Book Image

Learning VMware NSX - Second Edition

By : Ranjit Singh Thakurratan
Book Image

Learning VMware NSX - Second Edition

By: Ranjit Singh Thakurratan

Overview of this book

VMware NSX is a platform for the software-defined data center. It allows complex networking topologies to be deployed programmatically in seconds. SDNs allow ease of deployment, management, and automation in deploying and maintaining new networks while reducing and in some cases completely eliminating the need to deploy traditional networks. The book allows you a thorough understanding of implementing Software defined networks using VMware’s NSX. You will come across the best practices for installing and configuring NSX to setup your environment. Then you will get a brief overview of the NSX Core Components NSX’s basic architecture. Once you are familiar with everything, you will get to know how to deploy various NSX features. Furthermore, you will understand how to manage and monitor NSX and its associated services and features. In addition to this, you will also explore the best practices for NSX deployments. By the end of the book, you will be able to deploy Vmware NSX in your own environment with ease. This book can come handy if you are preparing for VMware NSX certification.
Table of Contents (17 chapters)
Title Page
About the Author
About the Reviewer
Customer Feedback


We began this chapter by discussing and deploying primary and secondary NSX managers, followed by learning how to configure VXLANs and segment IDs. We then configured our transport zones, which define the scope of logical switches in your environment. A logical switch can only be part of one transport zone, and there can only be one universal transport zone in a cross-vCenter NSX environment. We then looked at creating logical switches and L2 bridges. L2 bridges connect your logical networks to your physical networks for seamless network integration and extension. We looked at deploying a distributed logical router to enable L2 bridging. We also got started with the Edge services gateway by deploying it. We protected our environment by deploying a logical firewall and configuring rules in it. We finished the chapter by configuring the Edge services gateway firewall service, which is similar to the logical firewall configuration. Ideally, the Edge services gateway firewall protects...