Book Image

VMware NSX Cookbook

By : Bayu Wibowo, Tony Sangha
Book Image

VMware NSX Cookbook

By: Bayu Wibowo, Tony Sangha

Overview of this book

This book begins with a brief introduction to VMware's NSX for vSphere Network Virtualization solutions and how to deploy and configure NSX components and features such as Logical Switching, Logical Routing, layer 2 bridging and the Edge Services Gateway. Moving on to security, the book shows you how to enable micro-segmentation through NSX Distributed Firewall and Identity Firewall and how to do service insertion via network and guest introspection. After covering all the feature configurations for single-site deployment, the focus then shifts to multi-site setups using Cross-vCenter NSX. Next, the book covers management, backing up and restoring, upgrading, and monitoring using built-in NSX features such as Flow Monitoring, Traceflow, Application Rule Manager, and Endpoint Monitoring. Towards the end, you will explore how to leverage VMware NSX REST API using various tools from Python to VMware vRealize Orchestrator.
Table of Contents (19 chapters)
Title Page
Packt Upsell
Foreword
Contributors
Preface
Index

Configuring IPSEC VPN


IPSEC VPN is a technology that provides a mechanism to establish encrypted network tunnels over non-secure infrastructure such as the internet. Security and data confidentiality are the primary requirements for IPSEC VPN, and the IPSEC VPN implementation on the ESG meets this requirement. The edge supports IKEv1 and the following parameters for IPSEC VPN:

Authentication 

  • Certificate
  • Pre-Shared Key

Encryption algorithms AES

  • AES256
  • Triple DES
  • AES-GCM

Diffie Hellman groups DH2

  • DH5
  • DH14
  • DH15
  • DH16

 

In addition, each edge form factor supports a specific number of IPSEC VPN tunnels, which are follows:

Edge form factor

Number of IPSEC tunnels

Compact

512

Large

 1,600

Quad Large

4,096

X-Large

 6,000

The ESG also supports IPSEC tunnel NAT traversal, so even if your edge is located behind a perimeter firewall which is performing NAT, as long as the appropriate DNAT rules have been configured on the perimeter firewall, you can establish an IPSEC tunnel with a remote endpoint.

In this recipe, we will configure...