2.4

Table Of Contents
VMware® Lab Manager User’s Guide
162 VMware, Inc.
Why Should I Fence Configurations?
Typically,youwanttoenablenetworkfencingunderthesecircumstances:
Youhaveaconfigurationwithoneormoreservers,andyouanticipatecloningthe
configurationnumeroustimes.
Youhaveaconfigurationinvolvingadifficultandcomplexsetup,andcloningthe
configurationisaneasierroutethanrepeatingthesetup.
Withfencing,engineerscanrunmultiple,independenttestsonaconfiguration
deployedmultipletimes.Fencingisparticularlyusefulwhenadeveloperneedsto
examineabugwithoutinterruptingor
stoppingongoingtestingonaconfiguration.
LabManageralsoenablesyoutoreproducethebugatalatertimeifthedeveloperis
unavailable.
Moreinstancesofasmallerconfigurationmightrequireraisingthenumberoffenced
configurations.Asmallernumberofconfigurationscontainingmorevirtualmachines
ineachconfigurationmay
requireloweringthenumberoffencedconfigurations.No
penaltyexistsinchoosingalargernumber.
Fromaperformanceperspective,networkfencingimpactsthetrafficflowbetween
modules.FencingrequiresaslightlyhighernumberofresourcesontheManaged
Server,suchasmemory,CPU,networking,andvirtualmachineslots.Ifyouenable
fencingbutneveruseit,theseresourcesdonotcomeintoplay.
How Does Fencing Work?
Virtualmachinesinaconfigurationhavepreconfigured(internal)IPaddresses.When
youdeployvirtualmachinesinfencedmode,LabManagerassignsauniqueexternal
IPaddresstoeachofthesemachines.Throughtheseexternaladdresses,virtual
machinesbothinsideandoutsidethefencecancommunicatewitheachother.Lab
Manager
automatestheaddresstranslationandroutingsupportthroughthecreation
ofavirtualrouter.
Fencingaconfigurationdoesnotrequireanychangestoitsvirtualmachines.Withina
fencedconfiguration,virtualmachinescontinuetousepreassignedIPaddressesto
communicatewitheachother.FormoreinformationonIPaddressallocationin
fenced
configurations,see“UnderstandingIPAddressManagement”onpage 139.
Fencing Options
Youcandeployfencedconfigurationsinthreeways: