Book Image

VMware NSX Network Essentials

By : sreejith c
Book Image

VMware NSX Network Essentials

By: sreejith c

Overview of this book

VMware NSX is at the forefront of the software-defined networking revolution. It makes it even easier for organizations to unlock the full benefits of a software-defined data center – scalability, flexibility – while adding in vital security and automation features to keep any sysadmin happy. Software alone won’t power your business – with NSX you can use it more effectively than ever before, optimizing your resources and reducing costs. Getting started should be easy – this guide makes sure it is. It takes you through the core components of NSX, demonstrating how to set it up, customize it within your current network architecture. You’ll learn the principles of effective design, as well as some things you may need to take into consideration when you’re creating your virtual networks. We’ll also show you how to construct and maintain virtual networks, and how to deal with any tricky situations and failures. By the end, you’ll be confident you can deliver, scale and secure an exemplary virtualized network with NSX.
Table of Contents (15 chapters)
VMware NSX Network Essentials
Credits
Foreword
About the Author
About the Reviewer
www.PacktPub.com
Preface

Design considerations while load balancing


Several best practices should be followed when setting up an NSX load balancer. Let's read the following points carefully before doing a lab exercise:

  • Based on the number of server pools, load balancer numbers will also get increased. However, that way, since each tenant has its own load balancer, management and configuration changes will have no impact on other tenants' load balancers.

  • Deploy load balancers in HA mode for High Availability.

  • Ensure you don't deploy a load balancer on the same machine where the underlying load-balanced machines are running. Follow the best practice of deploying on a different ESXi host or in a separate management edge cluster.

  • Select the right load balancing protocol based on application characteristics. For example, round robin, least connected, hashing, and least loaded are some of the common algorithms.

  • One common question is, do we need an end-to-end SSL connection, or do we need to terminate or offload SSL traffic...