The implementation and use of Virtualization offers
big advantages. The virtualization technology has
been proven by the use of actual products. Due to
this technology and the security features, the
design and the implementation of a sensitive part of
the IT infrastructure, a DMZ, is displayed. This
book focuses on the security aspects of
virtualization. With the installation of a virtual
DMZ it is possible to use all the advantages of a
virtual infrastructure. The aim of this book is to
develop a system to implement a DMZ within a virtual
infrastructure, which is at least as secure as a
physical one. In order to understand the
virtualization technology the theoretical basics are
described. Based on the features and functions of
the virtualization products the VMWare Virtual
Infrastructure 3 was chosen to implement the virtual
DMZ. The security measurements and the comparison of
the virtualized environment and a physical
environment are discussed. Various Advantages and
disadvantages of the configurations and types of a
virtual DMZ are listed. Based on these insights a
system has been put in place, how a DMZ can be
implemented within a virtual infrastructure.
big advantages. The virtualization technology has
been proven by the use of actual products. Due to
this technology and the security features, the
design and the implementation of a sensitive part of
the IT infrastructure, a DMZ, is displayed. This
book focuses on the security aspects of
virtualization. With the installation of a virtual
DMZ it is possible to use all the advantages of a
virtual infrastructure. The aim of this book is to
develop a system to implement a DMZ within a virtual
infrastructure, which is at least as secure as a
physical one. In order to understand the
virtualization technology the theoretical basics are
described. Based on the features and functions of
the virtualization products the VMWare Virtual
Infrastructure 3 was chosen to implement the virtual
DMZ. The security measurements and the comparison of
the virtualized environment and a physical
environment are discussed. Various Advantages and
disadvantages of the configurations and types of a
virtual DMZ are listed. Based on these insights a
system has been put in place, how a DMZ can be
implemented within a virtual infrastructure.