Hi SLCSam
The way that I understand the way ESXi handles this (and someone please correct me if I am wrong)
Is that ESXi handles all of the disk traffic independent of the VM.
Hence the VM only knows how to send SCSI comarnds to the hyperviser that then re-writes the comarnds and sends them to the virtual disk files.
Hence each VM only has access to its own virtual disk, and nothing else on the data store.
Hence if one of the VMs is hacked, the data on that VM will be exposed but that is all.
The VMs that are running on these clusters are all independent computing enviroments. And have no access to each others files.
Think of them as running multiple independent servers. These can not write to each others disks unless via CIFS or alike.
From what you have written, you have nic1 and nic2 as a trunk serving disk networks and admin.
You then have nic3 and nic2 linked to 2 different DMZs
Hence nic2 appears to be linked both to the disk network and to the DMZ.
This is a major problem. Since if one of the VMs in this DMZ is hacked, said VM could talk to the SAN via NFS (since they are on the same layer 2 network) and this will expose the .vmdk files for the other (possibly internal) VMs.
This is assuming that there are no vlans involved. Because if the DMZ and the disk net are on different Vlans then this problem will not occur.
If this is a typo and the admin and disk network is on nic0 and nic1 or there is Vlans setup to separate the layer 2 traffic, then there is no issue with this setup, even if one of the DMZ VMs is hacked.
Regards
Cyclooctane