While I believe you are correct in your premise, I also believe you're creating 
multiple failure points for security.  If you have the firewall in the mix, you 
should be able to create rules to allow the required traffic to pass back into 
the LAN from the DMZ as required without having the 2nd NIC in the VM.  I 
understand that you're trying to migrate the existing physical to the new 
virtual equivalent, and the same situation already exists there as well.

--
There are 10 kinds of people in the world...
         those who understand binary and those who don't.

-----Original Message-----
From: [email protected] [mailto:[email protected]] On 
Behalf Of Michael Leone
Sent: Tuesday, December 2, 2014 10:40 AM
To: [email protected]
Subject: [NTSysADM] OT: networking advice for a VMware host on a DMZ

This is the first time I've set up an ESXi 5.5 server on a DMZ, and I want to 
verify what my networking configuration should be. Here's what I currently have 
- 5.5 host has 2 NICs in a standard vSwitch for management network, set as 
active (NIC #1) /standby (NIC #2). All is well, and I am communicating with the 
server using the vSphere fat client well,

 All my VMs will be P2Ved from the existing physical boxes. All currently have 
2 NICs - one for the DMZ (external facing) side, one for the LAN (internal 
facing) side. Pretty standard so far. So what I think I need is:

 1 standard vSwitch, port group named DMZ, 1 server NIC (#3) assigned to it. 
VLAN = xxx (I will have my networking guys create this new
VLAN)

1 standard vSwitch, port group named InternalLAN, 1 server NIC (#4) assigned to 
it. VLAN = yyy (I will have my networking guys create this new VLAN)

There is a Checkpoint firewall protecting the DMZ. It has 1 interface for the 
outside world, 1 for the trusted LAN. And 2 other interfaces, for use by my 
ESXi host - 1 interface for the DMZ, 1 for the 2nd NIC of the VMs.

So:

if I P2V my physical DMZ hosts; assign the proper portgroup to each virtual NIC 
in the VM; and plug the cable from each server NIC into the correct port on the 
firewall, everything should be good.

Traffic will come in from the Internet via the public port on the firewall; go 
through the DMZ interface of the firewall to the DMZ interface of the VM; if 
the VM needs info from the trusted LAN, it will request it via the internal LAN 
interface of the VM, which sends it through the firewall to the proper host on 
the trusted LAN. and vice versa, for the returned traffic. (I don't have 
anything to do with the configuration of the Checkpoint, or any physical 
switches)

Yes? Am I missing something major here? As long as I keep my server NICs going 
to different interfaces on the firewall (properly VLAN tagged), and have my VMs 
NICs going to the right port group, I should be good.

I hope I explained that clearly enough. Feel free to question me for further 
details, of course.

Thanks


Reply via email to