Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
vsp_41_esx_server_config.pdf
Скачиваний:
10
Добавлен:
06.02.2016
Размер:
2.67 Mб
Скачать

ESX Configuration Guide

In most cases, you do not need to change default firewall rules for the service console. If you modify the defaults by using a Linux command, your changes will be ignored and overwritten by the defaults specified for that service by the esxcfg-firewall command. If you want to change the defaults for a supported service, or define defaults for additional service types, you can modify or add to the rules

in /etc/vmware/firewall/chains/default.xml.

Procedure

1Log in to the service console with administrator privileges.

2 Edit the /etc/vmware/firewall/chains/default.xml file to correspond to your security policies.

3Restart the service console firewall by using service firewall restart command.

4Use the esxcfg-firewall-e|d SERVICEcommandtocheckthatthespecifiedservicesarecorrectlyenabled or disabled.

Example: Modifying the INPUT Chain

You can modify the firewall defaults for each of the service types according to your own security policies. For example, the following rules in the /etc/vmware/firewall/chains/default.xml file determine the firewall rules for the INPUT chain:

<ConfigRoot>

<chain name="INPUT">

<rule>-p tcp --dport 80 -j ACCEPT</rule> <rule>-p tcp --dport 110 -j ACCEPT</rule> <rule>-p tcp --dport 25 -j ACCEPT</rule>

</chain>...

</ConfigRoot>

Password Restrictions

The ease with which an attacker can log in to an ESX host depends on finding a legitimate user name and password combination. You can set password restrictions to help prevent attackers from obtaining user passwords.

A malicious user can obtain a password in a number of ways. For example, an attacker can sniff insecure network traffic, such as Telnet or FTP transmissions, for successful login attempts. Another common method is to crack the password by running a password generator to try every character combination up to a certain length or use real words and simple mutations of real words.

Implementing restrictions that govern the length, character sets, and duration of passwords can make attacks that a password generator initiates more difficult. The longer and more complex the password, the harder it is for an attacker to discover. The more often users have to change passwords, the more difficult it is to find a password that works repeatedly.

NOTE Always consider the human factor when you decide how to implement password restrictions. If you make passwords too hard to remember or enforce frequent password changes, your users might be inclined to write down their passwords, which eliminates any benefit.

To help protect your password database from misuse, password shadowing is enabled so that password hashes are hidden from access. Also, ESX uses MD5 password hashes, which provide stronger password security and lets you set minimum length requirements to more than eight characters.

196

VMware, Inc.

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]