6.0.3

Table Of Contents
Procedure
1 Access the appliance shell and log in as a user who has the administrator or super administrator role.
The default user with super administrator role is root.
2 Run the command to enable NTP-based time synchronization.
timesync.set --mode NTP
3 (Optional) Run the command to verify that you successfully applied the NTP synchronization.
timesync.get
The command returns that the time synchronization is in NTP mode.
Storage Security Best Practices
Follow best practices for storage security, as outlined by your storage security provider. You can also take
advantage of CHAP and mutual CHAP to secure iSCSI storage, mask and zone SAN resources, and
congure Kerberos credentials for NFS 4.1.
See also the Administering VMware Virtual SAN documentation.
Securing iSCSI Storage
The storage you congure for a host might include one or more storage area networks (SANs) that use
iSCSI. When you congure iSCSI on a host, you can take several measures to minimize security risks.
iSCSI is a means of accessing SCSI devices and exchanging data records by using TCP/IP over a network
port rather than through a direct connection to a SCSI device. In iSCSI transactions, blocks of raw SCSI data
are encapsulated in iSCSI records and transmied to the requesting device or user.
iSCSI SANs let you make ecient use of existing Ethernet infrastructures to provide hosts access to storage
resources that they can dynamically share. iSCSI SANs provide an economical storage solution for
environments that rely on a common storage pool to serve numerous users. As with any networked system,
your iSCSI SANs can be subject to security breaches.
N The requirements and procedures for securing an iSCSI SAN are similar for the hardware iSCSI
adapters you can use with hosts and for iSCSI congured directly through the host.
Securing iSCSI Devices
One means of securing iSCSI devices from unwanted intrusion is to require that the host, or initiator, be
authenticated by the iSCSI device, or target, whenever the host aempts to access data on the target LUN.
The goal of authentication is to prove that the initiator has the right to access a target, a right granted when
you congure authentication.
ESXi does not support Secure Remote Protocol (SRP), or public-key authentication methods for iSCSI. You
can use Kerberos only with NFS 4.1.
ESXi supports both CHAP and Mutual CHAP authentication. the vSphere Storage documentation explains
how to select the best authentication method for your iSCSI device and how to set up CHAP.
Ensure uniqueness of CHAP secrets. The mutual authentication secret for each host should be dierent; if
possible, the secret should be dierent for each client authenticating to the server as well. This ensures that if
a single host is compromised, an aacker cannot create another arbitrary host and authenticate to the
storage device. With a single shared secret, compromise of one host can allow an aacker to authenticate to
the storage device.
vSphere Security
250 VMware, Inc.