Vsphere Esxi Vcenter Server 551 Security Guide
Vsphere Esxi Vcenter Server 551 Security Guide
Update 1
ESXi 5.5
vCenter Server 5.5
EN-001361-04
vSphere Security
You can find the most up-to-date technical documentation on the VMware Web site at:
http://www.vmware.com/support/
The VMware Web site also provides the latest product updates.
If you have comments about this documentation, submit your feedback to:
docfeedback@vmware.com
Copyright 20092014 VMware, Inc. All rights reserved. Copyright and trademark information.
VMware, Inc.
3401 Hillview Ave.
Palo Alto, CA 94304
www.vmware.com
VMware, Inc.
Contents
Updated Information 9
12
47
57
60
61
64
VMware, Inc.
69
vSphere Security
73
108
144
VMware, Inc.
Contents
151
Alarms 154
Datacenter 155
Datastore 155
Datastore Cluster 156
vSphere Distributed Switch 156
ESX Agent Manager 157
Extension 157
Folder 158
Global 158
Host CIM 159
Host Configuration 159
Host Inventory 160
Host Local Operations 161
Host vSphere Replication 162
Host Profile 162
Network 162
Performance 163
Permissions 163
Profile-driven Storage 164
Resource 164
Scheduled Task 165
Sessions 165
Storage Views 165
Tasks 166
vApp 166
vCenter Inventory Service Tagging 167
Virtual Machine Configuration 168
Virtual Machine Guest Operations 170
Virtual Machine Interaction 170
Virtual Machine Inventory 172
Virtual Machine Provisioning 172
Virtual Machine Snapshot Management Privileges
Virtual Machine vSphere Replication 174
dvPort Group 174
vServices 175
VRM Policy 175
173
Index 177
VMware, Inc.
vSphere Security
VMware, Inc.
vSphere Security provides information about securing your vSphere environment for VMware vCenter
Server and VMware ESXi.
To help you protect your vSphere environment, this documentation describes security features available in
the vSphere environment and the measures that you can take to safeguard your environment from attack.
Intended Audience
This information is for experienced Windows or Linux system administrators who are familiar with virtual
machine technology and datacenter operations.
VMware, Inc.
vSphere Security
VMware, Inc.
Updated Information
This document is updated with each release of the product or when necessary.
This table provides the update history of this document.
Revision
Description
EN-001361-04
n
n
n
Fixed Replace a Default ESXi Certificate and Key by Using the vifs Command, on page 94 to use
correct vifs syntax.
Updated Using vCenter Single Sign-On with vSphere, on page 20 to state that you cannot rename
administrator@vsphere.local.
Updated ESXi Firewall Configuration, on page 82 to clearly state that custom VIBs affect
supportability. Removed information on Rule Set Configuration files and pointed uses to VMware
Knowledge Base article 2007381.
Updated vpxuser Permissions, on page 89 to no longer state that the vpxuser is created when the
host is added to vCenter Server.
EN-001361-03
Added Ensure that vpxuser Password Meets Policy, on page 89 back into this manual.
EN-001361-02
Fixed spelling error in Virtual Machine Interaction, on page 170 vSphere Privileges.
EN-001361-01
n
n
n
EN-001361-00
VMware, Inc.
Initial release.
vSphere Security
10
VMware, Inc.
To secure your vSphere environment, you must become familiar with many aspects of security including
authentication, authorization, users and permissions, and aspects of securing vCenter Server systems, ESXi
hosts, and virtual machines.
A high level overview of different areas of vSphere that require attention helps you plan your security
strategy. You also benefit from additional vSphere Security resources on the VMware website.
This chapter includes the following topics:
n
Digital signing ensures the integrity and authenticity of modules, drivers and
applications as they are loaded by the VMkernel. Module signing allows
ESXi to identify the providers of modules, drivers, or applications and
whether they are VMware-certified. VMware software and certain thirdparty drivers are signed by VMware.
Trusted Platform
Module (TPM)
VMware, Inc.
Third-party VIBs
11
vSphere Security
Third-party drivers
To leverage this capability, your ESXi system must have TPM and TXT
enabled.
When TPM and TXT are enabled, ESXi measures the entire hypervisor stack
when the system boots and stores these measurements in the Platform
Configuration Registers (PCR) of the TPM. The measurements include the
VMkernel, kernel modules, drivers, native management applications that run
on ESXi, and any boot-time configuration options. All VIBs that are installed
on the system are measured.
Third-party solutions can use this feature to build a verifier that detects
tampering of the hypervisor image, by comparing the image with an image
of the expected known good values. vSphere does not provide a user
interface to view these measurements.
The measurements are exposed in a vSphere API. An event log is provided
as part of the API, as specified by the Trusted Computing Group (TCG)
standard for TXT.
12
Topic
Resource
http://www.vmware.com/security/
http://www.vmware.com/support/policies/security_response.html
VMware is committed to helping you maintain a secure environment.
Security issues are corrected in a timely manner. The VMware Security
Response Policy states our commitment to resolve possible
vulnerabilities in our products.
VMware, Inc.
Resource
http://www.vmware.com/support/policies/
VMware supports a variety of storage systems, software agents such as
backup agents, system management agents, and so forth. You can find
lists of agents, tools, and other software that supports ESXi by
searching http://www.vmware.com/vmtn/resources/ for ESXi
compatibility guides.
The industry offers more products and configurations than VMware
can test. If VMware does not list a product or configuration in a
compatibility guide, Technical Support will attempt to help you with
any problems, but cannot guarantee that the product or configuration
can be used. Always evaluate security risks for unsupported products
or configurations carefully.
http://www.vmware.com/go/compliance
http://www.vmware.com/go/vmsafe
https://www.vmware.com/support/support-resources/hardeningguides.html
https://www.vmware.com/support/supportresources/certifications.html
VMware, Inc.
13
vSphere Security
14
VMware, Inc.
vCenter Single Sign-On is an authentication broker and security token exchange. When a user is
authenticated with vCenter Single Sign-On, that user can access all installed vCenter services to which the
user has been granted access. Because traffic is encrypted for all communications and only authenticated
users can be granted access, your environment is secure.
Install or upgrade vCenter Single Sign-On before you install or upgrade any other vSphere components. See
the vSphere Installation and Setup or the vSphere Upgrade documentation.
For information on replacing certificates for services that use vCenter Single Sign-On, see Chapter 3,
vSphere Security Certificates and Encryption, on page 43.
This chapter includes the following topics:
n
VMware, Inc.
15
vSphere Security
2
3
vCenter Single
Sign-On
Kerberos
CA
vCenter
Server
VMware
Directory
Service
A user logs in to the vSphere Web Client with a user name and password to access the vCenter Server
system or another vCenter service.
The user can also log in without a password and check the Use Windows session authentication
checkbox. The checkbox becomes available after you install the VMware Client Integration Plugin.
The vSphere Web Client passes the login information to the vCenter Single Sign-On service, which
checks the SAML token of the vSphere Web Client. If the vSphere Web Client has a valid token, vCenter
Single Sign-On then checks whether the user is in the configured identity source (for example Active
Directory).
n
If only the user name is used, vCenter Single Sign-On checks in the default domain.
If a domain name is included with the user name (DOMAIN\user1), vCenter Single Sign-On
checks that domain.
If the user is in the identity source, vCenter Single Sign-On returns a token that represents the user to
the vSphere Web Client.
The vSphere Web Client passes the token to the vCenter Server system.
vCenter Server checks with the vCenter Single Sign-On server that the token is valid and not expired.
The vCenter Single Sign-On server returns the token to the vCenter Server system.
The user can now authenticate to vCenter Server and view and modify any objects that the user has
permissions for..
NOTE Initially, each user is assigned the No Access permission. A vCenter Server administrator must assign
the user at least Read Only permissions before the user can log in. See Assign Permissions in the vSphere
Web Client, on page 66 and Chapter 5, vCenter User Management Tasks, on page 65.
16
VMware, Inc.
STS certificates enable a user who has logged on through vCenter Single
Sign-On to use any vCenter service that vCenter Single Sign-On supports
without authenticating to each one. The STS service issues Security Assertion
Markup Language (SAML) tokens. These security tokens represent the
identity of a user in one of the identity source types supported by vCenter
Single Sign-On.
Administration server
VMware Directory
Service
Simple Install
The Simple Install option installs vCenter Single Sign-On, the vSphere Web Client, vCenter Inventory
Service, and vCenter Server on the same host or virtual machine. Simple Install is appropriate for most
deployments.
VMware, Inc.
17
vSphere Security
Custom Install
If you want to customize the location and setup of each component, you can install the components
separately by performing a custom install and selecting the individual installation options, in the following
order:
1
vCenter Server
vCenter
Server
1
vCenter
Single
Sign-On
1
vCenter
Single
Sign-On
2
VMware
Directory
Service
18
vSphere.local
VMware
Directory
Service
vCenter
Server
2
Solutions users
VMware, Inc.
Custom Upgrade
A custom upgrade might install different vCenter Server components on different machines or install a
second vCenter Server system on the same machine. You also use Custom Install to upgrade an
environment that is installed in different locations.
If you upgrade to vCenter Server 5.5 from a vCenter Server version that does not include vCenter Single
Sign-On, and you install vCenter Single Sign-On on a different machine than vCenter Server, vCenter Single
Sign-On does not recognize existing local operating system users. The user administrator@vsphere.local can
log in to vCenter Single Sign-On and vCenter Server as an administrator user. If your previous installation
supported Active Directory users, you can add the Active Directory domain as an identity source.
If you are upgrading vCenter Server from a version that includes vCenter Single Sign-On in multisite mode,
and if the different vCenter Server systems use Linked mode, you must resynchronize first. You can then
upgrade all vCenter Single Sign-On instances and maintain Linked Mode functionality. Linked Mode is
required for a single view of all vCenter Server systems. Multisite vCenter Single Sign-On is supported only
if all nodes are the same version.
VMware, Inc.
19
vSphere Security
If you are upgrading vCenter Server from a version that includes vCenter Single Sign-On in high availability
mode, you must upgrade all of the vCenter Single Sign-On high availability instances. Perform the upgrade
first, and configure high availability by protecting both vCenter Server and vCenter Single Sign-On with
VMware HA or VMware Heartbeat after the upgrade is complete.
NOTE When you install the vCenter Single Sign-On component that is included with vCenter Server version
5.5 in multiple locations, the VMware Directory Service is updated for all vCenter Single Sign-On instances
if you make a change in one location.
20
VMware, Inc.
ESXi Users
ESXi 5.1 is not integrated with vCenter Single Sign-On. You add the ESXi host to an Active Directory
domain explicitly. See Add an ESXi Host to an Active Directory Domain, on page 82.
You can still create local ESXi users with the vSphere Client, vCLI, or PowerCLI. vCenter Server is not aware
of users that are local to ESXi and ESXi is not aware of vCenter Server users.
Login Behavior
When a user logs in to a vCenter Server system from the vSphere Web Client, the login behavior depends on
whether the user is in the default domain.
n
Users who are in the default domain can log in with their user name and password.
Users who are in a domain that has been added to vCenter Single Sign-On as an identity source but is
not the default domain can log in to vCenter Server but must specify the domain in one of the following
ways.
Users who are in a domain that is not a vCenter Single Sign-On identity source cannot log in to
vCenter Server. If the domain that you add to vCenter Single Sign-On is part of a domain hierarchy,
Active Directory determines whether users of other domains in the hierarchy are authenticated or not.
VMware, Inc.
21
vSphere Security
Identity Sources for vCenter Server with vCenter Single Sign-On on page 25
Identity sources allow you to attach one or more domains to vCenter Single Sign-On. A domain is a
repository for users and groups that the vCenter Single Sign-On server can use for user authentication.
22
VMware, Inc.
When prompted, provide the user name, the current password, and the new password.
If you are unable to log in, contact a vCenter Single Sign-On system administrator for assistance.
Log in to the vSphere Web Client as administrator@vsphere.local or as another user with vCenter Single
Sign-On administrator privileges.
Click Edit.
VMware, Inc.
Option
Description
Description
Maximum lifetime
Maximum number of days that a password can exist before the user must
change it.
Restrict re-use
Maximum length
Minimum length
23
vSphere Security
Option
Description
Character requirements
Click OK.
Log in to the vSphere Web Client as administrator@vsphere.local or as another user with vCenter Single
Sign-On administrator privileges.
Click Edit.
24
Option
Description
Description
Maximum number of failed login attempts that are allowed before the
account is locked.
Time period in which failed login attempts must occur to trigger a lockout.
Amount of time that the account remains locked. If you enter 0, the
administrator must unlock the account explicitly.
Click OK.
VMware, Inc.
Description
Clock tolerance
Click OK.
VMware, Inc.
25
vSphere Security
Active Directory versions 2003 and later. vCenter Single Sign-On allows you to specify a single Active
Directory domain as an identity source. The domain can have child domains or be a forest root domain.
Shown as Active Directory (Integrated Windows Authentication) in the vSphere Web Client.
Active Directory over LDAP. vCenter Single Sign-On supports multiple Active Directory over LDAP
identity sources. This identity source type is included for compatibility with the vCenter Single Sign-On
service included with vSphere 5.1. Shown as Active Directory as an LDAP Server in the vSphere Web
Client.
OpenLDAP versions 2.4 and later. vCenter Single Sign-On supports multiple OpenLDAP identity
sources. Shown as OpenLDAP in the vSphere Web Client.
Local operating system users. Local operating system users are local to the operating system where the
vCenter Single Sign-On server is running. The local operating system identity source exists only in basic
vCenter Single Sign-On server deployments and is not available in deployments with multiple vCenter
Single Sign-On instances. Only one local operating system identity source is allowed. Shown as localos
in the vSphere Web Client.
vCenter Single Sign-On system users. Exactly one system identity source named vsphere.local is created
when you install vCenter Single Sign-On. Shown as vsphere.local in the vSphere Web Client.
NOTE At any time, only one default domain exists. If a user from a non-default domain logs in, that user
must add the domain name (DOMAIN\user) to authenticate successfully.
vCenter Single Sign-On identity sources are managed by vCenter Single Sign-On administrator users.
You can add identity sources to a vCenter Single Sign-On server instance. Remote identity sources are
limited to Active Directory and OpenLDAP server implementations.
Login Behavior
When a user logs in to a vCenter Server system from the vSphere Web Client, the login behavior depends on
whether the user is in the default domain.
n
Users who are in the default domain can log in with their user name and password.
Users who are in a domain that has been added to vCenter Single Sign-On as an identity source but is
not the default domain can log in to vCenter Server but must specify the domain in one of the following
ways.
Users who are in a domain that is not a vCenter Single Sign-On identity source cannot log in to
vCenter Server. If the domain that you add to vCenter Single Sign-On is part of a domain hierarchy,
Active Directory determines whether users of other domains in the hierarchy are authenticated or not.
vCenter Single Sign-On does not propagate permissions that result from nested groups from dissimilar
identity sources. For example, if you add the Domain Administrators group to the Local Administrators
group, the permissions are not propagated because Local OS and Active Directory are separate identity
sources.
26
VMware, Inc.
Users who are in the default domain can log in with their user name and password.
Users who are in a domain that has been added to vCenter Single Sign-On as an identity source but is
not the default domain can log in to vCenter Server but must specify the domain in one of the following
ways.
Users who are in a domain that is not a vCenter Single Sign-On identity source cannot log in to
vCenter Server. If the domain that you add to vCenter Single Sign-On is part of a domain hierarchy,
Active Directory determines whether users of other domains in the hierarchy are authenticated or not.
Procedure
1
Log in to the vSphere Web Client as administrator@vsphere.local or as another user with vCenter Single
Sign-On administrator privileges.
On the Identity Sources tab, select an identity source and click the Set as Default Domain icon.
In the domain display, the default domain shows (default) in the Domain column.
All local operating system users. These users can be granted permissions to
vCenter Server. If you are upgrading, those users who already have
permissions keep those permissions.
vsphere.local
Procedure
1
Log in to the vSphere Web Client as administrator@vsphere.local or as another user with vCenter Single
Sign-On administrator privileges.
On the Identity Sources tab, click the Add Identity Source icon.
VMware, Inc.
27
vSphere Security
Select the type of identity source and enter the identity source settings.
Option
Description
Use this option for native Active Directory implementations. See Active
Directory Identity Source Settings, on page 28.
OpenLDAP
Use this option for an OpenLDAP identity source. See Active Directory
LDAP Server and OpenLDAP Server Identity Source Settings, on
page 29.
LocalOS
Use this option to add the local operating system as an identity source.
You are prompted only for the name of the local operating system. If you
select this option, all users on the specified machine are visible to vCenter
Single Sign-On, even if those users are not part of another domain.
NOTE If the user account is locked or disabled, authentications and group and user searches in the
Active Directory domain will fail. The user account must have read-only access over the User and
Group OU, and must be able to read user and group attributes. This is the default Active Directory
domain configuration for user permissions. VMware recommends using a special service user.
5
If you configured an Active Directory as an LDAP Server or an OpenLDAP identity source, click Test
Connection to ensure that you can connect to the identity source.
Click OK.
What to do next
When an identity source is added, all users can be authenticated but have the No access permission. A user
with vCenter Server Modify.permissions privileges can assign permissions to users or groups of users to
enable them to log in to vCenter Server. See Assign Permissions in the vSphere Web Client, on page 66.
28
Field
Description
Domain name
Use SPN
VMware, Inc.
Description
Service Principal
Password
Active Directory LDAP Server and OpenLDAP Server Identity Source Settings
The Active Directory as an LDAP Server identity source is available for backward compatibility. Use the
Active Directory (Integrated Windows Authentication) option for a setup that requires less input. The
OpenLDAP Server identity source is available for environments that use OpenLDAP.
If you are configuring an OpenLDAP identity source, see VMware Knowledge Base article 2064977 for
additional requirements.
Table 22. Active Directory as an LDAP Server and OpenLDAP Settings
Field
Description
Name
Domain name
Domain alias
VMware, Inc.
29
vSphere Security
Table 22. Active Directory as an LDAP Server and OpenLDAP Settings (Continued)
Field
Description
Username
ID of a user in the domain who has a minimum of readonly access to Base DN for users and groups.
Password
Log in to the vSphere Web Client as administrator@vsphere.local or as another user with vCenter Single
Sign-On administrator privileges.
Right-click the identity source in the table and select Edit Identity Source.
Edit the identity source settings. The available options depend on the type of identity source you
selected.
Option
Description
Use this option for native Active Directory implementations. See Active
Directory Identity Source Settings, on page 28.
OpenLDAP
Use this option for an OpenLDAP identity source. See Active Directory
LDAP Server and OpenLDAP Server Identity Source Settings, on page 29.
LocalOS
Use this option to add the local operating system as an identity source.
You are prompted only for the name of the local operating system. If you
select this option, all users on the specified machine are visible to vCenter
Single Sign-On, even if those users are not part of another domain.
Click Test Connection to ensure that you can connect to the identity source.
Click OK.
30
Log in to the vSphere Web Client as administrator@vsphere.local or as another user with vCenter Single
Sign-On administrator privileges.
On the Identity Sources tab, select an identity source and click the Delete Identity Source icon.
VMware, Inc.
Log in to the vSphere Web Client as administrator@vsphere.local or as another user with vCenter Single
Sign-On administrator privileges.
Select the STS Signing tab and select the certificate that you want to remove.
Click Yes.
The certificate is removed from the vCenter Single Sign-On server and no longer appears on the STS
Signing tab.
What to do next
Restart the vSphere Web Client.
Log in to the vSphere Web Client as administrator@vsphere.local or as another user with vCenter Single
Sign-On administrator privileges.
Select the Certificates tab, then the STS Signing subtab, and click Add STS Signing Certificate.
Click Browse to browse to the key store JKS file that contains the new certificate and click Open.
If the key store file is valid, the STS certificate table is populated with the certificate information.
Click OK.
VMware, Inc.
31
vSphere Security
Log in to the vSphere Web Client as administrator@vsphere.local or as another user with vCenter Single
Sign-On administrator privileges.
Click the Certificates tab, and then the Identity Sources TrustStore subtab .
Find the certificate and verify the expiration date in the Valid To text box.
You might see a warning at the top of the tab which indicates that a certificate is about to expire.
What to do next
Renew or replace SSL certificates that are getting close to their expiration date.
Log in to the vSphere Web Client as administrator@vsphere.local or as another user with vCenter Single
Sign-On administrator privileges.
Click the Certificates tab, and then the Identity Sources TrustStore subtab.
The Used By Domain column shows whether a certificate is in use, and helps you determine whether
you can safely remove a certificate.
32
If the Use Windows session authentication check box is not available, click Download the Client
Integration Plug-in at the bottom of the login page.
VMware, Inc.
If the browser blocks the installation by issuing certificate errors or by running a pop-up blocker, follow
the Help instructions for your browser to resolve the problem.
VMware, Inc.
33
vSphere Security
Log in to the vSphere Web Client as administrator@vsphere.local or as another user with vCenter Single
Sign-On administrator privileges.
If vsphere.local is not the currently selected domain, select it from the dropdown menu.
You cannot add users to other domains.
(Optional) Type the first name and last name of the new user.
Click OK.
When you add a user, that user initially has no permissions to perform management operations.
What to do next
Add the user to a group in the vsphere.local domain, for example, to the administrator group. See Add
Members to a vCenter Single Sign-On Group, on page 36.
34
Log in to the vSphere Web Client as administrator@vsphere.local or as another user with vCenter Single
Sign-On administrator privileges.
VMware, Inc.
Select a user, click the Disable icon, and click Yes when prompted.
To enable the user again, right-click the user, select Enable, and click Yes when prompted.
Log in to the vSphere Web Client as administrator@vsphere.local or as another user with vCenter Single
Sign-On administrator privileges.
In the list of users, select the user that you want to delete and click the Delete icon.
Proceed with caution. You cannot undo this action.
Log in to the vSphere Web Client as administrator@vsphere.local or as another user with vCenter Single
Sign-On administrator privileges.
VMware, Inc.
Click OK.
35
vSphere Security
Log in to the vSphere Web Client as administrator@vsphere.local or as another user with vCenter Single
Sign-On administrator privileges.
Select the Groups tab and click the New Group icon.
Click OK.
What to do next
n
Log in to the vSphere Web Client as administrator@vsphere.local or as another user with vCenter Single
Sign-On administrator privileges.
Click OK.
36
Log in to the vSphere Web Client as administrator@vsphere.local or as another user with vCenter Single
Sign-On administrator privileges.
VMware, Inc.
Click the Groups tab and click the group (for example, Administrators).
Select the identity source that contains the member to add to the group.
Click OK.
The selected user or group is a member of the group and appears in the lower panel of the Groups tab.
Log in to the vSphere Web Client as administrator@vsphere.local or as another user with vCenter Single
Sign-On administrator privileges.
In the list of group members, select the user or group that you want to remove and click the Remove
Member icon.
Click OK.
The user is removed from the group, but is still available in the system.
Log in to the vSphere Web Client as administrator@vsphere.local or as another user with vCenter Single
Sign-On administrator privileges.
Click the Applications Users tab, and click the application user name.
Click Yes.
VMware, Inc.
37
vSphere Security
The application (or solution) no longer has access to vCenter Server and cannot function as a vCenter
service.
Log in to the vSphere Web Client using your vCenter Single Sign-On credentials.
In the upper navigation pane, to the left of the Help menu, click your user name to pull down the menu.
As an alternative, you select Administration > Single Sign-On > Users and Groups and select Edit
User from the right-button menu.
Click OK.
At a command line, run the following command to gather a vCenter Single Sign-On support bundle.
C:\Windows\System32\cscript.exe "SSO Server\scripts\sso-support.wsf" /z
38
Click OK
VMware, Inc.
View the logs in %TEMP%\vminst.log for details about the failure and possible solutions.
For a complete list of logs, see VMware Knowledge Base article 2033430.
VM_ssoreg.log....
Cause
This problem has several causes, including unsynchronized clocks on the host machines, firewall blocking,
and services that must be started.
Solution
1
Verify that the clocks on the host machines running vCenter Single Sign-On, vCenter Server, and the
Web Client are synchronized.
VMware, Inc.
Message
java.net.ConnectException:
Connection timed out: connect
java.net.ConnectException:
Connection refused: connect
IThe IP address or FQDN is incorrect and the vCenter Single Sign-On has
not started or has started within the past minute.
Verify that vCenter Single Sign-On is working by checking the status of
vCenter Single Sign-On service (Windows) and vmware-sso daemon
(Linux).
Restart the service. If this does not correct the problem, see the recovery
section of the vSphere troubleshooting guide.
39
vSphere Security
Message
Restart vCenter Single Sign-On. If this does not correct the problem, see
the Recovery section of the vSphere Troubleshooting Guide.
Synchronize the clocks between the vCenter Server Appliance and the Active Directory domain
controllers.
Verify that each domain controller has a pointer record (PTR) in the Active Directory domain DNS
service and that the PTR record information matches the DNS name of the controller. When using the
vCenter Server Appliance, you can run the following commands to perform the task:
a
The relevant addresses are in the answer section, as in the following example:
;; ANSWER SECTION:
_ldap._tcp.my-ad.com. (...) my-controller.my-ad.com
...
For each domain controller, verify forward and reverse resolution by running the following
command:
# dig my-controller.my-ad.com
40
VMware, Inc.
The relevant addresses are in the answer section, as in the following example:
;; ANSWER SECTION:
my-controller.my-ad.com (...) IN A controller IP address
...
# dig -x <controller IP address>
The relevant addresses are in the answer section, as in the following example:
;; ANSWER SECTION:
IP-in-reverse.in-addr.arpa. (...) IN PTR my-controller.my-ad.com
...
If that does not resolve the problem, remove the vCenter Server Appliance from the Active Directory
domain and then rejoin the domain.
If you log in as a user from the system domain (vsphere.local), ask your vCenter Single Sign-On
administrator to unlock your account. As an alternative, you can wait until your account is unlocked, if
the lock is set to expire in the password policy.
If you log in as a user from an Active Directory or LDAP domain, ask your Active Directory or LDAP
administrator to unlock your account.
VMware, Inc.
41
vSphere Security
42
VMware, Inc.
ESXi and vCenter Server components communicate securely over SSL to ensure confidentiality, data
integrity and authentication. Data is private, protected, and cannot be modified in transit without detection.
By default, vSphere services use the certificates that are created as part of the installation process and stored
on each system. These default certificates are unique and make it possible to begin using the software, but
they are not signed by a trusted certificate authority (CA).
To receive the full benefit of certificate checking, particularly if you intend to use SSL connections over the
Internet, install new certificates that are signed by a valid internal certificate authority or purchase a
certificate from a trusted security authority.
This chapter includes the following topics:
n
Replacing vCenter Certificates With the vCenter Certificate Automation Tool, on page 47
VMware, Inc.
43
vSphere Security
SSL Certificates
SSL certificates secure communication throughout your vSphere environment. The client verifies the
authenticity of the certificate presented during the SSL handshake phase, before encryption. This
verification protects against man-in-the-middle attacks.
VMware products use standard X.509 version 3 (X.509v3) certificates to encrypt session information that is
sent over Secure Socket Layer (SSL) protocol connections between components.
vSphere components include default certificates. You can replace the default certificates with self-signed or
CA-signed certificates. For the vCenter core components, you can use the Certificate Automation Tool.
SSH Keys
SSH keys are used to control access to the ESXi hosts that are using the Secure Shell (SSH) protocol. See
Uploading an SSH Key to Your ESXi Host, on page 95.
Cipher Strength
To encrypt data, the sending component, such as a gateway or redirector, applies cryptographic algorithms,
or ciphers, to alter the data before transmitting it. The receiving component uses a key to decrypt the data,
returning it to its original form. Several ciphers are in use, and the level of security that each provides is
different. One measure of a ciphers ability to protect data is its cipher strengththe number of bits in the
encryption key. The larger the number, the more secure the cipher.
Administrators specify the desired cipher strength when they prepare a certificate request. Company policy
might dictate the cipher strength that the administrator chooses.
256-bit AES encryption and 1024-bit RSA for key exchange are the default for the following connections.
n
vSphere Web Client connections to vCenter Server and to ESXi through the management interface.
Use the Certificate Replacement tool in your Windows environment, as described in this document.
Replace certificates on Windows explicitly, as explained in VMware Knowledge Base article 2058519.
Replace certificates on the vCenter Server Appliance, as explained in VMware Knowledge Base article
2057223.
If want to use certificates that are signed by a CA, you must generate a certificate request (CSR) for each
component. You can use the tool to generate the CSRs. See Preparing Your Environment, on page 48 for
a list of certificate requirements.
44
VMware, Inc.
Updates the SSL certificate of a component and the corresponding LookupService entries of the services
that are exposed by the components if necessary.
Updates the trust of the component to all other components that it connects to. Restarts the component
if necessary.
NOTE Certificate replacement with the tool has been tested with vCenter Single Sign-On, vCenter Inventory
Service, vCenter Server, vSphere Web Client, vSphere Update Manager, vCenter Log Browser and vCenter
Orchestrator. If you have to perform a certificate replacement with another vSphere component, the
instructions in VMware documentation or the VMware Knowledge base for that product. You might have to
update certificates on one of the supported components as part of the process.
The tool supports the following vCenter components:
n
vCenter Server
vCenter Orchestrator
Each component must have an SSL certificate and a solution user certificate. Most components use the same
certificate for both purposes. On Windows, the solution user certificates must be unique, so a unique SSL
certificate for each component is required.
Upgrades
If you replaced the default certificates in vSphere version 5.0 or version 5.1, and you upgrade to vSphere
version 5.5, the certificates are migrated. If you are upgrading and you want to replace the default
certificates, you can run the Certificate Automation Tool after the upgrade.
VMware, Inc.
45
vSphere Security
Install and run the tool on one machine. The tool generates the update planner list.
Install and run the tool on the machine on which vCenter Single Sign-on is running to update the
vCenter Single Sign-On SSL certificate.
Install and run the tool on the Inventory Service machine. The tool performs these tasks:
Updates the trust from vCenter Inventory Service to vCenter Single Sign-On.
Install and run the tool on the machine on which vCenter Server is running. The tool performs these
tasks:
a
Updates the trust from the vCenter Server service to the vCenter Single Sign-On service.
Updates the trust from the vCenter Server to the vCenter Inventory Service.
Updates the trust from the vCenter Server to the vSphere Update Manager.
Install and run the tool on the vCenter Orchestrator machine. The tool performs these tasks:
a
Updates the trust from the vCenter Orchestrator service to the vCenter Single Sign-On service.
Updates the trust from the vCenter Orchestrator service to the vCenter Server service.
Install and run the tool on the vSphere Web Client machine. The tool performs these tasks:
a
Updates the trust from the vSphere Web Client to the vCenter Single Sign-On service.
Updates the trust from the vSphere Web Client to the vCenter Inventory Service and restarts the
service.
Updates the trust from the vSphere Web Client to the vCenter Server service and restarts the
service.
Updates the trust from the vSphere Web Client to the vCenter Orchestrator service and restarts the
service.
You have to restart the vSphere Web Client to complete the updates of the trust relationships.
7
46
Install and run the tool on the Log Browser machine. The vSphere Web Client and the vCenter Log
Browser always run on the same machine. The tool performs these tasks.
a
Updates the trust from the Log Browser service to the vCenter Single Sign-On service.
VMware, Inc.
Install and run the tool on the vSphere Update Manager machine.
The tool updates the vSphere Update Manager SSL certificate. As part of the certificate update, the
vCenter Server trust to vSphere Update manger is updated.
Use the vCenter Certificate Automation Tool to replace SSL certificates for vCenter components that are
installed on supported Windows operating systems. The tool helps you generate certificate requests
and to plan the process of replacing certificates. The tool supports vCenter Single Sign-On, vCenter
Inventory Service, vCenter Server, vSphere Web Client, vSphere Update Manager, vCenter Log
Browser and vCenter Orchestrator.
If you are using other vSphere components, see VMware documentation or the VMware Knowledge
Base for certificate replacement information.
If you are using a third-party component, you must replace the certificates manually. See VMware
Knowledge Base article 2058519.
If you are using the vCenter Server Appliance, replace SSL certificates manually. Some services share
certificates. See VMware Knowledge Base article 2057223.
VMware, Inc.
47
vSphere Security
Supported Platforms
The tool has been tested on the following Windows operating systems.
n
Certificate Requirements
You can obtain the CA-signed certificates before you run the tool, or you can have the tool generate the
certificate requests for you. Before you run the tool to replace certificates, make sure that certificates meet
the following requirements:
n
The SSL certificate for each vSphere component has a unique base DN.
48
sha256WithRSAEncryption 1.2.840.113549.1.1.11
sha384WithRSAEncryption 1.2.840.113549.1.1.12
VMware, Inc.
sha512WithRSAEncryption 1.2.840.113549.1.1.13
The file starts with the header of the first certificate, that is, -----BEGIN CERTIFICATE------.
The path or file name for certificates and keys does not contain any of the following special characters:
n
^ (caret)
% (percent)
& (ampersand)
; (semicolon)
) (closing parenthesis)
The tool exits, throws an exception, or reports that certificate or key files are not found if it encounters
those characters.
System Requirements
Install all vCenter components, obtain administrator permissions, and shut down dependent solutions, as
follows:
n
Verify that all vCenter components that require certificate updates are installed and running, and that
you have access to the server for each component.
Verify that you have administrative privileges on the server or servers that you are running the tool on.
Although nonadministrator users can download and launch the tool, all operations fail without the
proper permissions.
Shut down the following dependent solutions that are running in the environment:
VMware, Inc.
vCloud Director
49
vSphere Security
Prerequisites
n
Verify that all requirements are met. See Preparing Your Environment, on page 48.
Obtain certificates for each machine on which a vSphere component resides before you install the tool,
or use the tool to generate Certificate Signing Requests (CSRs) and obtain certificates from your
Certificate Authority. See Generate Certificate Requests and Set Up CA Signed Certificates, on
page 51.
Procedure
1
For initial planning, copy the downloaded ZIP file to one machine and generate the Update Planner list.
Depending on your deployment, you might copy the downloaded ZIP file to each machine on which a
vCenter core component resides.
Unzip the file into any directory, preserving the directory structure.
What to do next
You can predefine your preferred default values, see Predefine Default Values for vCenter Certificate
Automation Tool, on page 50, or respond to the prompts when you run the tool.
If a newer version of the tool becomes available, you can download and unzip that version of the tool to a
different directory and delete the old version of the tool.
50
VMware, Inc.
Procedure
1
Specify parameters that you want to change for each vSphere component that requires updated
certificates.
For example, for vCenter Server, you can edit the vc_cert_chain, vc_private_key, and vc_username
parameters.
The vCenter Certificate Automation Tool saves the information and uses it to automatically prefill required
input.
What to do next
Generate certificate requests if necessary, or run the update planner if you deployed on multiple machines
to plan your certificate update tasks. See Run the Update Planner, on page 52.
You can use the tool to generate the certificate requests for each of the following services if you are
using them in your environment.
n
vCenter Server
vCenter Orchestrator
VMware, Inc.
When you later supply the certificates and keys to the tool, the tool generates the PFX and JKS files that
are required by the vCenter Single Sign-On infrastructure and places them in the correct location.
51
vSphere Security
What to do next
n
Log into a machine on which the vCenter Certificate Automation Tool is installed.
From a command line, navigate to the location to which you unzipped the tool and run the following
command.
ssl-updater.bat
Enter the numbers that correspond to the services that you want to update.
u
To update more than one SSL certificate, separate the numbers with a comma. For example, to
update the SSL certificates on vCenter Single Sign-On, vCenter Server, and the vSphere Web Client,
type:1,3,4
To update the certificate on all services that are supported by the tool, type 8.
The vSphere Web Client and the vCenter Log Browser always run on the same machine.
NOTE Enter all of the services you intend to update. If you leave out some services initially and run the
Update Planner again later, the steps might be incorrect and the update might fail.
The Update Planner displays the tasks to perform and the order to perform them in.
5
52
VMware, Inc.
What to do next
Update certificates and trusts. See Run the Tool to Update SSL Certificates and Trusts, on page 53.
Move to the first machine on the task list and start the tool by running ssl-updater.bat.
The tool does not list machines by name but points you to the machine on which a service is running.
VMware, Inc.
53
vSphere Security
When prompted, specify the service whose certificate you want to update.
If you prespecified the default, the tool does not prompt you.
To update multiple SSL certificates, update the certificate for one service and then proceed to the next
service on the machine where it is deployed. The SSL certificate for each vSphere component must be
unique.
When prompted, type the requested information, such as the locations of the new SSL chain and private
key, passwords and so on.
After you have completed your update plan, you can close the command prompt window to end your
session.
54
Install OpenSSL on the system where you intend to replace the certificate.
VMware, Inc.
Procedure
1
Download the SSLImport.jar utility from the VMware Knowledge Base article Replacing SSL
Certificates for vCenter Server Heartbeat 6.x (KB 2013041).
Follow the steps in the knowledge base article to replace the certificate.
VMware, Inc.
55
vSphere Security
56
VMware, Inc.
vCenter Single Sign-On supports authentication, which means it determines whether a user can access
vSphere components at all. In addition, each user must be authorized to view or manipulate vSphere
objects.
vCenter Server allows fine-grained control over authorization with permissions and roles. Review first the
background information about hierachical inheritance of permissions, permission validation, and related
topics. You can then move on to vCenter Server User Management Tasks (Chapter 5, vCenter User
Management Tasks, on page 65).
This chapter includes the following topics:
n
VMware, Inc.
57
vSphere Security
data center
VM folder
host folder
template
network folder
standard
switch
host
resource pool
cluster
VDS
distributed
port group
datastore folder
datastore
datastore
cluster
virtual
machine
virtual
machine
vApp
vApp
resource pool
virtual
machine
vApp
resource pool
virtual
machine
Most inventory objects inherit permissions from a single parent object in the hierarchy. For example, a
datastore inherits permissions from either its parent datastore folder or parent datacenter. Virtual machines
inherit permissions from both the parent virtual machine folder and the parent host, cluster, or resource
pool simultaneously. To restrict a users privileges on a virtual machine, you must set permissions on both
the parent folder and the parent host, cluster, or resource pool for that virtual machine.
58
VMware, Inc.
To set permissions for a distributed switch and its associated distributed port groups, set permissions on a
parent object, such a folder or datacenter. You must also select the option to propagate these permissions to
child objects.
Permissions take several forms in the hierarchy:
Managed entities
Global entities
Clusters
Datacenters
Datastores
Datastore clusters
Folders
Hosts
Resource pools
Templates
Virtual machines
vSphere vApps
Global entities derive permissions from the root vCenter Server system.
n
Custom fields
Licenses
Roles
Statistics intervals
Sessions
Permission Validation
vCenter Server and ESXi hosts that use Active Directory regularly validate users and groups against the
Windows Active Directory domain. Validation occurs whenever the host system starts and at regular
intervals specified in the vCenter Server settings.
For example, if user Smith was assigned permissions and in the domain the users name was changed to
Smith2, the host concludes that Smith no longer exists and removes permissions for that user when the next
validation occurs.
Similarly, if user Smith is removed from the domain, all permissions are removed when the next validation
occurs. If a new user Smith is added to the domain before the next validation occurs, the new user Smith
receives all the permissions the old user Smith was assigned.
VMware, Inc.
59
vSphere Security
System roles are permanent. You cannot edit the privileges associated with
these roles.
Sample roles
See Roles in vCenter Server and ESXi, on page 68 for information on creating, cloning, and editing roles.
All roles permit the user to schedule tasks by default. Users can schedule only tasks they have permission to
perform at the time the tasks are created.
NOTE Changes to permissions and roles take effect immediately, even if the users involved are logged in.
The exception is searches, where permission changes take effect after the user has logged out and logged
back in.
60
Grant permissions only where needed. Using the minimum number of permissions makes it easier to
understand and manage your permissions structure.
If you assign a restrictive role to a group, check that the group does not contain the Administrator user
or other users with administrative privileges. Otherwise, you could unintentionally restrict
administrators' privileges in parts of the inventory hierarchy where you have assigned that group the
restrictive role.
Use folders to group objects to correspond to the differing permissions you want to grant for them.
Use caution when granting a permission at the root vCenter Server level. Users with permissions at the
root level have access to global data on vCenter Server, such as roles, custom attributes, vCenter Server
settings, and licenses. Changes to licenses and roles propagate to all vCenter Server systems in a Linked
Mode group, even if the user does not have permissions on all of the vCenter Server systems in the
group.
VMware, Inc.
In most cases, enable propagation on permissions. This ensures that when new objects are inserted in to
the inventory hierarchy, they inherit permissions and are accessible to users.
Use the No Access role to masks specific areas of the hierarchy that you dont want particular users to
have access to.
Required Privileges
Applicable Role
Administrator
Resource pool
administrator or
Administrator
Datastore
Consumer or
Administrator
Network
Consumer or
Administrator
Administrator
Administrator
Administrator
Datastore
Consumer or
Administrator
Network
Consumer or
Administrator
Virtual Machine
Power User or
Administrator
Datastore
Consumer or
Administrator
VMware, Inc.
61
vSphere Security
Required Privileges
Applicable Role
Administrator
Administrator
Virtual Machine
Power User or
Administrator
Virtual Machine
Power User or
Administrator
Resource Pool
Administrator or
Administrator
On the destination host, cluster, or resource pool (if different from the
source):
Resource.Assign virtual machine to resource pool
Resource Pool
Administrator or
Administrator
Resource Pool
Administrator or
Administrator
On the destination host, cluster, or resource pool (if different from the
source):
Resource.Assign virtual machine to resource pool
Resource Pool
Administrator or
Administrator
Datastore
Consumer or
Administrator
Resource Pool
Administrator or
Administrator
Datastore
Consumer or
Administrator
62
VMware, Inc.
Required Privileges
Applicable Role
On the host:
Host.Inventory.Add host to cluster
Administrator
Administrator
Password Requirements
Password requirements differ for vCenter Server and for ESXi hosts.
ESXi Passwords
By default, ESXi enforces requirements for user passwords.
Your user password must meet the following length requirements.
n
Passwords containing characters from one or two character classes must be at least eight characters
long.
Passwords containing characters from three character classes must be at least seven characters long.
Passwords containing characters from all four character classes must be at least six characters long.
When you create a password, include a mix of characters from four character classes: lowercase letters,
uppercase letters, numbers, and special characters such as an underscore or dash.
The password cannot contain the words root, admin, or administrator in any form.
NOTE An uppercase character that begins a password does not count toward the number of character
classes used. A number that ends a password does not count toward the number of character classes used.
You can also use a passphrase, which is a phrase consisting of at least three words, each of which is 8 to 40
characters long.
Xqat3hb: Begins with an uppercase character, reducing the effective number of character classes to two.
Eight characters are required when you use only two character classes.
xQaTEh2: Ends with a number, reducing the effective number of character classes to two. Eight
characters are required when you use only two character classes.
VMware, Inc.
63
vSphere Security
64
VMware, Inc.
Users in the vCenter environment must be authenticated, and they must be authorized to view and change
vSphere objects. Administrators perform user management tasks from the vSphere Web Client.
This chapter includes the following topics:
n
Adjust the Search List in Large Domains in the vSphere Web Client, on page 69
Multiple Permissions
Many tasks require permissions on more than one object.
Permissions applied on a child object always override permissions that are applied on a parent object.
Virtual machine folders and resource pools are equivalent levels in the hierarchy. If you assign propagating
permissions to a user or group on a virtual machine's folder and its resource pool, the user has the privileges
propagated from the resource pool and from the folder.
If multiple group permissions are defined on the same object and the user belongs to two or more of those
groups, two situations are possible:
n
If no permission is defined for the user on that object, the user is assigned the set of privileges assigned
to the groups for that object.
If a permission is defined for the user on that object, the user's permission takes precedence over all
group permissions.
VMware, Inc.
65
vSphere Security
Permission Examples
These rules can help you determine where you must assign permissions to allow particular operations:
n
Any operation that consumes storage space, such as creating a virtual disk or taking a snapshot,
requires the Datastore.Allocate Space privilege on the target datastore, as well as the privilege to
perform the operation itself.
Moving an object in the inventory hierarchy requires appropriate privileges on the object itself, the
source parent object (such as a folder or cluster), and the destination parent object.
Each host and cluster has its own implicit resource pool that contains all the resources of that host or
cluster. Deploying a virtual machine directly to a host or cluster requires the Resource.Assign Virtual
Machine to Resource Pool privilege.
Click Add.
Select the domain where the user or group is located from the Domain drop-down menu.
Type a name in the Search box or select a name from the list.
The system searches user names, group names, and descriptions.
(Optional) Click Check Names to verify that the user or group exists in the database.
Click OK.
66
VMware, Inc.
Verify that the users and groups are assigned to the appropriate permissions and click OK.
The server adds the permission to the list of permissions for the object.
The list of permissions references all users and groups that have roles assigned to the object and
indicates where in the vCenter Server hierarchy the role is assigned.
Click the line item to select the user or group and role pair.
Select a role for the user or group from the Assigned Role drop-down menu.
To propagate the privileges to the children of the assigned inventory object, click the Propagate check
box and click OK.
Click the appropriate line item to select the user or group and role pair.
Browse to the vCenter Server system in the vSphere Web Client object navigator.
VMware, Inc.
67
vSphere Security
(Optional) If validation is enabled, enter a validation period to specify a time, in minutes, between
validations.
Click OK.
You can create custom roles by using the role-editing facilities in the
vSphere Web Client to create privilege sets that match your user needs.
You can create custom roles for individual hosts by using a CLI or the
vSphere Client. Custom host roles are not accessible from vCenter Server.
If you manage ESXi hosts through vCenter Server, maintaining custom roles
in both the host and vCenter Server can result in confusion and misuse. In
most cases, defining vCenter Server roles is recommended.
NOTE When you add a custom role and do not assign any privileges to it, the role is created as a Read Only
role with three system-defined privileges: System.Anonymous, System.View, and System.Read.
68
VMware, Inc.
Prerequisites
Verify that you are logged in as a user with Administrator privileges.
Procedure
1
Adjust the Search List in Large Domains in the vSphere Web Client
If you have domains with thousands of users or groups, or if searches take a long time to complete, adjust
the search settings.
NOTE This procedure applies only to vCenter Server user lists. ESXi host user lists cannot be searched in the
same way.
Procedure
1
Browse to the vCenter Server system in the vSphere Web Client object navigator.
VMware, Inc.
69
vSphere Security
70
Description
Query limit
Select the checkbox to set a maximum number of users and groups that
vCenter Server displays.
Click OK.
VMware, Inc.
Securing vCenter Server includes ensuring security of the host where vCenter Server is running, following
best practices for assigning privileges and roles, and verifying the integrity of the clients that connect to
vCenter Server.
This chapter includes the following topics:
n
Enable Certificate Checking and Verify Host Thumbprints in the vSphere Web Client, on page 73
Removing Expired or Revoked Certificates and Logs from Failed Installations, on page 73
Maintain a supported operating system, database, and hardware for the vCenter Server system. If
vCenter Server is not running on a supported operating system, it might not run properly, making
vCenter Server vulnerable to attacks.
Keep the vCenter Server system properly patched. By staying up-to-date with operating system
patches, the server is less vulnerable to attack.
Provide operating system protection on the vCenter Server host. Protection includes antivirus and antimalware software.
On each Windows computer in the infrastructure, ensure that Remote Desktop (RDP) Host
Configuration settings are set to ensure the highest level of encryption according to industry-standard
guidelines or internal guidelines.
For operating system and database compatibility information, see the vSphere Compatibility Matrixes.
VMware, Inc.
Full administrative rights to vCenter Server should be removed from the local Windows administrator
account and granted to a special-purpose local vCenter Server administrator account. Grant full
vSphere administrative rights only to those administrators who are required to have it. Do not grant
this privilege to any group whose membership is not strictly controlled.
71
vSphere Security
Avoid allowing users to log in directly to the vCenter Server system. Allow only those users who have
legitimate tasks to perform to log into the system and ensure that these events are audited.
Install vCenter Server using a service account instead of a Windows account. You can use a service
account or a Windows account to run vCenter Server. Using a service account allows you to enable
Windows authentication for SQL Server, which provides more security. The service account must be an
administrator on the local machine.
Check for privilege reassignment when you restart vCenter Server. If the user or user group that is
assigned the Administrator role on the root folder of the server cannot be verified as a valid user or
group, the Administrator privileges are removed and assigned to the local Windows Administrators
group.
Grant minimal privileges to the vCenter Server database user. The database user requires only certain
privileges specific to database access. In addition, some privileges are required only for installation and
upgrade. These can be removed after the product is installed or upgraded.
Create a user account that you will use to manage vCenter Server (for example, vi-admin).
Ensure that the user does not belong to any local groups, such as the Administrators group.
Log into the vCenter Server system as the local operating system administrator and grant the role of
global vCenter Server administrator to the user account you created (for example, vi-admin).
Log out of vCenter Server and log in with the user account you created (vi-admin).
Verify that the user can perform all tasks available to a vCenter Server administrator.
Remove the administrator privileges that are assigned to the local operating system administrator user
or group.
Create a user account to manage vCenter Server and assign full vCenter Server administrator privileges
to the user. See Managing Permissions for vCenter Components, on page 65.
Remove vCenter Server administrator privileges from the local operating system administrator.
Procedure
72
Log in to the vCenter Server system as the vCenter Server administrator you created (for example, viadmin).
VMware, Inc.
What to do next
Protect the vCenter Server administrator account password. For example, create a password with two
halves, each half of which is known to only one person, or lock a printout of the password in a safe.
Browse to the vCenter Server system in the vSphere Web Client object navigator.
Click Edit.
Click SSL Settings and verify that vCenter requires verified host SSL certificates is selected.
If there are hosts that require manual validation, compare the thumbprints listed for the hosts to the
thumbprints in the host console.
To obtain the host thumbprint, use the Direct Console User Interface (DCUI).
a
Log in to the direct console and press F2 to access the System Customization menu.
If the thumbprint matches, select the Verify check box next to the host.
Hosts that are not selected will be disconnected after you click OK.
Click OK.
If expired or revoked certificates are not removed from the vCenter Server Server system, the
environment can be subject to a MiTM attack
In certain cases, a log file that contains the database password in plain text is created on the system if
vCenter Server installation fails. An attacker who breaks into the vCenter Server system, might gain
access to this password and, at the same time, access to the vCenter Server database.
VMware, Inc.
73
vSphere Security
Click Edit.
At the bottom of the dialog, enter the following Key and Value.
Field
Value
Key
nfc.useSSL
Value
true
Click OK.
Systems that are authorized to run management clients. For example, the vSphere Web Client, a
Windows system where you use the PowerCLI, or any other SDK-based client.
Systems that run add-on components such as VMware vSphere Update Manager.
Other systems that run components that are essential to functionality of the vCenter Server system.
Use a local firewall on the Windows system where vCenter Server system is running or use a network
firewall. Include IP-based access restrictions so that only necessary components can communicate with the
vCenter Server system.
74
VMware, Inc.
vCLI commands
You can relax the restriction against using Linux clients if you enforce proper controls.
n
Use firewalls to ensure that only authorized hosts are allowed to access vCenter Server.
Use jump-box systems to ensure that Linux clients are behind the jump.
VMware, Inc.
75
vSphere Security
Prerequisites
You must have privileges to access the vCenter Single Sign-On server. These privileges differ from vCenter
Server privileges.
Procedure
1
Log in to the vSphere Web Client as administrator@vsphere.local or a user with vCenter Single Sign-On
privileges.
From the Home page, select Administration, and then select Client Plug-Ins under Solutions
Remove the tcdump Package from the vCenter Server Virtual Appliance
By default, the vCenter Server virtual appliance includes the tcdump package. You can remove that package
if security considerations require it.
The tcpdump package allows administrators to analyze TCP packets for troubleshooting and testing.
However, in some situations security considerations require a removal of the package. For example, you
must remove the package to ensure compliance with GEN003865 in the DIS STIG, run the following
command as root to remove the tcpdump package from the system:
Procedure
1
76
VMware, Inc.
Restricting access to the services and ports on an ESXi host is critical to protecting against unauthorized
intrusion in your vSphere environment.
If a host is compromised, the virtual machines on that host are now threatened to be compromised as well.
Restrict access to services and ports, an ESXi host is protected with a firewall. Using the ESXi lockdown
mode and limiting access to the ESXi Shell can further contribute to a more secure environment.
This chapter includes the following topics:
n
Replace the Authentication Proxy Certificate for the ESXi Host, on page 108
VMware, Inc.
77
vSphere Security
To improve security, restrict user access to the Direct Console User Interface (DCUI) and the ESXi Shell
and enforce access security policies, for example, by setting up password restrictions.
The ESXi Shell has privileged access to certain parts of the host. Provide only trusted users with
ESXi Shell login access.
n
Use the vSphere Web Client to administer ESXi hosts that are managed by a vCenter Server. Do not
access managed hosts directly with the vSphere Client, and do not make changes to managed hosts
from the host's DCUI.
In addition to implementing the firewall, risks to the hosts are mitigated using other methods.
n
ESXi runs only services essential to managing its functions, and the distribution is limited to the
features required to run ESXi.
By default, all ports not specifically required for management access to the host are closed. You must
specifically open ports if you need additional services.
By default, weak ciphers are disabled and all communications from clients are secured by SSL. The
exact algorithms used for securing the channel depend on the SSL handshake. Default certificates
created on ESXi use PKCS#1 SHA-256 With RSA encryption as the signature algorithm.
The Tomcat Web service, used internally by ESXi to support access by Web clients, has been modified
to run only those functions required for administration and monitoring by a Web client. As a result,
ESXi is not vulnerable to the Tomcat security issues reported in broader use.
VMware monitors all security alerts that could affect ESXi security and issues a security patch if
needed.
Insecure services such as FTP and Telnet are not installed, and the ports for these services are closed by
default. Because more secure services such as SSH and SFTP are easily available, always avoid using
these insecure services in favor of their safer alternatives. For example, use Telnet with SSL instead of
Telnet to access virtual serial ports. If you must use insecure services and have implemented sufficient
protection for the host, you must explicitly open ports to support them.
78
VMware, Inc.
vSphere infrastructure networks are used for features such as VMware vSphere vMotion , VMware
vSphere Fault Tolerance, and storage. These networks are considered to be isolated for their specific
functions and often are not routed outside a single physical set of server racks.
A management network isolates client traffic, command-line interface (CLI) or API traffic, and thirdparty software traffic from normal traffic. This network should be accessible only by system, network,
and security administrators. Use jump box or virtual private network (VPN) to secure access to the
management network. Strictly control access within this network to potential sources of malware.
Virtual machine traffic can flow over one or many networks. You can enhance the isolation of virtual
machines by using virtual firewall solutions that set firewall rules at the virtual network controller.
These settings travel with a virtual machine as it migrates from host to host within your vSphere
environment.
(Optional) Determine if the managed object browser (MOB) is enabled by running the following
command.
vim-cmd proxysvc/service_list
If the service is running, the following text appears in the list of services:
...
serverNamespace = '/mob',
accessMode = "httpsWithRedirect",
pipeName = "/var/run/vmware/proxy-mob",
...
VMware, Inc.
79
vSphere Security
Monitor the /etc/ssh/keys-root/authorized_keys file to verify that it is empty and no SSH keys have
been added to the file.
If you find that the /etc/ssh/keys-root/authorized_keys file is not empty, remove any keys.
Disabling remote access with authorized keys might limit your ability to run commands remotely on a host
without providing a valid login. For example, this can prevent you from running an unattended remote
script.
The Read Timeout setting applies to connections that have completed the SSL handshake process with
port 443 of ESXi.
The Handshake Timeout setting applies to connections that have not completed the SSL handshake
process with port 443 of ESXi.
80
VMware, Inc.
VMwareAccepted
VIBs with this acceptance level go through verification testing, but the tests
do not fully test every function of the software. The partner runs the tests
and VMware verifies the result. Today, CIM providers and PSA plugins are
among the VIBs published at this level. VMware directs support calls for
VIBs with this acceptance level to the partner's support organization.
VMware, Inc.
81
vSphere Security
PartnerSupported
CommunitySupported
Procedure
1
Connect to each ESXi host and verify that the acceptance level is set to VMwareCertified or
VMwareAccepted by running the following command.
esxcli software acceptance get
If the host acceptance level is not VMwareCertified or VMwareAccepted, determine whether any of the
VIBs are not at the VMwareCertified or VMwareAccepted level by running the following commands.
esxcli software vib list
esxcli software vib get -n vibname
Remove any VIBs that are at the PartnerSupported or CommunitySupported level by running the
following command.
esxcli software vib remove --vibname vib
Change the acceptance level of the host by running the following command.
esxcli software acceptance set --level acceptance_level
Click Join Domain, supply the domain settings, and click OK.
82
VMware, Inc.
Using ESXCLI commands to modify firewall rules, from the command line or in scripts. See ESXi
Firewall Configuration, on page 82.
Using a custom VIB if the port you want to open is not included in the security profile. You create
custom VIBs with the vibauthor tool available from VMware Labs. To install the custom VIB, you have
to change the acceptance level of the the ESXi host to CommunitySupported. See VMware Knowledge
Base Article 2007381.
NOTE If you engage VMware Technical Support to investigate a problem on an ESXi host with a
CommunitySupported VIB installed, VMware Support might request that this CommunitySupported
VIB be uninstalled as a troubleshooting step to determine if that VIB is related to the problem being
investigated.
You can view supported services and management agents that are required to operate the host in the host's
Security Profile section in the vSphere Web Client.
NOTE The behavior of the NFS Client rule set (nfsClient) is different from other rule sets. When the NFS
Client rule set is enabled, all outbound TCP ports are open for the destination hosts in the list of allowed IP
addresses. See NFS Client Rule Set Behavior, on page 84 for more information.
Select the rule sets to enable, or deselect the rule sets to disable.
The Incoming Ports and Outgoing Ports columns indicate the ports that the vSphere Web Client opens
for the service. The Protocol column indicates the protocol that the service uses. The Daemon column
indicates the status of daemons associated with the service.
Use the Start, Stop, or Restart buttons to change the status of a service temporarily.
Change the Startup Policy to have the service start with the host or with port usage.
For some services, you can explicitly specify IP addresses from which connections are allowed.
See Add Allowed IP Addresses in the vSphere Web Client, on page 84.
VMware, Inc.
83
vSphere Security
Click OK.
In the Firewall section, click Edit and select a service from the list.
In the Allowed IP Addresses section, deselect Allow connections from any IP address and enter the IP
addresses of networks that are allowed to connect to the host.
Separate IP addresses with commas. You can use the following address formats:
192.168.0.0/24
192.168.1.2, 2001::1/64
fd3e:29a6:0a81:e478::/64
Click OK.
If the NFS Client rule set is disabled, ESXi enables the rule set and disables the Allow All IP Addresses
policy by setting the allowedAll flag to FALSE. The IP address of the NFS server is added to the allowed
list of outgoing IP addresses.
If the NFS Client rule set is enabled, the state of the rule set and the allowed IP address policy are not
changed. The IP address of the NFS server is added to the allowed list of outgoing IP addresses.
When you remove or unmount an NFS datastore, ESXi performs one of the following actions.
n
If ESXi is mounted on any NFS datastore, the IP address of the unmounted NFS server is removed from
the list of allowed outgoing IP addresses and the NFS Client rule set remains enabled.
If ESXi is not mounted on any NFS datastore, the IP address of the unmounted NFS server is removed
from the list of allowed outgoing IP addresses and the NFS Client rule set is disabled.
NOTE If you manually enable the NFS Client rule set or manually set the Allow All IP Addresses policy,
either before or after you add an NFS datastore to the system, your settings are overridden when the last
NFS datastore is unmounted. The NFS Client rule set is disabled when all NFS datastores are unmounted.
84
VMware, Inc.
Start automatically if any ports are open, and stop when all ports are closed: The default setting for
these services that VMware recommends. If any port is open, the client attempts to contact the network
resources pertinent to the service in question. If some ports are open, but the port for a particular
service is closed, the attempt fails, but there is little drawback to such a case. If and when the applicable
outgoing port is opened, the service begins completing its tasks.
Start and stop with host: The service starts shortly after the host starts and closes shortly before the
host shuts down. Much like Start automatically if any ports are open, and stop when all ports are
closed, this option means that the service regularly attempts to complete its tasks, such as contacting
the specified NTP server. If the port was closed but is subsequently opened, the client begins
completing its tasks shortly thereafter.
Start and stop manually: The host preserves the user-determined service settings, regardless of
whether ports are open or not. When a user starts the NTP service, that service is kept running as long
as the host is powered on. If the service is started and the host is powered off, the service is stopped as
part of the shutdown process, but as soon as the host is powered on, the service is started again,
preserving the user-determined state.
NOTE ESXi firewall automates when rule sets are enabled or disabled based on the service startup policy.
When a service starts, its corresponding rule set is enabled. When a service stops, the rule set is disabled.
VMware, Inc.
85
vSphere Security
Description
Set to true to set the default action to pass, set to fals to set
the default action to drop.
Set to true to allow all access to all IPs, set to false to use a
list of allowed IP addresses.
86
VMware, Inc.
Click OK.
If no permission is defined for the user on that object, the user is assigned the set of privileges assigned
to the groups for that object.
If a permission is defined for the user on that object, the user's permission takes precedence over all
group permissions.
Group A is granted Role 1 on VM Folder, with the permission set to propagate to child objects.
Group B is granted Role 2 on VM Folder, with the permission set to propagate to child objects.
User 1, who belongs to groups A and B, logs on. User 1 can both power on and take snapshots of VM A and
VM B.
Figure 71. Example 1: Inheritance of Multiple Permissions
group A + role 1
group B + role 2
VM Folder
VM A
VM B
VMware, Inc.
87
vSphere Security
Group A is granted Role 1 on VM Folder, with the permission set to propagate to child objects.
User 1, who belongs to groups A and B, logs on. Because Role 2 is assigned at a lower point in the hierarchy
than Role 1, it overrides Role 1 on VM B. User 1 can power on VM A, but not take snapshots. User 1 can take
snapshots of VM B, but not power it on.
Figure 72. Example 2: Child Permissions Overriding Parent Permissions
group A + role 1
VM Folder
VM A
group B + role 2
VM B
User 1, who belongs to group A, logs on. The No Access role granted to User 1 on VM Folder overrides the
group permission. User 1 has no access to VM Folder or VMs A and B.
Figure 73. Example 3: User Permissions Overriding Group Permissions
group A + role 1
user 1 + no access
VM Folder
VM A
VM B
88
VMware, Inc.
Create at least one named user account and assign it full administrative privileges and use this account
instead of the root account. Set a highly complex password for the root account and limit the use of the root
account. (Do not remove the root user itself.)
IMPORTANT If you remove the access permissions for the root user, you must first create another permission
at the root level that has a different user assigned to the Administrator role.
NOTE In vSphere 5.1 and later, only the root user and no other user with administrator privileges is
permitted to add a host to vCenter Server.
Assigning the Administrator role to a different user helps you maintain security through traceability. The
vSphere Client logs all actions that the Administrator role user initiates as events, providing you with an
audit trail. If all administrators log in as the root user, you cannot tell which administrator performed an
action. If you create multiple permissions at the root leveleach associated with a different useryou can
track the actions of each administrator.
vpxuser Permissions
The vpxuser permission is used for vCenter Server when managing activities for the host.
vCenter Server has Administrator privileges on the host that it manages. For example, vCenter Server can
move virtual machines to and from hosts and perform configuration changes needed to support virtual
machines.
The vCenter Server administrator can perform most of the same tasks on the host as the root user and also
schedule tasks, work with templates, and so forth. However, the vCenter Server administrator cannot
directly create, delete, or edit users and groups for hosts. These tasks can only be performed by a user with
Administrator permissions directly on each host.
NOTE You cannot manage the vpxuser using Active Directory.
CAUTION Do not change vpxuser in any way. Do not change its password. Do not change its permissions. If
you do so, you might experience problems when working with hosts through vCenter Server.
VMware, Inc.
89
vSphere Security
Procedure
1
To change the password length policy, edit the vpxd.hostPasswordLength parameter in the
vCenter Server configuration file on the system where vCenter Server is running.
Operating System
Default Location
Windows
Linux
/etc/vmware-vpx/vpxd.cfg
To change the password aging requirement, use the Advanced Settings dialog box in the
vSphere Web Client.
a
Browse to the vCenter Server system in the vSphere Web Client inventory.
90
Verify that you have an Active Directory domain. See your directory server documentation.
VMware, Inc.
Verify that the host name of ESXi is fully qualified with the domain name of the Active Directory forest.
fully qualified domain name = host_name.domain_name
Procedure
1
Synchronize the time between ESXi and the directory service system using NTP.
See GUID-B77341E3-9D7D-48B6-A221-B782C21AF98E#GUID-B77341E3-9D7D-48B6-A221B782C21AF98E or the VMware Knowledge Base for information about how to synchronize ESXi time
with a Microsoft Domain Controller.
Ensure that the DNS servers you configured for the host can resolve the host names for the Active
Directory controllers.
a
Click DNS, and verify that the host name and DNS server information for the host are correct.
What to do next
Use the vSphere Web Client to join a directory service domain.
name.tld (for example, domain.com): The account is created under the default container.
name.tld/container/path (for example, domain.com/OU1/OU2): The account is created under a particular
To use the vSphere Authentication Proxy service, see Use vSphere Authentication Proxy to Add a Host to a
Domain in the vSphere Web Client, on page 107.
Procedure
1
Enter a domain.
Use the form name.tld or name.tld/container/path.
Enter the user name and password of a directory service user who has permissions to join the host to
the domain, and click OK.
VMware, Inc.
91
vSphere Security
Replace a Default ESXi Certificate and Key from the ESXi Shell, on page 93
Replace a Default ESXi Certificate and Key by Using the vifs Command, on page 94
Replace a Default ESXi Certificate and Key Using HTTPS PUT, on page 95
If you accidentally deleted the default self-signed certificate and key or you changed the host name, you can
generate a new self-signed certificate and key from the ESXi Shell. See Generate New Self-Signed
Certificates for ESXi, on page 93.
92
Microsoft Visual C++ 2008 Redistributable Package (x86) installed on the system where you will
generate the certificate-signing request
OpenSSL 0.98r or higher installed on the system where you will generate the certificate-signing request
vCenter Server
VMware, Inc.
In the directory /etc/vmware/ssl, back up any existing certificates by renaming them using the
following commands.
mv rui.crt orig.rui.crt
mv rui.key orig.rui.key
NOTE If you are regenerating certificates because you have deleted them, this step is unnecessary.
3
Confirm that the host successfully generated new certificates by using the following command and
comparing the time stamps of the new certificate files with orig.rui.crt and orig.rui.key.
ls -la
What to do next
Consider replacing the self-signed certificate and key with a trusted certificate and key.
Replace a Default ESXi Certificate and Key from the ESXi Shell
ESXi uses automatically generated certificates that are created as part of the installation process. These
certificates are unique and make it possible to begin using the server, but they are not verifiable and they are
not signed by a trusted certificate authority (CA). This topic explains how to replace the default certificates
with self-signed or CA-signed certificates.
Using default certificates might not comply with the security policy of your organization. If you require a
certificate from a trusted certificate authority, you can replace the default certificate.
NOTE If the host has Verify Certificates enabled, replacing the default certificate might cause vCenter Server
to stop managing the host. Disconnect and reconnect the host if vCenter Server cannot verify the new
certificate.
ESXi supports only X.509 certificates to encrypt session information sent over SSL connections between
server and client components.
Prerequisites
n
VMware, Inc.
If you want to use CA-signed certificates, generate the certificate request, send it to the certificate
authority, and store the certificates you receive in a location that the host can access.
93
vSphere Security
If necessary, enable the ESXi Shell or enable SSH traffic from the vSphere Web Client. See Use the
vSphere Web Client to Enable Access to the ESXi Shell, on page 97.
All file transfers and other communications occur over a secure HTTPS session. The user who is used to
authenticate the session must have the privilege Host.Config.AdvancedConfig on the host. For more
information on ESXi privileges, see the vSphere Single Host Management publication.
Procedure
1
Log in to the ESXi Shell, either directly from the DCUI or from an SSH client, as a user with
administrator privileges.
In the directory /etc/vmware/ssl, rename the existing certificates using the following commands.
mv rui.crt orig.rui.crt
mv rui.key orig.rui.key
Replace a Default ESXi Certificate and Key by Using the vifs Command
ESXi uses automatically generated certificates that are created as part of the installation process. These
certificates are unique and make it possible to begin using the server, but they are not verifiable and they are
not signed by a trusted certificate authority (CA).
Using default certificates might not comply with the security policy of your organization. If you require a
certificate from a trusted certificate authority, you can replace the default certificate.
NOTE If the host has Verify Certificates enabled, replacing the default certificate might cause vCenter Server
to stop managing the host. Disconnect and reconnect the host if vCenter Server cannot verify the new
certificate.
ESXi supports only X.509 certificates to encrypt session information sent over SSL connections between
server and client components.
Prerequisites
All file transfers and other communications occur over a secure HTTPS session. The user who is used to
authenticate the session must have the privilege Host.Config.AdvancedConfig on the host. For more
information on ESXi privileges, see the vSphere Single Host Management publication.
Procedure
1
Generate a certificate request following the instructions from the certificate authority.
At the command line, use the vifs command to upload the certificate to the appropriate location on the
host.
vifs --server hostname --username username --put rui.crt /host/ssl_cert
vifs --server hostname --username username --put rui.key /host/ssl_key
94
VMware, Inc.
Description
Certificates
https://hostname/host/ssl_crt
Keys
https://hostname/host/ssl_key
The location /host/ssl_cert and host/ssl_key link to the certificate files in /etc/vmware/ssl.
3
In the Direct Console User Interface (DCUI), use the Restart Management Agents operation to initiate
the settings.
DSA key
RSA key
VMware, Inc.
95
vSphere Security
At the command line, use the vifs command to upload the SSH key to appropriate location.
vifs --server hostname --username username --put filename /host/ssh_host_dsa_key_pub
Type of key
Location
/host/ssh_root_authorized keys
You must have full administrator privileges to upload this file.
DSA keys
/host/ssh_host_dsa_key
/host/ssh_host_dsa_key_pub
RSA keys
/host/ssh_host_rsa_key
/host/ssh_host_rsa_key_pub
DSA key
RSA key
96
Location
https://hostname or IP address/host/ssh_root_authorized
keys
You must have full administrator privileges on the host to upload this file.
DSA keys
https://hostname or IP address/host/ssh_host_dsa_key
https://hostname or ip/host/ssh_host_dsa_key_pub
RSA keys
https://hostname or ip/host/ssh_host_rsa_key
https://hostname or ip/host/ssh_host_rsa_key_pub
VMware, Inc.
SSH
Enable this service to access the ESXi Shell remotely using SSH.
Direct Console UI
(DCUI)
When you enable this service while running in lockdown mode, you can log
in locally to the direct console user interface as the root user and disable
lockdown mode. You can then access the host using a direct connection to
the vSphere Client or by enabling the ESXi Shell.
The root user and users with the Administrator role can access the ESXi Shell. Users who are in the Active
Directory group ESX Admins are automatically assigned the Administrator role. By default, only the root
user can execute system commands (such as vmware -v) using the ESXi Shell.
NOTE Do not enable the ESXi Shell until it is required.
n
Use the vSphere Web Client to Enable Access to the ESXi Shell on page 97
You can use the vSphere Web Client to enable local and remote (SSH) access to the ESXi Shell and to
set the idle timeout and availability timeout.
Use the Direct Console User Interface (DCUI) to Enable Access to the ESXi Shell on page 99
The Direct Console User Interface (DCUI) allows you to interact with the host locally using text-based
menus. Evaluate carefully whether the security requirements of your environment support enabling
the Direct Console User Interface.
Use the vSphere Web Client to Enable Access to the ESXi Shell
You can use the vSphere Web Client to enable local and remote (SSH) access to the ESXi Shell and to set the
idle timeout and availability timeout.
NOTE Access the host by using the vSphere Web Client, remote command-line tools (vCLI and PowerCLI),
and published APIs. Do not enable remote access to the host using SSH unless special circumstances require
that you enable SSH access.
Prerequisites
If you want to use an authorized SSH key, you can upload it. See Uploading an SSH Key to Your ESXi
Host, on page 95.
Procedure
1
VMware, Inc.
97
vSphere Security
ESXi Shell
SSH
Direct Console UI
Click Service Details and select the startup policy Start and stop manually.
When you select Start and stop manually, the service does not start when you reboot the host. If you
want the service to start when you reboot the host, select Start and stop with host.
Click OK.
What to do next
Set the availability and idle timeouts for the ESXi Shell. See Create a Timeout for ESXi Shell Availability in
the vSphere Web Client, on page 98 and Create a Timeout for Idle ESXi Shell Sessions in the vSphere
Web Client, on page 98
Create a Timeout for ESXi Shell Availability in the vSphere Web Client
The ESXi Shell is disabled by default. You can set an availability timeout for the ESXi Shell to increase
security when you enable the shell.
The availability timeout setting is the amount of time that can elapse before you must log in after the
ESXi Shell is enabled. After the timeout period, the service is disabled and users are not allowed to log in.
Procedure
1
Click OK.
If you are logged in when the timeout period elapses, your session will persist. However, after you log out
or your session is terminated, users are not allowed to log in.
Create a Timeout for Idle ESXi Shell Sessions in the vSphere Web Client
If a user enables the ESXi Shell on a host, but forgets to log out of the session, the idle session remains
connected indefinitely. The open connection can increase the potential for someone to gain privileged access
to the host. You can prevent this by setting a timeout for idle sessions.
The idle timeout is the amount of time that can elapse before a user is logged out of an idle interactive
session. You can control the amount of time for both local and remote (SSH) session from the Direct Console
Interface (DCUI) or from the vSphere Web Client.
98
VMware, Inc.
Procedure
1
Select UserVars.ESXiShellInteractiveTimeOut, click the Edit icon, and enter the timeout setting.
Restart the ESXi Shell service and the SSH service for the timeout to take effect.
If the session is idle, users are logged out after the timeout period elapses.
Use the Direct Console User Interface (DCUI) to Enable Access to the
ESXi Shell
The Direct Console User Interface (DCUI) allows you to interact with the host locally using text-based
menus. Evaluate carefully whether the security requirements of your environment support enabling the
Direct Console User Interface.
You can use the Direct Console User Interface to enable local and remote access to the ESXi Shell.
NOTE Changes made to the host using the Direct Console User Interface, the vSphere Web Client, ESXCLI,
or other administrative tools are committed to permanent storage every hour or upon graceful shutdown.
Changes might be lost if the host fails before they are committed.
Procedure
1
From the Direct Console User Interface, press F2 to access the System Customization menu.
Enable SSH
Press Esc until you return to the main menu of the Direct Console User Interface.
What to do next
Set the availability and idle timeouts for the ESXi Shell. See Create a Timeout for ESXi Shell Availability in
the Direct Console User Interface, on page 99 and Create a Timeout for Idle ESXi Shell Sessions, on
page 100.
Create a Timeout for ESXi Shell Availability in the Direct Console User Interface
The ESXi Shell is disabled by default. You can set an availability timeout for the ESXi Shell to increase
security when you enable the shell.
The availability timeout setting is the amount of time that can elapse before you must log in after the
ESXi Shell is enabled. After the timeout period, the service is disabled and users are not allowed to log in.
Procedure
1
From the Troubleshooting Mode Options menu, select Modify ESXi Shell and SSH timeouts and press
Enter.
VMware, Inc.
99
vSphere Security
Press Enter and press Esc until you return to the main menu of the Direct Console User Interface.
Click OK.
If you are logged in when the timeout period elapses, your session will persist. However, after you log out
or your session is terminated, users are not allowed to log in.
From the Troubleshooting Mode Options menu, select Modify ESXi Shell and SSH timeouts and press
Enter.
Press Enter and press Esc until you return to the main menu of the Direct Console User Interface.
If the session is idle, users are logged out after the timeout period elapses.
100
If you have direct access to the host, press Alt+F1 to open the login page on the machine's physical
console.
If you are connecting to the host remotely, use SSH or another remote console connection to start a
session on the host.
VMware, Inc.
SSH Security
You can use SSH to remotely log in to the ESXi Shell and perform troubleshooting tasks for the host.
SSH configuration in ESXi is enhanced to provide a high security level.
Version 1 SSH protocol
disabled
VMware does not support Version 1 SSH protocol and uses Version 2
protocol exclusively. Version 2 eliminates certain security problems present
in Version 1 and provides you with a safe way to communicate with the
management interface.
Improved cipher
strength
SSH supports only 256-bit and 128-bit AES ciphers for your connections.
These settings are designed to provide solid protection for the data you transmit to the management
interface through SSH. You cannot change these settings.
Lockdown Mode
To increase the security of your ESXi hosts, you can put them in lockdown mode. In lockdown mode, all
operations must be performed through vCenter Server. Only the vpxuser user has authentication
permissions, no other users can perform operations against the host directly.
When a host is in lockdown mode, you cannot run vSphere CLI commands from an administration server,
from a script, or from vMA against the host. External software or management tools might not be able to
retrieve or modify information from the ESXi host.
NOTE Users can be assigned DCUI access privileges explicitly via the DCUI Access advanced configuration
option. The option has DCUI.Access as the key, and a comma-separated list of ESXi users as the value. Users
in the list which can access the DCUI at any time, even if these users are not administrators (Admin role),
and even when the host is in lockdown mode.
Enabling or disabling lockdown mode affects which types of users are authorized to access host services,
but it does not affect the availability of those services. In other words, if the ESXi Shell, SSH, or Direct
Console User Interface (DCUI) services are enabled, they will continue to run whether or not the host is in
lockdown mode.
You can enable lockdown mode using the Add Host wizard to add a host to vCenter Server, using the
vSphere Web Client to manage a host, or using the Direct Console User Interface (DCUI).
NOTE If you enable or disable lockdown mode using the Direct Console User Interface (DCUI), permissions
for users and groups on the host are discarded. To preserve these permissions, you must enable and disable
lockdown mode using the vSphere Web Client connected to vCenter Server.
Lockdown mode is available only on ESXi hosts that have been added to vCenter Server.
VMware, Inc.
101
vSphere Security
Normal Mode
Lockdown Mode
CIM Providers
Root users
ESXi Shell
No users
SSH
No users
102
Click OK.
VMware, Inc.
At the Direct Console User Interface of the host, press F2 and log in.
Press Esc until you return to the main menu of the Direct Console User Interface.
Click OK.
VMware, Inc.
103
vSphere Security
The vSphere Authentication Proxy service binds to an IPv4 address for communication with vCenter Server,
and does not support IPv6. vCenter Server can be on an IPv4-only, IPv4/IPv6 mixed-mode, or IPv6-only
host machine, but the machine that connects to vCenter Server through the vSphere Client must have an
IPv4 address for the vSphere Authentication Proxy service to work.
Prerequisites
n
Verify that you have administrator privileges on the host machine where you install the vSphere
Authentication Proxy service.
Verify that the host machine has Windows Installer 3.0 or later.
Verify that the host machine has a supported processor and operating system. The vSphere
Authentication Proxy supports the same processors and operating systems as vCenter Server.
Verify that the host machine has a valid IPv4 address. You can install vSphere Authentication Proxy on
an IPv4-only or IPv4/IPv6 mixed-mode host machine, but you cannot install vSphere Authentication
Proxy on an IPv6-only host machine.
If you are installing vSphere Authentication Proxy on a Windows Server 2008 R2 host machine,
download and install the Windows hotfix described in Windows KB Article 981506 on the
support.microsoft.com Web site. If this hotfix is not installed, the Authentication Proxy Adapter fails to
initialize. This problem is accompanied by error messages in camadapter.log similar to Failed to bind
CAM website with CTL and Failed to initialize CAMAdapter.
The location where you will install the vSphere Authentication Proxy, if you are not using the default
location.
The IP address or host name, HTTP port, and credentials for the vCenter Server system that the vSphere
Authentication Proxy will connect to.
The host name or IP address to identify the vSphere Authentication Proxy host machine on the
network.
Procedure
1
On the host machine where you will install the vSphere Authentication Proxy service, install the .NET
Framework 3.5.
Add the host machine where you will install the authentication proxy service to the domain.
In the software installer directory, double-click the autorun.exe file to start the installer.
104
VMware, Inc.
What to do next
Configure the host to use the authentication proxy service to join the domain.
Use the IIS manager on the host to set up the DHCP range.
Setting the range allows hosts that are using DHCP in the management network to use the
authentication proxy service.
Option
Action
For IIS 6
a
b
c
For IIS 7
a
b
VMware, Inc.
If a host is not provisioned by Auto Deploy, change the default SSL certificate to a self-signed certificate
or to a certificate signed by a commercial certificate authority (CA).
Option
Description
Self-signed certificate
If you replace the default certificate with a self-signed certificate, add the
host to vCenter Server so that the authentication proxy server will trust the
host.
CA-signed certificate
105
vSphere Security
On the authentication proxy server system, use the IIS Manager to export the certificate.
Option
Action
For IIS 6
a
b
For IIS 7
a
b
c
d
Select the options Do Not Export the Private Key and Base-64 encoded X.509 (CER).
What to do next
Import the certificate to ESXi.
106
VMware, Inc.
Export the vSphere Authentication Proxy server certificate as described in Export vSphere Authentication
Proxy Certificate, on page 106.
Procedure
1
Upload the certificate for the authentication proxy server to a temporary location accessible to the host.
a
In the vSphere Web Client, browse to a datastore accessible to the host and click the Manage tab.
Enter the full path to the authentication proxy server certificate file on the host and the IP address of the
authentication proxy server.
Use the form [datastore name] file path to enter the path to the proxy server.
Click Import.
What to do next
Set up the host to use vSphere Authentication Proxy server to authenticate users.
name.tld (for example, domain.com): The account is created under the default container.
name.tld/container/path (for example, domain.com/OU1/OU2): The account is created under a particular
If ESXi is configured with a static IP address, verify that its associated profile is configured to use the
vSphere Authentication Proxy service to join a domain so that the authentication proxy server can trust
the ESXi IP address.
If ESXi is using a self-signed certificate, verify that the host has been added to vCenter Server. This
allows the authentication proxy server to trust ESXi.
If ESXi is using a CA-signed certificate and is not provisioned by Auto Deploy, verify that the CA
certificate has been added to the local trust certificate store of the authentication proxy server as
described in Configure a Host to Use the vSphere Authentication Proxy for Authentication, on
page 105.
VMware, Inc.
107
vSphere Security
Procedure
1
Browse to the host in the vSphere Web Client and click the Manage tab.
Enter a domain.
Use the form name.tld or name.tld/container/path.
Click OK.
Procedure
1
Enter the SSL certificate path and the vSphere Authentication Proxy server.
Do not set up certificates using a password or pass phrases. ESXi does not support passwords or pass
phrases, also known as encrypted keys. If you set up a pass word or pass phrase, ESXi processes cannot
start correctly.
You can configure the Web proxy so that it searches for certificates in a location other than the default
location. This capability proves useful for companies that prefer to centralize their certificates on a
single machine so that multiple hosts can use the certificates.
CAUTION If certificates are not stored locally on the hostfor example, if they are stored on an NFS
sharethe host cannot access those certificates if ESXi loses network connectivity. As a result, a client
connecting to the host cannot successfully participate in a secure SSL handshake with the host.
To support encryption for user names, passwords, and packets, SSL is enabled by default for vSphere
Web services SDK connections. If you want to configure the these connections so that they do not
encrypt transmissions, disable SSL for your vSphere Web Services SDK connection by switching the
connection from HTTPS to HTTP.
Consider disabling SSL only if you created a fully trusted environment for these clients, where firewalls
are in place and transmissions to and from the host are fully isolated. Disabling SSL can improve
performance, because you avoid the overhead required to perform encryption.
108
VMware, Inc.
To protect against misuse of ESXi services, most internal ESXi services are accessible only through port
443, the port used for HTTPS transmission. Port 443 acts as a reverse proxy for ESXi. You can see a list
of services on ESXi through an HTTP welcome page, but you cannot directly access the Storage
Adapters services without proper authorization.
You can change this configuration so that individual services are directly accessible through HTTP
connections. Do not make this change unless you are using ESXi in a fully trusted environment.
Use a text editor to open the config.xml file and find the following XML segment.
<ssl>
<!-- The server private key file -->
<privateKey>/etc/vmware/ssl/rui.key</privateKey>
<!-- The server side certificate file -->
<certificate>/etc/vmware/ssl/rui.crt</certificate>
</ssl>
Replace /etc/vmware/ssl/rui.key with the absolute path to the private key file that you received from
your trusted certificate authority.
This path can be on the host or on a centralized machine on which you store certificates and keys for
your company.
NOTE Leave the <privateKey> and </privateKey> XML tags in place.
Replace /etc/vmware/ssl/rui.crt with the absolute path to the certificate file that you received from
your trusted certificate authority.
CAUTION Do not delete the original rui.key and rui.crt files. The host uses these files.
VMware, Inc.
109
vSphere Security
Description
connection-type
endpoint-address
n
n
n
What to do next
After you make the changes to the endpoints.conf file, make the reverse proxy reload the new endpoints by
using the command kill -HUP <pid_of_rhttpproxy>
110
VMware, Inc.
Change Security Settings for a Web Proxy Service 5.0 and earlier
You can change the security configuration so that individual services are directly accessible through HTTP
connections.
These steps are for version 5.0 and earlier. Beginning with 5.1, the file that needs to be modified is
completely different. For instructions to modify the new file, see Change Security Settings for a Web Proxy
Service, on page 109.
Procedure
1
VMware, Inc.
111
vSphere Security
<serverNamespace>/sdk</serverNamespace>
</e>
<e id="6">
<_type>vim.ProxyService.NamedPipeTunnelSpec</_type>
<accessMode>httpOnly</accessMode>
<pipeName>/var/run/vmware/proxy-sdk-tunnel</pipeName>
<serverNamespace>/sdkTunnel</serverNamespace>
</e>
<e id="7">
<_type>vim.ProxyService.LocalServiceSpec</_type>
<accessMode>httpsWithRedirect</accessMode>
<port>8308</port>
<serverNamespace>/ui</serverNamespace>
</e>
<e id="8">
<_type>vim.ProxyService.LocalServiceSpec</_type>
<accessMode>httpsOnly</accessMode>
<port>8089</port>
<serverNamespace>/vpxa</serverNamespace>
</e>
<e id="9">
<_type>vim.ProxyService.LocalServiceSpec</_type>
<accessMode>httpsWithRedirect</accessMode>
<port>8889</port>
<serverNamespace>/wsman</serverNamespace>
</e>
</EndpointList>
</ConfigRoot>
Description
e id
ID number for the server ID XML tag. ID numbers must be unique within
the HTTP area.
_type
accessmode
port
Port number assigned to the service. You can assign a different port
number to the service.
serverNamespace
Namespace for the server that provides this service, for example /sdk
or /mob.
112
VMware, Inc.
Networking Security
Secure your network as you would for any other PXE-based deployment method. vSphere Auto Deploy
transfers data over SSL to prevent casual interference and snooping. However, the authenticity of the client
or of the Auto Deploy server is not checked during a PXE boot.
You can greatly reduce the security risk of Auto Deploy by completely isolating the network where Auto
Deploy is used.
The VIB packages that the image profile consists of are always included in the boot image.
The host profile and host customization are included in the boot image if Auto Deploy rules are set up
to provision the host with a host profile or a host customization setting.
n
The administrator (root) password and user passwords that are included with host profile and host
customization are MD5 encrypted.
Any other passwords associated with profiles are in the clear. If you set up Active Directory by
using host profiles, the passwords are not protected.
Use the vSphere Authentication Service for setting up Active Directory to avoid exposing the
Active Directory passwords. If you set up Active Directory using host profiles, the passwords are
not protected.
The host's public and private SSL key and certificate are included in the boot image.
Configure persistent logging to a datastore. By default, the logs on ESXi hosts are stored in the inmemory file system. Therefore, they are lost when you reboot the host, and only 24 hours of log data is
stored. When you enable persistent logging, you have a dedicated record of server activity available for
the host.
Remote logging to a central host allows you to gather log files onto a central host, where you can
monitor all hosts with a single tool. You can also do aggregate analysis and searching of log data, which
might reveal information about things like coordinated attacks on multiple hosts.
Configure remote secure syslog on ESXi hosts using a remote command line such as vCLI or PowerCLI,
or using an API client.
Query the syslog configuration to make sure that a valid syslog server has been configured, including
the correct port.
VMware, Inc.
113
vSphere Security
To set up logging globally, select the setting to change and click the Edit icon.
Option
Description
Syslog.global.defaultRotate
Sets the maximum number of archives to keep. You can set this number
globally and for individual subloggers.
Syslog.global.defaultSize
Sets the default size of the log, in KB, before the system rotates logs. You
can set this number globally and for individual subloggers.
Syslog.global.LogDir
Directory where logs are stored. The directory can be located on mounted
NFS or VMFS volumes. Only the /scratch directory on the local file
system is persistent across reboots. The directory should be specified as
[datastorename] path_to_file where the path is relative to the root of the
volume backing the datastore. For example, the path
[storage1] /systemlogs maps to the
path /vmfs/volumes/storage1/systemlogs.
Syslog.global.logDirUnique
Selecting this option creates a subdirectory with the name of the ESXi host
under the directory specified by Syslog.global.LogDir. A unique directory
is useful if the same NFS directory is used by multiple ESXi hosts.
Syslog.global.LogHost
Remote host to which syslog messages are forwarded and port on which
the remote host receives syslog messages. You can include the protocol
and the port, for example, ssl://hostName1:514. UDP (default), TCP,
and SSL are supported. The remote host must have syslog installed and
correctly configured to receive the forwarded syslog messages. See the
documentation for the syslog service installed on the remote host for
information on configuration.
(Optional) To overwrite the default log size and log rotation for any of the logs.
a
Click the Edit icon and enter the number of rotations and log size you want.
Click OK.
114
VMware, Inc.
Location
Purpose
VMkernel
/var/log/vmkernel.log
VMkernel warnings
/var/log/vmkwarning.log
VMkernel summary
/var/log/vmksummary.log
/var/log/hostd.log
/var/log/vpxa.log
Shell log
/var/log/vpxa.log
Authentication
/var/log/auth.log
System messages
/var/log/syslog.log
Virtual machines
VMware, Inc.
115
vSphere Security
116
VMware, Inc.
The guest operating system that runs in the virtual machine is subject to the same security risks as a physical
system. Secure virtual machines as you would secure physical machines.
This chapter includes the following topics:
n
Limit Informational Messages from Virtual Machines to VMX Files, on page 124
Prevent Virtual Disk Shrinking in the vSphere Web Client, on page 124
Configuring Logging Levels for the Guest Operating System, on page 125
VMware, Inc.
117
vSphere Security
Disconnect unused physical devices, such as CD/DVD drives, floppy drives, and USB adaptors.
See Removing Unnecessary Hardware Devices, on page 118.
Do not run the X Window system on Linux, BSD, or Solaris guest operating systems unless it is
necessary.
118
Ensure that unauthorized devices are not connected and remove any unneeded or unused hardware
devices.
Disable unnecessary virtual devices from within a virtual machine. An attacker with access to a virtual
machine can connect a disconnected CD-ROM drive and access sensitive information on the media left
in the drive, or disconnect a network adapter to isolate the virtual machine from its network, resulting
in a denial of service.
VMware, Inc.
Ensure that no device is connected to a virtual machine if it is not required. Serial and parallel ports are
rarely used for virtual machines in a datacenter environment, and CD/DVD drives are usually
connected only temporarily during software installation.
For less commonly used devices that are not required, either the parameter should not be present or its
value must be false. Ensure that the following parameters are either not present or set to false unless the
device is required.
Parameter
Value
Device
floppyX.present
false
floppy drives
serialX.present
false
serial ports
parallelX.present
false
parallel ports
usb.present
false
USB controller
ideX:Y.present
false
CD-ROM
To find a virtual machine, select a datacenter, folder, cluster, resource pool, or host.
Select VM Options.
VMware, Inc.
Name
Value
isolation.tools.unity.push.update.di
sable
TRUE
isolation.tools.ghi.launchmenu.cha
nge
TRUE
isolation.tools.memSchedFakeSam
pleStats.disable
TRUE
isolation.tools.getCreds.disable
TRUE
isolation.tools.ghi.autologon.disabl
e
TRUE
isolation.bios.bbs.disable
TRUE
isolation.tools.hgfsServerSet.disabl
e
TRUE
Click OK.
119
vSphere Security
Disable Copy and Paste Operations Between Guest Operating System and
Remote Console
Copy and paste operations between the guest operating system and remote console are disabled by default.
For a secure environment, retain the default setting. If you require copy and paste operations, you must
enable them using the vSphere Client.
Prerequisites
Turn off the virtual machine.
Procedure
1
Log into a vCenter Server system using the vSphere Web Client.
Ensure that the following values are in the Name and Value columns, or click Add Row to add them.
Name
Value
isolation.tools.copy.disable
true
isolation.tools.paste.disable
true
These options override any settings made in the guest operating systems VMware Tools control panel.
5
Click OK.
(Optional) If you made changes to the configuration parameters, restart the virtual machine.
120
VMware, Inc.
For example, a configuration might include a virtual machine on the infrastructure that has sensitive
information on it. Tasks such as migration with vMotion and Storage vMotion require that the IT role has
access to the virtual machine. In this case, you want to disable some remote operations within a guest OS to
ensure that the IT role cannot access the sensitive information.
Prerequisites
Verify that you have Administrator privileges on the vCenter Server system where you create the role.
Procedure
1
Log in to the vSphere Web Client as a user who has Administrator privileges on the vCenter Server
system where you will create the role.
Click the Create role icon and type a name for the role.
For example, type Administrator No Guest Access.
Deselect All Privileges.Virtual machine.Guest Operations to remove the Guest Operations set of
privileges.
Click OK.
What to do next
Assign users who require Administrator privileges without guest access privileges to the newly created
role, ensuring that these users are removed from the default Administrator role.
To find a virtual machine, select a datacenter, folder, cluster, resource pool, or host.
VMware, Inc.
121
vSphere Security
Verify that the following values are in the Name and Value columns, or click Add Row to add them.
Name
Value
isolation.device.connectable.disabl
e
true
isolation.device.edit.disable
true
These options override any settings made in the guest operating system's VMware Tools control panel.
5
Click OK to close the Configuration Parameters dialog box, and click OK again to close the Virtual
Machine Properties dialog box.
Modify Guest Operating System Variable Memory Limit in the vSphere Web Client
You can increase the guest operating system variable memory limit if large amounts of custom information
are being stored in the configuration file.
Prerequisites
Turn off the virtual machine.
Procedure
1
To find a virtual machine, select a datacenter, folder, cluster, resource pool, or host.
Add or edit the parameter tools.setInfo.sizeLimit and set the value to the number of bytes.
Click OK.
122
VMware, Inc.
Procedure
1
Select Options > Advanced > General and click Configuration Parameters.
Click Add Row and type the following values in the Name and Value columns.
Click OK to close the Configuration Parameters dialog box, and click OK again to close the Virtual
Machine Properties dialog box.
Provide templates for virtual machine creation that contain hardened, patched, and properly
configured operating system deployments.
If possible, deploy applications in templates as well. Ensure that the applications do not depend on
information specific to the virtual machine to be deployed.
What to do next
You can convert a template to a virtual machine and back to a template in the vSphere Web Client, which
makes updating templates easy. For more information about templates, see the vSphere Virtual Machine
Administration documentation.
You can use vSphere Update Manager to automatically patch the operating system and certain applications
in the template. See the vSphere Update Manager documentation.
VMware, Inc.
123
vSphere Security
What to do next
See the vSphere Resource Management documentation for information about shares and limits.
On the ESXi system that hosts the virtual machine, browse to the VMX file.
Virtual machine configuration files are located in the /vmfs/volumes/datastore directory, where
datastore is the name of the storage device on which the virtual machine files reside. For
example, /vmfs/volumes/vol1/vm-finance/.
Use a text editor to add or edit the following line in the VMX file:
tools.setInfo.sizeLimit=104857
124
To find a virtual machine, select a datacenter, folder, cluster, resource pool, or host.
Select VM Options.
Value
isolation.tools.diskWiper.disable
TRUE
isolation.tools.diskShrink.disable
TRUE
VMware, Inc.
Click OK.
When you disable this feature, you cannot shrink virtual machine disks when a datastore runs out of space.
Use native remote management services, such as terminal services and SSH, to interact with virtual
machines.
Grant access to the virtual machine console only when necessary.
To find a virtual machine, select a datacenter, folder, cluster, resource pool, or host.
Select VM Options.
VMware, Inc.
125
vSphere Security
Add or edit the log.keepOld parameter to the number of files to keep. For example, to keep 10 log files
and begin deleting the oldest files as new ones are created, enter 10.
Click OK.
Disable Logging for the Guest Operating System in the vSphere Web Client
If you choose not to write troubleshooting information into a virtual machine log file stored on the VMFS
volume, you can stop logging altogether.
If you disable logging for the guest operating system, be aware that you might not be able to gather
adequate logs to allow troubleshooting. Further, VMware does not offer technical support for virtual
machine problems if logging has been disabled.
Procedure
1
126
To find a virtual machine, select a datacenter, folder, cluster, resource pool, or host.
Click OK.
VMware, Inc.
Securing vSphere Networking is an essential part of protecting your environment. You secure different
vSphere components in different ways. See the vSphere Networking documentation for detailed information
about networking in the vSphere environment.
This chapter includes the following topics:
n
Use Virtual Switches on the vSphere Network Appliance Only If Required, on page 144
Firewalls
Add firewall protection to your virtual network by installing and configuring host-based firewalls on some
or all of its virtual machines.
For efficiency, you can set up private virtual machine Ethernet networks or virtual networks. With virtual
networks, you install a host-based firewall on a virtual machine at the head of the virtual network. This
firewall serves as a protective buffer between the physical network adapter and the remaining virtual
machines in the virtual network.
Because host-based firewalls can slow performance, balance your security needs against performance goals
before you install host-based firewalls on virtual machines elsewhere in the virtual network.
See Securing the Network with Firewalls, on page 128.
VMware, Inc.
127
vSphere Security
Segmentation
Keep different virtual machine zones within a host on different network segments. If you isolate each virtual
machine zone on its own network segment, you minimize the risk of data leakage from one virtual machine
zone to the next. Segmentation prevents various threats, including Address Resolution Protocol (ARP)
spoofing, in which an attacker manipulates the ARP table to remap MAC and IP addresses, thereby gaining
access to network traffic to and from a host. Attackers use ARP spoofing to generate man in the middle
(MITM) attacks, perform denial of service (DoS) attacks, hijack the target system, and otherwise disrupt the
virtual network.
Planning segmentation carefully lowers the chances of packet transmissions between virtual machine zones,
which prevents sniffing attacks that require sending network traffic to the victim. Also, an attacker cannot
use an insecure service in one virtual machine zone to access other virtual machine zones in the host. You
can implement segmentation by using either of two approaches. Each approach has different benefits.
n
Use separate physical network adapters for virtual machine zones to ensure that the zones are isolated.
Maintaining separate physical network adapters for virtual machine zones is probably the most secure
method and is less prone to misconfiguration after the initial segment creation.
Set up virtual local area networks (VLANs) to help safeguard your network. Because VLANs provide
almost all of the security benefits inherent in implementing physically separate networks without the
hardware overhead, they offer a viable solution that can save you the cost of deploying and
maintaining additional devices, cabling, and so forth. See Securing Virtual Machines with VLANs, on
page 136.
128
Firewalls between physical machines such as vCenter Server systems and ESXi hosts.
Firewalls between one virtual machine and anotherfor example, between a virtual machine acting as
an external Web server and a virtual machine connected to your companys internal network.
VMware, Inc.
Firewalls between a physical machine and a virtual machine, such as when you place a firewall
between a physical network adapter card and a virtual machine.
How you use firewalls in your ESXi configuration is based on how you plan to use the network and how
secure any given component needs to be. For example, if you create a virtual network where each virtual
machine is dedicated to running a different benchmark test suite for the same department, the risk of
unwanted access from one virtual machine to the next is minimal. Therefore, a configuration where firewalls
are present between the virtual machines is not necessary. However, to prevent interruption of a test run
from an outside host, you might set up the configuration so that a firewall is present at the entry point of the
virtual network to protect the entire set of virtual machines.
Between the vSphere Web Client or a third-party network-management client and vCenter Server.
If your users access virtual machines through a Web browser, between the Web browser and the ESXi
host.
If your users access virtual machines through the vSphere Web Client, between the vSphere Web Client
and the ESXi host. This connection is in addition to the connection between the vSphere Web Client and
vCenter Server, and it requires a different port.
Between the ESXi hosts in your network. Although traffic between hosts is usually considered trusted,
you can add firewalls between them if you are concerned about security breaches from machine to
machine.
If you add firewalls between ESXi hosts and plan to migrate virtual machines between the servers,
perform cloning, or use vMotion, you must also open ports in any firewall that divides the source host
from the target hosts so that the source and targets can communicate.
VMware, Inc.
Between the ESXi hosts and network storage such as NFS or iSCSI storage. These ports are not specific
to VMware, and you configure them according to the specifications for your network.
129
vSphere Security
As you would for configurations that include vCenter Server, be sure a firewall is present to protect
your ESXi layer or, depending on your configuration, your clients and ESXi layer. This firewall
provides basic protection for your network. The firewall ports you use are the same as those you use if
vCenter Server is in place.
Licensing in this type of configuration is part of the ESXi package that you install on each of the hosts.
Because licensing is resident to the server, a separate license server is not required. This eliminates the
need for a firewall between the license server and the ESXi network.
130
VMware, Inc.
The vSphere Web Client uses port 9443 for HTTPS communication with
vCenter Server and port 9090 for HTTP communication with vCenter Server.
Once users can accessvCenter Server, they can also access individual ESXi
hosts and virtual machines.
These ports can be changed during vSphere Web Client installation.
Open ports 443 and 902 in the firewall to allow data transfer to ESXi hosts
from vCenter Server if you have a firewall between your vCenter Server
system and the ESXi host managed by vCenter Server.
Figure 91. Port Use for vSphere Web Client Communications with an ESXi Host Managed by
vCenter Server
vSphere Web Client
virtual machine
management functions
virtual machine
console
firewall
Port 443/9443
Port 902/9090
ESXi
vmware-hostd
vmware-authd
For additional information on configuring the ports, see the firewall system administrator.
Port 443 connects clients such as the vSphere Web Services SDK to ESXi
through the Tomcat Web service or the SDK. The host process multiplexes
port 443 data to the appropriate recipient for processing.
When the vSphere SDK is connected directly to ESXi, it can use this port to
support any management functions related to the host and its virtual
machines. Port 443 is the port that clients such as the vSphere SDK assume is
available when sending data to ESXi. VMware does not support configuring
a different port for these connections.
Port 902
This is the port that vCenter Server assumes is available for receiving data
from ESXi.
Port 902 connects vCenter Server to the host through the VMware
Authorization Daemon (vmware-authd). This daemon multiplexes port 902
data to the appropriate recipient for processing. VMware does not support
configuring a different port for this connection.
VMware, Inc.
131
vSphere Security
Port 902
132
Port
Purpose
80 (Default)
HTTP access
vCenter Server requires port 80 for direct HTTP connections. Port 80 redirects requests to HTTPS
port 443. This redirection is useful if you accidentally use http://server instead of https://server
WS-Management (also requires port 443 to be open)
88, 2013
123
NTP Client
161 (Default)
SNMP Server
443 (Default)
The vCenter Server system uses port 443 to monitor data transfer from SDK clients.
This port is also used for the following services:
n WS-Management (also requires port 80 to be open)
n Third-party network management client connections to vCenter Server
n Third-party network management clients access to hosts
902 (Default)
The default port that the vCenter Server system uses to send data to managed hosts. Managed hosts
also send a regular heartbeat over UDP port 902 to the vCenter Server system. This port must not
be blocked by firewalls between the server and the hosts or between hosts.
903
1234, 1235
(Default)
vSphere Replication
2012
2014
2049
3260
5900-5964
7444
8000 (Default)
8182
VMware, Inc.
Purpose
9090
Used to allow a vCenter Server Appliance to communicate with the vSphere Web Client Remote
console traffic generated by user access to virtual machines on a specific host.
vSphere Web Client HTTPS access to virtual machine consoles
9443
11711
11712
12721
In addition to the TCP and UDP ports, you can configure other ports depending on your needs.
Log in to the physical switch and ensure that spanning tree protocol is disabled or that Port Fast is
configured for all physical switch ports that are connected to ESXi hosts.
For virtual machines that perform bridging or routing, check periodically that the first upstream
physical switch port is configured with BPDU Guard and Port Fast disabled and with spanning tree
protocol enabled.
In vSphere 5.1 and later, to prevent the physical switch from potential Denial of Service (DoS) attacks,
you can turn on the guest BPDU filter on the ESXi hosts.
Log in to the physical switch and ensure that Dynamic Trunking Protocol (DTP) is not enabled on the
physical switch ports that are connected to the ESXi hosts.
Routinely check physical switch ports to ensure that they are properly configured as trunk ports if
connected to virtual switch VLAN trunking ports.
VMware, Inc.
133
vSphere Security
The security policy determines how strongly you enforce protection against impersonation and interception
attacks on virtual machines. To correctly use the settings in the security profile, you must understand how
virtual machine network adapters control transmissions and how attacks are staged at this level. See the
Security Policy section in the vSphere Networking publication.
.
The initial MAC address is assigned when the adapter is created. Although
the initial MAC address can be reconfigured from outside the guest
operating system, it cannot be changed by the guest operating system.
Each adapter has an effective MAC address that filters out incoming network
traffic with a destination MAC address that is different from the effective
MAC address. The guest operating system is responsible for setting the
effective MAC address and typically matches the effective MAC address to
the initial MAC address.
Upon creating a virtual machine network adapter, the effective MAC address and initial MAC address are
the same. The guest operating system can alter the effective MAC address to another value at any time. If an
operating system changes the effective MAC address, its network adapter receives network traffic that is
destined for the new MAC address.
When sending packets through a network adapter, the guest operating system typically places its own
adapter effective MAC address in the source MAC address field of the Ethernet frames. It places the MAC
address for the receiving network adapter in the destination MAC address field. The receiving adapter
accepts packets only if the destination MAC address in the packet matches its own effective MAC address.
An operating system can send frames with an impersonated source MAC address. This means an operating
system can stage malicious attacks on the devices in a network by impersonating a network adapter that the
receiving network authorizes.
You can secure the traffic through the standard switches against this type of Layer 2 attacks by restricting
the following modes:
n
Promiscuous mode
Forged transmission
To change any default settings for a port, you modify the security policy of the standard switch or of the
port group from the vSphere Web Client.
134
VMware, Inc.
When the Mac address changes option is set to Reject, ESXi does not honor requests to change the effective
MAC address to a different address than the initial MAC address. This setting protects the host against
MAC impersonation. The port that the virtual machine adapter used to send the request is disabled and the
virtual machine adapter does not receive any more frames until the effective MAC address matches the
initial MAC address. The guest operating system does not detect that the MAC address change request was
not honored.
NOTE The iSCSI initiator relies on being able to get MAC address changes from certain types of storage. If
you are using ESXi iSCSI with iSCSI storage, set the MAC address changes option to Accept.
In some situations, you might have a legitimate need for more than one adapter to have the same MAC
address on a networkfor example, if you are using Microsoft Network Load Balancing in unicast mode.
When Microsoft Network Load Balancing is used in the standard multicast mode, adapters do not share
MAC addresses.
Forged Transmissions
The Forged transmits option affects traffic that is transmitted from a virtual machine.
When the Forged transmits option is set to Accept, ESXi does not compare source and effective MAC
addresses.
To protect against MAC impersonation, you can set the Forged transmits option to Reject. If you do, the
host compares the source MAC address being transmitted by the guest operating system with the effective
MAC address for its virtual machine adapter to see if they match. If the addresses do not match, the ESXi
host drops the packet.
The guest operating system does not detect that its virtual machine adapter cannot send packets by using
the impersonated MAC address. The ESXi host intercepts any packets with impersonated addresses before
they are delivered, and the guest operating system might assume that the packets are dropped.
Verify that the Auto Expand feature for the distributed port groups with static binding is disabled.
Auto Expand is enabled by default in vSphere 5.1 and later.
To disable Auto Expand, configure the autoExpand property under the distributed port group with the
vSphere Web Services SDK or with a command-line interface . See the vSphere API/SDK Documentation.
VMware, Inc.
135
vSphere Security
Ensure that all private VLAN IDs of any vSphere Distributed Switch are fully documented.
Ensure that no unused ports exist on a virtual port group associated with a vSphere Distributed Switch.
Protect virtual traffic against impersonation and interception Layer 2 attacks by configuring a security
policy on port groups or ports.
The security policy on distributed port groups and ports includes the following options:
Promiscuous mode (see Promiscuous Mode Operation, on page 135)
Router
Host 2
VM0
VM1
VM2
VM3
VM4
VM5
VLAN A
Broadcast
Domain A
Standard Switch
Standard Switch
Switch 1
VM6
Host 3
VM8
Standard Switch
VM9
Switch 2
VM7
VM10
Standard Switch
VM13
VLAN
A
Broadcast
Domain B
VM11
Host 4
VM12
VLAN
B
VLAN B
VM14
VLAN
B
Multiple VLANs
on the same
virtual switch
Broadcast
Domains A and B
In this configuration, all employees in the accounting department use virtual machines in VLAN A and the
employees in sales use virtual machines in VLAN B.
136
VMware, Inc.
The router forwards packets containing accounting data to the switches. These packets are tagged for
distribution to VLAN A only. Therefore, the data is confined to Broadcast Domain A and cannot be routed
to Broadcast Domain B unless the router is configured to do so.
This VLAN configuration prevents the sales force from intercepting packets destined for the accounting
department. It also prevents the accounting department from receiving packets intended for the sales group.
The virtual machines serviced by a single virtual switch can be in different VLANs.
Secure VLANs
Administrators have several options for securing the VLANs in their vSphere environment.
Procedure
1
Ensure that port groups are not configured to VLAN values that are reserved by upstream physical
switches
Do not set VLAN IDs to values reserved for the physical switch.
Ensure that port groups are not configured to VLAN 4095 unless you are using for Virtual Guest
Tagging (VGT).
Three types of VLAN tagging exist in vSphere:
n
Virtual Switch Tagging (VST) - The virtual switch tags with the configured VLAN ID the traffic
that is incoming to the attached virtual machines and removes the VLAN tag from the traffic that is
leaving them. To set up VST mode, assign a VLAN ID between 1 and 4095.
Virtual Guest Tagging (VGT) - Virtual machines handle VLAN traffic. To activate VGT mode, set
the VLAN ID to 4095. On a distributed switch, you can also allow virtual machine traffic based on
its VLAN by using the VLAN Trunking option.
On a standard switch you can configure VLAN networking mode at switch or port group level, and on
a distributed switch at distributed port group or port level.
3
VMware, Inc.
Ensure that all VLANs on each virtual switch are fully documented and that each virtual switch has all
required VLANs and only required VLANs.
137
vSphere Security
Virtual Machine
2
Virtual Machine
3
web server
application server
Standard
Switch 1
hardware network
adapter 1
External Network
Standard
Switch 2
Virtual Machine
4
firewall server
Standard
Switch 3
hardware network
adapter 2
Internal Network
In this example, four virtual machines are configured to create a virtual DMZ on Standard Switch 2:
n
Virtual Machine 1 and Virtual Machine 4 run firewalls and are connected to physical network adapters
through standard switches. Both of these virtual machines are using multiple switches.
Virtual Machine 2 runs a Web server, and Virtual Machine 3 runs as an application server. Both of these
virtual machines are connected to one virtual switch.
The Web server and application server occupy the DMZ between the two firewalls. The conduit between
these elements is Standard Switch 2, which connects the firewalls with the servers. This switch has no direct
connection with any elements outside the DMZ and is isolated from external traffic by the two firewalls.
From an operational viewpoint, external traffic from the Internet enters Virtual Machine 1 through
Hardware Network Adapter 1 (routed by Standard Switch 1) and is verified by the firewall installed on this
machine. If the firewall authorizes the traffic, it is routed to the standard switch in the DMZ, Standard
Switch 2. Because the Web server and application server are also connected to this switch, they can serve
external requests.
Standard Switch 2 is also connected to Virtual Machine 4. This virtual machine provides a firewall between
the DMZ and the internal corporate network. This firewall filters packets from the Web server and
application server. If a packet is verified, it is routed to Hardware Network Adapter 2 through Standard
Switch 3. Hardware Network Adapter 2 is connected to the internal corporate network.
When creating a DMZ on a single host, you can use fairly lightweight firewalls. Although a virtual machine
in this configuration cannot exert direct control over another virtual machine or access its memory, all the
virtual machines are still connected through a virtual network. This network could be used for virus
propagation or targeted for other types of attacks. The security of the virtual machines in the DMZ is
equivalent to separate physical machines connected to the same network.
138
VMware, Inc.
Internal Network
DMZ
VM 2
internal
user
VM 3
VM 6
internal
user
firewall
server
VM 4
VM 7
internal
user
Web
server
VM 1
VM 5
VM 8
FTP
server
internal
user
firewall
server
physical network
adapters
External
Network 1
Internal
Network 2
External
Network 2
Internal
Network 1
In the figure, the system administrator configured a host into three distinct virtual machine zones: FTP
server, internal virtual machines, and DMZ. Each zone serves a unique function.
FTP server
Virtual Machine 1 is configured with FTP software and acts as a holding area
for data sent to and from outside resources such as forms and collateral
localized by a vendor.
This virtual machine is associated with an external network only. It has its
own virtual switch and physical network adapter that connect it to External
Network 1. This network is dedicated to servers that the company uses to
receive data from outside sources. For example, the company uses External
Network 1 to receive FTP traffic from vendors and allow vendors access to
data stored on externally available servers though FTP. In addition to
servicing Virtual Machine 1, External Network 1 services FTP servers
configured on different ESXi hosts throughout the site.
VMware, Inc.
139
vSphere Security
Virtual Machines 2 through 5 are reserved for internal use. These virtual
machines process and store company-private data such as medical records,
legal settlements, and fraud investigations. As a result, the system
administrators must ensure the highest level of protection for these virtual
machines.
These virtual machines connect to Internal Network 2 through their own
virtual switch and network adapter. Internal Network 2 is reserved for
internal use by personnel such as claims processors, in-house lawyers, or
adjustors.
Virtual Machines 2 through 5 can communicate with one another through
the virtual switch and with internal virtual machines elsewhere on Internal
Network 2 through the physical network adapter. They cannot communicate
with externally facing machines. As with the FTP server, these virtual
machines cannot send packets to or receive packets from the other virtual
machines networks. Similarly, the hosts other virtual machines cannot send
packets to or receive packets from Virtual Machines 2 through 5.
DMZ
By capitalizing on virtual machine isolation, correctly configuring virtual switches, and maintaining
network separation, the system administrator can house all three virtual machine zones in the same ESXi
host and be confident that there will be no data or resource breaches.
The company enforces isolation among the virtual machine groups by using multiple internal and external
networks and making sure that the virtual switches and physical network adapters for each group are
completely separate from those of other groups.
Because none of the virtual switches straddle virtual machine zones, the system administrator succeeds in
eliminating the risk of packet leakage from one zone to another. A virtual switch, by design, cannot leak
packets directly to another virtual switch. The only way for packets to travel from one virtual switch to
another is under the following circumstances:
140
The virtual switches connect to a common virtual machine, which could be used to transmit packets.
VMware, Inc.
Neither of these conditions occur in the sample configuration. If system administrators want to verify that
no common virtual switch paths exist, they can check for possible shared points of contact by reviewing the
network switch layout in the vSphere Web Client.
To safeguard the virtual machines resources, the system administrator lowers the risk of DoS and DDoS
attacks by configuring a resource reservation and a limit for each virtual machine. The system administrator
further protects the ESXi host and virtual machines by installing software firewalls at the front and back
ends of the DMZ, ensuring that the host is behind a physical firewall, and configuring the networked
storage resources so that each has its own virtual switch.
At the command prompt, enter the command esxcli network ip ipsec sa list.
VMware, Inc.
At the command prompt, enter the command esxcli network ip ipsec sa add with one or more of the
following options.
Option
Description
--sa-destination= destination
address
--sa-mode= mode
141
vSphere Security
Option
Description
--encryption-algorithm=
encryption algorithm
3des-cbc
aes128-cbc
null
null provides no encryption.
--integrity-algorithm=
authentication algorithm
--integrity-key= authentication
key
Required. Specify the authentication key. You can enter keys as ASCII text
or as a hexadecimal with a 0x prefix.
--sa-name=name
At the command prompt, enter the command esxcli network ip ipsec sp list.
142
VMware, Inc.
At the command prompt, enter the command esxcli network ip ipsec sp add with one or more of the
following options.
Option
Description
--sp-destination= destination
address
--source-port= port
Required. Specify the source port. The source port must be a number
between 0 and 65535.
--destination-port= port
Required. Specify the destination port. The source port must be a number
between 0 and 65535.
--upper-layer-protocol= protocol
Specify the upper layer protocol using one of the following parameters.
n
n
n
n
tcp
udp
icmp6
any
--flow-direction= direction
Specify the direction in which you want to monitor traffic using either in
or out.
--action= action
Specify the action to take when traffic with the specified parameters is
encountered using one of the following parameters.
n
--sp-mode= mode
--sa-name=security association
name
Required. Provide the name of the security association for the security
policy to use.
--sp-name=name
VMware, Inc.
143
vSphere Security
--action=ipsec
--sp-mode=transport
--sa-name=sa1
--sp-name=sp1
To remove all security policies, enter the command esxcli network ip ipsec sp remove --remove-all.
Run esxcli system snmp get to determine whether SNMP is currently used.
If your system does require SNMP, make sure that it is not running by running the esxcli system snmp
If your system uses SNMP, see the Monitoring and Performance publication for setup information for
SNMP 3.
SNMP must be configured on each ESXi host. You can use vCLI, PowerCLI, or the vSphere Web
Services SDK for configuration.
144
VMware, Inc.
Procedure
1
To ensure that the Net.DVFilterBindIpAddress kernel parameter has the correct value, locate the
parameter by using the vSphere Web Client.
a
Scroll down to Net.DVFilterBindIpAddress and verify that the parameter has an empty value.
The order of parameters is not strictly alphabetical. Scroll until you find the parameter.
If you are not using DvFilter settings, make sure that the value is blank.
If you are using DvFilter settings, make sure the value of the parameter matches the value that the
product that uses the DvFilter is using.
VMware, Inc.
145
vSphere Security
146
VMware, Inc.
10
Consider basic security recommendations when creating and configuring hosts and virtual machines.
This chapter includes the following topics:
n
Verify That Sending Host Performance Data to Guests is Disabled, on page 151
Synchronize ESX and ESXi Clocks with a Network Time Server on page 147
Before you install vCenter Single Sign-On, the vSphere Web Client, or the vCenter Server appliance,
make sure all machines on the vSphere network have their clocks synchronized.
Synchronize thevCenter Server Appliance Clock with an NTP Server on page 148
Before you deploy the vCenter Server Appliance, make sure all machines on the network have their
clocks synchronized. Unsynchronized clocks can cause installation and authentication errors.
VMware, Inc.
147
vSphere Security
Select Settings.
Click OK.
The host synchronizes with the NTP server.
Open a Web browser and navigate to the vCenter Server Appliance Management Interface
(https://vCenter-Appliance-IP-Address:5480/).
Log in as root.
Option
Description
No synchronization
NTP synchronization
Select this option and specify one or more NTP servers to configure the
appliance to synchronize with an NTP server directly.
This option becomes available only if you add the appliance to an Active
Directory domain. If you select this option, none of the other options is
available.
The vCenter Server Appliance clock is synchronized with the NTP server.
148
VMware, Inc.
iSCSI SANs let you make efficient use of existing Ethernet infrastructures to provide hosts access to storage
resources that they can dynamically share. iSCSI SANs provide an economical storage solution for
environments that rely on a common storage pool to serve numerous users. As with any networked system,
your iSCSI SANs can be subject to security breaches.
NOTE The requirements and procedures for securing an iSCSI SAN are similar for the hardware iSCSI
adapters you can use with hosts and for iSCSI configured directly through the host.
VMware, Inc.
149
vSphere Security
Any iSCSI target device that you run must have one or more open TCP ports to listen for iSCSI connections.
If any security vulnerabilities exist in the iSCSI device software, your data can be at risk through no fault of
ESXi. To lower this risk, install all security patches that your storage equipment manufacturer provides and
limit the devices connected to the iSCSI network.
Grant read-only access to CIM information to any local account defined on the ESXi system, as well as
any role defined in vCenter Server.
(Optional) If the application requires write access to the CIM interface, create a role to apply to the
service account with only two privileges:
n
Host.Config.SystemManagement
Host.CIM.CIMInteraction
This role can be local to the host or centrally defined on vCenter Server, depending on how the
monitoring application works.
150
VMware, Inc.
When a user logs into the host with the service account you created for CIM applications, the user has only
the privileges SystemManagement and CIMInteraction, or read-only access.
On the ESXi system that hosts the virtual machine, browse to the VMX file.
Virtual machine configuration files are located in the /vmfs/volumes/datastore directory, where
datastore is the name of the storage device where the virtual machine files are stored.
You cannot retrieve performance information about the host from inside the guest virtual machine.
VMware, Inc.
151
vSphere Security
152
VMware, Inc.
Defined Privileges
11
The following tables list the default privileges that, when selected for a role, can be paired with a user and
assigned to an object. The tables in this appendix use VC to indicate vCenter Server and HC to indicate host
client, a standalone ESXi or Workstation host.
When setting permissions, verify all the object types are set with appropriate privileges for each particular
action. Some operations require access permission at the root folder or parent folder in addition to access to
the object being manipulated. Some operations require access or performance permission at a parent folder
and a related object.
vCenter Server extensions might define additional privileges not listed here. Refer to the documentation for
the extension for more information on those privileges.
This chapter includes the following topics:
n
VMware, Inc.
153
vSphere Security
Alarms
Alarms privileges control the ability to set and respond to alarms on inventory objects.
The table describes privileges needed to create, modify, and respond to alarms.
You can set this privilege at different levels in the hierarchy. For example, if you set a privilege at the folder
level, you can propagate the privilege to one or more objects within the folder. The object listed in the
Required On column must have the privilege set, either directly or inherited.
Table 111. Alarms Privileges
Privilege Name
Description
Required On
Alarms.Acknowledge alarm
Alarms.Create alarm
Alarms.Modify alarm
Alarms.Remove alarm
154
VMware, Inc.
Datacenter
Datacenter privileges control the ability to create and edit datacenters in the vSphere Web Client inventory.
The table describes the privileges required to create and edit datacenters. All datacenter privileges are used
in vCenter Server only. The Create datacenter privilege is defined on datacenter folders or the root object.
All other datacenter privileges are pair with datacenters, datacenter folders, or the root object.
You can set this privilege at different levels in the hierarchy. For example, if you set a privilege at the folder
level, you can propagate the privilege to one or more objects within the folder. The object listed in the
Required On column must have the privilege set, either directly or inherited.
Table 112. Datacenter Privileges
Privilege Name
Description
Required On
Datacenter.Create
datacenter
Datacenter.Move
datacenter
Datacenter.Network
profile configuration
Datacenter
Datacenter.Query IP pool
allocation
Datacenter
Datacenter.Reconfigure
datacenter
Datacenter
Datacenter.Release IP
allocation
Datacenter
Datacenter.Remove
datacenter
Datacenter.Rename
datacenter
Datacenter
Datastore
Datastore privileges control the ability to browse, manage, and allocate space on datastores.
The table describes the privileges required to work with datastores.
You can set this privilege at different levels in the hierarchy. For example, if you set a privilege at the folder
level, you can propagate the privilege to one or more objects within the folder. The object listed in the
Required On column must have the privilege set, either directly or inherited.
Table 113. Datastore Privileges
Privilege Name
Description
Required On
Datastore.Allocate space
Datastores
Datastore.Browse datastore
Datastores
Datastore.Configure datastore
Datastores
Datastores
VMware, Inc.
155
vSphere Security
Description
Required On
Datastore.Move datastore
Datastore.Remove datastore
Datastores
Datastore.Remove file
Datastores
Datastore.Rename datastore
Datastores
Datastore.Update virtual
machine files
Datastores
Datastore Cluster
Datastore cluster privileges control the configuration of datastore clusters for Storage DRS.
The table describes privileges used for configuring datastore clusters.
You can set this privilege at different levels in the hierarchy. For example, if you set a privilege at the folder
level, you can propagate the privilege to one or more objects within the folder. The object listed in the
Required On column must have the privilege set, either directly or inherited.
Table 114. Datastore Cluster Privileges
Privilege Name
Description
Required On
Datastore cluster.Configure
a datatstore cluster
Datastore Clusters
Description
Required On
vSphere Distributed
Switch.Create
Datacenters, Network
folders
vSphere Distributed
Switch.Delete
vSphere Distributed
Switches
vSphere Distributed
Switch.Host operation
vSphere Distributed
Switches
vSphere Distributed
Switch.Modify
vSphere Distributed
Switches
156
VMware, Inc.
Description
Required On
vSphere Distributed
Switch.Move
vSphere Distributed
Switches
vSphere Distributed
Switch.Network I/O control
operation
vSphere Distributed
Switches
vSphere Distributed
Switch.Policy operation
vSphere Distributed
Switches
vSphere Distributed
Switch .Port configuration
operation
vSphere Distributed
Switches
vSphere Distributed
Switch.Port setting operation
vSphere Distributed
Switches
vSphere Distributed
Switch.VSPAN operation
vSphere Distributed
Switches
Description
Required On
ESX Agent
Manager.Config
Virtual machines
ESX Agent
Manager.Modify
Virtual machines
Virtual machines
Extension
Extension privileges control the ability to install and manage extensions.
The table describes privileges required to install and manage plug-ins.
You can set this privilege at different levels in the hierarchy. For example, if you set a privilege at the folder
level, you can propagate the privilege to one or more objects within the folder. The object listed in the
Required On column must have the privilege set, either directly or inherited.
VMware, Inc.
157
vSphere Security
Description
Required On
Extension.Register
extension
Extension.Unregister
extension
Extension.Update extension
Folder
Folder privileges control the ability to create and manage folders.
The table describes privileges required to create and manage folders.
You can set this privilege at different levels in the hierarchy. For example, if you set a privilege at the folder
level, you can propagate the privilege to one or more objects within the folder. The object listed in the
Required On column must have the privilege set, either directly or inherited.
Table 118. Folder Privileges
Privilege Name
Description
Required On
Folder.Create folder
Folders
Folder.Delete folder
Folders
Folder.Move folder
Folders
Folder.Rename folder
Folders
Global
Global privileges control global tasks related to tasks, scripts, and extensions.
The table describes privileges required for global tasks in the vSphere Web Client.
You can set this privilege at different levels in the hierarchy. For example, if you set a privilege at the folder
level, you can propagate the privilege to one or more objects within the folder. The object listed in the
Required On column must have the privilege set, either directly or inherited.
Table 119. Global Privileges
Privilege Name
Description
Required On
Global.Act as vCenter
Server
Global.Cancel task
Global.Capacity planning
Global.Diagnostics
Global.Disable methods
158
VMware, Inc.
Description
Required On
Global.Enable methods
Global.Global tag
Global.Health
Global.Licenses
Global.Log event
Any object
Global.Manage custom
attributes
Global.Proxy
Global.Script action
Any object
Global.Service managers
Any object
Global.Settings
Global.System tag
Host CIM
Host CIM privileges control the use of CIM for host health monitoring.
The table describes privileges used for CIM host health monitoring.
You can set this privilege at different levels in the hierarchy. For example, if you set a privilege at the folder
level, you can propagate the privilege to one or more objects within the folder. The object listed in the
Required On column must have the privilege set, either directly or inherited.
Table 1110. Host CIM Privileges
Privilege Name
Description
Required On
Host.CIM.CIM Interaction
Hosts
Host Configuration
Host configuration privileges control the ability to configure hosts.
The table describes the privileges required to configure host settings.
You can set this privilege at different levels in the hierarchy. For example, if you set a privilege at the folder
level, you can propagate the privilege to one or more objects within the folder. The object listed in the
Required On column must have the privilege set, either directly or inherited.
VMware, Inc.
159
vSphere Security
Description
Required On
Host.Configuration.Advanced
Settings
Hosts
Host.Configuration.Authentication
Store
Hosts
Host.Configuration.Change date
and time settings
Hosts
Host.Configuration.Change
PciPassthru settings
Hosts
Host.Configuration.Change settings
Hosts
Host.Configuration.Change SNMP
settings
Hosts
Host.Configuration.Connection
Hosts
Host.Configuration.Firmware
Hosts
Host.Configuration.Hyperthreading
Hosts
Host.Configuration.Image
configuration
Host.Configuration.Maintenance
Hosts
Host.Configuration.Memory
configuration
Hosts
Host.Configuration.Network
configuration
Hosts
Host.Configuration.Power
Hosts
Host.Configuration.Query patch
Hosts
Host.Configuration.Security profile
and firewall
Hosts
Host.Configuration.Storage
partition configuration
Hosts
Host.Configuration.System
Management
Hosts
Host.Configuration.System
resources
Hosts
Host.Configuration.Virtual machine
autostart configuration
Hosts
Host Inventory
Host inventory privileges control adding hosts to the inventory, adding hosts to clusters, and moving hosts
in the inventory.
The table describes the privileges required to add and move hosts and clusters in the inventory.
160
VMware, Inc.
You can set this privilege at different levels in the hierarchy. For example, if you set a privilege at the folder
level, you can propagate the privilege to one or more objects within the folder. The object listed in the
Required On column must have the privilege set, either directly or inherited.
Table 1112. Host Inventory Privileges
Privilege Name
Description
Required On
Host.Inventory.Add host to
cluster
Clusters
Host.Inventory.Add
standalone host
Host folders
Host.Inventory.Create
cluster
Host folders
Host.Inventory.Modify
cluster
Clusters
Host.Inventory.Move
cluster or standalone host
Clusters
Host.Inventory.Move host
Clusters
Host.Inventory.Remove
cluster
Clusters, Hosts
Host.Inventory.Remove
host
Host.Inventory.Rename
cluster
Clusters
Description
Required On
Host.Local operations.Add
host to vCenter
Root host
Host.Local
operations.Create virtual
machine
Root host
Host.Local
operations.Delete virtual
machine
Root host
Host.Local
operations.Extract NVRAM
content
VMware, Inc.
161
vSphere Security
Description
Required On
Host.Local
operations.Manage user
groups
Root host
Host.Local
operations.Reconfigure
virtual machine
Root host
Host.Local
operations.Relayout
snapshots
Root host
Description
Required On
Host.vSphere
Replication.Manage
Replication
Hosts
Host Profile
Host Profile privileges control operations related to creating and modifying host profiles.
The table describes privileges required for creating and modifying host profiles.
You can set this privilege at different levels in the hierarchy. For example, if you set a privilege at the folder
level, you can propagate the privilege to one or more objects within the folder. The object listed in the
Required On column must have the privilege set, either directly or inherited.
Table 1115. Host Profile Privileges
Privilege Name
Description
Required On
Host profile.Clear
Host profile.Create
Host profile.Delete
Host profile.Edit
Host profile.Export
Host profile.View
Network
Network privileges control tasks related to network management.
The table describes privileges required for network management.
162
VMware, Inc.
You can set this privilege at different levels in the hierarchy. For example, if you set a privilege at the folder
level, you can propagate the privilege to one or more objects within the folder. The object listed in the
Required On column must have the privilege set, either directly or inherited.
Table 1116. Network Privileges
Privilege Name
Description
Required On
Network.Assign network
Networks, Virtual
Machines
Network.Configure
Networks, Virtual
Machines
Network.Move network
Networks
Network.Remove
Networks
Performance
Performance privileges control modifying performance statistics settings.
The table describes privileges required to modify performance statistics settings.
You can set this privilege at different levels in the hierarchy. For example, if you set a privilege at the folder
level, you can propagate the privilege to one or more objects within the folder. The object listed in the
Required On column must have the privilege set, either directly or inherited.
Table 1117. Performance Privileges
Privilege Name
Description
Required On
Performance.Modify
intervals
Permissions
Permissions privileges control the assigning of roles and permissions.
The table describes permissions required for assigning roles and permissions.
You can set this privilege at different levels in the hierarchy. For example, if you set a privilege at the folder
level, you can propagate the privilege to one or more objects within the folder. The object listed in the
Required On column must have the privilege set, either directly or inherited.
Table 1118. Permissions Privileges
Privilege Name
Description
Required On
Permissions.Modify
permission
Permissions.Modify role
Any object
Permissions.Reassign role
permissions
Any object
VMware, Inc.
163
vSphere Security
Profile-driven Storage
Profile-driven storage privileges control operations related to storage profiles.
The table describes privileges required for viewing and updating storage profiles.
You can set this privilege at different levels in the hierarchy. For example, if you set a privilege at the folder
level, you can propagate the privilege to one or more objects within the folder. The object listed in the
Required On column must have the privilege set, either directly or inherited.
Table 1119. Profile-driven Storage Privileges
Privilege Name
Description
Required On
Resource
Resource privileges control the creation and management of resource pools, as well as the migration of
virtual machines.
The table describes privileges that control resource management and virtual machine migration.
You can set this privilege at different levels in the hierarchy. For example, if you set a privilege at the folder
level, you can propagate the privilege to one or more objects within the folder. The object listed in the
Required On column must have the privilege set, either directly or inherited.
Table 1120. Resource Privileges
Privilege Name
Description
Required On
Resource.Apply recommendation
Clusters
Resource pools
Resource pools
Virtual machines
Resource pools
Resource pools
Resource.Query vMotion
Resource.Relocate
Virtual machines
164
VMware, Inc.
Description
Required On
Resource pools
Resource pools
Scheduled Task
Scheduled task privileges control creation, editing, and removal of scheduled tasks.
The table describes privileges required for creating and modifying scheduled tasks.
You can set this privilege at different levels in the hierarchy. For example, if you set a privilege at the folder
level, you can propagate the privilege to one or more objects within the folder. The object listed in the
Required On column must have the privilege set, either directly or inherited.
Table 1121. Scheduled Task Privileges
Privilege Name
Description
Required On
Any object
Any object
Any object
Any object
Sessions
Sessions privileges control the ability of extensions to open sessions on the vCenter Server.
The table describes the privileges associated with sessions on vCenter Server.
You can set this privilege at different levels in the hierarchy. For example, if you set a privilege at the folder
level, you can propagate the privilege to one or more objects within the folder. The object listed in the
Required On column must have the privilege set, either directly or inherited.
Table 1122. Session Privileges
Privilege Name
Description
Required On
Sessions.Impersonate user
Sessions.Message
Sessions.Validate session
Allow viewing sessions and forcing log out of one or more logged-on
users.
Storage Views
Storage Views privileges control the ability to configure and use storage views on vCenter Server.
The table describes privileges required to configure and use storage views.
VMware, Inc.
165
vSphere Security
You can set this privilege at different levels in the hierarchy. For example, if you set a privilege at the folder
level, you can propagate the privilege to one or more objects within the folder. The object listed in the
Required On column must have the privilege set, either directly or inherited.
Table 1123. Storage Views Privileges
Privilege Name
Description
Required On
Storage views.View
Tasks
Tasks privileges control the ability of extensions to create and update tasks on the vCenter Server.
The table describes privileges related to tasks.
You can set this privilege at different levels in the hierarchy. For example, if you set a privilege at the folder
level, you can propagate the privilege to one or more objects within the folder. The object listed in the
Required On column must have the privilege set, either directly or inherited.
Table 1124. Tasks Privileges
Privilege Name
Description
Required On
Tasks.Create task
Tasks.Update task
vApp
vApp privileges control operations related to deploying and configuring a vApp.
The table describes privileges related to vApps.
You can set this privilege at different levels in the hierarchy. For example, if you set a privilege at the folder
level, you can propagate the privilege to one or more objects within the folder. The object listed in the
Required On column must have the privilege set, either directly or inherited.
Table 1125. vApp Privileges
Privilege Name
Description
Required On
vApps
vApps
vApp.Assign vApp
vApps
vApp.Clone
vApps
vApp.Create
vApps
vApp.Delete
vApps
vApp.Export
vApps
vApp.Import
vApps
vApp.Move
vApps
vApp.Power Off
vApps
166
VMware, Inc.
Description
Required On
vApp.Power On
vApps
vApp.Rename
vApps
vApp.Suspend
vApps
vApp.Unregister
vApps
vApps
vApp.vApp application
configuration
vApps
vApps
vApp.vApp managedBy
configuration
vApps
vApps
Description
Required On
Allows
assignment or
unassignment of
a tag for an
object in the
vCenter Server
inventory.
Any object
Allows creation
of a tag
category.
Any object
Allows creation
of a tag.
Any object
Allows deletion
of a tag
category.
Any object
VMware, Inc.
167
vSphere Security
Description
Required On
Allows deletion
of a tag.
Any object
Allows editing
of a tag
caategory.
Any object
Allows editing
of a tag.
Any object
Description
Required On
Virtual
machine.Configuration.Add
existing disk
Virtual machines
Virtual
machine.Configuration.Add
new disk
Virtual machines
Virtual
machine.Configuration.Add
or remove device
Virtual machines
Virtual
machine.Configuration.Adv
anced
Virtual machines
Virtual
machine.Configuration.Cha
nge CPU count
Virtual machines
Virtual
machine.Configuration.Cha
nge resource
Virtual machines
Virtual
machine.Configuration.Conf
igure managedBy
Virtual machines
Virtual
machine.Configuration.Disk
change tracking
Virtual machines
Virtual
machine.Configuration.Disp
lay connection settings
Virtual machines
Virtual
machine.Configuration.Exte
nd virtual disk
Virtual machines
168
VMware, Inc.
Description
Required On
Virtual
machine.Configuration.Host
USB device
Virtual machines
Virtual
machine.Configuration.Me
mory
Virtual machines
Virtual
machine.Configuration.Mod
ify device settings
Virtual machines
Virtual
machine.Configuration.Quer
y Fault Tolerance
compatibility
Virtual machines
Virtual
machine.Configuration.Quer
y unowned files
Virtual machines
Virtual
machine.Configuration.Raw
device
Virtual machines
Virtual
machine.Configuration.Relo
ad from path
Virtual machines
Virtual
machine.Configuration.Rem
ove disk
Virtual machines
Virtual
machine.Configuration.Rena
me
Virtual machines
Virtual
machine.Configuration.Rese
t guest information
Virtual machines
Virtual
machine.Configuration.Set
annotation
Virtual machines
Virtual
machine.Configuration.Setti
ngs
Virtual machines
Virtual
machine.Configuration.Swa
pfile placement
Virtual machines
Virtual
machine.Configuration.Unlo
ck virtual machine
Virtual machines
Virtual
machine.Configuration.Upgr
ade virtual machine
compatibility
Virtual machines
VMware, Inc.
169
vSphere Security
Description
Effective on Object
Virtual machine.Guest
Operations.Guest Operation
Modifications
Virtual machines
Virtual machine.Guest
Operations.Guest Operation
Program Execution
Virtual machines
Virtual machine.Guest
Operations.Guest Operation
Queries
Virtual machines
Description
Required On
Virtual
machine.Interaction.Answer
question
Virtual machines
Virtual
machine.Interaction.Backup
operation on virtual
machine
Virtual machines
Virtual
machine.Interaction.Config
ure CD media
Virtual machines
Virtual
machine.Interaction.Config
ure floppy media
Virtual machines
170
VMware, Inc.
Description
Required On
Virtual
machine.Interaction.Console
interaction
Virtual machines
Virtual
machine.Interaction.Create
screenshot
Virtual machines
Virtual
machine.Interaction.Defrag
ment all disks
Virtual machines
Virtual
machine.Interaction.Device
connection
Virtual machines
Virtual
machine.Interaction.Disable
Fault Tolerance
Virtual machines
Virtual
machine.Interaction.Enable
Fault Tolerance
Virtual machines
Virtual
machine.Interaction.Guest
operating system
management by VIX API
Virtual machines
Virtual
machine.Interaction.Inject
USB HID scan codes
Virtual machines
Virtual
machine.Interaction.Perform
wipe or shrink operations
Virtual machines
Virtual
machine.Interaction.Power
Off
Virtual machines
Virtual
machine.Interaction.Power
On
Virtual machines
Virtual
machine.Interaction.Record
session on Virtual Machine
Virtual machines
Virtual
machine.Interaction.Replay
session on Virtual Machine
Virtual machines
Virtual
machine.Interaction.Reset
Virtual machines
Virtual
machine.Interaction.Suspen
d
Virtual machines
Virtual
machine.Interaction.Test
failover
Virtual machines
Virtual
machine.Interaction.Test
restart Secondary VM
Virtual machines
VMware, Inc.
171
vSphere Security
Description
Required On
Virtual
machine.Interaction.Turn
Off Fault Tolerance
Virtual machines
Virtual
machine.Interaction.Turn
On Fault Tolerance
Virtual machines
Virtual
machine.Interaction.VMwar
e Tools install
Virtual machines
Description
Required On
Virtual
machine .Inventory.Create
from existing
Virtual
machine.Inventory.Create
new
Virtual
machine.Inventory.Move
Virtual machines
Virtual
machine.Inventory.Register
Virtual
machine.Inventory.Remove
Virtual machines
Virtual
machine.Inventory.Unregist
er
Virtual machines
172
VMware, Inc.
Description
Required On
Virtual
machine.Provisioning.Allow
disk access
Virtual machines
Virtual
machine.Provisioning.Allow
read-only disk access
Virtual machines
Virtual
machine.Provisioning.Allow
virtual machine download
Virtual
machine.Provisioning.Allow
virtual machine files upload
Virtual
machine.Provisioning.Clone
template
Templates
Virtual
machine.Provisioning.Clone
virtual machine
Virtual machines
Virtual
machine.Provisioning.Create
template from virtual
machine
Virtual machines
Virtual
machine.Provisioning.Custo
mize
Virtual machines
Virtual
machine.Provisioning.Deplo
y template
Templates
Virtual
machine.Provisioning.Mark
as template
Virtual machines
Virtual
machine.Provisioning.Mark
as virtual machine
Templates
Virtual
machine.Provisioning.Modif
y customization
specification
Virtual
machine.Provisioning.Promo
te disks
Virtual machines
Virtual
machine.Provisioning.Read
customization specifications
Virtual machines
VMware, Inc.
173
vSphere Security
You can set this privilege at different levels in the hierarchy. For example, if you set a privilege at the folder
level, you can propagate the privilege to one or more objects within the folder. The object listed in the
Required On column must have the privilege set, either directly or inherited.
Table 1132. Virtual Machine State Privileges
Privilege Name
Description
Required On
Virtual machine.Snapshot
management. Create
snapshot
Virtual machines
Virtual machine.Snapshot
management.Remove
Snapshot
Virtual machines
Virtual machine.Snapshot
management.Rename
Snapshot
Virtual machines
Virtual machine.Snapshot
management.Revert to
snapshot
Virtual machines
Description
Required On
Virtual machine.vSphere
Replication.Configure
vSphere Replication
Virtual machines
Virtual machine.vSphere
Replication.Manage
vSphere Replication
Virtual machines
Virtual machine.vSphere
Replication.Monitor
vSphere Replication
Virtual machines
dvPort Group
Distributed virtual port group privileges control the ability to create, delete, and modify distributed virtual
port groups.
The table describes the privileges required to create and configure distributed virtual port groups.
You can set this privilege at different levels in the hierarchy. For example, if you set a privilege at the folder
level, you can propagate the privilege to one or more objects within the folder. The object listed in the
Required On column must have the privilege set, either directly or inherited.
174
VMware, Inc.
Description
Required On
Distributed switch.Create
Distributed switch.Delete
Distributed switch.Modify
Distributed switch.Policy
operation
Distributed switch.Port
configuration operation
vServices
vServices privileges control the ability to create, configure, and update vService dependencies for virtual
machines and vApps.
The table describes privileges related to vService dependencies.
You can set this privilege at different levels in the hierarchy. For example, if you set a privilege at the folder
level, you can propagate the privilege to one or more objects within the folder. The object listed in the
Required On column must have the privilege set, either directly or inherited.
Table 1135. vServices
Privilege Name
Description
Required On
vService.Create dependency
vService.Destroy
dependency
vService.Reconfigure
dependency configuration
vService.Update
dependency
VRM Policy
VRM policy privileges control the ability to query and update virtual rights management policies.
The table describes privileges related to virtual rights management.
You can set this privilege at different levels in the hierarchy. For example, if you set a privilege at the folder
level, you can propagate the privilege to one or more objects within the folder. The object listed in the
Required On column must have the privilege set, either directly or inherited.
Table 1136. VRM Policy Privileges
Privilege Name
Description
Required On
VRMPolicy.Query
VRMPolicy
Virtual machines
VRMPolicy.Update
VRMPolicy
Virtual machines
VMware, Inc.
175
vSphere Security
176
VMware, Inc.
Index
A
access, privileges 153
Active Directory 90, 91, 105, 107
Active Directory domain, authentication with
vCenter Server Appliance 40
Active Directory identity source 28
Active Directory LDAP Server identity source 29
Administrator role, restricting 72
administrator user, setting for vCenter Server 17
alarms, privileges 154
allowed IP addresses, firewall 84
antivirus software, installing 117
application users 37
authenticating, vSphere Authentication
Proxy 106
authentication
iSCSI storage 149
with Active Directory domain 40
authentication proxy 90, 103, 105, 107
authentication proxy server 106
authorization 65
authorized keys, disabling 80
Auto Deploy, security 113
automated certificate update 45
automating default values 50
availability timeout for the ESXi Shell 99
B
best practices
permissions 60
roles 60
security 147
C
CA-signed certificates 93, 94
CAM server 106
CAM service 105
categories, privileges 167
certificate replacement, requirements 92
certificate requests, generating 51, 52
certificate types 43
certificate use 32
Certificate Automation Tool:prerequisites 48
certificate update planner 45
Certificate Update Automation Tool 45
Certificate Update Automation Tool, installing 50
VMware, Inc.
certificates
checking 73
configuring host searches 109
disabling SSL for vSphere SDK 108
expired 73
generating new 93
refresh STS for vCenter Single Sign-On 31
remove STS for vCenter Single Sign-On 31
replacing Single Sign-On 47
replacing vCenter Server Heartbeat 54
revoked 73
uploading 95
changing host proxy services 109, 111
CIM tool access, limiting 150
copy and paste
disabled for guest operating systems 120
guest operating systems 120
virtual machines 120
D
datacenters, privileges 155
datastore clusters, privileges 156
datastores, privileges 155
dcui 90
DCUI Access 86, 103
default domain 21
default domains, vCenter Single Sign-On 27
default certificates, replacing with CA-signed
certificates 93, 94
delete identity source 30
delete Single Sign-On users 35
delete vCenter Single Sign-On users 35
device disconnection, preventing in the vSphere
Web Client 121
Direct Console User Interface (DCUI) 86, 103
directory server, viewing 91
directory service
Active Directory 90
configuring a host 90
disable remote operations in a virtual
machine 120
disable user, Single Sign-On 34
disabling
logging for guest operating systems 122, 126
SSL for vSphere SDK 108
variable information size 122
177
vSphere Security
firewalls
access for management agents 83
access for services 83
folders, privileges 158
forged transmissions 134, 135
F
Fault Tolerance (FT)
logging 115
security 115
firewall
commands 85
configuring 85
host 82
NFS client 84
firewall ports
automating service behavior 85
configuring with vCenter Server 129
configuring without vCenter Server 130
connecting to vCenter Server 130
host to host 130
overview 128
vSphere Client direct connection 130
vSphere Web Client and vCenter Server 129
firewall settings 84
178
H
hardening the vCenter Server Host OS 71
hardware devices, removing 118
heartbeat certificates, replacing 54
host name, configuring 90
host profiles, privileges 162, 164
host certificate searches 109
host security
authorized keys 80
CIM tools 150
disabling MOB 79
logging 113
managed object browser 79
performance data 151
resource management 123
unsigned VIBs 81
using templates 123
virtual disk shrinking 124
virtual machine console 125
vpxuser 89
host-to-host firewall ports 130
hosts
CIM privileges 159
configuration privileges 159
inventory privileges 160
local operations privileges 161
memory 122
thumbprints 73
vSphere replication privileges 162
VMware, Inc.
Index
I
identity source
adding to vCenter Single Sign-On 27
editing for vCenter Single Sign-On 30
identity sources for vCenter Single Sign-On 25
idle session timeout 98, 100
Image Builder security 81
informational messages, limiting 124
Internet Protocol Security (IPsec) 141
IP addresses, adding allowed 84
IPsec, See Internet Protocol Security (IPsec)
iSCSI
authentication 149
protecting transmitted data 149
QLogic iSCSI adapters 148
securing ports 149
security 148
isolation
standard switches 12
virtual networking layer 12
VLANs 12
J
join domain 105
K
keys
authorized 95, 96
SSH 95, 96
uploading 95, 96
L
Linux-based clients, restricting use with vCenter
Server 75
lockdown mode
behavior 101
DCUI access 86, 103
direct console user interface 103
enabling 102, 103
vSphere Web Client 102
lockout policy, vCenter Single Sign-On 24
log files
ESXi 113, 115
limiting number 125
limiting size 125
locating 115
logging
disabling for guest operating systems 122,
126
host security 113
logging levels, guest operating systems 125
VMware, Inc.
M
MAC address changes 134
managed entities, permissions 57
managed object browser, disabling 79
management access
firewalls 83
TCP and UDP ports 132
management interface
securing 77
securing with VLANs and virtual switches 137
management network 79
managing Single Sign-On users 33
N
network connectivity, limiting 74
network file copy (NFC) 74
network security 127
networks
privileges 162
security 136
NFC, enabling SSL 74
NFS client, firewall rule set 84
No Access role 68
NTP 85, 90
O
OpenLDAP Server identity source 29
P
password policies, vCenter Single Sign-On 23
password policy 21
password requirements 63
passwords
changing vCenter Single Sign-On 38
resetting 23
vCenter Single Sign-On policies 23
performance, privileges 163
performance data, disable sending 151
permissions
administrator 65
and privileges 65
assigning 60, 66, 108
best practices 60
changing 67
distributed switches 57
inheritance 57, 87, 88
overriding 88
overview 65
privileges 163
179
vSphere Security
removing 67
root user 65
settings 87
user 8890
validating 59, 64, 67
vpxuser 65
plug-ins, privileges 157
policies
lockout in vCenter Single Sign-On 24
security 143
Single Sign-On 25
vCenter Single Sign-On passwords 23
principals, remove from group 37
privileges
alarms 154
assigning 60
categories 167
configuration 159
datacenter 155
datastore clusters 156
datastores 155
dvPort group 174
ESX Agent Manager 157
extension 157
folder 158
global 158
host CIM 159
host inventory 160
host local operations 161
host profiles 162, 164
host vSphere replication 162
network 162
performance 163
permission 163
plug-ins 157
resource 164
scheduled tasks 165
sessions 165
storage views 165
tags 167
tasks 166
vApps 166
vCenter Inventory Service 167
vCenter Server 71
virtual machine 172
virtual machine configuration 168
virtual machine interaction 170
virtual machine provisioning 172
virtual machine guest operations 170
virtual machine snapshot management 173
virtual machine vSphere replication 174
VRM policy 175
180
vServices 175
vSphere Distributed Switches 156
privileges and permissions 65
privileges, required, for common tasks 61
promiscuous mode 134, 135
proxy services, changing 109, 111
R
Read Only role 68
remote operations, disabling in virtual
machine 120
removing users from groups 37
replacing, default certificates 93, 94
replacing default vCenter Certificates 47
required privileges, for common tasks 61
resources, privileges 164
restrict Guest Operations privileges 120
restricting use of Linux-based clients with
vCenter Server 75
revoked certificates 73
roles
Administrator 68
and permissions 68
best practices 60
creating 68, 69
default 68
No Access 68
privileges, lists of 153
Read Only 68
removing 67
security 68
rollback 54
root login, permissions 65, 88
S
SAN 150
scheduled tasks, privileges 165
SDK, firewall ports and virtual machine
console 130
search lists, adjusting for large domains 69
securing networking 127
security
best practices 147
certification 12
DMZ in single host 138, 139
host 77
iSCSI storage 148
permissions 65
standard switch ports 133, 134
virtual machines with VLANs 136
virtual networking layer 12
virtualization layer 11
VMware, Inc.
Index
VMware, Inc.
standard switches
and iSCSI 149
forged transmissions 134
MAC address changes 134
promiscuous mode 134
storage, securing with VLANs and virtual
switches 137
storage views, privileges 165
stp 133
STS, See security token service (STS)
STS (Security Token Service) 17
switch 133
synchronize ESX/ESXi clocks on vSphere
network 147
synchronizing clocks on the vSphere
network 147
syslog 114
T
tags, privileges 167
tasks, privileges 166
tcdump package 76
TCP ports 132
templates, host security 123
third-party software support policy 12
thumbprints, hosts 73
timeout, ESXi Shell 98, 100
timeout for ESXi Shell availability 99
timeouts
ESXi Shell 97
setting 97
SSL 80
token policy, Single Sign-On 25
Trusted Platform Module (TPM) 11
U
UDP ports 132
unexposed features, disable 119
update certificates 53
updated information 9
user management 65
user permissions
dcui 90
vpxuser 89
user account locked, SSO fails 41
user directory timeout 69
user repositories for vCenter Single Sign-On 25
users
adding local 34, 82
application 37
disabling Single Sign-On 34
editing Single Sign-On 35
remove from group 37
181
vSphere Security
removing 59, 64
searching 69
users and groups 37
users and permissions 57
V
vApps, privileges 166
variable information size for guest operating
systems
disabling 122
limiting 122
vCenter Server Heartbeat, replacing
certificates 54
vCenter Inventory Service
privileges 167
tagging 167
vCenter Lookup Service 17
vCenter Server
connecting through firewall 130
firewall ports 129
privileges 71
vCenter Server Appliance
synchronize clock with NTP server 148
unable to log in 40
vCenter Server administrator user, setting 17
vCenter Server Appliance certificates 54
vCenter Server Host OS, hardening 71
vCenter Server security 71, 72, 74
vCenter Single Sign-On
about 20
Active Directory 27, 30
benefits 15
changing password 38
domains 27
effect on vCenter Server installation and
upgrades 17
identity sources 25, 27, 30
installation fails 38
LDAP 27, 30
locked users 24
OpenLDAP 27, 30
password policy 23
replacing certificates 47
security token service (STS) 31
User repositories 25
VGT 137
vifs, uploading certificates and keys 95
virtual guest tagging 137
virtual network, security 136
virtual disks, shrinking 124
virtual machine security
disable features 119
VMX parameters 119
virtual machine console, host security 125
182
virtual machines
configuration privileges 168
copy and paste 120
disable copy and paste 120
disabling logging 122, 126
guest operations privileges 170
interaction privileges 170
inventory privileges 172
isolation 138, 139
limiting variable information size 122
preventing device disconnection in the
vSphere Web Client 121
provisioning privileges 172
securing 124
snapshot management privileges 173
vSphere replication privileges 174
virtual networking layer and security 12
virtualization layer, security 11
VLAN 137
VLAN security 137
VLANs
and iSCSI 149
Layer 2 security 137
security 136
VLAN hopping 137
VMkernel, security 11
vMotion, securing with VLANs and virtual
switches 137
VMware Directory Service 17
vmx files, editing 124
vpxuser, password 89
VRM policy, privileges 175
vServices, privileges 175
vSphere Authentication Proxy
authenticating 106
installing 103
vSphere Authentication Proxy Server 106
vSphere Client, firewall ports for direct
connection 130
vSphere Distributed Switch 135
vSphere Distributed Switches, privileges 156
vSphere Network Appliance 144
vSphere security overview 11
vSphere Web Client
replacing certificates 47
securing 75
vSphere Web Client security, plug-ins 75
W
Windows session authentication 32
Z
zoning 150
VMware, Inc.