Archive for the ‘Uncategorized’ Category

NSX-V: Multi-site Options and Cross-VC NSX Design Guide

Friday, July 22nd, 2016

I also published this blog post about mult-site options and Cross-VC NSX design on the VMware NSX Network Virtualization Blog on July 22, 2016. The full blog post is provided below and can also be seen on the VMware NSX Network Virtualization Blog site. (more…)

Twitt

VMware NSX Online Fundamentals – Multi-Site/Disaster Recovery

Saturday, March 19th, 2016

Check-out this overview and walk-through presentation I recently did on Cross-VC NSX functionality introduced in NSX 6.2. Deployment models, Multi-Site, and Disaster Recovery solutions are also discussed. To view the video, you must first register. You will then have access to this video and other VMware/NSX sessions that can be viewed on demand.


VMware NSX Online Fundamentals – Multi-Site/Disaster Recovery

Twitt

Network Virtualization with VMware NSX Dominates VMworld 2013

Friday, October 25th, 2013

VMworld 2013 in San Francisco

VMworld 2013 in San Francisco


I’ve been meaning to write this blog for some time now as VMworld 2013 ended in San Francisco in late August. However, as VMworld just eneded in Barcelona, Spain last week, I guess it’s still not too late. I have to say out of all the tech events/conferences I attend, VMworld 2013 is definitely one of the most informative and beneficial. With an agenda filled with back-to-back speaker sessions, hands-on-labs, discussions on the solutions exchange expo floor, networking opportunities, and informal after-hour events, VMworld has catapulted to a must-go-to event for those in the high tech industry of networking, systems, and Enterprise/Datacenter infrastructure. (more…)

Twitt

Dell Force10 Z9000 – Creating Additional Layer 2 Isolation via Private VLANs

Saturday, July 7th, 2012

Private VLANs provide additional segregation capabilities within a VLAN. A private VLAN provides further layer 2 isolation between ports. A common example of private VLAN use is a hotel providing Internet access for patrons while at the same time preventing direct access between guest ports. Instead of using private VLANs, you can create a separate VLAN and assign a separate IP subnet to each guest as shown below. (more…)

Twitt