In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-03-28 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
In a previous blog post using NSX to build proprietary subnets, I talked about using NSX to assign a proprietary internal network segment to a virtual desktop pool for greater business flexibility. In fact, the combination of Horizon and NSX brings a lot of benefits, you can read this article https://blogs.vmware.com/euc/2015/06/vmware-horizon-view-nsx.html to get a more comprehensive knowledge of this area. Well, this blog is really only in English. Let's take it as a good thing to kill two birds with one stone while learning new technologies.
Needless to say, the significant benefit that NSX brings to the virtual desktop of Horizon 6 is the network differential segment. What does it mean? In the past, firewall rules need to be set on the gateway, but within a subnet, there is no unified network firewall rule. Users can only rely on the firewall on each computer for separate settings, which is not convenient for unified management. Now with NSX, NSX adds a virtual firewall at the bottom of each virtual desktop, which can uniformly set the network data flow within the subnet, even within a subnet. What's more, by combining NSX with Horizon application layer, we can restrict different people from logging in to the same virtual desktop but accessing different network resources, which is absolutely impossible for a firewall on a stand-alone machine.
To set the corresponding firewall rules for Horizon in NSX, you need to add application services and service groups for Horizon 6. NSX 6.1and6.2do not provide related application services and service groups for Horizon 6 by default. The administrator has to manually add relevant information, such as source address, destination port, protocol, etc., to NSX. This is a time-consuming and error-prone process.
The Horizon for NSX service installation package we introduce to you today is a simple and easy-to-use gadget that only needs to be configured in a few steps, and then run a batch file, you can automatically install Horizon 6 application services and service groups into NSX. This tool greatly simplifies the work of administrators, facilitates the creation of NSX distributed firewall rules, and protects virtual desktops and virtual applications in the Horizon infrastructure.
As a reader of the Horizon environment administrator, you can download this tool from this URL https://labs.vmware.com/flings/horizon-service-installer-for-nsx to use. The Instructions in the web page has a detailed description of how to use it.
In addition, the tool is actually very extensible, and if you have some application services and service group configurations specific to your own environment, you just need to add your own content to the "Horizon6_Service.csv" of the tool. As for the format, you can understand it by opening the csv file. I won't repeat it any more. Run the "Install.bat" batch file again, and your own customized content will be added to the NSX.
About the author: Sam Zhao,EUC Solutions Department Manager. Have 13 years of IT experience in software development, testing and project management, published three patents and co-authored a book
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.