Please see attached images. Example A is a single port group, and example B is using two separate vSwitches. Are there any advantages to creating a separate vSwitch just for DMZ traffic over just placing DMZ traffic in a separate port group and using overrides to assign specific pNICs to each port group?
We can assume that proper redundancy will be present everywhere, and that the same ESXi host will serve both production and DMZ traffic. Also assume that the DMZ traffic will be plugged into a physical firewall. Each port group is a separate VLAN. Again, if a single vSwitch would be used, we would dedicate specific pNICs to each port group appropriately via overrides so that the DMZ port group could not share the pNICs of the others.
I suppose I don't see any real difference in having a separate vSwitch vs doing port group overrides. I don't believe one is any more secure than the other, but happy to learn otherwise! Perhaps this is just preference and whatever is easier to manage? I can imagine if I had 10 different DMZ VLANs that extra configuration would be required if the same vSwitch is used over just sticking those port groups on the switch and not worrying about where each pNIC was connected. Any articles specific to security would be appreciated!
Thanks!