[MUSIC] We've talked about how to get to a microsegmentation planning perspective, we talked about overlay, and underlay network visibility. But overall, and I think I put it third, I probably could've put it first. But NSX operations is really built into the platform itself. It's provided in native tooling that comes from VMWare, within network insight, within log insight. And really, what we say with this use case is, we want to make sure that your NSX environment is running as pristine as possible. Are you reaching limits from a memory perspective on the edge file, I know that's kind of a corner case. A fun one, does the overlay network, our VNIC, if we want to call it that, does the MTU match the physical network, right? Those very simple things that can ultimately affect the network can ultimately affect the performance of the NSX, and we do that from an NSX operations perspective. I mean, I could talk about use case after use case. The other thing that we've done within the tooling evolution here from VMWare is not only provide network insight, but provide log insight from an NSX operations perspective. But we're also going to tell you some customer best practices. Right, both between network insight and log insight, you have several dashboards, several widgets, pins, depending on the solution you're looking at. And we're actually going to tell you, hey, it is a best practice to do x or to do y, right, I mentioned some of the compliance pieces. Really, the focus of NSX operations is really about the entire platform. Using each of the tools to make sure that your organization is really up to speed where it needs to be. In simple things like, hey, give me a report of all the firewall changes that have occurred over the last 30 days. Simple things like that, you can do it via search, obviously use log insight to get the who. And with this platform obviously being NSX, being very powerful, the built-in solutions, built-in tools. We firmly believe that you can get there, but within the VMWare family and within the VMWare tool set. And obviously we have third-party integrations, partners, and so on that we're going to continue to work with partners as well. So let's do a quick review and we'll be done. So in today's session, we've talked about three key focus areas within NSX, within the platform itself, talking about microsegmentation planning. Very key, microsegmentation planning, you have Application Rule Manager. You have network insight, and you have what we call planning view. And then ultimately, you can even use log insight from a syslog perspective. Right, we can log all of the traffic. The second thing we covered is overlay and underlay visibility. That's looking at the NSX network constructs, the overlay constructs, the firewalling, the routing, the switching, the edge architectures. And then we also go into the physical networking devices. Now as I mentioned before, we work with our partners, Cisco, Juniper, Brocade. You name it, we support a plethora of networking providers, Dell, and so on. And then last but not least, NSX operations. One point I want to make here is with the tooling evolution, yeah, you have existing tools. Maybe you've used existing tools for your physical network. Withing the VMWare family, obviously with network insight and log insight, these were purpose-built solutions for NSX, right? Joint development, joint integration, all working together hand in hand. And at the end of the day, our customers are getting the option, they're picking and choosing. Yes, I need network insight, maybe I have another solution for log insight, but there's a better together story. We have integrations between the platform and network and log insight working together hand in hand. And a little bit of an anecdotal note, from a network insight perspective, you can deploy this on-premises, or you can actually do this in a SaaS fashion. So this is the tooling evolution from VMWare. I’m extremely excited, I hope you enjoyed kind of the quick view of Application Rule Manager, the quick view of network insight. Now, before we finalize and before we close out, I want to show you just a real quick view of network insight from an overlay and underlay visibility perspective, now let's take a look. All right, we're back in network insight, I've actually run the query already. We're looking at a virtual machine, DVadmin, DM1 to VM prod DB2. In this example I've got a VM topology, and a few other things I want to show you here. But you can tell real quick, DVM and VM1 is not associated with an NSX. It happens to reside on VLAN 629, leaving VM NIC 3. And you can see here a Nexus 7K from a VRF perspective, or at least the physical device perspective. I see the routing interfaces that are associated with this particular VRF, the physical networking components. In this particular environment, there is a Palo Alto that sits in between. Both from a routing and firewalling perspective, I've got a couple of firewall rules, as well as the routing interfaces between the non NSX environment to the NSX environment. Next hop on the path happens to be an Arista 7050. All of the VLANs, notice here that ECMP is enabled. If I click on the show all ECMP paths, it actually associates a few additional ECMP paths forming. And then I can see the entry into the NSX environment. VLAN10, I have my associated edge firewall from an NSX perspective. Routing table routing interface details, also known as the OSPF area IDs. Then I hit my first VX LAN happens to be corporate transit network. I see the DV port group, let me take a look at the VX LAN real quick, segment 5017. Really the associated NSX details, all of the VX lAN details for this particular path. I didn't see from my NSX edge network to my prod database network, which this virtual machine prod DB2, happens to be associated with. Before the communication will actually reach prod DB2, notice I have the NSX firewall and a few firewall rules associated from a DFW perspective. And then I have the Palo Alto VM series firewall. Well, this also works for checkpoint, in this data set, we had Palo Altos. And really, this is a significant enhancement for us. Customers continue to ask for end to end visibility, as you might call it. Another thing to note on this particular page is the VM underlay. Really important to see how this virtual machine DB admin VM1 is communicating. In this example, this virtual machine's sitting on an ESXI host VLAN 629. I've got a few slots from a Nexus perspective, happens to be a UCS chassis. And blade situation and then in this example, I have a Nexus 5K, I've got my interconnects. I've got my 5K, and then ultimately the UCS chassis associated with that virtual machine. I can see all of the labels and details for this particular instance. And the other thing of note from a visibility perspective, all within a single page. If I scroll down, I can see the path port metrics. As you can see, over the past seven days, between any of the associated virtual machines or NICs or physical devices in the path or virtual devices for that matter. And then last but not least, to go back to the flow use case in the recommended firewall use case from earlier, I can actually see the flows between these two virtual machines. Really, in this example, over the last 24 hours. There is a flow, happens to be over 1521 between DV admin VM1 and prod DB2. So this is the visibility use case within network insight. Not only can we can tie it to the flow and communication data, we can see the port path metrics. But we see the path from virtual machine to virtual machine, overlay, underlay, distributed firewall, physical firewall firewall, Palo Alto checkpoint, and so on. That's the visibility use case with the network insight. All right, that was overlay and underlay network visibility with network insight. And I just want to say, thank you for your time today. And we look forward to you implementing, using, utilizing, and honestly operating VMWare NSX in your environment, thank you. [MUSIC]