SlideShare una empresa de Scribd logo
1 de 42
Descargar para leer sin conexión
NSX PCI Reference Architecture Workshop Session 3
- Operational Efficiencies
Allen Shortnacy, VMware
SEC5837
#SEC5837
2
Operational Efficiencies
3
About Operational Efficiencies
 Cloud and SDDC have evolved from IT silos including security and compliance
• ITSM, ITIL and other mature processes will need to evolve with the SDDC
• Impact of network and storage virtualization siloes will require more bi-directional
interaction from legacy infrastructure teams
 Policies and Procedures regarding security and compliance will also change
• Understanding how different solutions interact with the platform and each other to
accommodate compliance becomes a must not just for design but also operations
• Due to the nature of the SDDC, workloads under regulatory compliance become
untethered from the physical topology but require coherent, near real time logging and
correlation strategy to understand inter-layer impact of events
 Building and revising SDDC architectures will become SDLC like
• Opportunities to take out OPEX and operate at greater scale on the VI Admin/workload
ratio are many and with demonstrable ROI
• Will require some new skill sets like DevOps to automate APIs and generate new task
oriented interfaces
4
Security and Compliance Challenges in the SDDC
Cumbersome Provisioning
Complicated deployment and
troubleshooting processes make it difficult
to maintain service levels for security.
Manual, Cross-Service Workflows
Security and cloud admins volley back and
forth to identify, assess, plan, implement
security risks…a very inefficient process.
Policy ≠ Operations
Security and Compliance are roadblocks to
cloud but expecting security architects to
manage cloud operations is unrealistic and
unfair. Architects design define policy.
Operators implement.
Security
Architect
✔ ?
5
5
Compliance Challenges: Many Systems - Dashboards of Wonder
Vulnerability
Mgmt System
Antivirus
System
Firewall
vCenter
IDS System
DLP System
6
Four Steps to Gaining Operational Efficiencies in the SDDC
 Define and Manage Partner Solutions from NSX Service Composer
• Deploy and monitor partner solutions and their availability
• Define parameters for inter-operating NSX and Partner Solutions
• Create NSX and Partner Services Policies that can be re-used across trust zones
 Leverage integration of NSX and Partner Solutions for Workflows
• Creating common tags across NSX and Partner solutions allows for broader
administrative activities formerly accomplished through error prone ‘swivel chair’
 Discover SDDC processes that are manual but repeatable, with little variation
• Leverage REST APIs and development toolkit such as Puppet, Chef or vCenter
Orchestrator to automate tasks
• Reduce ‘swivel chair’ operations across consoles providing greater scale or complete
end to end automation with logging for utility computing approach
 Abstract SDDC Security and Compliance Policies into self-service governance
• Declare at deploy time the requirements for an application with regards to regulations
7
Function
 Service Composer enables
creation of partner services
 Service Composer templates
provide reusable methods for
distributed policy management
Usage
NSX Service Composer
 Define Security Services
 Define settings for services
 Apply to new trust zones
 Monitor for readiness
Step 1: Managing NSX and Partner Solutions w/ Service Composer
NSX and NSX Partner Solutions are integrated for deployment,
initialization and definition of common parameters
vSphere and
Partner console
already
deployed
Install
vShield
Manager
Install
vShield
Endpoint
Register
Endpoint
with VC
Add VC
to Partner
Console
Install
required
drivers on
hosts
Deploy
Partner
SVA
Activate
Partner
SVA
Activate
VMs
Start
managing
security
policies
Challenge – Security Product Provisioning in Cloud Infrastructure
• Remains Complex
• Unclear Ownership
• Lack of SLAs
VI Admin Security
Admin
*vShield Endpoint example
9
Troubleshooting Security Services Requires Considerable Back
and Forth Between Virtual Admins and Security Admins
 If a service goes down, where do
you start with troubleshooting
steps? Security solution or
Virtualization solution?
 What if there was a configuration
change in the infrastructure that
caused an outage? How could this
change be determined?
10
NSX Service Composer Provisioning
Compute Management Gateway
Host Prep
 Install Kernel Modules -
VXLAN, Distributed
Router and Distributed
FW
 Simple One Click install
per Cluster
 All modules installed
together
1
Logical Network Prep
 Configure VTEP IP, MTU,
Teaming per cluster
 Create Transport Zones
(Network Scope)
2
Deploy Controller
 Simple UI in VSM deploys
Controller OVF and
configures it
 No other configuration
required!
 Min 3-Node controller
required for HA
3
Register Services
 Log in!
 Some services are pre-
registered (Data Security,
Identity, Trend Micro,
Rapid 7, McAfee )
 Register Symantec
Antivirus Solution
 Register Symantec IPS
Solution
4
Deploy Services
 Some services are pre-
deployed (Data Security,
Identity)
 Deploy Symantec
Antivirus solution
5
Partner Mgmt.
Consoles
Registered
Troubleshooting Services
 Power off or suspend data
security VM
 Observe failure message
and root cause
 Initiate ‘resolve’ (repair)
 Observe progress and
final status
6
11
NSX Service Composer: Security Ready for Consumption
Security Groups
WHAT you want to
protect
Members: VM, vNIC, network
(virtual/Logical Switch, physical),
Distributed Virtual PG, cluster, data
center, Resource Pool, vApp, other
container, IP address, MAC
Context: User identity, sensitive
data, security posture
HOW you want to
protect it
Services: Firewall, antivirus,
intrusion prevention, vulnerability
management and more.
Profiles: Security policies from
VMware and third-party solutions
that are defined by the security
architect but implemented by the
cloud operator.
APPLY
12
Step 2 : Establish Workflow Integration between NSX and Partner
NSX and Partner Solutions are integrate by APIs either by making
direct calls to NSX or by setting machine metadata
SG: Web Servers
VSM F/W
Services
SG: Quarantine
VSM F/W
Services
Function
 Service Composer enables
creation of ‘Tags’ for integrating
Partner Solutions
 NSX and Partner Solutions
leverage one another
Usage
NSX Service Composer
 Define Security Groups
 Define Tags for dynamic
inclusion in NSX Security
Groups
 Define Partner Solution Tags to
be set
13
Demo: Orchestrating Security Between Multiple Products
14
Step 3: NSX RESTful Automation
NSX provides REST APIs which means you can create, delete or
manipulate NSX SDDC constructs with HTTP POST and GET
Function
 Identify repeatable NSX
Provisioning or Config tasks
 Determine target integration
types and choose dev toolkit
Usage
NSX REST APIs
 Unit test functionality with HTTP
tools (curl, Firefox RESTclient)
 Integrate into larger scope
processes with vCenter
Orchestrator, etc.
15
Most Requested Deployment Models for Multi-Tiered Apps
Multi-tiered app,
Multiple networks
Multi-tiered app,
single network
APP
DATABASE
WEB
WEB APP DATABASE
16
Most Requested Network and Security Services
NSX provides built-in, logical networks and services to
address the most common (and challenging) requests for
cloud service automation.
Firewall
Networks
(switches)
Load Balancer Router
17
Deployment Tools, Process, Best Practices
Package
Catalog
Packaging
Factory
VMware Cloud Application Deployment Toolkit - Details
Enterprise
ISVs
CustomersDeploy Factory
(Managed
Service Providers)
1. Packaging Factory
A “factory” for producing
reusable, Cloud-ready
deployment packages for the
most popular business apps
3. Deploy Factory
A controller to download
packages, provision secured
deployment environment and
orchestrate automated
deployment of the application
2. Package Catalog
Cloud based, access
controlled repository to store
application packages
18
Deployment Tools, Process, Best Practices
Package
Catalog
Packaging
Factory
How Does this Work – Packaging Factory
Enterprise
ISVs
CustomersDeploy Factory
(Managed
Service Providers)
vFabric Application Director
Chef & VMware Studio
Subversion Server
Build Controller
Application Blueprint
Cookbook
Node Template
• Packaging factory infrastructure
consists of subversion server,
VMware Studio, vFabric
Application Director and Chef
Application• Application binaries remain
unchanged
• Deployment information is
captured in various levels of
details in application blue prints,
node templates and deployment
scripts (cook books)
19
Deployment Tools, Process, Best Practices
Package
Catalog
Packaging
Factory
How Does this Work – Package Catalog
Enterprise
ISVs
CustomersDeploy Factory
(Managed
Service Providers)
• An application package is
uploaded to a cloud based
repository
• Service provider gets access
to the repository using an
access-controlled portal
• Application package is
downloaded into service
provider’s cloud
20
Deployment Tools, Process, Best Practices
Package
Catalog
Packaging
Factory
How Does this Work – Deploy Factory
Enterprise
ISVs
CustomersDeploy Factory
(Managed
Service Providers)
vFabric Application Director
vCloud Director
VMware Studio & Chef
Deployment Controller
vApp
• Deploy Factory infrastructure
consists of vCloud Director, vFabric
Application Director, VMware Studio,
Chef and Deployment Controller
Virtual Network
• (Optional) Create private network
to place application into
• vApp(s) are deployed in the target
environment
• Application is installed via
Application Blueprints
• Each node is configured using Chef
VM VM VM
21
Demo: RESTful Automation of NSX Edge Deployment
22
Step 4: Use NSX Automation in Self-Service Provisioning
NSX metadata exposed in vCAC Self-Service Catalog allows for
declarative binding of network and services policies such as Firewall
Request 3-tiered app
Request network and services
Function
 vCloud Automation Center self-
service provisioning
 NSX dynamic policy profile
inclusion
Usage
vCloud Automation Center
 New workload request
 Bind to NSX Networks and
Services
23
vCloud Automation Center Policy Management
Business
Groups
B
A
C
USERS
A
C
B
A
Authentication &
Role-Based
Authorization
Authorized
Users
Resource
Reservations
Cost Profile
A
Tier 1
Public
Physical
Virtual
Shared Infrastructure
Service
Blueprints
A
Requisition
Cost Profile
Provision
Manage
Retire
Public
Physical
Virtual
C
B
B
A
B
A
C
BA
24
vCloud Automation Center Extensibility Spectrum
Flexibility without Complexity
25
Where We Are Today
Create On-
Demand
Leverage Existing
Infrastructure
APP
DATABASE
WEB
Requires
customization
Pre-Created, Logical Networks
Apps can be spun up on-demand using logical networks that have already been
created. Creating logical networks in advance is still more agile than
provisioning physical networks.
APP DATABASEWEB
26
Where We Are Today
Create On-
Demand
Leverage Existing
Infrastructure
APP
DATABASE
WEB
Requires
customization
Networks Explicitly Assigned
App blueprints may require networks with NAT, routed, or private connectivity.
Admin must directly specify network information.
APP DATABASEWEB
NAT
Network
A.B.C.#X.Y.Z.#
Routed
Network A.B.C.#
A.B.C.#
27
Where We Are Today
Create On-
Demand
Leverage Existing
Infrastructure
Requires
customization
Pre-created, Firewall Rules
Apps can be added to existing security groups.
APP
DATABASE
WEB
WEB
APP DATABASE
28
Where We Are Today
Create On-
Demand
Leverage Existing
Infrastructure
Requires
customization
Pre-created, Load Balancer Pool
Apps can be added to existing load balancer pools.
APP
DATABASE
WEB WEB
APP DATABASEServices
Edge
(Load Balancer)
Services
Edge
(Load Balancer)
29
Discovery of vCNS Resources and Policies
VM VM VM
VM VM VM
VM
VM VM
Resources Policies
► Clone Templates
► Customization Spec.
► Host/Host Clusters
► CPU, Memory, Storage,
► Networking
vCNS
Manager VXLANs
► Security Groups► VXLANs
► Load Balancers
PoliciesResources
Managed
Endpoint
VMware
vCenter
Add a vCNS Manager address and
credentials to a vSphere (vCenter)
Endpoint definition
30
Reserving vCNS Resources for Each Group
• VXLANs appear as
network paths
in resource reservations
• Security Groups, Load
Balancers
− Can be specified as custom
properties on the reservation
or on the blueprint
VXLANs can be reserved by
Provisioning Group
31
Configuring Service Blueprints to Leverage vCNS
VCAC Blueprint Custom Properties define the
Load Balancer and Security Groups, that will be associated
with the Machine being provisioned.
32
Future Direction
Create On-
Demand
Leverage Existing
Infrastructure
APP
DATABASE
WEB
WEB
APP DATABASE
Services
Edge
(Load Balancer)
Requires
customization
Services
Edge
(Load Balancer)
Cloud Automation + Network Virtualization
Spin up and tear down logical networks and services as needed, to deliver
application infrastructure on-demand.
33
Future Direction
Create On-
Demand
Leverage Existing
Infrastructure
Requires
customization
On-Demand Networks
Multi-machine blueprints can create new VMs and place them on networks
created on-demand using NSX (or vCloud Networking and Security). These
networks can be torn down once app lease times are up.
APP
DATABASE
WEB
WEB APP DATABASE
Logical
Router
Logical
Router
34
Future Direction
Create On-
Demand
Leverage Existing
Infrastructure
Requires
customization
Network Profiles
Take the guesswork out of requesting networks (IP addressing, connectivity) by
PRIVATE
NAT
ROUTED
35
Future Direction
Create On-
Demand
Leverage Existing
Infrastructure
Requires
customization
On-Demand Load Balancer
Blueprint admins or power users can create new load balancer services using
new or existing Edge gateways.
APP
DATABASE
WEB WEB
APP DATABASEServices
Edge
(Load Balancer)
Services
Edge
(Load Balancer)
36
Firewall Rules
Multi Network Model
Use security group to isolate entire app,
virtual firewall to control traffic between tiers.
Flat Network Model
Use security groups to isolate entire app and
app tiers, virtual firewall to control all traffic.
Distributed
Virtual
Firewall
Distributed
Virtual
Firewall
App firewall rules are consumed by placing workloads in existing security
groups. NSX security administrator should pre-create these groups with
necessary firewall rules.
37
Summary – Value Achieved via Operational Efficiencies
 Single interface to manage deployment and enablement of NSX and Partner
Solutions taking out many manual steps previously required
• Automates not only previously manual steps but also error prone handoff between roles
 NSX Service Composer to design and plan for orchestration of events and
actions by integrating NSX and Partner Solutions via ‘Tags’
• Rather than pivot between interfaces to respond to events NSX Service Composer and
Partner Solutions integrate to leverage one another in a prescribed manner
 NSX RESTful APIs enable automation of repeatable tasks taking out OPEX
• Can be part of a larger orchestration or put into a workflow set of task oriented screens
 vCloud Automation Center provides policy driven governance and entitlement
• Attach required policies to vCAC provisioning process by leveraging NSX Networks and
NSX Services by assigning ‘Tags’ to deployed workloads
That which can be Automated can be Easily Measured!
38
VMworld: Security and Compliance Sessions
Category Topic
NSX
• 5318: NSX Security Solutions In Action (201)
• 5753: Dog Fooding NSX at VMware IT (201)
• 5828: Datacenter Transformation (201)
• 5582: Network Virtualization across Multiple Data Centers (201)
NSX Firewall
• 5893: Economies of the NSX Distributed Firewall (101)
• 5755: NSX Next Generation Firewalls (201)
• 5891: Build a Collapsed DMZ Architecture (301)
• 5894: NSX Distributed Firewall (301)
NSX Service
Composer
• 5749: Introducing NSX Service Composer (101)
• 5750: NSX Automating Security Operations Workflows (201)
• 5889: Troubleshooting and Monitoring NSX Service Composer (301)
Compliance
• 5428: Compliance Reference Architecture Framework Overview (101)
• 5624: Accelerate Deployments – Compliance Reference Architecture (Customer Panel) (201)
• 5253: Streamlining Compliance (201)
• 5775: Segmentation (301)
• 5820: Privileged User Control (301)
• 5837: Operational Efficiencies (301)
Other
• 5589: Healthcare Customer Case Study: Maintaining PCI, HIPAA and HITECH Compliance in
Virtualized Infrastructure (Catbird – Jefferson radiology)
• 5178: Motivations and Solution Components for enabling Trusted Geolocation in the Cloud - A
Panel discussion on NIST Reference Architecture (IR 7904). (Intel and HyTrust)
• 5546: Insider Threat: Best Practices and Risk Mitigation techniques that your VMware based
IaaS provider better be doing! (Intel)
39
For More Information…
 VMware Collateral
 VMware Approach to Compliance
 VMware Solution Guide for PCI
 VMware Architecture Design Guide for PCI
 VMware QSA Validated Reference Architecture PCI
 Partner Collateral
 VMware Partner Solution Guides for PCI
How to Engage?
 compliance-solutions@vmware.com
 @VMW_Compliance on Twitter
THANK YOU
NSX PCI Reference Architecture Workshop Session 3
- Operational Efficiencies
Allen Shortnacy, VMware
SEC5837
#SEC5837

Más contenido relacionado

La actualidad más candente

Business Agility and Security with VMware
Business Agility and Security with VMwareBusiness Agility and Security with VMware
Business Agility and Security with VMwareAngel Villar Garea
 
VMworld 2016: Advanced Network Services with NSX
VMworld 2016: Advanced Network Services with NSXVMworld 2016: Advanced Network Services with NSX
VMworld 2016: Advanced Network Services with NSXVMworld
 
VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...
VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...
VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...VMworld
 
VMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesVMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesAngel Villar Garea
 
VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...
VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...
VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...VMworld
 
VMworld 2016: How to Deploy VMware NSX with Cisco Infrastructure
VMworld 2016: How to Deploy VMware NSX with Cisco InfrastructureVMworld 2016: How to Deploy VMware NSX with Cisco Infrastructure
VMworld 2016: How to Deploy VMware NSX with Cisco InfrastructureVMworld
 
VMworld 2014: Virtualize your Network with VMware NSX
VMworld 2014: Virtualize your Network with VMware NSXVMworld 2014: Virtualize your Network with VMware NSX
VMworld 2014: Virtualize your Network with VMware NSXVMworld
 
VMUGbe 21 Filip Verloy
VMUGbe 21 Filip VerloyVMUGbe 21 Filip Verloy
VMUGbe 21 Filip VerloyFilip Verloy
 
VMworld 2013: VMware NSX Extensibility: Network and Security Services from 3r...
VMworld 2013: VMware NSX Extensibility: Network and Security Services from 3r...VMworld 2013: VMware NSX Extensibility: Network and Security Services from 3r...
VMworld 2013: VMware NSX Extensibility: Network and Security Services from 3r...VMworld
 
VMworld 2014: Introduction to NSX
VMworld 2014: Introduction to NSXVMworld 2014: Introduction to NSX
VMworld 2014: Introduction to NSXVMworld
 
NSX 9 Core Use Cases
NSX 9 Core Use CasesNSX 9 Core Use Cases
NSX 9 Core Use CasesKevin Groat
 
VMworld Europe 2014: Advanced Network Services with NSX
VMworld Europe 2014: Advanced Network Services with NSXVMworld Europe 2014: Advanced Network Services with NSX
VMworld Europe 2014: Advanced Network Services with NSXVMworld
 
Scaling Your SDDC Network: Building a Highly Scalable SDDC Infrastructure wit...
Scaling Your SDDC Network: Building a Highly Scalable SDDC Infrastructure wit...Scaling Your SDDC Network: Building a Highly Scalable SDDC Infrastructure wit...
Scaling Your SDDC Network: Building a Highly Scalable SDDC Infrastructure wit...Kristoffer Sheather
 
The Future of Cloud Networking is VMware NSX
The Future of Cloud Networking is VMware NSXThe Future of Cloud Networking is VMware NSX
The Future of Cloud Networking is VMware NSXScott Lowe
 
VMworld 2015: The Future of Network Virtualization with VMware NSX
VMworld 2015: The Future of Network Virtualization with VMware NSXVMworld 2015: The Future of Network Virtualization with VMware NSX
VMworld 2015: The Future of Network Virtualization with VMware NSXVMworld
 
VMware NSX primer 2014
VMware NSX primer 2014VMware NSX primer 2014
VMware NSX primer 2014Sanjay Basu
 
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...Anthony Burke
 
VMware NSX + Cumulus Networks: Software Defined Networking
VMware NSX + Cumulus Networks: Software Defined NetworkingVMware NSX + Cumulus Networks: Software Defined Networking
VMware NSX + Cumulus Networks: Software Defined NetworkingCumulus Networks
 
Self service it with v realizeautomation and nsx
Self service it with v realizeautomation and nsxSelf service it with v realizeautomation and nsx
Self service it with v realizeautomation and nsxsolarisyougood
 

La actualidad más candente (20)

Business Agility and Security with VMware
Business Agility and Security with VMwareBusiness Agility and Security with VMware
Business Agility and Security with VMware
 
VMworld 2016: Advanced Network Services with NSX
VMworld 2016: Advanced Network Services with NSXVMworld 2016: Advanced Network Services with NSX
VMworld 2016: Advanced Network Services with NSX
 
VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...
VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...
VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...
 
VMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesVMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use cases
 
VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...
VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...
VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...
 
VMworld 2016: How to Deploy VMware NSX with Cisco Infrastructure
VMworld 2016: How to Deploy VMware NSX with Cisco InfrastructureVMworld 2016: How to Deploy VMware NSX with Cisco Infrastructure
VMworld 2016: How to Deploy VMware NSX with Cisco Infrastructure
 
VMworld 2014: Virtualize your Network with VMware NSX
VMworld 2014: Virtualize your Network with VMware NSXVMworld 2014: Virtualize your Network with VMware NSX
VMworld 2014: Virtualize your Network with VMware NSX
 
VMUGbe 21 Filip Verloy
VMUGbe 21 Filip VerloyVMUGbe 21 Filip Verloy
VMUGbe 21 Filip Verloy
 
VMworld 2013: VMware NSX Extensibility: Network and Security Services from 3r...
VMworld 2013: VMware NSX Extensibility: Network and Security Services from 3r...VMworld 2013: VMware NSX Extensibility: Network and Security Services from 3r...
VMworld 2013: VMware NSX Extensibility: Network and Security Services from 3r...
 
VMworld 2014: Introduction to NSX
VMworld 2014: Introduction to NSXVMworld 2014: Introduction to NSX
VMworld 2014: Introduction to NSX
 
NSX 9 Core Use Cases
NSX 9 Core Use CasesNSX 9 Core Use Cases
NSX 9 Core Use Cases
 
VMworld Europe 2014: Advanced Network Services with NSX
VMworld Europe 2014: Advanced Network Services with NSXVMworld Europe 2014: Advanced Network Services with NSX
VMworld Europe 2014: Advanced Network Services with NSX
 
Scaling Your SDDC Network: Building a Highly Scalable SDDC Infrastructure wit...
Scaling Your SDDC Network: Building a Highly Scalable SDDC Infrastructure wit...Scaling Your SDDC Network: Building a Highly Scalable SDDC Infrastructure wit...
Scaling Your SDDC Network: Building a Highly Scalable SDDC Infrastructure wit...
 
The Future of Cloud Networking is VMware NSX
The Future of Cloud Networking is VMware NSXThe Future of Cloud Networking is VMware NSX
The Future of Cloud Networking is VMware NSX
 
VMworld 2015: The Future of Network Virtualization with VMware NSX
VMworld 2015: The Future of Network Virtualization with VMware NSXVMworld 2015: The Future of Network Virtualization with VMware NSX
VMworld 2015: The Future of Network Virtualization with VMware NSX
 
VMware NSX primer 2014
VMware NSX primer 2014VMware NSX primer 2014
VMware NSX primer 2014
 
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...
 
VMware NSX + Cumulus Networks: Software Defined Networking
VMware NSX + Cumulus Networks: Software Defined NetworkingVMware NSX + Cumulus Networks: Software Defined Networking
VMware NSX + Cumulus Networks: Software Defined Networking
 
Self service it with v realizeautomation and nsx
Self service it with v realizeautomation and nsxSelf service it with v realizeautomation and nsx
Self service it with v realizeautomation and nsx
 
nsx overview with use cases 1.0
nsx overview with use cases 1.0nsx overview with use cases 1.0
nsx overview with use cases 1.0
 

Destacado

PCI-DSS Compliant Cloud - Design & Architecture Best Practices
PCI-DSS Compliant Cloud - Design & Architecture Best PracticesPCI-DSS Compliant Cloud - Design & Architecture Best Practices
PCI-DSS Compliant Cloud - Design & Architecture Best PracticesHyTrust
 
Getting Cloud Architecture Right the First Time Ver 2
Getting Cloud Architecture Right the First Time Ver 2Getting Cloud Architecture Right the First Time Ver 2
Getting Cloud Architecture Right the First Time Ver 2David Linthicum
 
Windows azure learning poster
Windows azure learning posterWindows azure learning poster
Windows azure learning posterMahmoud Moussa
 
Cloud Design Pattern part1
Cloud Design Pattern part1Cloud Design Pattern part1
Cloud Design Pattern part1Masashi Narumoto
 
Cloud design patterns - Federated Identity & Gatekeeper
Cloud design patterns - Federated Identity & GatekeeperCloud design patterns - Federated Identity & Gatekeeper
Cloud design patterns - Federated Identity & GatekeeperRoger Chien
 
Linthicum next generation-iaa s-paas-and-database-as-a-service
Linthicum next generation-iaa s-paas-and-database-as-a-serviceLinthicum next generation-iaa s-paas-and-database-as-a-service
Linthicum next generation-iaa s-paas-and-database-as-a-serviceDavid Linthicum
 
Cloud Design Pattern part2
Cloud Design Pattern part2Cloud Design Pattern part2
Cloud Design Pattern part2Masashi Narumoto
 
人類とデプロイの歴史(ネタなのでご容赦)
人類とデプロイの歴史(ネタなのでご容赦)人類とデプロイの歴史(ネタなのでご容赦)
人類とデプロイの歴史(ネタなのでご容赦)Keiichi Hashimoto
 
Servcie Fabric and Cloud Design Pattern
Servcie Fabric and Cloud Design PatternServcie Fabric and Cloud Design Pattern
Servcie Fabric and Cloud Design PatternTakekazu Omi
 
CMPE282_009994036_PROJECT_REPORT
CMPE282_009994036_PROJECT_REPORTCMPE282_009994036_PROJECT_REPORT
CMPE282_009994036_PROJECT_REPORTSandyarathi Das
 
How to Prepare for a PCI DSS Audit
How to Prepare for a PCI DSS AuditHow to Prepare for a PCI DSS Audit
How to Prepare for a PCI DSS AuditSecurityMetrics
 
Ten^H^H^H Many Cloud App Design Patterns
Ten^H^H^H Many Cloud App Design PatternsTen^H^H^H Many Cloud App Design Patterns
Ten^H^H^H Many Cloud App Design PatternsShlomo Swidler
 
Microservices and Azure App Services
Microservices and Azure App ServicesMicroservices and Azure App Services
Microservices and Azure App ServicesDamir Dobric
 
Distributed Design and Architecture of Cloud Foundry
Distributed Design and Architecture of Cloud FoundryDistributed Design and Architecture of Cloud Foundry
Distributed Design and Architecture of Cloud FoundryDerek Collison
 
Towards the Cloud: Architecture Patterns and VDI Story
Towards the Cloud: Architecture Patterns and VDI StoryTowards the Cloud: Architecture Patterns and VDI Story
Towards the Cloud: Architecture Patterns and VDI StoryIT Expert Club
 
Building PCI Compliance Solution on AWS - Pop-up Loft Tel Aviv
Building PCI Compliance Solution on AWS - Pop-up Loft Tel AvivBuilding PCI Compliance Solution on AWS - Pop-up Loft Tel Aviv
Building PCI Compliance Solution on AWS - Pop-up Loft Tel AvivAmazon Web Services
 
Simplify Localization with Design Pattern Automation
Simplify Localization with Design Pattern AutomationSimplify Localization with Design Pattern Automation
Simplify Localization with Design Pattern AutomationYan Cui
 

Destacado (20)

PCI-DSS Compliant Cloud - Design & Architecture Best Practices
PCI-DSS Compliant Cloud - Design & Architecture Best PracticesPCI-DSS Compliant Cloud - Design & Architecture Best Practices
PCI-DSS Compliant Cloud - Design & Architecture Best Practices
 
Getting Cloud Architecture Right the First Time Ver 2
Getting Cloud Architecture Right the First Time Ver 2Getting Cloud Architecture Right the First Time Ver 2
Getting Cloud Architecture Right the First Time Ver 2
 
Windows azure learning poster
Windows azure learning posterWindows azure learning poster
Windows azure learning poster
 
Cloud architecture
Cloud architectureCloud architecture
Cloud architecture
 
Cloud Design Pattern part1
Cloud Design Pattern part1Cloud Design Pattern part1
Cloud Design Pattern part1
 
Cloud design patterns - Federated Identity & Gatekeeper
Cloud design patterns - Federated Identity & GatekeeperCloud design patterns - Federated Identity & Gatekeeper
Cloud design patterns - Federated Identity & Gatekeeper
 
Linthicum next generation-iaa s-paas-and-database-as-a-service
Linthicum next generation-iaa s-paas-and-database-as-a-serviceLinthicum next generation-iaa s-paas-and-database-as-a-service
Linthicum next generation-iaa s-paas-and-database-as-a-service
 
Cloud Design Pattern part2
Cloud Design Pattern part2Cloud Design Pattern part2
Cloud Design Pattern part2
 
人類とデプロイの歴史(ネタなのでご容赦)
人類とデプロイの歴史(ネタなのでご容赦)人類とデプロイの歴史(ネタなのでご容赦)
人類とデプロイの歴史(ネタなのでご容赦)
 
Servcie Fabric and Cloud Design Pattern
Servcie Fabric and Cloud Design PatternServcie Fabric and Cloud Design Pattern
Servcie Fabric and Cloud Design Pattern
 
CMPE282_009994036_PROJECT_REPORT
CMPE282_009994036_PROJECT_REPORTCMPE282_009994036_PROJECT_REPORT
CMPE282_009994036_PROJECT_REPORT
 
How to Prepare for a PCI DSS Audit
How to Prepare for a PCI DSS AuditHow to Prepare for a PCI DSS Audit
How to Prepare for a PCI DSS Audit
 
Forecast 2014: Cloud-Aware Applications
Forecast 2014: Cloud-Aware Applications Forecast 2014: Cloud-Aware Applications
Forecast 2014: Cloud-Aware Applications
 
MicroServices on Azure
MicroServices on AzureMicroServices on Azure
MicroServices on Azure
 
Ten^H^H^H Many Cloud App Design Patterns
Ten^H^H^H Many Cloud App Design PatternsTen^H^H^H Many Cloud App Design Patterns
Ten^H^H^H Many Cloud App Design Patterns
 
Microservices and Azure App Services
Microservices and Azure App ServicesMicroservices and Azure App Services
Microservices and Azure App Services
 
Distributed Design and Architecture of Cloud Foundry
Distributed Design and Architecture of Cloud FoundryDistributed Design and Architecture of Cloud Foundry
Distributed Design and Architecture of Cloud Foundry
 
Towards the Cloud: Architecture Patterns and VDI Story
Towards the Cloud: Architecture Patterns and VDI StoryTowards the Cloud: Architecture Patterns and VDI Story
Towards the Cloud: Architecture Patterns and VDI Story
 
Building PCI Compliance Solution on AWS - Pop-up Loft Tel Aviv
Building PCI Compliance Solution on AWS - Pop-up Loft Tel AvivBuilding PCI Compliance Solution on AWS - Pop-up Loft Tel Aviv
Building PCI Compliance Solution on AWS - Pop-up Loft Tel Aviv
 
Simplify Localization with Design Pattern Automation
Simplify Localization with Design Pattern AutomationSimplify Localization with Design Pattern Automation
Simplify Localization with Design Pattern Automation
 

Similar a VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational Efficiencies

VMworld 2013: How to Identify if Your vSphere Environment is Configured to Me...
VMworld 2013: How to Identify if Your vSphere Environment is Configured to Me...VMworld 2013: How to Identify if Your vSphere Environment is Configured to Me...
VMworld 2013: How to Identify if Your vSphere Environment is Configured to Me...VMworld
 
VMworld 2013: VMware and Puppet: How to Plan, Deploy & Manage Modern Applicat...
VMworld 2013: VMware and Puppet: How to Plan, Deploy & Manage Modern Applicat...VMworld 2013: VMware and Puppet: How to Plan, Deploy & Manage Modern Applicat...
VMworld 2013: VMware and Puppet: How to Plan, Deploy & Manage Modern Applicat...VMworld
 
Webinar Fondazione CRUI e VMware: VMware vRealize Suite
 Webinar Fondazione CRUI e VMware: VMware vRealize Suite Webinar Fondazione CRUI e VMware: VMware vRealize Suite
Webinar Fondazione CRUI e VMware: VMware vRealize SuiteJürgen Ambrosi
 
Driving Systems Stability & Delivery Agility through DevOps [Decoding DevOps ...
Driving Systems Stability & Delivery Agility through DevOps [Decoding DevOps ...Driving Systems Stability & Delivery Agility through DevOps [Decoding DevOps ...
Driving Systems Stability & Delivery Agility through DevOps [Decoding DevOps ...InfoSeption
 
20151019 v mworld2015-recap-02
20151019 v mworld2015-recap-0220151019 v mworld2015-recap-02
20151019 v mworld2015-recap-02Kevin Groat
 
VMworld 2013: Architecting the Software-Defined Data Center
VMworld 2013: Architecting the Software-Defined Data Center VMworld 2013: Architecting the Software-Defined Data Center
VMworld 2013: Architecting the Software-Defined Data Center VMworld
 
V center operations management suite 5.6 what's new, pricing and packaging ...
V center operations management suite 5.6   what's new, pricing and packaging ...V center operations management suite 5.6   what's new, pricing and packaging ...
V center operations management suite 5.6 what's new, pricing and packaging ...solarisyourep
 
CSC AWS re:Invent Enterprise DevOps session
CSC AWS re:Invent Enterprise DevOps sessionCSC AWS re:Invent Enterprise DevOps session
CSC AWS re:Invent Enterprise DevOps sessionTom Laszewski
 
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...VMworld
 
Plan, Deploy & Manage Modern Applications Leveraging vCloud Automation Center...
Plan, Deploy & Manage Modern Applications Leveraging vCloud Automation Center...Plan, Deploy & Manage Modern Applications Leveraging vCloud Automation Center...
Plan, Deploy & Manage Modern Applications Leveraging vCloud Automation Center...Puppet
 
VMworld 2015: Container Orchestration with the SDDC
VMworld 2015: Container Orchestration with the SDDCVMworld 2015: Container Orchestration with the SDDC
VMworld 2015: Container Orchestration with the SDDCVMworld
 
Cloudify 4.6 highlights webinar
Cloudify 4.6 highlights webinarCloudify 4.6 highlights webinar
Cloudify 4.6 highlights webinarCloudify Community
 
VMworld 2013: Moving Beyond Infrastructure: Meeting Demands on App Lifecycle ...
VMworld 2013: Moving Beyond Infrastructure: Meeting Demands on App Lifecycle ...VMworld 2013: Moving Beyond Infrastructure: Meeting Demands on App Lifecycle ...
VMworld 2013: Moving Beyond Infrastructure: Meeting Demands on App Lifecycle ...VMworld
 
VMworld 2013: How to Build a Hybrid Cloud in Less than a Day
VMworld 2013: How to Build a Hybrid Cloud in Less than a Day VMworld 2013: How to Build a Hybrid Cloud in Less than a Day
VMworld 2013: How to Build a Hybrid Cloud in Less than a Day VMworld
 
VMworld 2013: Best Practices for Application Lifecycle Management with vCloud...
VMworld 2013: Best Practices for Application Lifecycle Management with vCloud...VMworld 2013: Best Practices for Application Lifecycle Management with vCloud...
VMworld 2013: Best Practices for Application Lifecycle Management with vCloud...VMworld
 
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...VMworld
 
Reston Virtualization Group 9-18-2014
Reston Virtualization Group 9-18-2014 Reston Virtualization Group 9-18-2014
Reston Virtualization Group 9-18-2014 VMwareJenn
 
VMworld 2013: Moving Enterprise Application Dev/Test to VMware’s Internal Pri...
VMworld 2013: Moving Enterprise Application Dev/Test to VMware’s Internal Pri...VMworld 2013: Moving Enterprise Application Dev/Test to VMware’s Internal Pri...
VMworld 2013: Moving Enterprise Application Dev/Test to VMware’s Internal Pri...VMworld
 
VMworld 2015: No App is An Island
VMworld 2015: No App is An IslandVMworld 2015: No App is An Island
VMworld 2015: No App is An IslandVMworld
 

Similar a VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational Efficiencies (20)

VMworld 2013: How to Identify if Your vSphere Environment is Configured to Me...
VMworld 2013: How to Identify if Your vSphere Environment is Configured to Me...VMworld 2013: How to Identify if Your vSphere Environment is Configured to Me...
VMworld 2013: How to Identify if Your vSphere Environment is Configured to Me...
 
VMworld 2013: VMware and Puppet: How to Plan, Deploy & Manage Modern Applicat...
VMworld 2013: VMware and Puppet: How to Plan, Deploy & Manage Modern Applicat...VMworld 2013: VMware and Puppet: How to Plan, Deploy & Manage Modern Applicat...
VMworld 2013: VMware and Puppet: How to Plan, Deploy & Manage Modern Applicat...
 
Webinar Fondazione CRUI e VMware: VMware vRealize Suite
 Webinar Fondazione CRUI e VMware: VMware vRealize Suite Webinar Fondazione CRUI e VMware: VMware vRealize Suite
Webinar Fondazione CRUI e VMware: VMware vRealize Suite
 
Driving Systems Stability & Delivery Agility through DevOps [Decoding DevOps ...
Driving Systems Stability & Delivery Agility through DevOps [Decoding DevOps ...Driving Systems Stability & Delivery Agility through DevOps [Decoding DevOps ...
Driving Systems Stability & Delivery Agility through DevOps [Decoding DevOps ...
 
20151019 v mworld2015-recap-02
20151019 v mworld2015-recap-0220151019 v mworld2015-recap-02
20151019 v mworld2015-recap-02
 
VMworld 2013: Architecting the Software-Defined Data Center
VMworld 2013: Architecting the Software-Defined Data Center VMworld 2013: Architecting the Software-Defined Data Center
VMworld 2013: Architecting the Software-Defined Data Center
 
V center operations management suite 5.6 what's new, pricing and packaging ...
V center operations management suite 5.6   what's new, pricing and packaging ...V center operations management suite 5.6   what's new, pricing and packaging ...
V center operations management suite 5.6 what's new, pricing and packaging ...
 
CSC AWS re:Invent Enterprise DevOps session
CSC AWS re:Invent Enterprise DevOps sessionCSC AWS re:Invent Enterprise DevOps session
CSC AWS re:Invent Enterprise DevOps session
 
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...
 
Plan, Deploy & Manage Modern Applications Leveraging vCloud Automation Center...
Plan, Deploy & Manage Modern Applications Leveraging vCloud Automation Center...Plan, Deploy & Manage Modern Applications Leveraging vCloud Automation Center...
Plan, Deploy & Manage Modern Applications Leveraging vCloud Automation Center...
 
VMworld 2015: Container Orchestration with the SDDC
VMworld 2015: Container Orchestration with the SDDCVMworld 2015: Container Orchestration with the SDDC
VMworld 2015: Container Orchestration with the SDDC
 
Cloudify 4.6 highlights webinar
Cloudify 4.6 highlights webinarCloudify 4.6 highlights webinar
Cloudify 4.6 highlights webinar
 
VMworld 2013: Moving Beyond Infrastructure: Meeting Demands on App Lifecycle ...
VMworld 2013: Moving Beyond Infrastructure: Meeting Demands on App Lifecycle ...VMworld 2013: Moving Beyond Infrastructure: Meeting Demands on App Lifecycle ...
VMworld 2013: Moving Beyond Infrastructure: Meeting Demands on App Lifecycle ...
 
VMworld 2013: How to Build a Hybrid Cloud in Less than a Day
VMworld 2013: How to Build a Hybrid Cloud in Less than a Day VMworld 2013: How to Build a Hybrid Cloud in Less than a Day
VMworld 2013: How to Build a Hybrid Cloud in Less than a Day
 
VMworld 2013: Best Practices for Application Lifecycle Management with vCloud...
VMworld 2013: Best Practices for Application Lifecycle Management with vCloud...VMworld 2013: Best Practices for Application Lifecycle Management with vCloud...
VMworld 2013: Best Practices for Application Lifecycle Management with vCloud...
 
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
 
Reston Virtualization Group 9-18-2014
Reston Virtualization Group 9-18-2014 Reston Virtualization Group 9-18-2014
Reston Virtualization Group 9-18-2014
 
VMworld 2013: Moving Enterprise Application Dev/Test to VMware’s Internal Pri...
VMworld 2013: Moving Enterprise Application Dev/Test to VMware’s Internal Pri...VMworld 2013: Moving Enterprise Application Dev/Test to VMware’s Internal Pri...
VMworld 2013: Moving Enterprise Application Dev/Test to VMware’s Internal Pri...
 
VMworld 2015: No App is An Island
VMworld 2015: No App is An IslandVMworld 2015: No App is An Island
VMworld 2015: No App is An Island
 
12-Factor Apps
12-Factor Apps12-Factor Apps
12-Factor Apps
 

Más de VMworld

VMworld 2016: vSphere 6.x Host Resource Deep Dive
VMworld 2016: vSphere 6.x Host Resource Deep DiveVMworld 2016: vSphere 6.x Host Resource Deep Dive
VMworld 2016: vSphere 6.x Host Resource Deep DiveVMworld
 
VMworld 2016: Troubleshooting 101 for Horizon
VMworld 2016: Troubleshooting 101 for HorizonVMworld 2016: Troubleshooting 101 for Horizon
VMworld 2016: Troubleshooting 101 for HorizonVMworld
 
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI Automation
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI AutomationVMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI Automation
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI AutomationVMworld
 
VMworld 2016: What's New with Horizon 7
VMworld 2016: What's New with Horizon 7VMworld 2016: What's New with Horizon 7
VMworld 2016: What's New with Horizon 7VMworld
 
VMworld 2016: Virtual Volumes Technical Deep Dive
VMworld 2016: Virtual Volumes Technical Deep DiveVMworld 2016: Virtual Volumes Technical Deep Dive
VMworld 2016: Virtual Volumes Technical Deep DiveVMworld
 
VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...
VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...
VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...VMworld
 
VMworld 2016: The KISS of vRealize Operations!
VMworld 2016: The KISS of vRealize Operations! VMworld 2016: The KISS of vRealize Operations!
VMworld 2016: The KISS of vRealize Operations! VMworld
 
VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...
VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...
VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...VMworld
 
VMworld 2016: Ask the vCenter Server Exerts Panel
VMworld 2016: Ask the vCenter Server Exerts PanelVMworld 2016: Ask the vCenter Server Exerts Panel
VMworld 2016: Ask the vCenter Server Exerts PanelVMworld
 
VMworld 2016: Virtualize Active Directory, the Right Way!
VMworld 2016: Virtualize Active Directory, the Right Way! VMworld 2016: Virtualize Active Directory, the Right Way!
VMworld 2016: Virtualize Active Directory, the Right Way! VMworld
 
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld
 
VMworld 2015: Troubleshooting for vSphere 6
VMworld 2015: Troubleshooting for vSphere 6VMworld 2015: Troubleshooting for vSphere 6
VMworld 2015: Troubleshooting for vSphere 6VMworld
 
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...VMworld
 
VMworld 2015: Advanced SQL Server on vSphere
VMworld 2015: Advanced SQL Server on vSphereVMworld 2015: Advanced SQL Server on vSphere
VMworld 2015: Advanced SQL Server on vSphereVMworld
 
VMworld 2015: Virtualize Active Directory, the Right Way!
VMworld 2015: Virtualize Active Directory, the Right Way!VMworld 2015: Virtualize Active Directory, the Right Way!
VMworld 2015: Virtualize Active Directory, the Right Way!VMworld
 
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...VMworld
 
VMworld 2015: Building a Business Case for Virtual SAN
VMworld 2015: Building a Business Case for Virtual SANVMworld 2015: Building a Business Case for Virtual SAN
VMworld 2015: Building a Business Case for Virtual SANVMworld
 
VMworld 2015: Explaining Advanced Virtual Volumes Configurations
VMworld 2015: Explaining Advanced Virtual Volumes ConfigurationsVMworld 2015: Explaining Advanced Virtual Volumes Configurations
VMworld 2015: Explaining Advanced Virtual Volumes ConfigurationsVMworld
 
VMworld 2015: Virtual Volumes Technical Deep Dive
VMworld 2015: Virtual Volumes Technical Deep DiveVMworld 2015: Virtual Volumes Technical Deep Dive
VMworld 2015: Virtual Volumes Technical Deep DiveVMworld
 
VMworld 2015: Networking Virtual SAN's Backbone
VMworld 2015: Networking Virtual SAN's BackboneVMworld 2015: Networking Virtual SAN's Backbone
VMworld 2015: Networking Virtual SAN's BackboneVMworld
 

Más de VMworld (20)

VMworld 2016: vSphere 6.x Host Resource Deep Dive
VMworld 2016: vSphere 6.x Host Resource Deep DiveVMworld 2016: vSphere 6.x Host Resource Deep Dive
VMworld 2016: vSphere 6.x Host Resource Deep Dive
 
VMworld 2016: Troubleshooting 101 for Horizon
VMworld 2016: Troubleshooting 101 for HorizonVMworld 2016: Troubleshooting 101 for Horizon
VMworld 2016: Troubleshooting 101 for Horizon
 
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI Automation
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI AutomationVMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI Automation
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI Automation
 
VMworld 2016: What's New with Horizon 7
VMworld 2016: What's New with Horizon 7VMworld 2016: What's New with Horizon 7
VMworld 2016: What's New with Horizon 7
 
VMworld 2016: Virtual Volumes Technical Deep Dive
VMworld 2016: Virtual Volumes Technical Deep DiveVMworld 2016: Virtual Volumes Technical Deep Dive
VMworld 2016: Virtual Volumes Technical Deep Dive
 
VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...
VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...
VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...
 
VMworld 2016: The KISS of vRealize Operations!
VMworld 2016: The KISS of vRealize Operations! VMworld 2016: The KISS of vRealize Operations!
VMworld 2016: The KISS of vRealize Operations!
 
VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...
VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...
VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...
 
VMworld 2016: Ask the vCenter Server Exerts Panel
VMworld 2016: Ask the vCenter Server Exerts PanelVMworld 2016: Ask the vCenter Server Exerts Panel
VMworld 2016: Ask the vCenter Server Exerts Panel
 
VMworld 2016: Virtualize Active Directory, the Right Way!
VMworld 2016: Virtualize Active Directory, the Right Way! VMworld 2016: Virtualize Active Directory, the Right Way!
VMworld 2016: Virtualize Active Directory, the Right Way!
 
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
 
VMworld 2015: Troubleshooting for vSphere 6
VMworld 2015: Troubleshooting for vSphere 6VMworld 2015: Troubleshooting for vSphere 6
VMworld 2015: Troubleshooting for vSphere 6
 
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
 
VMworld 2015: Advanced SQL Server on vSphere
VMworld 2015: Advanced SQL Server on vSphereVMworld 2015: Advanced SQL Server on vSphere
VMworld 2015: Advanced SQL Server on vSphere
 
VMworld 2015: Virtualize Active Directory, the Right Way!
VMworld 2015: Virtualize Active Directory, the Right Way!VMworld 2015: Virtualize Active Directory, the Right Way!
VMworld 2015: Virtualize Active Directory, the Right Way!
 
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
 
VMworld 2015: Building a Business Case for Virtual SAN
VMworld 2015: Building a Business Case for Virtual SANVMworld 2015: Building a Business Case for Virtual SAN
VMworld 2015: Building a Business Case for Virtual SAN
 
VMworld 2015: Explaining Advanced Virtual Volumes Configurations
VMworld 2015: Explaining Advanced Virtual Volumes ConfigurationsVMworld 2015: Explaining Advanced Virtual Volumes Configurations
VMworld 2015: Explaining Advanced Virtual Volumes Configurations
 
VMworld 2015: Virtual Volumes Technical Deep Dive
VMworld 2015: Virtual Volumes Technical Deep DiveVMworld 2015: Virtual Volumes Technical Deep Dive
VMworld 2015: Virtual Volumes Technical Deep Dive
 
VMworld 2015: Networking Virtual SAN's Backbone
VMworld 2015: Networking Virtual SAN's BackboneVMworld 2015: Networking Virtual SAN's Backbone
VMworld 2015: Networking Virtual SAN's Backbone
 

Último

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 

VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational Efficiencies

  • 1. NSX PCI Reference Architecture Workshop Session 3 - Operational Efficiencies Allen Shortnacy, VMware SEC5837 #SEC5837
  • 3. 3 About Operational Efficiencies  Cloud and SDDC have evolved from IT silos including security and compliance • ITSM, ITIL and other mature processes will need to evolve with the SDDC • Impact of network and storage virtualization siloes will require more bi-directional interaction from legacy infrastructure teams  Policies and Procedures regarding security and compliance will also change • Understanding how different solutions interact with the platform and each other to accommodate compliance becomes a must not just for design but also operations • Due to the nature of the SDDC, workloads under regulatory compliance become untethered from the physical topology but require coherent, near real time logging and correlation strategy to understand inter-layer impact of events  Building and revising SDDC architectures will become SDLC like • Opportunities to take out OPEX and operate at greater scale on the VI Admin/workload ratio are many and with demonstrable ROI • Will require some new skill sets like DevOps to automate APIs and generate new task oriented interfaces
  • 4. 4 Security and Compliance Challenges in the SDDC Cumbersome Provisioning Complicated deployment and troubleshooting processes make it difficult to maintain service levels for security. Manual, Cross-Service Workflows Security and cloud admins volley back and forth to identify, assess, plan, implement security risks…a very inefficient process. Policy ≠ Operations Security and Compliance are roadblocks to cloud but expecting security architects to manage cloud operations is unrealistic and unfair. Architects design define policy. Operators implement. Security Architect ✔ ?
  • 5. 5 5 Compliance Challenges: Many Systems - Dashboards of Wonder Vulnerability Mgmt System Antivirus System Firewall vCenter IDS System DLP System
  • 6. 6 Four Steps to Gaining Operational Efficiencies in the SDDC  Define and Manage Partner Solutions from NSX Service Composer • Deploy and monitor partner solutions and their availability • Define parameters for inter-operating NSX and Partner Solutions • Create NSX and Partner Services Policies that can be re-used across trust zones  Leverage integration of NSX and Partner Solutions for Workflows • Creating common tags across NSX and Partner solutions allows for broader administrative activities formerly accomplished through error prone ‘swivel chair’  Discover SDDC processes that are manual but repeatable, with little variation • Leverage REST APIs and development toolkit such as Puppet, Chef or vCenter Orchestrator to automate tasks • Reduce ‘swivel chair’ operations across consoles providing greater scale or complete end to end automation with logging for utility computing approach  Abstract SDDC Security and Compliance Policies into self-service governance • Declare at deploy time the requirements for an application with regards to regulations
  • 7. 7 Function  Service Composer enables creation of partner services  Service Composer templates provide reusable methods for distributed policy management Usage NSX Service Composer  Define Security Services  Define settings for services  Apply to new trust zones  Monitor for readiness Step 1: Managing NSX and Partner Solutions w/ Service Composer NSX and NSX Partner Solutions are integrated for deployment, initialization and definition of common parameters
  • 8. vSphere and Partner console already deployed Install vShield Manager Install vShield Endpoint Register Endpoint with VC Add VC to Partner Console Install required drivers on hosts Deploy Partner SVA Activate Partner SVA Activate VMs Start managing security policies Challenge – Security Product Provisioning in Cloud Infrastructure • Remains Complex • Unclear Ownership • Lack of SLAs VI Admin Security Admin *vShield Endpoint example
  • 9. 9 Troubleshooting Security Services Requires Considerable Back and Forth Between Virtual Admins and Security Admins  If a service goes down, where do you start with troubleshooting steps? Security solution or Virtualization solution?  What if there was a configuration change in the infrastructure that caused an outage? How could this change be determined?
  • 10. 10 NSX Service Composer Provisioning Compute Management Gateway Host Prep  Install Kernel Modules - VXLAN, Distributed Router and Distributed FW  Simple One Click install per Cluster  All modules installed together 1 Logical Network Prep  Configure VTEP IP, MTU, Teaming per cluster  Create Transport Zones (Network Scope) 2 Deploy Controller  Simple UI in VSM deploys Controller OVF and configures it  No other configuration required!  Min 3-Node controller required for HA 3 Register Services  Log in!  Some services are pre- registered (Data Security, Identity, Trend Micro, Rapid 7, McAfee )  Register Symantec Antivirus Solution  Register Symantec IPS Solution 4 Deploy Services  Some services are pre- deployed (Data Security, Identity)  Deploy Symantec Antivirus solution 5 Partner Mgmt. Consoles Registered Troubleshooting Services  Power off or suspend data security VM  Observe failure message and root cause  Initiate ‘resolve’ (repair)  Observe progress and final status 6
  • 11. 11 NSX Service Composer: Security Ready for Consumption Security Groups WHAT you want to protect Members: VM, vNIC, network (virtual/Logical Switch, physical), Distributed Virtual PG, cluster, data center, Resource Pool, vApp, other container, IP address, MAC Context: User identity, sensitive data, security posture HOW you want to protect it Services: Firewall, antivirus, intrusion prevention, vulnerability management and more. Profiles: Security policies from VMware and third-party solutions that are defined by the security architect but implemented by the cloud operator. APPLY
  • 12. 12 Step 2 : Establish Workflow Integration between NSX and Partner NSX and Partner Solutions are integrate by APIs either by making direct calls to NSX or by setting machine metadata SG: Web Servers VSM F/W Services SG: Quarantine VSM F/W Services Function  Service Composer enables creation of ‘Tags’ for integrating Partner Solutions  NSX and Partner Solutions leverage one another Usage NSX Service Composer  Define Security Groups  Define Tags for dynamic inclusion in NSX Security Groups  Define Partner Solution Tags to be set
  • 13. 13 Demo: Orchestrating Security Between Multiple Products
  • 14. 14 Step 3: NSX RESTful Automation NSX provides REST APIs which means you can create, delete or manipulate NSX SDDC constructs with HTTP POST and GET Function  Identify repeatable NSX Provisioning or Config tasks  Determine target integration types and choose dev toolkit Usage NSX REST APIs  Unit test functionality with HTTP tools (curl, Firefox RESTclient)  Integrate into larger scope processes with vCenter Orchestrator, etc.
  • 15. 15 Most Requested Deployment Models for Multi-Tiered Apps Multi-tiered app, Multiple networks Multi-tiered app, single network APP DATABASE WEB WEB APP DATABASE
  • 16. 16 Most Requested Network and Security Services NSX provides built-in, logical networks and services to address the most common (and challenging) requests for cloud service automation. Firewall Networks (switches) Load Balancer Router
  • 17. 17 Deployment Tools, Process, Best Practices Package Catalog Packaging Factory VMware Cloud Application Deployment Toolkit - Details Enterprise ISVs CustomersDeploy Factory (Managed Service Providers) 1. Packaging Factory A “factory” for producing reusable, Cloud-ready deployment packages for the most popular business apps 3. Deploy Factory A controller to download packages, provision secured deployment environment and orchestrate automated deployment of the application 2. Package Catalog Cloud based, access controlled repository to store application packages
  • 18. 18 Deployment Tools, Process, Best Practices Package Catalog Packaging Factory How Does this Work – Packaging Factory Enterprise ISVs CustomersDeploy Factory (Managed Service Providers) vFabric Application Director Chef & VMware Studio Subversion Server Build Controller Application Blueprint Cookbook Node Template • Packaging factory infrastructure consists of subversion server, VMware Studio, vFabric Application Director and Chef Application• Application binaries remain unchanged • Deployment information is captured in various levels of details in application blue prints, node templates and deployment scripts (cook books)
  • 19. 19 Deployment Tools, Process, Best Practices Package Catalog Packaging Factory How Does this Work – Package Catalog Enterprise ISVs CustomersDeploy Factory (Managed Service Providers) • An application package is uploaded to a cloud based repository • Service provider gets access to the repository using an access-controlled portal • Application package is downloaded into service provider’s cloud
  • 20. 20 Deployment Tools, Process, Best Practices Package Catalog Packaging Factory How Does this Work – Deploy Factory Enterprise ISVs CustomersDeploy Factory (Managed Service Providers) vFabric Application Director vCloud Director VMware Studio & Chef Deployment Controller vApp • Deploy Factory infrastructure consists of vCloud Director, vFabric Application Director, VMware Studio, Chef and Deployment Controller Virtual Network • (Optional) Create private network to place application into • vApp(s) are deployed in the target environment • Application is installed via Application Blueprints • Each node is configured using Chef VM VM VM
  • 21. 21 Demo: RESTful Automation of NSX Edge Deployment
  • 22. 22 Step 4: Use NSX Automation in Self-Service Provisioning NSX metadata exposed in vCAC Self-Service Catalog allows for declarative binding of network and services policies such as Firewall Request 3-tiered app Request network and services Function  vCloud Automation Center self- service provisioning  NSX dynamic policy profile inclusion Usage vCloud Automation Center  New workload request  Bind to NSX Networks and Services
  • 23. 23 vCloud Automation Center Policy Management Business Groups B A C USERS A C B A Authentication & Role-Based Authorization Authorized Users Resource Reservations Cost Profile A Tier 1 Public Physical Virtual Shared Infrastructure Service Blueprints A Requisition Cost Profile Provision Manage Retire Public Physical Virtual C B B A B A C BA
  • 24. 24 vCloud Automation Center Extensibility Spectrum Flexibility without Complexity
  • 25. 25 Where We Are Today Create On- Demand Leverage Existing Infrastructure APP DATABASE WEB Requires customization Pre-Created, Logical Networks Apps can be spun up on-demand using logical networks that have already been created. Creating logical networks in advance is still more agile than provisioning physical networks. APP DATABASEWEB
  • 26. 26 Where We Are Today Create On- Demand Leverage Existing Infrastructure APP DATABASE WEB Requires customization Networks Explicitly Assigned App blueprints may require networks with NAT, routed, or private connectivity. Admin must directly specify network information. APP DATABASEWEB NAT Network A.B.C.#X.Y.Z.# Routed Network A.B.C.# A.B.C.#
  • 27. 27 Where We Are Today Create On- Demand Leverage Existing Infrastructure Requires customization Pre-created, Firewall Rules Apps can be added to existing security groups. APP DATABASE WEB WEB APP DATABASE
  • 28. 28 Where We Are Today Create On- Demand Leverage Existing Infrastructure Requires customization Pre-created, Load Balancer Pool Apps can be added to existing load balancer pools. APP DATABASE WEB WEB APP DATABASEServices Edge (Load Balancer) Services Edge (Load Balancer)
  • 29. 29 Discovery of vCNS Resources and Policies VM VM VM VM VM VM VM VM VM Resources Policies ► Clone Templates ► Customization Spec. ► Host/Host Clusters ► CPU, Memory, Storage, ► Networking vCNS Manager VXLANs ► Security Groups► VXLANs ► Load Balancers PoliciesResources Managed Endpoint VMware vCenter Add a vCNS Manager address and credentials to a vSphere (vCenter) Endpoint definition
  • 30. 30 Reserving vCNS Resources for Each Group • VXLANs appear as network paths in resource reservations • Security Groups, Load Balancers − Can be specified as custom properties on the reservation or on the blueprint VXLANs can be reserved by Provisioning Group
  • 31. 31 Configuring Service Blueprints to Leverage vCNS VCAC Blueprint Custom Properties define the Load Balancer and Security Groups, that will be associated with the Machine being provisioned.
  • 32. 32 Future Direction Create On- Demand Leverage Existing Infrastructure APP DATABASE WEB WEB APP DATABASE Services Edge (Load Balancer) Requires customization Services Edge (Load Balancer) Cloud Automation + Network Virtualization Spin up and tear down logical networks and services as needed, to deliver application infrastructure on-demand.
  • 33. 33 Future Direction Create On- Demand Leverage Existing Infrastructure Requires customization On-Demand Networks Multi-machine blueprints can create new VMs and place them on networks created on-demand using NSX (or vCloud Networking and Security). These networks can be torn down once app lease times are up. APP DATABASE WEB WEB APP DATABASE Logical Router Logical Router
  • 34. 34 Future Direction Create On- Demand Leverage Existing Infrastructure Requires customization Network Profiles Take the guesswork out of requesting networks (IP addressing, connectivity) by PRIVATE NAT ROUTED
  • 35. 35 Future Direction Create On- Demand Leverage Existing Infrastructure Requires customization On-Demand Load Balancer Blueprint admins or power users can create new load balancer services using new or existing Edge gateways. APP DATABASE WEB WEB APP DATABASEServices Edge (Load Balancer) Services Edge (Load Balancer)
  • 36. 36 Firewall Rules Multi Network Model Use security group to isolate entire app, virtual firewall to control traffic between tiers. Flat Network Model Use security groups to isolate entire app and app tiers, virtual firewall to control all traffic. Distributed Virtual Firewall Distributed Virtual Firewall App firewall rules are consumed by placing workloads in existing security groups. NSX security administrator should pre-create these groups with necessary firewall rules.
  • 37. 37 Summary – Value Achieved via Operational Efficiencies  Single interface to manage deployment and enablement of NSX and Partner Solutions taking out many manual steps previously required • Automates not only previously manual steps but also error prone handoff between roles  NSX Service Composer to design and plan for orchestration of events and actions by integrating NSX and Partner Solutions via ‘Tags’ • Rather than pivot between interfaces to respond to events NSX Service Composer and Partner Solutions integrate to leverage one another in a prescribed manner  NSX RESTful APIs enable automation of repeatable tasks taking out OPEX • Can be part of a larger orchestration or put into a workflow set of task oriented screens  vCloud Automation Center provides policy driven governance and entitlement • Attach required policies to vCAC provisioning process by leveraging NSX Networks and NSX Services by assigning ‘Tags’ to deployed workloads That which can be Automated can be Easily Measured!
  • 38. 38 VMworld: Security and Compliance Sessions Category Topic NSX • 5318: NSX Security Solutions In Action (201) • 5753: Dog Fooding NSX at VMware IT (201) • 5828: Datacenter Transformation (201) • 5582: Network Virtualization across Multiple Data Centers (201) NSX Firewall • 5893: Economies of the NSX Distributed Firewall (101) • 5755: NSX Next Generation Firewalls (201) • 5891: Build a Collapsed DMZ Architecture (301) • 5894: NSX Distributed Firewall (301) NSX Service Composer • 5749: Introducing NSX Service Composer (101) • 5750: NSX Automating Security Operations Workflows (201) • 5889: Troubleshooting and Monitoring NSX Service Composer (301) Compliance • 5428: Compliance Reference Architecture Framework Overview (101) • 5624: Accelerate Deployments – Compliance Reference Architecture (Customer Panel) (201) • 5253: Streamlining Compliance (201) • 5775: Segmentation (301) • 5820: Privileged User Control (301) • 5837: Operational Efficiencies (301) Other • 5589: Healthcare Customer Case Study: Maintaining PCI, HIPAA and HITECH Compliance in Virtualized Infrastructure (Catbird – Jefferson radiology) • 5178: Motivations and Solution Components for enabling Trusted Geolocation in the Cloud - A Panel discussion on NIST Reference Architecture (IR 7904). (Intel and HyTrust) • 5546: Insider Threat: Best Practices and Risk Mitigation techniques that your VMware based IaaS provider better be doing! (Intel)
  • 39. 39 For More Information…  VMware Collateral  VMware Approach to Compliance  VMware Solution Guide for PCI  VMware Architecture Design Guide for PCI  VMware QSA Validated Reference Architecture PCI  Partner Collateral  VMware Partner Solution Guides for PCI How to Engage?  compliance-solutions@vmware.com  @VMW_Compliance on Twitter
  • 40.
  • 42. NSX PCI Reference Architecture Workshop Session 3 - Operational Efficiencies Allen Shortnacy, VMware SEC5837 #SEC5837