My Lab Hardware – quick review of that for contextThe Install – start the install itself
I found 2 2716 (only found Visio for the 2816) on ebay for around $60 or so each. They provide VLAN, LAG, QoS and other services in a small, low-cost form factor. They aren’t made any more so need to find them used online.
The vSphere networking is meant to mimic and/or leverage the physical world as much as possible to facilitate design objectives. With 4 network ports in each esxi host, 2 vSwitches can be deployed with load-balanced, fail-over networking to each. The vSwitches have their own inherent security aspects and help to ensure communication doesn’t flow from one to the other.
Secure VMware vSphere HomeLab Networking
VMWARE VSPHERE 5.1 HOMELAB Secure Networking
OVERVIEW Objectives Network Diagram vSphere Network The Video If Slideshare doesn’t accommodate the video, see it my blog @ http://dailyioreport.com/2013/01/15/secure-vmware-vsphere-home-lab-networking/
OBJECTIVESCreate 2 isolated zones, a Green Zone for internal devices and a Red Zone forInternet traffic, that cannot communicate with one another in any way.Use an OpenSource firewall to allow Green Zone outbound traffic to reach theInternet via the Red Zone while preventing all Red Zone traffic from entering theGreen Zone except that in response to Green Zone sources.Use vSphere networking to facilitate as much as possibleDeploy the firewall as a VMUse low-cost and or free components.
NETWORK DIAGRAMAll Green Zoneoutbound trafficflows through Firewall “straddles”firewall .01 address VLAN 2 & 3which is set for all asthe default gateway
VSPHERE NETWORK Green Zone – VLAN 3 Firewall “straddles” VLAN 2 & 3 Red Zone – VLAN 2