Vmware NSX® Network Virtualization Fundamentals
Total Page:16
File Type:pdf, Size:1020Kb
VMware NSX® Network Virtualization Fundamentals Gustavo A. A. Santana, VCIX-NV® and CCIE® 8806 Foreword by Pat Gelsinger VMware NSX® Network Virtualization Fundamentals Gustavo A. A. Santana, VCIX-NV® and CCIE® 8806 Foreword by Pat Gelsinger VMWARE PRESS Program Managers Katie Holms Shinie Shaw Technical Writer Rob Greanias Graphics Manager Sappington Production Manager Sappington Warning & Disclaimer Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information provided is on an “as is” basis. The authors, VMware Press, VMware, and the publisher shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book. The opinions expressed in this book belong to the author and are not necessarily those of VMware. VMware, Inc. 3401 Hillview Avenue Palo Alto CA 94304 USA Tel 877-486-9273 Fax 650-427-5001 www.vmware.com. Copyright © 2017 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. VMware products are covered by one or more patents listed at http://www.vmware.com/go/patents. VMware is a registered trademark or trademark of VMware, Inc. and its subsidiaries in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. Table of Contents About the Technical Reviewer ...............................................................................XII Foreword ....................................................................................................................... XVI Introduction .................................................................................................................. XX Chapter 1 - What is Network Virtualization? ........................................................1 Virtualization as the New Reality ...............................................................................2 The Server Virtualization Revolution ...................................................................... 4 Virtualization in Network Technologies ................................................................ 8 Defining Network Virtualization ...............................................................................16 VMware NSX Architecture .........................................................................................23 What Did This Chapter Achieve? ............................................................................27 Chapter 2 - Rethinking Network Constructs ................................................... 29 Layer 2 Connectivity .................................................................................................... 30 Provisioning VLANs ........................................................................................................31 Introducing Logical Switches .................................................................................. 34 Layer 3 Connectivity ....................................................................................................40 Introducing Distributed Logical Routing ........................................................... 43 Starting to Get Physical ...............................................................................................45 Living on the Edge .........................................................................................................47 Edge Routing ................................................................................................................... 48 Network Address Translation ...................................................................................53 Server Load Balancing .................................................................................................56 Introducing Logical Load Balancing .....................................................................59 Other Interesting Edge Network Features ....................................................... 64 What Did This Chapter Achieve? ............................................................................65 Chapter 3 - Virtualization as a Security Control............................................. 67 The Evolution of Firewalls .......................................................................................... 68 Statefulness Defined .................................................................................................... 69 Application Firewalls and Next-Generation Firewalls ......................................................................................... 70 Demilitarized Zone ..........................................................................................................71 Classic Data Center Security Designs ..................................................................72 Anatomy of a Modern Cyber Attack.....................................................................75 The Zero Trust Model ....................................................................................................77 A Real World Analogy: Secure Airport ...............................................................77 Introducing the VMware NSX Distributed Firewall .............................................................................................79 VMware NSX Security Partners Integration ......................................................83 Security On-Demand: Service Composer .........................................................85 Identity Firewall .............................................................................................................. 88 Micro-Segmentation Defined .................................................................................. 89 Edge Firewall ....................................................................................................................90 | V Security-Based Virtual Private networks ...........................................................92 IPsec VPN with VMware NSX ...................................................................................93 SSL VPN-Plus with VMware NSX ...........................................................................95 Other Interesting VMware NSX Security Features .................................................................................................97 SpoofGuard ........................................................................................................................97 Endpoint Monitoring and Application Rule Manager ......................................................................................... 98 What Did This Chapter Achieve? ........................................................................... 98 Chapter 4 - Virtual Networks, Real Extensions ..............................................101 The Evolution of Secondary Sites ........................................................................102 The Cold Site ...................................................................................................................103 The Warm Site ............................................................................................................... 104 The Hot-Backup Site ...................................................................................................105 The Virtualized Hot Site .............................................................................................107 The Active Site ...............................................................................................................108 Networking Challenges in Active-Standby Sites ..............................................................................................110 VMware NSX for Active-Standby Sites .............................................................. 112 Networking Challenges in Active-Active Sites ................................................................................................... 116 Spanning Tree Protocol and Failure Domains ......................................................................................................117 Layer 2 Extension and Traffic Behavior.............................................................120 Provisioning Complexity ........................................................................................... 123 VMware NSX for Active-Active Sites .................................................................. 125 Layer 2 VPNs ................................................................................................................... 127 What Did This Chapter Achieve? ..........................................................................130 Chapter 5 - Industrializing Networks .................................................................133 Automating IT .................................................................................................................134 Pre-Provisioned Networks ....................................................................................... 137 Challenges and Limitations ..................................................................................... 140 Automating Physical Networks ............................................................................ 140 Example of an Automated Network Topology ........................................................................................................ 142 Challenges and Limitations ......................................................................................144