This section outlines the planning process for a secure installation and describes several recommended deployment topologies for the systems. The VSM GUI User Guide 1.0 covers installation, configuration, and administration in detail.
To better understand security needs, the following questions must be asked:
For VSM GUI the host server and the associated network must be protected from unauthorized access
VSM GUI must be protected from everyone on the Internet, external users, and unauthorized internal users.
As VSM GUI is a virtual storage resource monitoring and usage application, unauthorized access to VSM GUI can affect VSM resources availability. The state of a resource can be affected, but the data residing on the storage resources will not be affected.
VSM GUI should only be installed on systems that are within the same protected (firewalled) network infrastructure as the monitored virtual resources (that is, VTCS and HSC). Customer access controls should be enforced on the systems where VSM GUI is installed to assure restricted access to the application.
Refer to the VSM GUI User Guide for installation instructions.