6.0.3

Table Of Contents
Securing vSphere Networking 8
Securing vSphere Networking is an essential part of protecting your environment. You secure dierent
vSphere components in dierent ways. See the vSphere Networking documentation for detailed information
about networking in the vSphere environment.
This chapter includes the following topics:
n
“Introduction to vSphere Network Security,” on page 227
n
“Securing the Network with Firewalls,” on page 228
n
“Secure the Physical Switch,” on page 231
n
“Securing Standard Switch Ports With Security Policies,” on page 232
n
“Securing vSphere Standard Switches,” on page 232
n
“Secure vSphere Distributed Switches and Distributed Port Groups,” on page 234
n
“Securing Virtual Machines with VLANs,” on page 234
n
“Creating a Network DMZ on a Single ESXi Host,” on page 236
n
“Creating Multiple Networks Within a Single ESXi Host,” on page 237
n
“Internet Protocol Security,” on page 239
n
“Ensure Proper SNMP Conguration,” on page 242
n
“Use Virtual Switches with the vSphere Network Appliance API Only If Required,” on page 243
n
“vSphere Networking Security Best Practices,” on page 243
Introduction to vSphere Network Security
Network security in the vSphere environment shares many characteristics of securing a physical network
environment, but also includes some characteristics that apply only to virtual machines.
Firewalls
Add rewall protection to your virtual network by installing and conguring host-based rewalls on some
or all of its virtual machines.
For eciency, you can set up private virtual machine Ethernet networks or virtual networks. With virtual
networks, you install a host-based rewall on a virtual machine at the head of the virtual network. This
rewall serves as a protective buer between the physical network adapter and the remaining virtual
machines in the virtual network.
VMware, Inc.
227