What is SD-WAN ?
Software-Defined WAN (SD-WAN) is an overlay architecture that overcomes the biggest drawbacks of traditional
WAN. SD-WAN builds a secure, unified connectivity over any transport (MPLS, Broadband, LTE, VSAT etc.)
and provides simplified operations with centralized management, policy control and application visibility
across the enterprise.
Significance of Velocloud :
From Last 2 Years in the Gartner Magic Quadrant .
One of the Most Deployed SD-WAN in Global 1000 Companies .
With SD-WAN built on the Viptela Fabric, enterprises can provide secure connectivity everywhere, deploy
new services and applications faster, and drastically simplify operational complexity in the WAN.
Topics covered :
!
Section 01 NSX SDWAN Velocloud Introduction & Features
01 NSX SDWAN Velocloud Introduction
02 What is Velocloud ...
03 Market Players & Gartner report
04 Velocloud SDWAN benefits
05 Velocloud Architecture
06 Velocloud Edge Devices
07 Velcloud Features
08 Velo_500 UI
09 Velocloud Orchestrator Dashboard
Section 02 Velocloud vs Viptela Feature Comparison & Edge Installation
10 Velocloud vs Viptela Compare 01
11 Velocloud vs Viptela Compare 02
12 Velocloud Network Topologies
13 Velocloud Key Concepts
14 Velcloud vEdge Installation
15 Velcloud vEdge Basic Diagnostics
Section 03 Velocloud Profile Configuration
16 Velocloud Edge Profile
17 Cloud VPN
18 Rest of the Configurations Part01 Auth Netflow DNS
19 Rest of the Configurations Part02 Multicast
20 Rest of the Configurations Part03 vlan ntp snmp options
Section 04 Velocloud Business Policy & Firewall Rules with Edge Override
21 Configure Profile Business Policy
22 Dynamic multi-path Optimization
23 Link Steering Options
24 Firewall Rules
25 Velocloud Edge Template & Override
Section 05 Velocloud Routing Protocols : OSPF | BGP | OFC(Overlay Flow Contro)
26 Velocloud OSPF
27 Velocloud BGP
28 Overlay Flow Control : OFC
Part 02 NSX - T
VMware NSX-T™ Data Center (formerly NSX-T) provides an agile software-defined infrastructure to build cloud-native application environments.
NSX-T Data Center is focused on providing networking, security, automation, and operational simplicity for emerging application frameworks and architectures that have heterogeneous endpoint environments and technology stacks. NSX-T Data Center supports cloud-native applications, bare metal workloads, multi-hypervisor environments, public clouds, and multiple clouds.
NSX-T Data Center is designed for management, operation, and consumption by development organizations. NSX-T Data Center allows IT and development teams to select the technologies best suited for their applications.
+++ First 3 Section belonging to basics of VMWARE Virtualization with vSphere 6.7
+++ Then we have full fledged NSX-T 2.4 Topics in Detail .
VMware NSX-T
VMware NSX-T 3.0 is the latest generation of VMware’s network virtualization product series. NSX-T is the successor to the NSX-V product. NSX-T supports third-party Hypervisors and next generation overlay encapsulation protocols such as Generic Network Virtualization Encapsulation (Geneve). NSX-T acts as a network Hypervisor that allows software abstraction of various network services that include logical switch (segments), logical routers (Tier-0 or Tier-1 Gateway), logical firewalls, logical load balancers, and logical VPNs.
NSX Manager—Integrated management component of NSX-T, provides the functionality of controller, manager, and policy. It is installed as a virtual appliance in the vCenter server environment.
ESXi (Transport Node)—Servers and edge nodes that have NSX-T prepared in the NSX-T data center.
N-VDS—NSX-managed Virtual Distributed Switch (N-VDS), derived from VMware vSphere Distributed Switch (VDS), de-couples the data plane from the compute manager (vCenter). It is a software abstraction layer present between servers and physical network for network connectivity. It can be created on both host and edge transport nodes and can co-exist with VMware Standard Switch (VSS) and VDS.
Segments—Formerly known as logical switch in NSX-V, similar to VLANs, reproduces switching functionality in NSX-T environment to provide network connections between attached VMs.
NSX Edge—Provides gateway and security services to the virtual network. It enables east-west traffic between the VMs on the same host in different subnets without accessing the physical network. It also enables north-south traffic for VMs to access the public networks.
Service Router—Instantiated on the NSX Edge node and provides gateway functionality and services such as NAT, load balancing, and so on.
Distributed Router—Runs as a kernel module and is embedded in all transport nodes to provide basic routing capabilities such as east-west routing and local routing inside hypervisor.
NSX Tier-1 Gateway—Provides east-west connectivity.
NSX Tier-0 Gateway—Provides north-south connectivity. It supports static routing, BGP dynamic routing, and equal-cost multi-path (ECMP) routing. It is required for traffic flow between logical and physical networks.