Customer interest is increasing well beyond just what our standalone products offer. In fact, customer don’t care about the products, they care about the solution. IaaS with SDN as a solution is extremely popular. Therefore, this is focused on joint solution of vRA, vRO, NSX-v and 3rd party options.
Self service it with v realizeautomation and nsxsolarisyougood
This document discusses using VMware's NSX and vRealize Automation (vRA) products to provide self-service IT capabilities. It outlines how NSX logical networking and security services like logical switches, firewalls, and load balancers can be dynamically configured and deployed through vRA blueprints and service catalogs. The document also covers updates in NSX and vRA integration in version 6.2, including network profiles, security groups, tags, and distributed logical routing support. Finally, it discusses considerations for deploying NSX with vRA and demonstrates the networking and security workflows.
VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...VMworld
This document provides an overview and agenda for a presentation on integrating VMware NSX and vCloud Automation Center. It discusses how the integration enables dynamic configuration and deployment of NSX logical networking and security services through vCloud Automation Center. Key features covered include network profiles for different application topologies, microsegmentation using security groups, applying firewall and security policies, and load balancing. The integration leverages the new NSX vCenter Orchestrator plugin to abstract workflows and make them more extensible.
The document discusses VMware NSX and its technical overview. It begins with defining what software defined networking means, including decoupling the control plane from the data plane. It then provides an agenda and overview of NSX architecture, including its components in the data plane, control plane, and management plane. Key features of NSX like logical switching, routing, and distributed firewalling are described.
VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...VMworld
VMworld 2013
Shubha Bheemarao, VMware
Bruno Germain, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMworld 2013: Virtualized Network Services Model with VMware NSX VMworld
This document summarizes a presentation about VMware's NSX virtualized networking solution. It introduces NSX Edge gateways which provide routing, firewalling, load balancing, and VPN services. It discusses how NSX addresses the needs of cloud computing through automation, standard hardware, and a single management plane. Example use cases are shown. Key features of the NSX Edge including scalable performance are outlined. The document also briefly discusses NSX operations and management tools, and its deployment on VMware vCloud Hybrid Service.
VMware NSX - Lessons Learned from real projectDavid Pasek
This document provides an overview and agenda for a presentation on implementing end-to-end quality of service (QoS) for VMware vSphere with NSX on Cisco UCS. It discusses the project requirements of guaranteeing network traffic for FCoE storage, vSphere management, vMotion and VM backups. It then presents three design options for implementing QoS by marking and prioritizing different classes of service on the virtual network interface cards, VMware distributed virtual switch port groups, Cisco UCS fabric interconnects and Nexus switches. The optimal solution must meet requirements within the constraints of the Cisco and VMware infrastructure components.
VMworld 2016: Advanced Network Services with NSXVMworld
NSX provides network virtualization and security services including distributed firewalling, load balancing, and VPN connectivity. It reproduces traditional network and security functions in software throughout the virtual infrastructure for improved performance, agility, and security compared to physical appliances. Over 1700 customers use NSX across various industries, with growth of 100% year-over-year. NSX services can be distributed across hypervisors for massive scalability. The platform also integrates with security and application delivery partners to enhance its native capabilities.
Self service it with v realizeautomation and nsxsolarisyougood
This document discusses using VMware's NSX and vRealize Automation (vRA) products to provide self-service IT capabilities. It outlines how NSX logical networking and security services like logical switches, firewalls, and load balancers can be dynamically configured and deployed through vRA blueprints and service catalogs. The document also covers updates in NSX and vRA integration in version 6.2, including network profiles, security groups, tags, and distributed logical routing support. Finally, it discusses considerations for deploying NSX with vRA and demonstrates the networking and security workflows.
VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...VMworld
This document provides an overview and agenda for a presentation on integrating VMware NSX and vCloud Automation Center. It discusses how the integration enables dynamic configuration and deployment of NSX logical networking and security services through vCloud Automation Center. Key features covered include network profiles for different application topologies, microsegmentation using security groups, applying firewall and security policies, and load balancing. The integration leverages the new NSX vCenter Orchestrator plugin to abstract workflows and make them more extensible.
The document discusses VMware NSX and its technical overview. It begins with defining what software defined networking means, including decoupling the control plane from the data plane. It then provides an agenda and overview of NSX architecture, including its components in the data plane, control plane, and management plane. Key features of NSX like logical switching, routing, and distributed firewalling are described.
VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...VMworld
VMworld 2013
Shubha Bheemarao, VMware
Bruno Germain, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMworld 2013: Virtualized Network Services Model with VMware NSX VMworld
This document summarizes a presentation about VMware's NSX virtualized networking solution. It introduces NSX Edge gateways which provide routing, firewalling, load balancing, and VPN services. It discusses how NSX addresses the needs of cloud computing through automation, standard hardware, and a single management plane. Example use cases are shown. Key features of the NSX Edge including scalable performance are outlined. The document also briefly discusses NSX operations and management tools, and its deployment on VMware vCloud Hybrid Service.
VMware NSX - Lessons Learned from real projectDavid Pasek
This document provides an overview and agenda for a presentation on implementing end-to-end quality of service (QoS) for VMware vSphere with NSX on Cisco UCS. It discusses the project requirements of guaranteeing network traffic for FCoE storage, vSphere management, vMotion and VM backups. It then presents three design options for implementing QoS by marking and prioritizing different classes of service on the virtual network interface cards, VMware distributed virtual switch port groups, Cisco UCS fabric interconnects and Nexus switches. The optimal solution must meet requirements within the constraints of the Cisco and VMware infrastructure components.
VMworld 2016: Advanced Network Services with NSXVMworld
NSX provides network virtualization and security services including distributed firewalling, load balancing, and VPN connectivity. It reproduces traditional network and security functions in software throughout the virtual infrastructure for improved performance, agility, and security compared to physical appliances. Over 1700 customers use NSX across various industries, with growth of 100% year-over-year. NSX services can be distributed across hypervisors for massive scalability. The platform also integrates with security and application delivery partners to enhance its native capabilities.
VMworld 2013: Operational Best Practices for NSX in VMware Environments VMworld
VMworld 2013
Ben Basler, VMware
Roberto Mari, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMworld Europe 2014: Advanced Network Services with NSXVMworld
This document provides an overview and agenda for a presentation on Network and Security services provided by VMware's NSX software-defined networking platform, including:
1. What network and security services are used by applications today.
2. Details on NSX firewalling, load balancing, and VPN services, including demos.
3. How NSX integrates with third-party security and load balancer vendors to enhance services.
VMworld 2016: How to Deploy VMware NSX with Cisco InfrastructureVMworld
This document provides an overview of how to deploy VMware NSX with Cisco infrastructure, including:
- NSX has minimal requirements of 1600 MTU and IP connectivity and is agnostic to the underlying network topology.
- When using Cisco Nexus switches, VLANs must be configured for various traffic types and SVIs created with consistent IP subnets. Jumbo MTU is required across all links.
- NSX is also compatible with Cisco ACI fabrics using Fabric Path or DFA topologies, with the VXLAN VLAN spanning multiple pods/clusters across the fabric.
VMworld 2013: VMware NSX Integration with OpenStack VMworld
VMworld 2013
Somik Behera, VMware
Mark McClain, DreamHost & OpenStack
Salvatore Orlando, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMworld 2013: Bringing Network Virtualization to VMware Environments with NSX VMworld
1. NSX brings network virtualization to VMware environments by providing scalable logical switching and distributed logical routing without dependency on physical network hardware or topology.
2. NSX has two consumption models - optimized for vSphere which leverages VMware infrastructure or as a multi-hypervisor, multi-cloud platform.
3. NSX deployment involves three simple steps - deploying the network infrastructure, deploying NSX manager and controllers, and consuming applications on the virtual networks.
The document discusses how NSX security services can automate security operations and policies across virtualized environments through features like distributed firewalling, guest introspection, security groups, and integration with third-party security services. It provides an overview of how NSX improves visibility, context, performance, and automation compared to traditional network and host-based security controls. Use cases demonstrated include optimized vulnerability management and context-based isolation in VDI environments.
Get a technical understanding of the components of NSX, including how switching, routing, firewalling, load-balancing and other services work within NSX.
Customers are using NSX to drive business benefits as show in the figure below. The main themes for NSX deployments are Security, IT automation and Application Continuity.
Figure 3: NSX Use Cases
• Security:
NSX can be used to create a secure infrastructure, which can create a zero-trust security model. Every virtualized workload can be protected with a full stateful firewall engine at a very granular level. Security can be based on constructs such as MAC, IP, ports, vCenter objects and tags, active directory groups, etc. Intelligent dynamic security grouping can drive the security posture within the infrastructure.
NSX can be used in conjunction with 3rd party security vendors such as Palo Alto Networks, Checkpoint, Fortinet, or McAffee to provide a complete DMZ like security solution within a cloud infrastructure.
NSX has been deployed widely to secure virtual desktops to secure some of the most vulnerable workloads, which reside in the data center to prohibit desktop-to-desktop hacking.
• Automation:
VMware NSX provides a full RESTful API to consume networking, security and services, which can be used to drive automation within the infrastructure. IT admins can reduce the tasks and cycles required to provision workloads within the datacenter using NSX.
NSX is integrated out of the box with automation tools such as vRealize automation, which can provide customers with a one-click deployment option for an entire application, which includes the compute, storage, network, security and L4-L7 services.
6
Developers can use NSX with the OpenStack platform. NSX provides a neutron plugin that can be used to deploy applications and topologies via OpenStack
• Application Continuity:
NSX provides a way to easily extend networking and security up to eight vCenters either within or across data center In conjunction with vSphere 6.0 customers can easily vMotion a virtual machine across long distances and NSX will ensure that the network is consistent across the sites and ensure that the firewall rules are consistent. This essentially maintains the same view across sites.
NSX Cross vCenter Networking can help build active – active data centers. Customers are using NSX today with VMware Site Recovery Manager to provide disaster recovery solutions. NSX can extend the network across data centers and even to the cloud to enable seamless networking and security.
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld
Iain Leiter from A.T. Still University discussed their organization's migration from a hardware-based firewall to NSX to improve performance and compliance. Some key advantages of NSX include distributed firewalling for high performance and scalability, pay-as-you-grow flexibility, and advanced security features like microsegmentation. Their deployment process involved installing NSX, defining security groups, building security policies using syslog data from "recon rules", and applying a common services policy. Discoveries included many backdoors, application architecture issues, and the security benefits of microsegmentation.
VMware NSX + Cumulus Networks: Software Defined NetworkingCumulus Networks
Witness the enablement of a true integration of a virtual network platform and an underlay physical network for a scalable data center orchestration, automation and multi-tenancy solution over high-capacity IP fabrics. With the integration of VMware NSX Layer 2 gateway services on networking hardware running Cumulus Linux, customers can now connect virtual workloads to physical workloads with no performance impact.
VMware NSX is a software-defined networking and security platform that delivers virtual network services like logical switches, routers, firewalls, and load balancers. It allows for the creation of isolated, software-based virtual networks independent of physical network hardware. NSX provides capabilities like network automation, security segmentation, and multi-tenancy that can be used for data center automation, rapid application deployment, and isolating development, test, and production environments.
VMware NSX provides the right abstraction—the virtual network—to enable operational change that addresses networking pain points and meets business needs. A virtual network must do more than provide connectivity - it must deliver virtual network services like routing, firewalling, and load balancing. It also decouples the network from physical hardware, allowing workloads to be placed and moved anywhere. This enables programmatic provisioning, placement of workloads anywhere, and mobility of workloads, addressing common challenges in software-defined data centers.
vVMworld 2013: Deploying, Troubleshooting, and Monitoring VMware NSX Distribu...VMworld
VMworld 2013
Srinivas Nimmagadda, VMware
Shadab Shah, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
This document discusses VMware NSX architecture and design. It provides an overview of NSX components like the NSX manager, controllers, distributed logical routing, and NSX edge services gateway. It also covers NSX design considerations such as transport zones, VTEPs, logical networks, and VDS configuration. The document emphasizes that NSX is agnostic to underlying network topology and flexible in its deployment.
My view on VMware approach to Hybrid- and Software-Defined Infrastructure: NSX, Hybrid Cloud and OpenStack. Get the agility of a startup with the guarantees of Enterprise-class IT. Session delivered at asLAN Congress 2015 in Madrid on April 15th.
Si fa presto a dire SDDC: come, quando e perché?Andrea Mauro
This document discusses the software-defined data center (SDDC) and provides an overview of what it is, its benefits, and how it can be implemented. Some key points:
- An SDDC abstracts all data center resources (compute, storage, networking) and automates management and provisioning through software. This allows for greater agility, flexibility and automation than traditional hardware-defined data centers.
- Benefits of an SDDC include scalability, simplicity, seamlessness and an "as a service" model. Virtualization is the foundation that enables the modern, cloud-based business world.
- There are two approaches to building an SDDC - building your own using individual
VMworld 2015: The Future of Network Virtualization with VMware NSXVMworld
Since launch, VMware has seen a steady expansion in the use cases that are addressed by network virtualization. So what is next for NSX and network virtualization? This session answers this question, taking a look at how NSX is expanding beyond a single data center. It also reviews the technical state of NSX and looks forward to where network virtualization will head in the coming years.
This document discusses deploying VMware NSX Network Virtualization. It covers:
1. The objectives are to learn about NSX deployments with multiple hypervisors, NSX components required, and packet flows in logical networks.
2. The NSX architecture includes features like logical switching, routing, firewall, load balancing and VPN. Key components are the NSX controller, vSwitch, logical switches and NSX gateway.
3. Deploying NSX involves building the physical infrastructure, preparing NSX including the controller and manager, and then consuming applications through the network API.
This document provides an overview and design guide for implementing VXLAN and vCNS networks. It begins with an introduction to VXLAN including competing solutions, why it was created, and current adoption status. It then discusses the key components needed for a VXLAN deployment including vCNS Edge, vSphere Distributed Switch, and VTEPs. The document reviews multicast configuration options and considerations, as well as high-level logical and physical deployment diagrams. It concludes with a discussion of VXLAN performance overhead and using VXLAN with HP Virtual Connect.
Understanding Virtual Networking in the Cloud - RightScale Compute 2013RightScale
The document discusses managing multi-cloud networking resources. It provides an overview of networking designs across different cloud providers like AWS, GCE, and CloudStack. It then summarizes RightScale's approach to providing unified abstractions for networking resources across multiple clouds. This includes creating common entities like networks, subnets, security groups, and handling inconsistent or missing resources through synthetic representations. The abstractions allow for consistent definition and management of infrastructure through a single API and user interface.
VMworld 2013: Operational Best Practices for NSX in VMware Environments VMworld
VMworld 2013
Ben Basler, VMware
Roberto Mari, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMworld Europe 2014: Advanced Network Services with NSXVMworld
This document provides an overview and agenda for a presentation on Network and Security services provided by VMware's NSX software-defined networking platform, including:
1. What network and security services are used by applications today.
2. Details on NSX firewalling, load balancing, and VPN services, including demos.
3. How NSX integrates with third-party security and load balancer vendors to enhance services.
VMworld 2016: How to Deploy VMware NSX with Cisco InfrastructureVMworld
This document provides an overview of how to deploy VMware NSX with Cisco infrastructure, including:
- NSX has minimal requirements of 1600 MTU and IP connectivity and is agnostic to the underlying network topology.
- When using Cisco Nexus switches, VLANs must be configured for various traffic types and SVIs created with consistent IP subnets. Jumbo MTU is required across all links.
- NSX is also compatible with Cisco ACI fabrics using Fabric Path or DFA topologies, with the VXLAN VLAN spanning multiple pods/clusters across the fabric.
VMworld 2013: VMware NSX Integration with OpenStack VMworld
VMworld 2013
Somik Behera, VMware
Mark McClain, DreamHost & OpenStack
Salvatore Orlando, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMworld 2013: Bringing Network Virtualization to VMware Environments with NSX VMworld
1. NSX brings network virtualization to VMware environments by providing scalable logical switching and distributed logical routing without dependency on physical network hardware or topology.
2. NSX has two consumption models - optimized for vSphere which leverages VMware infrastructure or as a multi-hypervisor, multi-cloud platform.
3. NSX deployment involves three simple steps - deploying the network infrastructure, deploying NSX manager and controllers, and consuming applications on the virtual networks.
The document discusses how NSX security services can automate security operations and policies across virtualized environments through features like distributed firewalling, guest introspection, security groups, and integration with third-party security services. It provides an overview of how NSX improves visibility, context, performance, and automation compared to traditional network and host-based security controls. Use cases demonstrated include optimized vulnerability management and context-based isolation in VDI environments.
Get a technical understanding of the components of NSX, including how switching, routing, firewalling, load-balancing and other services work within NSX.
Customers are using NSX to drive business benefits as show in the figure below. The main themes for NSX deployments are Security, IT automation and Application Continuity.
Figure 3: NSX Use Cases
• Security:
NSX can be used to create a secure infrastructure, which can create a zero-trust security model. Every virtualized workload can be protected with a full stateful firewall engine at a very granular level. Security can be based on constructs such as MAC, IP, ports, vCenter objects and tags, active directory groups, etc. Intelligent dynamic security grouping can drive the security posture within the infrastructure.
NSX can be used in conjunction with 3rd party security vendors such as Palo Alto Networks, Checkpoint, Fortinet, or McAffee to provide a complete DMZ like security solution within a cloud infrastructure.
NSX has been deployed widely to secure virtual desktops to secure some of the most vulnerable workloads, which reside in the data center to prohibit desktop-to-desktop hacking.
• Automation:
VMware NSX provides a full RESTful API to consume networking, security and services, which can be used to drive automation within the infrastructure. IT admins can reduce the tasks and cycles required to provision workloads within the datacenter using NSX.
NSX is integrated out of the box with automation tools such as vRealize automation, which can provide customers with a one-click deployment option for an entire application, which includes the compute, storage, network, security and L4-L7 services.
6
Developers can use NSX with the OpenStack platform. NSX provides a neutron plugin that can be used to deploy applications and topologies via OpenStack
• Application Continuity:
NSX provides a way to easily extend networking and security up to eight vCenters either within or across data center In conjunction with vSphere 6.0 customers can easily vMotion a virtual machine across long distances and NSX will ensure that the network is consistent across the sites and ensure that the firewall rules are consistent. This essentially maintains the same view across sites.
NSX Cross vCenter Networking can help build active – active data centers. Customers are using NSX today with VMware Site Recovery Manager to provide disaster recovery solutions. NSX can extend the network across data centers and even to the cloud to enable seamless networking and security.
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld
Iain Leiter from A.T. Still University discussed their organization's migration from a hardware-based firewall to NSX to improve performance and compliance. Some key advantages of NSX include distributed firewalling for high performance and scalability, pay-as-you-grow flexibility, and advanced security features like microsegmentation. Their deployment process involved installing NSX, defining security groups, building security policies using syslog data from "recon rules", and applying a common services policy. Discoveries included many backdoors, application architecture issues, and the security benefits of microsegmentation.
VMware NSX + Cumulus Networks: Software Defined NetworkingCumulus Networks
Witness the enablement of a true integration of a virtual network platform and an underlay physical network for a scalable data center orchestration, automation and multi-tenancy solution over high-capacity IP fabrics. With the integration of VMware NSX Layer 2 gateway services on networking hardware running Cumulus Linux, customers can now connect virtual workloads to physical workloads with no performance impact.
VMware NSX is a software-defined networking and security platform that delivers virtual network services like logical switches, routers, firewalls, and load balancers. It allows for the creation of isolated, software-based virtual networks independent of physical network hardware. NSX provides capabilities like network automation, security segmentation, and multi-tenancy that can be used for data center automation, rapid application deployment, and isolating development, test, and production environments.
VMware NSX provides the right abstraction—the virtual network—to enable operational change that addresses networking pain points and meets business needs. A virtual network must do more than provide connectivity - it must deliver virtual network services like routing, firewalling, and load balancing. It also decouples the network from physical hardware, allowing workloads to be placed and moved anywhere. This enables programmatic provisioning, placement of workloads anywhere, and mobility of workloads, addressing common challenges in software-defined data centers.
vVMworld 2013: Deploying, Troubleshooting, and Monitoring VMware NSX Distribu...VMworld
VMworld 2013
Srinivas Nimmagadda, VMware
Shadab Shah, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
This document discusses VMware NSX architecture and design. It provides an overview of NSX components like the NSX manager, controllers, distributed logical routing, and NSX edge services gateway. It also covers NSX design considerations such as transport zones, VTEPs, logical networks, and VDS configuration. The document emphasizes that NSX is agnostic to underlying network topology and flexible in its deployment.
My view on VMware approach to Hybrid- and Software-Defined Infrastructure: NSX, Hybrid Cloud and OpenStack. Get the agility of a startup with the guarantees of Enterprise-class IT. Session delivered at asLAN Congress 2015 in Madrid on April 15th.
Si fa presto a dire SDDC: come, quando e perché?Andrea Mauro
This document discusses the software-defined data center (SDDC) and provides an overview of what it is, its benefits, and how it can be implemented. Some key points:
- An SDDC abstracts all data center resources (compute, storage, networking) and automates management and provisioning through software. This allows for greater agility, flexibility and automation than traditional hardware-defined data centers.
- Benefits of an SDDC include scalability, simplicity, seamlessness and an "as a service" model. Virtualization is the foundation that enables the modern, cloud-based business world.
- There are two approaches to building an SDDC - building your own using individual
VMworld 2015: The Future of Network Virtualization with VMware NSXVMworld
Since launch, VMware has seen a steady expansion in the use cases that are addressed by network virtualization. So what is next for NSX and network virtualization? This session answers this question, taking a look at how NSX is expanding beyond a single data center. It also reviews the technical state of NSX and looks forward to where network virtualization will head in the coming years.
This document discusses deploying VMware NSX Network Virtualization. It covers:
1. The objectives are to learn about NSX deployments with multiple hypervisors, NSX components required, and packet flows in logical networks.
2. The NSX architecture includes features like logical switching, routing, firewall, load balancing and VPN. Key components are the NSX controller, vSwitch, logical switches and NSX gateway.
3. Deploying NSX involves building the physical infrastructure, preparing NSX including the controller and manager, and then consuming applications through the network API.
This document provides an overview and design guide for implementing VXLAN and vCNS networks. It begins with an introduction to VXLAN including competing solutions, why it was created, and current adoption status. It then discusses the key components needed for a VXLAN deployment including vCNS Edge, vSphere Distributed Switch, and VTEPs. The document reviews multicast configuration options and considerations, as well as high-level logical and physical deployment diagrams. It concludes with a discussion of VXLAN performance overhead and using VXLAN with HP Virtual Connect.
Understanding Virtual Networking in the Cloud - RightScale Compute 2013RightScale
The document discusses managing multi-cloud networking resources. It provides an overview of networking designs across different cloud providers like AWS, GCE, and CloudStack. It then summarizes RightScale's approach to providing unified abstractions for networking resources across multiple clouds. This includes creating common entities like networks, subnets, security groups, and handling inconsistent or missing resources through synthetic representations. The abstractions allow for consistent definition and management of infrastructure through a single API and user interface.
This document discusses Infrastructure as a Service (IaaS) and Software Defined Networking (SDN).
IaaS allows consumers to provision computing resources like servers, storage, and networking and deploy their own operating systems and applications. The consumer does not manage the underlying cloud infrastructure. SDN abstracts traditional network equipment by separating the control and data planes, using a centralized controller and open standards like OpenFlow. This allows network configuration through software instead of dedicated hardware. The document then provides examples of how IaaS resources and SDN architecture could be implemented in a cloud computing environment.
This document provides an agenda and overview of NSX and vRealize Automation integration capabilities. The agenda includes topics on NSX use cases with vRA, unified service delivery using the Converged Blueprint Designer, extensibility options, and a Q&A session. Key integration features covered are on-demand network and security provisioning, application-centric blueprints, infrastructure as code, and policy-driven lifecycle extensibility. Architectural considerations for deploying vRA in an HA configuration on NSX are also reviewed.
In order to meet the compute infrastructure requirements for the broad range of service consumers, a common framework is required around which infrastructure as a service can be defined, provisioned, monitored and managed. A common set of principles, metrics and architectural frameworks can be defined, resulting in consistent capabilities, service levels and service attributes across multiple providers, while still allowing the individual providers to innovate and differentiate. In this session ODCA representatives will outline the framework and some usage scenarios.
Cloud Networking is not Virtual Networking - London VMUG 20130425Greg Ferro
Talking how and why virtual networking that we use today is not suitable for use in Cloud deployments. First I talk about the gap between "server" & "networks", then discuss the problems of virtual networking that we use today. Then into using software appliances instead of physical devices by highlighting the good & bad.
Then a brief overview of Software Defined Networking and how it will impact Cloud Networking in the next two years,
Which cloud-based infrastructure service is right for you? CDW compares Microsoft Azure, HP Helion, VMware vCloud Air, IBM SoftLayer and Amazon Web Services.
This document provides an overview of SDN (Software Defined Networking) and OpenFlow. It discusses the drawbacks of traditional networks including proprietary hardware and software that limits innovation. SDN aims to address these issues by separating the control plane and data plane, running the control plane on commodity servers, and using OpenFlow as a standard interface. OpenFlow allows the control plane to program the flow tables in switches using a secure channel. This provides centralized control and programming of the network. The document then covers OpenFlow in more detail, including its architecture, protocol messages, flow table processing, and potential use cases like load balancing.
The Future of Cloud Networking is VMware NSXScott Lowe
This presentation was first given at Varrow Madness 2014 and discusses the need for a solution specifically designed (like VMware NSX) for cloud networking
SDN Basics – What You Need to Know about Software-Defined NetworkingSDxCentral
SDNUniversity™ is our exclusive educational series on software-defined networking (SDN) and network functions virtualization (NFV) designed to help you develop practical, real-world knowledge and skills. Take advantage of this opportunity to learn SDN basics through a free, interactive online training session featuring experts from SDNCentral and Computerlinks.
This document provides an overview of Software Defined Networking (SDN) and OpenFlow. It defines SDN as separating the control plane from the data plane, allowing for centralized control of network traffic and more flexible programming of network behavior. OpenFlow is introduced as an open standard protocol that allows programming of network forwarding behavior by defining flows through flow tables on switches. Key benefits of SDN like efficiency, agility, scale and innovation are discussed. Components of an OpenFlow network including controllers, switches, and the secure channel are also outlined.
Software-Defined Networking(SDN):A New Approach to NetworkingAnju Ann
This document provides an overview of Software-Defined Networking (SDN). It discusses how SDN decouples the network control plane from the forwarding plane, allowing for centralized control and programmability. The key components of the SDN architecture include OpenFlow switches, an SDN controller, and northbound and southbound APIs. OpenFlow is described as the primary southbound protocol, allowing the controller to program how packets are handled by switches. Example applications of SDN mentioned are network slicing and multi-tenancy in cloud computing. Challenges for SDN adoption are also noted.
Introduction to Software Defined Networking (SDN)rjain51
Class lecture by Prof. Raj Jain on Introduction to . The talk covers Origins of SDN, What is SDN?, Original Definition of SDN, What = Why We need SDN?, SDN Definition, XMPP, XMPP in Data Centers, Path Computation Element, PCE, Forwarding and Control Element, Sample ForCES Exchanges, Application Layer Traffic Optimization, ALTO, ALTO Extension, Current SDN Debate: What vs. How?, SDN Controller Functions, RESTful APIs, OSGi Framework, Open Daylight SDN Controller, OpenDaylight Tools, Affinity Metadata Service, SDN Related Organizations and Projects, SDN Web Sites, Hierarchy of Operations, Introduction to, Origins of SDN, What is SDN?, Original Definition of SDN, What = Why We need SDN?, SDN Definition, XMPP, XMPP in Data Centers, Path Computation Element, PCE, Forwarding and Control Element, Sample ForCES Exchanges, Application Layer Traffic Optimization, ALTO, ALTO Extension, Current SDN Debate: What vs. How?, SDN Controller Functions, RESTful APIs, OSGi Framework, Open Daylight SDN Controller, OpenDaylight Tools, Affinity Metadata Service, SDN Related Organizations and Projects, SDN Web Sites. Video recording available in YouTube.
Software-Defined Networking SDN - A Brief IntroductionJason TC HOU (侯宗成)
Internet Research Lab at NTU, Taiwan.
Software-Defined Networking overview and framework introduction. (ppt slide for download.) Comparing server virtualization and network virtualization, take Onix controller as an example. A quick view to LightRadio from Alcetel-Lucent.
This document discusses the limitations of existing networks and introduces the concept of software-defined networking (SDN) as a solution. It outlines that current networks have separate control and data planes, making them difficult to program and innovate on. SDN is proposed to separate the control and data planes, making the network programmable through open interfaces and allowing for centralized control. This enables experimentation, flexibility, and easier integration of new applications and services. The key aspects of SDN architecture include the infrastructure, control, and application layers that communicate through the OpenFlow protocol to enable remote programming of forwarding rules in switches.
VMworld 2013
Jerry Breaud, VMware
Allen Shortnacy, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
An introduction to the key concepts of SDN and NFV with visuals of:
- How SDN is transforming the Data Center
- How NFV is transforming the Service Provider domain and the End-customer domain
- Objectives
- Origin
- Ambassadors
- Applicability
- Analogies
- Benefits
- Industry Standards
- Drivers
- Obstacles
- Growth
- Resources and Events
This document provides an overview of VMware NSX for vSphere and its use cases. It discusses how NSX addresses barriers to creating a software defined data center by providing network virtualization. It allows network provisioning in seconds, increased compute utilization up to 90%, and cost savings up to 80%. Use cases described include deploying applications from a cloud management platform within logical networks with isolation and micro-segmentation for improved network security.
OVNC 2015-Software-Defined Networking: Where Are We Today?NAIM Networks, Inc.
[Open & Virtual Networking Conference 2015]
- Software-Defined Networking: Where Are We Today? (VMware Guido Appenzeller 네트워크 및 보안 부문 최고 기술전략책임자(CTSO))
- 2015.02.05 (목) 09:10~17:50
- 양재동 엘타워
SDN and NFV both aim to virtualize and commoditize network hardware to reduce costs and increase flexibility. SDN separates the control plane from the data plane to allow centralized control of network behavior via software. NFV virtualizes network functions like firewalls and load balancers that were traditionally hardware appliances. Both seek to standardize networking functions through open source projects and standards bodies like ONF for SDN and ETSI for NFV. Major implementations include OpenStack for virtual infrastructure, OpenDaylight as an SDN controller, and OpenFlow as the SDN protocol. While complementary, SDN and NFV face challenges around vendor support and complexity that could slow wide adoption.
SDN and NFV both aim to virtualize and commoditize network hardware to reduce costs and increase flexibility. SDN separates the control plane from the data plane to allow centralized programming of network behavior, while NFV virtualizes network functions that were traditionally hardware-based appliances. The two technologies complement each other and are being developed through open standards and open source projects to drive industry adoption. Major challenges include developing common frameworks and ensuring interoperability between solutions.
This document discusses simplifying security in the data center. It introduces concepts like micro-segmentation using Endpoint Groups (EPGs) in Cisco Application Centric Infrastructure (ACI) to isolate application traffic. It also discusses integrating ACI with Cisco TrustSec to apply common identity and security policies between the campus and data center domains. Finally, it demonstrates how the Cisco Firepower management center can be used to automate a security feedback loop, moving compromised endpoints to a quarantined EPG for remediation through REST API calls to ACI.
The document discusses embracing software-defined networking (SDN) in next-generation networks. It describes traditional distributed control plane architectures and centralized SDN control plane architectures. It also discusses hybrid control plane models that utilize aspects of both distributed and centralized control. The document provides examples of how SDN can be applied in different network domains including the data center, enterprise network, service provider wide-area network (WAN), and network functions virtualization (NFV).
This document provides a summary of announcements and updates from VMworld 2014, the largest virtualization and cloud global conference. It discusses VMware's vision for the Software Defined Data Center (SDDC) and highlights key technology announcements for various VMware products, including vRealize, NSX, OpenStack, and vCloud Automation Center. Hands-on labs and sessions are also referenced.
VMworld Recap summarizes announcements from VMworld including:
- Updates to vRealize Automation to simplify deployment, enhance authentication, and allow blueprint modeling with a graphical design canvas.
- vRealize Business improvements to provide single-pane-of-glass cost analysis across clouds and more granular cost reporting.
- New starter kits that bundle vRealize Suite licenses, professional services, and training to help customers automate cloud management.
The document provides an overview of new features in vRealize Automation 7.0, including:
1. Simplified deployment architecture with fewer virtual appliance components and services to manage.
2. Enhanced identity management (vIDM) with multi-domain and multi-tenant support, SAML token integration, and improved scalability.
3. Converged blueprint designer that unifies infrastructure and application blueprinting and enables software component libraries and multi-tier application authoring.
4. Integration with NSX for on-demand networking and security group configuration during application deployment.
5. LifeCycle extensibility framework that enables centralized policy-based triggering of third-party integr
This document provides an introduction and overview of VMware's NSX network virtualization platform. It begins with a disclaimer about features being under development. The agenda then covers an introduction to NSX, its momentum and use cases, new features in NSX 2014, and NSX operations. It demonstrates NSX's ability to provide network and security services in software and enable dynamic application topologies. It also discusses NSX components, deployments, partnerships, and upcoming training and certification opportunities.
Nuage Networks, A Policy Driven Approach to SDN - Interop Tokyo 2014Scott Sneddon
Nuage Networks' solution for a Policy Driven approach to Software Defined Networking. Including info on the OpenStack Group Based Policy Abstractions for Neutron. Keynote session, Interop Tokyo 2014
Cisco is developing solutions to deploy OpenStack using Cisco compute, network, and storage technologies. Cisco contributes code to OpenStack projects, provides automation tools for OpenStack deployment on UCS servers, and has plugins that integrate Cisco networking products like Nexus switches and the Nexus 1000V virtual switch with OpenStack. Cisco works with customers to implement OpenStack using best practices defined in Cisco "blueprints" and provides a unified management system for UCS blade and rack servers. The presentation demonstrates how ACI can simplify networking for OpenStack through its application-centric policy model and integration with Neutron.
Simplifying SDN Networking Across Private and Public Clouds5nine
This presentation everything you need to know about SDN architectures including the following topics:
- 5 Essential Elements of SDN architectures
- 6 Business benefits of software-defined network solutions
- Why software-defined networking is the future of legacy data centers
**Originally published here: https://info.5nine.com/webinar-sdn-management-and-security-best-practices
2011-11-03 Intelligence Community Cloud Users GroupShawn Wells
Hosted by TMA, spoke about Red Hat's virtualization portfolio, RHEV & KVM technical updates (Xen vs KVM, sVirt), RHEV 3, and security automation (OpenSCAP).
VMworld 2013: SDDC is Here and Now: A Success Story VMworld
The document discusses how an SDDC case study assessed a company's technical architecture, processes, and people to reduce infrastructure costs by 50% within 3 years through migrating to a software-defined data center. It presents 3 technology stack options for implementing an SDDC and compares their considerations. The SDDC is projected to deliver dramatic and sustainable 75% cost reductions through server, storage, networking, and labor savings.
Similar to IaaS with Software Defined Networking (20)
8 Best Automated Android App Testing Tool and Framework in 2024.pdfkalichargn70th171
Regarding mobile operating systems, two major players dominate our thoughts: Android and iPhone. With Android leading the market, software development companies are focused on delivering apps compatible with this OS. Ensuring an app's functionality across various Android devices, OS versions, and hardware specifications is critical, making Android app testing essential.
How Can Hiring A Mobile App Development Company Help Your Business Grow?ToXSL Technologies
ToXSL Technologies is an award-winning Mobile App Development Company in Dubai that helps businesses reshape their digital possibilities with custom app services. As a top app development company in Dubai, we offer highly engaging iOS & Android app solutions. https://rb.gy/necdnt
Using Query Store in Azure PostgreSQL to Understand Query PerformanceGrant Fritchey
Microsoft has added an excellent new extension in PostgreSQL on their Azure Platform. This session, presented at Posette 2024, covers what Query Store is and the types of information you can get out of it.
Measures in SQL (SIGMOD 2024, Santiago, Chile)Julian Hyde
SQL has attained widespread adoption, but Business Intelligence tools still use their own higher level languages based upon a multidimensional paradigm. Composable calculations are what is missing from SQL, and we propose a new kind of column, called a measure, that attaches a calculation to a table. Like regular tables, tables with measures are composable and closed when used in queries.
SQL-with-measures has the power, conciseness and reusability of multidimensional languages but retains SQL semantics. Measure invocations can be expanded in place to simple, clear SQL.
To define the evaluation semantics for measures, we introduce context-sensitive expressions (a way to evaluate multidimensional expressions that is consistent with existing SQL semantics), a concept called evaluation context, and several operations for setting and modifying the evaluation context.
A talk at SIGMOD, June 9–15, 2024, Santiago, Chile
Authors: Julian Hyde (Google) and John Fremlin (Google)
https://doi.org/10.1145/3626246.3653374
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemPeter Muessig
Learn about the latest innovations in and around OpenUI5/SAPUI5: UI5 Tooling, UI5 linter, UI5 Web Components, Web Components Integration, UI5 2.x, UI5 GenAI.
Recording:
https://www.youtube.com/live/MSdGLG2zLy8?si=INxBHTqkwHhxV5Ta&t=0
Flutter is a popular open source, cross-platform framework developed by Google. In this webinar we'll explore Flutter and its architecture, delve into the Flutter Embedder and Flutter’s Dart language, discover how to leverage Flutter for embedded device development, learn about Automotive Grade Linux (AGL) and its consortium and understand the rationale behind AGL's choice of Flutter for next-gen IVI systems. Don’t miss this opportunity to discover whether Flutter is right for your project.
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsPeter Muessig
The UI5 tooling is the development and build tooling of UI5. It is built in a modular and extensible way so that it can be easily extended by your needs. This session will showcase various tooling extensions which can boost your development experience by far so that you can really work offline, transpile your code in your project to use even newer versions of EcmaScript (than 2022 which is supported right now by the UI5 tooling), consume any npm package of your choice in your project, using different kind of proxies, and even stitching UI5 projects during development together to mimic your target environment.
Malibou Pitch Deck For Its €3M Seed Roundsjcobrien
French start-up Malibou raised a €3 million Seed Round to develop its payroll and human resources
management platform for VSEs and SMEs. The financing round was led by investors Breega, Y Combinator, and FCVC.
Preparing Non - Technical Founders for Engaging a Tech AgencyISH Technologies
Preparing non-technical founders before engaging a tech agency is crucial for the success of their projects. It starts with clearly defining their vision and goals, conducting thorough market research, and gaining a basic understanding of relevant technologies. Setting realistic expectations and preparing a detailed project brief are essential steps. Founders should select a tech agency with a proven track record and establish clear communication channels. Additionally, addressing legal and contractual considerations and planning for post-launch support are vital to ensure a smooth and successful collaboration. This preparation empowers non-technical founders to effectively communicate their needs and work seamlessly with their chosen tech agency.Visit our site to get more details about this. Contact us today www.ishtechnologies.com.au
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...XfilesPro
Wondering how X-Sign gained popularity in a quick time span? This eSign functionality of XfilesPro DocuPrime has many advancements to offer for Salesforce users. Explore them now!
UI5con 2024 - Bring Your Own Design SystemPeter Muessig
How do you combine the OpenUI5/SAPUI5 programming model with a design system that makes its controls available as Web Components? Since OpenUI5/SAPUI5 1.120, the framework supports the integration of any Web Components. This makes it possible, for example, to natively embed own Web Components of your design system which are created with Stencil. The integration embeds the Web Components in a way that they can be used naturally in XMLViews, like with standard UI5 controls, and can be bound with data binding. Learn how you can also make use of the Web Components base class in OpenUI5/SAPUI5 to also integrate your Web Components and get inspired by the solution to generate a custom UI5 library providing the Web Components control wrappers for the native ones.
Unveiling the Advantages of Agile Software Development.pdfbrainerhub1
Learn about Agile Software Development's advantages. Simplify your workflow to spur quicker innovation. Jump right in! We have also discussed the advantages.
Unveiling the Advantages of Agile Software Development.pdf
IaaS with Software Defined Networking
1. 1
Éamon Ryan Prasenjit Sarkar
Senior Solutions Architect Staff Solutions Architect
IaaS with SDN
The Good, Bad and Confusing
2. 2
Purpose and Audience
Purpose
• Customer interest is increasing well beyond just what our standalone products offer
• In fact – customer don’t care about the products, they care about the solution
• IaaS with SDN as a solution – extremely popular
• Therefore, focus on joint solution: vRA, vRO, NSX-v and 3rd party options
Intended Audience
• Anyone dealing with this joint solution
4. 4
Life of a Network Engineer!!! ;-)
Not everything in life is fair
5. 5
Distributed Switch
A network path defines where exactly a VM would connect.
You cannot use routed or NATed Profiles without vCNS or
NSX. Only External Profiles would be used
Without NSX, DvPortgroup
becomes Network path
MMBP1 MMBP2
What is Network Path for vRealize Automation? Without NSX-V
7. 7
To Core Switches
Distributed-Router-01
Perimeter-Gateway-01 The External Network Profile has to be associated on
the Logical Switch connected on the Uplink of the DLR
Associate External Network profile here
Advantage of this model:
You can automatically redistribute Connected
Routes on DLR into OSPF
You can make use of ECMP
Distributed Router Model – Difference in behavior for Routed Profile
8. 8
To Core Switches
Perimeter-Gateway-01
The External Network Profile has to be associated on the Logical Switch connected on the Internal
Interface of the Perimeter Edge
Associate External Network profile here
Perimeter Edge Model
9. 9
To Core Switches
Perimeter-Gateway-01 The External Network Profile has to be associated on
the Logical Switch connected on the Uplink of the DLR
Associate External Network profile here
One Drawback in this Model:
You cannot automatically advertise networks below the
application edge to devices located upwards(Perimeter
GW, Core Switches)
Cannot make use of ECMP
Perimeter Edge Model – Difference in behavior for Routed Profile
12. 12
NSX with vRA – On Demand Deployment Model
Provider Logical
Router (HA)
External
Networks
2 Tiers of Routing
• Distributed Logical Router or NSX
Edge for Application Router
• NSX Edge for Provider Router
Dynamic Routing externally
Dynamic Routing (DLR), Static
Routing or NAT internally
(Edge)
Dynamic Routing
(OSPF, BGP)
Transit Uplink 192.168.10.0/24 (External Network Profile)
Static Route added
automatically
On Demand Model is typically used for more
dynamic Test/Dev style workloads, particularly
when there is a requirement for overlapping IP
addresses
Dynamic Routing
(OSPF, BGP)
Web Logical
Switch
(Routed)
DB Logical
Switch
(Routed)
MMS 1
Routed
App LS
(Routed)
172.16.10.0/29 172.16.10.8/29 172.16.10.16/29
Web Logical
Switch (Routed) App LS (Routed) DB LS (Routed)
MMS 2
Routed
172.16.20.0/29 172.16.20.8/29 172.16.20.16/29
Web Logical
Switch
(NAT)
App LS (Private) DB LS (Private)
MMS 3
NAT & Private
172.16.100.0/24 172.16.101.0/24 172.16.102.0/24
Web Logical
Switch
(NAT) App LS (Private) DB LS (Private)
MMS 4
NAT & Private
172.16.100.0/24 172.16.101.0/24 172.16.102.0/24
DLR
13. 13
NSX with vRA – Pre Created Deployment Model
Dynamic Routing
(OSPF, BGP)
External
Networks
2 Tiers of Routing
• Distributed Logical Router for
Application Router
• NSX Edge for Provider Router
Dynamic Routing
Use existing LS as external
network profiles
One Arm Load Balancing
on demand (vCNS Edge in 6.0,
NSX Edge in 6.1)
Prod-01
Logical Switch
Dev-01
Logical Switch
LB LB
LB
Dynamic Routing
(OSPF, BGP)
Transit Uplink
192.168.10.0/24
(External Network Profile)
Scale Out Provider
Logical Router (NSX 6.1)
MMS 1 VMs
MMS 2 VMs
MMS 3 VMs
Pre-Created model is typically used with Production or more
static workloads and the application topology is multi-tier on a
single network
Prod Web SG A Prod App SG A Prod DB SG A Dev Web SG A Dev App SG A Dev DB SG A
Dev Web SG B
Dev App SG B
Dev DB SG B
Distributed Logical Router
Prod Web SG B Prod App SG B
Prod DB SG B
MMS 4 VMs
LB
172.16.50.0/24 (External Network) 172.16.60.0/24 (External Network)
Dynamic Routing
(OSPF, BGP)
with ECMP
Dynamic Routing
(OSPF, BGP)
with ECMP
Provider Logical
Router (NSX 6.1)
14. 14
NSX Security Groups & Security Policies
End-Users and Cloud Admins are able to select pre-defined security policies already
approved by the Security Admin in NSX
Security policies are applied to one or more security groups where workloads are
members
These security groups are created on-demand by vRA at deployment time
WHAT
you want
to protect
HOW you
want to
protect it
SECURITY GROUP
SECURITY POLICY
Members (VM, vNIC)
and Context (user
identity, security
posture)
“Standard Web”
Firewall – allow
inbound HTTP/S,
allow outbound ANY
IPS – prevent
DOS attacks,
enforce acceptable
use
Services (Firewall,
antivirus, IPS etc.) and
Profiles (labels
representing specific
policies)
15. 15
NSX Security Tags
NSX Security Tags can be used to define IF/THEN workflows for security services, e.g. IF
user selects a “Finance” application, THEN place the VM in the “Finance” security group
INFRASTRUCTURE
APPS
Security Admin
“Finance Policy”
IF Tag =
Finance THEN
add VM to
Security Group
“Finance” with
Security Policy
“Finance”
Step 1: Security Admin pre-defines a
Security Group and a Security Policy with
dynamic membership based on a Security
Tag
“Finance App”
Set Tag
“Finance”
Cloud Admin
Multi-
Machine
Blueprint
Step 2: Cloud Admin creates a Multi-
Machine Blueprint which sets a Security
Tag. Cloud Admin needs no knowledge
of Security Groups or Security Policies.
16. 16
NSX Security Tags
NSX Security Tags can be used to define IF/THEN workflows for security services, e.g. IF
user selects a “Finance” application, THEN place the VM in the “Finance” security group
INFRASTRUCTURE
APPS
Requests
“Finance App”
Service
Catalog
Step 3: End-User requests Application
via the Service Catalog
Cloud
Consumer
Step 4: VM is automatically deployed
with its Security Tag WHAT
you want
to protect
Step 5: VM is dynamically assigned to
the relevant pre-defined Security
Group
SG=Finance
17. 17
vRA Feature Set Supporting NSX
Feature vRA 7.0 Future
Day 1: Automated Routed, NAT, LB and security for single machines blueprints R R
Day 1: Automated Routed, NAT, LB and security for application stack (micro-segmentation) R R
Visual topology in blueprint: Drag-and-drop of networks, LB and security objects in Canvas and map relationships R R
Day 1 and 2: Enhance NSX NAT with features for SNAT, DNAT, port forwarding and PAT monitors in network profile
and add Day 2 updates
Q R
Day 2: Update NSX security groups, tags and policies applied to VMs Q R
Day 1 and 2: Enhance NSX LB with features for port, algorithm, persistence, IP address pool, health check monitors
in blueprint and add Day 2 updates
Q R
NSX Multi-vCenter Feature Support (IP and MAC set security groups) Q R
Day 1 and 2: Support for enabling HA on NSX Edges Q R
Day 1 and 2: Define NSX firewall rules for the app in blueprint and Day 2 add/change/remove firewall rules on VMs
Q R
Day 2: Change network adapters, IP address, DHCP, DNS, etc. on VM Q R
Request time: Change Network, LB and Security settings Q R
Direct support for IPAM solutions Q R
Support NSX functionality in vCloud Air Q R
19. 19
vRealize Automation 7.0 – Changes
• Easier setup
• Graphical canvas
• Relationship Mapping
• Networking components as first class
• Manageable Items
• More support for on-demand networking objects
• Single machines with advanced networking
• Orchestrator
• Event broker system
Relevant to IaaS with SDN
20. 20
vRealize Automation 7.0 – Easier Setup
NSX Integration for Blueprint Authoring & Deployment
• Automated connectivity
to existing or on-
demand networks
• Micro-segmentation for
application stack
• Automated security
policy enforcement thru
NSX security policies,
groups and tags
• On-demand dedicated
NSX load balancer
21. 21
vRealize Automation 7.0 – Single Machine Networking
• vCAC 5.2 -> Custom properties
• vRA 6.x -> GUI based network options for MMBP only
• vRA 7.0 -> GUI based network options for all (but all are now one – no single/MMBP difference)
22. 22
vRealize Automation 7.0 – Orchestrator
The vRO 7.0 Control Center
• Embedded + External
• New modern UI for vRO setup, configuration,
workflow monitoring, troubleshooting, and other
useful information.
• Collect metrics for workflow execution
• Analyze running workflows
• General troubleshooting
• Manage, Import/Export central DB
• WAY more slick than previous “legacy” UI
23. 23
NSX vRealize Orchestrator Plugin
Abstracting with vRO
Benefits
• Ability to support multiple product versions
(vCNS, NSX) transparently to vRA
• Network and security workflows are decoupled
from policy engine, enabling more rapid release
and update to workflows
• Ability to deliver fixes and updates more rapidly
• Easier to extend/customize workflows by adding
your own logic or leveraging other systems
• Provide Self Service access to NSX vRO
workflows through Advanced Service Designer
• Can be used without vRA
Warning: Supported for the vRA workflows ONLY
24. 24
NSX vCenter Dynamic Types Plugin
Abstracting with vRO
Benefits
• Has been built by Christophe Decanini and offers
additional workflows the official plugin doesn’t
cover.
• It’s FREE !
• Designed to be used in XaaS context
• Source code available at https://flowgrab.com or
in the VMware communities
• https://communities.vmware.com/docs/DOC-29032
• Can be extended easily, through the NSX REST
API as it’s built leveraging the dynamic types
plugin generator
• Great learning opportunity (vRO and NSX) !
Warning: Not Supported by VMware
25. 25
NSX-vRO Plugin 1.1.0 or 2.0.0
Feature
Continued support for interoperability between vRA, vRO and NSX
Expanded support and bug fixes for use of the plugin with vRA ASD / XaaS
Enhance NSX NAT with features for SNAT, DNAT, port forwarding and PAT monitors in network profile and add Day 2 updates
Support full management (CRUD) of NSX security groups, tags and policies applied to VMs
Support for Enhanced NSX LB management with features such as LB port, algorithm, persistence, IP address pool, health check
monitors
Support for advanced NSX Edge features (HA, Logging, etc.)
NSX firewall rule management (CRUD operations)
Full documentation of the NSX-vRO plugin for general consumption
Better scale and performance requirements
Support for NSX Transformers (Crosshairs target)
26. 26
vCAC 6.0.x and NSX Integration
NSX vSphere (NSX-v)
vCloud Automation Center
vCenter Server vSphere Host (ESXi)
vCNS Model
NSX API (REST)
VIM API (SOAP) AMQP
27. 27
vRealize Automation and NSX Integration
NSX vSphere (NSX-v)
vRealize Automation
vCenter Server vSphere Host (ESXi)
vCNS Model
NSX API (REST)
VIM API (SOAP) AMQP
vRealize Orchestrator
vRO API (REST)
NSX Plugin
28. 28
vRealize Automation 7.0 – Event Broker
• New event broker system
• Allows blocking task style implementations
• Dozens of notification possibilities
• Ability to wire any of these to vRealize Orchestrator
• Therefore ability to use vRO to influence NSX at any of these points
• Standard machine stub callouts will still exist
30. 30
Review of Learner Objectives
You should be able to meet the following objectives:
• Understand the benefits of the integration between NSX and vRealize Automation
• Be able to articulate to customers the value of the joint solution
• Create NSX network and security components to be consumed by vRealize Automation
• Configure Network Profiles
• Configure a multi-machine blueprint with networking and security
• Deploy a multi-tier application from the vRealize Automation catalog with networking and security
components.
31. 31
Key Takeaways
The NSX and vRealize Automation integration allows for the
automation of multi-tier applications with networking and security
components
There are many different deployment options with the joint NSX and
vRealize Automation solution. Understand your customer
requirements and prescribe the appropriate deployment options.