24.12.2014 Views

Vblock Solution for Trusted Multi-Tenancy: Design Guide - VCE

Vblock Solution for Trusted Multi-Tenancy: Design Guide - VCE

Vblock Solution for Trusted Multi-Tenancy: Design Guide - VCE

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Design</strong> framework<br />

This section provides the following in<strong>for</strong>mation:<br />

• End-to-end topology<br />

• Logical topology<br />

• Logical design details<br />

• Overview of tenant anatomy<br />

End-to-end topology<br />

Secure separation creates trusted zones that shield each tenant’s applications, virtual machines,<br />

compute, network, and storage from compromise and resource effects caused by adjacent tenants<br />

and external threats. The solution framework presented in this guide considers additional technologies<br />

that comprehensively provide appropriate in-depth defense. A combination of protective, detective,<br />

and reactive controls and solid operational processes are required to deliver protection against<br />

internal and external threats.<br />

Key layers include:<br />

• Virtual machine and cloud resources (VMware vSphere and VMware vCloud Director)<br />

• Virtual access/vSwitch (Cisco Nexus 1000V)<br />

• Storage and SAN (Cisco MDS and EMC storage)<br />

• Compute (Cisco UCS)<br />

• Access and aggregation (Nexus 5000 and Nexus 7000)<br />

Figure 3 illustrates the design framework.<br />

© 2013 <strong>VCE</strong> Company, LLC. All Rights Reserved.<br />

20

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!