I was recently tasked with setting up a site-to-site VPN between IOS-like devices. As networking was originally my target area of expertise in IT, I gladly jumped right in. In this tutorial, you will learn how to tackle such task and rollout S2S VPN without the assistance of a GUI!
Have you ever stopped for a second while reading through VMware documentation to ask yourself - what exactly is the SDDC it keeps repeating every other sentence? Well, here’s your anwer.
In one of the environments I was managing, the problem was simple - the archive space was running out and the management was tired in re-inventing the wheel every couple of years by basically re-building their archiving storage system. They wanted to switch to tape…
Key management servers (KMS), VMware vCenter, vSphere & vSAN. Each of these play an important part of vSAN encryption. What are the KMS requirements, the host requirements, and so on? How is vSAN encryption set up and managed? How do normal tasks change (or do they)? Does encryption impact the performance of vSAN? Each of these items will be covered at length, so you can become a Captain of vSAN Encryption (wink, wink).