<

[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

x

Network Security Best Practices  For NSX

Published on
4,542 Points
1,542 Views
Last Modified:
NSX is a sort of virtualization platform that use of virtual switches. It is used widely in data centers; expanding data center network into virtualized platform is main feature. Therefore operators prefer to use virtual switches in addition to physical switches. For both switches operator must manage multiple management interfaces.

Let's briefly explain role of virtualization practically; for a server virtualization platform the target is virtual switches while  physical switches use a network management system.

A virtual network management system (VNMS) consists of a server virtualization platform, duplicate network switches and  user clients. Here a question comes to mind.  How does the VNMS communicate? The answer is by the help of network management interface (NMI) and device mangement interface (DMI). A DMI is a setting between the VNMS and network devices. A NMI is a setting between the network application and the VNMS.
NSX-Structure.png                                                                     Figure: NSX Structure

In terms of security, the VNMS contains information about virtual network management. Virtual network management information carries administrative knowledge about data center. Access attacks may be prevented by the control of the connections between the NMI and the DMI. This specific region of the virtual management network system that is the heart of security of NSX .

The other parts of system physical and virtual nodes are used for configuration of the management. The other role of virtual NMS is in integrating existing management of multiple interfaces into a single interface. The VNMS manages device connectivity in the managed target network. Performing this task, it stores network management  information about configured virtual networks in the target network. As a briefly explained result is that security algorithm of NSX depends on multiple parameters such as NMI , DMI and VNMS structures over virtualized system.

The Typical NSX  security algorithm consists of MD5 algorithm.The MD5 message-digest algorithm is a widely used cryptographic Hash function producing 128- bit (16-byte) hash value, typically expressed in text format as a 32 digit hexadecimal number.
MD5-verification.png                                                      Figure:MD5 key Implementation example

MD5 has been utilized in a wide variety of cryptographic applications, and is also commonly used to verify data integratiy of data centers .During network traffic security supplied by a MD5 algorithm ciphering over the platform.By usage of TCP protocol at the NSX makes necessary to use of firewalls too.

Upgrade-NSX-V-vs-Firewall.png                                                          Figure: NSX versus Configuration Firewall

Related Helpful Sources ,Further Reading and Link;
For administration guide; http://www.vmware.com/support/pubs. EN-001269-01
0
Comment
1 Comment

Expert Comment

by:prikan symon
FoxWebber is detected as one of the highgly troublesome computer create number of damage onto targeted system such as slow down processing speed, redirect browsing result and flood compromised computer with useless ads, irritating pop-ups and discount deal. Hence it is suggested to delete FoxWebber from compromised system as early as possible.

For more info, visit : http://pl.removepcadware.com/odinstalowac-foxwebber-jak-wobec-kompletnie-usunac-foxwebber
0

Featured Post

Simple Misconfiguration =Network Vulnerability

In this technical webinar, AlgoSec will present several examples of common misconfigurations; including a basic device change, business application connectivity changes, and data center migrations. Learn best practices to protect your business from attack.

Join & Write a Comment

The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…

Keep in touch with Experts Exchange

Tech news and trends delivered to your inbox every month