Vmware
PRACTICES
DMZ Virtualization with VMware Infrastructure
VMware B EST PRAC TICES
Table of Contents
Virtualized DMZ Networks ..................................................................................... 3
Three Typical Virtualized DMZ Configurations ...................................................... 4
Partially Collapsed DMZ with Separate Physical Trust Zones ........................... 4
Partially Collapsed DMZ with Virtual Separation of Trust Zones ...................... 5
Fully Collapsed DMZ ........................................................................................... 6
Best Practices for achieving a Secure Virtualized DMZ Deployment.................... 7
Harden and Isolate the Service Console ............................................................ 7
Clearly Label Networks for each Zone within the DMZ ..................................... 7
S et Layer 2 Security Options on Virtual Switches .............................................. 7 enforce Separation of Duties .............................................................................. 8
Use eSX resource Management Capabilities ..................................................... 8 regularly audit Virtualized DMZ Configuration ................................................ 8
Conclusion .............................................................................................................. 8 references .............................................................................................................. 8
2
VMware B EST PR AC TICES
DMZ Virtualization with VMware Infrastructure
Virtualized DMZ Networks
configuration of a DMZ using virtual network infrastructure.
Enforcement policies on a virtual network are the same as those on a physical network. Gartner research supports this view by suggesting that security risks primarily emanate from administrative misconfiguration and not from the virtual infrastructure.