6.5.1

Table Of Contents
Figure 81. Sample VLAN Layout
Host 1
Standard Switch
Standard Switch
VM6 VM7 VM8
VM3 VM4 VM5
Standard Switch
VM9 VM10 VM11
Standard Switch
VM12
VLAN
B
VM13
VLAN
A
VM14
VLAN
B
VLAN A
VLAN B
Broadcast
Domain A
Broadcast
Domain B
Broadcast
Domain A and B
Multiple VLANs
on the same
virtual switch
Standard Switch
VM0 VM1 VM2
Host 3
Host 4
Host 2
Router
Switch 1
Switch 2
In this configuration, all employees in the accounting department use virtual machines in VLAN A and the
employees in sales use virtual machines in VLAN B.
The router forwards packets containing accounting data to the switches. These packets are tagged for
distribution to VLAN A only. Therefore, the data is confined to Broadcast Domain A and cannot be routed
to Broadcast Domain B unless the router is configured to do so.
This VLAN configuration prevents the sales force from intercepting packets destined for the accounting
department. It also prevents the accounting department from receiving packets intended for the sales
group. The virtual machines serviced by a single virtual switch can be in different VLANs.
Security Considerations for VLANs
The way you set up VLANs to secure parts of a network depends on factors such as the guest operating
system and the way your network equipment is configured.
ESXi features a complete IEEE 802.1q-compliant VLAN implementation. VMware cannot make specific
recommendations on how to set up VLANs, but there are factors to consider when using a VLAN
deployment as part of your security enforcement policy.
vSphere Security
VMware, Inc. 187