What is VMware NSX?
·
VMware NSX is software-defined networking & security virtualizationplatform. It reproduces the entire network model in software.
·
NSX provides a network hypervisor that manages network layers 2
through 7 (L2 to L7) services.
·
Virtual networks are programmatically provisioned and managed
independent of networking hardware.
·
VMware NSX is the leading network virtualization platform that delivers
the operational model of a virtual machine for the network.
·
Similar to virtual machines for compute, virtual networks
are programmatically provisioned and managed independent of underlying hardware.
·
It enables a library of logical networking elements and services,
such as logical switches, routers, firewalls, load balancers, VPN, and workload
security.
Key Features of NSX
· 1: Logical Switching – Reproduce the complete
L2 and L3 switching functionality in a virtual environment, decoupled from
underlying hardware.
· 2: NSX Gateway – L2 gateway for seamless
connection to physical workloads and legacy VLANs.
· 3: Logical Routing – Routing between logical
switches providing dynamic routing within different virtual networks.
· 4: Logical Firewall – Distributed firewall,
kernel enabled line rate performance, virtualization and identity aware, with
activity monitoring.
· 5: Logical Load Balancer – Full featured load
balancer with SSL termination.
· 6: Logical VPN – Site-to-Site & Remote
Access VPN in software.
· 7: NSX API – RESTful API for integration into any cloud management
platform.
·
·
Network provisioning time reduced from days to seconds.
·
Made easy to place and move workloads independent of physical
topology.
·
Achieve operational efficiency through automation.
·
Deploy on any hypervisor and can be integrated with any cloud
management platform.
·
Integrate third-party network and security solutions through
standard APIs.
·
Non-disruptive deployment over existing physical networks or next
generation topologies
Killer Feature in VMware NSX – Micro
Segmentation:
·
Micro-segmentation is the feature of NSX which provides granular
security policies or basic firewalling rules at the vNIC level.
·
Each VM has its own firewall – A Virtual Firewall.
·
Micro-segmentation is achieved via the Distributed Firewall the
component of NSX, which focuses on East-West access and the VMware NSX Edge
firewall which focuses on the North-South traffic.
·
Before any packets are forwarded from the virtual machines, the
packets are checked by the firewall configured at the vNIC level.