- Learning Windows Server Containers
- Srikanth Machiraju
- 224字
- 2021-07-02 23:23:18
Network virtualization
Network virtualization is the ability to create and manage a logical network of compute, storage, or other network resources. The components of a virtual network can be remotely located in the same or different physical networks across different geographical locations. Virtual networks help us create custom address spaces, logical subnets, custom network security groups for configuring restricted access to a group of nodes, custom IP configuration (few applications demand static IPs or IPs within a specific range), domain defined traffic routing, and so on.
Most of the LOB applications demand logical separation between business components for enhanced security, isolation, and scalability needs. Network virtualization helps build the isolation configuring subnet level security policies, restrict access to logical subnets or nodes using access control list (ACL), and restrict inbound/outbound traffic using custom routing without running a physical network. Public cloud vendors provide network virtualization on pay per use basis for small to medium scale business who cannot afford running a private IT infrastructure. For example, Microsoft Azure allows you to create a virtual network with network security boundaries, secure VPN tunnel to connect to your personal laptops, or on-premise infrastructure, high bandwidth private channels, and so on using pay-per-use pricing. You can run your applications on cloud with tight security among nodes using logical separation without even investing on any network devices.
- 操作系統實用教程(Linux版)
- Linux設備驅動開發詳解:基于最新的Linux4.0內核
- 樂學Windows操作系統
- Cybersecurity:Attack and Defense Strategies
- Red Hat Enterprise Linux 8系統管理實戰
- 阿里云數字新基建系列:云原生操作系統Kubernetes
- BPEL and Java Cookbook
- Learning Android Intents
- Linux網絡操作系統與實訓(第三版)
- Linux Shell編程從入門到精通(第2版)
- Windows Server 2012網絡操作系統企業應用案例詳解
- Kali Linux 2018:Windows Penetration Testing
- 完美應用RHEL 8
- Kali Linux高級滲透測試
- 從實踐中學習Windows滲透測試