Vblock Solution for Trusted Multi-Tenancy: Design Guide - VCE
Vblock Solution for Trusted Multi-Tenancy: Design Guide - VCE
Vblock Solution for Trusted Multi-Tenancy: Design Guide - VCE
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
<strong>Design</strong> framework<br />
This section provides the following in<strong>for</strong>mation:<br />
• End-to-end topology<br />
• Logical topology<br />
• Logical design details<br />
• Overview of tenant anatomy<br />
End-to-end topology<br />
Secure separation creates trusted zones that shield each tenant’s applications, virtual machines,<br />
compute, network, and storage from compromise and resource effects caused by adjacent tenants<br />
and external threats. The solution framework presented in this guide considers additional technologies<br />
that comprehensively provide appropriate in-depth defense. A combination of protective, detective,<br />
and reactive controls and solid operational processes are required to deliver protection against<br />
internal and external threats.<br />
Key layers include:<br />
• Virtual machine and cloud resources (VMware vSphere and VMware vCloud Director)<br />
• Virtual access/vSwitch (Cisco Nexus 1000V)<br />
• Storage and SAN (Cisco MDS and EMC storage)<br />
• Compute (Cisco UCS)<br />
• Access and aggregation (Nexus 5000 and Nexus 7000)<br />
Figure 3 illustrates the design framework.<br />
© 2013 <strong>VCE</strong> Company, LLC. All Rights Reserved.<br />
20