This document provides an overview of VMware NSX for vSphere and its use cases. It discusses how NSX addresses barriers to creating a software defined data center by providing network virtualization. It allows network provisioning in seconds, increased compute utilization up to 90%, and cost savings up to 80%. Use cases described include deploying applications from a cloud management platform within logical networks with isolation and micro-segmentation for improved network security.
Balaji Parimi VMware R&D describes best practices when using the vSphere APIs. The VMware vSphere APIs can be used to build VMware vSphere management solutions. Virtual Machines, Host Management, Performance Monitoring. To learn more visit our community. http://developer.vmware.com
Balaji Parimi VMware R&D describes best practices when using the vSphere APIs. The VMware vSphere APIs can be used to build VMware vSphere management solutions. Virtual Machines, Host Management, Performance Monitoring. To learn more visit our community. http://developer.vmware.com
Whether you are migrating from Citrix XenApp 4.5 to 6.5 or from 6.5 to 7.5, or you are virtualizing your desktops as part of your Windows XP to Windows 7/8 migration project, performance is a key priority. Users will expect the same or better performance after the migration as they had before the migration. When performance problems occur, the migration is always blamed first!
Join this webinar to learn about the latest best practices and secrets for making your Citrix and desktop migrations successful. Performance management experts Dennis Callaghan (Senior Analyst, 451 Research), Rick Ruskin (Vice President, VDX) and Bala Vaidhinathan (CTO, eG Innovations) will discuss how to:
- Transform your Citrix and desktop environments successfully without project delays or cost overruns
- Deliver superior end-user experience, simplify management, and reduce cost - before, during and after migration
- Assure user satisfaction by pre-emptively detecting and resolving performance issues - before users are impacted
- Utilize next-gen management solutions to accelerate troubleshooting and identify the true root-cause of problems (is it the Network? Database? Application? Citrix? Virtual platform? Storage?)
- Ensure maximum ROI by right-sizing IT infrastructure using powerful analytics & reporting
VMware Outlines Its Own Journey to the CloudVMware
See how VMware, pioneers of the software-defined data center, are implementing their own IT transformation to take advantage of the benefits provided by an SDDC architecture.
DevOps is where you get to practically implement your software coding capabilities with the knowledge of IT operations and bring out the best in problem-solving tactics to help your organization
Azure Devops provides a set of cloud DevOps services that allow enterprises to deliver business outcomes, from an idea to production-level code. Azure Devops works for any language, any cloud, and any platform.
[오픈소스컨설팅]클라우드기반U2L마이그레이션 전략 및 고려사항Ji-Woong Choi
Cloud 기반으로 U2C(Unix to Cloud),U2L(Unix to Linux) 마이그레이션에 대한 가이드 라인과 사이징 관련 고려 사항에 대해 설명한 자료입니다.
많은 전환 프로젝트에서 추출된 경험치가 들어가 있으며, 전환별 난이도 및 고려사항이 들어가 있습니다.
YouTube Link: https://youtu.be/8sFTdzz55KU
** Cloud Certification Training: https://www.edureka.co/cloud-computing-certification-courses **
This Edureka ”Azure Pipelines” session will give you a complete walkthrough to Microsoft Azure Pipelines and introduce to Agile Development on Azure Cloud platform.
Following are the offerings of this PPT:
What is Azure DevOps?
Azure DevOps Services
What is Azure Pipelines
Demo: Azure Pipelines Walkthrough
Follow us to never miss an update in the future.
YouTube: https://www.youtube.com/user/edurekaIN
Instagram: https://www.instagram.com/edureka_learning/
Facebook: https://www.facebook.com/edurekaIN/
Twitter: https://twitter.com/edurekain
LinkedIn: https://www.linkedin.com/company/edureka
Castbox: https://castbox.fm/networks/505?country=in
Introduction to DevOps covering:
- Why DevOps
- How to build DevOps Teams in your organization
- Cloud Tools you can use for DevOps (Azure and AWS)
- Legacy Software and DevOps
- What is the Future of DevOps
- People to Follow
Whether you are migrating from Citrix XenApp 4.5 to 6.5 or from 6.5 to 7.5, or you are virtualizing your desktops as part of your Windows XP to Windows 7/8 migration project, performance is a key priority. Users will expect the same or better performance after the migration as they had before the migration. When performance problems occur, the migration is always blamed first!
Join this webinar to learn about the latest best practices and secrets for making your Citrix and desktop migrations successful. Performance management experts Dennis Callaghan (Senior Analyst, 451 Research), Rick Ruskin (Vice President, VDX) and Bala Vaidhinathan (CTO, eG Innovations) will discuss how to:
- Transform your Citrix and desktop environments successfully without project delays or cost overruns
- Deliver superior end-user experience, simplify management, and reduce cost - before, during and after migration
- Assure user satisfaction by pre-emptively detecting and resolving performance issues - before users are impacted
- Utilize next-gen management solutions to accelerate troubleshooting and identify the true root-cause of problems (is it the Network? Database? Application? Citrix? Virtual platform? Storage?)
- Ensure maximum ROI by right-sizing IT infrastructure using powerful analytics & reporting
VMware Outlines Its Own Journey to the CloudVMware
See how VMware, pioneers of the software-defined data center, are implementing their own IT transformation to take advantage of the benefits provided by an SDDC architecture.
DevOps is where you get to practically implement your software coding capabilities with the knowledge of IT operations and bring out the best in problem-solving tactics to help your organization
Azure Devops provides a set of cloud DevOps services that allow enterprises to deliver business outcomes, from an idea to production-level code. Azure Devops works for any language, any cloud, and any platform.
[오픈소스컨설팅]클라우드기반U2L마이그레이션 전략 및 고려사항Ji-Woong Choi
Cloud 기반으로 U2C(Unix to Cloud),U2L(Unix to Linux) 마이그레이션에 대한 가이드 라인과 사이징 관련 고려 사항에 대해 설명한 자료입니다.
많은 전환 프로젝트에서 추출된 경험치가 들어가 있으며, 전환별 난이도 및 고려사항이 들어가 있습니다.
YouTube Link: https://youtu.be/8sFTdzz55KU
** Cloud Certification Training: https://www.edureka.co/cloud-computing-certification-courses **
This Edureka ”Azure Pipelines” session will give you a complete walkthrough to Microsoft Azure Pipelines and introduce to Agile Development on Azure Cloud platform.
Following are the offerings of this PPT:
What is Azure DevOps?
Azure DevOps Services
What is Azure Pipelines
Demo: Azure Pipelines Walkthrough
Follow us to never miss an update in the future.
YouTube: https://www.youtube.com/user/edurekaIN
Instagram: https://www.instagram.com/edureka_learning/
Facebook: https://www.facebook.com/edurekaIN/
Twitter: https://twitter.com/edurekain
LinkedIn: https://www.linkedin.com/company/edureka
Castbox: https://castbox.fm/networks/505?country=in
Introduction to DevOps covering:
- Why DevOps
- How to build DevOps Teams in your organization
- Cloud Tools you can use for DevOps (Azure and AWS)
- Legacy Software and DevOps
- What is the Future of DevOps
- People to Follow
Get a technical understanding of the components of NSX, including how switching, routing, firewalling, load-balancing and other services work within NSX.
The Future of Cloud Networking is VMware NSXScott Lowe
This presentation was first given at Varrow Madness 2014 and discusses the need for a solution specifically designed (like VMware NSX) for cloud networking
Software Defined Networking (SDN) with VMware NSXZivaro Inc
Combining SDN with VMware’s NSX can accelerate application deployment and delivery in a secure and virtualized network. No longer will your network create a bottleneck when trying to administer new applications. Key topics include:
- How SDN allows for innovative ways to use a virtualized network
- Why SDN creates greater span of control, network analytics and response
- What intelligence can be gained from a global view of the network
- How SDN and NSX together allow IT to treat their physical network as a pool of transport capacity that can be consumed and repurposed on demand
From: "Software Defined Networking for NSX" webinar presented by Scott Hogg of GTRI and Hunter Hansen of VMware on February 3, 2016. Webinar recording: https://youtu.be/t_3DpN3nIXQ
Diseño de centros de computo multi sitio con vmware NSX - vforum 2014Wetcom
Consideraciones y mejores prácticas en el diseño de centros de cómputo multi-sitio utilizando vmware NSX para la virtualización de las redes o SDN.
Presentación realizada por Diego Quintana, Nicolás Solop y Pablo Scheri durante el vmware vforum 2014 en Buenos Aires.
VMware NSX + Cumulus Networks: Software Defined NetworkingCumulus Networks
Witness the enablement of a true integration of a virtual network platform and an underlay physical network for a scalable data center orchestration, automation and multi-tenancy solution over high-capacity IP fabrics. With the integration of VMware NSX Layer 2 gateway services on networking hardware running Cumulus Linux, customers can now connect virtual workloads to physical workloads with no performance impact.
Tomáš Michaeli, VMware
Juniper Day, Praha, 13.5.2015
Jestliže SlideShare nezobrazí prezentaci korektně, můžete si ji stáhnout ve formátu .ppsx nebo .pdf (kliknutím na tlačitko v dolní liště snímků).
My view on VMware approach to Hybrid- and Software-Defined Infrastructure: NSX, Hybrid Cloud and OpenStack. Get the agility of a startup with the guarantees of Enterprise-class IT. Session delivered at asLAN Congress 2015 in Madrid on April 15th.
Marek Bražina, Senior Systems Engineer, VMware
Virtualization Forum 2014, Prague, 22.10.2014
Jestliže SlideShare nezobrazí prezentaci korektně, můžete si ji stáhnout ve formátu .ppsx nebo .pdf (kliknutím na tlačitko v dolní liště snímků).
VMworld 2013: Case Study: VMware vCloud Ecosystem Framework for Network and S...VMworld
VMworld 2013
David Hughes, Silver Peak
Terry Lyons, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...Jürgen Ambrosi
La piattaforma di virtualizzazione NSX sta già aiutando centinaia di clienti a sfruttare tutte le potenzialità di un Software-Defined Data Center. NSX sposta la rete nel software, creando livelli di flessibilità mai raggiunti prima d'ora. In altre parole, trasforma il modello operativo della rete deldata center così come la virtualizzazione del server ha fatto 10 anni fa. NSX inoltre integra la sicurezza con policy granulari e automatizzate legate alle macchine virtuali, funzionalità chiamata micro-segmentazione, che consente di ridurre in modo significativo la diffusione delle minacce. Rendendo la micro-segmentazione della rete possibile dal punto di vista operativo, NSX introduce un modello di sicurezza di livello superiore, impossibile da realizzare con tecniche tradizionali. Questa sessione da l’opportunità di approfondire il tema della virtualizzazione della rete possibile con VMware NSX, evidenziandone i benefici: riduzione dei tempi di provisioning, semplificazione del delivery dei servizi di rete, incremento della sicurezza con la micro-segmentazione.
VMworld 2013
Jerry Breaud, VMware
Allen Shortnacy, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...VMworld
VMworld 2013
Shubha Bheemarao, VMware
Bruno Germain, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
New Threats, New Approaches in Modern Data CentersIben Rodriguez
New Threats, New Approaches in Modern Data Centers - A Presentation by NPS at CENIC conference 11:00 am - 12:00 pm, Wednesday, March 22, 2017 – in San Diego, California
The standard approach to securing data centers has historically emphasized strong perimeter protection to keep threats on the outside of the network. However, this model is ineffective for handling new types of threats—including advanced persistent threats, insider threats, and coordinated attacks. A better model for data center security is needed: one that assumes threats can be anywhere and probably are everywhere and then, through automation, acts accordingly. Using micro-segmentation, fine-grained network controls enable unit-level trust, and flexible security policies can be applied all the way down to a network interface. In this joint presentation between customer, partner, and VMware, the fundamental tenants of micro-segmentation will be discussed. Presenters will describe how the Naval Postgraduate School has incorporated these principles into the architecture and design of a multi-tenant Cybersecurity Lab environment to deliver security training to national and international government personnel.
Edgar Mendoza, IT Specialist, Information Technology and Communications Services (ITACS) Naval Postgraduate School
Eldor Magat, Computer Specialist, ITACS, Naval Postgraduate School
Mike Monahan, Network Engineer, ITACS, Naval Postgraduate School
Iben Rodriguez, Brocade Resident SDN Delivery Consultant, ITACS, Naval Postgraduate School
Brian Recore, NSX Systems Engineer, VMware, Inc.
https://youtu.be/mYBbIbfKkGU?t=1h7m16s
Copied from the program with corrections - https://adobeindd.com/view/publications/b9fbbdf0-60f1-41dc-8654-3d2141b0bf54/nh4h/publication-web-resources/pdf/Conference_Agenda_2017_v1.pdf
GET THE ORIGINAL: https://onecloud.vmware.com/wp-content/uploads/8/sites/8/2015/02/0218_Admin_NSX_Schematic.pdf?elqID=CVMWR000037077188&cid=70180000000NktD&src=socialmedia_15Q1_vmw28days_US_28_og_LI
GET YOUR COPY: https://onecloud.vmware.com/wp-content/uploads/8/sites/8/2015/02/0217_Admin_NSX_Infographic.pdf?elqID=CVMWR000037077188&cid=70180000000NktD&src=socialmedia_15Q1_vmw28days_US_28_og_FB?cid=70180000000NktD&src=socialmedia_15Q1_vmw28days_US_28_og_ADV
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Essentials of Automations: Optimizing FME Workflows with Parameters
VMware NSX for vSphere - Intro and use cases
1. NSX for vSphere, intro and use cases
Oct 2014
Ángel Villar Garea
avillargarea@vmware.com
@AVillarGarea
2. DISCLAIMER
2
This is NOT VMware’s official documentation.
It is just my understanding of technology and products. Any inaccuracy or error you may
find it is only my responsibility and not VMware’s.
3. 3
The biggest industry transformation since
mainframe to client server computing?
4. What customers demand
Business/IT Execs
Speed and Agility
Secure Infrastructure
Time-to-Market
Competitive Advantage
4
IT Operations
Efficiency of change
IT Infrastructure & Security
Data Center Micro-segmentation
Scale-out DMZ
Network hardware choice
Compute capacity utilization
5. The Software Defined Data Center (SDDC)
Intelligence in Software
Operational Model of VM for Data Center
Automated Configuration & Management
Software
Data Center Virtualization Layer
Hardware Compute, Network and Storage Capacity
Pooled, Vendor Independent, Best Price/Performance Infrastructure
Simplified Configuration & Management
5
6. The Network Is a Barrier to Software Defined Data Center!!
Compute Virtualization Abstraction Layer
Physical
Infrastructure
Software Defined Data Center
• Provisioning is slow
• Placement is limited
• Mobility is limited
• Hardware dependent
• Operationally intensive
6
7. Physical
Infrastructure
• Provisioning is slow
• Placement is limited
• Mobility is limited
• Hardware dependent
• Operationally intensive
Introducing VMware NSX
L2 Switch Firewall
Network Virtualization with NSX
Operational model
of a VM
Sofare
• Programmatic provisioning
• Place any workload anywhere
• Move any workload anywhere
• Decoupled from hardware
• Operationally L3 Router Load Balancer efficient
7
9. VMware NSX – Networking & Security Capabilities
Any Application
(without modification)
Virtual Networks
Any Cloud Management Platform
VMware NSX Network Virtualization Platform
Logical
Firewall
Logical L2
Any Network Hardware
Logical
Load Balancer
Logical L3
Logical
VPN
Any Hypervisor
Logical Switching– Layer 2 over Layer 3, decoupled from
the physical network
Logical Routing– Routing between virtual networks without
exiting the software container
Logical Firewall – Distributed Firewall, Kernel Integrated,
High Performance
Logical Load Balancer – Application Load Balancing in
software
Logical VPN – Site-to-Site & Remote Access VPN in
software
NSX API – RESTful API for integration into any Cloud
Management Platform
Partner Eco-System
9
10. VMware NSX Transforms the Operational Model of the Network
Reduce network
provisioning time from days to
seconds
Network provisioning time reduced
from days to seconds
Cost Savings
Operational Automation
Simplified IP hardware
Reduce operational costs up to 80%
Increase compute asset utilization up
to 90%
Reduce hardware costs by 40-50%
Choice
Any hypervisor
Any CMP
with Partner
Any Hypervisor:
vSphere, KVM, Xen, Hyper-V
Any CMP:
vCAC, OpenStack
Any Network Hardware
Broad Partner Ecosystem
10
11. Gartner Data Center Networking Magic Quadrant 2014
11
“The
NSX
solu-on
should
be
considered
by
exis-ng
VMware
customers
as
a
way
of
providing
network
agility
and
reducing
network
opera3onal
challenges
within
the
data
center.”
Gartner
Data
Center
Networking
Magic
Quadrant,
April
24,
2014
13. Rack N’ Roll!!
13
Web
App
Database
Deploy Applications from CMP
VMs, Logical Networks and Security
Add Capacity on Demand
VM
VM
VM
VM
VM
VM
14. Virtual Networks are isolated from each other
(Overlapping IP Addresses)
Virtual Networks are isolated from underlying
physical network (IPv6 over IPv4)
Multitenancy – Complete Isolation
14
15. Problem – Data Center Network Security
Perimeter-centric network security has proven insufficient, and micro-segmentation is operationally infeasible
Internet Internet
Little or no
lateral controls
inside perimeter
Insufficient Operationally
Infeasible 15
16. Data Plane
Distributed switching, routing,
firewall
CONFIDENTIAL 16
Solution – Micro-segmentation with NSX
CONFIDENTIAL
Unit-level trust
Control Plane
NSX Manager
Physical workloads
and VLANS
§ Each hypervisor has its own
firewalling with flexible granularity:
entire data center down to the vNIC
REST API
§ Security is shrink-wrapped around
each workload
§ Faults and threats are contained with
micro-granularity
Management Plane
vCenter
17. Data Plane
Distributed switching, routing,
firewall
CONFIDENTIAL 17
Control Plane
NSX Manager
Physical workloads
and VLANS
REST API
Management Plane
vCenter
Central Management /
Distributed Control
§ Security policies are coordinated and
centralized
§ Security actions are orchestrated
centrally
§ Firewall policies are provisioned,
moved, and retired with their
associated workloads
Solution – Micro-segmentation with NSX
18. Segmentation with NSX
18
Traditional Data Center NSX Data Center
DMZ/Web VLAN
App VLAN
HR
Finance
Finance HR
Services/Management VLAN
DB VLAN
Services Mgmt
Finance HR
Perimeter
firewall
Inside firewall
Perimeter
firewall
DMZ/Web
App
DB
HR Group
Finance Group
DMZ/Web
App
DB
Services/Management
Group
Services Mgmt
NSX segmentation simplifies network security
§ Each VM can now be its own perimeter § Policies align with logical groups
§ Control communication within a single VLAN
19. Service Insertion Example – Palo Alto Networks Next Gen Firewall
Internet
Security Policy
Security Admin
Traffic
Steering
19
20. Automated Security in a Software Defined Data Center
Quarantine Vulnerable Systems until Remediated Security Group = Quarantine Zone!
Members = {Tag = ‘ANTI_VIRUS.VirusFound’, L2
Isolated Network} !
Policy Definition Security Group = Web Tier!
Standard Desktop VM Policy
þ Anti-Virus – Scan
Quarantined VM Policy
þ Firewall – Block all except security tools
þ Anti-Virus – Scan and remediate
20
23. More information
23
Description Link
VMware NSX web site http://www.vmware.com/products/nsx/
NSX and SDDC dedicated web site http://virtualizeyournetwork.com/
VMware NSX Twitter https://twitter.com/vmwarensx
Hands-on-Labs Networking http://labs.hol.vmware.com/HOL/catalogs/catalog/130
VMware NSX customer case – WestJet http://www.youtube.com/watch?v=3OsXGuZjxxY
VMware NSX customer case – Colt http://blogs.vmware.com/networkvirtualization/2014/08/vmware-nsx-customer-
story-colt-decreases-data-center-networking-complexity.html
VMware NSX customer case – NTT http://www.vmware.com/company/news/releases/vmw-ntt-netvirt-061013
Brad Hedlund on end-to-end visibility in VMware NSX http://www.youtube.com/watch?v=wRL47AmFAUU
VMware NSX and Splunk - Operational Visibility Across
Virtual and Physical Domains http://www.youtube.com/watch?v=PzMvQFeojCk