NSX-T: Routing where you need it (Part 2, North-South Routing)

posted

In the first part of this blog series, NSX-T: Routing where you need it (Part 1), I discussed how East-West (E-W) routing is completely distributed on NSX-T and how routing is done by the Distributed Router (DR) running as a kernel module in each hypervisor.  In this post, I will explain how North-South (N-S) routing Read more...
VMC on AWS

VMware SDDC with NSX Expands to AWS

posted

I prior shared this post on the LinkedIN publishing platform and my personal blog at HumairAhmed.com. There has been a lot of interest in the VMware Cloud on AWS  (VMC on AWS) service since its announcement and general availability. Writing this brief introductory post, the response  received confirmed the interest and value consumers see in Read more...

Top 5 From The Last 3 Months

posted

  In the year 2017, news comes at you fast. So, it’s easy to miss the important or informational items that just weren’t on your radar when they first arrived. While we believe VMware NSX should be firmly on everyone’s virtualization radar, we understand that you may miss a few items from time to time. Read more...

NSX-T: Routing where you need it (Part 1)

posted

  Network virtualization has come a long way. NSX has played a key role in redefining and modernizing networking in a datacenter. Providing an optimal routing path for the traffic has been one of the topmost priorities of Network Architects. Thanks to NSX distributed routing, the routing between different subnets on a ESXi hypervisor can Read more...
Figure 2: VDI with NSX-V Providing for Enhanced Security Services

VMware NSX-V: Security for VxRAIL Hyper-Converged Solutions

posted

Check-out the new white paper on leveraging NSX-V for security within the VxRAIL hyper-converged platform. The paper outlines how VxRAIL hyper-converged solutions leveraging NSX-V for security solves many of the security challenges with traditional silo-based architectures. A brief outline is provided below. Make sure to checkout the white paper for additional details.  Read more...

Transforming IT Security in Three Key Steps

posted

Several years ago, the CEO of a Fortune 100 company remarked: “If you went to bed last night as an industrial company, you’re going to wake up this morning as a software and analytics company.” Today, these words are more true than ever—but so is the reality that the digital transformation in business has also Read more...