Introduction |
|
xvii | |
|
Chapter 1 Abstracting Network and Security |
|
|
1 | (14) |
|
|
1 | (3) |
|
|
2 | (1) |
|
|
3 | (1) |
|
Inefficient Resource Allocation |
|
|
3 | (1) |
|
The Long Road to Provisioning |
|
|
3 | (1) |
|
|
4 | (2) |
|
|
4 | (1) |
|
|
5 | (1) |
|
|
6 | (2) |
|
|
6 | (1) |
|
What Is Happening in There? |
|
|
6 | (2) |
|
|
8 | (1) |
|
|
8 | (5) |
|
Extending Visualization to Storage |
|
|
9 | (1) |
|
Virtual Networking and Security |
|
|
9 | (1) |
|
|
10 | (3) |
|
|
13 | (2) |
|
Chapter 2 NSX Architecture and Requirements |
|
|
15 | (24) |
|
NSX Network Visualization |
|
|
16 | (8) |
|
|
16 | (2) |
|
NSX Manager Role and Function |
|
|
18 | (1) |
|
|
19 | (1) |
|
|
20 | (1) |
|
vSphere Distributed Switch |
|
|
21 | (2) |
|
|
23 | (1) |
|
Competitive Advantage: IOChain |
|
|
24 | (6) |
|
IOChain Security Features |
|
|
24 | (1) |
|
|
25 | (1) |
|
NSX Controller Clustering |
|
|
26 | (1) |
|
|
26 | (2) |
|
|
28 | (2) |
|
|
30 | (1) |
|
NSX Role-Based Access Control |
|
|
30 | (6) |
|
Overlay and Underlay Networks |
|
|
32 | (2) |
|
Replication Modes for Traffic Going to Multiple Destinations |
|
|
34 | (2) |
|
|
36 | (3) |
|
|
39 | (22) |
|
NSX Manager Prerequisites |
|
|
39 | (5) |
|
Open Ports and Name Resolution |
|
|
40 | (1) |
|
Minimum Resource Requirements for NSX Data Center Appliances |
|
|
40 | (1) |
|
|
41 | (2) |
|
IP Addressing and Port Groups |
|
|
43 | (1) |
|
Installing the Client Integration Plug-in |
|
|
44 | (1) |
|
|
44 | (7) |
|
Associating NSX Manager to vCenter |
|
|
46 | (1) |
|
|
47 | (4) |
|
Linking Multiple NSX Managers Together (Cross-vCenter NSX) |
|
|
51 | (5) |
|
Multi-site Consistency with Universal Components |
|
|
51 | (2) |
|
Primary and Secondary NSX Managers |
|
|
53 | (1) |
|
Preparing ESXi Clusters for NSX |
|
|
54 | (2) |
|
Creating a Universal Transport Zone on the Primary NSX Manager |
|
|
56 | (3) |
|
vSphere Distributed Switches Membership |
|
|
57 | (1) |
|
Adding Secondary NSX Managers |
|
|
58 | (1) |
|
|
59 | (2) |
|
Chapter 4 Distributed Logical Switch |
|
|
61 | (26) |
|
vSphere Standard Switch (vSS) |
|
|
62 | (5) |
|
|
63 | (1) |
|
Understanding Port Groups |
|
|
64 | (1) |
|
|
65 | (1) |
|
|
66 | (1) |
|
Virtual Distributed Switch (vDS) |
|
|
67 | (1) |
|
Virtual extensible LANs (VXLANs) |
|
|
68 | (3) |
|
Employing Logical Switches |
|
|
71 | (2) |
|
Three Tables That Store VNI Information |
|
|
73 | (6) |
|
Collecting VNI Information |
|
|
74 | (1) |
|
|
75 | (1) |
|
|
76 | (3) |
|
We Might as Well Talk about ARP Now |
|
|
79 | (4) |
|
Filling In the L2 and L3 Headers |
|
|
79 | (2) |
|
|
81 | (2) |
|
Understanding Broadcast, Unknown Unicast, and Multicast |
|
|
83 | (2) |
|
|
83 | (1) |
|
|
83 | (1) |
|
Deploying Logical Switches |
|
|
84 | (1) |
|
Creating a Logical Switch |
|
|
85 | (1) |
|
|
85 | (2) |
|
Chapter 5 Marrying VLANs and VXLANs |
|
|
87 | (20) |
|
Shotgun Wedding: Layer 2 Bridge |
|
|
87 | (16) |
|
|
88 | (1) |
|
|
89 | (1) |
|
|
90 | (12) |
|
|
102 | (1) |
|
|
102 | (1) |
|
|
103 | (1) |
|
Hardware Switches to the Rescue |
|
|
103 | (2) |
|
|
103 | (1) |
|
|
104 | (1) |
|
|
104 | (1) |
|
|
105 | (2) |
|
Chapter 6 Distributed Logical Router |
|
|
107 | (30) |
|
Distributed Logical Router (DLR) |
|
|
107 | (1) |
|
|
108 | (9) |
|
Logical Router Control Virtual Machine |
|
|
108 | (3) |
|
Understanding DLR Efficiency |
|
|
111 | (4) |
|
Another Concept to Consider |
|
|
115 | (2) |
|
Let's Get Smart about Routing |
|
|
117 | (8) |
|
|
119 | (1) |
|
Border Gateway Protocol (BGP) |
|
|
120 | (3) |
|
|
123 | (2) |
|
Deploying Distributed Logical Routers |
|
|
125 | (9) |
|
|
134 | (3) |
|
Chapter 7 NFV: Routing with NSX Edges |
|
|
137 | (26) |
|
Network Function Virtualization: NSX Has It Too |
|
|
137 | (3) |
|
|
138 | (1) |
|
|
139 | (1) |
|
Let's Do Routing Like We Always Do |
|
|
140 | (16) |
|
Deploying the Edge Services Gateway |
|
|
144 | (7) |
|
|
151 | (3) |
|
|
154 | (1) |
|
Configuring Static Routes |
|
|
155 | (1) |
|
Routing with the DLR and ESG |
|
|
156 | (4) |
|
|
156 | (1) |
|
Default Behaviors to Be Aware Of |
|
|
157 | (1) |
|
Equal Cost Multi-Path Routing |
|
|
157 | (3) |
|
|
160 | (3) |
|
Chapter 8 More NVF: NSX Edge Services Gateway |
|
|
163 | (40) |
|
|
163 | (1) |
|
Network Address Translation |
|
|
164 | (7) |
|
|
166 | (1) |
|
Configuring Destination NAT |
|
|
166 | (1) |
|
Configuring SNAT on the ESG |
|
|
167 | (2) |
|
Configuring DNAT on the ESG |
|
|
169 | (2) |
|
|
171 | (2) |
|
Configuring an ESG Load Balancer |
|
|
173 | (5) |
|
Layer 2 VPN (If You Must) |
|
|
178 | (1) |
|
Secure Sockets Layer Virtual Private Network |
|
|
179 | (8) |
|
|
180 | (1) |
|
|
180 | (7) |
|
Internet Protocol Security VPN |
|
|
187 | (3) |
|
Understanding NAT Traversal |
|
|
188 | (1) |
|
Configuring IPsec Site-to-Site VPN with the ESG |
|
|
188 | (2) |
|
Round Up of Other Services |
|
|
190 | (10) |
|
|
191 | (1) |
|
Configuring the ESG as a DHCP Server |
|
|
192 | (2) |
|
|
194 | (2) |
|
Configuring the DLR for DHCP Relay |
|
|
196 | (2) |
|
|
198 | (1) |
|
Configuring DNS Relay on the ESG |
|
|
199 | (1) |
|
|
200 | (3) |
|
Chapter 9 NSX Security, the Money Maker |
|
|
203 | (20) |
|
Traditional Router ACL Firewall |
|
|
203 | (1) |
|
I Told You about the IOChain |
|
|
204 | (6) |
|
Slot 2: Distributed Firewall |
|
|
206 | (1) |
|
|
207 | (3) |
|
|
210 | (8) |
|
Segregating Firewall Rules |
|
|
214 | (1) |
|
|
215 | (1) |
|
Gratuitous ARP Used in ARP Poisoning Attacks |
|
|
216 | (2) |
|
Why Is My Traffic Getting Blocked? |
|
|
218 | (2) |
|
Great, Now It's Being Allowed |
|
|
219 | (1) |
|
Identity Firewall: Rules Based on Who Logs In |
|
|
220 | (1) |
|
Distributing Firewall Rules to Each ESXi Host: What's Happening? |
|
|
220 | (3) |
|
|
222 | (1) |
|
Chapter 10 Service Composer and Third-Party Appliances |
|
|
223 | (24) |
|
|
224 | (12) |
|
|
225 | (1) |
|
|
226 | (1) |
|
|
226 | (1) |
|
Defining a Security Group through Static Inclusion |
|
|
227 | (2) |
|
Defining a Security Group through Dynamic Inclusion |
|
|
229 | (2) |
|
Customizing a Security Group with Static Exclusion |
|
|
231 | (1) |
|
Defining a Security Group Using Security Tags |
|
|
231 | (2) |
|
|
233 | (3) |
|
|
236 | (2) |
|
IOChain, the Gift that Keeps on Giving |
|
|
236 | (1) |
|
Layer 7 Stuff: Network Introspection |
|
|
236 | (1) |
|
|
237 | (1) |
|
Service Insertion Providers |
|
|
238 | (1) |
|
|
239 | (6) |
|
|
239 | (4) |
|
|
243 | (2) |
|
|
245 | (2) |
|
Chapter 11 vRealize Automation and REST APIs |
|
|
247 | (32) |
|
vRealize Automation Features |
|
|
247 | (2) |
|
|
249 | (1) |
|
|
250 | (11) |
|
vRealize Automation Endpoints |
|
|
250 | (2) |
|
Associating NSX Manager with vRealize Automation |
|
|
252 | (1) |
|
|
253 | (2) |
|
vRA External, Routed, and NAT Network Profiles |
|
|
255 | (3) |
|
|
258 | (3) |
|
vRealize Orchestrator Workflows |
|
|
261 | (10) |
|
Creating a Blueprint for One Machine |
|
|
261 | (3) |
|
Adding NSX Workflow to a Blueprint |
|
|
264 | (1) |
|
Creating a Request Service in the vRA Catalog |
|
|
265 | (3) |
|
Configuring an Entitlement |
|
|
268 | (3) |
|
Deploying a Blueprint that Consumes NSX Services |
|
|
271 | (2) |
|
|
273 | (4) |
|
|
275 | (1) |
|
NSX REST API POST Request |
|
|
275 | (1) |
|
NSX REST API DELETE Request |
|
|
276 | (1) |
|
|
277 | (2) |
|
|
279 | (14) |
|
Chapter 1 Abstracting Network and Security |
|
|
279 | (1) |
|
Chapter 2 NSX Architecture and Requirements |
|
|
280 | (1) |
|
|
280 | (1) |
|
Chapter 4 Distributed Logical Switch |
|
|
281 | (2) |
|
Chapter 5 Marrying VLANs and VXLANs |
|
|
283 | (1) |
|
Chapter 6 Distributed Logical Router |
|
|
284 | (2) |
|
Chapter 7 NFV: Routing with NSX Edges |
|
|
286 | (1) |
|
Chapter 8 More NVF: NSX Edge Services Gateway |
|
|
287 | (2) |
|
Chapter 9 NSX Security, the Money Maker |
|
|
289 | (1) |
|
Chapter 10 Service Composer and Third-Party Appliances |
|
|
290 | (1) |
|
Chapter 11 vRealize Automation and REST APIs |
|
|
291 | (2) |
Index |
|
293 | |