- VMware vSphere Security Cookbook
- Mike Greer
- 561字
- 2021-08-05 17:16:05
Hardening the host via Console
The ESXi console is very straightforward and provides easy keyboard navigation to access basic options. The most common use of the console is to configure the management network so that the host can be accessed from the network by vCenter and directly by the vSphere client management tool.
There are two primary areas to be highlighted with regard to security:
- Troubleshooting mode
- Lockdown mode
Getting ready
ESXi 5.5 must be installed on the physical host, and we must have direct access available to the keyboard and monitor in order to proceed with the local console steps. ESXi is part of the vSphere 5.5 download file and can be found at https://my.vmware.com/web/vmware/evalcenter?p=vsphere-55.
How to do it…
Perform the following steps:
- Press any key to wake the server and change the black and gray screen to yellow. Once the system is awake, we need to log in.
- Press F2 to enter configuration mode. We'll need to enter the root password by default.
- Once the password is accepted, we move our cursor down to the Troubleshooting Mode Options menu item.
- Selecting Troubleshooting Mode Options gives us the following configuration options, shown in the following screenshot:
- Enable ESXi Shell
- Enable SSH
- Modify ESXi Shell and SSH timeouts
- Restart Management Agents
Specifically, we want to ensure that both the ESXi Shell and SSH are disabled.
- Toggling between enabled and disabled can be done by using the Space bar to make the proper selection.
- The second area to be noted is Configuration Lockdown Mode.
Note
You cannot set the lockdown if the host is not yet added to a vCenter. The option is disabled as shown in the following screenshot.
- Configure Lockdown Mode is an option to lock down the host to the point where you cannot log in locally and only through vCenter. This option is enabled or disabled by selecting the option from the main System Customization menu (shown in the following screenshot):
How it works…
The console is used to configure remote access to the ESXi host that is not under the control of a vCenter server. In such cases, remote access can be provided by allowing SSH and remote shell connections to the host. The steps mentioned in the preceding section provide an example for enabling SSH.
Lockdown mode is recommend when the physical host is remote or in a location with questionable security. Ensure that a highly available vCenter configuration exists prior to enabling lockdown mode. If a single virtual vCenter server is used and this server becomes unresponsive, it is not possible to connect to the ESXi server by any remote means to restart the vCenter VM.
There's more
Configuring ESXi at the console is usually only done in smaller environments and special circumstances. More complex scenarios take advantage of deployment tools and host profiles to simplify the configuration.
ESXi Shell is a method used to script and speak to the host via command-line tools such as PowerCLI. In general, these options should remain disabled unless there is a specific need to manage the host outside vCenter. SSH is a key that service attackers use to infiltrate systems that are returned from a port scan run by the attacker. While SSH can be very helpful for troubleshooting or even for transferring files with programs such as FileZilla, it should be kept disabled until needed.
- Kali Linux CTF Blueprints
- API安全實戰
- 暗戰亮劍:黑客滲透與防御全程實錄
- 計算機使用安全與防護
- API攻防:Web API安全指南
- 諸神之眼:Nmap網絡安全審計技術揭秘
- Building a Home Security System with BeagleBone
- 云原生安全與DevOps保障
- 互聯網企業安全高級指南
- Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager
- 復雜信息系統網絡安全體系建設指南
- Hands-On Artificial Intelligence for Cybersecurity
- Web安全之機器學習入門
- Hands-On Spring Security 5 for Reactive Applications
- Linux安全實戰