NSX-V 6.2 introduced the Cross-NSX feature to allow for NSX logical networking and security across multiple vCenter domains. The ability to apply consistent networking and security across vCenter domains provides for mulitple use cases for Cross-VC NSX: workload mobility, resource pooling, multi-site security, ease of automation across sites, and disaster avoidance/recovery. With the recent release of NSX-V 6.3, several enhancements have been added to the Cross-VC NSX feature to provide for additional capabilities and overall robustness of the solution. In this blog post I’ll discuss the new Cross-VC NSX security enhancements in NSX-V 6.3. For additional information on Cross-VC NSX check-out my prior Cross-VC NSX blog posts.
The security enhancements for Cross-VC NSX can be grouped into two categories:
Active/Active and Active/Standby above refers to if the application is active at both sites or if it is active at one site and standby at another site (ex: disaster recovery). Enhancements for both of these respective categories are discussed in more detail below.
1.) General Enhancements (Apply Across both Active/Active and Active/Standby deployment models)
Figure 1: Cross-VC NSX Active/Standby and Continue reading
What's Pensando working on? Not hard to guess
The post Worth Reading: Dynamics on emerging spaces appeared first on 'net work.
But couldn't Cisco have spent less than $3.7B? Questions remain.
The Packet Pushers explore the next chapter of SDN evolution with Big Switch founder Kyle Forster in this sponsored episode, including how SDN can make networks more resilient and responsive. The post Show 326: Big Switch & The Next Chapter Of SDN (Sponsored) appeared first on Packet Pushers.
Service providers can white-label WING and sell to enterprises.