Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
VMware vSphere Security Cookbook
VMware vSphere Security Cookbook

VMware vSphere Security Cookbook: Over 75 practical recipes to help you successfully secure your vSphere environment

eBook
$27.98 $39.99
Paperback
$65.99
Subscription
Free Trial
Renews at $19.99p/m

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
OR
Modal Close icon
Payment Processing...
tick Completed

Billing Address

Table of content icon View table of contents Preview book icon Preview Book

VMware vSphere Security Cookbook

Chapter 2. ESXi Host Security

In this chapter, we will cover the following recipes:

  • Hardening the host via Console
  • Hardening the host via vSphere Client
  • Configuring host services
  • Configuring the host firewall

Introduction

Securing the hypervisor platform is critical for building a secure virtualization infrastructure. VMware has made substantial progress in reducing the threat surface of the ESX hypervisor. Beginning with Version 4.0, the traditional ESX hypervisor was joined by the ESXi version of the hypervisor. The ESX version of the hypervisor had a larger footprint and a greater threat profile. ESXi versus ESX is similar to Windows Server Core versus the full version of Windows Server.

Starting with vSphere 5.0, the ESXi hypervisor replaced the ESX hypervisor; as a result, the console's interface was changed to a more streamlined and simple Graphical User Interface (GUI). In fact, the ESXi hypervisor is often run from a memory card instead of a dedicated hard drive due to its size.

Hardening the host via Console

The ESXi console is very straightforward and provides easy keyboard navigation to access basic options. The most common use of the console is to configure the management network so that the host can be accessed from the network by vCenter and directly by the vSphere client management tool.

There are two primary areas to be highlighted with regard to security:

  • Troubleshooting mode
  • Lockdown mode

Getting ready

ESXi 5.5 must be installed on the physical host, and we must have direct access available to the keyboard and monitor in order to proceed with the local console steps. ESXi is part of the vSphere 5.5 download file and can be found at https://my.vmware.com/web/vmware/evalcenter?p=vsphere-55.

How to do it…

Perform the following steps:

  1. Press any key to wake the server and change the black and gray screen to yellow. Once the system is awake, we need to log in.
  2. Press F2 to enter configuration mode. We'll need to enter the root password by default.
  3. Once the...

Hardening the host via vSphere Client

The most common way to configure the security stance of our ESXi hosts is through the vSphere Client. vSphere Client can be connected directly to a host that is not managed by vCenter or can be connected to vCenter and manage the host centrally. While vSphere 5.5 has features that are only available in the vSphere Web Client, for the purposes of configuring the ESXi host security profile, we'll use the vSphere client.

Getting ready

In order to proceed, we require access to a vSphere Client. The client can be run on any modern Windows desktop operating system or server operating system.

Note

The vSphere 5.5 Client will not run from a Windows Domain Controller.

The vSphere Client can be downloaded from the link provided on the ESXi host web page, in our example http://192.168.10.10, or from www.vmware.com as a component of the vCenter server: https://my.vmware.com/web/vmware/evalcenter?p=vsphere-55.

How to do it…

Perform the following steps:

  1. Open...

Configuring host services

The host services work in concert with the firewall rules to enable or disable a functionality on the ESXi host. Services provided by the vCenter agent allow communication and management of the host by a vCenter server, for example.

The way host services are configured can cause trouble sometimes since we expect to communicate with the host because the port is open, but that is only half of the equation most times. Unlike a Windows server that has services running irrespective of whether they are being used or not, an ESXi host does not have services running that are not called or configured to do so.

Getting ready

In order to proceed, we require access to the vSphere Client. The client can be run on any modern Windows desktop operating system or server operating system.

Note

vSphere Client will not run from a Windows Domain Controller.

vSphere Client can be downloaded by the link provided on the ESXi host web page or from www.vmware.com.

How to do it…

Perform the...

Configuring the host firewall

The ESXi firewall configuration is very similar to many firewalls that we are already familiar with from our day-to-day work duties. It is important to note that even though a port might be configured as open in the firewall configuration, should the corresponding service or daemon be stopped, an unexpected connection error might result. For example, the SSH server port is open by default on a new ESXi build. An SSH connection will fail, however, because the SSH service is not running to respond to the request.

Getting ready

In order to proceed, we require access to vSphere Client. The client can be run on any modern Windows desktop operating system or server operating system.

Note

vSphere Client will not run from a Windows Domain Controller.

The vSphere Client can be downloaded from the link provided on the ESXi host web page or from www.vmware.com.

How to do it…

Perform the following steps:

  1. Navigate to the Configuration tab and select Security Profile.
  2. Click...
Left arrow icon Right arrow icon

Description

This book is intended for virtualization professionals who are experienced with the setup and configuration of VMware vSphere, but didn't get the opportunity to learn how to secure the environment properly.

What you will learn

  • Harden your ESXi host and guest virtual machines to reduce the vulnerabilities in your system
  • Configure vCenter networks and storage security to establish secure virtual networks between environments
  • Install and configure vShield Manager and Data Security to manage antimalware and anitvirus policies for your virtual environments
  • Set up vShield App and Edge, including firewall and VPN configurations to help secure your networks in your environment
  • Use Sophos Antivirus to establish a vShield Endpoint to secure your environment

Product Details

Country selected
Publication date, Length, Edition, Language, ISBN-13
Publication date : Nov 25, 2014
Length: 334 pages
Edition : 1st
Language : English
ISBN-13 : 9781782170358

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
OR
Modal Close icon
Payment Processing...
tick Completed

Billing Address

Product Details

Publication date : Nov 25, 2014
Length: 334 pages
Edition : 1st
Language : English
ISBN-13 : 9781782170358

Packt Subscriptions

See our plans and pricing
Modal Close icon
$19.99 billed monthly
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Simple pricing, no contract
$199.99 billed annually
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just $5 each
Feature tick icon Exclusive print discounts
$279.99 billed in 18 months
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just $5 each
Feature tick icon Exclusive print discounts

Frequently bought together


Stars icon
Total $ 114.98
VMware vRealize Operations Performance and Capacity Management
$48.99
VMware vSphere Security Cookbook
$65.99
Total $ 114.98 Stars icon
Banner background image

Table of Contents

14 Chapters
1. Threat and Vulnerability Overview Chevron down icon Chevron up icon
2. ESXi Host Security Chevron down icon Chevron up icon
3. Configuring Virtual Machine Security Chevron down icon Chevron up icon
4. Configuring User Management Chevron down icon Chevron up icon
5. Configuring Network Security Chevron down icon Chevron up icon
6. Configuring Storage Security Chevron down icon Chevron up icon
7. Configuring vShield Manager Chevron down icon Chevron up icon
8. Configuring vShield App Chevron down icon Chevron up icon
9. Configuring vShield Edge Chevron down icon Chevron up icon
10. Configuring vShield Endpoint Chevron down icon Chevron up icon
11. Configuring vShield Data Security Chevron down icon Chevron up icon
12. Configuring vSphere Certificates Chevron down icon Chevron up icon
13. Configuring vShield VXLAN Virtual Wires Chevron down icon Chevron up icon
Index Chevron down icon Chevron up icon

Customer reviews

Top Reviews
Rating distribution
Full star icon Full star icon Full star icon Full star icon Half star icon 4.5
(10 Ratings)
5 star 50%
4 star 50%
3 star 0%
2 star 0%
1 star 0%
Filter icon Filter
Top Reviews

Filter reviews by




Matteo Jan 21, 2015
Full star icon Full star icon Full star icon Full star icon Full star icon 5
This book will let you walk through most of the basic vSphere security guidelines without going insane. Everything is explained very thoroughly both on how and why you set all the settings, along with explanation links to the interested parties(VMware, NIST, etc.). VMware knowledge is required but the book is written without throwing you code or dropping you into a problem and just providing the answer. The book is based on 5.5 so you need to have a relatively recent compute farm(which you should do anyway if you plan on being secure) to execute on the books suggestions as most of the steps are explained with the new vSphere Web Client(most of it can be done with vSphere client on older versions but the steps may be different).
Amazon Verified review Amazon
L R E Mar 21, 2015
Full star icon Full star icon Full star icon Full star icon Full star icon 5
This book is comprehensive and in-depth and really helped me to better understand cyber threats and how vSphere has capabilities in place that allow it to be more secure and less prone to attack. I particularly liked the vShield installation and configuration instructions. The book was well written and easy to comprehend, the author is cognizant of the intended audience and provides enough explanation that aided in readability by providing clear and concise instructions with screenshots and practical considerations for implementation. This book didn't just cover securing ESXi hosts, but also delved into securing virtual machine, storage and network resources. This book would be an excellent book for people who are interested in properly securing their ESXi environment.
Amazon Verified review Amazon
Michael J. Mcshane Mar 12, 2015
Full star icon Full star icon Full star icon Full star icon Full star icon 5
This is a well written guide on administration and security for vSphere. The book starts with an overview of threats and vulnerabilities. The book then gets right into Hardening security for esx hosts and vSphere clients. The book is geared to "virtualization professionals who are experienced with VMware vSphere setup and configuration” but I found the chapters to be packed with plenty of screenshots and code samples. I particularly got a lot out of the chapters on configuring vSphere certificates.All and all the book is a solid guide and well worth the read and adding to your admin library.
Amazon Verified review Amazon
Paul Moore Mar 12, 2015
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Unlike many other Technical Manuals, this book does not make the assumption that the reader is a VMware veteran, nor does it treat the reader like they have never seen a computer. The information provided in the book is more that adequate for someone starting out, and still provides the details and explanations required by a more experienced reader. I do not fully agree with other reviewers that have stated that the book was written for Beginners to Intermediates. While this book is not written for VMware VCPs with years of Security experience, I do think that this book would be a great resource and reference point for anyone, at any level. Even experts need to be reminded of some of the more standard security practices!
Amazon Verified review Amazon
Fouad Kazma Mar 13, 2015
Full star icon Full star icon Full star icon Full star icon Full star icon 5
This book is an excellent resource for securing VMware hosts and guests.It is very concise and I learned quite a bid from it. What I liked particularly is the vShield chapters since I recently started to work with it. Overall it is a great reference book.
Amazon Verified review Amazon
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

How do I buy and download an eBook? Chevron down icon Chevron up icon

Where there is an eBook version of a title available, you can buy it from the book details for that title. Add either the standalone eBook or the eBook and print book bundle to your shopping cart. Your eBook will show in your cart as a product on its own. After completing checkout and payment in the normal way, you will receive your receipt on the screen containing a link to a personalised PDF download file. This link will remain active for 30 days. You can download backup copies of the file by logging in to your account at any time.

If you already have Adobe reader installed, then clicking on the link will download and open the PDF file directly. If you don't, then save the PDF file on your machine and download the Reader to view it.

Please Note: Packt eBooks are non-returnable and non-refundable.

Packt eBook and Licensing When you buy an eBook from Packt Publishing, completing your purchase means you accept the terms of our licence agreement. Please read the full text of the agreement. In it we have tried to balance the need for the ebook to be usable for you the reader with our needs to protect the rights of us as Publishers and of our authors. In summary, the agreement says:

  • You may make copies of your eBook for your own use onto any machine
  • You may not pass copies of the eBook on to anyone else
How can I make a purchase on your website? Chevron down icon Chevron up icon

If you want to purchase a video course, eBook or Bundle (Print+eBook) please follow below steps:

  1. Register on our website using your email address and the password.
  2. Search for the title by name or ISBN using the search option.
  3. Select the title you want to purchase.
  4. Choose the format you wish to purchase the title in; if you order the Print Book, you get a free eBook copy of the same title. 
  5. Proceed with the checkout process (payment to be made using Credit Card, Debit Cart, or PayPal)
Where can I access support around an eBook? Chevron down icon Chevron up icon
  • If you experience a problem with using or installing Adobe Reader, the contact Adobe directly.
  • To view the errata for the book, see www.packtpub.com/support and view the pages for the title you have.
  • To view your account details or to download a new copy of the book go to www.packtpub.com/account
  • To contact us directly if a problem is not resolved, use www.packtpub.com/contact-us
What eBook formats do Packt support? Chevron down icon Chevron up icon

Our eBooks are currently available in a variety of formats such as PDF and ePubs. In the future, this may well change with trends and development in technology, but please note that our PDFs are not Adobe eBook Reader format, which has greater restrictions on security.

You will need to use Adobe Reader v9 or later in order to read Packt's PDF eBooks.

What are the benefits of eBooks? Chevron down icon Chevron up icon
  • You can get the information you need immediately
  • You can easily take them with you on a laptop
  • You can download them an unlimited number of times
  • You can print them out
  • They are copy-paste enabled
  • They are searchable
  • There is no password protection
  • They are lower price than print
  • They save resources and space
What is an eBook? Chevron down icon Chevron up icon

Packt eBooks are a complete electronic version of the print edition, available in PDF and ePub formats. Every piece of content down to the page numbering is the same. Because we save the costs of printing and shipping the book to you, we are able to offer eBooks at a lower cost than print editions.

When you have purchased an eBook, simply login to your account and click on the link in Your Download Area. We recommend you saving the file to your hard drive before opening it.

For optimal viewing of our eBooks, we recommend you download and install the free Adobe Reader version 9.