Figures..........................................................................................................................................5
Tables........................................................................................................................................... 6
Chapter 1: PREFACE......................................................................................................................7
Chapter 2: Deployment models......................................................................................................8
Open Virtualization Format (OVF) deployment........................................................................................................... 8
Security profiles................................................................................................................................................................... 8
Chapter 3: Product and Subsystem Security................................................................................. 9
Security controls map.........................................................................................................................................................9
Authentication.................................................................................................................................................................... 10
Access control.............................................................................................................................................................. 10
Default user accounts................................................................................................................................................. 10
Login security settings......................................................................................................................................................10
Failed login behavior.................................................................................................................................................... 10
Local user account lockout.........................................................................................................................................11
Automatic session timeout......................................................................................................................................... 11
Authentication types and setup considerations.......................................................................................................... 11
vCenter user authentication.......................................................................................................................................11
Register new vCenter server..................................................................................................................................... 11
Register vCenter server using a non-administrative account...........................................................................12
Required privileges for non-administrator users...................................................................................................12
Assign Dell privileges to existing role.......................................................................................................................13
vCenter user security..................................................................................................................................................14
User and credential management.................................................................................................................................. 16
Preloaded accounts..................................................................................................................................................... 16
Default credentials....................................................................................................................................................... 17
Managing credentials...................................................................................................................................................17
Authorization................................................................................................................................................................. 18
Network security................................................................................................................................................................18
Network exposure........................................................................................................................................................18
Outbound ports.............................................................................................................................................................18
Inbound ports................................................................................................................................................................ 19
Data security....................................................................................................................................................................... 19
Cryptography...................................................................................................................................................................... 19
Manage certificate ......................................................................................................................................................19
Auditing and logging.......................................................................................................................................................... 21
Create and download troubleshooting bundle.......................................................................................................21
Serviceability...................................................................................................................................................................... 22
Security patches..........................................................................................................................................................22
OMIVV OS update.............................................................................................................................................................22
Product code integrity..................................................................................................................................................... 22
Contents
Contents 3