A virtual machine isolation method and device
A technology of isolation device and virtual machine, applied in the field of communication, can solve the problem that the data center cannot perform security isolation protection, and achieve the effect of improving application flexibility and security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0040] Please refer to figure 1 , is a schematic diagram of a network in the prior art, in which one side of the gateway is connected to the user's PC, the other side is connected to a switch, the switch is connected to a physical server, and vPC1 and vPC2 are virtual machines in the physical server. Since vPC1 and vPC2 provide services for different tenants or services, for the sake of communication security, traffic between virtual machines is not allowed to communicate directly at Layer 2. In order to isolate traffic between vPC1 and vPC2, a private VLAN needs to be configured for each virtual machine on the physical server and switch. In the prior art, after the traffic in the private VLAN is transparently transmitted to the switch, the switch will upload the traffic to the gateway through the promiscuous port P1 to realize the communication between the virtual machine and the gateway. However, the promiscuous port P1 is usually bound to a private VLAN, so the traffic sen...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com