NSX Identity Based Firewall – Part 1:…
NSX Identity Based Firewall – Part 1: Introduction _ vstellar.com NSX Identity Based Firewall – Part 1:… Introduction | Typically, firewall rules are based on security groups that contain IP addresses, a subnet, or virtual machines. These security groups can be used as a source or destination in an NSX environment, but this doesn’t cover all use cases. Let’s take an example where an NSX […]