Introduction to VMware NSX - Use Cases and Key Features

In this post we'll be discussing about NSX, including it's use cases and key features, which will help us to make informed decisions about our design, deployment, configuration and continued successful operation of NSX.


Automation Use Cases

  • Automating IT: Automation allows for quick, secure and automatic deployment of applications and services
  • Developer Cloud: Automation enables developers to use a unified API for on-demand networking and security services.
  • Multi-tenant Infrastructure: Automation empowers organizations to provision and deliver networking and security services to multiple tenants on a shared infrastructure


Security Use Cases

VMware NSX embeds security functions right in the hypervisor. It delivers micro-segmentation and detailed security to the individual workload, enabling a fundamentally more secure data center. Security policies travel with the workloads, independently of where workloads are in the network topology.
  • Micro-Segmentation: NSX enables specific firewalling and security policy enforcement for every workload in the data center, independent of the network topology and complexity.
  • DMZ Anywhere: NSX enables security and advanced services to be dynamically assigned to workloads, independent of the underlying physical network.
  • Secure End User: Micro-segmentation allows NSX to give each desktop it's own perimeter defense and per-app VPN access form mobile devices, eliminating unauthorized access between adjacent workloads.


Application Continuity Use Cases

  • Disaster Recovery: Completely synchronizes network and security configuration to a recovery site for rapid recovery in the event of disaster.
  • Metro Pooling: Creates a unified, seamless and resilient networking pool and security infrastructure to run your applications.
  • Hybrid Cloud Networking: Moves applications and workloads seamlessly between data centers and public cloud.


Compliance Use Cases

NSX enables a zero-trust security model inside data centers and clouds:
  • Security by Design: Micro-segmentation allows for detailed security down to the VM vNIC
  • Minimized Risk: Security groups allow for building adaptive, application-centric security policies in which VMs will land and be available as soon as they are provisioned.
  • Full Visibility and Context: NSX provides visibility across application infrastructure and end points, enabling the validation of configuration and real-time state against regulatory controls.
  • Third-Party Integration: NSX dynamically responds to threat and runtime circumstances, including context provided from a third-party security partners.
  • Regulatory Compliance: Enables organizations to meet their obligations.



Learn more about VMware NSX here






Comments

Popular posts from this blog

Specifying SSH port in Ansible Inventory

Ansible-Playbook to display output of multiple show commands (using stdout_lines with Loop)

Filtering Routes in BGP using Route-maps and Prefix-list

Ansible Playbook for Network OS Upgrade with pre and post checks

Bypassing Proxy Server in Google Chrome

VMware NSX Traffic Flow — East-West & North-South

Export or Backup Azure Network Security Groups into CSV using PowerShell

Ansible-playbook for backing up running config of Cisco IOS