Chapter 5. Securing the Network
Out of all the potential threats to your virtual machines, over-the-network attacks will be the most probable. However, you'll have to accept some level of risk in order for your guests to be able to provide services to network-based clients. Fortunately, there are a number of methods available for you to mitigate those risks to a manageable level.
In this chapter, we'll discuss the following:
- Understanding SSL encryption
- Leveraging network hardware
- Using the Hyper-V virtual switch's isolation technologies
- Employing Hyper-V virtual switch ACLs
- Configuring the Windows Firewall
- Using management tools remotely
- Using Hyper-V with IPsec
- Configuring virtual network adapter protections
- Securing Hyper-V Replica traffic