ESXI-06-000056 - The system must configure the firewall to restrict access to services running on the host.

Information

Unrestricted access to services running on an ESXi host can expose a host to outside attacks and unauthorized access. Reduce the risk by configuring the ESXi firewall to only allow access from authorized networks.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

From the vSphere Client select the ESXi Host and go to Configuration >> Security Profile. Under the Firewall section select properties and for each enabled service click the 'Only allow connections from the following networks' option and input the site specific network(s).

or

From a PowerCLI command prompt while connected to the ESXi host run the following command:

$esxcli = Get-EsxCli
#This disables the allow all rule for the target service
$esxcli.network.firewall.ruleset.set($false,$true,'sshServer')
$esxcli.network.firewall.ruleset.allowedip.add('192.168.0.0/24','sshServer')

This must be done for each enabled service.

See Also

http://iasecontent.disa.mil/stigs/zip/U_VMware_vSphere_6-0_ESXi_V1R5_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Group-ID|V-63281, Rule-ID|SV-77771r1_rule, STIG-ID|ESXI-06-000056, Vuln-ID|V-63281

Plugin: Unix

Control ID: 9a24c656064d6a1d917e7bad8d02a86188398b25fd2965de6a04aaa7605f4eee