vCNS Edge SSL VPN

A secured, remote connection to your data is a requirement for almost all network designs these days. Mobility, telecommuting and late night help desk calls have created an environment that needs to have access to the local network in a secure fashion. vCNS Edge can provide these services to your virtual infrastructure. In previous posts, I’ve walked through installing vCNS Manager and installing vCNS Edge appliances. These are prerequisites to setting up SSL VPN on the VMware vCloud Network and Security appliance.. ...

May 13, 2014 · 5 min · eshanks

No More Data Plane Administrators

There are two terms used in IT that are often used in conjunction when learning about how technologies are built. These two terms are “Control Plane” and “Data Plane”. A quick and dirty definition of these two terms would be: Control Plane - The decision making part of any system. Usually considered the brains of the system. Data Plane - The part of a system that carries out an operation. This would be the routine tasks needed to make the system work. Just as a sidebar, if you are looking for me to site my source on those definitions you’re out of luck. These are my basic definitions that I’ve made up for purposes of this post. If for some reason these definitions become common place, then I want some royalties. :) ...

April 22, 2014 · 3 min · eshanks

vCNS Edge Network Address Translation

VMware vCloud Networking and Security (vCNS) can provide Network Address Translation (NAT) services from the vCNS Edge appliance. There are two types of NAT that the edge appliance can provide. Destination NAT (DNAT) is used to provide access to a private IP Address from a (usually) public IP Address for incoming traffic. Source NAT (SNAT) is used to translate a private IP Address into a (usually) public IP Address for outgoing traffic. This type of NAT can also be called “masquerading”. (It’s a subtle difference that we won’t go into in this post.) ...

April 15, 2014 · 4 min · eshanks

vCNS Edge DHCP

One of the most basic tasks that happens on a network is assigning IP Addresses. Once a VMware vCNS Edge appliance has been deployed, you can now hand out IP address through Dynamic Host Control Protocol (DHCP). In previous posts, I’ve walked through installing vCNS Manager and installing vCNS Edge appliances. These are prerequisites to setting up DHCP on the VMware vCloud Network and Security appliance. vCNS Edge DHCP Setup Log into your vShield Manager and click on the Datacenter. Click the “Network Virtualization” Tab where you’ll find the Edge appliance you’ve already deployed. Go to Actions and click “Manage”. ...

April 10, 2014 · 2 min · eshanks

Deploy vCNS Edge

vCloud Networking and Security has the capabilities to provide edge services inside of your virtual environment. Edge firewalls, network address translation, DHCP, routing are all things that vCNS Edge can do for you. This post goes into the steps necessary to deploy vCNS Edge. I should mention that vCNS and the previous name vShield may be used interchangeably in this article. Logical Diagram The picture below is a diagram of what our environment will look like when we’re done. We have production VMs as you might expect, and our new vCNS Edge VM. We’ve also got our new Edge network and a Shielded VM which will not be connected to the production vSwitch directly. ...

April 7, 2014 · 4 min · eshanks

Sony MDS-X10 Giveaway courtesy of Veeam

We’ll be giving away a pair of the Sony MDR-X10 headphones courtesy of Veeam. If you’re in the market for a stylish set of shiny new headphones and don’t want to shell out hard earned cash for them, this is your lucky day. During the vsphere-land.com top virtualization blog contest I was fortunate enough to win a pair of these to give away on my site. Here is how you can win a pair of these headphones for yourself. ...

March 31, 2014 · 1 min · eshanks

Website Badges for Top 50 vsphere-land Bloggers -2014

Each year Eric Siebert at vsphere-land.com has a voting process where you can cast your ballot for your favorite virtualization blogs. He lists those blogs on his vlaunchpad site if you’re curious to see who made the list. Luckily again this year my friends over at whateverinspires.com were kind enough to provide a logo for any bloggers who made this prestigious list. This year there are Gold, Silver, and Bronze badges depending on your status. If you made the list, please feel free to download the image and use it on your site. ...

March 27, 2014 · 1 min · eshanks

vShield Endpoint - Trend Micro Deep Security (Part 1)

If you’re a vSphere Administrator and have compliance regulations to deal with, vShield Endpoint might save you a lot of hassle. From my own experience with PCI-DSS, it was important to limit the cardholder data environment scope. The fewer devices that touch credit card data, the fewer items that had to be protected. In the same breath, it was important to have Anti-Virus, malware protection, firewall rules and file integrity monitoring. vShield Endpoint allows for all of these things to be handled in a single package. This post looks specifically at Trend Micro’s Deep Security Product. ...

March 24, 2014 · 3 min · eshanks

vShield Endpoint - Trend Micro Deep Security (Part 2)

In the first post in this series, we deployed the vShield Endpoint host driver and installed the Trend Micro Deep Security Manager on a Windows VM. Trend Micro Deep Security Appliance Deployment First, we need to login to the Deep Security Manager which is conveniently accessed as a web page. Go the the DNS name of the Manager that you entered during the setup wizard in part 1 of this series. Log in with the username and password that you specified. ...

March 24, 2014 · 4 min · eshanks

vShield Endpoint - Trend Micro Deep Security (Part 3)

The first parts of this series focused mainly on how to install the Trend Micro Deep Security product and how to prepare your environment. This post shows you a bit more of what can be accomplished with the product. vShield Endpoint Part 1 vSheidl Endpoint Part 2 Policies This is the guts of the product. All the configurations you’ve done up to this point have been leading up to a solution that can help secure your environment and possibly make it comply with a regulatory body. ...

March 24, 2014 · 2 min · eshanks