UCF STIG Viewer Logo

ESX Server firewall is not configured to High Security.


Overview

Finding ID Version Rule ID IA Controls Severity
V-15824 ESX0320 SV-16763r1_rule Medium
Description
ESX Server includes a built in firewall between the service console and the network. To ensure the integrity of the service console, VMware has reduced the number of firewall ports that are open by default. At installation time, the service console firewall is configured to block all incoming and outgoing traffic except for ports 902, 80, 443, and 22, which are used for basic communication with ESX Server. This setting enforces a high level of security for the ESX Server host. Medium Security blocks all incoming traffic except on the default ports (902, 443, 80, and 22), and any ports users specifically open. Outgoing traffic is not blocked. Low Security does not block either incoming or outgoing traffic. This setting is equivalent to removing the firewall. Because the ports open by default on the ESX Server are strictly limited, additional ports may need to be open after installation for third party applications such as management, storage, NTP, etc. For instance, a backup agent may use specific ports such as 13720, 13724, 13782, and 13783.
STIG Date
VMware ESX 3 Server 2016-05-13

Details

Check Text ( C-16164r1_chk )
1. Log into VirtualCenter with the VI Client and select the ESX server from the Inventory panel.
2. Click the Configuration tab and click Security Profile.
The VI Client displays a list of currently active incoming and outgoing connections with the
corresponding firewall ports.
3. Click Properties to open the Properties dialog box.
The Firewall Properties dialog box lists all the services and management agents that are
configured for the host.
4. If you do not see the Firewall Properties window, then check proceed to step 7.
5. Review the services enabled to ensure that only the following ports are open:
Ports that may be open for High Security: 902, 80, 443, and 22. If only these ports are open,
this is not a finding.
6. If there are other ports that are open, request the documentation from the IAO/SA that details
the reasons for the additional ports are required. If no documentation can be produced,
this is a finding.
7. Verify IPtables are configured on the ESX Server service console by performing the following:

# iptables –L | grep hostd

The displayed result should look similar to the following:

iptables –A INPUT -d –p tcp –dport 443 –j Accept //hostd
iptables –A INPUT -d –p tcp –dport 80 –j Accept //hostd

# iptables –L | grep authd

The displayed result should look similar to the following:

iptables –A INPUT -d –p tcp –dport 902 –j Accept //authd

# iptables –L | grep snmpd

The displayed result should look similar to the following:

iptables –A INPUT -d –p tcp –dport 161 –j Accept //snmpd

At the bottom of the INPUT chain you should see the following:

iptables –A INPUT –j REJECT //deny all rule at end of chain

If no rules are applied to the INPUT chain for these services, this is a finding.

If this cannot be verified, this is a finding.

Caveat: Medium Security may be used only if additional ports are required to be open and it has been approved and documented by the IAO/SA.
Fix Text (F-15776r1_fix)
Configure the ESX Server firewall to High Security.