Product SiteDocumentation Site

Chapter 5. Network Security in a Virtualized Environment

5.1. Network Security Overview
5.2. Network Security Best Practices
5.2.1. Securing Connectivity to Spice
5.2.2. Securing Connectivity to Storage

5.1. Network Security Overview

In almost all situations, the network is the only way to access systems, applications and management interfaces. As networking plays such a critical role in the management of virtualized systems and the availability of their hosted applications, it is very important to ensure that the network channels both to and from the virtualized systems are secure.
Securing the network allows administrators to control access and protect sensitive data from information leaks and tampering.