6.0.3

Table Of Contents
2 Enter the idle timeout, in seconds.
You must restart the SSH service and the ESXi Shell service for the timeout to take eect.
3 Press Enter and press Esc until you return to the main menu of the Direct Console User Interface.
If the session is idle, users are logged out after the timeout period elapses.
Log in to the ESXi Shell for Troubleshooting
Perform ESXi conguration tasks with the vSphere Web Client. the vSphere CLI, or vSphere PowerCLI. Log
in to the ESXi Shell (formerly Tech Support Mode or TSM) for troubleshooting purposes only.
Procedure
1 Log in to the ESXi Shell using one of the following methods.
n
If you have direct access to the host, press Alt+F1 to open the login page on the machine's physical
console.
n
If you are connecting to the host remotely, use SSH or another remote console connection to start a
session on the host.
2 Enter a user name and password recognized by the host.
Modifying ESXi Web Proxy Settings
When you modify Web proxy seings, you have several encryption and user security guidelines to consider.
N Restart the host process after making any changes to host directories or authentication mechanisms.
n
Do not set up certicates that use a password or pass phrases. ESXi does not support Web proxies that
use passwords or pass phrases, also known as encrypted keys. If you set up a Web proxy that requires a
password or pass phrase, ESXi processes cannot start correctly.
n
To support encryption for user names, passwords, and packets, SSL is enabled by default for vSphere
Web Services SDK connections. If you want to congure these connections so that they do not encrypt
transmissions, disable SSL for your vSphere Web Services SDK connection by switching the connection
from HTTPS to HTTP.
Consider disabling SSL only if you created a fully trusted environment for these clients, where rewalls
are in place and transmissions to and from the host are fully isolated. Disabling SSL can improve
performance, because you avoid the overhead required to perform encryption.
n
To protect against misuse of ESXi services, most internal ESXi services are accessible only through port
443, the port used for HTTPS transmission. Port 443 acts as a reverse proxy for ESXi. You can see a list of
services on ESXi through an HTTP welcome page, but you cannot directly access the Storage Adapters
services without proper authorization.
You can change this conguration so that individual services are directly accessible through HTTP
connections. Do not make this change unless you are using ESXi in a fully trusted environment.
n
When you upgrade your environment, the certicate remains in place.
Chapter 5 Securing ESXi Hosts
VMware, Inc. 205