|
Mastering VMware® Infrastructure3Plan the virtual-to-physical networking integration. Maximize the number of physical network adapters (Ethernet ports) to provide flexibility in the virtual networking architecture. Separate Service Console, iSCSI, NAS, VMotion, and virtual machine traffic across different physical networks pending the availability of network adapters or use a VLAN architecture to segment the traffic. Create virtual switches with VLAN IDs to provide security, segmentation, and scalability to the virtual switching architecture. Construct a virtual networking security policy for virtual switches, ports, and port groups. Create port groups for security, traffic shaping, or VLAN tagging. For optimal security, configure the virtual switch properties with the following settings: P Promiscuous mode: Reject P MAC Address Changes: Reject P Forged Transmits: Reject Avoid VLAN tags used by common third-party hardware devices, like VLAN0. Virtual switches do not support the native VLAN as physical switches do. Define traffic shaping to reduce the outbound bandwidth available either to the virtual machines that do not require full access to the bandwidth of the physical adapter or to the virtual machines that inappropriately monopolize bandwidth ...» | Код для вставки книги в блог HTML
phpBB
текст
|
|