This IBM® Redbooks® publication shows how to integrate IBM Software Defined Network for Virtual Environments (IBM SDN VE) seamlessly within a new or existing data center.
This book is aimed at pre- and post-sales support, targeting network administrators and other technical professionals that want to get an overview of this new and exciting technology, and see how it fits into the overall vision of a truly Software Defined Environment. It shows you all of the steps that are required to design, install, maintain, and troubleshoot the IBM SDN VE product. It also highlights specific, real-world examples that showcase the power and flexibility that IBM SDN VE has over traditional solutions with a legacy network infrastructure that is applied to virtual systems.
This book assumes that you have a general familiarity with networking and virtualization. It does not assume an in-depth understanding of KVM or VMware. It is written for administrators who want to get a quick start with IBM SDN VE in their respective virtualized infrastructure, and to get some virtual machines up and running by using the rich features of the product in a short amount of time (days, not week, or months).
Table of contents
Chapter 1. Introducing Software Defined Environments and Software Defined Networking
Chapter 2. Introducing IBM System Networking Software Defined Network for Virtual Environments
Chapter 3. Introduction to IBM Software Defined Network for Virtual Environments components
Chapter 4. Installing and configuring IBM Software Defined Networking for Virtual Environments VMware Edition
Chapter 5. Installing IBM Software Defined Networking for Virtual Environments in a KVM environment
Chapter 6. IBM Software Defined Networking for Virtual Environments architecture and design
Chapter 7. Use case 1: VM mobility and relocation
Chapter 8. Use case 2: Data center virtualization to virtualization
Chapter 9. Use case 3: Firewall and DNS in multidomains
Chapter 10. Use case 4: Multitenancy
Chapter 11. Advanced features
Chapter 12. Troubleshooting and maintenance
Appendix A. Overlay protocols in depth