- •Contents
- •Updated Information
- •About This Book
- •Introduction to ESX Configuration
- •Networking
- •Introduction to Networking
- •Networking Concepts Overview
- •Network Services
- •View Networking Information in the vSphere Client
- •View Network Adapter Information in the vSphere Client
- •vNetwork Standard Switches
- •Port Groups
- •Port Group Configuration for Virtual Machines
- •Add a Virtual Machine Port Group
- •VMkernel Networking Configuration
- •TCP/IP Stack at the VMkernel Level
- •Set Up VMkernel Networking
- •Service Console Configuration
- •Set Up Service Console Networking
- •Configure Service Console Ports
- •Set the Default Gateway
- •Display Service Console Information
- •Using DHCP for the Service Console
- •vNetwork Standard Switch Properties
- •Change the Number of Ports for a vSwitch
- •Change the Speed of an Uplink Adapter
- •Add Uplink Adapters
- •Cisco Discovery Protocol
- •Enable CDP on an ESX Host
- •View Cisco Switch Information on the vSphere Client
- •vNetwork Distributed Switch Architecture
- •Configuring a vNetwork Distributed Switch
- •Create a vNetwork Distributed Switch
- •Add Hosts to a vNetwork Distributed Switch
- •Manage Hosts on a vDS
- •Edit General vNetwork Distributed Switch Settings
- •Edit Advanced vNetwork Distributed Switch Settings
- •View Network Adapter Information for a vNetwork Distributed Switch
- •Upgrade a vDS to a Newer Version
- •dvPort Groups
- •Add a dvPort Group
- •Edit General dvPort Group Properties
- •Edit Advanced dvPort Group Properties
- •dvPorts
- •Monitor dvPort State
- •Configure dvPort Settings
- •Private VLANs
- •Create a Private VLAN
- •Remove a Primary Private VLAN
- •Remove a Secondary Private VLAN
- •Configuring vNetwork Distributed Switch Network Adapters
- •Managing Physical Adapters
- •Add an Uplink to a vNetwork Distributed Switch
- •Remove an Uplink from a vNetwork Distributed Switch
- •Managing Virtual Network Adapters
- •Create a VMkernel Network Adapter on a vNetwork Distributed Switch
- •Create a Service Console Network Adapter on a vNetwork Distributed Switch
- •Migrate an Existing Virtual Adapter to a vNetwork Distributed Switch
- •Migrate a Virtual Adapter to a vNetwork Standard Switch
- •Edit the VMkernel Configuration on a vNetwork Distributed Switch
- •Edit the Service Console Configuration on a vNetwork Distributed Switch
- •Remove a Virtual Adapter
- •Configuring Virtual Machine Networking on a vNetwork Distributed Switch
- •Migrate Virtual Machines to or from a vNetwork Distributed Switch
- •Connect an Individual Virtual Machine to a dvPort Group
- •Network I/O Control
- •Enable Network I/O Control on a vDS
- •Edit Network Resource Pool Settings
- •Advanced Networking
- •Internet Protocol Version 6
- •Enable IPv6 Support on an ESX Host
- •VLAN Configuration
- •Networking Policies
- •Load Balancing and Failover Policy
- •Edit the Failover and Load Balancing Policy on a vSwitch
- •Edit the Failover and Load Balancing Policy on a Port Group
- •Edit the Teaming and Failover Policy on a dvPort Group
- •Edit dvPort Teaming and Failover Policies
- •VLAN Policy
- •Edit the VLAN Policy on a dvPort Group
- •Edit dvPort VLAN Policies
- •Security Policy
- •Edit the Layer 2 Security Policy on a vSwitch
- •Edit the Layer 2 Security Policy Exception on a Port Group
- •Edit the Security Policy on a dvPort Group
- •Edit dvPort Security Policies
- •Traffic Shaping Policy
- •Edit the Traffic Shaping Policy on a vSwitch
- •Edit the Traffic Shaping Policy on a Port Group
- •Edit the Traffic Shaping Policy on a dvPort Group
- •Edit dvPort Traffic Shaping Policies
- •Port Blocking Policies
- •Edit the Port Blocking Policy on a dvPort Group
- •Edit dvPort Port Blocking Policy
- •Change the DNS and Routing Configuration
- •MAC Addresses
- •MAC Address Generation
- •Set Up a MAC Address
- •TCP Segmentation Offload and Jumbo Frames
- •Enabling TSO
- •Enable TSO Support for a Virtual Machine
- •Check Whether TSO Is Enabled on a VMkernel Interface
- •Enabling Jumbo Frames
- •Create a Jumbo Frames-Enabled vSwitch
- •Enable Jumbo Frames on a vNetwork Distributed Switch
- •Enable Jumbo Frame Support on a Virtual Machine
- •Create a Jumbo Frames-Enabled VMkernel Interface
- •NetQueue and Networking Performance
- •Enable NetQueue on an ESX Host
- •Disable NetQueue on an ESX Host
- •VMDirectPath I/O
- •Configure Passthrough Devices on a Host
- •Configure a PCI Device on a Virtual Machine
- •Networking Best Practices
- •Mounting NFS Volumes
- •Networking Configuration for Software iSCSI and Dependent Hardware iSCSI
- •Create iSCSI Port for a Single NIC
- •Using Multiple NICs for Software and Dependent Hardware iSCSI
- •Create Additional iSCSI Ports for Multiple NICs
- •Configuring Networking on Blade Servers
- •Configure a Virtual Machine Port Group with a VLAN on a Blade Server
- •Configure a VMkernel Port with a VLAN on a Blade Server
- •Troubleshooting
- •Troubleshooting Service Console Networking
- •Rename Network Adapters by Using the Service Console
- •Troubleshooting Physical Switch Configuration
- •Troubleshooting Port Group Configuration
- •Storage
- •Introduction to Storage
- •About ESX Storage
- •Types of Physical Storage
- •Local Storage
- •Networked Storage
- •Supported Storage Adapters
- •Target and Device Representations
- •Understanding Fibre Channel Naming
- •Understanding iSCSI Naming and Addressing
- •Understanding Storage Device Naming
- •About ESX Datastores
- •VMFS Datastores
- •Creating and Increasing VMFS Datastores
- •Sharing a VMFS Volume Across ESX Hosts
- •NFS Datastore
- •How Virtual Machines Access Storage
- •Comparing Types of Storage
- •Displaying Storage Adapters
- •View Storage Adapters Information
- •Copy Storage Adapter Identifiers to the Clipboard
- •Viewing Storage Devices
- •Display Storage Devices for a Host
- •Display Storage Devices for an Adapter
- •Copy Storage Device Identifiers to the Clipboard
- •Displaying Datastores
- •Review Datastore Properties
- •Configuring ESX Storage
- •Local SCSI Storage
- •Fibre Channel Storage
- •iSCSI Storage
- •iSCSI Initiators
- •Setting Up Independent Hardware iSCSI Adapters
- •View Independent Hardware iSCSI Adapters
- •Change Name and IP Address for Independent Hardware Initiators
- •Setting Up and Configuring Software iSCSI Adapter
- •Enable the Software iSCSI Adapter
- •Setting Up and Configuring Dependent Hardware iSCSI Adapters
- •Dependent Hardware iSCSI Considerations
- •View Dependent Hardware iSCSI Adapters
- •Determine Association Between Dependent Hardware iSCSI and Physical Network Adapters
- •Bind iSCSI Ports to iSCSI Adapters
- •Configuring Discovery Addresses for iSCSI Initiators
- •Set Up Dynamic Discovery
- •Set Up Static Discovery
- •Configuring CHAP Parameters for iSCSI Adapters
- •Choosing CHAP Authentication Method
- •Set Up CHAP Credentials for an iSCSI Initiator
- •Set Up CHAP Credentials for a Target
- •Disable CHAP
- •Configuring Additional Parameters for iSCSI
- •Configure Advanced Parameters for iSCSI
- •Datastore Refresh and Storage Rescan Operations
- •Perform Storage Rescan
- •Create VMFS Datastores
- •Network Attached Storage
- •NFS Datastores as Repositories for Commonly Used Files
- •Create an NFS-Based Datastore
- •Creating a Diagnostic Partition
- •Create a Diagnostic Partition
- •Managing Storage
- •Managing Datastores
- •Rename Datastores
- •Group Datastores
- •Delete Datastores
- •Unmount Datastores
- •Changing VMFS Datastore Properties
- •Increase VMFS Datastores
- •Upgrade Datastores
- •Managing Duplicate VMFS Datastores
- •Mounting VMFS Datastores with Existing Signatures
- •Mount a VMFS Datastore with an Existing Signature
- •Resignaturing VMFS Copies
- •Resignature a VMFS Datastore Copy
- •Using Multipathing with ESX
- •Managing Multiple Paths
- •VMware Multipathing Module
- •VMware SATPs
- •VMware PSPs
- •VMware NMP Flow of I/O
- •Multipathing with Local Storage and Fibre Channel SANs
- •Multipathing with iSCSI SAN
- •Path Scanning and Claiming
- •Viewing the Paths Information
- •View Datastore Paths
- •View Storage Device Paths
- •Setting a Path Selection Policy
- •Change the Path Selection Policy
- •Disable Paths
- •Storage Hardware Acceleration
- •Hardware Acceleration Requirements and Benefits
- •Hardware Acceleration Support Status
- •Turn off Hardware Acceleration
- •Thin Provisioning
- •About Virtual Disk Formats
- •Create Thin Provisioned Virtual Disks
- •View Virtual Machine Storage Resources
- •Determine the Disk Format of a Virtual Machine
- •Convert a Virtual Disk from Thin to Thick
- •Handling Datastore Over-Subscription
- •Turn off vCenter Server Storage Filters
- •vCenter Server Storage Filtering
- •Raw Device Mapping
- •About Raw Device Mapping
- •Benefits of Raw Device Mapping
- •Limitations of Raw Device Mapping
- •Raw Device Mapping Characteristics
- •RDM Virtual and Physical Compatibility Modes
- •Dynamic Name Resolution
- •Raw Device Mapping with Virtual Machine Clusters
- •Comparing Available SCSI Device Access Modes
- •Managing Mapped LUNs
- •Create Virtual Machines with RDMs
- •Manage Paths for a Mapped Raw LUN
- •Security
- •Security for ESX Systems
- •ESX Architecture and Security Features
- •Security and the Virtualization Layer
- •Security and Virtual Machines
- •Security and the Virtual Networking Layer
- •Creating a Network DMZ on a Single ESX Host
- •Creating Multiple Networks Within a Single ESX Host
- •Security and the Service Console
- •Security Resources and Information
- •Securing an ESX Configuration
- •Securing the Network with Firewalls
- •Firewalls for Configurations with vCenter Server
- •Firewalls for Configurations Without vCenter Server
- •Connecting to vCenter Server Through a Firewall
- •Connecting to the Virtual Machine Console Through a Firewall
- •Connecting ESX Hosts Through Firewalls
- •Configuring Firewall Ports for Supported Services and Management Agents
- •Allow Access to ESX for a Service or Management Agent
- •Automating Service Behavior Based on Firewall Settings
- •Configure How Service Startup Relates to Firewall Configuration
- •TCP and UDP Ports for Management Access
- •Securing Virtual Machines with VLANs
- •Security Considerations for VLANs
- •VLANs as Part of a Broader Security Implementation
- •Properly Configure VLANs
- •Create Separate Communications Between Management Tools and the Service Console
- •Virtual Switch Protection and VLANs
- •Securing Virtual Switch Ports
- •MAC Address Changes
- •Forged Transmissions
- •Promiscuous Mode Operation
- •Internet Protocol Security
- •Add a Security Association
- •Remove a Security Association
- •List Available Security Associations
- •Create a Security Policy
- •Remove a Security Policy
- •List Available Security Policies
- •Securing iSCSI Storage
- •Securing iSCSI Devices Through Authentication
- •Enabling Challenge Handshake Authentication Protocol (CHAP) for iSCSI SANs
- •Disabling iSCSI SAN Authentication
- •Protecting an iSCSI SAN
- •Authentication and User Management
- •Securing ESX Through Authentication and Permissions
- •About Users, Groups, Permissions, and Roles
- •Understanding Users
- •Understanding Groups
- •Understanding Password Requirements
- •Understanding Permissions
- •Assigning root User Permissions
- •Understanding vpxuser Permissions
- •Understanding Roles
- •Assigning the No Access Role
- •Assigning the Read Only Role
- •Assigning the Administrator Role
- •Working with Users and Groups on ESX Hosts
- •View, Sort, and Export a List of Users and Groups
- •Add a User to the Users Table
- •Modify the Settings for a User
- •Remove a User or Group
- •Add a Group to the Groups Table
- •Add or Remove Users from a Group
- •Configure a Host to Use a Directory Service
- •Add a Host to a Directory Service Domain
- •Use Host Profiles to Apply Permissions to Hosts
- •Encryption and Security Certificates for ESX
- •Enable Certificate Checking and Verify Host Thumbprints
- •Generate New Certificates for the ESX Host
- •Replace a Default Certificate with a CA-Signed Certificate
- •Configure SSL Timeouts
- •Modifying ESX Web Proxy Settings
- •Configure the Web Proxy to Search for Certificates in Nondefault Locations
- •Change Security Settings for a Web Proxy Service
- •Service Console Security
- •General Security Recommendations
- •Log In to the Service Console
- •Service Console Firewall Configuration
- •Determine the Service Console Firewall Security Level
- •Set the Service Console Firewall Security Level
- •Open a Port in the Service Console Firewall
- •Close a Port in the Service Console Firewall
- •Troubleshooting When Firewalls are Overwritten
- •Password Restrictions
- •Password Aging
- •Change Default Password Aging Restrictions for a Host
- •Change Default Password Aging Restrictions for Users
- •Password Strength and Complexity
- •Change Default Password Complexity for the pam_passwdqc.so Plug-In
- •Configure a Password Reuse Rule
- •Using the pam_cracklib.so Authentication Plug-In
- •Switch to the pam_cracklib.so Plug-In
- •Cipher Strength
- •setuid and setgid Flags
- •Disable Optional Applications
- •Default setuid Applications
- •Default setgid Applications
- •SSH Security
- •Change the Default SSH Configuration
- •Security Patches and Security Vulnerability Scanning Software
- •Security Best Practices and Scenarios
- •Security Approaches for Common ESX Deployments
- •Single-Customer Deployment
- •Multiple-Customer Restricted Deployment
- •Multiple-Customer Open Deployment
- •Virtual Machine Recommendations
- •Installing Antivirus Software
- •Limiting Exposure of Sensitive Data Copied to the Clipboard
- •Enable Copy and Paste Operations Between the Guest Operating System and Remote Console
- •Removing Unnecessary Hardware Devices
- •Prevent a Virtual Machine User or Process from Disconnecting Devices
- •Limiting Guest Operating System Writes to Host Memory
- •Modify Guest Operating System Variable Memory Limit
- •Prevent the Guest Operating System Processes from Sending Configuration Messages to the Host
- •Configuring Logging Levels for the Guest Operating System
- •Limit Log File Numbers and Sizes
- •Disable Logging for the Guest Operating System
- •Host Profiles
- •Managing Host Profiles
- •Host Profiles Usage Model
- •Access Host Profiles View
- •Creating a Host Profile
- •Create a Host Profile from Host Profiles View
- •Create a Host Profile from Host
- •Export a Host Profile
- •Import a Host Profile
- •Edit a Host Profile
- •Edit a Policy
- •Enable Compliance Check
- •Manage Profiles
- •Attaching Entities
- •Attach Entities from the Host Profiles View
- •Attach Entities from the Host
- •Applying Profiles
- •Apply a Profile from the Host Profiles View
- •Apply a Profile from the Host
- •Change Reference Host
- •Manage Profiles from a Cluster
- •Updating Profiles From the Reference Host
- •Checking Compliance
- •Check Compliance from the Host Profiles View
- •Check Compliance from Host
- •Check Cluster Compliance
- •Appendixes
- •ESX Technical Support Commands
- •Linux Commands Used with ESX
- •Using vmkfstools
- •vmkfstools Command Syntax
- •vmkfstools Options
- •-v Suboption
- •File System Options
- •Creating a VMFS File System
- •Example for Creating a VMFS File System
- •Extending an Existing VMFS-3 Volume
- •Example for Extending a VMFS-3 Volume
- •Listing Attributes of a VMFS Volume
- •Upgrading a VMFS-2 to VMFS-3
- •Virtual Disk Options
- •Supported Disk Formats
- •Creating a Virtual Disk
- •Example for Creating a Virtual Disk
- •Initializing a Virtual Disk
- •Inflating a Thin Virtual Disk
- •Removing Zeroed Blocks
- •Converting a Zeroedthick Virtual Disk to an Eagerzeroedthick Disk
- •Deleting a Virtual Disk
- •Renaming a Virtual Disk
- •Cloning a Virtual or Raw Disk
- •Example for Cloning a Virtual Disk
- •Migrate VMware Workstation and VMware GSX Server Virtual Machines
- •Extending a Virtual Disk
- •Migrating a VMFS-2 Virtual Disk to VMFS-3
- •Creating a Virtual Compatibility Mode Raw Device Mapping
- •Example for Creating a Virtual Compatibility Mode RDM
- •Creating a Physical Compatibility Mode Raw Device Mapping
- •Listing Attributes of an RDM
- •Displaying Virtual Disk Geometry
- •Checking and Repairing Virtual Disks
- •Managing SCSI Reservations of LUNs
- •Index
ESX Configuration Guide
You can further protect virtual machines by setting up resource reservations and limits on the host. For example, through the detailed resource controls available in ESX, you can configure a virtual machine so that it always receives at least 10 percent of the host’s CPU resources, but never more than 20 percent.
Resource reservations and limits protect virtual machines from performance degradation that would result if another virtual machine consumed excessive shared hardware resources. For example, if one of the virtual machines on a host is incapacitated by a denial-of-service (DoS) attack, a resource limit on that machine prevents the attack from taking up so much of the hardware resources that the other virtual machines are also affected. Similarly, a resource reservation on each of the virtual machines ensures that, in the event of high resource demands by the virtual machine targeted by the DoS attack, all the other virtual machines still have enough resources to operate.
By default, ESX imposes a form of resource reservation by applying a distribution algorithm that divides the available host resources equally among the virtual machines while keeping a certain percentage of resources for use by other system components. This default behavior provides a degree of natural protection from DoS and distributed denial-of-service (DDoS) attacks. You set specific resource reservations and limits on an individual basis to customize the default behavior so that the distribution is not equal across the virtual machine configuration.
Security and the Virtual Networking Layer
The virtual networking layer includes virtual network adapters and virtual switches. ESX relies on the virtual networking layer to support communications between virtual machines and their users. In addition, hosts use the virtual networking layer to communicate with iSCSI SANs, NAS storage, and so forth.
The methods you use to secure a virtual machine network depend on which guest operating system is installed, whether the virtual machines operate in a trusted environment, and a variety of other factors. Virtual switches provide a substantial degree of protection when used with other common security practices, such as installing firewalls.
ESX also supports IEEE 802.1q VLANs, which you can use to further protect the virtual machine network, service console, or storage configuration. VLANs let you segment a physical network so that two machines on the same physical network cannot send packets to or receive packets from each other unless they are on the same VLAN.
Creating a Network DMZ on a Single ESX Host
One example of how to use ESX isolation and virtual networking features to configure a secure environment is the creation of a network demilitarized zone (DMZ) on a single host.
Figure 11-4 shows the configuration.
144 |
VMware, Inc. |
Chapter 11 Security for ESX Systems
Figure 11-4. DMZ Configured on a Single ESX Host
|
ESX |
|
|
Virtual Machine 1 |
Virtual Machine 2 |
Virtual Machine 3 |
Virtual Machine 4 |
firewall server |
web server |
application server |
firewall server |
virtual switch 1 |
virtual switch 2 |
virtual switch 3 |
hardware network |
hardware network |
adapter 1 |
adapter 2 |
External Network |
Internal Network |
In this example, four virtual machines are configured to create a virtual DMZ on Virtual Switch 2:
nVirtual Machine 1 and Virtual Machine 4 run firewalls and are connected to virtual adapters through virtual switches. Both of these virtual machines are multi homed.
nVirtual Machine 2 runs a Web server, and Virtual Machine 3 runs as an application server. Both of these virtual machines are single-homed.
The Web server and application server occupy the DMZ between the two firewalls. The conduit between these elements is Virtual Switch 2, which connects the firewalls with the servers. This switch has no direct connection with any elements outside the DMZ and is isolated from external traffic by the two firewalls.
From an operational viewpoint, external traffic from the Internet enters Virtual Machine 1 through Hardware Network Adapter 1 (routed by Virtual Switch 1) and is verified by the firewall installed on this machine. If the firewall authorizes the traffic, it is routed to the virtual switch in the DMZ, Virtual Switch 2. Because the Web server and application server are also connected to this switch, they can serve external requests.
Virtual Switch 2 is also connected to Virtual Machine 4. This virtual machine provides a firewall between the DMZ and the internal corporate network. This firewall filters packets from the Web server and application server. If a packet is verified, it is routed to Hardware Network Adapter 2 through Virtual Switch 3. Hardware Network Adapter 2 is connected to the internal corporate network.
When creating a DMZ on a single host, you can use fairly lightweight firewalls. Although a virtual machine in this configuration cannot exert direct control over another virtual machine or access its memory, all the virtual machines are still connected through a virtual network. This network could be used for virus propagation or targeted for other types of attacks. The security of the virtual machines in the DMZ is equivalent to separate physical machines connected to the same network.
VMware, Inc. |
145 |
ESX Configuration Guide
Creating Multiple Networks Within a Single ESX Host
The ESX system is designed so that you can connect some groups of virtual machines to the internal network, others to the external network, and still others to both—all on the same host. This capability is an outgrowth of basic virtual machine isolation coupled with a well-planned use of virtual networking features.
Figure 11-5. External Networks, Internal Networks, and a DMZ Configured on a Single ESX Host
|
ESX |
|
External Network |
Internal Network |
DMZ |
|
VM 2 |
|
|
internal |
|
|
user |
|
|
VM 3 |
VM 6 |
|
|
|
|
internal |
firewall |
|
user |
server |
|
VM 4 |
VM 7 |
|
internal |
Web |
|
user |
server |
VM 1 |
VM 5 |
VM 8 |
|
||
FTP |
internal |
firewall |
server |
user |
server |
physical network |
|
|
adapters |
|
|
External |
Internal |
External |
Internal |
Network 1 |
Network 2 |
Network 2 |
Network 1 |
In Figure 11-5 the system administrator configured a host into three distinct virtual machine zones: FTP server, internal virtual machines, and DMZ. Each zone serves a unique function.
FTP server |
Virtual Machine 1 is configured with FTP software and acts as a holding area |
|
for data sent to and from outside resources such as forms and collateral |
|
localized by a vendor. |
This virtual machine is associated with an external network only. It has its own virtual switch and physical network adapter that connect it to External Network 1. This network is dedicated to servers that the company uses to receive data from outside sources. For example, the company uses External Network 1 to receive FTP traffic from vendors and allow vendors access to data stored on externally available servers though FTP. In addition to servicing Virtual Machine 1, External Network 1 services FTP servers configured on different ESX hosts throughout the site.
146 |
VMware, Inc. |
Chapter 11 Security for ESX Systems
|
Because Virtual Machine 1 does not share a virtual switch or physical network |
|
adapter with any virtual machines in the host, the other resident virtual |
|
machines cannot transmit packets to or receive packets from the Virtual |
|
Machine 1 network. This restriction prevents sniffing attacks, which require |
|
sending network traffic to the victim. More importantly, an attacker cannot use |
|
the natural vulnerability of FTP to access any of the host’s other virtual |
|
machines. |
Internal virtual machines |
Virtual Machines 2 through 5 are reserved for internal use. These virtual |
|
machines process and store company-private data such as medical records, |
|
legal settlements, and fraud investigations. As a result, the system |
|
administrators must ensure the highest level of protection for these virtual |
|
machines. |
|
These virtual machines connect to Internal Network 2 through their own virtual |
|
switch and network adapter. Internal Network 2 is reserved for internal use by |
|
personnel such as claims processors, in-house lawyers, or adjustors. |
|
Virtual Machines 2 through 5 can communicate with one another through the |
|
virtual switch and with internal virtual machines elsewhere on Internal |
|
Network 2 through the physical network adapter. They cannot communicate |
|
with externally facing machines. As with the FTP server, these virtual machines |
|
cannot send packets to or receive packets from the other virtual machines’ |
|
networks. Similarly, the host’s other virtual machines cannot send packets to |
|
or receive packets from Virtual Machines 2 through 5. |
DMZ |
Virtual Machines 6 through 8 are configured as a DMZ that the marketing |
|
group uses to publish the company’s external Web site. |
|
This group of virtual machines is associated with External Network 2 and |
|
Internal Network 1. The company uses External Network 2 to support the Web |
|
servers that use the marketing and financial department to host the corporate |
|
Web site and other Web facilities that it hosts to outside users. Internal Network |
|
1 is the conduit that the marketing department uses to publish content to the |
|
corporate Web site, post downloads, and maintain services like user forums. |
|
Because these networks are separate from External Network 1 and Internal |
|
Network 2, and the virtual machines have no shared points of contact (switches |
|
or adapters), there is no risk of attack to or from the FTP server or the internal |
|
virtual machine group. |
By capitalizing on virtual machine isolation, correctly configuring virtual switches, and maintaining network separation, the system administrator can house all three virtual machine zones in the same ESX host and be confident that there will be no data or resource breaches.
The company enforces isolation among the virtual machine groups by using multiple internal and external networks and making sure that the virtual switches and physical network adapters for each group are completely separate from those of other groups.
Because none of the virtual switches straddle virtual machine zones, the system administrator succeeds in eliminating the risk of packet leakage from one zone to another. A virtual switch, by design, cannot leak packets directly to another virtual switch. The only way for packets to travel from one virtual switch to another is under the following circumstances:
nThe virtual switches are connected to the same physical LAN.
nThe virtual switches connect to a common virtual machine, which could be used to transmit packets.
Neither of these conditions occur in the sample configuration. If system administrators want to verify that no common virtual switch paths exist, they can check for possible shared points of contact by reviewing the network switch layout in the vSphere Client or vSphere Web Access.
VMware, Inc. |
147 |