Book Image

Mastering VMware vSphere 6.5

Book Image

Mastering VMware vSphere 6.5

Overview of this book

VMware vSphere 6.5 provides a powerful, flexible and secure foundation for next-generation applications which helps you create an effective digital transformation. This book will be based on VMware vSphere 6.5 which empowers you to virtualize any complex application with ease. You’ll begin by getting an overview of all the products, solutions and features of the vSphere 6.5 suite, comparing the evolutions with the previous releases. Next ,you’ll design and plan a virtualization infrastructure to drive planning and performance analysis. Following this , you will be proceeding with workflow and installation of components. New network trends are also covered which will help you in optimally designing the vSphere environment. You will also learn the practices and procedures involved in configuring and managing virtual machines in a vSphere infrastructure. With vSphere 6.5, you’ll make use of significantly more powerful capabilities for patching, upgrading, and managing the configuration of the virtual environment. Next we’ll focus on specific availability and resiliency solutions in vSphere. Towards the end of the book you will get information on how to save your configuration, data and workload from your virtual infrastructure. By the end of the book you’ll learn about VMware vSphere 6.5 right from design to deployment and management.
Table of Contents (15 chapters)

Securing and Protecting Your Environment

One of the pillars of virtualization is the VM isolation property that can protect the host layer from the VM, effectively. Although some possible attacks have been found, virtualization remains an interesting approach to improve the security of your infrastructure.

But the isolation property doesn't work for the network layer, which remains potentially weak from a security point of view, even though standard and distributed virtual switches have some specific security features. VMware NSX tries to provide better security with micro-segmentation.

A new trend is now also to protect VMs from the underlying infrastructure; for example, in the case of a public cloud service, consumers may have some concerns about the security and privacy of their data.

This chapter will cover the following topics:

  • Tuning and hardening guidelines
  • Working...