Learning VMware NSX - Sample Chapter
Learning VMware NSX - Sample Chapter
ee
$ 39.99 US
25.99 UK
P U B L I S H I N G
pl
e
P r o f e s s i o n a l
Sa
E x p e r t i s e
D i s t i l l e d
P U B L I S H I N G
Preface
Networking is the most critical component of any IT architecture. Architects always
want to lay the right foundations of networks and solve networking issues before
the computation and storage is looked at. This is why I have always felt the need
to have a better understanding of networking and how things work.
Network virtualization technology allowed me to have a behind-the-scenes,
hands-on look at how networking works and the concepts that made it happen.
The ability to deploy virtual appliances such as switches, load balancers, and routers
and examine their functionality was very appealing. The pace at which I learned
network virtualization (NSX) gave me the confidence to grow in a field in which
I thought I lacked significant knowledge. Through my journey, I understood that
network virtualization not only made me think like a network engineer, but also
made me apply networking concepts very creatively to a virtualized environment,
and this made it all the more appealing. What was complex before, now became
extremely simple.
In 2015, I went about giving presentations at multiple VMUG UserCon sessions
all around the country. My presentation was on Getting started with VMware NSX Basics and Best Practices. Here, my aim was not to talk about what NSX can do but to
talk about how easy it was to get started with NSX and also to squash some common
misconceptions about it. I wasn't sure whether this was a topic worth talking about
and wasn't expecting a large crowd. (My time slot to present was right after lunch,
which wasn't very encouraging.)
Soon, I was proved wrong. In each and every city where I gave my presentations,
all of my sessions had a full audience. People were eager to know how to get started
with NSX and in fact, preferred this presentation to any of the other VMware NSX
presentations happening at the same conference. I was able to quickly identify the
huge knowledge gap and the plethora of common misconceptions about NSX and
network virtualization, in general. I also observed that many of the attendees were
network administrators with an interest in network virtualization.
Preface
This feedback from the tech community gave me a desire to write a book that
covers the basics and teaches how to get started with NSX. I want to connect to the
day-to-day administrator and the network engineer who is wondering how all the
dots connect, and this is something I am passionate about. The book explains the
basics and covers the deployment of the various features of network virtualization
in simple and clear language and with screenshots that allow you to visualize
the workflow as you read. I did have to work around a page restriction set by the
publisher, so I focused on the most commonly used or sought-after features in the
book even though I covered all of the NSX features and functionality. The audience
feedback from various conferences helped me greatly.
I hope you enjoy working with this book and that it helps you to learn to use and
understand NSX and network virtualization.
Preface
Chapter 6, Data Security, discusses one of the most important capabilities of NSX, its
security, and also discusses the different NSX security offerings. We will discuss and
learn how to set up security groups and configure them by mapping a security group
to a specific policy. You will also learn briefly about the network extensibility feature
of NSX.
Chapter 7, Monitoring, looks at how to enable monitoring for our environment using
NSX. Activity monitoring is one of the features of NSX that is a boon for network
and system administrators. You will learn how to configure it along with generating
a virtual machine activity report. You will also learn about flow monitoring and
Traceflow, which can simulate and allow you to test the network.
Chapter 8, Managing NSX, talks about NSX administrative tasks such as backup and
restore and NSX Manager settings. We will revisit NSX Manager and explore all
the different settings that can be set. We will look at setting up syslog, time, and
DNS settings. We will also look at taking controller snapshots as well. We will also
have a look at the setup of our NSX Manager with CA signed certificates along with
configuring NSX with a domain.
Chapter 9, Conclusion, is the concluding chapter that includes important information
and links
An Introduction to Network
Virtualization
This chapter begins with a brief introduction to Network Virtualization followed
by an overview of its concepts. We then introduce VMware's NSX-V Network
Virtualization solution that allows you to deploy and manage your own softwaredefined networking stack. We will go over all the features and services of NSX
followed by its configuration maximums. By the end of this chapter, you will have a
thorough understanding of the concepts of Network Virtualization and NSX-V as a
Network Virtualization solution.
In this chapter, we will cover the following:
If you have worked in a datacenter, you would agree that networking is always
challenging to work with. Once the networking design is established, any changes
that need to be made are always challenging because of a lack of flexibility due to
increasing complexity and demands on the environment. While compute and storage
have rapidly improved on their speed of deployment and consumption, networking
continues to remain a challenge in today's environments where simple tasks, such as
creating a new VLAN, are becoming increasingly complex and time-consuming.
A metaphor: Today's networking is similar to building roads
and highways in a city. Once you have the highways and roads
established, it is not easy to expand them or simply remove and
replace them without affecting the city or the traffic. You always have
to think forward and have to build to handle future growth and have
the flexibility to expand and maintain. Similarly, traditional networks
in a datacenter have to be built to handle future growth and should
be flexible enough to allow for changes as they happen.
[2]
Chapter 1
Data Plane: The networking hardware forms the data plane where all the
data is forwarded from source to destination. The management of data
resides in the control plane; however, the data plane consists of all the
networking hardware whose primary function is to forward traffic over the
wire from source to destination. The data plane holds all the forwarding
tables that are constantly updated by the control plane. This also prevents
any traffic interruptions if there is a loss of the control plane because the
networking hardware, which constitutes the data plane, will continue to
function without interruptions.
VMware now has two flavors of NSX: NSX-V and NSX-MH. NSX-V is NSX
for VMware-based hypervisor, while NSX-Multi Hypervisor (NSX-MH) is for
OpenStack environments. The two versions have many similarities but are also
dissimilar in some aspects. This book covers only the NSX-VMware (NSX-V)
version of NSX. NSX-V will be referred to as NSX in the rest of the book.
[3]
The following figure represents the software abstraction of the physical network
and networking hardware by NSX. This is synonymous with how VMware vSphere
hypervisor achieves the software abstraction of CPU, memory, and storage that
makes it possible to create multiple virtual machines.
Similar to how the vSphere hypervisor allows you to create, delete, take a snapshot
of, and monitor a virtual machine, NSX also allows you to programmatically create,
delete, take a snapshot of, and monitor a virtual network. NSX can be deployed on
your current physical network infrastructure and does not require you to upgrade
your existing infrastructure. Lastly, NSX deployment is not disruptive to your
existing network and traffic. It can be seamlessly deployed on top of your existing
infrastructure, and the consumption of its services can take place in conjunction
with your traditional network.
Chapter 1
[5]
The features listed previously enable NSX to offer a wide variety of services that can
be applied to your infrastructure. These services can be deployed and configured by
the NSX API as well. Some of the NSX services are listed as follows:
Load balancer NSX Edge offers a variety of services, and logical load
balancer is one of them. The logical load balancer distributes incoming
requests among multiple servers to allow load distribution while abstracting
this functionality from end users. The logical load balancer can also be used
as a high availability (HA) mechanism to ensure that your application has
the most uptime.
Virtual Private Networks (VPN): The Edge offers a VPN service that allows
you to provision a secure encrypted connectivity for end users to your
applications and workloads. The Edge VPN service offers SSL-VPN plus that
allows user access and IPSEC site-to-site connectivity that allows two sites
to be interconnected securely.
Domain Name System (DNS): NSX Edge offers a DNS relay service that can
relay any DNS requests to an external DNS server.
Other NSX features include cross-vCenter networking and security, which allows
you to manage multiple vCenter NSX environments using a primary NSX manager.
This not only permits a centralized management, but also extends one or more
services and features across multiple vCenter environments. We will discuss more
about cross vCenter networking in the upcoming chapters.
[6]
Chapter 1
The following table shows the limits for NSX vCenter Maximums:
Description
Limit
vCenters
NSX Managers
DRS Clusters
12
NSX Controllers
32
256
A Transport Zone defines the scope of a logical switch and can span one or more
vSphere clusters. We will discuss this in greater detail in the upcoming chapters.
The following table shows the limits for Switching Maximums:
Description
Limit
Logical Switches
10,000
50,000
500
[7]
The following table shows the limits for Distributed Logical Firewall Maximums:
Description
Limit
100,000
Rules per VM
1,000
10,000
2,000,000
10,000
The following table shows the limits for Distributed Logical Router (DLR)
Maximums:
Description
Limit
1,000
1,200
999
2,000
12,000
10
10
Open Shortest Path First (OSPF) and Border Gateway Protocol (BGP)
are routing protocols.
The following table shows the limits for NSX Edge Services Gateway (ESG)
Maximums:
Description
Limit
2,000
10
Sub-interfaces on a trunk
200
2,000
2,048
[8]
Chapter 1
The following table shows the limits for Edge Services Gateway Compact
Maximums:
Description
Limit
20,000
10
10
20,000
20,000
64,000
The following table shows the limits for Edge Services Gateway Large Maximums:
Description
Limit
50,000
20
20
50,000
50,000
1,000,000
The following table shows the limits for Edge Services Gateway X-Large
Maximums:
Description
Limit
100,000
40
50
250,000
250,000
1,000,000
[9]
The following table shows the limits for Edge Services Gateway Quad-Large
Maximums:
Description
Limit
100,000
40
50
250,000
250,000
1,000,000
The following table shows the limits for Edge Services Gateway Overall
Maximums:
Description
Limit
64
64
32
2,000
The following table shows the limits for DHCP: VPN Service Maximums:
Description
Limit
20,000
512
1,600
4,096
6,000
50/100/100/1000
[ 10 ]
Chapter 1
The following table shows the limits for Multi-vCenter NSX Supported Features:
Description
Limit
Logical Switch
Yes
L2 Bridges
No
Yes
Distributed Firewall
Yes
Edge Services
No
IP Security Groups
Yes
Summary
We started this chapter with an introduction to Network Virtualization and
software-defined networking. We discussed the concepts of Network virtualization
and introduced VMware's NSX Network virtualization platform. Then we discussed
different NSX features and services, including logical switching, logical routing, edge
gateway services, extensibility, service composer, and data security. Also, we briefly
discussed the multi vCenter NSX feature. We ended the chapter with configuration
maximums for NSX.
In the next chapter, we will discuss the core components that make up NSX. We will
learn more about VXLAN architecture, Transport Zones and NSX Edge Gateways.
[ 11 ]
www.PacktPub.com
Stay Connected: