On 10/03/2014 15:24, Thinker Rix wrote:
For this reason I am interested in turning things upside down, having
the host secured and the isolated VM connected to the network. Should
the VM be infected/infiltrated, the intruder could not get out of the
box of the VM.


Yes, just do this under linux and have iptables installed with a default policy of deny for INPUT and OUTPUT rules. Iptables will not affect guests using bridged networking. You can add exceptions to your firewall to all ssh / management of some sort from a secured IP address.

--
Regards,

Giles Coochey, CCNP, CCNA, CCNAS
NetSecSpec Ltd
+44 (0) 8444 780677
+44 (0) 7983 877438
http://www.coochey.net
http://www.netsecspec.co.uk
gi...@coochey.net


Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

------------------------------------------------------------------------------
Learn Graph Databases - Download FREE O'Reilly Book
"Graph Databases" is the definitive new guide to graph databases and their
applications. Written by three acclaimed leaders in the field,
this first edition is now available. Download your free book today!
http://p.sf.net/sfu/13534_NeoTech
_______________________________________________
VBox-users-community mailing list
VBox-users-community@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/vbox-users-community
_______________________________________________
Unsubscribe:  
mailto:vbox-users-community-requ...@lists.sourceforge.net?subject=unsubscribe

Reply via email to