NETWORK ISOLATION AND IDENTITY MANAGEMENT OF CLONED VIRTUAL MACHINES
First Claim
1. A method for establishing a multi-network configuration comprising:
- creating a fence upon a physical host to isolate a virtual computing environment comprising at least one virtual computing system, the at least one virtual computing system comprising an internal virtual network adapter;
adding an external virtual network adapter to respective virtual computing systems;
creating an internal virtual network within the fenced virtual computing environment;
creating an external virtual network within the fenced virtual computing environment configured to map physical external addresses on a physical external network to virtual external addresses on the virtual external network;
connecting the internal virtual network adapter to the internal virtual network;
connecting the external virtual network adapter to the external virtual network; and
applying a routing scheme to the physical host.
2 Assignments
0 Petitions
Accused Products
Abstract
A virtual computing environment comprising virtual machines may be created to clone a computing environment for testing purposes. To provide an accurate testing environment, the network configuration of the cloned computing environment may be preserved in the virtual computing environment. However, deploying the virtual computing environment on a physical network that comprises the cloned computing environment may create addressing conflicts. Accordingly, a technique for preserving network configuration data without creating addressing conflicts is provided herein. A virtual computing environment comprising an internal virtual network and external virtual network is fenced off to isolate the virtual computing environment from a physical external network. The virtual computing systems are connected to the internal virtual network for communication, using the preserved network configuration, between virtual computing environments. The virtual computing systems are separately connected to the external virtual network for communication through the physical external network.
191 Citations
20 Claims
-
1. A method for establishing a multi-network configuration comprising:
-
creating a fence upon a physical host to isolate a virtual computing environment comprising at least one virtual computing system, the at least one virtual computing system comprising an internal virtual network adapter;
adding an external virtual network adapter to respective virtual computing systems;creating an internal virtual network within the fenced virtual computing environment; creating an external virtual network within the fenced virtual computing environment configured to map physical external addresses on a physical external network to virtual external addresses on the virtual external network; connecting the internal virtual network adapter to the internal virtual network; connecting the external virtual network adapter to the external virtual network; and applying a routing scheme to the physical host. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for establishing a multi-network configuration comprising:
a physical host configured to host at least one fenced virtual computing environment, the physical host comprising; at least one fenced virtual computing environment comprising; at least one virtual computing system comprising; an internal virtual network adapter connected to an internal virtual network; an external virtual network adapter connected to an external virtual network; and a fence agent configured to configure an internal virtual network configuration and an external network configuration of the virtual computing system. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19)
-
20. A system for establishing a multi-network configuration comprising:
a plurality of physical hosts configured to host a fenced virtual computing environment, a physical host within the plurality of physical hosts comprising; a sub-environment corresponding to a fenced virtual computing environment comprising; at least one virtual computing system comprising; an internal virtual network adapter connected to an internal virtual network; an external virtual network adapter connected to an external virtual network; and a fence agent configured to configure an internal virtual network configuration and an external network configuration of the virtual computing system.
Specification