Book Image

VMware vSphere 6.x Datacenter Design Cookbook - Second Edition

By : Hersey Cartwright, kim bottu
Book Image

VMware vSphere 6.x Datacenter Design Cookbook - Second Edition

By: Hersey Cartwright, kim bottu

Overview of this book

VMware is the industry leader in data center virtualization. The vSphere 6.x suite of products provides a robust and resilient platform to virtualize server and application workloads. With the release of 6.x a whole range of new features has come along such as ESXi Security enhancements, fault tolerance, high availability enhancements, and virtual volumes, thus simplifying the secure management of resources, the availability of applications, and performance enhancements of workloads deployed in the virtualized datacenter. This book provides recipes to create a virtual datacenter design using the features of vSphere 6.x by guiding you through the process of identifying the design factors and applying them to the logical and physical design process. You’ll follow steps that walk you through the design process from beginning to end, right from the discovery process to creating the conceptual design; calculating the resource requirements of the logical storage, compute, and network design; mapping the logical requirements to a physical design; security design; and finally creating the design documentation. The recipes in this book provide guidance on making design decisions to ensure the successful creation, and ultimately the successful implementation, of a VMware vSphere 6.x virtual data center design.
Table of Contents (19 chapters)
VMware vSphere 6.x Datacenter Design Cookbook Second Edition
Credits
About the Author
About the Reviewer
www.PacktPub.com
Preface
Index

Introduction


Security requirements of the virtual environment are a critical part of the vSphere design. If components of the virtual datacenter are compromised, a great deal of damage can be done, from powering off virtual machines to accessing sensitive data and impacting business process by disrupting or deleting virtual resources. To identify security requirements, there are a few questions the datacenter architect should ask, and these include the following:

  • What users require access? What resources should be available to users? Administrators, users, auditors, and so on.

  • Do resources require physical separation to ensure security?

  • Which resources should be separated? For example, separating DMZ resources from internal production resources: is it okay to share storage between DMZ and internal production resources? What about compute?

  • Are there compliance policies, for example, Health Insurance Portability and Accountability Act (HIPAA) or Payment Card Industry (PCI) policies, which the...