vRA and NSX – Part 3, Security Groups and Policies

“vRA and NSX – Part 3, Security Groups and Policies” via virtualjad.com

vRA and NSX – Part 3, Security Groups and Policies

Recapping Part 2 of this series: We staged a number of NSX Logical Switches to be consumed by vRA machines as External Networks. vRA collects and identifies these networks as traditional [vSphere] Network Paths and allows them to be wired for consumption in the Converged Blueprint (CBP) designer as needed (or using custom properties , but that’s beyond this post). Logical Switches can be created for a consumption-only model, automatically created per Deployment when using…Read More


VMware Social Media Advocacy

This entry was posted in _. Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s