Category: VMware NSX-T

Easy Segmentation & Operation with NSX-T 3.0

In the NSX-T Datacenter, segments are virtual layer 2 domains. With NSX-T you can do VLAN based or overlay-backed segmentation. The VLAN backed segments are usually done for bridging traffic to the devices usually outside of the NSX-T deployment. Such as gateway, physical firewall, etc. In this blog, we will discuss how easy segmentation and

How Traffic Managed with NSX Microsegmentation

Microsegmentation is a method of creating different landing zone to separate the workloads. This method brings the security by isolating the workloads and secure them individually. In traditional segmentation model we have always aligned with security policies with the environment rather than with applications. With the traditional segmentation process the shared services can transverse tier

NSX-T: Exploring Distributed IDS

Using this blog “NSX-T: Exploring Distributed IDS” let’s examine distributed IDS features introduced part of NSX 3.0. and we will explore its architecture and key configuration details. Distributed intrusion detection uses network introspection to identify malicious intrusion attempts. This results in distributed intrusion detection to protects east-west traffic and detects L4 attacks. In fact, the

NSX-T 3.0 Design Considerations for VRF-Lite

VRF-Lite is the latest capability added part of the NSX-T 3.0 release. Through this blog post “NSX-T 3.0 design consideration for VRF-lite”, let’s explore the benefits of VRF lite and its considerations from design and implementation perspectives. VRF-Lite Advantages Server virtualization admins usually struggle with the core networking concepts like VRF lite. Therefore, I recommend