Book Image

Learning VMware NSX - Second Edition

By : Ranjit Singh Thakurratan
Book Image

Learning VMware NSX - Second Edition

By: Ranjit Singh Thakurratan

Overview of this book

VMware NSX is a platform for the software-defined data center. It allows complex networking topologies to be deployed programmatically in seconds. SDNs allow ease of deployment, management, and automation in deploying and maintaining new networks while reducing and in some cases completely eliminating the need to deploy traditional networks. The book allows you a thorough understanding of implementing Software defined networks using VMware’s NSX. You will come across the best practices for installing and configuring NSX to setup your environment. Then you will get a brief overview of the NSX Core Components NSX’s basic architecture. Once you are familiar with everything, you will get to know how to deploy various NSX features. Furthermore, you will understand how to manage and monitor NSX and its associated services and features. In addition to this, you will also explore the best practices for NSX deployments. By the end of the book, you will be able to deploy Vmware NSX in your own environment with ease. This book can come handy if you are preparing for VMware NSX certification.
Table of Contents (17 chapters)
Title Page
Credits
About the Author
About the Reviewer
www.PacktPub.com
Customer Feedback
Dedication
Preface
9
Conclusion

Summary


In this chapter, we looked at how to configure different supported routing protocols on the NSX Edge. We started the chapter by looking at configuring DNS and DHCP services. Next, we looked at configuring OSPF and BGP routing protocols. We also looked at configuring logical load balancers that allow us to implement a load balancer for our applications. We then looked at configuring VPNs on our Edge appliance so that remote users can connect securely. Edge supports SSL-VPN, IPSEC VPN, and L2 VPN.

In the Chapter 6,  Service Composer, we will look at NSX's security capabilities, including security composer and security groups. We will also learn about mapping security policies to virtual machines.