VMWARE VSPHERE 5.1 HOMELAB   Secure Networking
OVERVIEW   Objectives   Network Diagram   vSphere Network   The Video   If Slideshare doesn’t accommodate the video, ...
OBJECTIVESCreate 2 isolated zones, a Green Zone for internal devices and a Red Zone forInternet traffic, that cannot commu...
NETWORK DIAGRAMAll Green Zoneoutbound trafficflows through             Firewall “straddles”firewall .01 address      VLAN ...
VSPHERE NETWORK                         Green Zone – VLAN 3  Firewall “straddles”  VLAN 2 & 3                           Re...
VSPHERE SECURE LAB NETWORK VIDEO
Upcoming SlideShare
Loading in...5
×

Secure VMware vSphere HomeLab Networking

670

Published on

While re-building my VMware vSphere home lab I implemented VLAN, firewall and vSphere networking concepts to create a very secure solution.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
670
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
8
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • My Lab Hardware – quick review of that for contextThe Install – start the install itself
  • I found 2 2716 (only found Visio for the 2816) on ebay for around $60 or so each. They provide VLAN, LAG, QoS and other services in a small, low-cost form factor. They aren’t made any more so need to find them used online.
  • The vSphere networking is meant to mimic and/or leverage the physical world as much as possible to facilitate design objectives. With 4 network ports in each esxi host, 2 vSwitches can be deployed with load-balanced, fail-over networking to each. The vSwitches have their own inherent security aspects and help to ensure communication doesn’t flow from one to the other.
  • Secure VMware vSphere HomeLab Networking

    1. 1. VMWARE VSPHERE 5.1 HOMELAB Secure Networking
    2. 2. OVERVIEW Objectives Network Diagram vSphere Network The Video If Slideshare doesn’t accommodate the video, see it my blog @ http://dailyioreport.com/2013/01/15/secure-vmware-vsphere-home-lab-networking/
    3. 3. OBJECTIVESCreate 2 isolated zones, a Green Zone for internal devices and a Red Zone forInternet traffic, that cannot communicate with one another in any way.Use an OpenSource firewall to allow Green Zone outbound traffic to reach theInternet via the Red Zone while preventing all Red Zone traffic from entering theGreen Zone except that in response to Green Zone sources.Use vSphere networking to facilitate as much as possibleDeploy the firewall as a VMUse low-cost and or free components.
    4. 4. NETWORK DIAGRAMAll Green Zoneoutbound trafficflows through Firewall “straddles”firewall .01 address VLAN 2 & 3which is set for all asthe default gateway
    5. 5. VSPHERE NETWORK Green Zone – VLAN 3 Firewall “straddles” VLAN 2 & 3 Red Zone – VLAN 2
    6. 6. VSPHERE SECURE LAB NETWORK VIDEO
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×