NSX-V.
- March 7, 2019
NSX-V Edge Services Gateways: The Part That Trips Up First-Timers
If the Distributed Firewall is NSX-V’s most-used feature, the Edge Services Gateway (ESG) is its most confusing. ESGs are software-defined appliances that provide routing, NAT, load balancing, …
- February 14, 2019
NSX-V and Physical Firewalls: Finding the Right Boundary
Organizations deploying NSX-V often already have physical perimeter firewalls — Palo Alto, Fortinet, Cisco ASA, or Check Point. A common design question: what does NSX do, and what does the physical …
- January 22, 2019
Troubleshooting NSX-V: Controller Issues and What They Actually Mean
NSX-V’s control plane runs on a cluster of controller VMs that manage logical network state — VXLAN mappings, logical router tables, and distributed firewall rule distribution. When controllers …
- December 10, 2018
NSX-V Micro-Segmentation: Applying Distributed Firewall in Practice
The distributed firewall is the feature that justifies NSX-V for most mid-size organizations. Traditional network firewalls sit at the perimeter or at layer boundaries — north-south traffic is …
- September 20, 2018
NSX-V First Deployment: What to Actually Prepare For
NSX-V (for vSphere) is VMware’s software-defined networking platform for vSphere environments. It decouples network functions — switching, routing, firewalling, load balancing — from physical …