VMware vSphere Replication 6.1 User guide

Category
Networking
Type
User guide

VMware vSphere vSphere Replication 6.1 is an essential tool for any business that wants to protect its virtual environment. With vSphere Replication, you can create and manage replication relationships between virtual machines (VMs) on different sites, ensuring that your data is always protected in the event of a disaster.

vSphere Replication 6.1 offers a number of important benefits, including:

  • Simplified management: vSphere Replication 6.1 provides a centralized management interface that makes it easy to create, manage, and monitor replication relationships.
  • High performance: vSphere Replication 6.1 uses efficient replication technology that minimizes the impact on your production environment.

VMware vSphere vSphere Replication 6.1 is an essential tool for any business that wants to protect its virtual environment. With vSphere Replication, you can create and manage replication relationships between virtual machines (VMs) on different sites, ensuring that your data is always protected in the event of a disaster.

vSphere Replication 6.1 offers a number of important benefits, including:

  • Simplified management: vSphere Replication 6.1 provides a centralized management interface that makes it easy to create, manage, and monitor replication relationships.
  • High performance: vSphere Replication 6.1 uses efficient replication technology that minimizes the impact on your production environment.
VMware vSphere Replication Security
Guide
vSphere Replication 6.1
This document supports the version of each product listed and
supports all subsequent versions until the document is
replaced by a new edition. To check for more recent editions of
this document, see http://www.vmware.com/support/pubs.
EN-001758-01
VMware vSphere Replication Security Guide
2 VMware, Inc.
You can find the most up-to-date technical documentation on the VMware Web site at:
hp://www.vmware.com/support/
The VMware Web site also provides the latest product updates.
If you have comments about this documentation, submit your feedback to:
Copyright
©
2012–2017 VMware, Inc. All rights reserved. Copyright and trademark information.
VMware, Inc.
3401 Hillview Ave.
Palo Alto, CA 94304
www.vmware.com
Contents
1
About VMware vSphere Replication Security Guide 5
Updated Information 7
2
vSphere Replication Security Reference 9
Services, Ports, and External Interfaces that the vSphere Replication Virtual Appliance Uses 9
vSphere Replication Conguration Files 12
vSphere Replication Private Key, Certicate, and Keystore 13
vSphere Replication License and EULA File 13
vSphere Replication Log Files 13
vSphere Replication User Accounts 15
Security Updates and Patches for vSphere Replication 15
Index 17
VMware, Inc. 3
VMware vSphere Replication Security Guide
4 VMware, Inc.
About VMware vSphere Replication
Security Guide 1
The VMware vSphere Replication Security Guide provides a concise reference to the security features of
vSphere Replication.
To help you protect your vSphere Replication installation, this guide describes security features built into
vSphere Replication and the measures that you can take to safeguard it from aack.
n
External interfaces, ports, and services that are necessary for the proper operation of
vSphere Replication
n
Conguration options and seings that have security implications
n
Location of log les and their purpose
n
Required system accounts
n
Information about obtaining the latest security patches
Intended Audience
This information is intended for IT decision makers, architects, administrators, and others who must
familiarize themselves with the security components of vSphere Replication.
VMware, Inc.
5
VMware vSphere Replication Security Guide
6 VMware, Inc.
Updated Information
This VMware vSphere Replication Security Guide is updated with each release of the product or when
necessary.
This table provides the update history of the VMware vSphere Replication Security Guide.
Revision Description
EN-001758-01
n
Updated the information in topic “Security Updates and Patches for vSphere Replication,” on
page 15.
EN-001758-00 Initial release.
VMware, Inc. 7
VMware vSphere Replication Security Guide
8 VMware, Inc.
vSphere Replication Security
Reference 2
You can use the Security Reference to learn about the security features of vSphere Replication and the
measures that you can take to safeguard your environment from aack.
This chapter includes the following topics:
n
“Services, Ports, and External Interfaces that the vSphere Replication Virtual Appliance Uses,” on
page 9
n
“vSphere Replication Conguration Files,” on page 12
n
“vSphere Replication Private Key, Certicate, and Keystore,” on page 13
n
“vSphere Replication License and EULA File,” on page 13
n
“vSphere Replication Log Files,” on page 13
n
“vSphere Replication User Accounts,” on page 15
n
“Security Updates and Patches for vSphere Replication,” on page 15
Services, Ports, and External Interfaces that the vSphere Replication
Virtual Appliance Uses
The operation of vSphere Replication depends on certain services, ports, and external interfaces.
vSphere Replication Services
The operation of vSphere Replication depends on several services that run on the vSphere Replication
virtual appliance.
Table 21. vSphere Replication Services
Service Name Startup Type Description
hms Automatic for the
vSphere Replication appliance.
Disabled for the vSphere Replication
add-on appliance.
vSphere Replication Management
Service
hbrsrv Automatic vSphere Replication Service
sshd Automatic Disabled by default.
VMware, Inc. 9
Table 21. vSphere Replication Services (Continued)
Service Name Startup Type Description
ntp Automatic Time service for syncing-up with
Internet Time Server through Network
Time Protocol.
Note After you install or upgrade a
vSphere Replication virtual appliance,
you must synchronize the appliance
with a time server.
vaos Automatic Guest OS initialization that drives
network seings, host name seings,
ssh keys creation, EULA acceptance,
boot scripts execution, and VAMI
initialization.
Communication Ports
vSphere Replication uses several communication ports and protocols.
The vSphere Replication appliance requires certain ports to be open.
Note vSphere Replication servers must have NFC trac access to target ESXi hosts.
Table 22. Ports Used by the vSphere Replication Appliance
Source Target Port Protocol Description
vSphere
Replicationappliance
Remote
vCenter Server
80 TCP All management
trac to the
vSphere Replication
appliance goes to port
80 on the
vCenter Server proxy
system.
vSphere Replication
server in the
vSphere Replication
appliance
Remote ESXi host 80 HTTP Used to establish the
connection before
initial replication
starts.
vSphere Replication
server in the
vSphere Replication
appliance
Remote ESXi host 902 TCP and UDP Used by
vSphere Replication
servers to send
replication trac to
the destination ESXi
hosts.
Browser vSphere Replication
appliance
5480 HTTPS vSphere Replication
virtual appliance
management interface
(VAMI) Web UI.
vCenter Server proxy vSphere Replication
appliance
8043 SOAP Intra-site
communication from
the vCenter Server
proxy to the
vSphere Replication
appliance .
VMware vSphere Replication Security Guide
10 VMware, Inc.
Table 22. Ports Used by the vSphere Replication Appliance (Continued)
Source Target Port Protocol Description
vSphere Replication
appliance
vSphere Replication
server
8123 SOAP Intra-site management
trac from the
vSphere Replication
Management server to
additional
vSphere Replication
server in the
environment.
vSphere Web Client on
the source site
vCenter Server
Inventory Service on
the target site
10443 HTTPS ThevSphere
Replication UI uses
the Inventory Service
of the remote
vCenter Server to list
target datastores.
ESXi host on source
site
vSphere Replication
server at the target
site
31031 Initial and outgoing
replication trac from
the ESXi host at the
source site to the
vSphere Replication
appliance or
vSphere Replication
server at the target
site.
If you deploy additional vSphere ReplicationvSphere Replication servers, you must open the ports that
vSphere Replication requires on those servers.
Table 23. Ports Used by the vSphere Replication Server
Source Target Port Protocol Description
vSphere Replication
server in the
vSphere Replication
appliance
Remote ESXi host 902 TCP and UDP Trac between the
vSphere Replication
server and the ESXi
hosts on the same site.
Specically the trac
of the NFC service to
the destination ESXi
servers.
Browser vSphere Replication
server
5480 HTTPS Administrator's Web
browser.
vSphere Replication
Management server
vSphere Replication
server
8123 SOAP Intra-site management
trac from the
vSphere Replication
appliance or
vSphere Replication
Management server to
the
vSphere Replication
servers.
ESXi host at the source
site
vSphere Replication
server
31031 Initial and outgoing
replication trac from
the ESXi host at the
source site to the
vSphere Replication
appliance or
vSphere Replication
server at the target
site.
Chapter 2 vSphere Replication Security Reference
VMware, Inc. 11
When you create a connection to the cloud, the vCloud Tunneling Agent in the vSphere Replication
appliance creates a tunnel to secure the transfer of replication data to your cloud organization.
Table 24. Ports Required for Cloud Replications
Source Destination Port Protocol Description
The ESXi host at the
source site
The vCenter Server
at the source site
80 TCP The vCenter Server
reverse proxy
forwards VIB
(vCloud Air Disaster
Recovery rewall
rules) download
request to the
vSphere Replication
appliance.
The
vSphere Replication
appliance at the source
site
vCloud API 443 REST over HTTPS vSphere Replication
appliance connects to
this port to send
replication data to a
cloud organization.
The ESXi host at the
source site
The
vSphere Replication
appliance at the
source site
10000-10010 TCP The vCloud Tunneling
Agent opens one of
these ports on the
vSphere Replication
appliance. ESXi hosts
connect to that port to
send replication data
to a cloud
organization.
Open Source and Third-Party Components
For the complete text of the open source licenses, a list of all open source and third-party components, and
the open source code used in vSphere Replication, you can go to
hp://www.vmware.com/download/open_source.html and see the VMware vSphere Replication Open Source
and Licenses section under the VMware vSphere Open Source link. If certain open source license requires it, the
vSphere Replication Open Source Disclosure Package (ODP) contains text les with instructions how to
build and replace the software libraries.
vSphere Replication Configuration Files
Some conguration les contain seings that aect the security of vSphere Replication.
Note All security-related resources are protected with the correct permissions and ownership. Do not
change the ownership or permissions of these les.
File Location Description
/opt/vmware/hms/conf/hms-configuration.xml
The default system conguration of the
vSphere Replication Management server.
/opt/vmware/hms/conf/embedded_db.cfg
The conguration le for the embedded database .
VMware vSphere Replication Security Guide
12 VMware, Inc.
vSphere Replication Private Key, Certificate, and Keystore
The private key, the certicate, and the keystore of vSphere Replication are located on the
vSphere Replication virtual appliance.
Note All security-related resources are protected with the correct permissions and ownership. Do not
change the ownership or permissions of these les.
n
/etc/vmware/ssl/hbrsrv.crt
n
/etc/vmware/ssl/hbrsrv.key
n
/opt/vmware/hms/security/hms-keystore.jks
n
/opt/vmware/hms/security/hms-truststore.jks
vSphere Replication License and EULA File
The end-user license agreement (EULA) and open source license les are located in the vSphere Replication
virtual appliance.
File Location
Open Source License
/usr/share/doc/vmware-vspherereplication/OPEN_SOURCE_LICENSE
VMware Postgres
License
/usr/share/doc/vmware-
vspherereplication/VMware_Postgres_9.3.6.0_open_source_licenses.txt
Pivotal TC Server
/usr/share/doc/vmware-vspherereplication/pivotal-tc-server-standard-open-
source-licenses-3.1.0.RELEASE.txt
End-user license
agreement
/opt/vmware/etc/isv/EULA/language_code/0
vSphere Replication Log Files
The les that contain system messages are located in the vSphere Replication virtual appliance.
File Location Description
/opt/vmware/hms/logs/hms-configtool.log
Used to log errors that occurred during the Virtual Appliance
Management Interface (VAMI) conguration.
/opt/vmware/hms/logs/hmsn.log
Used to track the runtime information of vSphere Replication
Management server. The most recent log le is labeled hms.log, and
hms.n.log les contain older log messages. The le with the highest
n value contains the oldest messages.
/opt/vmware/var/log/lighttpd/error.log
The VAMI error log le. Used to track errors in the VAMI operations.
/var/log/vmware/
The folder contains the vSphere Replication server log les. Used to
track replication problems.
/var/log/boot.msg
Used to track the startup process of the vSphere Replication
appliance.
Log Messages Related to Security
The /opt/vmware/hms/logs/hms.log le contains login and logout event messages, authorization error
messages, and certicate verication error messages in the following format.
n
Login message
Chapter 2 vSphere Replication Security Reference
VMware, Inc. 13
2015-03-23 15:54:05.558 DEBUG jvsl.security.authentication.sessionmap [tcweb-5]
(..security.authentication.SessionMap) operationID=087657ec-ef0f-494c-9739-a4af62a5c049-
HMS-1033 | Adding new session to the session
map:com.vmware.hms.security.authentication.HmsUserSession@234f4bed:[
com.vmware.vim.binding.hms.UserSession:
key = site_...1b034,
userName = root,
fullName = root ,
loginTime = ...,
lastActiveTime = ...,
hmsServers = null,
locale = en,
messageLocale = en
]
n
Logout message
15-03-23 15:54:05.585 INFO jvsl.security.authorization [tcweb-8]
(..security.authorization.SessionAuthorizer) | HmsSessionManager.HmsSessionManagerLogout
called on session-manager by root@/10.26.233.124:50776 with opId 43263a64-1681-4459-
a921-1d9406308dc8-HMS-1036
n
Authorization message
2015-06-25 16:10:35.994 INFO jvsl.security.authorization [tcweb-5]
(..security.authorization.SessionAuthorizer) | Authorization for method
"HmsRemoteSiteManager.HmsRemoteSiteManagerFindHmsServer" failed.
(vim.fault.NoPermission) {
faultCause = null,
faultMessage = null,
object = MoRef: type = HmsRemoteSiteManager, value = site-manager, serverGuid = 18327b1a-
dac2-44d9-972e-fa9dd99fce47,
privilegeId = HmsRemote.com.vmware.vcHms.Hms.View
}
n
Certicate verication error message
2015-06-25 16:19:13.794 WARN jvsl.sessions [hms-main-thread-1] (..hms.net.ServerRegistryHms)
| Can not start HMS connection to remote site 'some-address.com'
java.util.concurrent.ExecutionException: com.vmware.vim.vmomi.client.exception.SslException:
javax.net.ssl.SSLHandshakeException:
com.vmware.vim.vmomi.client.exception.VlsiCertificateException: Server certificate chain is
not trusted and thumbprint doesn't match
VMware vSphere Replication Security Guide
14 VMware, Inc.
vSphere Replication User Accounts
You must set up a root account for vSphere Replication. The root account is used to access both the virtual
appliance console and the Virtual Appliance Management Interface (VAMI).
vSphere Replication currently uses the root account as the administrator of the VAMI. No other user is
created.
When you deploy the vSphere Replication virtual appliance, you set the password for the root account in
the OVF Deployment wizard.
The root password must be at least 8 characters long.
Privileges Assigned to Default User Roles
vSphere Replication includes a set of roles. Each role includes a set of privileges, which allow users with
those roles to complete dierent actions.
See the topic vSphere Replication Roles and Permissions in the vSphere Replication Administration Guide.
Security Updates and Patches for vSphere Replication
vSphere Replication 6.1.0.x and 6.1.1 x use SUSE Linux Enterprise Server 11 (x86_64), version 11, Service
Pack 3 as the guest operating system.
vSphere Replication 6.1.2 uses SUSE Linux Enterprise Server 12 (x86_64), Service Pack 1 as the guest
operating system
You can apply the latest security update or patch by using the corresponding ISO le.
Before you apply an update or patch to the guest operating system, take into account the dependencies. See
“Services, Ports, and External Interfaces that the vSphere Replication Virtual Appliance Uses,” on page 9.
To receive the latest security announcements, you can subscribe to the VMware Security Announcements
mailing list at hp://lists.vmware.com/.
Chapter 2 vSphere Replication Security Reference
VMware, Inc. 15
VMware vSphere Replication Security Guide
16 VMware, Inc.
Index
C
certificate 13
E
embedded_db.cfg 12
EULA 13
G
guest OS 15
H
hms-configuration.xml 12
https 9
I
intended audience 5
K
keystore 13
L
license file 13
licenses 13
logs 13
N
ntp 9
P
patches 15
ports 9
privileges 15
R
root password 15
S
security updates 15
security reference 9
services 9
sshd 9
system logs 13
T
truststore 13
U
updated information 7
user accounts 15
VMware, Inc. 17
VMware vSphere Replication Security Guide
18 VMware, Inc.
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18

VMware vSphere Replication 6.1 User guide

Category
Networking
Type
User guide

VMware vSphere vSphere Replication 6.1 is an essential tool for any business that wants to protect its virtual environment. With vSphere Replication, you can create and manage replication relationships between virtual machines (VMs) on different sites, ensuring that your data is always protected in the event of a disaster.

vSphere Replication 6.1 offers a number of important benefits, including:

  • Simplified management: vSphere Replication 6.1 provides a centralized management interface that makes it easy to create, manage, and monitor replication relationships.
  • High performance: vSphere Replication 6.1 uses efficient replication technology that minimizes the impact on your production environment.

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI