VMware NSX-V Master Deep-Dive Mentorship Program

  6 reviews

This comprehensive training course focuses on installing, configuring, and managing VMware NSX®. This course presents VMware NSX as a part of the software-defined data center. You will learn how to use logical switching in VMware NSX to virtualize your switching environment. The course also details logical routing to enable you to dynamically route between different virtual environments. And you will learn how to use gateway services, firewall configurations, and security services to help secure and optimize your VMware NSX environment.

45 hrs

Learning Hours

45 Days

Course Duration

Self Paced Learning

Days

09:00am-09:00pm

Timing

Online

Training Format

Guaranteed

Interview Pass

KEY HIGHLIGHTS
  • icon   45+ Hours of Intensive Hands-On Learning
  • vmware icons   12 Modules and 40 Lessons
  • vmware icon   1 Quizzes and 1 Assessments
  • vmware icon   47+ Hands On Labs
  • vmware icon   1 Mock Interviews
  • vmware students icon   15+ Yrs of Industry Experience and Certified Professionals
  • vmware office   1:1 personal career assistance with Industry Experts
  • icon   Placement and Certification Assistance
  • vmware student icon   Job Ready Resume and Portfolio building
  • icon   Alumni Support
Description About this course

This comprehensive training course focuses on installing, configuring, and managing VMware NSX®. This course presents VMware NSX as a part of the software-defined data center. You will learn how to use logical switching in VMware NSX to virtualize your switching environment. The course also details logical routing to enable you to dynamically route between different virtual environments. And you will learn how to use gateway services, firewall configurations, and security services to help secure and optimize your VMware NSX environment.

Course Content
  • 20 lecture
  • Introductions and course logistics
  • Course objectives
  • Anatomy of Virtual Networking
  • Describe VMware vSphere® networking components
  • Describe vSphere standard switches
  • Virtual Switches Connections Example
  • Distributed Switch Architecture
  • Describe vSphere distributed switches
  • Advantages of Distributed Switches
  • vSS and vDS comparison
  • Challenges with Traditional VLAN backed vDS
  • Challenges of Traditional Networking
  • Describe the benefits of NSX
  • NSX IT Automating IT Use Cases
  • NSX Security Use Cases
  • NSX Application Continuity Use Cases
  • Describe the NSX Architecture
  • Describe what is involved in planning an NSX deployment
  • Understanding NSX Planes of Operation
  • Understanding NSX Management Plane and its components
  • Understanding NSX Control Plane and its components
  • Understanding NSX Data Plane and Its components
  • NSX Management Plane Components Interaction
  • NSX Controller Cluster and ARP Supression
  • Understanding NSX Control Plane agents such as netcpa and vsfwd
  • Describe the NSX Controller cluster and deployment
  • Describe NSX Controller cluster high availability and load distribution
  • Explain how to deploy and configure the NSX Controller cluster
  • Understanding Physical View of vDS backed Networks
  • Understanding Physical View of NSX backed Networks
  • What is NSX Logical Switch
  • What is Virtual Extensible LAN (VxLAN)
  • Key Terminology of VXLAN
  • Understanding VxLAN Frame Format
  • Traffic Flow on VxLAN Backed vDS
  • Understanding VxLAN Packet Walk in NSX Environment
  • Role of Distributed Switches in VxLAN
  • Explain the workflow involved in NSX Host Preparation
  • NSX Logical Switching Components
  • Explain transport zones, VXLANs, and VXLAN tunnel end points (VTEPs)
  • Describe the procedure for preparing the infrastructure for virtual networking
  • Describe the configuration of vSphere distributed switches for VXLAN
  • Identify the components involved in NSX logical switching
  • vSphere Distributed Switch Considerations for VXLAN
  • Roles of Controller in NSX Logical Switching
  • Describe NSX Controller MAC Table and its functioning
  • Describe NSX Controller ARP Tables and Its functioning
  • Described NSX Controller VTEP Table and Its functioning
  • Describe NSX Unicast Replication Mode and How it works
  • Describe NSX Multicast Replication Mode and How it works
  • Describe NSX Hybrid Replication Mode and How it works
  • Describe Hair Pinning in NSX Environment
  • Describe East-West and North-South Routing in NSX
  • Describe East-West and North-South Routing components
  • Describe East-West and North-South Traffic Flows in NSX
  • Define the NSX distributed logical router
  • Explain the logical router, interfaces, and interface addresses
  • NSX Distributed Logical Router vs Edge Services Gateway
  • Describe Logical Router Deployment Models
  • Describe DLR Logical and Physical View
  • Describe DLR Routing Components Interaction
  • Describe DLR Routing Tables
  • Describe Deployment of NSX Distributed Logical Router
  • Describe Packet Flow of NSX Logical Router - Same Host
  • Describe Packet Flow of NSX Logical Router - Different Host
  • What is Routing and How it Connects Remote Networks
  • Describe Dynamic Routing Protocols
  • Describe OSPF and BGP Routing Protocols
  • Describe Deployment of NSX Edge Service Gateway
  • Describe NSX Edge Service Gateway Components
  • How To Connect Edge Services Gateway to NSX DLR
  • Configuring Dynamic Routing Protocols on NSX Edge Gateway
  • Describe Equal Cost Multipathing in NSX
  • Describe ECMP related Failure Events in NSX
  • Describe High Availability Services in NSX Edge Services Gateway
  • Describe Active/Standby HA Model in NSX Edge Services Gateway
  • Describe NSX Edge Service Gateway Components
  • Describe High Availability for NSX Logical Router
  • Describe High Availability for NSX Edge Services Gateway
  • Deployment of NSX Edge Gateway in ECMP Mode
  • Deployment of NSX Edge Services Gateway in HA Mode
  • What is Layer2 Bridging in NSX
  • What are key use cases of NSX Layer2 Bridging
  • How NSX Layer2 Bridging works
  • NSX L2 Bridging Instance Failure
  • Describe Layer2 Bridging Packet Flows
  • Configuring Layer2 Bridging in NSX
  • What is DNAT rule in NSX
  • What is SNAT rule in NSX
  • Use Cases of DNAT and SNAT in NSX
  • Configuring DNAT and SNAT rule in NSX Edge Gateway
  • Describe Layer2 Bridging Packet Flows
  • Describe NSX Load Balancer and Its use cases in NSX
  • Describe One Arm and Inline Load Balancer in NSX
  • Design Considerations of NSX Load Balancer
  • Configuring Load Balancer Service in NSX Edge Gateway
  • Describe L2VPN service in NSX Edge Gateway
  • Describe Use Cases of NSX Edge Services Gateway
  • Describe Key Features and Benefits of Edge Services Gateway
  • Configuring Layer2 VPN in Edge Services Gateway
  • Describe Site to Site IPSec VPN
  • Describe Use Cases of Site to Site IPSec VPN
  • Describe SSN VPN Plus in NSX Edge Services Gateway
  • Configuring IPSec VPN in NSX Edge Services Gateway
  • Describe DHCP service in NSX Edge Gateway
  • Describe Data Security Challenges with Traditional Infrastructure
  • Describe NSX Distributed Firewall
  • Use Cases of NSX Distributed Firewall
  • Describe Architecture of NSX Distributed Firewall
  • Describe Packet Flows of NSX Distributed Firewall
  • Describe NSX Distributed Firewall Communication Channels
  • Describe Centralized Management of NSX Firewalls
  • Getting Familiar with NSX UI for Firewall Rule creation
  • Configuring Distributed Firewall Rule for 3-Tier Application
  • Describe E-W and N-S Security in NSX SDDC
  • Face off between NSX DFW vs Edge Firewall
  • Describe IP Discovery for Virtual Machines in NSX
  • Describe VMware Tools based IP Discovery Mechanism
  • Describe ARP Snooping in NSX
  • Configure Spoofguard Policy in NSX
  • Describe NSX Security Groups
  • Describe NSX Security Policies and Tags
  • Describe NSX Service Composer and Its Use Cases
  • Creating NSX Security Group and Policies
  • Creating Firewall Rule using Security Groups and Policies
  • Describe the types of introspection services
  • Describe NSX Service Insertion Architecture and Its components
  • Describe NSX Service Chaining
  • Describe NSX Guest Introspection Architecture
  • Describe the installation and configuration of Guest Introspection
  • Describe Network Introspection and Its Use Cases
  • Guest Introspection vs Network Introspection
  • Configuring Firewall Rule using Application Rule Manager
  • Describe cross-vCenter features and use cases
  • Describe Cross vCenter Server Architecture and Its Key Components
  • Deploy universal logical networks
  • Explain the design considerations for cross-vCenter NSX
  • Describe Cross vCenter NSX deployment : Active/Active Model
  • Describe Cross vCenter Server NSX Deployment : Active/Passive Model
  • Troubleshooting NSX Manager and VC Connectivity
  • Getting Familiar with NSX Manager CLIs
  • Troubleshooting NSX Controller Deployment in NSX Manager Log
  • Troubleshooting Controller Deployment Failure due to Insufficient disk space
  • Describe NSX Controller Logs Location
  • Describe Host Preparation Pre-Requisites
  • Troubleshooting ESX Update Manager Issues
  • Troubleshooting VIB Installation Issues
  • Troubleshooting Insufficient Space Issues
  • Troubleshooting netcpa and vsfwd issues
  • Troubleshooting Logical Switch Issues in NSX
  • Troubleshooting DFW issues
  • Exclude VMs from Firewall Protection
  • Troubleshooting Partner Solution Registration
  • Describe VMware Networking and Security Vision
  • Describe VMware NSX Portfolio
  • Comparison between NSX-V and NSX-T
  • Describe NSX-T Architecture and its Components
  • Describe NSX-T Manager, Controllers and Transport Nodes
  • Describe NSX-T Logical Router Components
  • NSX-T Edge Topology and Edge Cluster
  • Describe NSX-V to NSX-T Migration Tools
  • Describe NSX Greenfield Deployment
  • Describe NSX Migration Coordinator Features
  • Describe the process of NSX-V to NSX-T migration using Migration Coordinator
  • Perform NSX-V to NSX-T Migration using Migration Coordinator
Hands On Labs Covered
  • 22 labs

In this lab, you perform the following tasks:

  • 1. Deploy NSX Manager OVA on Base ESXi Host
  • 2. Install NSX Manager as a VM
  • 3. Configure NSX Manager various parameters
  • 4. Access NSX Manager using NSX Manager UI

In this lab, you perform the following tasks:

  • 1. Register NSX Manager with vCenter Server
  • 2. Register NSX Manager with PSC.
  • 3. Review and Modify the NSX Manager Configuration
  • 4. Verify That the vSphere Web Client Plug-In for NSX Manager Is Installed

1. Deploy an NSX Controller Instance 2. Verify That the First NSX Controller Instance Is Operational

In this lab, you perform the following tasks: 1. Prepare for the Lab 2. Install NSX for vSphere Modules on the ESXi Hosts 3. Configure VXLAN on the ESXi Hosts 4. Configure the VXLAN ID Pool 5. Configure a Local Transport Zone

In this lab, you perform the following tasks: 1. Prepare for the Lab 2. Create Logical Switches 3. Verify That Logical Switch Port Groups Appear in vSphere 4. Migrate Virtual Machines to Logical Switches 5. Test Network Connectivity

In this lab, you perform the following tasks: 1. Prepare for the Lab 2. Configure and Deploy an NSX Distributed Logical Router 3. Verify the Distributed Router Deployment and Configuration 4. Test Connectivity

In this lab, you perform the following tasks: 1. Prepare for the Lab 2. Configure and Deploy an NSX Edge Services Gateway 3. Verify the NSX Edge Services Gateway Deployment 4. Configure Static Routes on the NSX Edge Services Gateway 5. Configure Static Routes on the Distributed Router 6. Test Connectivity Between an External Network and a Logical Switch Network

In this lab, you perform the following tasks: 1. Prepare for the Lab 2. Remove Static Routes from the Perimeter Gateway 3. Configure OSPF on the Perimeter Gateway 4. Redistribute the Perimeter Gateway Subnets 5. Remove Static Routes on the Distributed Router 6. Configure OSPF on the Distributed Router 7. Redistribute Distributed Router Internal Subnets

In this lab, you perform the following tasks: 1. Prepare for the Lab 2. Deploy an Additional NSX Edge Services Gateway 3. Configure Routing for Perimeter Gateway - ECMP 4. Configure a Static Route on Perimeter Gateway - ECMP 5. Configure Route Redistribution for Perimeter Gateway - ECMP 6. Verify the Relationship Between the Distributed Logical Router Routing Table and the Neighbor 7. Enable ECMP

In this lab, you perform the following tasks: 1. Prepare for the Lab 2. Configure NSX Edge High Availability 3. Examine the High Availability Service Status and Heartbeat 4. Force a Failover Condition 5. Restore the Failed Node

In this lab, you perform the following tasks: 1. Prepare for the Lab 2. Create a Port Group on the Distributed Switch for L2 Bridging 3. Move the Two Web Servers to the Host That Runs the Distributed Logical Router Control VM 4. Examine the Network Connectivity Between Web VMs and Resolve the Problem

In this lab, you perform the following tasks: 1. Prepare for the Lab 2. Verify Untranslated Packet Addressing 3. Configure an Additional IP Address on the Uplink Interface of the Perimeter Gateway 4. Configure a Destination NAT Rule 5. Use the Destination NAT to Test Connectivity 6. Verify Untranslated Packet Addressing Before Defining a Source NAT Rule 7. Configure a Source NAT Rule 8. Use the Source NAT to Test Connectivity 9. Configure a Destination NAT Rule for web-sv-02a

In this lab, you perform the following tasks: 1. Prepare for the Lab 2. Verify the Lack of Connectivity 3. Add an IP Address to the Uplink Interface of the Perimeter Gateway 4. Enable the Load Balancer Service and Configure an Application Profile 5. Create a Server Pool 6. Create a Virtual Server 7. Use the Packet Capture Capabilities of NSX Edge to Verify Round-Robin Load Balancing 8. Examine NAT Rule Changes 9. Migrate the Web-Tier Logical Switch to the Perimeter Gateway 10. Reposition the Virtual Server and Examine NAT Rule Changes 11. Use a Packet Capture to Verify Round-Robin Operation

In this lab, you perform the following tasks: 1. Prepare for the Lab 2. Create a Port Group on the Distributed Switch for the Sink Port 3. Create a Trunk Interface for the Perimeter Gateway 4. Configure the Perimeter Gateway as an L2 VPN Server 5. Prepare the Remote Site for Setting Up an L2 VPN Tunnel 6. Create an NSX Edge Gateway at the Remote Site 7. Attach a Remote Web Tier Network to the Remote Gateway 8. Configure the Remote Gateway as an L2 VPN Client 9. Update the web-sv-01b Web Server Located at the Remote Site 10. Test Tunnel Connectivity

In this lab, you perform the following tasks: 1. Prepare for the Lab 2. Prepare the Perimeter Gateway for IPsec Tunneling 3. Configure the Perimeter Gateway as an IPsec Tunnel Endpoint 4. Prepare the Remote Gateway for IPsec Tunneling 5. Update the web-sv-01b Web Server in the vCenter Server Inventory of the Remote Site 6. Configure the Remote Gateway as an IPsec Tunnel Endpoint 7. Test VPN Tunnel Connectivity 8. Disable IPsec on the Perimeter Gateway and Enable OSPF

In this lab, you perform the following tasks: 1. Prepare for the Lab 2. Create a Distributed Firewall Section 3. Configure Cross-Tier Rules 4. Restrict Inbound Web Server Traffic to HTTP and HTTPS 5. Review Distributed Firewall Log Entries 6. Restore a Saved Distributed Firewall Configuration

In this lab, you perform the following tasks: 1. Prepare for the Lab 2. Restrict Inbound Web Server Traffic to HTTP and HTTPS 3. Determine How the Firewall Rule Interacts with Other NSX Edge Features

In this lab, you perform the following tasks: 1. Prepare for the Lab 2. Prepare the Infrastructure for SpoofGuard 3. Verify That the SpoofGuard Policy Is Operational 4. Configure SpoofGuard to Remove the Windows7-2 VM from the Approval List 5. Verify That the Windows VM Is No Longer Trusted 6. Verify That the Windows VM Is Trusted Again

In this lab, you perform the following tasks: 1. Prepare for the Lab 2. Create a Security Group 3. Create a Security Policy 4. Verify the Policy Functionality Before the Virus Is Found 5. Verify the Policy Functionality After the Virus Is Found

In this lab, you perform the following tasks: 1. Prepare for the Lab 2. Create a Session and Capture Traffic Flows 3. Analyze the Traffic Flow Session Results 4. Publish and Analyze the Application Rule Manager Recommendations

In this lab, you perform the following tasks: 1. Prepare for the Lab 2. Prepare the Infrastructure for Endpoint Monitoring 3. Use Login, Ping, Web Browsing, and PuTTY to Create Data to Collect 4. Analyze the Data Collection Results

In this lab, you perform the following tasks: 1. Prepare for the Lab 2. Verify the Configuration of the NSX Manager Instances 3. Configure Primary and Secondary Roles for the NSX Manager Instances 4. Configure the Universal Segment ID Pool and the Universal Transport Zone 5. Create a Universal Logical Switch, and Connect the Web Servers 6. Reconfigure the IP Address of the web-sv-01b VM, and Verify L2 Connectivity Between the VMs 7. Configure the Universal Firewall Policy

WHAT OUR STUDENTS SAYING

Program Fee

Rs. 10/- 34999/- INR

What Included :

  • 65+ Hours of Intensive Hands-On Learning
  • 19 Modules and 40 Lessons
  • 47 Hands On Labs
  • 1 Quizzes and 1 Assignments
  • 1 Free Mock Interviews
  • VMware job ready resume and portfolio building assistance
  • 1:1 career counselling with Industry experts and mentors
  • Get access to alumni support and growing community

I’m Interested In this program

RATINGS & REVIEWS

5

6 Reviews
  • 6
  • 0
  • 0
  • 0
  • 0
S
Sateesh
05/01/2021

Before enrolling for this training I was skeptical that how a Virtual training can be as interactive as a classroom training but as I went ahead with the training my perception was changed all together which I would like to express in below points.
1. I had very basic idea about VMware networking but GOVMLAB was so patience with all my basic physical and VMware networking queries and tried to answer all my questions.

2. The virtual white board was amazing which gave us pictorial representation of each and every NSX topic which helped us realized the traffic flow to a great extent.

3. Each NSX topics was explained in such a ease by GOVMLAB that we always felt that we are connected to the Class and grasping NSX concepts.

4. GOVMLAB tried to make this NSX training as interesting as possible with real time use cases and some real time issues and how to fix it.

5. Even though my Organization shift timings ended at 3:00 AM IST , I was able to attend 8:00 AM training the very same day without much difficulty and I think this was one of the best part because GOVMLAB always kept this training session very interactive and interesting.

6. GOVMLAB is also very interactive and after going through it twice made the NSX concepts very clear and he is very friendly who listen to your questions and explain it in virtual whiteboard.

7. GOVMLAB is very patience with each and every member of a batch and try to address all query and made every member to understand the answer and question as well by drawing it on whiteboard and explain the packet flow.

8. The NSX topics are well organized and arranged in such a way that it made us go throughout the course very easily.

9. GOVMLAB explained NSX Switching , routing and Firewall in such an amazing way that we were able to understand it and implement the lab very easily.

10. At last I would encourage all IT professional to go for this training session without having any second thought as it greatly improved my technical skills and boost up my confidence.

T
triyambak
05/01/2021

NSX was my second training which i took from go vm lab. First training was vsphere 5.5 which i took in 2018 and NSX was just completed . Interesting fact was on both the cases i already took training from Vmware 5 Day class which was provided by my organization but still i went with these training which was provided by go vm lab . the reason to get second time training with go vm lab there was lot of concepts which was not clear with the training provided by vmware . it was just a explaining PPT if i ask any thing deep level in network trainer told its not part of course and some other issues like vmware trainer have limited time they have to complete course in 5 days with theory and LAB . even few cases trainer was not able to fix NSX lab issues.

Now after attending training with go vm lab i can say now what i was looking everything i got . All the fundamental concept of NSX are clear . the way this NSX training was deviled it was fantastic. whatever question we asked during the training everything go vm lab explained very well . . NSX training was started from vsphere Netwroking where we learned what is vsphere basic networking , VDS and VSS and all feature of these vsphere netwroking after that go vm lab explained problem in physical network how NSX solve these problem which is happening under laying physical network after that NSX concept like VXLAN, VTEAP, VNI, Logical switching and routing . Deep level of understanding how the packet flow happen between NSX network .

we learn NSX edges , Micro segmentation which is one of the popular feature NSX. Even this training was happen on line but go vm lab explained very well in Zoom with architectural diagram . Every concept of NSX very well explained with diagram other things which i liked go vm lab provided training recording , if you want to revise you can go website and revise those concepts Simulation LAB is fantastic . for all the NSX topic was explained in LAB very well. we can go though this LAB multiple time . if any one want to deploye and configure NSX in there production infra these LAB will be very help full. from my understanding vmware is nothing its concept only . if your concepts are clear you can handle it without any issue and you can troubleshoot any type of issues in vmware NSX.

I would recommend to all IT professional to get NSX training . this is one of technology which is demanding in market and very few people available in market who knows NSX very well After this training , I will be waiting for another training " VMware on AWS" hopefully VMware on AWS will be my 3rd training with go vm lab

P

Pankaj kumar
05/01/2021

It is my pleasure to share my feedback about GOVMLAB with my heart and soul, Thank so much GOVMLAB for such a great VMwware NSX training.

Please take few minutes to read the reviews which will truly inspire to join GOVMLAB. NSX 6.4 is my 1st training with govmlab.I have had VMware NSX training from VMware through my organization but that was so monotonous too learn anything as the trainer was more focused to finish the training content rather then to teach students in the class. It was 5 days class and i was okay until topic related to VMware, as soon as topic start in network, i was totally lost in the NSX training even if i have good fundamental knowledge on network side.

Come to point straight way, In my life i have seen such a well organized, most prolific, talented, versatile and thoroughly professional teacher in GOVMLAB who totally transformed learning and teaching methodology and this NSX Training from GOVMLAB was totally based on students feedback until a single topic is not cleared by student to move to next topic, the trainer was more lenient to deliver and try to clear all the doubts. This is how a parents like to share some knowledge to their kids.

I really enjoy this training because they way the training is getting delivered. I wish, we could have such good professional trainer more in our country which change the landscape of education as course content and fees are nominal as compared to other institute but after all knowledge we learn from is supreme. Please do not consider this is paid and fake reviews as this has come from heart.

If you courage to learn VMware stuff, Please join govmlab without hesitation. It is truly said by someone:- "Knowledge comes and grows, money comes and goes." Thank and Regards Pankaj Kumar

S
Saurabh
05/01/2021

I am sharing the feedback for the NSX-v training that I took from Govmlab

1. Entire focus during the training was on clearing the concept and not just finishing the course. The trainer never minds if you ask him very basic things many times.

2. The labs are well descriptive and simulated.

3. Concepts are being shared with used cases that helps in relating the things.

4. The trainer himself pauses and asks if you are able to catch or you any doubts which is not the case with VMware certified trainers.

5. Classes are being scheduled on Saturdays and Sundays only which provides ample of time during weekdays to go through the content. Additionally if you have any confusion, you can contact him and he is more then happy to help you.

6. After finishing the training, I can relate my NSX environment. I feel more confident working in my environment.

7. Last but not the least the trainer enjoys so much teaching his students that seems he is more keen in teaching then we are to learn!!

P
Praphan Kaewkul
13/06/22

Good Training

J
jayant khanade
11/09/23

The instructors from govmlab are always very professional and courteous to students. Students who sit the NSX classes receive a ton of information and have access to the labs beyond the class hours. students who want to work on labs outside classroom hours find this extremely helpful. and which makes the certification process very easy and smooth.