S 5.154 Secure configuration of a network for virtual infrastructures

Initiation responsibility: IT Security Officer, Head of IT

Implementation responsibility: Administrator

Virtualisation servers require numerous communication links. On the one hand, these are links to administration networks and, if required, links to storage networks in order to be able to use corresponding computer centre resources. On the other hand, they provide the virtual IT systems with the respective network connections.

Here, different technologies are used for the different virtualisation products. For some virtualisation products, separate network cards are assigned to the individual virtual IT systems in each case, with these network cards being directly connected to the networks to be used. These may include virtual or physical network cards.

For other virtualisation products, complete network infrastructures are emulated within the virtualisation server. For this, virtual switches are created which provide the required network connections for the virtual IT systems on the one hand and, on the other and, control the transition of the virtual network into the physical network, At the same time, it is also possible to create purely virtual networks without any transition to physical networks.

Some of the virtualisation solutions also support the option of establishing a logical segmentation in addition to a physical segmentation, e.g. with a VLAN (Virtual Local Area Network).

Moreover, the way the communication between virtual IT systems is implemented differs extremely. Sometimes, the communication between virtual IT systems in different networks on the same virtualisation server is routed through the physical network (example: Citrix XenServer, Sun VirtualBox, or VMware ESX), sometimes this communication is always routed within the virtualisation layer so that no routing instance outside of the virtualisation layer is involved in the communication (Sun Solaris Containers).

Several aspects must be taken into consideration in order to obtain a secure configuration of the virtualisation servers' networks:

Review questions: