File: security-networking.dita

package info (click to toggle)
virtualbox 7.1.12-dfsg-2
  • links: PTS, VCS
  • area: contrib
  • in suites: sid
  • size: 565,672 kB
  • sloc: ansic: 2,330,854; cpp: 2,193,228; asm: 230,777; python: 223,895; xml: 86,771; sh: 25,541; makefile: 8,158; perl: 5,697; java: 5,337; cs: 4,872; pascal: 1,782; javascript: 1,692; objc: 1,131; lex: 931; php: 906; sed: 899; yacc: 707
file content (34 lines) | stat: -rw-r--r-- 1,840 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
<?xml version='1.0' encoding='UTF-8'?>
<!DOCTYPE topic PUBLIC "-//OASIS//DTD DITA Topic//EN" "topic.dtd">
<topic xml:lang="en-us" id="security-networking">
  <title>Networking</title>
  
  <body>
    <p> The default networking mode for VMs is NAT which means that the VM acts like a computer
      behind a router, see <xref href="network_nat.dita">Network Address Translation (NAT)</xref>.
      The guest is part of a private subnet belonging to this VM and the guest IP is not visible
      from the outside. This networking mode works without any additional setup and is sufficient
      for many purposes. Remember that NAT allows access to the host operating system's loopback
      interface. </p>
    <p>
          If bridged networking is used, the VM acts like a computer
          inside the same network as the host, see
          <xref href="network_bridged.dita">Bridged Networking</xref>. In this case, the guest has
          the same network access as the host and a firewall might be
          necessary to protect other computers on the subnet from a
          potential malicious guest as well as to protect the guest from
          a direct access from other computers. In some cases it is
          worth considering using a forwarding rule for a specific port
          in NAT mode instead of using bridged networking.
        </p>
    <p>
          Some setups do not require a VM to be connected to the public
          network at all. Internal networking, see
          <xref href="network_internal.dita">Internal Networking</xref>, or host-only networking,
          see <xref href="network_hostonly.dita">Host-Only Networking</xref>, are often sufficient
          to connect VMs among each other or to connect VMs only with
          the host but not with the public network.
        </p>
  </body>
  
</topic>