does have a connection for its HA interface (formerly known as Management Interface), which I dropped…Read More