封面
版权页
Credits
About the Author
About the Reviewers
www.PacktPub.com
Support files eBooks discount offers and more
Preface
What this book covers
What you need for this book
Who this book is for
Conventions
Reader feedback
Customer support
Chapter 1. Threat and Vulnerability Overview
Introduction
Risk overview
Hypervisor threats
Hypervisor vulnerabilities
Guest virtual machine threats
Guest virtual machine vulnerabilities
Network threats
Network vulnerabilities
Storage threats
Storage vulnerabilities
Physical threats
Physical vulnerabilities
Security concepts
Summary
Chapter 2. ESXi Host Security
Introduction
Hardening the host via Console
Hardening the host via vSphere Client
Configuring host services
Configuring the host firewall
Chapter 3. Configuring Virtual Machine Security
Introduction
Configuring administrative access options
Securing the guest OS
Guest virtual machine hardening
Configuring virtual machine resource isolation
Configuring the standard image templates
Managing snapshots
Chapter 4. Configuring User Management
Introduction
Configuring vCenter Single Sign-On
Managing Single Sign-On users with vSphere Web Client
Configuring Active Directory integration
Managing Active Directory users and groups
Assigning permissions
Assigning administrative roles
Chapter 5. Configuring Network Security
Introduction
Configuring Standard vSwitch security
Configuring the port group security
Configuring VLANs
Creating DMZ networks
Providing Distributed vSwitch security options
Configuring PVLANs
Chapter 6. Configuring Storage Security
Introduction
Configuring network isolation
Configuring iSCSI security
Configuring Header and Data Digest
Chapter 7. Configuring vShield Manager
Introduction
Installing vShield Manager OVA
Configuring vShield Manager settings
Adding vShield licensing to vCenter
Configuring SSL Security for Web Manager
Configuring Single Sign-On
Configuring user accounts and roles
Configuring services and service groups
Chapter 8. Configuring vShield App
Introduction
Installing vShield App
Configuring vShield App using the Web Console
Configuring vShield App Flow Monitoring
Configuring vShield App Firewall
Configuring vShield App SpoofGuard
Chapter 9. Configuring vShield Edge
Introduction
Installing vShield Edge
Managing appliances
Managing interfaces
Managing certificates and revocation lists
Managing firewall rules
Managing NAT rules and static routes
Managing the IPSec VPN service
Managing SSL VPN-Plus
Configuring the load-balancing service
Chapter 10. Configuring vShield Endpoint
Introduction
Installing vShield Endpoint
Configuring vShield Endpoint using an antivirus
Chapter 11. Configuring vShield Data Security
Introduction
Installing vShield Data Security
Configuring the vShield Data Security policies
Managing vShield Data Security reports
Chapter 12. Configuring vSphere Certificates
Introduction
Configuring a Windows CA template
Requesting certificates from a Windows CA
Using SSL Certificate Automation Tool 5.5
Process certificate requests
Registering the Single Sign-On certificate
Registering the Inventory Service certificate
Registering the vCenter certificate
Registering the Web Client certificate
Registering the Log Browser certificate
Registering the Update Manager certificate
Installing an ESXi host certificate
Chapter 13. Configuring vShield VXLAN Virtual Wires
Introduction
Prerequisites for configuring VXLAN virtual wires
Configuring VXLAN virtual wires
Testing VXLAN virtual wires
Configuring firewall rules for VXLAN virtual wires
Index
更新时间:2021-08-05 17:16:40