Reference Guide

.................................................................................................................................................. 5
.................................................................................................................................................. 6
1: 前書き..................................................................................................................................... 7
2: 導入モデル.............................................................................................................................. 8
プン仮想化フォマット(OVF)の導入................................................................................................................ 8
セキュリティ プロファイル.............................................................................................................................................. 8
3: 製品およびサブシステムのセキュリティ..................................................................................... 9
セキュリティ制御マップ....................................................................................................................................................9
認証........................................................................................................................................................................................10
アクセス制御................................................................................................................................................................. 10
デフォルト アカウント............................................................................................................................... 10
ログイン セキュリティ設定.............................................................................................................................................10
ログインが失敗した際の動作....................................................................................................................................10
カル アカウントのロックアウト........................................................................................................11
自動セッション タイムアウト....................................................................................................................................11
認証の種類とセットアップにする考慮事項............................................................................................................. 11
vCenter 認証.................................................................................................................................................... 11
新しい vCenter の登.................................................................................................................................. 11
非管理者アカウントを使用した vCenter の登....................................................................................12
Administrator 以外のユに必要な.............................................................................................................13
存の役割へのデルの限の割り................................................................................................................... 14
vCenter セキュリティ..................................................................................................................................14
および認証情報の管理....................................................................................................................................... 16
プリロみアカウント......................................................................................................................................... 17
デフォルト資格情報.....................................................................................................................................................17
認証情報の管理............................................................................................................................................................. 17
許可..................................................................................................................................................................................18
ネットワクセキュリティ...............................................................................................................................................18
ネットワクの露出..................................................................................................................................................... 18
アウトバウンド ................................................................................................................................................ 18
インバウンド .................................................................................................................................................... 19
セキュリティ.......................................................................................................................................................... 19
................................................................................................................................................................................... 19
証明書の管理................................................................................................................................................................ 20
監査とログ........................................................................................................................................................................... 21
トラブルシュティング バンドルの作成およびダウンロ.......................................................................... 21
ビス化........................................................................................................................................................................... 22
セキュリティ パッチ...................................................................................................................................................22
OMIVV OS アップデ...................................................................................................................................................22
製品コドの整合性.......................................................................................................................................................... 22
目次
目次 3