ESXI-67-000049 - The ESXi host must protect the confidentiality and integrity of transmitted information by protecting ESXi management traffic.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

The vSphere management network provides access to the vSphere management interface on each component. Services running on the management interface provide an opportunity for an attacker to gain privileged access to the systems. Any remote attack most likely would begin with gaining entry to this network.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

From the vSphere Client, select the ESXi host and go to Configure >> Networking >> VMkernel adapters.

Select the Management VMkernel and click 'Edit'.

On the Port properties tab, uncheck everything but 'Management.'

On the IP Settings tab, enter the appropriate IP address and subnet information and click 'OK'.

Set the appropriate VLAN ID >> Configure >> Networking >> Virtual switches.

Select the Management portgroup and click 'Edit'.

On the properties tab, enter the appropriate VLAN ID and click 'OK'.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_6-7_STIG.zip

Item Details

References: CAT|II, CCI|CCI-002418, Rule-ID|SV-239304r674841_rule, STIG-ID|ESXI-67-000049, Vuln-ID|V-239304

Plugin: VMware

Control ID: fa24573dae2b4c157f37419ff3842d81364ca1a9ccdf3ffff3f7afab0cd80b6c