Chapter 5. Configuring Network Security

In this chapter, we will cover the following recipes:

  • Configuring Standard vSwitch security
  • Configuring the port group security
  • Configuring VLANs
  • Creating DMZ networks
  • Providing Distributed vSwitch security options
  • Configuring PVLANs

Introduction

Networking, by its very nature, is insecure by default. The idea was and remains to move information between connected endpoints in the most efficient way through the seven layers of the OSI stack. We've looked at different facets of the vSphere infrastructure and how to secure them against intrusion and administration threats. Improper virtual network design and implementation is a very real threat with high probability when it comes to virtual switch configurations.

Get VMware vSphere Security Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.