Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Deployment-driven Security Configuration for Virtual Networks



Ramaswamy Chandramouli


Virtualized Infrastructures are increasingly deployed in many data centers. One of the key components of this virtualized infrastructure is the virtual network - a software-defined communication fabric that links together the various Virtual Machines (VMs) to each other and to the physical host on which the VMs reside. Because of its key role in providing connectivity among VMs and the applications hosted on them, Virtual Networks have to be securely configured to provide the foundation for the overall security of the virtualized infrastructure in any deployment scenario. The objective of this paper is to illustrate a deployment-driven methodology for deriving a security configuration for Virtual Networks. The methodology outlines two typical deployment scenarios, identifies use cases and their associated security requirements, the security solutions to meet those requirements, the virtual network security configuration to implement each security solution and then analyzes the pros and cons of each security solution.
Conference Dates
December 27-28, 2014
Conference Location
Conference Title
6th International Conference on Networks & Communications (NETCOM 2014)


security configuration, software defined network, virtual machine, virtualized infrastructure


Chandramouli, R. (2014), Deployment-driven Security Configuration for Virtual Networks, 6th International Conference on Networks & Communications (NETCOM 2014), Chennai, -1, [online], (Accessed April 14, 2024)
Created December 28, 2014, Updated November 10, 2018