vShield Quick Start Guide
10 VMware, Inc.
Deployment Scenarios
UsingvShield,youcanbuildsecurezonesforavarietyofvirtualmachinedeployments.Youcanisolatevirtual
machinesbasedonspecificapplications,networksegmentation,orcustomcompliancefactors.Onceyou
determineyourzoningpolicies,youcandeployvShieldtoenforceaccessrulestoeachofthesezones.
Protecting the DMZ
TheDMZisamixedtrustzone.ClientsenterfromtheInternetforWebandemailservices,whileservices
withintheDMZmightrequireaccesstoservicesinsidetheinternalnetwork.YoucanplaceDMZvirtual
machinesinaportgroupandsecurethatportgroupwithavShieldEdge.vShield
Edgeprovidesaccess
servicessuchasfirewall,NAT,andVPN,aswellasloadbalancingtosecureDMZservices.
AcommonexampleofaDMZservicerequiringaninternalserviceisMicrosoftExchange.MicrosoftOutlook
WebAccess(OWA)commonlyresidesintheDMZcluster,whiletheMicrosoftExchangebackendis
inthe
internalcluster.Ontheinternalcluster,youcancreatefirewallrulestoallowonlyExchanged ‐relatedrequests
fromtheDMZ,identifyingspecificsource‐to‐destinationparameters.FromtheDMZcluster,youcancreate
rulestoallowoutsideaccesstotheDMZonlytospecificdestinationsusingHTTP,FTP,
orSMTP.
Isolating and Protecting Internal Networks
YoucanuseavShieldEdgewiththePortGroupIsolationfeaturetoisolateaninternalnetworkfromthe
externalnetwork.AvShieldEdgeprovidesperimeterfirewallprotectionandedgeservicestosecurevirtual
machinesinaportgroup,enablingcommunicationtotheexternalnetworkthroughDHCP,NAT,andVPN.
Within
thesecuredportgroup,youcaninstallavShieldAppinstanceoneachESXhostthatthevDSspansto
securecommunicationbetweenvirtualmachinesintheinternalnetwork.
IfyouutilizeVLANtagstosegmenttraffic,youcanuseAppFirewalltocreatesmarteraccesspolicies.Using
AppFirewallinstead
ofaphysicalfirewallallowsyoutocollapseormixtrustzonesinsharedESXclusters.By
doingso,yougainoptimalutilizationandconsolidationfromfeaturessuchasDRSandHA,insteadofhaving
separate,fragmentedclusters.ManagementoftheoverallESXdeploymentasasinglepoolislesscomplex
thanhavingseparatelymanagedpools.
Forexample,youuseVLANstosegmentvirtualmachinezonesbasedonlogical,organizational,ornetwork
boundaries.LeveragingtheVirtualInfrastructureSDK,thevShieldManagerinventorypaneldisplaysaview
ofyourVLANnetworksundertheNetworksview.YoucanbuildaccessrulesforeachVLAN
networkto
isolatevirtualmachinesanddropuntaggedtraffictothesemachines.
Commentaires sur ces manuels