Reference Guide

Table Of Contents
.................................................................................................................................................. 5
.................................................................................................................................................. 6
1: 前書き..................................................................................................................................... 7
2: 本書で使用される用語.............................................................................................................. 8
3: 導入モデル.............................................................................................................................. 9
プン仮想化フォマット(OVF)の導入................................................................................................................9
セキュリティ プロファイル.............................................................................................................................................. 9
4: 製品およびサブシステムのセキュリティ.................................................................................... 10
セキュリティ制御マップ.................................................................................................................................................. 10
認証........................................................................................................................................................................................ 11
アクセス制御..................................................................................................................................................................11
デフォルト アカウント................................................................................................................................11
ログイン セキュリティ設定..............................................................................................................................................11
ログインが失敗した際の動作.....................................................................................................................................11
カル アカウントのロックアウト.......................................................................................................12
自動セッション タイムアウト...................................................................................................................................12
認証の種類とセットアップにする考慮事項.............................................................................................................12
vCenter 認証................................................................................................................................................... 12
新しい vCenter の登..................................................................................................................................12
非管理者アカウントを使用した vCenter の登....................................................................................13
Administrator 以外のユに必要な.............................................................................................................14
存の役割への Dell 限の割り................................................................................................................... 15
vCenter セキュリティ..................................................................................................................................15
および認証情報の管理....................................................................................................................................... 17
プリロみアカウント......................................................................................................................................... 17
デフォルト資格情報.....................................................................................................................................................18
認証情報の管理.............................................................................................................................................................18
許可..................................................................................................................................................................................19
ネットワクセキュリティ...............................................................................................................................................19
ネットワクの露出..................................................................................................................................................... 19
アウトバウンド ................................................................................................................................................ 19
インバウンド ................................................................................................................................................... 20
セキュリティ......................................................................................................................................................... 20
...................................................................................................................................................................................20
証明書の管理................................................................................................................................................................. 21
監査とログ.......................................................................................................................................................................... 22
トラブルシュティング バンドルの作成およびダウンロ......................................................................... 22
ビス化........................................................................................................................................................................... 23
セキュリティ パッチ...................................................................................................................................................23
OMIVV OS アップデ...................................................................................................................................................23
目次
目次 3