
Thanks a lot for you answer, Marcin!
On Wed, Nov 14, 2018 at 2:24 PM wrote: Having separate NICs you don't even need separate VLANs. You can just use one NIC for your host/storage network, and use another NIC to create a VM network. You must of course make sure to separate these outside of the hosts. VLANs are useful if you have just one NIC on your host, or want to have multiple networks on a single NIC. You can then create multiple VLAN networks (VLAN devices) on top of your NIC, and so achieve network separation. How are these VLAN tags "enforced"? Does the switch automatically separate VLANs from each other by default?
If you have your VM networks and host network use different NICs, your networks are already separated (L2). Yes, but I defined an IP for the "VM" NIC on the hosts which is reachable by the VMs (= the VMs are in the same subnet as the host). I want to completely make the hosts unreachable by the VM. I do not know whether this is best-practice or even necessary? I found little to no information about networking best-practices regarding oVirt.
Just as an anecdote: we had an laptop in the network of the hosts/storages which had for some reason had a static IP defined by an employee - which was also assigned to an storage server - which in turn resulted in some downtime. I think separating the hosts/storage from the rest of the network was a good first step to prevent such incidents but - as I said before - I am not sure whether it suffices. Thanks again for all your input!