VMware NSX

VMware NSX

About TrustRadius Scoring
Score 8.4 out of 100
VMware NSX

Overview

Recent Reviews

Video Reviews

Leaving a video review helps other professionals like you evaluate products. Be the first one in your network to record a review of VMware NSX, and make your voice heard!

Pricing

View all pricing
N/A
Unavailable

What is VMware NSX?

VMware NSX is network virtualization technology.

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting / Integration Services

Would you like us to let the vendor know that you want pricing?

9 people want pricing too

Alternatives Pricing

What is Kemp LoadMaster?

LoadMaster from Kemp Technologies in New York is an application delivery controller.

What is ProtonVPN?

ProtonVPN is presented as a high-speed Swiss VPN that safeguards privacy, from the makers of ProtonMail and CERN engineers of Swiss-based Proton Technologies. With a free option and a strong no-log policy, users are assured that their browsing data is not tracked.

Features Scorecard

No scorecards have been submitted for this product yet..

Product Details

What is VMware NSX?

VMware NSX is a network virtualization and security platform that enables VMware’s cloud networking solution with a software-defined approach to networking that extends across data centers, clouds and application frameworks. With NSX, networking and security are brought closer to the application wherever it’s running, from virtual machines (VMs) to containers to physical servers. Like the operational model of VMs, networks can be provisioned and managed independent of underlying hardware. NSX reproduces the entire network model in software, enabling any network topology—from simple to complex multitier networks—to be created and provisioned in seconds. Users can create multiple virtual networks with diverse requirements, leveraging a combination of the services offered via NSX or from a broad ecosystem of third-party integrations—ranging from next-generation firewalls to performance management solutions—to build inherently more agile and secure environments. These services can then be extended to a variety of endpoints within and across clouds.

VMware NSX delivers a operational model for networking defined in software, forming the foundation of the software-defined data center (SDDC) and extending to a cloud network. Data center operators can now achieve levels of agility, security and economics that were previously unreachable when the data center network was tied solely to physical hardware components. NSX provides a complete set of logical networking and security capabilities and services, including logical switching, routing, firewalling, load balancing, virtual private network (VPN), quality of service (QoS), and monitoring. These services are provisioned in virtual networks through any cloud management platform leveraging NSX APIs. Virtual networks are deployed non-disruptively over any existing networking hardware and can extend across data centers, public and private clouds, container platforms, and physical servers.

Key features

  • Switching Enable logical Layer 2 overlay extensions across a routed (Layer 3) fabric within and across data center boundaries.
  • Routing Dynamic routing between virtual networks that is performed in a distributed manner in the hypervisor kernel, and scale-out routing with active-active failover with physical routers.
  • Static routing and dynamic routing protocols are supported, including support for IPv6.
  • Load balancing - VMware NSX Advanced Load Balancer™ provides enterprisegrade multi-cloud load balancing, global server load balancing (GSLB), application security and web application firewall, application analytics and container ingress services from the data center to the cloud.
  • Virtual routing and forwarding (VRF) Complete data plane isolation among tenants with a separate routing table, network address translation (NAT), and edge firewall support in each VRF on the NSX Tier-0 gateway.
  • Distributed firewall - Stateful firewalling of Layer 2 up to Layer 7 (including app identification, user identification, and distributed FQDN allowlisting) is embedded in the hypervisor kernel, and distributed across the entire environment with centralized policy and management. In addition, the NSX Distributed Firewall™ integrates directly into cloud native platforms such as Kubernetes and Pivotal Cloud Foundry, native public clouds such as AWS and Azure, as well as physical servers.

VMware NSX Video

VMware NSX Introduction

VMware NSX Integrations

VMware NSX Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo

Comparisons

View all alternatives

Reviews and Ratings

 (39)

Reviews

(1-4 of 4)
Companies can't remove reviews or game the system. Here's why
Jorge Filho | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Review Source
VMware NSX is used by our data center for east-west firewall (Internal connections of the virtual environment, for all departments of the company), therefore, letting the physical firewall work only with north-south connections (Leaving the environment to the internet).
  • Internal routing of VXLans (virtual network isolated from the physical network) without the use of switches, as an attractive virtual machine on the same host.
  • Rules management is very easy, being able to use tags.
  • Tools that assist in troubleshooting, such as flow monitoring, packet capture and traceflow in a graphical interface.
  • The migration is still very complex, because the data collector generates a lot of data that is not transferred and if it is determined automatically through the data collector, the environment can be unsafe. A strict review of the rules is necessary before making production.
  • There will be a graphical interface to solve problems in case of need to connect to DLR and EDGE.
  • A little more quality in the support of VMware itself that currently does not solve the problems so quickly.
Recommendation 10 for large companies, with a data center with more than 1000 VM's on average is very appropriate, as the security of the environment can be divided between physical firewall and virtual firewall and have another separate management for cases of troubleshooting, having only physical firewall in these In some cases, the rules are immense and this can cause future problems.
For Medium / Small companies, I do not recommend it, as the main one is a physical firewall, (Remembering that NSX does not replace a physical firewall), as smaller companies with less rules, only a physical firewall can be used.
Score 7 out of 10
Vetted Review
Verified User
Review Source
Used across datacenter to manage virtual environment in terms of networking and security.
  • Versatile in terms of features
  • Modular
  • Easy integration if you are heavy vSphere user
  • Interoperability in multi-vendor environments
  • Advanced networking and packet acceleration options can be improved
Well-suited for virtual environment that are already VMware heavy.

Not suited for NFV yet with the current feature set.
Score 10 out of 10
Vetted Review
Verified User
Review Source
We are using VMware NSX for network security and management across 3 vCenters, two of which are VDI. It has allowed for micro-segmentation, native load balancing, firewalling for our servers, and broadcast suppression for a highly scalable VDI environment. It has provided simplified management and security. It has also allowed us to deploy new load balancers faster than a purchase order could even be cut, and allowed for much more dynamic security design. It has also provided the ability for us to move towards a much greater software-defined data center environment, which has allowed for greater flexibility in the future.
  • Broadcast Suppression: By suppressing broadcast traffic, we have been able to deploy a single VDI network in a /18 network space, allowing for rapid growth and proper DHCP lease timing for a VDI instant clone environment.
  • Networking HA: Leveraging internal mechanisms for high availability, it provides disaster resiliency to a virtual networking environment.
  • Cost Savings: All available features of NSX are licensed simultaneously. Load balancers, firewalls, and routers are all licensed as features, not per object, allowing for the deployment of as many of these objects as are needed.
  • Firewall rules can break all communication. If a rule is improperly written, it can block all communication to the hosts, vCenter(s), and NSX components, requiring lengthy recovery times.
  • If NSX components break, it can break the entire system if it is not properly designed. No components are required to manage NSX which should exist behind NSX networks, just like no vCenter components should exist behind vCenter objects (VVols, VSAN, DVS).
With proper design, VMware NSX can and should be deployed to virtually any VMware virtualization environment, but the deployment should be tailored to the needs of that environment. There isn't really a one size fits all deployment design for all environments. That versatility is what provides its greatest strength to a business.
Score 9 out of 10
Vetted Review
Verified User
Review Source
VMware NSX is being used in our high-security environments that require end to end encryption and micro-segmentation between endpoints. This was a challenge that I haven't seen another solution too besides rewriting applications which isn't always possible or reasonable. It's not widely used because of the steep price tag compared to some alternatives but has its place in the high-security environments we have deployed in several data centers.
  • End to end encryption on the wire.
  • Micro-segmentation.
  • Integrates well with existing VMWare environment.
  • Integrates well with our existing network.
  • Our biggest challenge is gaining acceptance from network engineers who are used to working with other technologies.
Our high-security environments require end to end encryption, but also tend to have larger budgets. Since beginning utilization of VMware NSX, we've been able to meet the unique requirements for our high-security clients, but it does have a large price tag that goes along with it. This isn't a particularly well-suited solution for environments with tighter budgets, but it definitely provides security where we need it and are willing to pay for this solution.