Virtual Machine Network Architecture, Isolating Public and Private Networks
Posted
by Mark
on Server Fault
See other posts from Server Fault
or by Mark
Published on 2010-05-22T02:49:19Z
Indexed on
2010/05/22
3:02 UTC
Read the original article
Hit count: 324
I'm looking for some insight into best practices for network traffic isolation within a virtual environment, specifically under VMWARE ESXi.
Currently I have (in testing) 1 hardware server running ESXi but i expect to expand this to multiple pieces of hardware.
The current setup is as follows:
1 pfsense VM, this VM accepts all outside (WAN/internet) traffic and performs firewall/port forwarding/NAT functionality. I have multiple public IP addresses sent to the this VM that are used for access to individual servers (via per incoming IP port forwarding rules). This VM is attached to the private (virtual) network that all other VMs are on. It also manages a VPN link into the private network with some access restrictions. This isn't the perimeter firewall but rather the firewall for this virtual pool only.
I have 3 VMs that communicate with each other, as well as have some public access requirements:
1 LAMP server running an eCommerce site, public internet accessible
1 accounting server, access via windows server 2008 RDS services for remote access by users
1 inventory/warehouse management server, VPN to client terminals in warehouses
These servers constantly talk with each other for data synchronization.
Currently all the servers are on the same subnet/virtual network and connected to the internet through the pfsense VM. The pfsense firewall uses port forwarding and NAT to allow outside access to the servers for services and for server access to the internet.
My main question is this:
Is there a security benefit to adding a second virtual network adapter to each server and controlling traffic such that all server to server communication is on one separate virtual network, while any access to the outside world is routed through the other network adapter, through the firewall, and on the the internet.
This is the type of architecture i would use if these were all physical servers, but i'm unsure if the networks being virtual changes the way i should approach locking down this system.
Thank you for any thoughts or direction to any appropriate literature.
© Server Fault or respective owner