Virtual Livefire Solutions: NSX-T 3.0 Federation
Livefire Solutions, Global Strategic Programs
Virtual Livefire aims to bring the same classroom experience of an on-site Livefire class to online attendees. It consists of individual deep-dive sessions taken from current Livefire curriculum about advanced topics and integrations. Each session consists of a lecture and a custom Livefire hands-on lab designed to simulate a real-world customer use case and implementation.
- Network and Data Center Architects
- Network Virtualization Consultants
- Instructor-led online
- 40% lecture, 60% hands on lab
Two hours of instructor-led lecture followed by approximately 3 hours of hands-on lab time
- NSX-T Livefire: Next Generation Cloud
- VMware NSX-T: Install, Configure, Manage Class
This session is being offered by invitation only to VMware SI/SO, MSC and Ignite partners, along with internal customer-facing employees. Roadmap topics may be discussed; therefore, a signed NDA is required.
- Have a full-size laptop.
- Secondary device is recommended for reading and lab materials, which are only delivered electronically.
- Please ensure you have the US Keyboard mapping added to your devices
The NSX-T 3.0 Federation session is a full-day event that covers every aspect of the new NSX multi-site solution. Federation allows managing the network as a single entity while keeping configuration and operational state synchronized across multiple locations. Security policies attach and move with the workload, ensuring that policy compliance is maintained during workload failover or migration between sites.
The lecture is approximately 2 hours and covers the following topics:
- Federation use cases and positioning
- Management plane operations
- Supported network topologies
- Layer 2 and layer 3 packet walks
- Integration with the physical network IP routing
- Services deployment and placement
- Consistent security policy across sites
The lab is approximately 4 hours and covers the following tasks:
- On-Board Local Managers at two sites to the NSX Global Manager
- Create Stretched T0 Gateway and configure BGP Peering to the physical network
at both sites
- Create Stretched T1 Gateway DR Only and attach 3 Segments spanning both sites
- Move test WebApp to Stretched Segments and Configure micro-segmentation via
a Global Policy
- Migrate VM part of the WebApp to the second site to verify the consistent
security policy across sites
- Create Stretched T1 with Services and check how traffic flow is affected
- Create Local T1 Gateway and check how the routing advertisement is affected.
- Change the T0 Gateway configuration from All Primary to Primary/Secondary and
verify how the outbound traffic is affected