Following networking security best practices helps ensure the integrity of your vSphere deployment. What to read next General Networking Security RecommendationsFollowing general network security recommendations is the first step in securing your networking environment. You can then move on to special areas, such as securing the network with firewalls or using IPsec. Labeling Networking ComponentsIdentifying the different components of your networking architecture is critical and helps ensure that no errors are introduced as your network grows. Document and Check the vSphere VLAN Environment Check your VLAN environment regularly to avoid addressing problems. Fully document the VLAN environment and ensure that VLAN IDs are used only once. Your documentation can help with troubleshooting and is essential when you want to expand the environment. Adopting Network Isolation PracticesNetwork isolation practices bolster network security in your vSphere environment. Use Virtual Switches with the vSphere Network Appliance API Only If RequiredDo not configure your host to send network information to a virtual machine unless you are using products that use the vSphere Network Appliance API (DvFilter). If the vSphere Network Appliance API is enabled, an attacker might attempt to connect a virtual machine to the filter. This connection might provide access to the network of other virtual machines on the host. Parent topic: Securing vSphere Networking