Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
VMware vSphere 5.x Datacenter Design Cookbook

You're reading from   VMware vSphere 5.x Datacenter Design Cookbook This recipe-driven tutorial is the easy way to master VMware vSphere to design a virtual datacenter. You'll learn in simple steps that cover everything from initial groundwork to creating professional design documentation.

Arrow left icon
Product type Paperback
Published in Jan 2014
Publisher Packt
ISBN-13 9781782177005
Length 260 pages
Edition Edition
Tools
Arrow right icon
Author (1):
Arrow left icon
Hersey Cartwright Hersey Cartwright
Author Profile Icon Hersey Cartwright
Hersey Cartwright
Arrow right icon
View More author details
Toc

Table of Contents (19) Chapters Close

VMware vSphere 5.x Datacenter Design Cookbook
Credits
About the Author
Acknowledgments
About the Reviewers
www.PacktPub.com
Preface
1. The Virtual Datacenter 2. The Discovery Process FREE CHAPTER 3. The Design Factors 4. The vSphere Management Design 5. The vSphere Storage Design 6. The vSphere Network Design 7. The vSphere Compute Design 8. The vSphere Physical Design 9. The Virtual Machine Design 10. Disaster Recovery and Business Continuity 11. The Design Documentation Index

Virtual switch security


Security is an important factor that must be considered when designing virtual networks. Many of the same network practices that are used in the physical network can be applied to the virtual network. The virtual network provides several advantages to security, but it also introduces some challenges.

The security of virtual machine network traffic is critical along with the security of the VMkernel traffic to prevent attacks that may compromise the management, vMotion, Fault Tolerance, and IP storage networks.

How to do it…

  1. Identify the available virtual switch security options.

  2. Select a virtual switch security configuration based on design requirements.

  3. Apply security best practices to create a virtual network design, separating virtual machine services and network traffic into security zones based on design requirements.

How it works…

Separate the virtual machine network traffic based on services and security zones. Use separate vSwitches or VLAN tagging on PortGroups...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image