In association with heise online

30 June 2008, 19:13

Fully virtual networks

Sven Ahnert

Network configuration in virtual machines

Virtual machines like VMware or Microsoft's Virtual Server can be used to simulate networks or securely run servers in a sandbox environment. Detailed knowledge of the internal procedures and various scattered options is essential to do this properly

Virtual networks offer more configuration options than physically wired ones, and as a result raise more questions: as platforms, productive virtual servers have to be addressable on all LAN levels, if possible with redundant connections. In a test environment, on the other hand, providing security for network segments is the primary task, ideally behind a firewall. Developers want to access their virtual SQL servers while away from the office, and their virtual machines (VM) should be able to use the laptop's UMTS or ISDN connections. Several solutions are available to meet these requirements.

Switches and network adapters all have their counterparts in VMWare...
Zoom Switches and network adapters all have their counterparts in VMWare...

This article describes the concepts behind virtual networks, from virtual switches to MAC addresses, and offers practical tips. We will use version 1 of VMware server as an example, because it offers comprehensive network options and is freely available to anyone. What we will discuss also applies to newer versions and to the VMware workstation. Where required, we will discuss the particular characteristics of VMware's commercial ESX server. The network setup of Microsoft's free Virtual Server/PC is slightly different. do networks isolated via routers.
Zoom do networks isolated via routers.

All virtual machines share a similar basic structure, and almost all of the components found in a physical network also appear in the virtual world.

Print Version | Permalink:
  • Twitter
  • Facebook
  • submit to slashdot
  • StumbleUpon
  • submit to reddit

  • July's Community Calendar

The H Open

The H Security

The H Developer

The H Internet Toolkit