Reference Guide
Table Of Contents
- OpenManage Integration for VMware vCenter version 5.2 Security Configuration Guide
- Figures
- Tables
- PREFACE
- Deployment models
- Product and Subsystem Security
- Security controls map
- Authentication
- Login security settings
- Authentication types and setup considerations
- User and credential management
- Network security
- Data security
- Cryptography
- Auditing and logging
- Serviceability
- OMIVV OS update
- Product code integrity
- Miscellaneous Configuration and Management
Table 5. Outbound ports
Port number Layer 4 Protocol Service
587 TCP SMTP
636 TCP, UDP LDAPS
902 TCP VMware ESXi
2049 TCP, UDP NFS
2052 TCP, UDP mountd, clearvisn
3009 TCP Data Domain REST API
5672 TCP RabbitMQ over amqp
8443 TCP MCSDK 8443 is an alternative for 443
9002 TCP Data Protection Advisor REST API
9443 TCP Avamar Management Console web
service
Inbound ports
The inbound ports that are available to be used by a remote system when connecting to OMIVV.
The ports that are listed in the following table are the OMIVV inbound ports.
Table 6. Inbound ports
Port number Layer 4 Protocol Service
22 TCP SSH
80 TCP HTTP
443 TCP HTTPS
5671 TCP RabbitMQ over amqp
Data security
The data that is maintained by OMIVV is stored and secured in internal databases within the appliance and it cannot be
accessed from outside.
The data that is in transit through OMIVV is secured by secure communication channel.
Cryptography
OMIVV uses cryptography for the following components:
● Access control
● Authentication
● Digital signatures
Manage certificate
OMIVV uses certificates for secure HTTP access (HTTPS).
By default, OMIVV installs and uses the self-signed certificate for the HTTPS secure transactions.
For stronger security, it is recommended to use the Certificate Authority (CA) signed or custom certificates.
Product and Subsystem Security
19