1. Home
  2. Security Hardening
  3. DISA STIG VMware vSphere ESXi OS 6.5 V2R3
  4. ESXI-65-000056 – The ESXi host must configure the firewall to restrict access to services running on the host.

ESXI-65-000056 – The ESXi host must configure the firewall to restrict access to services running on the host.

Details

Unrestricted access to services running on an ESXi host can expose a host to outside attacks and unauthorized access. Reduce the risk by configuring the ESXi firewall to only allow access from authorized networks.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

From the vSphere Web Client select the ESXi Host and go to Configure >> System >> Security Profile. Under the Firewall section click Edit and for each enabled service uncheck the check box to ‘Allow connections from any IP address,’ and input the site specific network(s) required.Configure this for Incoming and Outgoing connections.

or

From a PowerCLI command prompt while connected to the ESXi host run the following command:

$esxcli = Get-EsxCli
#This disables the allow all rule for the target service
$esxcli.network.firewall.ruleset.set($false,$true,’sshServer’)
$esxcli.network.firewall.ruleset.allowedip.add(‘192.168.0.0/24′,’sshServer’)

This must be done for each enabled service.

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Configuration Management.This control applies to the following type of system Unix.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles