VMware

Size: px
Start display at page:

Download "VMware NSX @SoftLayer!!"

Transcription

1 A CookBook v1.1 April 30, 2014 VMware Author(s) & Contributor(s) (IBM) Shane B. Mcelligott Dani Roisman (VMware) Merlin Glynn, Chris Wall Geoff Wing Marcos Hernandez Coby Litvinskey Page 1 of 21

2 VMware I. Summary The core objective of this series of CookBooks is to enable vsphere administrators with key information to deploy VMware vsphere environments within SoftLayer. Soft- Layer offers a very unique capability to VMware administrators to consume Bare Metal instances and network/storage/backup&recovery constructs from SoftLayer in a self service cloud construct manor. These constructs can be utilized to deploy fully functional vsphere implementations that can be architected to extend or replace on premises vsphere implementations (VMware@Home). VMware@SoftLayer will enable VMware administrators to realize Hybrid Cloud characteristics rapidly, and in a cost effective manor by deploying into SoftLayer s Enterprise grade Global Cloud. This is a key differentiator from other cloud providers like Amazon Web Services, in that vsphere workloads and catalogs can be provisioned onto VMware vsphere environments within SoftLayer s Global Cloud DataCenters, without modification to VMware VMs or guests. A common vsphere hypervisor and management/orchestration platform makes this possible. vsphere implementations in SoftLayer also enable utilization of other components of the VMware vcloud Suite such as vcloud Automation Center, vcenter Operations Management Suite, vsan, Site Recovery Manager, vcenter Orchestrator, and NSX. This document will focus on leveraging VMware NSX to provide SDN constructs to VMware@SoftLayer deployments. It will present information in the following sections: II. VMware NSX Overview III. Key Design Concepts for IV. Recipe (How To SoftLayer) V. Advanced Use Cases NSX Logical Switches (VXLAN) Across SoftLayer Pods BYOIP (Bring Your Own IP): Routing Customer Subnets from VMware@Home BYOIP (Bring Your Own IP): BCDR Recovery from VMware@Home. VI. Engaging VMware for Note: This document is intended for experienced vsphere Administrators, and assumes a basic understanding of VMware@SoftLayer Architecture which is documented here: com/learning/deploy-vmwaresoftlayer. Note: This document is intended for experienced vsphere Administrators. Some topics covered will consider that the reader has basic deployment skills to Install and Configure vsphere & vcenter 5.x, and a fundamental understanding of Layer 2 and Layer 3 networking. Note: This document is NOT intended to provide enablement on basic Operating System tasks within VM Guest Operating Systems. Page 2 of 21

3 II. VMware NSX Overview VMware NSX is a software networking and security virtualization platform that delivers the operational model of a virtual machine for the network. Virtual networks reproduce the Layer2 - Layer7 network model in software, allowing complex multi-tier network topologies to be created and provisioned programmatically in seconds, without the need for additional SoftLayer Private Networks. NSX also provides a new model for network security. Security profiles are distributed to and enforced by virtual ports and move with virtual machines. NSX supports VMware's software-defined data center strategy. By extending the virtualization capabilities of abstraction, pooling and automation across all data center resources and services, the software-defined data center architecture simplifies and speeds the provisioning and management of compute, storage and networking resources through policy-driven automation. By virtualizing the network, NSX delivers a new operational model for networking that breaks through current physical network barriers and enables VMware@SoftLayer to achieve better speed and agility with reduced costs. NSX includes a library of logical networking services - logical switches, logical routers, logical firewalls, logical load balancers, logical VPN, and distributed security. You can create custom combinations of these services in isolated software-based virtual networks that support existing applications without modification, or deliver unique requirements for new application workloads. Virtual networks are programmatically provisioned and managed independent of SoftLayer networking constructs. This decoupling from hardware introduces agility, speed, and operational efficiency that can transform datacenter operations. benefits of NSX include: DataCenter automation Self-Service Networking services Rapid application deployment with automated network and service provisioning. Isolate dev, test, and production environments on the same SoftLayer Bare metal infrastructure. Single SoftLayer Account Multi-tenant clouds NSX Network Services: NSX can be configured through the vsphere Web Client, a command line interface (CLI), and REST API. The core network services offered by NSX are: Logical Switches A cloud deployment or a virtual data center like VMware@SoftLayer may have a variety of applications across multiple tenants. These applications and tenants require isolation from each other for security, fault isolation, and avoiding overlapping IP addressing issues. The NSX logical switch creates logical broadcast domains or segments (VXLAN vwires) to which an application or tenant virtual machine can be logically wired. This allows for flexibility and speed of deployment while still providing all the characteristics of a physical network's broadcast domains (VLANs) without physical Layer 2 sprawl at SoftLayer. Logical switches allow for thousands of tenant networks to be provisioned onto of a single SoftLayer Private Network(VLAN). Page 3 of 21

4 A logical switch is distributed and can span arbitrarily large compute clusters, even across Soft- Layer Pods within the same SoftLayer datacenter. This allows for virtual machine mobility within the datacenter without limitations of physical Layer 2 (VLAN) boundaries across SoftLayer Pods. Logical Routers Dynamic routing provides the necessary forwarding information between layer 2 broadcast domains (VXLAN vwires/logical Switches), thereby allowing you to decrease layer 2 broadcast domains and improve network efficiency and scale. NSX extends this intelligence to where the workloads reside for providing East-West routing functions. This allows more direct virtual machine to virtual machine communication without the costly or timely need to extend hops. At the same time, NSX also provides North-South connectivity inbound/outbound of SoftLayer Data- Centers, thereby enabling tenants to access public networks securely and efficiently. Logical Firewall Logical Firewall provides security mechanisms for dynamic virtual data centers. The Distributed Firewall component of a NSX Logical Firewall allows you to segment virtual datacenter entities, like virtual machines, based on VM names and attributes, user identity, vcenter objects lie DataCenters, and hosts as well as traditional networking attributes like IP addresses, VLANs, etc. The Edge Firewall component helps you achieve key perimeter security needs such as building DMZs based on IP/VLAN constructs, tenant to tenant isolation in multi-tenant virtual data centers, Network Address Translation (NAT), VPNs, and User based SSL VPNs. Edge Firewalls can be leveraged in combination with or in place of Vyatta & Fortinet services from SoftLayer for perimeter protection. The Firewall Flow Monitoring feature displays network activity between virtual machines at the application protocol level. You can use this information to audit network traffic, define and refine firewall policies, and identify threats to your network. Logical Virtual Private Networks (VPN)s SSL VPN-Plus allows remote users to access private corporate applications. IPSec VPN offers site-to-site connectivity between an NSX Edge instance and remote sites (VMware@Home). L2 VPNs allow you to extend your datacenter by allowing virtual machines to retain network connectivity across geographical boundaries and across VMware@SoftLayer DataCenters and between VMware@Home. Logical Load Balancer The NSX Edge load balancer enables network traffic to follow multiple paths to a specific destination. It distributes incoming service requests evenly among multiple servers in such a way that the load distribution is transparent to users. Load balancing thus helps in achieving optimal resource utilization, maximizing throughput, minimizing response time, and avoiding overload. NSX Edge provides load balancing up to Layer 7. Service Composer Service Composer helps you provision and assign network and security services to applications in a virtual infrastructure. These services can be mapped and applied to virtual machines in the security groups. Data Security provides visibility into sensitive data stored within your organization's virtualized and cloud environments including VMware@SoftLayer. Based on the violations reported by NSX Data Security, you can ensure that sensitive data is adequately protected and assess compliance with regulations around the world. Page 4 of 21

5 NSX Extensibility VMware partners can integrate their network service solutions with the NSX platform, which enables customers to have an integrated experience across VMware products and partner solutions. Data center operators can provision complex, multi-tier virtual networks in seconds, independent of the underlying network topology or components from SoftLayer. NSX Core Components This section describes the core NSX components that would be deployed on Layer. These components can be configured/managed through the vsphere Web Client, a command line interface (CLI), and REST API. VMware NSX requires a functional VMware@SoftLayer environment with at least vsphere & vcenter version 5.5 deployed. All components described in this section will be deployed as VMware Appliance VMs running on VMware@SoftLayer. NSX Components are not supported as SoftLayer CCIs, It is therefore recommended that VMware@SoftLayer guidance be followed to create a dedicated ESX Management Cluster, additionally an Edge Services Cluster may also be required as will be discussed further in this document. Figure 1 Page 5 of 21

6 NSX Manager The NSX Manager is the centralized network management component of NSX, and is installed as a virtual appliance on an ESX host in your vcenter Server environment. VMware@Soft- Layer Architecture recommends this VM be deployed on a dedicated Management ESX Cluster. One NSX Manager maps to a single vcenter Server environment and multiple NSX Edge, vshield Endpoint, and NSX Data Security instances. NSX vswitch NSX vswitch is the software that operates on VMware@SoftLayer ESX hosts to form a software abstraction layer between servers and the physical network. As the demands on DataCenters continue to grow and accelerate, requirements related to speed and access to the data itself continue to grow as well. In most infrastructures, virtual machine access and mobility usually depend on physical networking infrastructure and the physical networking environments they reside in. This can force virtual workloads into less than ideal environments due to potential layer 2 or layer 3 boundaries, such as being tied to specific SoftLayer Private Networks (VLANs) in specific pods. NSX vswitch allows you to place these virtual workloads on any available infrastructure in the DataCenter, regardless of the underlying physical network infrastructure. This not only allows increased flexibility and mobility, but increased availability and resilience. NSX Controller NSX controller is an advanced distributed state management system that controls virtual networks and VXLAN overlay transport tunnels. NSX controller is the central control point for all logical switches within a network and maintains information of all virtual machines, hosts, logical switches, and VXLANs. The controller supports three logical switch control plane modes, Multicast, Unicast, and Hybrid. These modes decouple NSX from the physical network. VMware@SoftLayer requires Unicast mode as SoftLayer Private Networks (VLANs) do not offer IGMP services for Multicast or Hybrid mode. The NSX Controller(s) will utilize Unicast mode with virtual tunnel endpoints (VTEPS) to provide mac learning and other functions to allow VXLAN Broadcast, Unknown unicast, and Multicast (BUM) traffic within a logical switch. The unicast mode replicates all the BUM traffic locally on the host and requires no physical network configuration outside of Layer 3 connectivity between VTEPS. NSX Controller(s) are deployed by the NSX Manager as a minimum set of 3 controller nodes, as well as various other nodes to support (distributed) Layer 3 routing services. All of the nodes are deployed as virtual machines and are managed by the NSX Manager on an ESX Management Cluster at VMware@SoftLayer. NSX Edge NSX Edge provides network edge security and gateway services to isolate a virtualized networks. You can install an NSX Edge either as a logical (distributed) router or as a services gateway. The NSX Edge logical (distributed) router provides East-West distributed routing with tenant IP address space and data path isolation. Virtual machines or workloads that reside on the same host on different subnets can communicate with one another without having to traverse a traditional routing interface. The NSX Edge Gateway connects isolated stub networks to shared (uplink) networks by providing common gateway services such as DHCP, VPN, NAT, dynamic routing, and Load Balancing. Common deployments of NSX Edge include in the DMZ, VPN Extranets, and multi-tenant Cloud environments where the NSX Edge creates virtual boundaries for each tenant. Page 6 of 21

7 III. Key Design Concepts for Planning for This section will present some of the key planning concepts and constructs you should consider when deploying For full planning and Installation documentation of NSX, please refer to: & Logical Overview Figure 2" 1. Dedicated Management Cluster (From Figure 2): While not a strict requirement for VMware@SoftLayer, a dedicated management cluster is a strict requirement when NSX will be utilized with VMware@SoftLayer. The Management cluster will be required to host the NSX Controller VMs and NSX Manager Virtual Appliance. NSX Manager is delivered as a OVF that must be deployed on a ESX Host (CCI and BareMetal instances are not supported). NSX manager will deploy a minimum of 3 NSX Controller VMs that also require an ESX/vSphere cluster. A best practice is to dedicate a vsphere Management Cluster with adequate N+1 capacity to host all required management VMs and Virtual Appliances for your solution. NSX Manager and Controller cluster sizing information can be found here: GUID-311BBB9F-32CC F91-26A A.html. Page 7 of 21

8 2. Dedicated Edge Services Cluster (From Figure 2): Network traffic flows can be viewed at a high level to be North/South & East/West patterns. North/South traffic would traditionally be where traffic leaves a Layer 2 domain and is routed at Layer 3 to various public networks and/or other linked DataCenters across VPN or SoftLayer Point of Presence connections. One or more NSX Edge VMs will typically provide these North/South services (In addition to various other services mentioned in the previous section II). It is highly recommended to dedicate an Edge Services cluster. This allows a specific set of Edge ESX Hosts to be connected to SoftLayer Public Networks for Public/Untrusted Traffic, as well as dedicating ESX vmnics to traffic for North/South services. An Edge Services Cluster should be sized to host all of the expected NSX Edge Virtual Appliances ( NSX Edge Compact: 1 vcpu & 512 MB, Large: 2 vcpu &1 GB, X-Large: 6 vcpu & 8 GB, and Quad Large: 4vCPU & 1 GB ). Figure 3" It should be noted, That it is possible to leverage a common Management & Edge Services Cluster with one very important consideration. Management clusters in VMware@Soft- Layer deployments are recommended to leverage vsphere Standard vswitches for Virtual Networking. This ensures that Management Clusters that host vcenter VMs will have available virtual ports to start vcenter in a reboot/failover event. NSX requires that VTEPs (VXLAN Tunnel Endpoints) be deployed on a vsphere Distributed Virtual Switch. ESX vmnics can only belong to one vswitch (either a Standard or Distributed not both). In order for a Common Management & Edge Services cluster to be utilized at SoftLayer, each ESX host must have no fewer than 4 Private Network NICs. 2 Private NICs will be associated with a vsphere Standard vswitch and Standard Port Groups for vcenter as well as other management VMs, the remaining 2 Private NICs should then be associated with a vsphere Distributed Virtual Switch and a VXLAN VTEP deployed (Figure 3). This will allow NSX Edge s on the Common cluster to place an interface on any logical switch that it will be providing North/South or other services to. Page 8 of 21

9 3. Disable LACP for the Management Cluster Private Interfaces (From Figure 2): It is a best practice to have a dedicated ESX Management Cluster for VMware@SoftLayer to host vcenter and other management VMs & Virtual Appliances. It is highly recommended to have multiple NICs for redundancy and performance on that ESX Cluster. SoftLayer deploys all paired NICs in a LACP bundle as a default configuration. vsphere Standard switches DO NOT Support the LACP protocol. A vsphere Standard switch is highly recommended to host vcenter vnics. This is suggested to prevent outages if a vcenter instance fails. Distributed vswitches require a control plane to enable a port connected to newly powered on VMs, and to forward packets on the connected ports on a DVS. By default, vcenter provides that control plane function, if a vcenter instance is shutdown and recovered whiles its vnic is attached to a port on a DVS it manages, there will be no control plane available to allow port forwarding to occur (Chicken & Egg). For these reasons, a dedicated ESX Management Cluster cannot use both Private NICs with a Standard vswitch unless the LACP bundle is removed. This is also why a dedicated Edge Services cluster is also recommended as a DVS is required for NSX VTEPs. 4. Enhanced LACP for the Capacity & Edge Services Cluster Interfaces (From Figure 2): As previously mentioned, SoftLayer places multiple NICs into a LACP bundle as a default configuration on all hosts. All ESX hosts in a Capacity or Edge Services Cluster should leverage dual NICs for redundancy and performance. NSX VTEPs do support LACP LAGS (Link Aggregation Groups) on a DVS. It is recommended to set DVS LAGs in Passive LACP Mode with Source and destination IP Address load balancing mode at SoftLayer (Figure 4). There should be only a single VTEP vmk per Enhanced LACP LAG. Additionally, each DVS should have its LLDP (Link Layer Discovery Protocol) enabled & set to Both. LACPv1 for VTEPS is supported but not recommended for VMware@SoftLayer. Figure 4" 5. Capacity Clusters That Cross SoftLayer POD Boundaries (From Figure 2): A SoftLayer POD is a unit of approximately 5000 bare metal servers with a unique set of customer Backend Switches & Routers boundaries. Private Networks (VLANs) are unique to a POD. A SoftLayer Datacenter may have 1 or more PODs. VLANs with the same Tag ID are still unique, meaning if POD1 in a datacenter has a PrivateNetwork VLAN 1000 provisioned, and POD2 has the same VLAN TAG 1000 provisioned to the same tenant, they are still 2 separate Layer 2 broadcast domains (Note: SoftLayer Private Network Spanning allows Private Networks to route between each other across PODs/DataCenters, it does not extend a Layer 2 broadcast domain.). If your VMware@SoftLayer capacity spans PODs, and you Page 9 of 21

10 intend to build NSX logical switches across the POD boundary, you must ensure that the VTEPs from each capacity cluster can communicate with each other. 6. VXLAN On SoftLayer Private Networks (From Figure 2): A dedicated SoftLayer Private Network is required for VXLAN. VXLAN is the encapsulation protocol leveraged by NSX. It enables NSX Logical Switches to present a Layer 2 broadcast domain over a Layer 3 network (depicted by #7 in Figure 2). VXLAN and Logical switches provide a key feature for VMware@SoftLayer, by allowing VM networks to extend in a Datacenter, regardless of the POD and/or VLAN placement of ESX Host NICs. A few key points in relation to SoftLayer networks must be understood for VXLAN. Firstly, only the Unicast Control Plane Mode is supported for NSX at SoftLayer (Figure 5). This is a limitation due to SoftLayer not supporting IGMP Snooping and Multicast routing over Private Networks. Although Multicast broadcast packets will be allowed within a SoftLayer Private Network, the MultiCast address range is limited to the address range, and traffic will not be allowed to route outside of a single Private Network/VLAN, thus making Unicast mode a more favorable option. Second, all SoftLayer Private Networks have jumbo frames enabled and therefore will support the larger MTU required by VXLAN, 1600 is the recommended default value, but can be tuned up to 9000 if the network traffic traversing the physical switches will benefit from Jumbo frames. Figure It is also important to understand that a tenant is NOT guaranteed they will have all of their ESX hosts share common Private Networks/VLANs on the SoftLayer physical backend switches as new hosts are provisioned. As depicted in (Figure 2), ESX hosts that are deployed across SoftLayer Datacenter PODs, cannot share the same Private Networks/ VLANs. This scenario is likely to occur as ESX Host capacity is gradually added over time, and new hosts can be limited to connectivity in a new POD or Datacenter. It is critical that SoftLayer tenants allow the various IP Subnets linked to the VXLAN dedicated Private Net- 5" Page 10 of 21

11 works/vlans in each POD/DataCenter the ability to route and communicate with each other. The VTEPs must be able to freely communicate with each other. Although it is possible to ACL filter VXLAN UDP traffic through a firewall, it is highly recommended that VXLAN Private Networks/VLANs be allowed to have the VTEPs freely communicate with each other. 7. NSX Logical Switches (VXLAN based vwire Networks) On SoftLayer (From Figure 2): NSX Logical switches (VXLAN) provide a key feature for VMware@SoftLayer, by allowing VM networks to extend in a Datacenter, regardless of the POD and/or VLAN placement of ESX Host NICs (Figure 6). It is important to note, that this capability to extend a Layer 2 broadcast domain across PODs can also allow a tenant to extend a Layer 2 network across SoftLayer DataCenters. This may not be a desirable architectural decision depending on the amount of East/West traffic generated by the workloads on the Logical Switch, also Layer 3 routing services out of the network could still be pinned to a single Datacenter, and possibly cause undesirable network trombone effects. Figure 6" Page 11 of 21

12 8. NSX Edge (From Figure 2): A NSX Edge provides various services to Logical Switches, Logical (Distributed) Routers and other traditional vsphere port groups. As shown in Figure 7, an Single NSX Edge appliance is providing first hop services for Logical Switch A subnet /16, next hop services over a transit network ( /24) for Logical Switch B subnet /16, and Edge Gateway services for all connected networks to the SoftLayer Public Network providing external access ( /27). In order to provide this capability, the design point of a dedicated Edge Services Cluster for VMware@SoftLayer is beneficial in this scenario. Figure 7" Page 12 of 21

13 9. NSX Logical Routers (From Figure 2): NSX Distributed Logical Routers (DLRs) run in the ESX kernel of each ESX prepared host (Although there is a control plane VM that is typically provisioned on the Edge Services Cluster). In addition to basic Layer 3 functionality (DLRs do not provide all of the Layer 3 & above services as a NSX Edge Gateway is capable of), the DLR can bridge SoftLayer Private or Public Networks. Bridging allows SoftLayer Bare metal Servers the ability to interface with VMs that are connected to VXLAN based Logical Networks. As shown in Figure 8, Baremetal database instances can communicate at Layer 2 with the NSX Logical Network and its associated Subnet(s) ( /16). It should also be noted that using customer IP space in the /8 address range at SoftLayer may have certain design requirements when routing across SoftLayer BCR (Backend Customer Routers). The /8 range can easily be isolated and routed within NSX Logical switches / DLRs / NSX Edge devices, but if that IP space must route over a SoftLayer BCR, then VPN or NAT technologies may be required. It is recommended to work with SoftLayer Sales Engineering for any scenario where /8 customer address ranges are to be routed by SoftLayer Private Networks. Figure 8" Page 13 of 21

14 IV. Recipe (Simple Single Site/Single POD) Before deploying NSX, It is highly recommended to contact a VMware NSX Sales Engineer to assist you with architecture of your NSX deployment at SoftLayer. Please refer to for more guidance on design considerations. Full NSX Installation Documentation can be located here: B4A8-0B7CCE453F5F.html & BFC6-4BE41F87607B.html 1. Obtain the NSX Manager OVA File: This will require interaction with your VMware NSX Sales Representative as SoftLayer DOES NOT PROVIDE NSX Licenses or code. 2. Install the NSX Manager Virtual Appliance: Install the NSX Manager virtual appliance on an ESX host in the dedicated VMware@SoftLayer Management Cluster. The Management Cluster must have DRS enabled. 3. Register vcenter Server with NSX Manager: Open a web browser to the configured IP address you assigned NSX Manager in the previous step. Log into the appliance with the following credentials (admin/default). Under Appliance Management, click Manage Appliance Settings From the left panel, select NSX Management Service and click Configure next to vcenter Server. Type the IP address of the vcenter Server, and the vcenter Server user name and password. Type the IP address and port number of the NSX Management service. Click OK. 4. Assign NSX for vsphere License: Log in to the vsphere Web Client. Click Administration and then click License Click the Solutions tab. From the drop-down menu at the top, select Assign a new license key. Type the license key (Provided by VMware) and an optional label for the new key. Click Decode. Click OK. 5. Add NSX Controllers: Log in to the vsphere Web Client. Click Networking & Security and then click Installation. Ensure that the Management tab is selected. In the NSX Controller nodes section, click the Add Node ( ) icon. In the Add Controller dialog box, select the datacenter on which you are adding the node. Select the dedicated VMware@SoftLayer Management cluster or a resource pool on that cluster, select an appropriate datastore, select the logical switch, port group, or distributed port group to which the controller nodes are to be connected to. Note: The IP address of the controller(s) must be reachable from the NSX Manager and the management network of the vsphere hosts communicating with the controller. If you have followed the Page 14 of 21

15 architectural guidance at learning/deploy-vmwaresoftlayer, You should select your Management Network Standard vswitch PortGroup." Click OK. 6. Install Network Virtualization Components on ESX Hosts: Log in to the vsphere Web Client. Click Networking & Security and then click Installation. Click the Host Preparation tab. For each Edge Services & Capacity cluster, click Install in the Installation Status column. Monitor the installation until the Installation Status column displays a green check mark. If the Installation Status column displays a red warning icon and says Not Ready, click Resolve. If the installation is still not successful, click the warning icon. All errors are displayed. Take the required action and click Resolve again. When the installation is complete, the Installation Status column displays 6.0 and the Firewall column displays Enabled. Both columns have a green check mark as well. If you see Resolve in the Installation Status column, click Resolve and then refresh your browser window. 7. Assign Segment ID Pool to NSX Manager: Log in to the vsphere Web Client. Click Networking & Security and then click Installation. Click the Logical Network Preparation tab and then click Segment ID. Click the Edit ( ) icon Type a range for segment IDs. For example, Click OK. 8. Configure VXLAN Transport Parameters: Refer to GUID-2FA9D4DE-56C0-40A4-A085-2FCE502A87B9.html for specific details on VTEPs. For VMware@SoftLayer you will be required to utilize NSX IP Pools for the VTEP IP address assignment method. The IP Addresses should be provided by SoftLayer Portable IP Subnets associated with your VXLAN transport Private Networks. Additionally, those IP addresses must be routable/acl allowed if setting up VTEPs across SoftLayer DataCenters or SoftLayer DataCenter PODs. Page 15 of 21

16 You must ensure you choose the appropriate Teaming Policy when deploying your VTEPs. It is highly recommended to leverage Enhanced LACP on the Distributed Virtual Switches where the VTEPs will be deployed, and Setting the VMKNic Teaming Policy = Enhanced LACP (Figure 9). NSX supports a maximum of 1 VTEP vmk virtual nic per Enhanced LACP LAG. After the afore mentioned steps are completed, a functional NSX Deployment with prepared clusters should now exist at VMware@SoftLayer. Consult com/files/pdf/products/nsx/vmw-nsx-network-virtualization-design-guide.pdf for more information on proper configuration and deployment of other NSX constructs: Transport Zones NSX Edge NSX Distributed Logical Router(s) Firewalls SpoofGuard NSX Services Flow Monitoring Integrated Partner Solutions Figure 8 Page 16 of 21

17 V. Advanced Use Cases A: NSX Logical Switches (VXLAN) Across SoftLayer Pods Figure 9 As discussed in section III of this document, VXLAN based Logical Switches are a core feature of NSX. Logical Switches will allow VMware@SoftLayer tenants the ability to present a consistent Layer 2 broadcast domain/network across SoftLayer Pods. As shown in Figure 9, consider if 2 ESX hosts are provisioned in separate SoftLayer Datacenter Pods. Each host will have a different VLAN or set of VLANs associated with each. The host in Pod 1 has VLAN 1001 presented for VM connectivity traffic. The host in Pod 2 utilizes VLAN NSX Logical Switches allow for multiple hundreds or even thousands of VXLAN based networks to be presented to VMs over these seperate transport VLANs (For a primer on VXLAN please visit The VTEPs (VXLAN Tunnel Endpoints) in Figure 9 encapsulate and forward traffic across Layer 3 routed networks to other VTEPs. When traffic arrives at destination VTEPs, traffic is then un-encapsulated and presented to destination mac addresses at Layer 2. In this way, Logical Switches abstract the various physical SoftLayer Private Networks that may make up a VMware@Soft- Layer deployment and allow Logical Layer 2 networks to be presented to the VMs. As mentioned earlier in this document, this capability is critical when VMware@SoftLayer capacity hosts must cross Pod or Backend Router boundaries at SoftLayer. This design does also offer the capability to stretch Logical switches across SoftLayer Datacenter boundaries, but those scenarios must be carefully planned to ensure proper East West traffic patterns and adequate latency and bandwidth exists between SoftLayer sites for proper performance and throughput. Page 17 of 21

18 B: BYOIP (Bring Your Own IP): Routing Customer Subnets from Figure 10" A common need for tenants leveraging hybrid cloud scenarios with SoftLayer is BYOIP (Bring Your Own IP). This is the ability to push and route tenant IP address blocks over SoftLayer Networks. As of the writing of this document, SoftLayer only routes their own /8 private IP address space over their Private Network Infrastructure. This can present problems for customers who utilize other private RFC address ranges or who also utilize /8 CIDR blocks that have already been assigned to other SoftLayer customers. A common solution to allow tenants to extend their IP Address ranges onto SoftLayer s Private Network is to utilize VPN/ NAT technologies and have the tenant handle routing their IP address space over the SoftLayer Private Network infrastructure. NSX Edge Gateways can provide this function. Consider Figure 10 above: 1. A VMware@Home Deployment leverages the /16 & /8 private RFC ranges in the tenants own production datacenter. The intent is to acquire 2 SoftLayer capacities and Supernet specific private ranges from VMware@Home into the VMware@SoftLayer DataCenters. In Figure 10, NSX can deploy 1 or more NSX Edge devices with private interfaces in those VMware@Home Supernets ( & ). VPNs will be established between the VMware@Home Location and the 2 VMware@SoftLayer DataCenters. 2. There are 2 Primary methods by which a tenant can interconnect their VMware@Home deployments with VMware@SoftLayer. The most performant and secure method is to interconnect through a SoftLayer PoP (Point of Presence This allows for a private & high bandwidth (up to 10 Gbps) connection into SoftLayers backend network. SoftLayer will then negotiate a valid IP address in their /8 address Page 18 of 21

19 range to route tenant traffic through to the tenants SoftLayer Private Networks. In Figure 10, an NSX Edge from has a MPLS Provider assigned IP address of & the VMware@SoftLayer deployment in Dallas has a NSX Edge with a SoftLayer assigned Private IP address of An IPSEC VPN SA and NAT tables are built between the 2 NSX Edge appliances and a tunnel is created to route the desired VMware@Home IP address ranges through the tunnel, and over the SoftLayer IP ranges. For more information on customer PoP connections, contact sales@softlayer.com. 3. The other method by which a tenant can interconnect their VMware@Home deployments with VMware@SoftLayer, is to utilize a VPN over the public internet. This method is similar to the PoP method, but connectivity performance is dependent on public transport as well as being less secure than a private connection. In Figure 10, an NSX Edge from VMware@Home has a public assigned IP address from a telco of The VMware@SoftLayer deployment in Washington DC has a NSX Edge with a SoftLayer assigned Public IP address of An IPSEC VPN SA is built between the 2 NSX Edge appliances and a tunnel is created to route the desired VMware@Home IP address ranges through the tunnel, and over the public Internet. 4. The 2 VPN Tunnels abstract the routing & NAT layer away from the public or SoftLayer/Telco provided IP address ranges. It is important to note, that bandwidth fees to the tenant will apply to both of these methods. In the case of the PoP connection, the tenant s telco will bill a monthly fee for consumed bandwidth and SoftLayer will charge monthly cross connect and backend switch port fees. In the public VPN Scenario, SoftLayer will charge consumed bandwidth over SoftLayer Public Networks. In Figure 10, the /24 & /16 address ranges are being pushed to the SoftLayer Dallas DataCenter, and the /24 & /16 address ranges are being pushed to the SoftLayer Washington D.C. DataCenter through the respective VPNs. 5. In the scenario presented in Figure 10, a 3rd IPSEC SA can be established between the 2 VMware@SoftLayer DataCenters to allow /24 & /16 to route between /24 & /16. In this scenario, that tunnel could also be leverages as a secondary route for VMware@Home to continue to access both SoftLayer Data- Centers in the event of a PoP or Public VPN failure to one of the VMware@SoftLayer sites. It is also important to note that as of this writing, traffic traversing SoftLayer s Private Network Backbone is not metered/billed to a tenant. The high level approach outlined above in Figure 10, demonstrates how NSX Edge can provide a capability of a tenant extending their own IP address space into VMware@SoftLayer. Page 19 of 21

20 C: BYOIP (Bring Your Own IP): BCDR Recovery from Figure 11" Another BYOIP requirement for is the ability to replicate a private network topology for BCDR purposes. In this scenario, Private IP address space is not required to be routed to a VMware@SoftLayer deployment, but intended to allow a VM to recover into VMware@SoftLayer without requiring IP address modification. An example of this is depicted above in Figure 11. In this scenario, a VM has been hosting an application from VMware@Home with a private IP address of It has been replicated to a VMware@SoftLayer SDDC (SoftWare Defined DataCenter), where a NSX Logical Network has been created and a NSX Edge router has been deployed to act as the recovery Gateway ( ). This in effect replicates the core Layer 2 and Layer 3 services of the VMs application network at VMware@Home. In an SRM managed recovery, the VM boots in the VMware@SoftLayer recovery site with no changes to the guest or IP Address. The application is still provided access by use of DNAT of a public IP address at each site, with a GSLB load balancer service directing requests to the recovery site in the event that the primary site is unavailable. This type of recovery scenario is adequate for most web tier based applications and highlights the core function of NSX in replicating the private network components in the recovery site. Page 20 of 21

21 VI. Engaging VMware for To engage VMware for sales & support, please to learn more about the VMware NSX solution, including training and lab resources, documentation, product capabilities, professional certifications, roadmap information, and pre-sales guidance. Additionally, for questions regarding that involve SoftLayer Network Architecture, please contact SoftLayer Sales engineering at Page 21 of 21

NSX Installation and Upgrade Guide

NSX Installation and Upgrade Guide NSX 6.0 for vsphere This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of

More information

Cross-vCenter NSX Installation Guide

Cross-vCenter NSX Installation Guide NSX 6.2 for vsphere This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of

More information

Expert Reference Series of White Papers. vcloud Director 5.1 Networking Concepts

Expert Reference Series of White Papers. vcloud Director 5.1 Networking Concepts Expert Reference Series of White Papers vcloud Director 5.1 Networking Concepts 1-800-COURSES www.globalknowledge.com vcloud Director 5.1 Networking Concepts Rebecca Fitzhugh, VMware Certified Instructor

More information

VXLAN: Scaling Data Center Capacity. White Paper

VXLAN: Scaling Data Center Capacity. White Paper VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where

More information

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea (meclavea@brocade.com) Senior Solutions Architect, Brocade Communications Inc. Jim Allen (jallen@llnw.com) Senior Architect, Limelight

More information

NSX Administration Guide

NSX Administration Guide NSX 6.0 for vsphere This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of

More information

NSX Installation Guide

NSX Installation Guide NSX 6.2 for vsphere This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of

More information

VMware vcloud Air Networking Guide

VMware vcloud Air Networking Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

vcloud Air - Virtual Private Cloud OnDemand Networking Guide

vcloud Air - Virtual Private Cloud OnDemand Networking Guide vcloud Air - Virtual Private Cloud OnDemand Networking Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

VMware NSX Network Virtualization Design Guide. Deploying VMware NSX with Cisco UCS and Nexus 7000

VMware NSX Network Virtualization Design Guide. Deploying VMware NSX with Cisco UCS and Nexus 7000 VMware NSX Network Virtualization Design Guide Deploying VMware NSX with Cisco UCS and Nexus 7000 Table of Contents Intended Audience... 3 Executive Summary... 3 Why deploy VMware NSX on Cisco UCS and

More information

How Network Virtualization can improve your Data Center Security

How Network Virtualization can improve your Data Center Security How Network Virtualization can improve your Data Center Security Gilles Chekroun SDDC, NSX Team EMEA gchekroun@vmware.com 2014 VMware Inc. All rights reserved. Security IT spending Security spending is

More information

NSX TM for vsphere with Arista CloudVision

NSX TM for vsphere with Arista CloudVision ARISTA DESIGN GUIDE NSX TM for vsphere with Arista CloudVision Version 1.0 August 2015 ARISTA DESIGN GUIDE NSX FOR VSPHERE WITH ARISTA CLOUDVISION Table of Contents 1 Executive Summary... 4 2 Extending

More information

NSX Administration Guide

NSX Administration Guide NSX 6.1 for vsphere This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of

More information

VMware. NSX Network Virtualization Design Guide

VMware. NSX Network Virtualization Design Guide VMware NSX Network Virtualization Design Guide Table of Contents Intended Audience... 3 Overview... 3 Components of the VMware Network Virtualization Solution... 4 Data Plane... 4 Control Plane... 5 Management

More information

VMware vcloud Networking and Security Overview

VMware vcloud Networking and Security Overview VMware vcloud Networking and Security Overview Networks and Security for Virtualized Compute Environments WHITE PAPER Overview Organizations worldwide have gained significant efficiency and flexibility

More information

VMware Network Virtualization Design Guide. January 2013

VMware Network Virtualization Design Guide. January 2013 ware Network Virtualization Technical WHITE PAPER January 2013 ware Network Virtualization Table of Contents Intended Audience.... 3 Overview.... 3 Components of the ware Network Virtualization Solution....

More information

Virtualization, SDN and NFV

Virtualization, SDN and NFV Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,

More information

vshield Installation and Upgrade Guide

vshield Installation and Upgrade Guide vshield Manager 5.5 vshield Edge 5.5 vshield Endpoint 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

Analysis of Network Segmentation Techniques in Cloud Data Centers

Analysis of Network Segmentation Techniques in Cloud Data Centers 64 Int'l Conf. Grid & Cloud Computing and Applications GCA'15 Analysis of Network Segmentation Techniques in Cloud Data Centers Ramaswamy Chandramouli Computer Security Division, Information Technology

More information

Extending Networking to Fit the Cloud

Extending Networking to Fit the Cloud VXLAN Extending Networking to Fit the Cloud Kamau WangŨ H Ũ Kamau Wangũhgũ is a Consulting Architect at VMware and a member of the Global Technical Service, Center of Excellence group. Kamau s focus at

More information

CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE

CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE EXECUTIVE SUMMARY This application note proposes Virtual Extensible LAN (VXLAN) as a solution technology to deliver departmental segmentation, business

More information

vshield Administration Guide

vshield Administration Guide vshield Manager 5.1 vshield App 5.1 vshield Edge 5.1 vshield Endpoint 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

vshield Quick Start Guide

vshield Quick Start Guide vshield Manager 5.0 vshield App 5.0 vshield Edge 5.0 vshield Endpoint 5.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

White Paper. Juniper Networks. Enabling Businesses to Deploy Virtualized Data Center Environments. Copyright 2013, Juniper Networks, Inc.

White Paper. Juniper Networks. Enabling Businesses to Deploy Virtualized Data Center Environments. Copyright 2013, Juniper Networks, Inc. White Paper Juniper Networks Solutions for VMware NSX Enabling Businesses to Deploy Virtualized Data Center Environments Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3

More information

VM-Series for VMware. PALO ALTO NETWORKS: VM-Series for VMware

VM-Series for VMware. PALO ALTO NETWORKS: VM-Series for VMware VM-Series for VMware The VM-Series for VMware supports VMware NSX, ESXI stand-alone and vcloud Air, allowing you to deploy next-generation firewall security and advanced threat prevention within your VMware-based

More information

Expert Reference Series of White Papers. VMware vsphere Distributed Switches

Expert Reference Series of White Papers. VMware vsphere Distributed Switches Expert Reference Series of White Papers VMware vsphere Distributed Switches info@globalknowledge.net www.globalknowledge.net VMware vsphere Distributed Switches Rebecca Fitzhugh, VCAP-DCA, VCAP-DCD, VCAP-CIA,

More information

VMware@SoftLayer Cookbook Disaster Recovery (DR)

VMware@SoftLayer Cookbook Disaster Recovery (DR) VMware@SoftLayer Cookbook Disaster Recovery (DR) IBM Global Technology Services: Khoa Huynh (khoa@us.ibm.com) Daniel De Araujo (ddearaujo@us.ibm.com) Bob Kellenberger (kellenbe@us.ibm.com) VMware: Merlin

More information

Multitenancy Options in Brocade VCS Fabrics

Multitenancy Options in Brocade VCS Fabrics WHITE PAPER DATA CENTER Multitenancy Options in Brocade VCS Fabrics As cloud environments reach mainstream adoption, achieving scalable network segmentation takes on new urgency to support multitenancy.

More information

NSX Administration Guide

NSX Administration Guide NSX 6.2 for vsphere This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of

More information

VMware vcloud Networking and Security

VMware vcloud Networking and Security VMware vcloud Networking and Security Efficient, Agile and Extensible Software-Defined Networks and Security BROCHURE Overview Organizations worldwide have gained significant efficiency and flexibility

More information

VMware and Brocade Network Virtualization Reference Whitepaper

VMware and Brocade Network Virtualization Reference Whitepaper VMware and Brocade Network Virtualization Reference Whitepaper Table of Contents EXECUTIVE SUMMARY VMWARE NSX WITH BROCADE VCS: SEAMLESS TRANSITION TO SDDC VMWARE'S NSX NETWORK VIRTUALIZATION PLATFORM

More information

Set Up a VM-Series NSX Edition Firewall

Set Up a VM-Series NSX Edition Firewall Set Up a VM-Series NSX Edition Firewall Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA

More information

CloudLink - The On-Ramp to the Cloud Security, Management and Performance Optimization for Multi-Tenant Private and Public Clouds

CloudLink - The On-Ramp to the Cloud Security, Management and Performance Optimization for Multi-Tenant Private and Public Clouds - The On-Ramp to the Cloud Security, Management and Performance Optimization for Multi-Tenant Private and Public Clouds February 2011 1 Introduction Today's business environment requires organizations

More information

vshield Quick Start Guide vshield Manager 4.1 vshield Edge 1.0 vshield App 1.0 vshield Endpoint 1.0

vshield Quick Start Guide vshield Manager 4.1 vshield Edge 1.0 vshield App 1.0 vshield Endpoint 1.0 vshield Manager 4.1 vshield Edge 1.0 vshield App 1.0 vshield Endpoint 1.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

VM-Series Firewall Deployment Tech Note PAN-OS 5.0

VM-Series Firewall Deployment Tech Note PAN-OS 5.0 VM-Series Firewall Deployment Tech Note PAN-OS 5.0 Revision A 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Supported Topologies... 3 Prerequisites... 4 Licensing... 5

More information

Installing Intercloud Fabric Firewall

Installing Intercloud Fabric Firewall This chapter contains the following sections: Information About the Intercloud Fabric Firewall, page 1 Prerequisites, page 1 Guidelines and Limitations, page 2 Basic Topology, page 2 Intercloud Fabric

More information

Software Defined Network (SDN)

Software Defined Network (SDN) Georg Ochs, Smart Cloud Orchestrator (gochs@de.ibm.com) Software Defined Network (SDN) University of Stuttgart Cloud Course Fall 2013 Agenda Introduction SDN Components Openstack and SDN Example Scenario

More information

Installation Guide Avi Networks Cloud Application Delivery Platform Integration with Cisco Application Policy Infrastructure

Installation Guide Avi Networks Cloud Application Delivery Platform Integration with Cisco Application Policy Infrastructure Installation Guide Avi Networks Cloud Application Delivery Platform Integration with Cisco Application Policy Infrastructure August 2015 Table of Contents 1 Introduction... 3 Purpose... 3 Products... 3

More information

Implementing and Troubleshooting the Cisco Cloud Infrastructure **Part of CCNP Cloud Certification Track**

Implementing and Troubleshooting the Cisco Cloud Infrastructure **Part of CCNP Cloud Certification Track** Course: Duration: Price: $ 4,295.00 Learning Credits: 43 Certification: Implementing and Troubleshooting the Cisco Cloud Infrastructure Implementing and Troubleshooting the Cisco Cloud Infrastructure**Part

More information

Reference Design: Deploying NSX for vsphere with Cisco UCS and Nexus 9000 Switch Infrastructure TECHNICAL WHITE PAPER

Reference Design: Deploying NSX for vsphere with Cisco UCS and Nexus 9000 Switch Infrastructure TECHNICAL WHITE PAPER Reference Design: Deploying NSX for vsphere with Cisco UCS and Nexus 9000 Switch Infrastructure TECHNICAL WHITE PAPER Table of Contents 1 Executive Summary....3 2 Scope and Design Goals....3 2.1 NSX VMkernel

More information

vshield Quick Start Guide

vshield Quick Start Guide vshield Manager 5.0.1 vshield App 5.0.1 vshield Edge 5.0.1 vshield Endpoint 5.0.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

vsphere Networking vsphere 6.0 ESXi 6.0 vcenter Server 6.0 EN-001391-01

vsphere Networking vsphere 6.0 ESXi 6.0 vcenter Server 6.0 EN-001391-01 vsphere 6.0 ESXi 6.0 vcenter Server 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more

More information

Palo Alto Networks. Security Models in the Software Defined Data Center

Palo Alto Networks. Security Models in the Software Defined Data Center Palo Alto Networks Security Models in the Software Defined Data Center Christer Swartz Palo Alto Networks CCIE #2894 Network Overlay Boundaries & Security Traditionally, all Network Overlay or Tunneling

More information

Software Defined Environments

Software Defined Environments November 2015 Software Defined Environments 2015 Cloud Lecture, University of Stuttgart Jochen Breh, Director Architecture & Consulting Cognizant Global Technology Office Agenda Introduction New Requirements

More information

Advanced Security Services with Trend Micro Deep Security and VMware NSX Platforms

Advanced Security Services with Trend Micro Deep Security and VMware NSX Platforms A Trend Micro Technical White Paper June 2015 Advanced Security Services with Trend Micro and VMware NSX Platforms >> This document is targeted at virtualization, security, and network architects interested

More information

Microsegmentation Using NSX Distributed Firewall: Getting Started

Microsegmentation Using NSX Distributed Firewall: Getting Started Microsegmentation Using NSX Distributed Firewall: VMware NSX for vsphere, release 6.0x REFERENCE PAPER Table of Contents Microsegmentation using NSX Distributed Firewall:...1 Introduction... 3 Use Case

More information

Data Center Infrastructure of the future. Alexei Agueev, Systems Engineer

Data Center Infrastructure of the future. Alexei Agueev, Systems Engineer Data Center Infrastructure of the future Alexei Agueev, Systems Engineer Traditional DC Architecture Limitations Legacy 3 Tier DC Model Layer 2 Layer 2 Domain Layer 2 Layer 2 Domain Oversubscription Ports

More information

Nutanix Tech Note. VMware vsphere Networking on Nutanix

Nutanix Tech Note. VMware vsphere Networking on Nutanix Nutanix Tech Note VMware vsphere Networking on Nutanix Nutanix Virtual Computing Platform is engineered from the ground up for virtualization and cloud environments. This Tech Note describes vsphere networking

More information

vsphere Basic Site Reference Architecture!

vsphere Basic Site Reference Architecture! A VMware@SoftLayer CookBook v1.1 March 12, 2014 vsphere Basic Site Reference Architecture Author(s) & Contributor(s) (IBM) Merlin Glynn, mglynn@us.ibm.com Robert Kellenberger Shane B. Mcelligott Daniel

More information

HAWAII TECH TALK SDN. Paul Deakin Field Systems Engineer

HAWAII TECH TALK SDN. Paul Deakin Field Systems Engineer HAWAII TECH TALK SDN Paul Deakin Field Systems Engineer SDN What Is It? SDN stand for Software Defined Networking SDN is a fancy term for: Using a controller to tell switches where to send packets SDN

More information

Software-Defined Networks Powered by VellOS

Software-Defined Networks Powered by VellOS WHITE PAPER Software-Defined Networks Powered by VellOS Agile, Flexible Networking for Distributed Applications Vello s SDN enables a low-latency, programmable solution resulting in a faster and more flexible

More information

VMware NSX for vsphere (NSX-V) Network Virtualization Design Guide

VMware NSX for vsphere (NSX-V) Network Virtualization Design Guide VMware NSX for vsphere (NSX-V) Network Virtualization Design Guide DESIGN GUIDE / 1 Intended Audience... 4 Overview... 4 Introduction to Network Virtualization... 5 Overview of NSX-v Network Virtualization

More information

Set Up a VM-Series Firewall on an ESXi Server

Set Up a VM-Series Firewall on an ESXi Server Set Up a VM-Series Firewall on an ESXi Server Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara,

More information

CONNECTING PHYSICAL AND VIRTUAL WORLDS WITH VMWARE NSX AND JUNIPER PLATFORMS

CONNECTING PHYSICAL AND VIRTUAL WORLDS WITH VMWARE NSX AND JUNIPER PLATFORMS White Paper CONNECTING PHYSICAL AND VIRTUAL WORLDS WITH WARE NSX AND JUNIPER PLATFORMS A Joint Juniper Networks-ware White Paper Copyright 2014, Juniper Networks, Inc. 1 Connecting Physical and Virtual

More information

(R)Evolution im Software Defined Datacenter Hyper-Converged Infrastructure

(R)Evolution im Software Defined Datacenter Hyper-Converged Infrastructure (R)Evolution im Software Defined Datacenter Hyper-Converged Infrastructure David Kernahan Senior Systems Engineer VMware Switzerland GmbH 2014 VMware Inc. All rights reserved. Agenda 1 VMware Strategy

More information

Virtual Data Centre. User Guide

Virtual Data Centre. User Guide Virtual Data Centre User Guide 2 P age Table of Contents Getting Started with vcloud Director... 8 1. Understanding vcloud Director... 8 2. Log In to the Web Console... 9 3. Using vcloud Director... 10

More information

About the VM-Series Firewall

About the VM-Series Firewall About the VM-Series Firewall Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 http://www.paloaltonetworks.com/contact/contact/

More information

Set Up a VM-Series NSX Edition Firewall

Set Up a VM-Series NSX Edition Firewall Set Up a VM-Series NSX Edition Firewall Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.1 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA

More information

Set Up a VM-Series NSX Edition Firewall

Set Up a VM-Series NSX Edition Firewall Set Up a VM-Series NSX Edition Firewall Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.1 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA

More information

vsphere Networking vsphere 5.5 ESXi 5.5 vcenter Server 5.5 EN-001074-02

vsphere Networking vsphere 5.5 ESXi 5.5 vcenter Server 5.5 EN-001074-02 vsphere 5.5 ESXi 5.5 vcenter Server 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more

More information

Business Values of Network and Security Virtualization

Business Values of Network and Security Virtualization Business Values of Network and Security Virtualization VMware NSX in the context of the Software Defined Data Center Klaus Jansen Virtual Networks Sales Specialist VMware NSBU 2014 VMware Inc. All rights

More information

Lecture 02b Cloud Computing II

Lecture 02b Cloud Computing II Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,

More information

SDN v praxi overlay sítí pro OpenStack. 5.10.2015 Daniel Prchal daniel.prchal@hpe.com

SDN v praxi overlay sítí pro OpenStack. 5.10.2015 Daniel Prchal daniel.prchal@hpe.com SDN v praxi overlay sítí pro OpenStack 5.10.2015 Daniel Prchal daniel.prchal@hpe.com Agenda OpenStack OpenStack Architecture SDN Software Defined Networking OpenStack Networking HP Helion OpenStack HP

More information

vsphere Networking ESXi 5.0 vcenter Server 5.0 EN-000599-01

vsphere Networking ESXi 5.0 vcenter Server 5.0 EN-000599-01 ESXi 5.0 vcenter Server 5.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions

More information

Scalable Approaches for Multitenant Cloud Data Centers

Scalable Approaches for Multitenant Cloud Data Centers WHITE PAPER www.brocade.com DATA CENTER Scalable Approaches for Multitenant Cloud Data Centers Brocade VCS Fabric technology is the ideal Ethernet infrastructure for cloud computing. It is manageable,

More information

On-Demand Infrastructure with Secure Networks REFERENCE ARCHITECTURE

On-Demand Infrastructure with Secure Networks REFERENCE ARCHITECTURE REFERENCE ARCHITECTURE Table of Contents Executive Summary.... 3 Audience.... 3 Overview.... 3 What Is an On-Demand Infrastructure?.... 4 Architecture Overview.... 5 Cluster Overview.... 8 Management Cluster...

More information

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com 1 Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com Agenda Cloud Computing VMware and Security Network Security Use Case Securing View Deployments Questions 2 IT consumption

More information

Security in the Software Defined Data Center

Security in the Software Defined Data Center Security in the Software Defined Data Center Francesco Vigo Senior Systems Engineer, VMware fvigo@vmware.com Ugo Piazzalunga Technical Manager, SafeNet ugo.piazzalunga@safenet-inc.com Agenda Software Defined

More information

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud Rob Randell, CISSP Principal Systems Engineer Security Specialist Agenda What is the Cloud? Virtualization Basics

More information

How To Build A Software Defined Data Center

How To Build A Software Defined Data Center Delivering the Software Defined Data Center Georgina Schäfer Sr. Product Marketing Manager VMware Calvin Rowland, VP, Business Development F5 Networks 2014 VMware Inc. All rights reserved. F5 & Vmware

More information

VMDC 3.0 Design Overview

VMDC 3.0 Design Overview CHAPTER 2 The Virtual Multiservice Data Center architecture is based on foundation principles of design in modularity, high availability, differentiated service support, secure multi-tenancy, and automated

More information

Data Center Network Virtualisation Standards. Matthew Bocci, Director of Technology & Standards, IP Division IETF NVO3 Co-chair

Data Center Network Virtualisation Standards. Matthew Bocci, Director of Technology & Standards, IP Division IETF NVO3 Co-chair Data Center Network Virtualisation Standards Matthew Bocci, Director of Technology & Standards, IP Division IETF NVO3 Co-chair May 2013 AGENDA 1. Why standardise? 2. Problem Statement and Architecture

More information

VMUG - vcloud Air Deep Dive. 2014 VMware Inc. All rights reserved.

VMUG - vcloud Air Deep Dive. 2014 VMware Inc. All rights reserved. VMUG - vcloud Air Deep Dive 2014 VMware Inc. All rights reserved. Agenda 1 Overview of vcloud Air 2 Advanced Networking Capabilities 3 Use Cases 4 Overview of Disaster Recovery Service 5 Questions 2 VMware

More information

Stretched Active- Active Application Centric Infrastructure (ACI) Fabric

Stretched Active- Active Application Centric Infrastructure (ACI) Fabric Stretched Active- Active Application Centric Infrastructure (ACI) Fabric May 12, 2015 Abstract This white paper illustrates how the Cisco Application Centric Infrastructure (ACI) can be implemented as

More information

Set Up a VM-Series Firewall on the Citrix SDX Server

Set Up a VM-Series Firewall on the Citrix SDX Server Set Up a VM-Series Firewall on the Citrix SDX Server Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.1 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa

More information

Set Up a VM-Series Firewall on an ESXi Server

Set Up a VM-Series Firewall on an ESXi Server Set Up a VM-Series Firewall on an ESXi Server Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.1 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara,

More information

Intro to NSX. Network Virtualization. 2014 VMware Inc. All rights reserved.

Intro to NSX. Network Virtualization. 2014 VMware Inc. All rights reserved. Intro to NSX Network Virtualization 2014 VMware Inc. All rights reserved. Agenda Introduction NSX Overview Details: Microsegmentation NSX Operations More Information SDDC/Network Virtualization Security

More information

VMware Software Defined Network. Dejan Grubić VMware Systems Engineer for Adriatic

VMware Software Defined Network. Dejan Grubić VMware Systems Engineer for Adriatic VMware Software Defined Network Dejan Grubić VMware Systems Engineer for Adriatic The Transformation of Infrastructure Infrastructure Servers Clouds Be more responsive to business, change economics of

More information

VXLAN Overlay Networks: Enabling Network Scalability for a Cloud Infrastructure

VXLAN Overlay Networks: Enabling Network Scalability for a Cloud Infrastructure W h i t e p a p e r VXLAN Overlay Networks: Enabling Network Scalability for a Cloud Infrastructure Table of Contents Executive Summary.... 3 Cloud Computing Growth.... 3 Cloud Computing Infrastructure

More information

SOFTWARE-DEFINED NETWORKING AND OPENFLOW

SOFTWARE-DEFINED NETWORKING AND OPENFLOW SOFTWARE-DEFINED NETWORKING AND OPENFLOW Freddie Örnebjär TREX Workshop 2012 2012 Brocade Communications Systems, Inc. 2012/09/14 Software-Defined Networking (SDN): Fundamental Control

More information

Aerohive Networks Inc. Free Bonjour Gateway FAQ

Aerohive Networks Inc. Free Bonjour Gateway FAQ Aerohive Networks Inc. Free Bonjour Gateway FAQ 1. About the Product... 1 2. Installation... 2 3. Management... 3 4. Troubleshooting... 4 1. About the Product What is the Aerohive s Free Bonjour Gateway?

More information

Network Virtualization for the Enterprise Data Center. Guido Appenzeller Open Networking Summit October 2011

Network Virtualization for the Enterprise Data Center. Guido Appenzeller Open Networking Summit October 2011 Network Virtualization for the Enterprise Data Center Guido Appenzeller Open Networking Summit October 2011 THE ENTERPRISE DATA CENTER! Major Trends change Enterprise Data Center Networking Trends in the

More information

STRATEGIC WHITE PAPER. The next step in server virtualization: How containers are changing the cloud and application landscape

STRATEGIC WHITE PAPER. The next step in server virtualization: How containers are changing the cloud and application landscape STRATEGIC WHITE PAPER The next step in server virtualization: How containers are changing the cloud and application landscape Abstract Container-based server virtualization is gaining in popularity, due

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Virtual Machine Manager Domains

Virtual Machine Manager Domains This chapter contains the following sections: Cisco ACI VM Networking Supports Multiple Vendors' Virtual Machine Managers, page 1 VMM Domain Policy Model, page 2 Virtual Machine Manager Domain Main Components,

More information

Transform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure

Transform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure White Paper Transform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure What You Will Learn The new Cisco Application Centric Infrastructure

More information

vcloud Director User's Guide

vcloud Director User's Guide vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of

More information

Data Center Use Cases and Trends

Data Center Use Cases and Trends Data Center Use Cases and Trends Amod Dani Managing Director, India Engineering & Operations http://www.arista.com Open 2014 Open Networking Networking Foundation India Symposium, January 31 February 1,

More information

vcloud Air Advanced Networking Services Guide

vcloud Air Advanced Networking Services Guide vcloud Air Advanced Networking Services Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

VMware vcloud Air - Disaster Recovery User's Guide

VMware vcloud Air - Disaster Recovery User's Guide VMware vcloud Air - Disaster Recovery User's Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

Network Virtualization

Network Virtualization Network Virtualization What is Network Virtualization? Abstraction of the physical network Support for multiple logical networks running on a common shared physical substrate A container of network services

More information

Securing the Virtualized Data Center With Next-Generation Firewalls

Securing the Virtualized Data Center With Next-Generation Firewalls Securing the Virtualized Data Center With Next-Generation Firewalls Data Center Evolution Page 2 Security Hasn t Kept Up with Rate Of Change Configuration of security policies are manual and slow Weeks

More information

Network Virtualization Solutions

Network Virtualization Solutions Network Virtualization Solutions An Analysis of Solutions, Use Cases and Vendor and Product Profiles October 2013 The Independent Community and #1 Resource for SDN and NFV Tables of Contents Introduction

More information

Roman Hochuli - nexellent ag / Mathias Seiler - MiroNet AG

Roman Hochuli - nexellent ag / Mathias Seiler - MiroNet AG Roman Hochuli - nexellent ag / Mathias Seiler - MiroNet AG North Core Distribution Access South North Peering #1 Upstream #1 Series of Tubes Upstream #2 Core Distribution Access Cust South Internet West

More information

VMware Virtual SAN 6.2 Network Design Guide

VMware Virtual SAN 6.2 Network Design Guide VMware Virtual SAN 6.2 Network Design Guide TECHNICAL WHITE PAPER APRIL 2016 Contents Intended Audience... 2 Overview... 2 Virtual SAN Network... 2 Physical network infrastructure... 3 Data center network...

More information

Data Center Virtualization and Cloud QA Expertise

Data Center Virtualization and Cloud QA Expertise Data Center Virtualization and Cloud QA Expertise Highlights Broad Functional QA Experience Deep understanding of Switching and Routing Protocols Strong hands on experience in multiple hyper-visors like

More information

VMware vcloud Air. Enterprise IT Hybrid Data Center TECHNICAL MARKETING DOCUMENTATION

VMware vcloud Air. Enterprise IT Hybrid Data Center TECHNICAL MARKETING DOCUMENTATION TECHNICAL MARKETING DOCUMENTATION October 2014 Table of Contents Purpose and Overview.... 3 1.1 Background............................................................... 3 1.2 Target Audience...........................................................

More information

vcloud Air Disaster Recovery Technical Presentation

vcloud Air Disaster Recovery Technical Presentation vcloud Air Disaster Recovery Technical Presentation Agenda 1 vcloud Air Disaster Recovery Overview 2 What s New 3 Architecture 4 Setup and Configuration 5 Considerations 6 Automation Options 2 vcloud Air

More information

Reference to common tasks

Reference to common tasks APPENDIXA This section provides how-to information for common tasks that you need to know how to do before you can effectively work with the vcom Command Center. Creating and editing domains Working with

More information

Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide. Revised February 28, 2013 2:32 pm Pacific

Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide. Revised February 28, 2013 2:32 pm Pacific Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide Revised February 28, 2013 2:32 pm Pacific Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide

More information