SV-239310r674859_rule
V-239310
SRG-OS-000480-VMM-002000
ESXI-67-000056
CAT II
10
From the vSphere Client, select the ESXi host and go to Configure >> System >> Firewall.
Under the "Firewall" section, click "Edit".
For each enabled service, uncheck the check box to “Allow connections from any IP address” and input the site-specific network(s) required.
Configure this for incoming and outgoing connections.
The following example formats are acceptable:
192.168.0.0/24
192.168.1.2, 2001::1/64
fd3e:29a6:0a81:e478::/64
or
From a PowerCLI command prompt while connected to the ESXi host, run the following command:
$esxcli = Get-EsxCli -v2
#This disables the allow all rule for the target service. We are targeting the sshServer service in this example.
$arguments = $esxcli.network.firewall.ruleset.set.CreateArgs()
$arguments.rulesetid = "sshServer"
$arguments.allowedall = $false
$esxcli.network.firewall.ruleset.set.Invoke($arguments)
#Next add the allowed IPs for the service. Note doing the "vSphere Web Client" service this way may disable access but may be done through vCenter or through the console.
$arguments = $esxcli.network.firewall.ruleset.allowedip.add.CreateArgs()
$arguments.rulesetid = "sshServer"
$arguments.ipaddress = "10.0.0.0/8"
$esxcli.network.firewall.ruleset.allowedip.add.Invoke($arguments)
This must be done for each enabled service.
From the vSphere Client, select the ESXi host and go to Configure >> System >> Firewall.
Under the "Firewall" section, click "Edit".
For each enabled service, click "Firewall" and review the allowed IPs.
Check this for incoming and outgoing connections.
or
From a PowerCLI command prompt while connected to the ESXi host, run the following command:
Get-VMHost | Get-VMHostFirewallException | Where {$_.Enabled -eq $true} | Select Name,Enabled,@{N="AllIPEnabled";E={$_.ExtensionData.AllowedHosts.AllIP}}
If for an enabled service "Allow connections from any IP address" is selected, this is a finding.
V-239310
False
ESXI-67-000056
From the vSphere Client, select the ESXi host and go to Configure >> System >> Firewall.
Under the "Firewall" section, click "Edit".
For each enabled service, click "Firewall" and review the allowed IPs.
Check this for incoming and outgoing connections.
or
From a PowerCLI command prompt while connected to the ESXi host, run the following command:
Get-VMHost | Get-VMHostFirewallException | Where {$_.Enabled -eq $true} | Select Name,Enabled,@{N="AllIPEnabled";E={$_.ExtensionData.AllowedHosts.AllIP}}
If for an enabled service "Allow connections from any IP address" is selected, this is a finding.
M
5326