Book Image

Hyper-V Security

By : Eric Siron, Andy Syrewicze
Book Image

Hyper-V Security

By: Eric Siron, Andy Syrewicze

Overview of this book

Hyper-V Security is intended for administrators with a solid working knowledge of Hyper-V Server, Windows Server, and Active Directory. An administrator with a functional environment will be able to use the knowledge and examples present in this book to enhance security.
Table of Contents (15 chapters)
Hyper-V Security
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Preface
Index

Using the virtual switch's isolating technologies


The Hyper-V virtual switch provides a number of features you can use to isolate traffic. Before diving into specific features, we'll discuss its basic switching capability. The virtual switch parses the Ethernet header, just like a typical physical switch. It knows only to deliver frames to the MAC address that they are bound for. This means that one virtual machine isn't going to be able to snoop traffic meant for another port without compromising the Hyper-V configuration.

There are a number of other techniques that Hyper-V's switch uses to enable isolation.

Multiple switch types

Most virtual switches will use an external virtual switch. This bonds to a physical network adapter or a team of adapters, and allows direct communication with systems that are external to the guest and its host. Most of this chapter will deal with this type.

However, there are two other modes for the Hyper-V virtual switch: internal and private. In truth, these modes...