In this blog: NSX-T 3.0 Design Bootcamp 3:NSX Manager 1-2, Let’s continue with our discussion on NSX-T manager. To start with, we will talk about one of the basic topics lost in the transition part of our previous article which is interoperability. Sure we will debate on this and also below are the few lists to
This is the continuation of my first design blog. In this “NSX-T 3.0 Design Bootcamp: Part 2 – NSX Manager 1-1” blog, let’s look at some of the key design considerations. And the key effort here, I would say to look at the NSX-T manager design process from viewpoints such as Logical connectivity: IP access
This is my first blog in this series. Using this NSX-T 3.0 Design Bootcamp 1: Overview, let’s start the discussion on some of the considerations and see why that is important. Clearly, when it comes to networking and security we have two different realms 1) Physical and 2) Virtual. It is apparent that the supremacy
Indeed, the cloud is not built with enterprise-grade networking in mind and the main focus was to host applications fast with all the required agility. In contrast, as the business deciding to adopt multiple clouds, the IT infrastructure folks in the organizations are challenged to serve the cause. let’s look at some of the key
Datacenter infrastructure landscape evolving to take various forms and shapes, it is going from a centralized location to co-locations, remote, branch offices, and to the clouds. Clearly, these are sort of influenced by datacenter cost, flexibility, agility and application, and cloud dynamics. Consequently, the multisite solution from Cisco certainly targeting to address some of these
New websites are emerging at astonishing rates. It is really making it challenging for organizations to enforce internet usage policies and keep users safe from online threats. If you look at it, modern admins require more accurate & timely solutions to protect their customers. In this blog – let’s look at how NSX-T uses URL
Segmentation has been around for a long time there’s nothing new. There’s nothing sexy in it, we been doing segmentation for years. However, it is done specifically for network optimization and network performance, and it’s neither for security nor for compliance. Micro-segmentation however is a concept that is designed and purpose-built for security. In this
In the NSX-T Datacenter, segments are virtual layer 2 domains. With NSX-T you can do VLAN based or overlay-backed segmentation. The VLAN backed segments are usually done for bridging traffic to the devices usually outside of the NSX-T deployment. Such as gateway, physical firewall, etc. In this blog, we will discuss how easy segmentation and
Defining an active-active data-center strategy is not an easy task when you talk to network, server & compute teams who usually do not collaborate when it comes to planning their infrastructure. Most importantly, active-active data Center design requires end-to-end technology stack working together cohesively. It usually needs an enterprise-level architecture drive to establish the idea.
Using this blog “NSX-T: Exploring Distributed IDS” let’s examine distributed IDS features introduced part of NSX 3.0. and we will explore its architecture and key configuration details. Distributed intrusion detection uses network introspection to identify malicious intrusion attempts. This results in distributed intrusion detection to protects east-west traffic and detects L4 attacks. In fact, the