O'Reilly logo

VMware ESX Server in the Enterprise: Planning and Securing Virtualization Servers by Edward L. Haletky

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4. Auditing, Monitoring, and Securing

Is ESX secure? That is the number one question to be answered by this chapter, and the question petrifies security specialists every time ESX is brought into the mix of equipment and software. This is because ESX is a large unknown with regard to security as ESX was designed to be placed behind a firewall. Specifically, access to any ESX Server Ethernet port is intended to be made through a firewall, as shown in Figure 4.1. Figure 4.1 depicts the basic ESX networks and the need for multiple firewalls for each exposed network.

Figure 4.1. ESX Server behind a firewall

image

However, here we are about to discuss ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required