Q
Get started Bring yourself up to speed with our introductory content.

What is NSX micro-segmentation?

VMware's NSX network virtualization offering can add another layer of protection by isolating various elements in the vSphere infrastructure.

In basic networking, segmentation splits a physical network into logical sub-networks -- or subnets. Segmentation...

improves performance by minimizing the number of host systems on each subnet to reduce traffic congestion. It also improves security by limiting the reach of broadcast traffic and hiding the internal network structure, as well as mitigating network failures by containing effects within the subnet.

VMware's NSX offering carries these basic capabilities into network virtualization, citing benefits like isolation, segmentation and security. Isolation serves the same purpose in virtual networks that it does in virtual machines (VMs) -- it prevents communication across unrelated entities, yet requires no changes to the existing network architecture.

Segmentation works to direct and control communication within the virtual network right down to the individual physical NIC. Administrators can use NSX to establish a security perimeter around particular workloads or network segments to add east-west firewall functionality in the data center. This granular control has spawned the term "micro-segmentation." NSX micro-segmentation only works in environments that run on vSphere.

Security provides a distributed firewall and policies that follow VMs as they are deployed and moved. Third-party security products such as malware scanners and intrusion prevention tools also integrate with NSX to supply more comprehensive services.

Policies play a large role in network virtualization segmentation and security because policies follow business workflows allowing substantial automation for the enterprise. It's more than using IP addresses. Policies make use of VM names, virtual network identifiers, operating system information and other details to make better provisioning decisions and mitigate errors.

Network virtualization platforms such as NSX also support containers running on VMs. This approach combines the dynamic scalability of containers -- such as Docker and others -- with the isolation and mobility benefits of common VMs. For enterprises that need to isolate particular resources but retain some flexibility for various business goals, the NSX micro-segmentation feature is worth exploring.

Next Steps

Network micro-segmentation brings security to VMware NSX

Why server admins should consider micro-segmentation

What VMware's Arkin acquisition means for NSX

This was last published in August 2015

Dig Deeper on VMware and networking

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

Join the conversation

1 comment

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

Do you see any need in your environment for NSX micro-segmentation?
Cancel

-ADS BY GOOGLE

SearchServerVirtualization

SearchVirtualDesktop

SearchDataCenter

SearchCloudComputing

Close