@CloudExpo Authors: Pat Romanski, Elizabeth White, Yeshim Deniz, Zakia Bouachraoui, Liz McMillan

Blog Feed Post

Create an Encrypted Disk on VMware

The following tutorial will show you how to create an encrypted disk on a Porticor appliance running on VMware. We go into detail, so this may look difficult at first. But the process simply consists of:

  • Creating a VMware virtual disk
  • Setting up the disk for encryption with Porticor and exposing it as an iSCSI target.
  • Creating a VMware datastore from the secured disk.
  • Using the datastore to carve out disks for your VMs.


Step 1: Create and initialize a Porticor Appliance.

See our VMware Getting Started article. At the end of this process, you will see the appliance’s home page.

 01 300x221 Create an Encrypted Disk on VMware


Step 2: Create a new Hard Disk on the appliance. This disk will eventually become your secure data store.

Go to your vSphere Client application. On the Porticor appliance, select Edit Settings, then Add Hard Disk.

 02 e1376843754516 300x231 Create an Encrypted Disk on VMware

Step 3: Rescan disks on the Porticor Appliance, so that the new disk is recognized.

Back on the Porticor GUI, go into the File Systems page, and press the Rescan button.

 03 300x156 Create an Encrypted Disk on VMwareStep 4: Wait a few seconds and you will see the new disk, appearing as “uninitialized”.

 04 300x156 Create an Encrypted Disk on VMwareStep 5: Define the disk as an iSCSI target.
Select iSCSI Target from the drop-down list, and press the Secure The Disk icon.

 05 300x156 Create an Encrypted Disk on VMware
Step 6: The disk is now ready to use.

 06 300x156 Create an Encrypted Disk on VMware
Step 7: Optionally, find out more details on the new disk.

Press the Use It link to discover details about the iSCSI target, such as the appliance’s IP address (also available from the vSphere Client) and the target name.

 07 300x156 Create an Encrypted Disk on VMware
Step 8: Locate the ESXi configuration page for the relevant host.

On the vSpehere Client, go into Hosts and Clusters, select the particular ESXi host and Configuration.

 08 e1376843723191 300x226 Create an Encrypted Disk on VMware

Step 9: Find the iSCSI Storage Adapter.

Under Storage Adapters, you should see an iSCSI Software Adapter. Select it.

 09 e1376843685989 300x224 Create an Encrypted Disk on VMware

Step 10: Add the Porticor appliance as an iSCSI target.

Right click the Adapter and select Properties, then the Dynamic Discovery tab, and enter the appliance’s IP as a Send Target Server.

 10 e1376843649762 300x217 Create an Encrypted Disk on VMware

Step 11: Rescan targets so that ESXi sees the new disk.

You will get a warning that a rescan is needed. Press Yes.

 11 e1376843609237 300x221 Create an Encrypted Disk on VMware

Step 12: The new iSCSI target is available.

The new iSCSI targets (a controller and a disk) appear at the bottom of the page.

 12 e1376843565274 300x215 Create an Encrypted Disk on VMware

Step 13: Start creating a new data store from the iSCSI target.

Go to Hardware/Storage, and Add Storage…, select Disk/LUN.

 13 e1376843524925 300x213 Create an Encrypted Disk on VMware

Step 14: Select the newly added storage.

 14 e1376843483914 300x217 Create an Encrypted Disk on VMware

Step 15: The datastore is now ready to use.

When done, you will see a new datastore created out of the encrypted storage.

 15 e1376843073280 300x224 Create an Encrypted Disk on VMware

Step 16: Use the secure datastore.

You can use the encrypted datastore when creating a disk for any VM. Just select Specify a Datastore.

 16 e1376843285623 300x213 Create an Encrypted Disk on VMware
Or you can use the Datastore Browser to examine the datastore’s contents.

 17 e1376843243828 300x215 Create an Encrypted Disk on VMware

The post Create an Encrypted Disk on VMware appeared first on Porticor Cloud Security.

Read the original blog entry...

More Stories By Gilad Parann-Nissany

Gilad Parann-Nissany, Founder and CEO at Porticor is a pioneer of Cloud Computing. He has built SaaS Clouds for medium and small enterprises at SAP (CTO Small Business); contributing to several SAP products and reaching more than 8 million users. Recently he has created a consumer Cloud at G.ho.st - a cloud operating system that delighted hundreds of thousands of users while providing browser-based and mobile access to data, people and a variety of cloud-based applications. He is now CEO of Porticor, a leader in Virtual Privacy and Cloud Security.

CloudEXPO Stories
On-premise or off, you have powerful tools available to maximize the value of your infrastructure and you demand more visibility and operational control. Fortunately, data center management tools keep a vigil on memory contestation, power, thermal consumption, server health, and utilization, allowing better control no matter your cloud's shape. In this session, learn how Intel software tools enable real-time monitoring and precise management to lower operational costs and optimize infrastructure for today even as you're forecasting for tomorrow.
While a hybrid cloud can ease that transition, designing and deploy that hybrid cloud still offers challenges for organizations concerned about lack of available cloud skillsets within their organization. Managed service providers offer a unique opportunity to fill those gaps and get organizations of all sizes on a hybrid cloud that meets their comfort level, while delivering enhanced benefits for cost, efficiency, agility, mobility, and elasticity.
Isomorphic Software is the global leader in high-end, web-based business applications. We develop, market, and support the SmartClient & Smart GWT HTML5/Ajax platform, combining the productivity and performance of traditional desktop software with the simplicity and reach of the open web. With staff in 10 timezones, Isomorphic provides a global network of services related to our technology, with offerings ranging from turnkey application development to SLA-backed enterprise support. Leading global enterprises use Isomorphic technology to reduce costs and improve productivity, developing & deploying sophisticated business applications with unprecedented ease and simplicity.
DevOps has long focused on reinventing the SDLC (e.g. with CI/CD, ARA, pipeline automation etc.), while reinvention of IT Ops has lagged. However, new approaches like Site Reliability Engineering, Observability, Containerization, Operations Analytics, and ML/AI are driving a resurgence of IT Ops. In this session our expert panel will focus on how these new ideas are [putting the Ops back in DevOps orbringing modern IT Ops to DevOps].
Darktrace is the world's leading AI company for cyber security. Created by mathematicians from the University of Cambridge, Darktrace's Enterprise Immune System is the first non-consumer application of machine learning to work at scale, across all network types, from physical, virtualized, and cloud, through to IoT and industrial control systems. Installed as a self-configuring cyber defense platform, Darktrace continuously learns what is ‘normal' for all devices and users, updating its understanding as the environment changes.