Specifications
VMware, Inc. 73
Chapter 5 System Configuration
ManagingStorage–Explainshowtomanageexistingdatastoresandthefile
systemsthatcomprisedatastores.
RawDeviceMapping–Discussesrawdevicemapping,howtoconfigurethistype
ofstorage,andhowtomanagerawdevicemappingsbysettingupmultipathing,
failover,andsoforth.
Viewing Security Configuration Information
TheESXServersecuritychaptersoftheESXServer3ConfigurationGuideandESXServer
3iConfigurationGuidediscusssafeguardsVMwarehasbuiltintoESXServerand
measuresyoucantaketoprotectyourESXServerhostfromsecuritythreats.These
measuresincludeusingfirewalls,leveragingthesecurityfeaturesofvirtual
switches,
andsettingupuserauthenticationandpermissions.Thesecuritysectioncontainsthe
followingchapters:
SecurityforESXServerSystems–IntroducesyoutotheESXServ erfeaturesthat
helpyouensureasecureenvironmentforyourdataandgivesyouanoverviewof
systemdesignasitrelatestosecurity.
SecuringanESXServerConfiguration–Explainshowtoconfigurefirewallports
forESXServerhostsandVMwareVirtualCenter,howtousevirtualswitchesand
VLANstoensurenetworkisolationforvirtualmachines,andhowtosecureiSCSI
storage.
AuthenticationandUserManagement–Discusseshowtosetupusers,groups,
permissions,androlestocontrolaccesstoESXServerhostsandVirtualCenter.It
alsodiscussesencryptionanddelegateusers.
ServiceConsoleSecurity–(IntheESXServer3ConfigurationGuideonly)Discusses
thesecurityfeaturesbuiltintotheserviceconsoleandshowsyouhowtoconfigure
thesefeatures.
SecurityDeploymentsandRecommendations–Providessomesample
deploymentstogiv eyouanideaoftheissuesyoumustconsiderwhensettingup
yourownESXServerdeployment.Thischapteralsotellsyouaboutactionsyou
cantaketofurthersecurevirtualmachines.