DMZ Anywhere takes DMZ security principles and decouples them from a traditional physical network and compute infrastructure to maximize security and visibility in a manner that is more scalable and efficient. With traditional design customers are forced to host separate hardware for DMZ due to dependency on physical security and hardware. With NSX this dependency is removed as routing, switching and firewalling can be done at kernel level or virtual machine vNIC level.
This post is made to address a common DMZ anywhere design of hosting production and DMZ workloads on same underlying hardware while making use of all SDDC features which NSX would offer. This post is made to get a complete view of an SDDC and its requirements with detailed physical and connectivity designs. Please note to make things simple i am talking about one site only in this design. This design can be used as a Low level design for SDDC to save your time and efforts.
Contents of the Post
Note: DMZ will have similar use case but only one port group.
The NSX Distributed Firewall is used to protect all management applications attached to application virtual networks. To secure the SDDC, only other solutions in the SDDC and approved administration IPs can directly communicate with individual components.
NSX micro segmentation will help manage all the firewall policies from single pane.
NSX deployment flow is given below. If you are looking for detailed vmware NSX installation and configuration guide please follow this post of mine.