Book Image

VMware Cross-Cloud Architecture

By : Ajit Pratap Kundan
Book Image

VMware Cross-Cloud Architecture

By: Ajit Pratap Kundan

Overview of this book

Over the past two decades, VMware vSphere has been known as the most trusted and reliable virtualization platform. VMware Cross-Cloud Architecture shows you how to design and configure Cross Cloud Architecture by using VMware Cloud Foundation and vRealize Suite with various use cases across private, public, and hybrid Cloud. This book takes you through everything from a basic understanding of virtualization to advanced aspects of storage and network virtualization, clustering, automation, and management. This book will be your guide to designing all aspects of Cloud. We start with the challenges faced by a traditional data center, define problem statements for you, and then brief you on respective solutions. Moving on, all kinds of virtualization and Cloud offerings from AWS and IBM Soft Layer are introduced and discussed in detail. Then, you'll learn how to design IT infrastructures for new and existing applications with a combination of Cloud Foundation, vRealize Suite, and vSphere enabled with VSAN and NSX. Furthermore, you'll learn how to design and configure high availability, disaster recovery, and apply an appropriate compliance matrix. Toward the end of the book, you will learn how to calculate the TCO/ROI, along with the VMware products packaging and licensing in detail.
Table of Contents (19 chapters)
Title Page
Packt Upsell
Contributors
Preface
Index

Chapter 8. Transforming Your Network Architecture

This chapter is focused on the network and security components of a cloud model. Network virtualization makes it possible to programmatically create, provision, and manage networks in a software-defined way, using the underlying physical network as a simple packet‐forwarding backplane. Network and security services in a software stage are distributed to hypervisors and attached to individual virtual machines (VMs) in accordance with networking and security policies defined for each connected application. In this chapter, we are going to cover how to migrate from legacy network architectures to a new network virtualization technique, network virtualization versus software-defined networking, and securing the data center by limiting lateral movement within the data center:

  • Network virtualization and highlighting the benefits of this new approach
  • Outlining key characteristics/key functionality of a virtualized network
  • Introducing the technologies...