|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1252699988 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
210525s2021 caua o 001 0 eng d |
040 |
|
|
|a YDX
|b eng
|e rda
|e pn
|c YDX
|d GW5XE
|d EBLCP
|d OCLCO
|d N$T
|d OCLCF
|d VT2
|d K6U
|d UKAHL
|d OCLCQ
|d COM
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 1255220968
|a 1255228008
|a 1262677541
|a 1262687749
|
020 |
|
|
|a 9781484270837
|q (electronic bk.)
|
020 |
|
|
|a 1484270835
|q (electronic bk.)
|
020 |
|
|
|a 9781484270844
|q (print)
|
020 |
|
|
|a 1484270843
|
020 |
|
|
|z 9781484270820
|
020 |
|
|
|z 1484270827
|
024 |
7 |
|
|a 10.1007/978-1-4842-7083-7
|2 doi
|
029 |
1 |
|
|a AU@
|b 000069320082
|
029 |
1 |
|
|a AU@
|b 000069346991
|
035 |
|
|
|a (OCoLC)1252699988
|z (OCoLC)1255220968
|z (OCoLC)1255228008
|z (OCoLC)1262677541
|z (OCoLC)1262687749
|
050 |
|
4 |
|a TK5105.59
|b .H66 2021
|
072 |
|
7 |
|a U
|2 bicssc
|
072 |
|
7 |
|a COM000000
|2 bisacsh
|
072 |
|
7 |
|a UX
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Hoogendoorn, Iwan,
|e author.
|
245 |
1 |
0 |
|a Multi-site network and security services with NSX-T :
|b implement network security, stateful services, and operations /
|c Iwan Hoogendoorn.
|
264 |
|
1 |
|a [Berkeley] :
|b Apress,
|c [2021]
|
264 |
|
4 |
|c ©2021
|
300 |
|
|
|a 1 online resource :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
347 |
|
|
|b PDF
|
500 |
|
|
|a Includes index.
|
520 |
|
|
|a Know the basics of network security services and other stateful services such as NAT, gateway and distributed firewalls (L2-L7), virtual private networks (VPN), load balancing (LB), and IP address management. This book covers these network and security services and how NSX-T also offers integration and interoperability with various other products that are not only created by VMware, but are also referred by VMware as third-party integrated vendors. With the integration of VMware vRealize Automation, you can automate full application platforms consisting of multiple virtual machines with network and security services orchestrated and fully automated. From the operational perspective, this book provides best practices on how to configure logging, notification, and monitoring features and teaches you how to get the required visibility of not only your NSX-T platform but also your NSX-T-enabled network infrastructure. Another key part of this book is the explanation of multi-site capabilities and how network and security services can be offered across multiple on-premises locations with a single management pane. Interface with public cloud services also is included. The current position of NSX-T operation in on-premises private clouds and the position and integration with off-premises public clouds are covered as well. This book provides a good understanding of integrations with other software to bring the best out of NSX-T and offer even more features and capabilities. You will: Understand the NSX-T security firewall and advanced security Become familiar with NAT, DNS, DHCP, and load balancing features Monitor your NSX-T environment Be aware of NSX-T authentication and authorization possibilities Understand integration with cloud automation platforms Know what multi-cloud integrations are possible and how to integrate NSX-T with the public cloud.
|
505 |
0 |
|
|a Ch 1: NSX-T Security and Firewalls -- Ch 2: NSX-T Advanced Security -- Ch 3: NSX-T Service Insertion -- Ch 4: Network Address Translation (NAT), DHCP, and DNS Services -- Ch 5: Load Balancing -- Ch 6: NSX-T VPN -- Ch 7: NSX-T Intelligence, NSX-T Alarms/Events, and Network Visualizations -- Ch 8: Authentication and Authorization -- Ch 9: Federation -- Ch 10: Public Cloud Integration -- Ch 11: Cloud Management Platform Integration and Automation.
|
588 |
0 |
|
|a Online resource; title from PDF title page (SpringerLink, viewed June 16, 2021).
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Cloud computing.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Infonuagique.
|
650 |
|
7 |
|a Cloud computing.
|2 fast
|0 (OCoLC)fst01745899
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
776 |
0 |
8 |
|i Print version:
|z 1484270827
|z 9781484270820
|w (OCoLC)1243350278
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781484270837/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH39096889
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6628624
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2935914
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 17462366
|
994 |
|
|
|a 92
|b IZTAP
|