Appendix C. Memory Tables

Chapter 1

Image

Table 1-2 NSX Use Cases

Image

Table 1-3 NSX Network and Security Functions

Image

Table 1-4 NSX Components and Features

Chapter 2

Image

Table 2-2 LACP Modes

Image

Table 2-3 vSphere Standard Switch Forwarding Decision Rules

Image

Table 2-4 vSphere Standard Switch Portgroup VLAN Settings

Image

Table 2-5 vSphere Standard Switch Portgroup VLAN Settings

Image

Table 2-6 vSphere Distributed Switch Portgroup VLAN Settings

Image

Table 2-7 vSphere Distributed Switch Features Used by NSX

Chapter 3

Image

Table 3-3 Cross vCenter NSX Features

Chapter 4

Image

Table 4-2 vSphere Versions Supported by the NSX Modules

Image

Table 4-3 VMKNic Teaming Policies

Chapter 9

Image

Table 9-2 NSX Edge Virtual Machine Sizes

Image

Table 9-3 NSX Edge Service and Feature Limits per NSX Domain

Image

Table 9-4 NSX Edge Service and Feature Limits per Edge Size

Image

Table 9-5 Impact per Service of Standby Edge Becoming Active Edge

Chapter 10

Image

Table 10-2 Layer 2 VPN Supported Encryption Algorithms

Image

Table 10-4 Layer 2 Extension Support

Chapter 11

Image

Table 11-2 Features and Capabilities

Chapter 12

Image

Table 12-2 Routing Protocols

Image

Table 12-3 Administrative Distance

Image

Table 12-4 OSPF Areas

Image

Table 12-5 OSPF Neighbor Parameters

Image

Table 12-6 OSPF LSA Types

Image

Table 12-11 IS-IS Router Types

Chapter 13

Image

Table 13-2 IPsec Provided Security Features

Image

Table 13-3 IPsec VPN Support

Image

Table 13-5 SSL VPN-Plus Components

Image

Table 13-10 Authentication Methods Default Ports

Chapter 14

Image

Table 14-2 NSX Edge Load Balancer Support

Image

Table 14-3 Health Check Methods

Image

Table 14-4 Persistence States

Image

Table 14-5 Edge Load Balancer Throttle

Chapter 15

Image

Table 15-2 Design Compromises: Network Security

Image
Image

Table 15-5 Local DFW Rule Source and Destination Containers

Image

Table 15-6 Local DFW Rule Source and Destination Containers

Image

Table 15-7 Firewall Rule Applied To Options

Image

Table 15-9 Rule Change Options

Image

Table 15-10 vsipioctl Command Options

Chapter 16

Image

Table 16-2 Security Services

Image

Table 16-3 Dynamic Selection Options

Image

Table 16-4 Matching Criteria Options

Image

Table 16-5 Security Group Object Selection Options

Chapter 17

Image

Table 17-3 NSX Roles

Chapter 18

Image

Table 18-2 HTTP Methods Supported by NSX APIs

Image

Table 18-3 HTTP Responses