Solved

IDS/IPS VM on Laptop (Protecting Host)

Posted on 2010-08-19
3
808 Views
Last Modified: 2013-11-29
I have VMware Workstation 7 running on my laptop and would like to have a Guest VM filter the traffic to the Host when the VM  is running.

Inbound Traffic --> Guest VM Filter(IDS/IPS)--->Host Laptop

 For setting up the Virtual Network Adapter & the VM's NIC settings, what would be the best configuration?

Thanks,
Don

 Screenshot-Virtual-Network-Editor Screenshot-Virtual-Machine-Settings
0
Comment
Question by:-Don
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 28

Accepted Solution

by:
bgoering earned 500 total points
ID: 33484567
Wow - haven't a request quite like this before! Anyway to do what you want you would basically have to disable TCP/IP on the host NIC in order to force everything to go through your VM.

Next configure your VM to have two NICs,
One bridged to connect to outside world
One host-only to pass the filtered traffic to your host

Finally in your host open the network settings property on the NIC your VMware install added for host only networking (vmnic1) and add a default gateway to that NIC pointing to your "filtering" vm.

Outside -> bridged nic on vm -> vm does its ids/ips stuff -> host-only nic on vm -> host

Good Luck


0
 

Author Closing Comment

by:-Don
ID: 33486678
Excellent!
0
 

Author Comment

by:-Don
ID: 33486707
Thank You!

0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article describes my battle tested process for setting up delegation. I use this process anywhere that I need to setup delegation. In the article I will show how it applies to Active Directory
Active Directory security has been a hot topic of late, and for good reason. With 90% of the world’s organization using this system to manage access to all parts of their IT infrastructure, knowing how to protect against threats and keep vulnerabil…
This video shows you how easy it is to boot from ISO images for virtual machines with the ISO images stored on a local datastore on the ESXi host.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question