STIGQter STIGQter: STIG Summary: VMware vSphere 6.7 ESXi Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 09 Mar 2021:

The ESXi host must configure the firewall to restrict access to services running on the host.

DISA Rule

SV-239310r674859_rule

Vulnerability Number

V-239310

Group Title

SRG-OS-000480-VMM-002000

Rule Version

ESXI-67-000056

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

From the vSphere Client, select the ESXi host and go to Configure >> System >> Firewall.

Under the "Firewall" section, click "Edit".

For each enabled service, uncheck the check box to “Allow connections from any IP address” and input the site-specific network(s) required.

Configure this for incoming and outgoing connections.

The following example formats are acceptable:

192.168.0.0/24
192.168.1.2, 2001::1/64
fd3e:29a6:0a81:e478::/64

or

From a PowerCLI command prompt while connected to the ESXi host, run the following command:

$esxcli = Get-EsxCli -v2
#This disables the allow all rule for the target service. We are targeting the sshServer service in this example.
$arguments = $esxcli.network.firewall.ruleset.set.CreateArgs()
$arguments.rulesetid = "sshServer"
$arguments.allowedall = $false
$esxcli.network.firewall.ruleset.set.Invoke($arguments)

#Next add the allowed IPs for the service. Note doing the "vSphere Web Client" service this way may disable access but may be done through vCenter or through the console.
$arguments = $esxcli.network.firewall.ruleset.allowedip.add.CreateArgs()
$arguments.rulesetid = "sshServer"
$arguments.ipaddress = "10.0.0.0/8"
$esxcli.network.firewall.ruleset.allowedip.add.Invoke($arguments)

This must be done for each enabled service.

Check Contents

From the vSphere Client, select the ESXi host and go to Configure >> System >> Firewall.

Under the "Firewall" section, click "Edit".

For each enabled service, click "Firewall" and review the allowed IPs.

Check this for incoming and outgoing connections.

or

From a PowerCLI command prompt while connected to the ESXi host, run the following command:

Get-VMHost | Get-VMHostFirewallException | Where {$_.Enabled -eq $true} | Select Name,Enabled,@{N="AllIPEnabled";E={$_.ExtensionData.AllowedHosts.AllIP}}

If for an enabled service "Allow connections from any IP address" is selected, this is a finding.

Vulnerability Number

V-239310

Documentable

False

Rule Version

ESXI-67-000056

Severity Override Guidance

From the vSphere Client, select the ESXi host and go to Configure >> System >> Firewall.

Under the "Firewall" section, click "Edit".

For each enabled service, click "Firewall" and review the allowed IPs.

Check this for incoming and outgoing connections.

or

From a PowerCLI command prompt while connected to the ESXi host, run the following command:

Get-VMHost | Get-VMHostFirewallException | Where {$_.Enabled -eq $true} | Select Name,Enabled,@{N="AllIPEnabled";E={$_.ExtensionData.AllowedHosts.AllIP}}

If for an enabled service "Allow connections from any IP address" is selected, this is a finding.

Check Content Reference

M

Target Key

5326

Comments