波音游戏源码-波音博彩公司评级_百家乐园天将_新全讯网3344111.c(中国)·官方网站

V. Hardening Steps to Secure Virtualisation Environment - Virtual Network Layer

by JUCC ISTF
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ 
 
The virtual networking layer consists of the virtual network devices through which virtual machines and the Service Console interface with the rest of the network. VM Server such as ESX Server relies on the virtual networking layer to support communications between virtual machines and the users. The virtual networking layer includes virtual network adapters and the virtual switches.
 
1.  Network breach by user error or omission - All virtual networks should be labelled appropriately to prevent confusion or security compromises. This labelling prevents operator error due to a virtual machine being attached to a network it is not authorised for or to a network that could allow the leakage of sensitive information. In addition, sensitive networks should be physically segregated from each other by using clusters of physical hosts.
 
2.  MAC Address spoofing (MAC address changes) - The "MAC address changes" option should be set to "Reject" in order to protect against MAC impersonation. ESX Server then will not allow requests to change the effective MAC address to anything other than the initial MAC address. The port that the virtual adapter used to send the request is disabled. As a result, the virtual adapter does not receive any more frames until it changes the effective MAC address to match the initial MAC address.
 
3.  MAC Address spoofing (Forged transmissions) - The Forged Transmissions option setting affects traffic transmitted from a virtual machine. The "Forged transmissions" option should be set to "Reject", such that the ESX Server will compare the source MAC address being transmitted by the operating system with the effective MAC address for its adapter to see if they match. If the addresses do not match, ESX Server drops the packet. ESX Server intercepts any packets with impersonated addresses before they are delivered, and the guest operating system might assume that the packets have been dropped. 
 
  
Reference:
 
 
澳门百家乐官网赢钱公式不倒翁 | 莆田棋牌迷游戏中心| 海立方百家乐官网赢钱| 百家乐平注法口诀| 磨丁黄金城赌场| 澳门百家乐开户投注| 百家乐官网怎么才赢| 吉利百家乐的玩法技巧和规则 | 百家乐官网第三张规则| 利记娱乐场| 迷你百家乐的玩法技巧和规则| 七乐百家乐官网现金网| 澳门百家乐限红规则| 百家乐官网娱乐城优惠| 电子百家乐作假| 真人百家乐官网是啥游戏| 百家乐社区| 百家乐风云论坛| 博马百家乐官网娱乐城| 百家乐java| 金博士百家乐官网的玩法技巧和规则 | 丽景湾百家乐官网的玩法技巧和规则 | 百家乐官网赌博赌博平台| 大发德州扑克| 娱乐城百家乐的玩法技巧和规则 | 365体育投注| 免费百家乐缩水| 百家乐送彩金平台| 宾利百家乐官网现金网| 亲朋棋牌官网| 乐博娱乐| 真人游戏 豆瓣| 百家乐平注胜进与负追| 百家乐官网网上娱乐场开户注册 | 水果老虎机的规律| 百家乐汝河路| 打百家乐的介绍| 百家乐官网孖宝揽| 澳门百家乐官网娱乐开户| 百家乐官网视频多开| 足球竞猜|