6.5.1

Table Of Contents
vSphere HA Security
vSphere HA is enhanced by several security features.
Select firewall ports
opened
vSphere HA uses TCP and UDP port 8182 for agent-to-agent communication.
The rewall ports open and close automatically to ensure they are open only
when needed.
Configuration files
protected using file
system permissions
vSphere HA stores conguration information on the local storage or on
ramdisk if there is no local datastore. These les are protected using le
system permissions and they are accessible only to the root user. Hosts
without local storage are only supported if they are managed by Auto
Deploy.
Detailed logging
The location where vSphere HA places log les depends on the version of
host.
n
For ESXi 5.x hosts, vSphere HA writes to syslog only by default, so logs
are placed where syslog is congured to put them. The log le names for
vSphere HA are prepended with fdm, fault domain manager, which is a
service of vSphere HA.
n
For legacy ESXi 4.x hosts, vSphere HA writes to /var/log/vmware/fdm on
local disk, as well as syslog if it is congured.
n
For legacy ESX 4.x hosts, vSphere HA writes to /var/log/vmware/fdm.
Secure vSphere HA
logins
vSphere HA logs onto the vSphere HA agents using a user account, vpxuser,
created by vCenter Server. This account is the same account used by vCenter
Server to manage the host. vCenter Server creates a random password for
this account and changes the password periodically. The time period is set by
the vCenter Server VirtualCenter.VimPasswordExpirationInDays
seing. Users with administrative privileges on the root folder of the host can
log in to the agent.
Secure communication
All communication between vCenter Server and the vSphere HA agent is
done over SSL. Agent-to-agent communication also uses SSL except for
election messages, which occur over UDP. Election messages are veried
over SSL so that a rogue agent can prevent only the host on which the agent
is running from being elected as a master host. In this case, a conguration
issue for the cluster is issued so the user is aware of the problem.
Host SSL certificate
verification required
vSphere HA requires that each host have a veried SSL certicate. Each host
generates a self-signed certicate when it is booted for the rst time. This
certicate can then be regenerated or replaced with one issued by an
authority. If the certicate is replaced, vSphere HA needs to be recongured
on the host. If a host becomes disconnected from vCenter Server after its
certicate is updated and the ESXi or ESX Host agent is restarted, then
vSphere HA is automatically recongured when the host is reconnected to
vCenter Server. If the disconnection does not occur because vCenter Server
host SSL certicate verication is disabled at the time, verify the new
certicate and recongure vSphere HA on the host.
vSphere Availability
18 VMware, Inc.