Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying VMware vSphere 6.x Datacenter Design  Cookbook
  • Table Of Contents Toc
  • Feedback & Rating feedback
VMware vSphere 6.x Datacenter Design  Cookbook

VMware vSphere 6.x Datacenter Design Cookbook

By : kim bottu, Hersey Cartwright
4.2 (10)
close
close
VMware vSphere 6.x Datacenter Design  Cookbook

VMware vSphere 6.x Datacenter Design Cookbook

4.2 (10)
By: kim bottu, Hersey Cartwright

Overview of this book

VMware is the industry leader in data center virtualization. The vSphere 6.x suite of products provides a robust and resilient platform to virtualize server and application workloads. With the release of 6.x a whole range of new features has come along such as ESXi Security enhancements, fault tolerance, high availability enhancements, and virtual volumes, thus simplifying the secure management of resources, the availability of applications, and performance enhancements of workloads deployed in the virtualized datacenter. This book provides recipes to create a virtual datacenter design using the features of vSphere 6.x by guiding you through the process of identifying the design factors and applying them to the logical and physical design process. You’ll follow steps that walk you through the design process from beginning to end, right from the discovery process to creating the conceptual design; calculating the resource requirements of the logical storage, compute, and network design; mapping the logical requirements to a physical design; security design; and finally creating the design documentation. The recipes in this book provide guidance on making design decisions to ensure the successful creation, and ultimately the successful implementation, of a VMware vSphere 6.x virtual data center design.
Table of Contents (14 chapters)
close
close
13
Index

Introduction

Security requirements of the virtual environment are a critical part of the vSphere design. If components of the virtual datacenter are compromised, a great deal of damage can be done, from powering off virtual machines to accessing sensitive data and impacting business process by disrupting or deleting virtual resources. To identify security requirements, there are a few questions the datacenter architect should ask, and these include the following:

  • What users require access? What resources should be available to users? Administrators, users, auditors, and so on.
  • Do resources require physical separation to ensure security?
  • Which resources should be separated? For example, separating DMZ resources from internal production resources: is it okay to share storage between DMZ and internal production resources? What about compute?
  • Are there compliance policies, for example, Health Insurance Portability and Accountability Act (HIPAA) or Payment Card Industry (PCI) policies, which the...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech
bookmark search playlist download font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY