ESXI-65-000049 - The ESXi host must protect the confidentiality and integrity of transmitted information by protecting ESXi management traffic.

Information

The vSphere management network provides access to the vSphere management interface on each component. Services running on the management interface provide an opportunity for an attacker to gain privileged access to the systems. Any remote attack most likely would begin with gaining entry to this network.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

From the vSphere Web Client select the ESXi host and go to Configure >> Networking >> VMkernel adapters. Select the Management VMkernel and click Edit settings >> On the Port properties tab uncheck everything but 'Management.' On the IP Settings tab >> Enter the appropriate IP address and subnet information and click OK. Set the appropriate VLAN ID >> Configure >> Networking >> Virtual switches. Select the Management portgroup and click Edit settings >> On the properties tab, enter the appropriate VLAN ID and click OK.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_6-5_Y20M04_STIG.zip

Item Details

References: CAT|II, CCI|CCI-002418, Rule-ID|SV-109647r1_rule, STIG-ID|ESXI-65-000049, Vuln-ID|V-100543

Plugin: VMware

Control ID: 52686658fa83af26a05c10a4710c3191683534a6c745e3fbcf96052394ee7826