SlideShare une entreprise Scribd logo
1  sur  2
Télécharger pour lire hors ligne
1
Copyright © 2014 Gigamon. All rights reserved.
Pervasive Visibility into SDDC/NSX Deployments
VMware // Technology Solution Brief
The Gigamon and VMware Joint Solution Overview
Gigamon, a leader in network visibility and monitoring (NVM) solutions and VMware,
the leader in server and network virtualization, are extending their partnership to provide
pervasive and intelligent visibility into the physical and virtual networks by integrating the
Gigamon Visibility Fabric with VMware NSX™
platform.
VMware NSX is the leading network virtualization platform that delivers the operational
model of a virtual machine for the network. Similar to virtual machines for compute,
virtual networks are programmatically provisioned and managed independent
of underlying hardware. NSX reproduces the entire network model in software,
enabling any network topology—from simple to complex multi-tier networks—
to be created and provisioned in seconds.
Gigamon’s Visibility Fabric architecture is an innovative solution that delivers pervasive
and dynamic visibility of traffic traversing communication networks. The Visibility Fabric
architecture significantly improves network flexibility by enabling static tools to connect
to dynamic, virtualized applications, so users can efficiently and securely address their
business needs.
The Visibility Fabric consists of distributed physical (GigaVUE H Series platforms)
and virtual (GigaVUE-VM) nodes that provide an advanced level of filtering intelligence.
At the heart of the fabric is Gigamon’s patented Flow Mapping®
technology that identifies
and directs incoming traffic to single or multiple tools based on user-defined rules
implemented from a centralized fabric management console, GigaVUE-FM.
How the Joint Solution Works
VMware NSX leverages the vSwitches already present in server hypervisors across the
data center. NSX coordinates these vSwitches and the network services pushed to them
for connected VMs to effectively deliver a platform—or “network hypervisor”—for the
creation of virtual networks.
These virtual networks are created using encapsulation technologies like VXLAN,
which create Layer 2 logical networks that are encapsulated in standard Layer 3
IP packets, thus allowing the extension of Layer 2 virtual networks across physical
boundaries. A “Segment ID” in every frame differentiates the VXLAN logical networks
from each other without any need for VLAN-Tags. With a 24 bit segment ID to
uniquely identify broadcast domains, VXLAN enables multi-tenant environments
at cloud scale and extends the Layer 2 network across physical boundaries by
encapsulating the original frames in a MAC-in-UDP encapsulation.
Monitoring performance of VXLAN networks and virtual tunnel endpoints is the key
to enabling network operations teams to control and comprehend the “virtual”
domains floated on top of the common networking and virtualization infrastructure.
The Challenge
Current network and security solutions are rigid,
complex, and often vendor-specific. This creates
a costly barrier to realizing the full agility of the
software-defined data center (SDDC).
Limitations of physical networking and traditional
security tie an increasingly dynamic virtual world back
to inflexible, dedicated hardware, creating artificial
barriers to fast provisioning of networking and security
services and simplified network operations. Manual
provisioning and fragmented management interfaces
reduce efficiency and limit the ability of enterprises
to rapidly and securely deploy, move, and scale
applications and data to meet business demands.
Paramount to monitoring the SDDC infrastructure is the
ability to have an immediate and rich understanding
of activity in your network. To accomplish this, network
monitoring solutions require visibility and monitoring
of both virtual and physical infrastructure. This
requirement can be challenging.
Pervasive visibility into your SDDC requires this
information to be readily accessible so that network,
application and security monitoring tools can leverage
the physical and virtual data flows to analyze congestion
points, security threats, and application behavior to help
automate, secure, and optimize the SDDC.
Key Benefits
•	 Non-disruptive deployment over existing physical
networks or next generation topologies
•	 Place and move virtual workloads independent
of physical topology
•	 Use data center micro-segmentation to achieve
tenant level isolation and security
•	 Pervasive visibility into virtual and physical network
traffic by offloading intelligent and scalable filtering
policies to Gigamon’s Visibility Fabric™
while
optimizing operational tool infrastructure
•	 Operational efficiency through automation using
VMware NSX APIs and Gigamon’s GigaVUE-VM
“Visibility in Motion” policy migration
Copyright © 2014 Gigamon. All rights reserved. Gigamon and the Gigamon logo are trademarks of Gigamon in the United States and/or other countries. Gigamon trademarks can be found at
www.gigamon.com/legal-trademarks. All other trademarks are the trademarks of their respective owners. Gigamon reserves the right to change, modify, transfer, or otherwise revise this publication without notice.
Gigamon®
| 3300 Olcott Street Santa Clara, CA 95054 | PH +1 (408) 831-4000 | www.gigamon.com				
Pervasive Visibility into SDDC/NSX Deployments
VMware // Technology Solution Brief
3125-01 08/14
Gigamon’s solutions extend visibility into the “Virtual Networks” using existing physical network monitoring tools.
•	 Filter and monitor traffic at virtual network level using GigaSMART®
Adaptive Packet Filtering
•	 Decapsulate VXLAN traffic using GigaSMART Header Stripping
•	 Integration with VMware vCenter to extend visibility policies for inter-host VM traffic using GigaVUE-VM
•	 Automated migration of VM-level monitoring policies when vMotion is detected
•	 Centralized management of physical and virtual visibility policies using GigaVUE-FM Fabric Manager
Learn More
For more information on the VMware and Gigamon solution, contact:
VMware Inc.
3401 Hillview Avenue
Palo Alto, CA 94304 USA
Phone: +1-877-486-9273
www.vmware.com
Gigamon Inc.
3300 Olcott Street
Santa Clara, CA 95054
Phone: +1 (408) 831-4000
www.gigamon.com
Gigamon and VMware joint solution
About VMware
VMware is radically transforming IT with technologies that make your
business more agile, efficient, and profitable. A pioneer in virtualization
and policy-driven automation, VMware simplifies IT complexity across
the entire data center. VMware delivers value to more than 500,000
customers through virtualization software, professional services,
and a robust ecosystem of more than 55,000 partners that drive
application interoperability and customer choice.
About Gigamon
Gigamon provides an intelligent Visibility Fabric™
architecture
to enable the management of increasingly complex networks.
Gigamon technology empowers infrastructure architects,
managers and operators with pervasive visibility and control
of traffic across both physical and virtual environments without
affecting the performance or stability of the production network.
Through patented technologies, centralized management and
a portfolio of high availability and high-density fabric nodes,
network traffic is intelligently delivered to management,
monitoring and security systems. Gigamon solutions have
been deployed globally across enterprise, data centers and
service providers, including over half of the Fortune 100 and
many government and federal agencies.

Contenu connexe

Tendances

SD WAN VS MPLS – Which is better for your Business?
SD WAN VS MPLS – Which is better for your Business?SD WAN VS MPLS – Which is better for your Business?
SD WAN VS MPLS – Which is better for your Business?Phani Kumar
 
VMworld 2013: Datacenter Transformation with Network Virtualization: Today an...
VMworld 2013: Datacenter Transformation with Network Virtualization: Today an...VMworld 2013: Datacenter Transformation with Network Virtualization: Today an...
VMworld 2013: Datacenter Transformation with Network Virtualization: Today an...VMworld
 
Windstream Hosted Solutions: Public Cloud Security
Windstream Hosted Solutions: Public Cloud SecurityWindstream Hosted Solutions: Public Cloud Security
Windstream Hosted Solutions: Public Cloud SecurityJason Proctor
 
NECOS Industrial Workshop lightning talk by Mateus Santos (Ericsson Research)
NECOS Industrial Workshop lightning talk by Mateus Santos (Ericsson Research) NECOS Industrial Workshop lightning talk by Mateus Santos (Ericsson Research)
NECOS Industrial Workshop lightning talk by Mateus Santos (Ericsson Research) Christian Esteve Rothenberg
 
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview VMworld
 
Netscaler for mobility and secure remote access
Netscaler for mobility and secure remote accessNetscaler for mobility and secure remote access
Netscaler for mobility and secure remote accessCitrix
 
Software defined security-framework_final
Software defined security-framework_finalSoftware defined security-framework_final
Software defined security-framework_finalLan & Wan Solutions
 
Verax Nms - Product Presentation
Verax Nms - Product PresentationVerax Nms - Product Presentation
Verax Nms - Product Presentationkarol_andrzejewski
 
VMworld 2014: Introduction to NSX
VMworld 2014: Introduction to NSXVMworld 2014: Introduction to NSX
VMworld 2014: Introduction to NSXVMworld
 
VMworld 2015: The Future of Network Virtualization with VMware NSX
VMworld 2015: The Future of Network Virtualization with VMware NSXVMworld 2015: The Future of Network Virtualization with VMware NSX
VMworld 2015: The Future of Network Virtualization with VMware NSXVMworld
 
Telus - Network as a service
Telus - Network as a serviceTelus - Network as a service
Telus - Network as a serviceGavin M Amos.
 
Hybrid cloud based firewalling
Hybrid cloud based firewallingHybrid cloud based firewalling
Hybrid cloud based firewallingJustin Cletus
 

Tendances (17)

VMware and Net Optics an Ixia company Provide Solutions for Monitoring for Vi...
VMware and Net Optics an Ixia company Provide Solutions for Monitoring for Vi...VMware and Net Optics an Ixia company Provide Solutions for Monitoring for Vi...
VMware and Net Optics an Ixia company Provide Solutions for Monitoring for Vi...
 
SD WAN VS MPLS – Which is better for your Business?
SD WAN VS MPLS – Which is better for your Business?SD WAN VS MPLS – Which is better for your Business?
SD WAN VS MPLS – Which is better for your Business?
 
Mss solution guide
Mss solution guideMss solution guide
Mss solution guide
 
VMworld 2013: Datacenter Transformation with Network Virtualization: Today an...
VMworld 2013: Datacenter Transformation with Network Virtualization: Today an...VMworld 2013: Datacenter Transformation with Network Virtualization: Today an...
VMworld 2013: Datacenter Transformation with Network Virtualization: Today an...
 
Cloud managed networking
Cloud managed networkingCloud managed networking
Cloud managed networking
 
Windstream Hosted Solutions: Public Cloud Security
Windstream Hosted Solutions: Public Cloud SecurityWindstream Hosted Solutions: Public Cloud Security
Windstream Hosted Solutions: Public Cloud Security
 
SD-WAN
SD-WANSD-WAN
SD-WAN
 
NECOS Industrial Workshop lightning talk by Mateus Santos (Ericsson Research)
NECOS Industrial Workshop lightning talk by Mateus Santos (Ericsson Research) NECOS Industrial Workshop lightning talk by Mateus Santos (Ericsson Research)
NECOS Industrial Workshop lightning talk by Mateus Santos (Ericsson Research)
 
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
 
Netscaler for mobility and secure remote access
Netscaler for mobility and secure remote accessNetscaler for mobility and secure remote access
Netscaler for mobility and secure remote access
 
SD-WAN
SD-WANSD-WAN
SD-WAN
 
Software defined security-framework_final
Software defined security-framework_finalSoftware defined security-framework_final
Software defined security-framework_final
 
Verax Nms - Product Presentation
Verax Nms - Product PresentationVerax Nms - Product Presentation
Verax Nms - Product Presentation
 
VMworld 2014: Introduction to NSX
VMworld 2014: Introduction to NSXVMworld 2014: Introduction to NSX
VMworld 2014: Introduction to NSX
 
VMworld 2015: The Future of Network Virtualization with VMware NSX
VMworld 2015: The Future of Network Virtualization with VMware NSXVMworld 2015: The Future of Network Virtualization with VMware NSX
VMworld 2015: The Future of Network Virtualization with VMware NSX
 
Telus - Network as a service
Telus - Network as a serviceTelus - Network as a service
Telus - Network as a service
 
Hybrid cloud based firewalling
Hybrid cloud based firewallingHybrid cloud based firewalling
Hybrid cloud based firewalling
 

Similaire à Gigamon Pervasive Visibility into SDDC/NSX Deployments

Whitepaper: Network Virtualization - Happiest Minds
Whitepaper: Network Virtualization - Happiest MindsWhitepaper: Network Virtualization - Happiest Minds
Whitepaper: Network Virtualization - Happiest MindsHappiest Minds Technologies
 
VMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesVMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesAngel Villar Garea
 
Cisco Meraki Portfolio Guide
Cisco Meraki Portfolio GuideCisco Meraki Portfolio Guide
Cisco Meraki Portfolio GuideMaticmind
 
Presentation Wsta
Presentation WstaPresentation Wsta
Presentation Wstawill4468
 
Presentation wsta
Presentation wstaPresentation wsta
Presentation wstawill4468
 
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - SegmentationVMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - SegmentationVMworld
 
VMworld 2013: Case Study: VMware vCloud Ecosystem Framework for Network and S...
VMworld 2013: Case Study: VMware vCloud Ecosystem Framework for Network and S...VMworld 2013: Case Study: VMware vCloud Ecosystem Framework for Network and S...
VMworld 2013: Case Study: VMware vCloud Ecosystem Framework for Network and S...VMworld
 
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco Canada
 
Enterasys OneFabric Brochure
Enterasys OneFabric BrochureEnterasys OneFabric Brochure
Enterasys OneFabric BrochureArrow ECS UK
 
SD-WAN PROTOCOLS
SD-WAN PROTOCOLSSD-WAN PROTOCOLS
SD-WAN PROTOCOLSbilal anjum
 
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...Jürgen Ambrosi
 
Building digital infrastructure for the cloud era
Building digital infrastructure for the cloud eraBuilding digital infrastructure for the cloud era
Building digital infrastructure for the cloud erapoojalate59
 
vmw-nokia-registers-vcloud-nfv-solution-overview.pdf
vmw-nokia-registers-vcloud-nfv-solution-overview.pdfvmw-nokia-registers-vcloud-nfv-solution-overview.pdf
vmw-nokia-registers-vcloud-nfv-solution-overview.pdfAsitSwain5
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureBaqar kazmi
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureMaliha Ali
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureBaqar Kazmi
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochurebakar kazmi
 
Simplificando a Rede Wireless - Aerohive
Simplificando a Rede Wireless - AerohiveSimplificando a Rede Wireless - Aerohive
Simplificando a Rede Wireless - AerohiveRodrigo Martini
 

Similaire à Gigamon Pervasive Visibility into SDDC/NSX Deployments (20)

Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in...
Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in...Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in...
Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in...
 
Whitepaper: Network Virtualization - Happiest Minds
Whitepaper: Network Virtualization - Happiest MindsWhitepaper: Network Virtualization - Happiest Minds
Whitepaper: Network Virtualization - Happiest Minds
 
VMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesVMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use cases
 
Cisco Meraki Portfolio Guide
Cisco Meraki Portfolio GuideCisco Meraki Portfolio Guide
Cisco Meraki Portfolio Guide
 
Presentation Wsta
Presentation WstaPresentation Wsta
Presentation Wsta
 
Presentation wsta
Presentation wstaPresentation wsta
Presentation wsta
 
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - SegmentationVMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
 
VMworld 2013: Case Study: VMware vCloud Ecosystem Framework for Network and S...
VMworld 2013: Case Study: VMware vCloud Ecosystem Framework for Network and S...VMworld 2013: Case Study: VMware vCloud Ecosystem Framework for Network and S...
VMworld 2013: Case Study: VMware vCloud Ecosystem Framework for Network and S...
 
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
 
Enterasys OneFabric Brochure
Enterasys OneFabric BrochureEnterasys OneFabric Brochure
Enterasys OneFabric Brochure
 
SD-WAN PROTOCOLS
SD-WAN PROTOCOLSSD-WAN PROTOCOLS
SD-WAN PROTOCOLS
 
Vx9000 datasheet
Vx9000 datasheetVx9000 datasheet
Vx9000 datasheet
 
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...
 
Building digital infrastructure for the cloud era
Building digital infrastructure for the cloud eraBuilding digital infrastructure for the cloud era
Building digital infrastructure for the cloud era
 
vmw-nokia-registers-vcloud-nfv-solution-overview.pdf
vmw-nokia-registers-vcloud-nfv-solution-overview.pdfvmw-nokia-registers-vcloud-nfv-solution-overview.pdf
vmw-nokia-registers-vcloud-nfv-solution-overview.pdf
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochure
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochure
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochure
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochure
 
Simplificando a Rede Wireless - Aerohive
Simplificando a Rede Wireless - AerohiveSimplificando a Rede Wireless - Aerohive
Simplificando a Rede Wireless - Aerohive
 

Plus de Angel Villar Garea

Plus de Angel Villar Garea (10)

VMware NSX NTT Case Study
VMware NSX NTT Case StudyVMware NSX NTT Case Study
VMware NSX NTT Case Study
 
A New Approach to Healthcare Security
A New Approach to Healthcare SecurityA New Approach to Healthcare Security
A New Approach to Healthcare Security
 
VMware Solutions for the Connected Car
VMware Solutions for the Connected CarVMware Solutions for the Connected Car
VMware Solutions for the Connected Car
 
Business and Economic Benefits of VMware NSX
Business and Economic Benefits of VMware NSXBusiness and Economic Benefits of VMware NSX
Business and Economic Benefits of VMware NSX
 
Arkin and VMware NSX Operations
Arkin and VMware NSX OperationsArkin and VMware NSX Operations
Arkin and VMware NSX Operations
 
NSX on VMware Data Center
NSX on VMware Data CenterNSX on VMware Data Center
NSX on VMware Data Center
 
Business Agility and Security with VMware
Business Agility and Security with VMwareBusiness Agility and Security with VMware
Business Agility and Security with VMware
 
OneCloud-VMwareNSX
OneCloud-VMwareNSXOneCloud-VMwareNSX
OneCloud-VMwareNSX
 
NSX Infographic - Security
NSX Infographic - SecurityNSX Infographic - Security
NSX Infographic - Security
 
Welcome!
Welcome!Welcome!
Welcome!
 

Dernier

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Dernier (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

Gigamon Pervasive Visibility into SDDC/NSX Deployments

  • 1. 1 Copyright © 2014 Gigamon. All rights reserved. Pervasive Visibility into SDDC/NSX Deployments VMware // Technology Solution Brief The Gigamon and VMware Joint Solution Overview Gigamon, a leader in network visibility and monitoring (NVM) solutions and VMware, the leader in server and network virtualization, are extending their partnership to provide pervasive and intelligent visibility into the physical and virtual networks by integrating the Gigamon Visibility Fabric with VMware NSX™ platform. VMware NSX is the leading network virtualization platform that delivers the operational model of a virtual machine for the network. Similar to virtual machines for compute, virtual networks are programmatically provisioned and managed independent of underlying hardware. NSX reproduces the entire network model in software, enabling any network topology—from simple to complex multi-tier networks— to be created and provisioned in seconds. Gigamon’s Visibility Fabric architecture is an innovative solution that delivers pervasive and dynamic visibility of traffic traversing communication networks. The Visibility Fabric architecture significantly improves network flexibility by enabling static tools to connect to dynamic, virtualized applications, so users can efficiently and securely address their business needs. The Visibility Fabric consists of distributed physical (GigaVUE H Series platforms) and virtual (GigaVUE-VM) nodes that provide an advanced level of filtering intelligence. At the heart of the fabric is Gigamon’s patented Flow Mapping® technology that identifies and directs incoming traffic to single or multiple tools based on user-defined rules implemented from a centralized fabric management console, GigaVUE-FM. How the Joint Solution Works VMware NSX leverages the vSwitches already present in server hypervisors across the data center. NSX coordinates these vSwitches and the network services pushed to them for connected VMs to effectively deliver a platform—or “network hypervisor”—for the creation of virtual networks. These virtual networks are created using encapsulation technologies like VXLAN, which create Layer 2 logical networks that are encapsulated in standard Layer 3 IP packets, thus allowing the extension of Layer 2 virtual networks across physical boundaries. A “Segment ID” in every frame differentiates the VXLAN logical networks from each other without any need for VLAN-Tags. With a 24 bit segment ID to uniquely identify broadcast domains, VXLAN enables multi-tenant environments at cloud scale and extends the Layer 2 network across physical boundaries by encapsulating the original frames in a MAC-in-UDP encapsulation. Monitoring performance of VXLAN networks and virtual tunnel endpoints is the key to enabling network operations teams to control and comprehend the “virtual” domains floated on top of the common networking and virtualization infrastructure. The Challenge Current network and security solutions are rigid, complex, and often vendor-specific. This creates a costly barrier to realizing the full agility of the software-defined data center (SDDC). Limitations of physical networking and traditional security tie an increasingly dynamic virtual world back to inflexible, dedicated hardware, creating artificial barriers to fast provisioning of networking and security services and simplified network operations. Manual provisioning and fragmented management interfaces reduce efficiency and limit the ability of enterprises to rapidly and securely deploy, move, and scale applications and data to meet business demands. Paramount to monitoring the SDDC infrastructure is the ability to have an immediate and rich understanding of activity in your network. To accomplish this, network monitoring solutions require visibility and monitoring of both virtual and physical infrastructure. This requirement can be challenging. Pervasive visibility into your SDDC requires this information to be readily accessible so that network, application and security monitoring tools can leverage the physical and virtual data flows to analyze congestion points, security threats, and application behavior to help automate, secure, and optimize the SDDC. Key Benefits • Non-disruptive deployment over existing physical networks or next generation topologies • Place and move virtual workloads independent of physical topology • Use data center micro-segmentation to achieve tenant level isolation and security • Pervasive visibility into virtual and physical network traffic by offloading intelligent and scalable filtering policies to Gigamon’s Visibility Fabric™ while optimizing operational tool infrastructure • Operational efficiency through automation using VMware NSX APIs and Gigamon’s GigaVUE-VM “Visibility in Motion” policy migration
  • 2. Copyright © 2014 Gigamon. All rights reserved. Gigamon and the Gigamon logo are trademarks of Gigamon in the United States and/or other countries. Gigamon trademarks can be found at www.gigamon.com/legal-trademarks. All other trademarks are the trademarks of their respective owners. Gigamon reserves the right to change, modify, transfer, or otherwise revise this publication without notice. Gigamon® | 3300 Olcott Street Santa Clara, CA 95054 | PH +1 (408) 831-4000 | www.gigamon.com Pervasive Visibility into SDDC/NSX Deployments VMware // Technology Solution Brief 3125-01 08/14 Gigamon’s solutions extend visibility into the “Virtual Networks” using existing physical network monitoring tools. • Filter and monitor traffic at virtual network level using GigaSMART® Adaptive Packet Filtering • Decapsulate VXLAN traffic using GigaSMART Header Stripping • Integration with VMware vCenter to extend visibility policies for inter-host VM traffic using GigaVUE-VM • Automated migration of VM-level monitoring policies when vMotion is detected • Centralized management of physical and virtual visibility policies using GigaVUE-FM Fabric Manager Learn More For more information on the VMware and Gigamon solution, contact: VMware Inc. 3401 Hillview Avenue Palo Alto, CA 94304 USA Phone: +1-877-486-9273 www.vmware.com Gigamon Inc. 3300 Olcott Street Santa Clara, CA 95054 Phone: +1 (408) 831-4000 www.gigamon.com Gigamon and VMware joint solution About VMware VMware is radically transforming IT with technologies that make your business more agile, efficient, and profitable. A pioneer in virtualization and policy-driven automation, VMware simplifies IT complexity across the entire data center. VMware delivers value to more than 500,000 customers through virtualization software, professional services, and a robust ecosystem of more than 55,000 partners that drive application interoperability and customer choice. About Gigamon Gigamon provides an intelligent Visibility Fabric™ architecture to enable the management of increasingly complex networks. Gigamon technology empowers infrastructure architects, managers and operators with pervasive visibility and control of traffic across both physical and virtual environments without affecting the performance or stability of the production network. Through patented technologies, centralized management and a portfolio of high availability and high-density fabric nodes, network traffic is intelligently delivered to management, monitoring and security systems. Gigamon solutions have been deployed globally across enterprise, data centers and service providers, including over half of the Fortune 100 and many government and federal agencies.