I have been testing vmware on workstations and on servers for a few
months now. The way the vm-machine gets an ip is how you set it up. It
sets up the vm-machine with a "software" NIC. You can set it up to be
"host only" which means it sets it up with an internal private address
and is only able to connect to the host machine. Or you can set it up to
connect to the internet. Basically it bridges the network card. It picks
up an ip address from dhcp just as any other computer on your network
would.  This computer would be just as vulnerable as a separate computer
connected to the internet would be. There is great documentation on
vmwares site under their support for either the workstation or the
server version. Hope this has helped a little.



On Sun, 2001-09-09 at 11:23, leon wrote:
> Hi everyone,
> 
> I am thinking about deploying vmware on some systems that are connected
> to the internet and are running windows (vmware would be used for
> linux).  I was wondering what are some of the security risks of this?
> If the machine is running linux and can surf the web (as I have been
> told it can) how does it obtain an ip?  Will the services show up to the
> internet (rpc 111, telnet 23, etc?)  Do I have to firewall them and if
> so is firewalling for that done in windows or through linux.  These are
> individual users home machines so there is no firewall or edge router
> doing packet filtering.  So basically I am wondering what are some of
> the risks remote exploits against vmware boxes running linux?
> 
> If someone either knows the answer or can point me in the right
> direction I would really appreciate it.
> 
> Thx 
> 
> Leon
> 
> Public or Private responses welcome.


Reply via email to