![]() ![]() The story of the parent …DO NOT install TMG on the parent partitionWindows Server 2008 R2 Core on the parentDO NOT use the parent as a workstation… It’s a SERVER …Restrict the management of the parentEnable Bitlocker on the parentKeep the parent OS up-to-dateDisconnectthe parent from the internet The story of the parent …If theparentis compromised, the whole virtualized environment is compromised.InternetVirtual Networking ComponentsGuest OSParent with TMGGuest OSCOMPROMISEDCOMPROMISEDCOMPROMISEDVirtual Networking ComponentsLAN ![]() VirtualVirtualPhysical√TMGTMGTMGApplicationApplicationApplicationParent Operating SystemChild (Guest)Operating SystemOperating SystemHypervisorHardwareHardware Virtualization of The Network edgeConcerns …More complicatednetwork structureMore difficult to manageThe same old argument against Windows security to be placed on the edge:Exchange Server 2010 Edge RoleOffice Communication Server 2007 Edge RoleISA Server is 10 years old without any exploitsLinux is more secure than WindowsInformation from Virtualization of The Network edgeConcerns …Software is less secure than hardwareHardware firewalls are all software-based but just come in a hardware package Why do we virtualize the edge?Faster disaster recovery in case of edge failureIncreasing the complexity of the network for hackersSuitable for small businesses What will be covered …Why do we virtualize the edge?Virtual Edge Security ConcernsThe Story of The Parent …Defining The Traffic Flow and The Traffic ProfileDeploying Forefront TMG as the Virtual Edge FirewallDeploying Forefront TMG as a Three-Legged and Back-to-Back FirewallDesigning a Virtual perimeter network or DMZTips For a Better Management and Performance Virtualization of Forefront Threat Management Gateway 2010Esmaeil SarabadaniMct, mcsa/mcse securityREDYNAMICS ASIA SDN. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |