Book Image

Hyper-V Security

Book Image

Hyper-V Security

Overview of this book

Table of Contents (15 chapters)
Hyper-V Security
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Preface
Index

Chapter 5. Securing the Network

Out of all the potential threats to your virtual machines, over-the-network attacks will be the most probable. However, you'll have to accept some level of risk in order for your guests to be able to provide services to network-based clients. Fortunately, there are a number of methods available for you to mitigate those risks to a manageable level.

In this chapter, we'll discuss the following:

  • Understanding SSL encryption

  • Leveraging network hardware

  • Using the Hyper-V virtual switch's isolation technologies

  • Employing Hyper-V virtual switch ACLs

  • Configuring the Windows Firewall

  • Using management tools remotely

  • Using Hyper-V with IPsec

  • Configuring virtual network adapter protections

  • Securing Hyper-V Replica traffic