Book Image

VMware NSX Cookbook

By : Bayu Wibowo, Tony Sangha
Book Image

VMware NSX Cookbook

By: Bayu Wibowo, Tony Sangha

Overview of this book

This book begins with a brief introduction to VMware's NSX for vSphere Network Virtualization solutions and how to deploy and configure NSX components and features such as Logical Switching, Logical Routing, layer 2 bridging and the Edge Services Gateway. Moving on to security, the book shows you how to enable micro-segmentation through NSX Distributed Firewall and Identity Firewall and how to do service insertion via network and guest introspection. After covering all the feature configurations for single-site deployment, the focus then shifts to multi-site setups using Cross-vCenter NSX. Next, the book covers management, backing up and restoring, upgrading, and monitoring using built-in NSX features such as Flow Monitoring, Traceflow, Application Rule Manager, and Endpoint Monitoring. Towards the end, you will explore how to leverage VMware NSX REST API using various tools from Python to VMware vRealize Orchestrator.
Table of Contents (19 chapters)
Title Page
Packt Upsell
Foreword
Contributors
Preface
Index

Using Application Rule Manager


In this recipe, we will use ARM (Application Rule Manager) in NSX 6.3 to collect flows from multiple virtual machines, analyze them, and create a firewall rules based on the collected flows.

Getting ready

You will need to have the following access and configurations present before proceeding with this recipe:

  • Access to the vSphere Web Client
  • NSX administrator or enterprise administrator access

How to do it...

Let's start a monitoring session from ARM to collect traffic flows from a three-tier application virtual machine:

  1. Log in to the vSphere Web Client UI and navigate to Home | Networking & Security | Flow Monitoring. In the center pane, select the Application Rule Manager tab and click on the Start New Session button on the right. Type the session name and select the object type that you want to monitor with ARM. This can be a virtual machine:

  1. Wait for few minutes. If there are traffic flows on the monitored objects, ARM will detect how many sources and flows...