The most valuable part of NSX is it's very scalable and automated. Our change request time is really low.
Network Engineer
Video Review
It's very scalable and automated
What is most valuable?
What do I think about the stability of the solution?
For the most part, it's very stable.
The only hiccup is sometimes during an upgrade, there are hurdles that you can have during that time, but overall it's very stable.
What do I think about the scalability of the solution?
Since we're almost 100% virtual, it's been very scalable for us.
How are customer service and support?
Sometimes, it can be difficult to get to a higher level engineer if you need to, but it takes some work to make that case. Usually it happens, but it's a little difficult.
Buyer's Guide
VMware NSX
January 2026
Learn what your peers think about VMware NSX. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,733 professionals have used our research since 2012.
How was the initial setup?
It seems to be very straightforward. Usually a lot of it's handled by the installer. Yeah, very straightforward. As long as you read the design guide, it's easy.
Which other solutions did I evaluate?
An important reason for selecting was VMware because they're the hypervisor we use and we see them to be a very valuable asset in purchasing something like NSX, and because they're the owner of the hypervisor and they have direct access into the hypervisor. That's very valuable for us. We foresee it being a very reliable product into the future.
What other advice do I have?
An important reason for selecting was VMware because they're the hypervisor we use and we see them to be a very valuable asset in purchasing something like NSX, and because they're the owner of the hypervisor and they have direct access into the hypervisor. That's very valuable for us. We foresee it being a very reliable product into the future.
They developed the hypervisor, which is very valuable to us, because it has saved us a lot of money just on the micro-segmentation piece. That's basically all we use at this point, but the product has more than paid for itself just with that part of the product.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior Solutions Architect
Video Review
Facilitates setting security policies right at the interfacing virtual machine, which we couldn't do in the past
Pros and Cons
- "It does have capabilities of micro-segmenting a network, being able to create smaller segments of various types of applications separated by various tiers."
- "I think that one of the more important things to see better integrated into the NSX product would be an IDS/IPS type solution."
What is most valuable?
NSX is extremely invaluable from the standpoint of security.
It does have capabilities of micro-segmenting a network, being able to create smaller segments of various types of applications separated by various tiers.
However, what it's mostly important for is being able to actually set security policies right at the interfacing virtual machine, which we haven't had the ability to do in the past.
What needs improvement?
So the third-party marketplace is growing and growing for this product and being able to redirect traffic to them, to the third-party products in order to take advantage of those additional features, is wonderful.
I think that one of the more important things to see better integrated into the NSX product would be an IDS/IPS type solution, which right now we're handing off to a third-party, which sometimes doubles the cost of the product. However, there are new products that we're learning about over the course of this week like AppDefense, that may actually help provide some additional capabilities in terms of that IDS/IPS type structure.
What do I think about the stability of the solution?
There are elements that have been added to it over the years, but its history goes way back with vShield, and has been included in products like vCloud Director, etc. To be honest with you, I've deployed it over the past five to six years and I've had nothing but great success with it.
How is customer service and technical support?
From a tech support standpoint, as with most VMware text support, the people that we get a hold of on the phone are generally very knowledgeable of the product and have the ability to actually help us through whatever issue we have. We try not to spin our wheels too much. We do try to dig in as much as we can, but as soon as we understand we've gone beyond our limitations we get them on the phone and we've never had an issue trying to get the support we need.
How was the initial setup?
It's a complex product so setup is essentially as easy as the person whose knowledge is being used to install it. There are various elements to it. It can be installed in modules - in a modular fashion. You don't have to install everything right away. And, unfortunately, with this particular product, when you read through all the marketing materials it sounds like it has to be installed completely when, in fact, you can start out with only the pieces you need and add what you need - the other pieces - later as needed.
What other advice do I have?
I always have a hard time giving a ten to anything. I think everything needs improvement. So that's why I would give it a solid eight out of 10.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
VMware NSX
January 2026
Learn what your peers think about VMware NSX. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,733 professionals have used our research since 2012.
IT Support Specialist at a mining and metals company with 10,001+ employees
Scalable; takes care of our whole environment
What is most valuable?
Security. Our Trend platform runs off NSX.
How has it helped my organization?
We use the solution strictly for security.
For how long have I used the solution?
Roughly six months.
What was my experience with deployment of the solution?
We didn't have this issue, but I would recommend to others looking at this solution to make sure that their hardware is compatible.
What do I think about the scalability of the solution?
It seems to be taking care of our whole environment. It seems to be pretty scalable.
How are customer service and technical support?
I have not used it, but my coworker has. Every time he talks to them, they're easy to get a hold of; very knowledgeable and they solve his issues right away.
If you put in a trouble ticket, they contact you very quickly (in response). If there is a problem, it usually isn't around very long. They jump on it, fix it, and it's done.
Which solution did I use previously and why did I switch?
We were on McAfee, and we switched to Trend. We switched to Trend because Trend supports virtual environment a lot better than McAfee does.
Trend migrated in a way that it will only work with NSX. The older version of Trend that we were on worked without NSX. The newer version does not. Now, we use NSX in conjunction with Trend.
We upgraded Trend to keep up-to-date and all the security loopholes closed.
What other advice do I have?
Most important criteria when selecting a vendor:
- They have to be able to support the environment you're running.
- The service and support is a big must. We work at an Enterprise level, so sometimes you can't go with the little new guy. You need that 24 hour service and support, seven days a week. It is very important for us.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
IT Specialist at a tech services company
Very easy to use out-of-the-box and doesn't have a steep learning curve
Pros and Cons
- "The ability to scale from different clouds. At the moment, the scalability of the product is the number one thing that I saw."
What is most valuable?
The ability to scale from different clouds. At the moment, the scalability of the product is the number one thing that I saw.
Right now, we're doing a private cloud, since we're government. In the future, we may want to look at public, but probably not.
How has it helped my organization?
It has the potential to improve the way we function by having our different clouds be able to easily communicate back and forth. Right now, it takes a lot of work to do collaboration from our test lab, to our production, and to do anything in-between. It has the potential of giving us streamline migrations from the test lab to production.
What needs improvement?
Pricing and licensing could be improved as we are a government entity. Lower pricing could always help.
For how long have I used the solution?
We just got it.
What was my experience with deployment of the solution?
About five to 10 people set new products up and we kick them down the road all the time. As soon as we see something real good we call in some users and it gets big. They call their managers and it grows; it's like a wildfire.
But it will start off as a spark, and I'm the spark.
What do I think about the stability of the solution?
It is pretty good. It cuts down on duplication. Right now, I have tools in the lab, have tools in pre-prod, and have tools in production.
Right now and well in the future, if we implement it, we'll be able to have the same tool set be applied through all regions and transfer and not have duplication. It will outline and teach our users how to operate them. Therefore, we will have one set of tools, one set of instructions, and they can operate in all three environments.
What do I think about the scalability of the solution?
Scalability definitely looks awesome. Again the three environments we'll be able to use one set of tools. Everybody would be familiar with it. It won't operate this region and a different way in another region because it's from another vendor, where one set of tools would be able to pass throughout all of our regions.
Our scale right now is about 60 users (the production and the customer).
Which solution did I use previously and why did I switch?
We had multiple solutions.
We were making do with what we had, but again, going to different conferences and seeing what other people were using. We got curious and our vendor said, let's demo it. So, we made time for it, and after we made time for the demo, we realized we should have been doing this two years ago.
How was the initial setup?
I was involved in the initial setup. It was straightforward. We did it with our government PFE.
What about the implementation team?
We do have partners, who are knowledgeable, did offer to come in and set it up for us. We had access to our online lab from our vendor, so they had to set it up, connect it, demo it, and see how it runs. Though, we set ours up.
Which other solutions did I evaluate?
Dell EMC and Symantec.
What other advice do I have?
It's a solid product. Very easy to use out-of-the-box. It didn't have a steep learning curve, and we're still finding things that we can add-on.
I would encourage anyone looking to buy the solution to demo it in a lab, or come to a conference and see it. They should see how it would fit in their environment, and don't be overwhelmed or overworked by adding another solution because the results pays off.
Most important criteria when selecting a vendor:
- Price
- Security
- Meeting the application requirements.
- Technical support.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior Technical Consultant at a tech services company with 1,001-5,000 employees
Provides Microsegmentation And Good Security Features For North-South And East-West Traffic Across Your SDDC
What is most valuable?
The ease in which to install this product and make it work straight away without minimum changes in your physical network and is simply astonishing. The only thing you need to do when installing this product is change your MTU to 1600 (jumbo frames). It provides microsegmentation and good security features for north-south and east-west traffic across your SDDC. The performance you obtain at the virtual layer and traffic crossing for your VMs gets improved dramatically because the traffic doesn't leave the hypervisor. I'm not a network guy myself but NSX makes it really easy to understand how the virtual network pins together and how you can manage the traffic and security within your VMware deployment without the hassle of changing VLANs, adding unnecessary protocols for discovery, etc.
Encapsulating the traffic using VXLAN is a great addition. It extrapolates the number of VLANs that you can stretch to an almost infinite number of VXLAN (millions of VXLANs). In abstract, you are dealing with numerous VLANs every time you want to send traffic from one VM to another, basically VMs on different hosts within the same datacenter will be connected to the same logical switch and traffic is advertised via unicast traffic from the NSX controllers to let every body know in the environment "who is who" to minimize the amount of multicast traffic.
How has it helped my organization?
We haven't installed this in our environment yet. We have a major lab to provide our Ci-Dev team a sandpit to test apps and its security when deploying a three-tier application on our customers and test every single connection and performance before handing over the application to the customer.
What needs improvement?
The upgrade process is okay overall, but we have encountered issues every time when upgrading with the ESXi hosts VIB installation packages not being properly deployed, and after upgrading NSX manager, the ESXi hosts still uses the old version. This causes additional steps to manually remove those old VIBs from the ESXi, reinstall them, and try again. In some cases, we had to uninstall and install them from scratch NSX and restore from backup, which in a real world scenario won't be desirable to do. You would like to have an in-place a seamless upgrade from one version to another, especially if you are changing minor versions (e.g., 6.3.1 to 6.3.2).
For how long have I used the solution?
Six months now.
What was my experience with deployment of the solution?
The upgrade process is okay overall, but we have encountered issues every time when upgrading with the ESXi hosts VIB installation packages not being properly deployed, and after upgrading NSX manager, the ESXi hosts still uses the old version. This causes additional steps to manually remove those old VIBs from the ESXi, reinstall them, and try again. In some cases, we had to uninstall and install them from scratch NSX and restore from backup, which in a real world scenario won't be desirable to do. You would like to have an in-place a seamless upgrade from one version to another, especially if you are changing minor versions (e.g., 6.3.1 to 6.3.2).
What do I think about the stability of the solution?
A very stable product, it is more mature than it was four years ago when it first came out. The performance you get with this product is near-line rate.
What do I think about the scalability of the solution?
If you have a large environment, the sprawl of Distributed Logical Routers or logical switches can be hard to manage, but you will have the same issues in a physical network.
How are customer service and technical support?
Customer Service:
We have a direct line with VMware support and with the specialized engineer who provides support on NSX. We haven't had to open a support call yet, but the engineer we've dealt with is very capable and knowledgeable on the product.
Technical Support:Excellent. VMware engineers are top of the line. I haven't met one engineer who doesn't know the product well that they support.
Which solution did I use previously and why did I switch?
Nope, never used a network virtualisation product before.
How was the initial setup?
It was straightforward. Just a couple of install media and .ovf files and you're done. The interesting part comes after installation when you need to define your virtual network architecture and how you're going to deploy rules and connectivity for your VMs.
What about the implementation team?
In-house deployment. We're a large VMware shop and know VMware products well.
What was our ROI?
Not applicable for this product yet.
What's my experience with pricing, setup cost, and licensing?
We got the licenses from VMware as part of the NFR agreement, but you will require a medium infrastructure to deploy this initially. Lot of memory and CPU are required to have the product run smoothly
Which other solutions did I evaluate?
No, there are no other products in the market that provide network virtualisation as far as I know.
What other advice do I have?
Download the installer, try it, and you will love it. Some hardcore network administrators will say it is not the same, and of course is not the same, but it is a new way to do things in the network space. It is the way of the future when deploying large networks in Software Defined Data Centres.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior Network Engineer at a tech services company with 1,001-5,000 employees
I Liked Distributed Logical Switching, Distributed Logical Router and Distributed Firewall the most.
What is most valuable?
I have worked on NSX for the last couple of months and I Liked Distributed Logical Switching, Distributed Logical Router and Distributed Firewall the most.
How has it helped my organization?
We have deployed it in a virtual environment and it saved a lot of time and effort for us to configure.
What needs improvement?
Speed of the NSX Controllers while deploying sometimes gets a bit slower which can be improved, overall its a great product
For how long have I used the solution?
Last few months.
What was my experience with deployment of the solution?
No issues.
What do I think about the stability of the solution?
No issues.
What do I think about the scalability of the solution?
No issues.
How are customer service and technical support?
Customer Service:
Satisfied.
Technical Support:Satisfied.
Which solution did I use previously and why did I switch?
No.
What about the implementation team?
We are a Partner and we have deployed it for our customer.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Pre-Sales Engineer at a tech services company with 51-200 employees
Open APIs allow seamless integration with other products.
What is most valuable?
Open APIs allow seamless integration with other products. Eventhough Lastline does not provide an end-to-end solution like their rivals, namely McAfee, TrendMicro and Symantec, Lastline excels by providing their APIs so that they could be integrated with other security products.
How has it helped my organization?
With Lastline, the effort to put in into the protecting the users against zero-day threats and malware can be subsequently reduced. It's accuracy and analysis reports on the objects are what all the other vendors should make an example of.
What needs improvement?
Lastline's reports can sometimes be very complicated and somehow leaves users with lots of technical information that cannot be easily digested. A more presentable reporting should be provided. However, this is not a weakness and their reporting is only suitable for people with certain technical knowledge.
Lastline itself is a complicated product to navigate through, although it provides a lot of details to the users. This was a feedback from one of our customer here during the POC stage. Users may be required to be technically sound to understand what Lastline has provided to them. What I mean by "a more presentable reporting" is that Lastline should provide a more user readable format of the report; perhaps more visual storyline of their process?
For how long have I used the solution?
I have been using and performing POC on Lastline for my customers for around 1 year.
What was my experience with deployment of the solution?
No issues.
What do I think about the stability of the solution?
No stability issues.
What do I think about the scalability of the solution?
Lastline has no issue with scalability as it is by far the more scalable amongst APT solutions.
How are customer service and technical support?
Customer Service:
Lastline support has yet to fully penetrate into the SEA market. Their responses may come from their Sales and System engineers instead of their support team.
Technical Support:As mentioned, their system engineers are very well trained and experience enough to answer most of the technical and product inquiries thrown at them.
Which solution did I use previously and why did I switch?
No.
How was the initial setup?
Initial setup is very straightforward for cloud-based deployment. For on-premise deployment, it will require some UNIX-based commands knowledge.
What's my experience with pricing, setup cost, and licensing?
Lastline is not a cheap product if compared with their competitors. I wish they could do something about the pricing as it is very hard to convince the customers on such a model.
Disclosure: My company has a business relationship with this vendor other than being a customer. I have evaluated, tested and perform proof of concepts for our customers.
Practice Manager - Cloud, Automation & DevOps at a tech services company with 501-1,000 employees
NSX for vSphere vs. NSX Multi-Hypervisor
Originally posted at vcdx133.com.
This post provides a Tech101 breakdown of VMware NSX. If you have heard the buzz-word “NSX” or “Network Virtualisation” and want to learn more about it, this post is for you.
VMware NSX has two distinct variants – NSX for vSphere (NSX-v) and NSX Multi-Hypervisor (NSX-MH). The most feature rich version is NSX-v (as you would expect) and the most flexible and vendor agnostic is NSX-MH (albeit with less features). Currently these are separate binaries that you download and deploy, however there is talk that in the future it will be a single binary set with a V/MH software setting during deployment.
A little bit of history will also clarify things. VMware acquired Nicira in 2012 and integrated/developed the NSX product suite by combining VMware’s vCNS (aka vShield Edge and App) with Nicira’s NVP. So if you understand vShield, it will give you a good start to mastering NSX.
The diagram below illustrates the NSX architecture, complete with physical infrastructure. Note, storage virtualisation has been deliberately left out of the diagram since it is not in-scope. The “P2V” lines denote the possible NSX overlay to physical network integrations.
NSX for vSphere (NSX-v)
NSX-v has the following components:
- vSphere ESXi – server hypervisor.
- vSphere Distributed Switch – the advanced Layer 2 virtual Switch that VMware provides with the Enterprise Plus licence (you cannot use the vSphere Standard Switch with NSX).
- NSX Manager – management interface of NSX, presented via the vSphere Web Client and has a northbound NSX API.
- NSX Controller – the control plane of NSX which also has the northbound NSX API.
- Logical Switch – VXLAN tunnels that run across disparate networks.
- Edge Services Gateway (ESG) – provides L3-L7 network services to the outside world.
- Distributed Logical Router (DLR) – provides L3-L7 network services to the physical and virtual infrastructure via a hypervisor service for the data plane and a virtual appliance for the control plane.
- Distributed Firewall – this is a service that runs on ESXi and provides micro-segmentation of virtual infrastructure
- Third Party integrations – advanced L3-L7 services provided by Third Parties via the NSX API. eg. Palo Alto Networks, McAfee, Trend Micro, F5, Citrix, Silver Peak, etc.
- Physical Network – traditional core, aggregate, distribution, access or Clos-type Leaf & Spine architectures
- Virtual overlay to Physical network gateways – the NSX virtual overlay integrates with the physical world via a gateway. eg. Routing, L2 Extension, VXLAN, etc.
What are L2 to L7 services? VLAN, VXLAN tunnels, Network Firewall, IPS, Application Firewall, NAT, Routing (OSPF, BGP, IS-IS), Load Balancing, SSL VPN, IPSec VPN, Route redistribution, etc.
NSX for Multi-Hypervisor (NSX-MH)
The NSX-MH has the same functional components, except it uses Open vSwitch (instead of vDS) with KVM, Hyper-V or XenServer and does not have a Distributed Firewall (no micro-segmentation).
Why do it this way?
You may have heard about the “Goldilocks zone” (not too hot, not too cold, just right – used to describe Earth’s placement in the solar system for sustaining life). The hypervisor is the “Goldilocks zone” of the Data Center, it is the natural meeting place for the Software Defined Data Center (SDDC) – Compute, Network and Storage.
If you understand the benefits of server virtualisation with vSphere (abstraction of the Operating System from the hardware, etc.), you can apply the same logic to network virtualisation. There is also the driving force of creating blueprints within the Service Catalogue of the Cloud Management Platform and linking polices (compute, network, storage and security) to the blueprint.
Weaknesses
- The biggest weakness of NSX – no associated hardware, since VMware is a software company, is also its greatest strength. You can run NSX across any physical network (as long as it meets the fundamental requirements of scalability, performance and reliability) and use it to connect disparate networks together.
- Because NSX is software, it cannot match dedicated physical hardware in terms of performance, however this weakness is balanced with flexibility and scale. Ensure that your SDDC is designed to match your business requirements – this way the risk of lack of performance is mitigated.
- NSX on its own is not the greatest use-case, you really want to use it to complete your SDDC solution (ie. Cloud Management Platform, Compute Virtualisation, Network Virtualisation, Storage Virtualisation and Service Catalogue).
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free VMware NSX Report and get advice and tips from experienced pros
sharing their opinions.
Updated: January 2026
Product Categories
Network Virtualization Cloud and Data Center Security Network Traffic Analysis (NTA) Network Detection and Response (NDR) Network Automation Microsegmentation SoftwarePopular Comparisons
Darktrace
Red Hat Ansible Automation Platform
Illumio
Akamai Guardicore Segmentation
Trend Micro Deep Security
Vectra AI
VMware Aria Automation
Cisco DNA Center
Cisco Secure Network Analytics
Check Point CloudGuard Network Security
Cisco Secure Workload
Stellar Cyber Open XDR
ExtraHop Reveal(x)
Appgate SDP
NetBrain
Buyer's Guide
Download our free VMware NSX Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What is the biggest difference between VMware NSX and Meraki SD-WAN?
- What is the biggest difference between Cisco ACI and VMware NSX?
- Is it possible to install VMware NSX outside of the VMware ecosystem?
- What are the biggest differences between Cisco ACI and VMware NSX?
- What are the biggest differences between Cisco ACI and VMware NSX?
- When evaluating Network Virtualization, what aspect do you think is the most important to look for?
- Why is Network Virtualization important for companies?














