Book Image

VMware Cross-Cloud Architecture

By : Ajit Pratap Kundan
Book Image

VMware Cross-Cloud Architecture

By: Ajit Pratap Kundan

Overview of this book

Over the past two decades, VMware vSphere has been known as the most trusted and reliable virtualization platform. VMware Cross-Cloud Architecture shows you how to design and configure Cross Cloud Architecture by using VMware Cloud Foundation and vRealize Suite with various use cases across private, public, and hybrid Cloud. This book takes you through everything from a basic understanding of virtualization to advanced aspects of storage and network virtualization, clustering, automation, and management. This book will be your guide to designing all aspects of Cloud. We start with the challenges faced by a traditional data center, define problem statements for you, and then brief you on respective solutions. Moving on, all kinds of virtualization and Cloud offerings from AWS and IBM Soft Layer are introduced and discussed in detail. Then, you'll learn how to design IT infrastructures for new and existing applications with a combination of Cloud Foundation, vRealize Suite, and vSphere enabled with VSAN and NSX. Furthermore, you'll learn how to design and configure high availability, disaster recovery, and apply an appropriate compliance matrix. Toward the end of the book, you will learn how to calculate the TCO/ROI, along with the VMware products packaging and licensing in detail.
Table of Contents (19 chapters)
Title Page
Packt Upsell
Contributors
Preface
Index

Security


The hypervisor platform is, undoubtedly, a secure environment from its technical architecture point of view. The hypervisor has a small footprint of around 200 MB, and it also has APIs for monitoring, so you don't need third-party applications on the host. You can refer to the VMware vSphere Hardening Guide for more details on security configurations at https://www.vmware.com/ca/en/security/hardening-guides.

 

Securing ESXi hosts

To protect the ESXi hosts against unauthorized intrusion and misuse, consider the following options for improving infrastructure security:

  • Limit user access:
    • To improve security, restrict user access to the management interface and enforce access security policies, such as setting up password restrictions.
    • The ESXi shell has privileged access to certain parts of the host, therefore provide only trusted users with ESXi shell login access.
    • Confirm that SSH access is disabled. This prevents remote access to the console of ESXi hosts.
  • Use only VMware sources to upgrade...