Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying VMware Cross-Cloud Architecture
  • Table Of Contents Toc
  • Feedback & Rating feedback
VMware Cross-Cloud Architecture

VMware Cross-Cloud Architecture

By : Kundan
4.9 (7)
close
close
VMware Cross-Cloud Architecture

VMware Cross-Cloud Architecture

4.9 (7)
By: Kundan

Overview of this book

Over the past two decades, VMware vSphere has been known as the most trusted and reliable virtualization platform. VMware Cross-Cloud Architecture shows you how to design and configure Cross Cloud Architecture by using VMware Cloud Foundation and vRealize Suite with various use cases across private, public, and hybrid Cloud. This book takes you through everything from a basic understanding of virtualization to advanced aspects of storage and network virtualization, clustering, automation, and management. This book will be your guide to designing all aspects of Cloud. We start with the challenges faced by a traditional data center, define problem statements for you, and then brief you on respective solutions. Moving on, all kinds of virtualization and Cloud offerings from AWS and IBM Soft Layer are introduced and discussed in detail. Then, you'll learn how to design IT infrastructures for new and existing applications with a combination of Cloud Foundation, vRealize Suite, and vSphere enabled with VSAN and NSX. Furthermore, you'll learn how to design and configure high availability, disaster recovery, and apply an appropriate compliance matrix. Toward the end of the book, you will learn how to calculate the TCO/ROI, along with the VMware products packaging and licensing in detail.
Table of Contents (15 chapters)
close
close

Security


The hypervisor platform is, undoubtedly, a secure environment from its technical architecture point of view. The hypervisor has a small footprint of around 200 MB, and it also has APIs for monitoring, so you don't need third-party applications on the host. You can refer to the VMware vSphere Hardening Guide for more details on security configurations at https://www.vmware.com/ca/en/security/hardening-guides.

 

Securing ESXi hosts

To protect the ESXi hosts against unauthorized intrusion and misuse, consider the following options for improving infrastructure security:

  • Limit user access:
    • To improve security, restrict user access to the management interface and enforce access security policies, such as setting up password restrictions.
    • The ESXi shell has privileged access to certain parts of the host, therefore provide only trusted users with ESXi shell login access.
    • Confirm that SSH access is disabled. This prevents remote access to the console of ESXi hosts.
  • Use only VMware sources to upgrade...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech

Create a Note

Modal Close icon
You need to login to use this feature.
notes
bookmark search playlist font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Delete Note

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Edit Note

Modal Close icon
Write a note (max 255 characters)
Cancel
Update Note

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY