SlideShare a Scribd company logo
ESX Configuration Guide
                                                     ESX 4.1
                                           vCenter Server 4.1




This document supports the version of each product listed and
supports all subsequent versions until the document is replaced
by a new edition. To check for more recent editions of this
document, see http://www.vmware.com/support/pubs.




                                               EN-000328-00
ESX Configuration Guide




You can find the most up-to-date technical documentation on the VMware Web site at:
http://www.vmware.com/support/
The VMware Web site also provides the latest product updates.
If you have comments about this documentation, submit your feedback to:
docfeedback@vmware.com




Copyright © 2009, 2010 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and
intellectual property laws. VMware products are covered by one or more patents listed at
http://www.vmware.com/go/patents.
VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions. All other marks
and names mentioned herein may be trademarks of their respective companies.




VMware, Inc.
3401 Hillview Ave.
Palo Alto, CA 94304
www.vmware.com




2                                                                                                                  VMware, Inc.
Contents


          About This Book 7

     1 Introduction to ESX Configuration 9

Networking

     2 Introduction to Networking 13
               Networking Concepts Overview 13
               Network Services 14
               View Networking Information in the vSphere Client 15
               View Network Adapter Information in the vSphere Client   15


     3 Basic Networking with vNetwork Standard Switches 17
               vNetwork Standard Switches 17
               Port Groups 18
               Port Group Configuration for Virtual Machines   18
               VMkernel Networking Configuration 19
               Service Console Configuration 21
               vNetwork Standard Switch Properties 24


     4 Basic Networking with vNetwork Distributed Switches 27
               vNetwork Distributed Switch Architecture 28
               Configuring a vNetwork Distributed Switch 29
               dvPort Groups 32
               dvPorts 33
               Private VLANs 34
               Configuring vNetwork Distributed Switch Network Adapters 36
               Configuring Virtual Machine Networking on a vNetwork Distributed Switch   40
               Network I/O Control 41


     5 Advanced Networking 43
               Internet Protocol Version 6 43
               VLAN Configuration 44
               Networking Policies 44
               Change the DNS and Routing Configuration 58
               MAC Addresses 59
               TCP Segmentation Offload and Jumbo Frames 60
               NetQueue and Networking Performance 63
               VMDirectPath I/O 64




VMware, Inc.                                                                                  3
ESX Configuration Guide




     6 Networking Best Practices, Scenarios, and Troubleshooting 65
              Networking Best Practices 65
              Mounting NFS Volumes 66
              Networking Configuration for Software iSCSI and Dependent Hardware iSCSI 67
              Configuring Networking on Blade Servers 70
              Troubleshooting 72


Storage

     7 Introduction to Storage 77
              About ESX Storage 77
              Types of Physical Storage 78
              Supported Storage Adapters 79
              Target and Device Representations   79
              About ESX Datastores 81
              Comparing Types of Storage 84
              Displaying Storage Adapters 85
              Viewing Storage Devices 86
              Displaying Datastores 87


     8 Configuring ESX Storage 89
              Local SCSI Storage 89
              Fibre Channel Storage 90
              iSCSI Storage 90
              Datastore Refresh and Storage Rescan Operations 104
              Create VMFS Datastores 105
              Network Attached Storage 106
              Creating a Diagnostic Partition 107


     9 Managing Storage 109
              Managing Datastores 109
              Changing VMFS Datastore Properties 111
              Managing Duplicate VMFS Datastores 113
              Using Multipathing with ESX 115
              Storage Hardware Acceleration 123
              Thin Provisioning 124
              Turn off vCenter Server Storage Filters 127


    10 Raw Device Mapping 129
              About Raw Device Mapping 129
              Raw Device Mapping Characteristics 132
              Managing Mapped LUNs 134


Security

    11 Security for ESX Systems 139
              ESX Architecture and Security Features 139



4                                                                                           VMware, Inc.
Contents




               Security Resources and Information 147


   12 Securing an ESX Configuration 149
               Securing the Network with Firewalls 149
               Securing Virtual Machines with VLANs 158
               Securing Virtual Switch Ports 163
               Internet Protocol Security 165
               Securing iSCSI Storage 168


   13 Authentication and User Management 171
               Securing ESX Through Authentication and Permissions 171
               About Users, Groups, Permissions, and Roles 172
               Working with Users and Groups on ESX Hosts 176
               Encryption and Security Certificates for ESX 181


   14 Service Console Security 189
               General Security Recommendations 189
               Log In to the Service Console 190
               Service Console Firewall Configuration 190
               Password Restrictions 194
               Cipher Strength 200
               setuid and setgid Flags 200
               SSH Security 202
               Security Patches and Security Vulnerability Scanning Software   203


   15 Security Best Practices and Scenarios 205
               Security Approaches for Common ESX Deployments 205
               Virtual Machine Recommendations 209


Host Profiles

   16 Managing Host Profiles 217
               Host Profiles Usage Model 217
               Access Host Profiles View 218
               Creating a Host Profile 218
               Export a Host Profile 219
               Import a Host Profile 219
               Edit a Host Profile 220
               Manage Profiles 221
               Checking Compliance 225


Appendixes

    A ESX Technical Support Commands 229

     B Linux Commands Used with ESX 233



VMware, Inc.                                                                               5
ESX Configuration Guide




    C Using vmkfstools 235
              vmkfstools Command Syntax 235
              vmkfstools Options 236


          Index 245




6                                             VMware, Inc.
About This Book


          This manual, the ESXConfiguration Guide, provides information on how to configure networking for
                   ®
          VMware ESX, including how to create virtual switches and ports and how to set up networking for virtual
          machines, VMware vMotion™, and IP storage. It also discusses configuring the file system and various types
          of storage such as iSCSI and Fibre Channel. The guide provides a discussion of security features built into ESX
          and the measures that you can take to safeguard ESX from attack. In addition, it includes a list of ESX technical
          support commands along with their VMware vSphere™ Client equivalents and a description of the vmkfstools
          utility.

          This information covers ESX 4.1.


Intended Audience
          This manual is intended for anyone who needs to install, upgrade, or use ESX. The information in this manual
          is written for experienced Windows or Linux system administrators who are familiar with virtual machine
          technology and datacenter operations.


VMware Technical Publications Glossary
          VMware Technical Publications provides a glossary of terms that might be unfamiliar to you. For definitions
          of terms as they are used in VMware technical documentation, go to
          http://www.vmware.com/support/pubs.


Document Feedback
          VMware welcomes your suggestions for improving our documentation. If you have comments, send your
          feedback to docfeedback@vmware.com.


VMware vSphere Documentation
          The vSphere documentation consists of the combined VMware vCenter Server and ESX documentation set.


Abbreviations Used in Figures
          The figures in this manual use the abbreviations listed in Table 1.

          Table 1. Abbreviations
          Abbreviation                                             Description

          database                                                 vCenter Server database

          datastore                                                Storage for the managed host

          dsk#                                                     Storage disk for the managed host



VMware, Inc.                                                                                                             7
ESX Configuration Guide




          Table 1. Abbreviations (Continued)
          Abbreviation                                            Description

          hostn                                                   vCenter Server managed hosts

          SAN                                                     Storage Area Network type datastore shared between
                                                                  managed hosts

          tmplt                                                   Template

          user#                                                   User with access permissions

          VC                                                      vCenter Server

          VM#                                                     Virtual machines on a managed host



Technical Support and Education Resources
          The following technical support resources are available to you. To access the current version of this book and
          other books, go to http://www.vmware.com/support/pubs.

          Online and Telephone          To use online support to submit technical support requests, view your product
          Support                       and contract information, and register your products, go to
                                        http://www.vmware.com/support.

                                        Customers with appropriate support contracts should use telephone support
                                        for the fastest response on priority 1 issues. Go to
                                        http://www.vmware.com/support/phone_support.html.

          Support Offerings             To find out how VMware support offerings can help meet your business needs,
                                        go to http://www.vmware.com/support/services.

          VMware Professional           VMware Education Services courses offer extensive hands-on labs, case study
          Services                      examples, and course materials designed to be used as on-the-job reference
                                        tools. Courses are available onsite, in the classroom, and live online. For onsite
                                        pilot programs and implementation best practices, VMware Consulting
                                        Services provides offerings to help you assess, plan, build, and manage your
                                        virtual environment. To access information about education classes,
                                        certification programs, and consulting services, go to
                                        http://www.vmware.com/services.




8                                                                                                              VMware, Inc.
Introduction to ESX Configuration                                                                                   1
          This guide describes the tasks you need to complete to configure ESX host networking, storage, and security.
          In addition, it provides overviews, recommendations, and conceptual discussions to help you understand these
          tasks and how to deploy a host to meet your needs.

          Before you use this information, read the Introduction to vSphere for an overview of system architecture and the
          physical and virtual devices that make up a vSphere system.

          This introduction summarizes the contents of this guide.


Networking
          The networking information provides you with a conceptual understanding of physical and virtual network
          concepts, a description of the basic tasks you need to complete to configure your ESX host’s network
          connections, and a discussion of advanced networking topics and tasks.


Storage
          The storage information provides you with a basic understanding of storage, a description of the basic tasks
          you perform to configure and manage your ESX host’s storage, and a discussion of how to set up raw device
          mapping (RDM).


Security
          The security information discusses safeguards that VMware has built into ESX and measures that you can take
          to protect your host from security threats. These measures include using firewalls, taking advantage of the
          security features of virtual switches, and setting up user authentication and permissions.


Host Profiles
          This section describes the host profiles feature and how it is used to encapsulate the configuration of a host
          into a host profile. This section also describes how to apply this host profile to another host or cluster, edit a
          profile, and check a host’s compliance with a profile.




VMware, Inc.                                                                                                                   9
ESX Configuration Guide




Appendixes
          The appendixes provide specialized information you might find useful when configuring an ESX host.
          n    ESX Technical Support Commands – Discusses the ESX configuration commands that you can issue
               through a command-line shell such as secure shell (SSH). Although these commands are available for your
               use, do not consider them to be an API that you can build scripts on. These commands are subject to change
               and VMware does not support applications and scripts that rely on ESX configuration commands. This
               appendix provides you with vSphere Client equivalents for these commands.
          n    Using vmkfstools – Discusses the vmkfstools utility, which you can use to create and manipulate virtual
               disks, file systems, logical volumes, and physical storage devices on the hosts.




10                                                                                                            VMware, Inc.
Networking




VMware, Inc.                11
ESX Configuration Guide




12                        VMware, Inc.
Introduction to Networking                                                                                           2
          The basic concepts of ESX networking and how to set up and configure a network in a vSphere environment
          are discussed.

          This chapter includes the following topics:
          n    “Networking Concepts Overview,” on page 13
          n    “Network Services,” on page 14
          n    “View Networking Information in the vSphere Client,” on page 15
          n    “View Network Adapter Information in the vSphere Client,” on page 15


Networking Concepts Overview
          A few concepts are essential for a thorough understanding of virtual networking. If you are new to ESX, it is
          helpful to review these concepts.

          A physical network is a network of physical machines that are connected so that they can send data to and
          receive data from each other. VMware ESX runs on a physical machine.

          A virtual network is a network of virtual machines running on a single physical machine that are connected
          logically to each other so that they can send data to and receive data from each other. Virtual machines can be
          connected to the virtual networks that you create when you add a network.

          A physical Ethernet switch manages network traffic between machines on the physical network. A switch has
          multiple ports, each of which can be connected to a single machine or another switch on the network. Each
          port can be configured to behave in certain ways depending on the needs of the machine connected to it. The
          switch learns which hosts are connected to which of its ports and uses that information to forward traffic to
          the correct physical machines. Switches are the core of a physical network. Multiple switches can be connected
          together to form larger networks.

          A virtual switch, vSwitch, works much like a physical Ethernet switch. It detects which virtual machines are
          logically connected to each of its virtual ports and uses that information to forward traffic to the correct virtual
          machines. A vSwitch can be connected to physical switches by using physical Ethernet adapters, also referred
          to as uplink adapters, to join virtual networks with physical networks. This type of connection is similar to
          connecting physical switches together to create a larger network. Even though a vSwitch works much like a
          physical switch, it does not have some of the advanced functionality of a physical switch.

          A vNetwork Distributed Switch acts as a single vSwitch across all associated hosts on a datacenter. This allows
          virtual machines to maintain consistent network configuration as they migrate across multiple hosts.

          A dvPort is a port on a vNetwork Distributed Switch that connects to a host’s service console or VMkernel or
          to a virtual machine’s network adapter.




VMware, Inc.                                                                                                               13
ESX Configuration Guide




          A port group specifies port configuration options such as bandwidth limitations and VLAN tagging policies
          for each member port. Network services connect to vSwitches through port groups. Port groups define how a
          connection is made through the vSwitch to the network. Typically, a single vSwitch is associated with one or
          more port groups.

          A dvPort group is a port group associated with a vNetwork Distributed Switch and specifies port configuration
          options for each member port. dvPort Groups define how a connection is made through the vNetwork
          Distributed Switch to the network.

          NIC teaming occurs when multiple uplink adapters are associated with a single vSwitch to form a team. A
          team can either share the load of traffic between physical and virtual networks among some or all of its
          members, or provide passive failover in the event of a hardware failure or a network outage.

          VLANs enable a single physical LAN segment to be further segmented so that groups of ports are isolated
          from one another as if they were on physically different segments. The standard is 802.1Q.

          The VMkernel TCP/IP networking stack supports iSCSI, NFS, and vMotion. Virtual machines run their own
          systems’ TCP/IP stacks and connect to the VMkernel at the Ethernet level through virtual switches.

          IP storage refers to any form of storage that uses TCP/IP network communication as its foundation. iSCSI can
          be used as a virtual machine datastore, and NFS can be used as a virtual machine datastore and for direct
          mounting of .ISO files, which are presented as CD-ROMs to virtual machines.

          TCP Segmentation Offload, TSO, allows a TCP/IP stack to emit very large frames (up to 64KB) even though
          the maximum transmission unit (MTU) of the interface is smaller. The network adapter then separates the
          large frame into MTU-sized frames and prepends an adjusted copy of the initial TCP/IP headers.

          Migration with vMotion enables a virtual machine that is powered on to be transferred from one ESX host to
          another without shutting down the virtual machine. The optional vMotion feature requires its own license key.


Network Services
          A vNetwork provides several different services to the host and virtual machines.

          You can enable three types of network services in ESX:
          n    Connecting virtual machines to the physical network and to each other.
          n    Connecting VMkernel services (such as NFS, iSCSI, or vMotion) to the physical network.
          n    Running management services for ESX via the service console. A service console port, which is set up by
               default during installation, is required for ESX to connect to any network or remote services, including
               the vSphere Client. Additional service console ports might be necessary for other services, such as iSCSI
               storage.




14                                                                                                           VMware, Inc.
Chapter 2 Introduction to Networking




View Networking Information in the vSphere Client
          The vSphere Client shows general networking information and information specific to network adapters.

          Procedure

          1    Log in to the vSphere Client and select the host from the inventory panel.

          2    Click the Configuration tab and click Networking.

          3    (Optional) Choose the type of networking to view.

               Option                               Description
               Virtual Switch                       Displays vNetwork Standard Switch networking on the host.
               vNetwork Distributed Switch          Displays vNetwork Distributed Switch networking on the host.

               The vNetwork Distributed Switch option appears only on hosts that are connected to one or more
               vNetwork Distributed Switches.

          Networking information is displayed for each virtual switch on the host.


View Network Adapter Information in the vSphere Client
          For each physical network adapter on the host, you can view information such as the speed, duplex, and
          observed IP ranges.

          Procedure

          1    Log in to the vSphere Client and select the host from the inventory panel.

          2    Click the Configuration tab, and click Network Adapters.

          The network adapters panel shows the following information.

          Table 2-1. Network Adapter Parameters
          Option                                                   Description

          Device                                                   Name of the network adapter.

          Speed                                                    Actual speed and duplex of the network adapter.

          Configured                                               Configured speed and duplex of the network adapter.

          Switch                                                   vSwitch or vDS that the network adapter is associated with.

          Observed IP ranges                                       IP addresses that the network adapter has access to.

          Wake on LAN supported                                    Network adapter ability to support Wake on the LAN.




VMware, Inc.                                                                                                                   15
ESX Configuration Guide




16                        VMware, Inc.
Basic Networking with vNetwork
Standard Switches                                                                                              3
          vNetwork Standard Switches (vSwitches) handle network traffic at the host level in a vSphere environment.

          Use the vSphere Client to add networking based on the categories that reflect the types of network services:
          n    Virtual machines
          n    VMkernel
          n    Service console

          This chapter includes the following topics:
          n    “vNetwork Standard Switches,” on page 17
          n    “Port Groups,” on page 18
          n    “Port Group Configuration for Virtual Machines,” on page 18
          n    “VMkernel Networking Configuration,” on page 19
          n    “Service Console Configuration,” on page 21
          n    “vNetwork Standard Switch Properties,” on page 24


vNetwork Standard Switches
          You can create abstracted network devices called vNetwork Standard Switches (vSwitches). A vSwitch can
          route traffic internally between virtual machines and link to external networks.

          You can use vSwitches to combine the bandwidth of multiple network adapters and balance communications
          traffic among them. You can also configure a vSwitch to handle physical NIC failover.

          A vSwitch models a physical Ethernet switch. The default number of logical ports for a vSwitch is 120. You
          can connect one network adapter of a virtual machine to each port. Each uplink adapter associated with a
          vSwitch uses one port. Each logical port on the vSwitch is a member of a single port group. Each vSwitch can
          also have one or more port groups assigned to it. For information about maximum allowed ports and port
          groups, see Configuration Maximums for vSphere 4.1.

          When two or more virtual machines are connected to the same vSwitch, network traffic between them is routed
          locally. If an uplink adapter is attached to the vSwitch, each virtual machine can access the external network
          that the adapter is connected to.




VMware, Inc.                                                                                                          17
ESX Configuration Guide




Port Groups
          Port groups aggregate multiple ports under a common configuration and provide a stable anchor point for
          virtual machines connecting to labeled networks.
          Figure 3-1. vNetwork Standard Switch Network

                   VM         VM            VM                      VM             VM


                                                     Network
                                                        C


                     A    B     C       D        E     port     A        B     C       D   E
                                                      groups
                              vSwitch                                        vSwitch

             Host1                                                                             Host2   virtual

             Host1                                                                             Host2 physical


                                             physical network adapters



                                                 physical network




          Each port group is identified by a network label, which is unique to the current host. Network labels are used
          to make virtual machine configuration portable across hosts. All port groups in a datacenter that are physically
          connected to the same network (in the sense that each can receive broadcasts from the others) are given the
          same label. Conversely, if two port groups cannot receive broadcasts from each other, they have distinct labels.

          A VLAN ID, which restricts port group traffic to a logical Ethernet segment within the physical network, is
          optional. For a port group to reach port groups located on other VLANs, the VLAN ID must be set to 4095. If
          you use VLAN IDs, you must change the port group labels and VLAN IDs together so that the labels properly
          represent connectivity.


Port Group Configuration for Virtual Machines
          You can add or modify a virtual machine port group from the vSphere Client.

          The vSphere Client Add Network wizard guides you through the tasks to create a virtual network to which
          virtual machines can connect, including creating a vSwitch and configuring settings for a network label.

          When you set up virtual machine networks, consider whether you want to migrate the virtual machines in the
          network between hosts. If so, be sure that both hosts are in the same broadcast domain—that is, the same Layer
          2 subnet.

          ESX does not support virtual machine migration between hosts in different broadcast domains because the
          migrated virtual machine might require systems and resources that it would no longer have access to in the
          new network. Even if your network configuration is set up as a high-availability environment or includes
          intelligent switches that can resolve the virtual machine’s needs across different networks, you might
          experience lag times as the Address Resolution Protocol (ARP) table updates and resumes network traffic for
          the virtual machines.

          Virtual machines reach physical networks through uplink adapters. A vSwitch can transfer data to external
          networks only when one or more network adapters are attached to it. When two or more adapters are attached
          to a single vSwitch, they are transparently teamed.




18                                                                                                               VMware, Inc.
Chapter 3 Basic Networking with vNetwork Standard Switches




   Add a Virtual Machine Port Group
          Virtual machine port groups provide networking for virtual machines.

          Procedure

          1    Log in to the vSphere Client and select the host from the inventory panel.

          2    Click the Configuration tab and click Networking.

          3    Select the Virtual Switch view.

               vSwitches appear in an overview that includes a details layout.

          4    On the right side of the page, click Add Networking.

          5    Accept the default connection type, Virtual Machines, and click Next.

          6    Select Create a virtual switch or one of the listed existing vSwitches and the associated physical adapters
               to use for this port group.

               You can create a new vSwitch with or without Ethernet adapters.

               If you create a vSwitch without physical network adapters, all traffic on that vSwitch is confined to that
               vSwitch. No other hosts on the physical network or virtual machines on other vSwitches can send or
               receive traffic over this vSwitch. You might create a vSwitch without physical network adapters if you
               want a group of virtual machines to be able to communicate with each other, but not with other hosts or
               with virtual machines outside the group.

          7    Click Next.

          8    In the Port Group Properties group, enter a network label that identifies the port group that you are
               creating.

               Use network labels to identify migration-compatible connections common to two or more hosts.

          9    (Optional) If you are using a VLAN, for VLAN ID, enter a number between 1 and 4094. If you are not
               using a VLAN, leave this blank.

               If you enter 0 or leave the option blank, the port group can see only untagged (non-VLAN) traffic. If you
               enter 4095, the port group can see traffic on any VLAN while leaving the VLAN tags intact.

          10   Click Next.

          11   After you determine that the vSwitch is configured correctly, click Finish.


VMkernel Networking Configuration
          A VMkernel networking interface is used for VMware vMotion, IP storage, and Fault Tolerance.

          Moving a virtual machine from one host to another is called migration. Using vMotion, you can migrate
          powered on virtual machines with no downtime. Your VMkernel networking stack must be set up properly
          to accommodate vMotion.

          IP storage refers to any form of storage that uses TCP/IP network communication as its foundation, which
          includes iSCSI, FCoE and NFS for ESX. Because these storage types are network based, they can use the same
          VMkernel interface and port group.

          The network services that the VMkernel provides (iSCSI, NFS, and vMotion) use a TCP/IP stack in the
          VMkernel. This TCP/IP stack is completely separate from the TCP/IP stack used in the service console. Each
          of these TCP/IP stacks accesses various networks by attaching to one or more port groups on one or more
          vSwitches.




VMware, Inc.                                                                                                                   19
ESX Configuration Guide




     TCP/IP Stack at the VMkernel Level
          The VMware VMkernel TCP/IP networking stack provides networking support in multiple ways for each of
          the services it handles.

          The VMkernel TCP/IP stack handles iSCSI, NFS, and vMotion in the following ways.
          n    iSCSI as a virtual machine datastore.
          n    iSCSI for the direct mounting of .ISO files, which are presented as CD-ROMs to virtual machines.
          n    NFS as a virtual machine datastore.
          n    NFS for the direct mounting of .ISO files, which are presented as CD-ROMs to virtual machines.
          n    Migration with vMotion.
          n    Fault Tolerance logging.
          n    Provides networking information to dependent hardware iSCSI adapters.

          If you have two or more physical NICs for iSCSI, you can create multiple paths for the software iSCSI by
          configuring iSCSI Multipathing. For more information about iSCSI Multipathing, see the iSCSI SAN
          Configuration Guide.

          NOTE ESX supports only NFS version 3 over TCP/IP.


     Set Up VMkernel Networking
          Create a VMkernel network adapter for use as a vMotion interface or an IP storage port group.

          Procedure

          1    Log in to the vSphere Client and select the host from the inventory panel.

          2    Click the Configuration tab and click Networking.

          3    In the Virtual Switch view, click Add Networking.

          4    Select VMkernel and click Next.

          5    Select the vSwitch to use, or select Create a virtual switch to create a new vSwitch.

          6    Select the check boxes for the network adapters your vSwitch will use.

               Select adapters for each vSwitch so that virtual machines or other services that connect through the adapter
               can reach the correct Ethernet segment. If no adapters appear under Create a new virtual switch, all the
               network adapters in the system are being used by existing vSwitches. You can either create a new vSwitch
               without a network adapter, or select a network adapter that an existing vSwitch uses.

          7    Click Next.

          8    Select or enter a network label and a VLAN ID.

               Option                                  Description
               Network Label                           A name that identifies the port group that you are creating. This is the label
                                                       that you specify when configuring a virtual adapter to be attached to this
                                                       port group when configuring VMkernel services such as vMotion and IP
                                                       storage.
               VLAN ID                                 Identifies the VLAN that the port group’s network traffic will use.




20                                                                                                                      VMware, Inc.
Chapter 3 Basic Networking with vNetwork Standard Switches




          9    Select Use this port group for vMotion to enable this port group to advertise itself to another host as the
               network connection where vMotion traffic should be sent.

               You can enable this property for only one vMotion and IP storage port group for each host. If this property
               is not enabled for any port group, migration with vMotion to this host is not possible.

          10   Choose whether to use this port group for fault tolerance logging.

          11   On an IPv6-enabled host, choose whether to use IP (Default), IPv6, or IP and IPv6 networking.

               This option does not appear on hosts that do not have IPv6 enabled. IPv6 configuration cannot be used
               with dependent hardware iSCSI adapters.

          12   Click Next.

          13   Select Obtain IP settings automatically to use DHCP to obtain IP settings, or select Use the following IP
               settings to specify IP settings manually.

               If you choose to specify IP settings manually, provide this information.

               DHCP cannot be used with dependent hardware iSCSI adapters.

               a   Enter the IP address and subnet mask for the VMkernel interface.

                   This address must be different from the IP address set for the service console.

               b   Click Edit to set the VMkernel Default Gateway for VMkernel services, such as vMotion, NAS, and
                   iSCSI.

               c   On the DNS Configuration tab, the name of the host is entered by default.

                   The DNS server addresses that were specified during installation are also preselected, as is the
                   domain.

               d   On the Routing tab, the service console and the VMkernel each need their own gateway information.

                   A gateway is needed for connectivity to machines not on the same IP subnet as the service console or
                   VMkernel. The default is static IP settings.

               e   Click OK, then click Next.

          14   If you are using IPv6 for the VMkernel interface, select one of the following options for obtaining IPv6
               addresses.
               n   Obtain IPv6 addresses automatically through DHCP
               n   Obtain IPv6 addresses automatically through router advertisement
               n   Static IPv6 addresses

          15   If you choose to use static IPv6 addresses, complete the following steps.

               a   Click Add to add a new IPv6 address.

               b   Enter the IPv6 address and subnet prefix length, and click OK.

               c   To change the VMkernel default gateway, click Edit.

          16   Click Next.

          17   Review the information, click Back to change any entries, and click Finish.


Service Console Configuration
          The service console and the VMkernel use virtual Ethernet adapters to connect to a vSwitch and to reach
          networks that the vSwitch services.

          Common service console configuration modifications include changing NICs and changing the settings for a
          NIC that is in use.


VMware, Inc.                                                                                                                   21
ESX Configuration Guide




          If there is only one service console connection, changing the service console configuration is not allowed. For
          a new connection, change the network settings to use an additional NIC. After you verify that the new
          connection is functioning properly, remove the old connection. You are switching over to the new NIC.

          You can create a maximum of 16 service console ports in ESX.


     Set Up Service Console Networking
          A single service console network interface is set up during the ESX installation process. You can also add
          additional service console interfaces after ESX is up and running.

          Procedure

          1    Log in to the vSphere Client and select the host from the inventory panel.

          2    Click the Configuration tab, and click Networking.

          3    In the Virtual Switch view, click Add Networking.

          4    Select Service Console, and click Next.

          5    Select the vSwitch to use for network access, or select Create a new vSwitch, and click Next.

               If no adapters appear in the Create a new virtual switch group, all network adapters in the system are
               being used by existing vSwitches.

          6    Enter the network label and VLAN ID, and click Next.

          7    Enter the IP address and subnet mask, or select Obtain IP setting automatically.

          8    Click Edit to set the service console default gateway and click Next.

          9    On an IPV6-enabled host, select No IPv6 settings to use only IPv4 settings for the service console, or select
               Use the following IPv6 settings to configure IPv6 for the service console.

               This screen does not appear if IPv6 is disabled on the host.

          10   If you choose to use IPv6, select how to obtain IPv6 addresses.

          11   If you chose Static IPv6 addresses, do the following:

               a     Click Add to add a new IPv6 address.

               b     Enter the IPv6 address and subnet prefix length, and click OK.

               c     To change the service console default gateway, click Edit.

          12   Click Next.

          13   Review the information, click Back to change any entries, and click Finish.


     Configure Service Console Ports
          You can edit service console port properties, such as IP settings and networking policies.

          Procedure

          1    Log in to the vSphere Client and select the host from the inventory panel.
          2    Click the Configuration tab, and click Networking.

          3    On the right side of the page, click Properties for the vSwitch that you want to edit.

          4    In the vSwitch Properties dialog box, click the Ports tab.

          5    Select Service Console and click Edit.

          6    To continue with the service console configuration, click Continue modifying this connection.




22                                                                                                               VMware, Inc.
Chapter 3 Basic Networking with vNetwork Standard Switches




          7    Edit port properties, IP settings, and effective policies as necessary.

          8    Click OK.


   Set the Default Gateway
          You can configure one default gateway for the service console per TCP/IP stack. Routing is not available for
          software iSCSI Multipath configurations or dependent hardware iSCSI adapters.

          CAUTION Make sure that your network settings are correct before saving your changes. If the network settings
          are misconfigured, the UI can lose connectivity to the host, and you must then reconfigure the host from the
          command line at the service console.

          Procedure

          1    Log into the vSphere Client and select the host from the inventory panel.

          2    Click the Configuration tab, and click DNS and Routing.

          3    Click Properties.

          4    Click the Routing tab.

          5    Under Service Console, set the default gateway and gateway device for service console networking.

               For the service console, the gateway device is needed only when two or more network adapters are using
               the same subnet. The gateway device determines which network adapter to use for the default route.

               The service console and VMkernel are often not connected to the same network, each needs its own
               gateway information. A gateway is needed for connectivity to machines not on the same IP subnet as the
               service console or VMkernel interfaces.

               On an IPv6-enabled host, you can also select a default gateway for IPv6 and a gateway device for IPv6 for
               service console networking.

          6    Under VMkernel, set the default gateway for VMkernel networking.

               On an IPv6-enabled host, you can also select a default gateway for IPv6 for VMkernel networking.

          7    Click OK.


   Display Service Console Information
          You can view service console network information, such as the VLAN ID and network policies.

          Procedure

          1    Click the info icon to the left of the service console port group to display service console information.

          2    Click the X to close the information pop-up window.


   Using DHCP for the Service Console
          In most cases, you use static IP addresses for the service console. You can also set up the service console to use
          dynamic addressing, DHCP, if your DNS server can map the service console’s host name to the dynamically
          generated IP address.

          If your DNS server cannot map the host name to its DHCP-generated IP address, use the service console’s
          numeric IP address to access the host. The numeric IP address might change as DHCP leases expire or when
          the system is rebooted. For this reason, VMware does not recommend using DHCP for the service console
          unless your DNS server can handle the host name translation.




VMware, Inc.                                                                                                                     23
ESX Configuration Guide




vNetwork Standard Switch Properties
          vNetwork Standard Switch settings control vSwitch-wide defaults for ports, which can be overridden by port
          group settings for each vSwitch. You can edit vSwitch properties, such as the uplink configuration and the
          number of available ports.


     Change the Number of Ports for a vSwitch
          A vSwitch serves as a container for port configurations that use a common set of network adapters, including
          sets that contain no network adapters at all. Each virtual switch provides a finite number of ports through
          which virtual machines and network services can reach one or more networks.

          Procedure

          1    Log in to the vSphere Client and select the host from the inventory panel.

          2    Click the Configuration tab and click Networking.

          3    On the right side of the page, click Properties for the vSwitch that you want to edit.

          4    Click the Ports tab.

          5    Select the vSwitch item in the Configuration list, and click Edit.

          6    Click the General tab.

          7    Choose the number of ports that you want to use from the drop-down menu.

          8    Click OK.

          What to do next

          Changes will not take effect until the system is restarted.


     Change the Speed of an Uplink Adapter
          You can change the connection speed and duplex of an uplink adapter.

          Procedure

          1    Log in to the vSphere Client and select the host from the inventory panel.

          2    Click the Configuration tab and click Networking.

          3    Select a vSwitch and click Properties.

          4    Click the Network Adapters tab.

          5    To change the configured speed and duplex value of a network adapter, select the network adapter and
               click Edit.

          6    To select the connection speed manually, select the speed and duplex from the drop-down menu.

               Choose the connection speed manually if the NIC and a physical switch might fail to negotiate the proper
               connection speed. Symptoms of mismatched speed and duplex include low bandwidth or no link
               connectivity.

               The adapter and the physical switch port it is connected to must be set to the same value, such as auto and
               auto or ND and ND, where ND is some speed and duplex, but not auto and ND.

          7    Click OK.




24                                                                                                             VMware, Inc.
Chapter 3 Basic Networking with vNetwork Standard Switches




   Add Uplink Adapters
          You can associate multiple adapters to a single vSwitch to provide NIC teaming. The team can share traffic
          and provide failover.

          Procedure

          1    Log in to the vSphere Client and select the host from the inventory panel.

          2    Click the Configuration tab and click Networking.

          3    Select a vSwitch and click Properties.

          4    Click the Network Adapters tab.

          5    Click Add to launch the Add Adapter wizard.

          6    Select one or more adapters from the list and click Next.

          7    (Optional) To reorder the NICs into a different category, select a NIC and click Move Up and Move
               Down.

               Option                               Description
               Active Adapters                      Adapters that the vSwitch uses.
               Standby Adapters                     Adapters that become active if one or more of the active adapters fails.


          8    Click Next.

          9    Review the information on the Adapter Summary page, click Back to change any entries, and click
               Finish.

               The list of network adapters reappears, showing the adapters that the vSwitch now claims.

          10   Click Close to exit the vSwitch Properties dialog box.

               The Networking section in the Configuration tab shows the network adapters in their designated order
               and categories.


   Cisco Discovery Protocol
          Cisco Discovery Protocol (CDP) allows ESX administrators to determine which Cisco switch port is connected
          to a given vSwitch. When CDP is enabled for a particular vSwitch, you can view properties of the Cisco switch
          (such as device ID, software version, and timeout) from the vSphere Client.




VMware, Inc.                                                                                                                    25
ESX Configuration Guide




          Enable CDP on an ESX Host
          vSwitches are set to detect Cisco port information by default. You can also set the CDP mode so that a vSwitch
          makes information available to the Cisco switch administrator.

          Procedure

          1    Log in directly to your ESX host's console.

          2    View the current CDP mode for the a vSwitch by entering the esxcfg-vswitch -b <vSwitch> command.

               If CDP is disabled, the mode will be shown as down.

          3    Change the CDP mode by entering the esxcfg-vswitch -B <mode> <vSwitch> command.

               Mode                                   Description
               down                                   CDP is disabled.
               listen                                 ESX detects and displays information about the associated Cisco switch port,
                                                      but information about the vSwitch is not available to the Cisco switch
                                                      administrator.
               advertise                              ESX makes information about the vSwitch available to the Cisco switch
                                                      administrator, but does not detect and display information about the Cisco
                                                      switch.
               both                                   ESX detects and displays information about the associated Cisco switch and
                                                      makes information about the vSwitch available to the Cisco switch
                                                      administrator.



          View Cisco Switch Information on the vSphere Client
          When CDP is set to listen or both, you can view Cisco switch information.

          Procedure

          1    Log in to the vSphere Client and select the host from the inventory panel.

          2    Click the Configuration tab and click Networking.

          3    Click the info icon to the right of the vSwitch.

               NOTE Because the CDP advertisements of Cisco equipment typically occur once a minute, a noticeable
               delay might occur between enabling CDP on ESX and the availability of CDP data from the vSphere client.




26                                                                                                                    VMware, Inc.
Basic Networking with vNetwork
Distributed Switches                                                                                     4
          These topics guide you through the basic concepts of networking with vNetwork Distributed Switches and
          how to set up and configure networking with vNetwork Distributed Switches in a vSphere environment.

          This chapter includes the following topics:
          n    “vNetwork Distributed Switch Architecture,” on page 28
          n    “Configuring a vNetwork Distributed Switch,” on page 29
          n    “dvPort Groups,” on page 32
          n    “dvPorts,” on page 33
          n    “Private VLANs,” on page 34
          n    “Configuring vNetwork Distributed Switch Network Adapters,” on page 36
          n    “Configuring Virtual Machine Networking on a vNetwork Distributed Switch,” on page 40
          n    “Network I/O Control,” on page 41




VMware, Inc.                                                                                                   27
ESX Configuration Guide




vNetwork Distributed Switch Architecture
          A vNetwork Distributed Switch (vDS) functions as a single virtual switch across all associated hosts. This
          enables you to set network configurations that span across all member hosts, and allows virtual machines to
          maintain consistent network configuration as they migrate across multiple hosts.
          Figure 4-1. vNetwork Distributed Switch Network

                   VM         VM         VM                           VM          VM


                                                    Network
                                                       C

                                                  dvPort groups
                          A    B   C          D     E     F       G    H      I       J

                                    vNetwork Distributed Switch

                              dvUplink                                     dvUplink               virtual
             Host1                                                                        Host2

             Host1                                                                        Host2 physical



                                          physical network adapters



                                              physical network




          Like a vNetwork Standard Switch, each vNetwork Distributed Switch is a network hub that virtual machines
          can use. A vNetwork Distributed Switch can forward traffic internally between virtual machines or link to an
          external network by connecting to physical Ethernet adapters, also known as uplink adapters.

          Each vNetwork Distributed Switch can also have one or more dvPort groups assigned to it. dvPort groups
          group multiple ports under a common configuration and provide a stable anchor point for virtual machines
          connecting to labeled networks. Each dvPort group is identified by a network label, which is unique to the
          current datacenter. A VLAN ID, which restricts port group traffic to a logical Ethernet segment within the
          physical network, is optional.

          Network resource pools allow you to manage network traffic by type of network traffic.

          In addition to VMware vNetwork Distributed Switches, vSphere 4 also provides support for third-party virtual
          switches. For information about configuring these third-party switches, go to
          http://www.cisco.com/go/1000vdocs.




28                                                                                                          VMware, Inc.
Chapter 4 Basic Networking with vNetwork Distributed Switches




Configuring a vNetwork Distributed Switch
          You can create a vNetwork Distributed Switch on a vCenter Server datacenter. After you have created a
          vNetwork Distributed Switch, you can add hosts, create dvPort groups, and edit vNetwork Distributed Switch
          properties and policies.


   Create a vNetwork Distributed Switch
          Create a vNetwork Distributed Switch to handle networking traffic for associated hosts on the datacenter.

          Procedure

          1    Log in to the vSphere Client and choose the Networking inventory view.

          2    From the Inventory menu, select Datacenter > vNetwork Distributed Switch.

          3    Select a vNetwork Distributed Switch version.

               Option                                Description
               vNetwork Distributed Switch           Compatible with ESX version 4.0 and later. Features released with later vDS
               Version: 4.0                          versions are not supported.
               vNetwork Disributed Switch Version:   Compatible with ESX version 4.1 and later.
               4.1.0


          4    Click Next.

          5    Enter a name for the vNetwork Distributed Switch in the Name text box.

          6    Use the arrow buttons to select the Number of dvUplink Ports and click Next.

               dvUplink ports connect the vNetwork Distributed Switch to physical NICs on associated hosts. The
               number of dvUplink ports is the maximum number of allowed physical connections to the vNetwork
               Distributed Switch per host.

          7    Choose when to add hosts to the vDS.

               Option                                Description
               Add now                               Select the hosts and physical adapters to use by clicking the check box next
                                                     to each host or adapter. You can add only physical adapters that are not
                                                     already in use during vNetwork Distributed Switch creation.
               Add later                             No hosts are added to the vDS at this time. You must add hosts to the vDS
                                                     before adding network adapters. You can add network adapters from the
                                                     host configuration page of the vSphere Client by using the Manage Hosts
                                                     functionality or by using Host Profiles.


          8    Click Next.

          9    (Optional) Choose Automatically create a default port group.

               This option creates a static binding port group with 128 ports. For systems with complex port group
               requirements, skip the default port group and create a new dvPort group after you have finished adding
               the vNetwork Distributed Switch.

          10   Review the vNetwork Distributed Switch diagram to ensure proper configuration and click Finish.




VMware, Inc.                                                                                                                      29
ESX Configuration Guide




     Add Hosts to a vNetwork Distributed Switch
          You can add hosts and physical adapters to a vNetwork Distributed Switch at the vDS level after the vDS is
          created.

          Procedure

          1    In the vSphere Client, select the Networking inventory view and select the vNetwork Distributed Switch.

          2    Select Inventory > vNetwork Distributed Switch > Add Host.

          3    Select the hosts to add.

          4    Under the selected hosts, select the physical adapters to add, and click Next.

               You can select physical adapters that are free and in use.

               NOTE Moving a physical adapter to a vDS without moving any associated virtual adapters can cause
               those virtual adapters to lose network connectivity.

          5    For each virtual adapter, select the Destination port group from the drop-down menu to migrate the
               virtual adapter to the vDS or select Do not migrate.

          6    Click Next.

          7    (Optional) Migrate virtual machine networking to the vDS.

               a     Select Migrate virtual machine networking.

               b     For each virtual machine, select the Destination port group from the drop-down menu or select Do
                     not migrate.

          8    Click Next.

          9    Review the settings for the vDS, and click Finish.

               If you need to make any changes, click Back to the appropriate screen.


     Manage Hosts on a vDS
          You can change the configuration for hosts and physical adapters on a vDS after they are added to the vDS.

          Procedure

          1    In the vSphere Client, select the Networking inventory view and select the vNetwork Distributed Switch.

          2    Select Inventory > vNetwork Distributed Switch > Manage Hosts.

          3    Select the hosts to manage and click Next.

          4    Select the physical adapters to add, deselect the physical adapters to remove, and click Next.

          5    For each virtual adapter, select the Destination port group from the drop-down menu to migrate the
               virtual adapter to the vDS or select Do not migrate.

          6    Click Next.

          7    (Optional) Migrate virtual machine networking to the vDS.

               a     Select Migrate virtual machine networking.

               b     For each virtual machine, select the Destination port group from the drop-down menu or select Do
                     not migrate.




30                                                                                                              VMware, Inc.
Chapter 4 Basic Networking with vNetwork Distributed Switches




          8    Click Next.

          9    Review the settings for the vDS, and click Finish.

               If you need to make any changes, click Back to the appropriate screen.


   Edit General vNetwork Distributed Switch Settings
          You can edit the general properties for a vNetwork Distributed Switch, such as the vNetwork Distributed
          Switch name and the number of uplink ports on the vNetwork Distributed Switch.

          Procedure

          1    In the vSphere Client, choose the Networking inventory view and select the vNetwork Distributed Switch.

          2    From the Inventory menu, select vNetwork Distributed Switch > Edit Settings.

          3    Select General to edit the following vNetwork Distributed Switch settings.
               n   Enter the name for the vNetwork Distributed Switch.
               n   Select the number of uplink ports.
               n   To edit uplink port names, click Edit uplink port names, enter the new names, and click OK.
               n   Enter any notes for the vNetwork Distributed Switch.

          4    Click OK.


   Edit Advanced vNetwork Distributed Switch Settings
          Use the vNetwork Distributed Switch Settings dialog box to configure advanced vNetwork Distributed Switch
          settings such as Cisco Discovery Protocol and the maximum MTU for the vNetwork Distributed Switch.

          Procedure

          1    In the vSphere Client, display the Networking inventory view and select the vNetwork Distributed Switch.

          2    From the Inventory menu, select vNetwork Distributed Switch > Edit Settings.

          3    Select Advanced to edit the following vNetwork Distributed Switch properties.

               a   Specify the maximum MTU size.

               b   Select the Enable Cisco Discovery Protocol check box to enable CDP, and set the operation to
                   Listen, Advertise, or Both.

               c   Enter the name and other details for the vNetwork Distributed Switch administrator in the Admin
                   Contact Info section.

          4    Click OK.


   View Network Adapter Information for a vNetwork Distributed Switch
          View physical network adapters and uplink assignments for a vNetwork Distributed Switch from the
          networking inventory view of the vSphere Client.

          Procedure

          1    In the vSphere Client, choose the Networking inventory view and select the vNetwork Distributed Switch.
          2    From the Inventory menu, select vNetwork Distributed Switch > Edit Settings.




VMware, Inc.                                                                                                                   31
ESX Configuration Guide




          3    On the Network Adapters tab, you can view network adapter and uplink assignments for associated hosts.

               This tab is read-only. vNetwork Distributed Switch network adapters must be configured at the host level.

          4    Click OK.


     Upgrade a vDS to a Newer Version
          A vNetwork Distributed Switch version 4.0 can be upgraded to version 4.1, enabling the vDS to take advantage
          of features available only in the later version.

          Procedure

          1    In the vSphere Client, select the Networking inventory view and select the vNetwork Distributed Switch.

          2    On the Summary tab, next to Version, select Upgrade.

               The upgrade wizard details the features available to the upgraded vDS that are not available to the earlier
               version.

          3    Click Next.

               The upgrade wizard lists the hosts associated with this vDS and whether or not they are compatible with
               the upgraded vDS version. You can proceed with the upgrade only if all hosts are compatible wit the new
               vDS version.

               Next to each incompatible host, the upgrade wizard lists the reason for the incompatibility.

          4    Click Next.

          5    Verify that the upgrade information listed is correct, and click Finish.


dvPort Groups
          A dvPort group specifies port configuration options for each member port on a vNetwork Distributed Switch.
          dvPort groups define how a connection is made to a network.


     Add a dvPort Group
          Use the Create dvPort Group wizard to add a dvPort group to a vNetwork Distributed Switch.

          Procedure

          1    In the vSphere Client, display the Networking inventory view and select the vNetwork Distributed Switch.

          2    From the Inventory menu, select Distributed Virtual Switch > New Port Group.

          3    Enter a name and the number of ports for the dvPort group.

          4    Choose a VLAN type.

               Option                                Description
               None                                  Do not use VLAN.
               VLAN                                  In the VLAN ID field, enter a number between 1 and 4094.
               VLAN Trunking                         Enter a VLAN trunk range.
               Private VLAN                          Select a private VLAN entry. If you have not created any private VLANs,
                                                     this menu is empty.


          5    Click Next.

          6    Click Finish.




32                                                                                                                VMware, Inc.
Chapter 4 Basic Networking with vNetwork Distributed Switches




   Edit General dvPort Group Properties
          Use the dvPort Group Properties dialog box to configure general dvPort group properties such as the dvPort
          group name and port group type.

          Procedure

          1    In the vSphere Client, display the Networking inventory view and select the dvPort group.

          2    From the Inventory menu, select Network > Edit Settings.

          3    Select General to edit the following dvPort group properties.

               Option                               Action
               Name                                 Enter the name for the dvPort group.
               Description                          Enter a brief description of the dvPort group.
               Number of Ports                      Enter the number of ports on the dvPort group.
               Port binding                         Choose when ports are assigned to virtual machines connected to this dvPort
                                                    group.
                                                    n Select Static binding to assign a port to a virtual machine when the
                                                        virtual machine is connected to the dvPort group.
                                                    n Select Dynamic binding to assign a port to a virtual machine the first
                                                        time the virtual machine powers on after it is connected to the dvPort
                                                        group.
                                                    n Select Ephemeral for no port binding. You can choose ephemeral
                                                        binding only when connected directly to your ESX host.


          4    Click OK.


   Edit Advanced dvPort Group Properties
          Use the dvPort Group Properties dialog box to configure advanced dvPort group properties such as port
          override settings.

          Procedure

          1    In the vSphere Client, display the Networking inventory view and select the dvPort group.

          2    From the Inventory menu, select Network > Edit Settings.

          3    Select Advanced to edit the dvPort group properties.

               a   Select Allow override of port policies to allow dvPort group policies to be overridden on a per-port
                   level.

               b   Click Edit Override Settings to select which policies can be overridden.

               c   Choose whether to allow live port moving.

               d   Select Configure reset at disconnect to discard per-port configurations when a dvPort is disconnected
                   from a virtual machine.

          4    Click OK.


dvPorts
          A dvPort is a port on a vNetwork Distributed Switch that connects to a host's service console or VMkernel or
          to a virtual machine's network adapter.

          Default dvPort configuration is determined by the dvPort group settings, but some settings for individual
          dvPorts can be overridden on a per dvPort basis.



VMware, Inc.                                                                                                                     33
ESX Configuration Guide




     Monitor dvPort State
          vSphere can monitor dvPorts and provide information on the current state of each dvPort.

          Procedure

          1    In the vSphere Client, display the Networking inventory view and select the vNetwork Distributed Switch.

          2    On the Ports tab, click Start Monitoring Port State.

          The State column on the Ports tab for the vNetwork Distributed Switch now displays the current state for each
          dvPort.

          Table 4-1. dvPort States
          State                                                    Description

          Link Up                                                  The link for this dvPort is up.

          Link Down                                                The link for this dvPort is down.

          Blocked                                                  This dvPort is blocked.

          --                                                       The state of this dvPort is currently unavailable.



     Configure dvPort Settings
          Use the Port Settings dialog box to configure general dvPort properties such as the port name and description.

          Procedure

          1    Log in to the vSphere Client and display the vNetwork Distributed Switch.

          2    On the Ports tab, right-click the port to modify and select Edit Settings.

          3    Click General.

          4    Modify the port name and description.

          5    Click OK.


Private VLANs
          Private VLANs are used to solve VLAN ID limitations and waste of IP addresses for certain network setups.

          A private VLAN is identified by its primary VLAN ID. A primary VLAN ID can have multiple secondary
          VLAN IDs associated with it. Primary VLANs are Promiscuous, so that ports on a private VLAN can
          communicate with ports configured as the primary VLAN. Ports on a secondary VLAN can be either
          Isolated, communicating only with promiscuous ports, or Community, communicating with both
          promiscuous ports and other ports on the same secondary VLAN.

          To use private VLANs between an ESX host and the rest of the physical network, the physical switch connected
          to the ESX host needs to be private VLAN-capable and configured with the VLAN IDs being used by ESX for
          the private VLAN functionality. For physical switches using dynamic MAC+VLAN ID based learning, all
          corresponding private VLAN IDs must be first entered into the switch's VLAN database.

          To configure dvPorts to use Private VLAN functionality, you must create the necessary Private VLANs on the
          vNetwork Distributed Switch to which the dvPorts are connected.




34                                                                                                                      VMware, Inc.
Chapter 4 Basic Networking with vNetwork Distributed Switches




   Create a Private VLAN
          You can create a private VLAN for use on a vNetwork Distributed Switch and its associated dvPorts.

          Procedure

          1    In the vSphere Client, display the Networking inventory view and select the vNetwork Distributed Switch.

          2    From the Inventory menu, select vNetwork Distributed Switch > Edit Settings.

          3    Select the Private VLAN tab.

          4    Under Primary Private VLAN ID, click [Enter a Private VLAN ID here], and enter the number of the
               primary private VLAN.

          5    Click anywhere in the dialog box, and then select the primary private VLAN that you just added.

               The primary private VLAN you added appears under Secondary Private VLAN ID.

          6    For each new secondary private VLAN, click [Enter a Private VLAN ID here] under Secondary Private
               VLAN ID, and enter the number of the secondary private VLAN.

          7    Click anywhere in the dialog box, select the secondary private VLAN that you just added, and select either
               Isolated or Community for the port type.

          8    Click OK.


   Remove a Primary Private VLAN
          Remove unused primary private VLANs from the networking inventory view of the vSphere Client.

          Prerequisites

          Before removing a private VLAN, be sure that no port groups are configured to use it.

          Procedure

          1    In the vSphere Client, display the Networking inventory view and select the vNetwork Distributed Switch.

          2    From the Inventory menu, select vNetwork Distributed Switch > Edit Settings.

          3    Select the Private VLAN tab.

          4    Select the primary private VLAN to remove.

          5    Click Remove under Primary Private VLAN ID, and click OK.

               Removing a primary private VLAN also removes all associated secondary private VLANs.


   Remove a Secondary Private VLAN
          Remove unused secondary private VLANs from the networking inventory view of the vSphere Client.

          Prerequisites

          Before removing a private VLAN, be sure that no port groups are configured to use it.

          Procedure

          1    In the vSphere Client, display the Networking inventory view and select the vNetwork Distributed Switch.
          2    From the Inventory menu, select vNetwork Distributed Switch > Edit Settings.

          3    Select the Private VLAN tab.

          4    Select a primary private VLAN to display its associated secondary private VLANs.



VMware, Inc.                                                                                                                    35
ESX Configuration Guide




          5    Select the secondary private VLAN to remove.

          6    Click Remove under Secondary Private VLAN ID, and click OK.


Configuring vNetwork Distributed Switch Network Adapters
          The vNetwork Distributed Switch networking view of the host configuration page displays the configuration
          of the host’s associated vNetwork Distributed Switches and allows you to configure the vNetwork Distributed
          Switch network adapters and uplink ports.


     Managing Physical Adapters
          For each host associated with a vNetwork Distributed Switch, you must assign physical network adapters, or
          uplinks, to the vNetwork Distributed Switch. You can assign one uplink on each host per uplink port on the
          vNetwork Distributed Switch.

          Add an Uplink to a vNetwork Distributed Switch
          For each host associated with a vNetwork Distributed Switch, you must assign at least one physical network
          adapter, or uplink, to the vNetwork Distributed Switch.

          Procedure

          1    Log in to the vSphere Client and select a host from the inventory panel.

               The hardware configuration page for the selected host appears.

          2    Click the Configuration tab and click Networking.

          3    Select the vNetwork Distributed Switch view.

          4    Click Manage Physical Adapters.

          5    Click Click to Add NIC for the uplink port to add an uplink to.

          6    Select the physical adapter to add.

               If you select an adapter that is attached to another switch, it will be removed from that switch and
               reassigned to this vNetwork Distributed Switch.

          7    Click OK.

          Remove an Uplink from a vNetwork Distributed Switch
          You can remove an uplink, or physical network adapter, from a vNetwork Distributed Switch.

          Procedure

          1    Log in to the vSphere Client and select the host from the inventory panel.

               The hardware configuration page for this server appears.

          2    Click the Configuration tab and click Networking.

          3    Select the vNetwork Distributed Switch view.

          4    Click Manage Physical Adapters.

          5    Click Remove to remove the uplink from the vNetwork Distributed Switch.

          6    Click OK.




36                                                                                                            VMware, Inc.
Chapter 4 Basic Networking with vNetwork Distributed Switches




   Managing Virtual Network Adapters
          Virtual network adapters handle host network services over a vNetwork Distributed Switch.

          You can configure service console and VMkernel virtual adapters for an ESX host through an associated
          vNetwork Distributed Switch either by creating new virtual adapters or migrating existing virtual adapters.

          Create a VMkernel Network Adapter on a vNetwork Distributed Switch
          Create a VMkernel network adapter for use as a vMotion interface or an IP storage port group.

          Procedure

          1    Log in to the vSphere Client and select the host from the inventory panel.

          2    Click the Configuration tab and click Networking.

          3    Select the vNetwork Distributed Switch view.

          4    Click Manage Virtual Adapters.

          5    Click Add.

          6    Select New virtual adapter, and click Next.

          7    Select VMkernel and click Next.

          8    Choose a dvPort or dvPort group connection for the virtual adapter.

               Option                               Description
               Select a port group                  Choose the dvPort group for the virtual adapter to connect to from the drop-
                                                    down menu.
               Select port                          Choose the dvPort for the virtual adapter to connect to from the drop-down
                                                    menu.


          9    Select Use this virtual adapter for vMotion to enable this port group to advertise itself to another ESX
               host as the network connection where vMotion traffic is sent.

               You can enable this property for only one vMotion and IP storage port group for each ESX host. If this
               property is not enabled for any port group, migration with vMotion to this host is not possible.

          10   Choose whether to Use this virtual adapter for fault tolerance logging.

          11   Under IP Settings, specify the IP address and subnet mask.

               IPv6 cannot be used with a dependent hardware iSCSI adapter.

          12   Click Edit to set the VMkernel default gateway for VMkernel services, such as vMotion, NAS, and iSCSI.

          13   On the DNS Configuration tab, the name of the host is entered by default. The DNS server addresses and
               domain that were specified during installation are also preselected.

          14   On the Routing tab, the service console and the VMkernel each need their own gateway information. A
               gateway is needed for connectivity to machines not on the same IP subnet as the service console or
               VMkernel.

               Static IP settings is the default. Do not use routing with software iSCSI Multipathing configurations or
               dependent hardware iSCSI adapters.

          15   Click OK, and then click Next.

          16   Click Finish.




VMware, Inc.                                                                                                                     37
ESX Configuration Guide




          Create a Service Console Network Adapter on a vNetwork Distributed Switch
          Create a service console network adapter on a vNetwork Distributed Switch to handle a host's service console
          networking on a vDS.

          Procedure

          1    Log in to the vSphere Client and select the host from the inventory panel.

          2    Click the Configuration tab and click Networking.

          3    Select the vNetwork Distributed Switch view.

          4    Click Manage Virtual Adapters.

          5    Click Add.

          6    Select New virtual adapter, and click Next.

          7    Select Service Console and click Next.
          8    Choose a dvPort or dvPort group connection for the virtual adapter.

               Option                                Description
               Select a port group                   Choose the dvPort group for the virtual adapter to connect to from the drop-
                                                     down menu.
               Select port                           Choose the dvPort for the virtual adapter to connect to from the drop-down
                                                     menu.


          9    Enter the IP address and subnet mask, or select Obtain IP setting automatically.

          10   (Optional) Click Edit to set the service console default gateway.

          11   Click Next.

          12   Click Finish.

          Migrate an Existing Virtual Adapter to a vNetwork Distributed Switch
          You can migrate an existing virtual adapter from a vNetwork Standard Switch to a vNetwork Distributed
          Switch.

          Procedure

          1    Log in to the vSphere Client and select the host from the inventory panel.

          2    Click the Configuration tab and click Networking.

          3    Select the vNetwork Distributed Switch view.

          4    Click Manage Virtual Adapters.

          5    Click Add.

          6    Select Migrate existing virtual network adapters and click Next.

          7    Select one or more virtual network adapters to migrate.

          8    For each selected adapter, choose a port group from the Select a port group drop-down menu.

          9    Click Next.

          10   Click Finish.




38                                                                                                                   VMware, Inc.
Chapter 4 Basic Networking with vNetwork Distributed Switches




          Migrate a Virtual Adapter to a vNetwork Standard Switch
          Use the Migrate to Virtual Switch wizard to migrate an existing virtual adapter from a vNetwork Distriubted
          Switch to a vNetwork Standard Switch.

          Procedure

          1    Log in to the vSphere Client and select the host from the inventory panel.

               The hardware configuration page for this server appears.

          2    Click the Configuration tab and click Networking.

          3    Select the vNetwork Distributed Switch view.

          4    Click Manage Virtual Adapters.

          5    Select the virtual adapter to migrate, and click Migrate to Virtual Switch.

               The Migrate Virtual Adapter wizard appears.
          6    Select the vSwitch to migrate the adapter to and click Next.

          7    Enter a Network Label and optionally a VLAN ID for the virtual adapter, and click Next.

          8    Click Finish to migrate the virtual adapter and complete the wizard.

          Edit the VMkernel Configuration on a vNetwork Distributed Switch
          You can edit the properties of an existing VMkernel adapter on a vNetwork Distributed Switch from the
          associated host.

          Procedure

          1    Log in to the vSphere Client and select the host from the inventory panel.

          2    Click the Configuration tab and click Networking.

          3    Select the vNetwork Distributed Switch view.

          4    Click Manage Virtual Adapters.

          5    Select the VMkernel adapter to modify and click Edit.

          6    Choose a dvPort or dvPort group connection for the virtual adapter.

               Option                               Description
               Select a port group                  Choose the dvPort group for the virtual adapter to connect to from the drop-
                                                    down menu.
               Select port                          Choose the dvPort for the virtual adapter to connect to from the drop-down
                                                    menu.


          7    Select Use this virtual adapter for vMotion to enable this port group to advertise itself to another ESX
               host as the network connection where vMotion traffic is sent.

               You can enable this property for only one vMotion and IP storage port group for each ESX host. If this
               property is not enabled for any port group, migration with vMotion to this host is not possible.

          8    Choose whether to Use this virtual adapter for fault tolerance logging.

          9    Under IP Settings, specify the IP address and subnet mask, or select Obtain IP settings automatically.

          10   Click Edit to set the VMkernel default gateway for VMkernel services, such as vMotion, NAS, and iSCSI.

          11   Click OK.




VMware, Inc.                                                                                                                     39
ESX Configuration Guide




          Edit the Service Console Configuration on a vNetwork Distributed Switch
          You can edit the port and IP settings for an existing service console adapter on a vNetwork Distributed Switch.

          Procedure

          1    Log in to the vSphere Client and select the host from the inventory panel.

          2    Click the Configuration tab and click Networking.

          3    Select the vNetwork Distributed Switch view.

          4    Click Manage Virtual Adapters.

          5    Select the service console adapter to modify and click Edit.

          6    Choose a dvPort or dvPort group connection for the virtual adapter.

               Option                                Description
               Select a port group                   Choose the dvPort group for the virtual adapter to connect to from the drop-
                                                     down menu.
               Select port                           Choose the dvPort for the virtual adapter to connect to from the drop-down
                                                     menu.


          7    Enter the IP address and subnet mask, or select Obtain IP setting automatically.

          8    (Optional) Click Edit to set the service console default gateway.

          9    Click OK.

          Remove a Virtual Adapter
          Remove a virtual network adapter from a vNetwork Distributed Switch in the Manage Virtual Adapters dialog
          box.

          Procedure

          1    Log in to the vSphere Client and select the host from the inventory panel.

          2    Click the Configuration tab and click Networking.

          3    Select the vNetwork Distributed Switch view.

          4    Click Manage Virtual Adapters.

          5    Select the virtual adapter to remove and click Remove.

               A dialog box appears with the message, Are you sure you want to remove <adapter name>?

          6    Click Yes.


Configuring Virtual Machine Networking on a vNetwork Distributed
Switch
          Connect virtual machines to a vNetwork Distributed Switch either by configuring an individual virtual
          machine NIC or migrating groups of virtual machines from the vNetwork Distributed Switch itself.

          Connect virtual machines to vNetwork Distributed Switches by connecting their associated virtual network
          adapters to dvPort groups. You can do this either for an individual virtual machine by modifying the virtual
          machine’s network adapter configuration, or for a group of virtual machines by migrating virtual machines
          from an existing virtual network to a vNetwork Distributed Switch.




40                                                                                                                   VMware, Inc.
Chapter 4 Basic Networking with vNetwork Distributed Switches




   Migrate Virtual Machines to or from a vNetwork Distributed Switch
          In addition to connecting virtual machines to a vNetwork Distributed Switch at the individual virtual machine
          level, you can migrate a group of virtual machines between a vNetwork Distributed Switch network and a
          vNetwork Standard Switch network.

          Procedure

          1    In the vSphere Client, display the Networking inventory view and select the vNetwork Distributed Switch.

          2    From the Inventory menu, select vNetwork Distributed Switch > Migrate Virtual Machine
               Networking.

               The Migrate Virtual Machine Networking wizard appears.

          3    In the Select Source Network drop-down menu, select the virtual network to migrate from.

          4    Select the virtual network to migrate to from the Select Destination Network drop-down menu.

          5    Click Show Virtual Machines.

               Virtual machines associated with the virtual network you are migrating from are displayed in the Select
               Virtual Machines field.

          6    Select virtual machines to migrate to the destination virtual network, and click OK.


   Connect an Individual Virtual Machine to a dvPort Group
          Connect an individual virtual machine to a vNetwork Distributed Switch by modifying the virtual machine's
          NIC configuration.

          Procedure

          1    Log in to the vSphere Client and select the virtual machine from the inventory panel.

          2    On the Summary tab, click Edit Settings.

          3    On the Hardware tab, select the virtual network adapter.

          4    Select the dvPort group to migrate to from the Network Label drop-down menu, and click OK.


Network I/O Control
          Network resource pools determine the priority that different network traffic types are given on a vDS.

          When Network I/O Control is enabled, vDS traffic is divided into the following network resource pools: FT
          traffic, iSCSI traffic, vMotion traffic, management traffic, NFS traffic, and virtual machine traffic. You can
          control the priority of the traffic from each of these network resource pools is given by setting the Physical
          adapter shares and Host limits for each network resource pool.




VMware, Inc.                                                                                                                    41
ESX Configuration Guide




          The Physical adapter shares assigned to a network resource pool determine the share of the total available
          bandwidth guaranteed to the traffic associated with that network resource pool. The share of transmit
          bandwidth available to a network resource pool is determined by the network resource pool's shares and what
          other network resource pools are actively transmitting. For example, if you set your FT traffic and iSCSI traffic
          resource pools to 100 shares, while each of the other resource pools is set to 50 shares, the FT traffic and iSCSI
          traffic resource pools each receive 25% of the available bandwidth. The remaining resource pools each receive
          12.5% of the available bandwidth. These reservations apply only when the physical adapter is saturated.

          NOTE The iSCSI traffic resource pool shares do not apply to iSCSI traffic on a dependent hardware iSCSI
          adapter.

          The Host limit of a network resource pool is the upper limit of bandwidth that the network resource pool can
          use.


     Enable Network I/O Control on a vDS
          Enable network resource management to use network resource pools to prioritize network traffic by type.

          Prerequisites

          Verify that your datacenter has at least one vNetwork Distributed Switch version 4.1.

          Procedure

          1    In the vSphere Client, select the Networking inventory view and select the vNetwork Distributed Switch.

          2    On the Resource Allocation tab, click Properties.

          3    Select Enable network resource management on this vDS, and click OK.


     Edit Network Resource Pool Settings
          You can change network resource pool settings such as allocated shares and limits for the resource pool for
          each network resource pool.

          Procedure

          1    In the vSphere Client, select the Networking inventory view and select the vNetwork Distributed Switch.

          2    On the Resource Allocation tab, right-click the network resource pool to edit, and select Edit Settings.

          3    Select the Physical adapter shares for the network resource pool.

               Option                                Description
               Custom                                Enter a specific number of shares, from 1 to 100, for this network resource
                                                     pool.
               High                                  Sets the shares for this resource pool to 100.
               Normal                                Sets the shares for this resource pool to 50.
               Low                                   Sets the shares for this resource pool to 25.


          4    Set the Host limit for the network resource pool in megabits per second or select Unlimited.

          5    Click OK.




42                                                                                                                   VMware, Inc.
Advanced Networking                                                                                             5
          The following topics guide you through advanced networking in an ESX environment, and how to set up and
          change advanced networking configuration options.

          This chapter includes the following topics:
          n    “Internet Protocol Version 6,” on page 43
          n    “VLAN Configuration,” on page 44
          n    “Networking Policies,” on page 44
          n    “Change the DNS and Routing Configuration,” on page 58
          n    “MAC Addresses,” on page 59
          n    “TCP Segmentation Offload and Jumbo Frames,” on page 60
          n    “NetQueue and Networking Performance,” on page 63
          n    “VMDirectPath I/O,” on page 64


Internet Protocol Version 6
          vSphere supports both Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6) environments.

          The Internet Engineering Task Force has designated IPv6 as the successor to IPv4. The adoption of IPv6, both
          as a standalone protocol and in a mixed environment with IPv4, is rapidly increasing. With IPv6, you can use
          vSphere features in an IPv6 environment.

          A major difference between IPv4 and IPv6 is address length. IPv6 uses a 128-bit address rather than the 32-bit
          addresses used by IPv4. This helps alleviate the problem of address exhaustion that is present with IPv4 and
          eliminates the need for network address translation (NAT). Other notable differences include link-local
          addresses that appear as the interface is initialized, addresses that are set by router advertisements, and the
          ability to have multiple IPv6 addresses on an interface.

          An IPv6-specific configuration in vSphere involves providing IPv6 addresses, either by entering static
          addresses or by using an automatic address configuration scheme for all relevant vSphere networking
          interfaces.


   Enable IPv6 Support on an ESX Host
          You can enable or disable IPv6 support on the host. IPv6 is disabled by default.

          Procedure

          1    Click the arrow next to the Inventory button in the navigation bar and select Hosts and Clusters.

          2    Select the host and click the Configuration tab.



VMware, Inc.                                                                                                          43
ESX Configuration Guide




          3    Click the Networking link under Hardware.

          4    In the Virtual Switch view, click the Properties link.

          5    Select Enable IPv6 support on this host and click OK.

          6    Reboot the host.


VLAN Configuration
          Virtual LANs (VLANs) enable a single physical LAN segment to be further segmented so that groups of ports
          are isolated from one another as if they were on physically different segments.

          Configuring ESX with VLANs is recommended for the following reasons.
          n    It integrates the host into a pre-existing environment.
          n    It secures network traffic.
          n    It reduces network traffic congestion.
          n    iSCSI traffic requires an isolated network.

          You can configure VLANs in ESX using three methods: External Switch Tagging (EST), Virtual Switch Tagging
          (VST), and Virtual Guest Tagging (VGT).

          With EST, all VLAN tagging of packets is performed on the physical switch. Host network adapters are
          connected to access ports on the physical switch. Port groups that are connected to the virtual switch must
          have their VLAN ID set to 0.

          With VST, all VLAN tagging of packets is performed by the virtual switch before leaving the host. Host network
          adapters must be connected to trunk ports on the physical switch. Port groups that are connected to the virtual
          switch must have an appropriate VLAN ID specified.

          With VGT, all VLAN tagging is performed by the virtual machine. VLAN tags are preserved between the
          virtual machine networking stack and external switch when frames are passed to and from virtual switches.
          Physical switch ports are set to trunk port.

          NOTE When using VGT, you must have an 802.1Q VLAN trunking driver installed on the virtual machine.


Networking Policies
          Policies set at the vSwitch or dvPort group level apply to all of the port groups on that vSwitch or to dvPorts
          in the dvPort group, except for the configuration options that are overridden at the port group or dvPort level.

          You can apply the following networking policies.
          n    Load balancing and failover
          n    VLAN (vNetwork Distributed Switch only)
          n    Security
          n    Traffic shaping
          n    Port blocking policies (vNetwork Distributed Switch only)




44                                                                                                             VMware, Inc.
Chapter 5 Advanced Networking




   Load Balancing and Failover Policy
          Load balancing and failover policies allow you to determine how network traffic is distributed between
          adapters and how to re-route traffic in the event of adapter failure.

          You can edit your load balancing and failover policy by configuring the following parameters:
          n    Load Balancing policy determines how outgoing traffic is distributed among the network adapters
               assigned to a vSwitch.

               NOTE Incoming traffic is controlled by the load balancing policy on the physical switch.

          n    Failover Detection controls the link status and beacon probing. Beaconing is not supported with guest
               VLAN tagging.
          n    Network Adapter Order can be active or standby.

          Edit the Failover and Load Balancing Policy on a vSwitch
          Failover and load balancing policies allow you to determine how network traffic is distributed between
          adapters and how to re-route traffic in the event of an adapter failure.

          Procedure

          1    Log in to the vSphere Client and select the host from the inventory panel.

          2    Click the Configuration tab, and click Networking.

          3    Select a vSwitch and click Properties.

          4    In the vSwitch Properties dialog box, click the Ports tab.

          5    To edit the failover and load balancing values for the vSwitch, select the vSwitch item and click
               Properties.

          6    Click the NIC Teaming tab.

               You can override the failover order at the port group level. By default, new adapters are active for all
               policies. New adapters carry traffic for the vSwitch and its port group unless you specify otherwise.




VMware, Inc.                                                                                                              45
ESX Configuration Guide




          7    Specify the settings in the Policy Exceptions group.

               Option                               Description
               Load Balancing                       Specify how to choose an uplink.
                                                    n Route based on the originating port ID. Choose an uplink based on the
                                                        virtual port where the traffic entered the virtual switch.
                                                    n Route based on ip hash. Choose an uplink based on a hash of the source
                                                        and destination IP addresses of each packet. For non-IP packets,
                                                        whatever is at those offsets is used to compute the hash.
                                                    n Route based on source MAC hash. Choose an uplink based on a hash
                                                        of the source Ethernet.
                                                    n Use explicit failover order. Always use the highest order uplink from
                                                        the list of Active adapters which passes failover detection criteria.
                                                    NOTE IP-based teaming requires that the physical switch be configured with
                                                    etherchannel. For all other options, etherchannel should be disabled.
               Network Failover Detection           Specify the method to use for failover detection.
                                                    n Link Status only. Relies solely on the link status that the network adapter
                                                       provides. This option detects failures, such as cable pulls and physical
                                                       switch power failures, but not configuration errors, such as a physical
                                                       switch port being blocked by spanning tree or that is misconfigured to
                                                       the wrong VLAN or cable pulls on the other side of a physical switch.
                                                    n Beacon Probing. Sends out and listens for beacon probes on all NICs in
                                                       the team and uses this information, in addition to link status, to
                                                       determine link failure. This detects many of the failures previously
                                                       mentioned that are not detected by link status alone.
               Notify Switches                      Select Yes or No to notify switches in the case of failover.
                                                    If you select Yes, whenever a virtual NIC is connected to the vSwitch or
                                                    whenever that virtual NIC’s traffic would be routed over a different physical
                                                    NIC in the team because of a failover event, a notification is sent out over the
                                                    network to update the lookup tables on physical switches. In almost all cases,
                                                    this process is desirable for the lowest latency of failover occurrences and
                                                    migrations with vMotion.
                                                    NOTE Do not use this option when the virtual machines using the port group
                                                    are using Microsoft Network Load Balancing in unicast mode. No such issue
                                                    exists with NLB running in multicast mode.
               Failback                             Select Yes or No to disable or enable failback.
                                                    This option determines how a physical adapter is returned to active duty
                                                    after recovering from a failure. If failback is set to Yes (default), the adapter
                                                    is returned to active duty immediately upon recovery, displacing the standby
                                                    adapter that took over its slot, if any. If failback is set to No, a failed adapter
                                                    is left inactive even after recovery until another currently active adapter fails,
                                                    requiring its replacement.
               Failover Order                       Specify how to distribute the work load for uplinks. If you want to use some
                                                    uplinks but reserve others for emergencies in case the uplinks in use fail, set
                                                    this condition by moving them into different groups:
                                                    n Active Uplinks. Continue to use the uplink when the network adapter
                                                         connectivity is up and active.
                                                    n Standby Uplinks. Use this uplink if one of the active adapter’s
                                                         connectivity is down.
                                                    n Unused Uplinks. Do not use this uplink.


          8    Click OK.




46                                                                                                                        VMware, Inc.
Chapter 5 Advanced Networking




          Edit the Failover and Load Balancing Policy on a Port Group
          FFailover and load balancing policies allow you to determine how network traffic is distributed between
          adapters and how to re-route traffic in the event of an adapter failure.

          Procedure

          1    Log in to the vSphere Client and select the host from the inventory panel.

          2    Click the Configuration tab and click Networking.

          3    Select a port group and click Edit.

          4    In the Properties dialog box, click the Ports tab.

          5    To edit the Failover and Load Balancing values for the port group, select the port group and click
               Properties.

          6    Click the NIC Teaming tab.

               You can override the failover order at the port-group level. By default, new adapters are active for all
               policies. New adapters carry traffic for the vSwitch and its port group unless you specify otherwise.

          7    Specify the settings in the Policy Exceptions group.

               Option                                 Description
               Load Balancing                         Specify how to choose an uplink.
                                                      n Route based on the originating port ID. Choose an uplink based on the
                                                          virtual port where the traffic entered the virtual switch.
                                                      n Route based on ip hash. Choose an uplink based on a hash of the source
                                                          and destination IP addresses of each packet. For non-IP packets,
                                                          whatever is at those offsets is used to compute the hash.
                                                      n Route based on source MAC hash. Choose an uplink based on a hash
                                                          of the source Ethernet.
                                                      n Use explicit failover order. Always use the highest order uplink from
                                                          the list of Active adapters which passes failover detection criteria.
                                                      NOTE IP-based teaming requires that the physical switch be configured with
                                                      etherchannel. For all other options, etherchannel should be disabled.
               Network Failover Detection             Specify the method to use for failover detection.
                                                      n Link Status only. Relies solely on the link status that the network adapter
                                                         provides. This option detects failures, such as cable pulls and physical
                                                         switch power failures, but not configuration errors, such as a physical
                                                         switch port being blocked by spanning tree or that is misconfigured to
                                                         the wrong VLAN or cable pulls on the other side of a physical switch.
                                                      n Beacon Probing. Sends out and listens for beacon probes on all NICs in
                                                         the team and uses this information, in addition to link status, to
                                                         determine link failure. This detects many of the failures previously
                                                         mentioned that are not detected by link status alone.
               Notify Switches                        Select Yes or No to notify switches in the case of failover.
                                                      If you select Yes, whenever a virtual NIC is connected to the vSwitch or
                                                      whenever that virtual NIC’s traffic would be routed over a different physical
                                                      NIC in the team because of a failover event, a notification is sent out over the
                                                      network to update the lookup tables on physical switches. In almost all cases,
                                                      this process is desirable for the lowest latency of failover occurrences and
                                                      migrations with vMotion.
                                                      NOTE Do not use this option when the virtual machines using the port group
                                                      are using Microsoft Network Load Balancing in unicast mode. No such issue
                                                      exists with NLB running in multicast mode.




VMware, Inc.                                                                                                                       47
ESX Configuration Guide




               Option                              Description
               Failback                            Select Yes or No to disable or enable failback.
                                                   This option determines how a physical adapter is returned to active duty
                                                   after recovering from a failure. If failback is set to Yes (default), the adapter
                                                   is returned to active duty immediately upon recovery, displacing the standby
                                                   adapter that took over its slot, if any. If failback is set to No, a failed adapter
                                                   is left inactive even after recovery until another currently active adapter fails,
                                                   requiring its replacement.
               Failover Order                      Specify how to distribute the work load for uplinks. If you want to use some
                                                   uplinks but reserve others for emergencies in case the uplinks in use fail, set
                                                   this condition by moving them into different groups:
                                                   n Active Uplinks. Continue to use the uplink when the network adapter
                                                        connectivity is up and active.
                                                   n Standby Uplinks. Use this uplink if one of the active adapter’s
                                                        connectivity is down.
                                                   n Unused Uplinks. Do not use this uplink.


          8    Click OK.

          Edit the Teaming and Failover Policy on a dvPort Group
          Teaming and Failover policies allow you to determine how network traffic is distributed between adapters
          and how to re-route traffic in the event of an adapter failure.

          Procedure

          1    In the vSphere Client, display the Networking inventory view and select the dvPort group.

          2    From the Inventory menu, select Network > Edit Settings.

          3    Select Policies.

          4    In the Teaming and Failover group, specify the following.

               Option                              Description
               Load Balancing                      Specify how to choose an uplink.
                                                   n Route based on the originating port ID — Choose an uplink based on
                                                       the virtual port where the traffic entered the virtual switch.
                                                   n Route based on ip hash — Choose an uplink based on a hash of the
                                                       source and destination IP addresses of each packet. For non-IP packets,
                                                       whatever is at those offsets is used to compute the hash.
                                                   n Route based on source MAC hash — Choose an uplink based on a hash
                                                       of the source Ethernet.
                                                   n Route based on physical NIC load — Choose an uplink based on the
                                                       current loads of physical NICs.
                                                   n Use explicit failover order — Always use the highest order uplink from
                                                       the list of Active adapters which passes failover detection criteria.
                                                   NOTE IP-based teaming requires that the physical switch be configured with
                                                   etherchannel. For all other options, etherchannel should be disabled.
               Network Failover Detection          Specify the method to use for failover detection.
                                                   n Link Status only – Relies solely on the link status that the network
                                                      adapter provides. This option detects failures, such as cable pulls and
                                                      physical switch power failures, but not configuration errors, such as a
                                                      physical switch port being blocked by spanning tree or that is
                                                      misconfigured to the wrong VLAN or cable pulls on the other side of a
                                                      physical switch.
                                                   n Beacon Probing – Sends out and listens for beacon probes on all NICs
                                                      in the team and uses this information, in addition to link status, to
                                                      determine link failure. This detects many of the failures previously
                                                      mentioned that are not detected by link status alone.
                                                   NOTE Do not use beacon probing with IP-hash load balancing.



48                                                                                                                       VMware, Inc.
Chapter 5 Advanced Networking




               Option                                Description
               Notify Switches                       Select Yes or No to notify switches in the case of failover.
                                                     If you select Yes, whenever a virtual NIC is connected to the vSwitch or
                                                     whenever that virtual NIC’s traffic would be routed over a different physical
                                                     NIC in the team because of a failover event, a notification is sent out over the
                                                     network to update the lookup tables on physical switches. In almost all cases,
                                                     this process is desirable for the lowest latency of failover occurrences and
                                                     migrations with vMotion.
                                                     NOTE Do not use this option when the virtual machines using the port group
                                                     are using Microsoft Network Load Balancing in unicast mode. No such issue
                                                     exists with NLB running in multicast mode.
               Failback                              Select Yes or No to disable or enable failback.
                                                     This option determines how a physical adapter is returned to active duty
                                                     after recovering from a failure. If failback is set to Yes (default), the adapter
                                                     is returned to active duty immediately upon recovery, displacing the standby
                                                     adapter that took over its slot, if any. If failback is set to No, a failed adapter
                                                     is left inactive even after recovery until another currently active adapter fails,
                                                     requiring its replacement.
               Failover Order                        Specify how to distribute the work load for uplinks. If you want to use some
                                                     uplinks but reserve others for emergencies in case the uplinks in use fail, set
                                                     this condition by moving them into different groups:
                                                     n Active Uplinks — Continue to use the uplink when the network adapter
                                                          connectivity is up and active.
                                                     n Standby Uplinks — Use this uplink if one of the active adapter’s
                                                          connectivity is down.
                                                     n Unused Uplinks — Do not use this uplink.
                                                     NOTE When using IP-hash load balancing, do not configure standby uplinks.


          5    Click OK.

          Edit dvPort Teaming and Failover Policies
          Teaming and Failover policies allow you to determine how network traffic is distributed between adapters
          and how to re-route traffic in the event of an adapter failure.

          Prerequisites

          To edit the teaming and failover policies on an individual dvPort, the associated dvPort group must be set to
          allow policy overrides.

          Procedure

          1    Log in to the vSphere Client and display the vNetwork Distributed Switch.

          2    On the Ports tab, right-click the port to modify and select Edit Settings.

               The Port Settings dialog box appears.

          3    Click Policies to view and modify port networking policies.




VMware, Inc.                                                                                                                         49
ESX Configuration Guide




          4    In the Teaming and Failover group, specify the following.

               Option                              Description
               Load Balancing                      Specify how to choose an uplink.
                                                   n Route based on the originating port ID — Choose an uplink based on
                                                       the virtual port where the traffic entered the virtual switch.
                                                   n Route based on ip hash — Choose an uplink based on a hash of the
                                                       source and destination IP addresses of each packet. For non-IP packets,
                                                       whatever is at those offsets is used to compute the hash.
                                                   n Route based on source MAC hash — Choose an uplink based on a hash
                                                       of the source Ethernet.
                                                   n Route based on physical NIC load — Choose an uplink based on the
                                                       current loads of physical NICs.
                                                   n Use explicit failover order — Always use the highest order uplink from
                                                       the list of Active adapters which passes failover detection criteria.
                                                   NOTE IP-based teaming requires that the physical switch be configured with
                                                   etherchannel. For all other options, etherchannel should be disabled.
               Network Failover Detection          Specify the method to use for failover detection.
                                                   n Link Status only – Relies solely on the link status that the network
                                                      adapter provides. This option detects failures, such as cable pulls and
                                                      physical switch power failures, but not configuration errors, such as a
                                                      physical switch port being blocked by spanning tree or that is
                                                      misconfigured to the wrong VLAN or cable pulls on the other side of a
                                                      physical switch.
                                                   n Beacon Probing – Sends out and listens for beacon probes on all NICs
                                                      in the team and uses this information, in addition to link status, to
                                                      determine link failure. This detects many of the failures previously
                                                      mentioned that are not detected by link status alone.
                                                   NOTE Do not use beacon probing with IP-hash load balancing.
               Notify Switches                     Select Yes or No to notify switches in the case of failover.
                                                   If you select Yes, whenever a virtual NIC is connected to the vSwitch or
                                                   whenever that virtual NIC’s traffic would be routed over a different physical
                                                   NIC in the team because of a failover event, a notification is sent out over the
                                                   network to update the lookup tables on physical switches. In almost all cases,
                                                   this process is desirable for the lowest latency of failover occurrences and
                                                   migrations with vMotion.
                                                   NOTE Do not use this option when the virtual machines using the port group
                                                   are using Microsoft Network Load Balancing in unicast mode. No such issue
                                                   exists with NLB running in multicast mode.
               Failback                            Select Yes or No to disable or enable failback.
                                                   This option determines how a physical adapter is returned to active duty
                                                   after recovering from a failure. If failback is set to Yes (default), the adapter
                                                   is returned to active duty immediately upon recovery, displacing the standby
                                                   adapter that took over its slot, if any. If failback is set to No, a failed adapter
                                                   is left inactive even after recovery until another currently active adapter fails,
                                                   requiring its replacement.
               Failover Order                      Specify how to distribute the work load for uplinks. If you want to use some
                                                   uplinks but reserve others for emergencies in case the uplinks in use fail, set
                                                   this condition by moving them into different groups:
                                                   n Active Uplinks — Continue to use the uplink when the network adapter
                                                        connectivity is up and active.
                                                   n Standby Uplinks — Use this uplink if one of the active adapter’s
                                                        connectivity is down.
                                                   n Unused Uplinks — Do not use this uplink.
                                                   NOTE When using IP-hash load balancing, do not configure standby uplinks.


          5    Click OK.




50                                                                                                                       VMware, Inc.
Chapter 5 Advanced Networking




   VLAN Policy
          The VLAN policy allows virtual networks to join physical VLANs.

          Edit the VLAN Policy on a dvPort Group
          You can edit the VLAN policy configuration on a dvPort group.

          Procedure

          1    In the vSphere Client, display the Networking inventory view and select the dvPort group.

          2    From the Inventory menu, select Network > Edit Settings.

          3    Select VLAN.

          4    Select the VLAN Type to use.

               Option                                Description
               None                                  Do not use VLAN.
               VLAN                                  In the VLAN ID field, enter a number between 1 and 4094.
               VLAN Trunking                         Enter a VLAN trunk range.
               Private VLAN                          Select an available private VLAN to use.



          Edit dvPort VLAN Policies
          A VLAN policy set at the dvPort level allows the individual dvPort to override the VLAN policy set at the
          dvPort group level.

          Prerequisites

          To edit the VLAN policies on an individual dvPort, the associated dvPort group must be set to allow policy
          overrides.

          Procedure

          1    Log in to the vSphere Client and display the vNetwork Distributed Switch.

          2    On the Ports tab, right-click the port to modify and select Edit Settings.

          3    Click Policies.

          4    Select the VLAN type to use.

               Option                                Action
               None                                  Do not use a VLAN.
               VLAN                                  For the VLAN ID, enter a number between 1 and 4095.
               VLAN Trunking                         Enter a VLAN trunk range.
               Private VLAN                          Select an available private VLAN to use.


          5    Click OK.


   Security Policy
          Networking security policies determine how the adapter filters inbound and outbound frames.

          Layer 2 is the Data Link Layer. The three elements of the security policy are promiscuous mode, MAC address
          changes, and forged transmits.




VMware, Inc.                                                                                                               51
ESX Configuration Guide




          In nonpromiscuous mode, a guest adapter listens only to traffic forwarded to own MAC address. In
          promiscuous mode, it can listen to all the frames. By default, guest adapters are set to nonpromiscuous mode.

          Edit the Layer 2 Security Policy on a vSwitch
          Control how inbound and outbound frames are handled by editing Layer 2 Security policies.

          Procedure

          1    Log in to the VMware vSphere Client and select the host from the inventory panel.

          2    Click the Configuration tab, and click Networking.

          3    Click Properties for the vSwitch to edit.

          4    In the Properties dialog box, click the Ports tab.

          5    Select the vSwitch item and click Edit.

          6    In the Properties dialog box, click the Security tab.

               By default, Promiscuous Mode is set to Reject, and MAC Address Changes and Forged Transmits are
               set to Accept.

               The policy applies to all virtual adapters on the vSwitch, unless the port group for the virtual adapter
               specifies a policy exception.

          7    In the Policy Exceptions pane, select whether to reject or accept the security policy exceptions.

               Table 5-1. Policy Exceptions
               Mode                                  Reject                                 Accept

               Promiscuous Mode                      Placing a guest adapter in             Placing a guest adapter in
                                                     promiscuous mode has no effect on      promiscuous mode causes it to detect
                                                     which frames are received by the       all frames passed on the vSwitch that
                                                     adapter.                               are allowed under the VLAN policy
                                                                                            for the port group that the adapter is
                                                                                            connected to.

               MAC Address Changes                   If the guest OS changes the MAC        If the MAC address from the guest OS
                                                     address of the adapter to anything     changes, frames to the new MAC
                                                     other than what is in the .vmx         address are received.
                                                     configuration file, all inbound
                                                     frames are dropped.
                                                     If the guest OS changes the MAC
                                                     address back to match the MAC
                                                     address in the .vmx configuration
                                                     file, inbound frames are sent again.

               Forged Transmits                      Outbound frames with a source          No filtering is performed, and all
                                                     MAC address that is different from     outbound frames are passed.
                                                     the one set on the adapter are
                                                     dropped.


          8    Click OK.

          Edit the Layer 2 Security Policy Exception on a Port Group
          Control how inbound and outbound frames are handled by editing Layer 2 Security policies.

          Procedure

          1    Log in to the VMware vSphere Client and select the host from the inventory panel.

          2    Click the Configuration tab, and click Networking.

          3    Click Properties for the port group to edit.


52                                                                                                                    VMware, Inc.
Chapter 5 Advanced Networking




          4    In the Properties dialog box, click the Ports tab.

          5    Select the port group item and click Edit.

          6    In the Properties dialog box for the port group, click the Security tab.

               By default, Promiscuous Mode is set to Reject. MAC Address Changes and Forged Transmits are set to
               Accept.

               The policy exception overrides any policy set at the vSwitch level.

          7    In the Policy Exceptions pane, select whether to reject or accept the security policy exceptions.

               Table 5-2. Policy Exceptions
               Mode                                  Reject                                 Accept

               Promiscuous Mode                      Placing a guest adapter in             Placing a guest adapter in
                                                     promiscuous mode has no effect on      promiscuous mode causes it to detect
                                                     which frames are received by the       all frames passed on the vSwitch that
                                                     adapter.                               are allowed under the VLAN policy
                                                                                            for the port group that the adapter is
                                                                                            connected to.

               MAC Address Changes                   If the guest OS changes the MAC        If the MAC address from the guest OS
                                                     address of the adapter to anything     changes, frames to the new MAC
                                                     other than what is in the .vmx         address are received.
                                                     configuration file, all inbound
                                                     frames are dropped.
                                                     If the guest OS changes the MAC
                                                     address back to match the MAC
                                                     address in the .vmx configuration
                                                     file, inbound frames are sent again.

               Forged Transmits                      Outbound frames with a source          No filtering is performed, and all
                                                     MAC address that is different from     outbound frames are passed.
                                                     the one set on the adapter are
                                                     dropped.


          8    Click OK.

          Edit the Security Policy on a dvPort Group
          Control how inbound and outbound frames for a dvPort group are handled by editing the Security policies.

          Procedure

          1    In the vSphere Client, display the Networking inventory view and select the dvPort group.

          2    From the Inventory menu, select Network > Edit Settings.

          3    In the Properties dialog box for the port group, click the Security tab.

               By default, Promiscuous Mode is set to Reject. MAC Address Changes and Forged Transmits are set to
               Accept.

               The policy exception overrides any policy set at the vSwitch level.




VMware, Inc.                                                                                                                     53
ESX Configuration Guide




          4    In the Policy Exceptions pane, select whether to reject or accept the security policy exceptions.

               Table 5-3. Policy Exceptions
               Mode                                 Reject                                 Accept

               Promiscuous Mode                     Placing a guest adapter in             Placing a guest adapter in
                                                    promiscuous mode has no effect on      promiscuous mode causes it to detect
                                                    which frames are received by the       all frames passed on the vSwitch that
                                                    adapter.                               are allowed under the VLAN policy
                                                                                           for the port group that the adapter is
                                                                                           connected to.

               MAC Address Changes                  If the guest OS changes the MAC        If the MAC address from the guest OS
                                                    address of the adapter to anything     changes, frames to the new MAC
                                                    other than what is in the .vmx         address are received.
                                                    configuration file, all inbound
                                                    frames are dropped.
                                                    If the guest OS changes the MAC
                                                    address back to match the MAC
                                                    address in the .vmx configuration
                                                    file, inbound frames are sent again.

               Forged Transmits                     Outbound frames with a source          No filtering is performed, and all
                                                    MAC address that is different from     outbound frames are passed.
                                                    the one set on the adapter are
                                                    dropped.


          5    Click OK.

          Edit dvPort Security Policies
          Control how inbound and outbound frames for a dvPort are handled by editing the Security policies.

          Prerequisites

          To edit the Security policies on an individual dvPort, the associated dvPort group must be set to allow policy
          overrides.

          Procedure

          1    Log in to the vSphere Client and display the vNetwork Distributed Switch.

          2    On the Ports tab, right-click the port to modify and select Edit Settings.
          3    Click Policies.

               By default, Promiscuous Mode is set to Reject, and MAC Address Changes and Forged Transmits are
               set to Accept.




54                                                                                                                   VMware, Inc.
Chapter 5 Advanced Networking




          4    In the Security group, select whether to reject or accept the security policy exceptions.

               Table 5-4. Policy Exceptions
               Mode                                 Reject                                 Accept

               Promiscuous Mode                     Placing a guest adapter in             Placing a guest adapter in
                                                    promiscuous mode has no effect on      promiscuous mode causes it to detect
                                                    which frames are received by the       all frames passed on the vSwitch that
                                                    adapter.                               are allowed under the VLAN policy
                                                                                           for the port group that the adapter is
                                                                                           connected to.

               MAC Address Changes                  If the guest OS changes the MAC        If the MAC address from the guest OS
                                                    address of the adapter to anything     changes, frames to the new MAC
                                                    other than what is in the .vmx         address are received.
                                                    configuration file, all inbound
                                                    frames are dropped.
                                                    If the guest OS changes the MAC
                                                    address back to match the MAC
                                                    address in the .vmx configuration
                                                    file, inbound frames are sent again.

               Forged Transmits                     Outbound frames with a source          No filtering is performed, and all
                                                    MAC address that is different from     outbound frames are passed.
                                                    the one set on the adapter are
                                                    dropped.


          5    Click OK.


   Traffic Shaping Policy
          A traffic shaping policy is defined by three characteristics: average bandwidth, peak bandwidth, and burst
          size. You can establish a traffic shaping policy for each port group and each dvPort or dvPort group.

          ESX shapes outbound network traffic on vSwitches and both inbound and outbound traffic on a vNetwork
          Distributed Switch. Traffic shaping restricts the network bandwidth available on a port, but can also be
          configured to allow bursts of traffic to flow through at higher speeds.

          Average Bandwidth              Establishes the number of bits per second to allow across a port, averaged over
                                         time: the allowed average load.

          Peak Bandwidth                 The maximum number of bits per second to allow across a port when it is
                                         sending or receiving a burst of traffic. This limits the bandwidth used by a port
                                         whenever it is using its burst bonus.

          Burst Size                     The maximum number of bytes to allow in a burst. If this parameter is set, a
                                         port might gain a burst bonus if it does not use all its allocated bandwidth.
                                         Whenever the port needs more bandwidth than specified by Average
                                         Bandwidth, it might be allowed to temporarily transmit data at a higher speed
                                         if a burst bonus is available. This parameter limits the number of bytes that
                                         have accumulated in the burst bonus and thus transfers at a higher speed.


          Edit the Traffic Shaping Policy on a vSwitch
          Use traffic shaping policies to control the bandwidth and burst size on a vSwitch.

          Procedure

          1    Log in to the vSphere Client and select the host from the inventory panel.

          2    Click the Configuration tab, and click Networking.

          3    Click Properties for the vSwitch to edit.



VMware, Inc.                                                                                                                    55
ESX Configuration Guide




          4    In the Properties dialog box, click the Ports tab.

          5    Select the vSwitch item and click Edit.

          6    In the Properties dialog box, click the Traffic Shaping tab.

               When traffic shaping is disabled, the options are dimmed. You can selectively override all traffic-shaping
               features at the port group level if traffic shaping is enabled.

               This policy is applied to each individual virtual adapter attached to the port group, not to the vSwitch as
               a whole.

               NOTE Peak bandwidth cannot be less than the specified average bandwidth.

               Option                                 Description
               Status                                 If you enable the policy exception in the Status field, you are setting limits
                                                      on the amount of networking bandwidth allocated for each virtual adapter
                                                      associated with this particular port group. If you disable the policy, services
                                                      have a free and clear connection to the physical network.
               Average Bandwidth                      A value measured over a particular period of time.
               Peak Bandwidth                         Limits the maximum bandwidth during a burst. It can never be smaller than
                                                      the average bandwidth.
               Burst Size                             Specifies how large a burst can be in kilobytes (KB).



          Edit the Traffic Shaping Policy on a Port Group
          Use traffic shaping policies to control the bandwidth and burst size on a port group.

          Procedure

          1    Log in to the vSphere Client and select the host from the inventory panel.

          2    Click the Configuration tab, and click Networking.

          3    Click Properties for the port group to edit.

          4    In the Properties dialog box, click the Ports tab.

          5    Select the port group item and click Edit.

          6    In the Properties dialog box for the port group, click the Traffic Shaping tab.

               When traffic shaping is disabled, the options are dimmed.

               Option                                 Description
               Status                                 If you enable the policy exception in the Status field, you are setting limits
                                                      on the amount of networking bandwidth allocated for each virtual adapter
                                                      associated with this particular port group. If you disable the policy, services
                                                      have a free and clear connection to the physical network.
               Average Bandwidth                      A value measured over a particular period of time.
               Peak Bandwidth                         Limits the maximum bandwidth during a burst. It can never be smaller than
                                                      the average bandwidth.
               Burst Size                             Specifies how large a burst can be in kilobytes (KB).




56                                                                                                                      VMware, Inc.
Chapter 5 Advanced Networking




          Edit the Traffic Shaping Policy on a dvPort Group
          You can shape both inbound and outbound traffic on vNetwork Distributed Switches. You can restrict the
          network bandwidth available to a port, but you can also temporarily allow bursts of traffic to flow through a
          port at higher speeds.

          A traffic shaping policy is defined by three characteristics: average bandwidth, peak bandwidth, and burst
          size. Traffic shaping policies do not apply to iSCSI traffic on a dependent hardware iSCSI adapter.

          Procedure

          1    In the vSphere Client, display the Networking inventory view and select the dvPort group.

          2    From the Inventory menu, select Network > Edit Settings.

          3    Select Traffic Shaping.

          4    In the Properties dialog box for the port group, click the Traffic Shaping tab.

               You can configure both inbound traffic shaping and outbound traffic shaping. When traffic shaping is
               disabled, the options are dimmed.

               NOTE Peak bandwidth cannot be less than the specified average bandwidth.

               Option                                Description
               Status                                If you enable the policy exception in the Status field, you are setting limits
                                                     on the amount of networking bandwidth allocated for each virtual adapter
                                                     associated with this particular port group. If you disable the policy, services
                                                     have a free and clear connection to the physical network.
               Average Bandwidth                     A value measured over a particular period of time.
               Peak Bandwidth                        Limits the maximum bandwidth during a burst. It can never be smaller than
                                                     the average bandwidth.
               Burst Size                            Specifies how large a burst can be in kilobytes (KB).



          Edit dvPort Traffic Shaping Policies
          You can shape both inbound and outbound traffic on vNetwork Distributed Switches. You can restrict the
          network bandwidth available to a port, but you can also temporarily allow bursts of traffic to flow through a
          port at higher speeds.

          A traffic shaping policy is defined by three characteristics: average bandwidth, peak bandwidth, and burst
          size. Traffic shaping policies do not apply to iSCSI traffic on a dependent hardware iSCSI adapter.

          Prerequisites

          To edit the traffic shaping policies on an individual dvPort, the associated dvPort group must be set to allow
          policy overrides.

          Procedure

          1    Log in to the vSphere Client and display the vNetwork Distributed Switch.

          2    On the Ports tab, right-click the port to modify, and select Edit Settings.

          3    Click Policies.




VMware, Inc.                                                                                                                     57
ESX Configuration Guide




          4    In the Traffic Shaping group, you can configure both inbound traffic shaping and outbound traffic shaping.

               When traffic shaping is disabled, the options are dimmed.

               Option                                Description
               Status                                If you enable the policy exception in the Status field, you are setting limits
                                                     on the amount of networking bandwidth allocated for each virtual adapter
                                                     associated with this particular port group. If you disable the policy, services
                                                     have a free and clear connection to the physical network.
               Average Bandwidth                     A value measured over a particular period of time.
               Peak Bandwidth                        Limits the maximum bandwidth during a burst. It can never be smaller than
                                                     the average bandwidth.
               Burst Size                            Specifies how large a burst can be in kilobytes (KB).


          5    Click OK.


     Port Blocking Policies
          Set blocking policies for dvPorts from the miscellaneous policies dialog box.

          Edit the Port Blocking Policy on a dvPort Group
          Set the port blocking policy for a dvPort group under miscellaneous policies.

          Procedure

          1    In the vSphere Client, display the Networking inventory view and select the dvPort group.

          2    From the Inventory menu, select Network > Edit Settings.

          3    Select Miscellaneous.

          4    Choose whether to Block all ports on this dvPort group.

          Edit dvPort Port Blocking Policy
          The Miscellaneous policies dialog allows you to configure port blocking policies for a dvPort.

          Procedure

          1    Log in to the vSphere Client and display the vNetwork Distributed Switch.

          2    On the Ports tab, right-click the port to modify and select Edit Settings.

          3    Click Policies.

          4    In the Miscellaneous group, select whether to Block all ports.

          5    Click OK.


Change the DNS and Routing Configuration
          You can change the DNS server and default gateway information provided during installation from the host
          configuration page in the vSphere Client.

          Procedure

          1    Log in to the vSphere Client and select the host from the inventory panel.

          2    Click the Configuration tab, and click DNS and Routing.

          3    On the right side of the window, click Properties.

          4    In the DNS Configuration tab, enter a name and domain.


58                                                                                                                     VMware, Inc.
Chapter 5 Advanced Networking




          5    Choose whether to obtain the DNS server address automatically or use a DNS server address.

               NOTE DHCP is supported only if the DHCP server is accessible to the service console. The service console
               must have a virtual interface (vswif) configured and attached to the network where the DHCP server
               resides.

          6    Specify the domains in which to look for hosts.

          7    On the Routing tab, change the default gateway information as needed.

               Select a gateway device only if you have configured the service console to connect to more than one subnet.

          8    Click OK.


MAC Addresses
          MAC addresses are generated for virtual network adapters that the service console, the VMkernel, and virtual
          machines use.

          In most cases, the generated MAC addresses are appropriate. However, you might need to set a MAC address
          for a virtual network adapter, as in the following cases:
          n    Virtual network adapters on different physical hosts share the same subnet and are assigned the same
               MAC address, causing a conflict.
          n    To ensure that a virtual network adapter always has the same MAC address.

          To circumvent the limit of 256 virtual network adapters per physical machine and possible MAC address
          conflicts between virtual machines, system administrators can manually assign MAC addresses. VMware uses
          the Organizationally Unique Identifier (OUI) 00:50:56 for manually generated addresses.

          The MAC address range is 00:50:56:00:00:00-00:50:56:3F:FF:FF.

          You can set the addresses by adding the following line to a virtual machine‘s configuration file:
          ethernet<number>.address = 00:50:56:XX:YY:ZZ

          where <number> refers to the number of the Ethernet adapter, XX is a valid hexadecimal number between 00
          and 3F, and YY and ZZ are valid hexadecimal numbers between 00 and FF. The value for XX must not be greater
          than 3F to avoid conflict with MAC addresses that are generated by the VMware Workstation and VMware
          Server products. The maximum value for a manually generated MAC address is:
          ethernet<number>.address = 00:50:56:3F:FF:FF

          You must also set the option in a virtual machine’s configuration file:
          ethernet<number>.addressType="static"

          Because VMware ESX virtual machines do not support arbitrary MAC addresses, you must use the above
          format. As long as you choose a unique value for XX:YY:ZZ among your hard-coded addresses, conflicts
          between the automatically assigned MAC addresses and the manually assigned ones should never occur.


   MAC Address Generation
          Each virtual network adapter in a virtual machine is assigned its own unique MAC address. Each network
          adapter manufacturer is assigned a unique three-byte prefix called an Organizationally Unique Identifier
          (OUI), which it can use to generate unique MAC addresses.

          VMware has the following OUIs:
          n    Generated MAC addresses
          n    Manually set MAC addresses
          n    For legacy virtual machines, but no longer used with ESX



VMware, Inc.                                                                                                             59
ESX Configuration Guide




          The first three bytes of the MAC address that is generated for each virtual network adapter consists of the OUI.
          The MAC address-generation algorithm produces the other three bytes. The algorithm guarantees unique
          MAC addresses within a machine and attempts to provide unique MAC addresses across machines.

          The network adapters for each virtual machine on the same subnet should have unique MAC addresses.
          Otherwise, they can behave unpredictably. The algorithm puts a limit on the number of running and suspended
          virtual machines at any one time on any given host. It also does not handle all cases when virtual machines on
          distinct physical machines share a subnet.

          The VMware Universally Unique Identifier (UUID) generates MAC addresses that are checked for conflicts.
          The generated MAC addresses are created by using three parts: the VMware OUI, the SMBIOS UUID for the
          physical ESX machine, and a hash based on the name of the entity that the MAC address is being generated
          for.

          After the MAC address has been generated, it does not change unless the virtual machine is moved to a different
          location, for example, to a different path on the same server. The MAC address in the configuration file of the
          virtual machine is saved. All MAC addresses that have been assigned to network adapters of running and
          suspended virtual machines on a given physical machine are tracked.

          The MAC address of a powered off virtual machine is not checked against those of running or suspended
          virtual machines. It is possible that when a virtual machine is powered on again, it can acquire a different MAC
          address. This acquisition is caused by a conflict with a virtual machine that was powered on when this virtual
          machine was powered off.


     Set Up a MAC Address
          You can assign stati MAC addresses to a powered-down virtual machine's virtual NICs.

          Procedure

          1    Log in to the vSphere Client and select the virtual machine from the inventory panel.

          2    Click the Summary tab and click Edit Settings.

          3    Select the network adapter from the Hardware list.

          4    In the MAC Address group, select Manual.

          5    Enter the static MAC address, and click OK.


TCP Segmentation Offload and Jumbo Frames
          You must enable jumbo frames at the host level by using the command-line interface to configure the MTU
          size for each vSwitch. TCP Segmentation Offload (TSO) is enabled on the VMkernel interface by default, but
          must be enabled at the virtual machine level.


     Enabling TSO
          To enable TSO at the virtual machine level, you must replace the existing vmxnet or flexible virtual network
          adapters with enhanced vmxnet virtual network adapters. This replacement might result in a change in the
          MAC address of the virtual network adapter.

          TSO support through the enhanced vmxnet network adapter is available for virtual machines that run the
          following guest operating systems:
          n    Microsoft Windows 2003 Enterprise Edition with Service Pack 2 (32 bit and 64 bit)
          n    Red Hat Enterprise Linux 4 (64 bit)
          n    Red Hat Enterprise Linux 5 (32 bit and 64 bit)
          n    SUSE Linux Enterprise Server 10 (32 bit and 64 bit)




60                                                                                                             VMware, Inc.
Chapter 5 Advanced Networking




          Enable TSO Support for a Virtual Machine
          You can enable TSO support on a virtual machine by using an enhanced vmxnet adapter for that virtual
          machine.

          Procedure

          1    Log in to the vSphere Client and select the virtual machine from the inventory panel.

          2    Click the Summary tab, and click Edit Settings.

          3    Select the network adapter from the Hardware list.

          4    Record the network settings and MAC address that the network adapter is using.

          5    Click Remove to remove the network adapter from the virtual machine.

          6    Click Add.

          7    Select Ethernet Adapter and click Next.
          8    In the Adapter Type group, select Enhanced vmxnet.

          9    Select the network setting and MAC address that the old network adapter was using and click Next.

          10   Click Finish and then click OK.

          11   If the virtual machine is not set to upgrade VMware Tools at each power on, you must upgrade VMware
               Tools manually.

          TSO is enabled on a VMkernel interface. If TSO becomes disabled for a particular VMkernel interface, the only
          way to enable TSO is to delete that VMkernel interface and recreate it with TSO enabled.

          Check Whether TSO Is Enabled on a VMkernel Interface
          You can check whether TSO is enabled on a particular VMkernel networking interface.

          Procedure

          1    Log in to your ESX host's console.

          2    Use the esxcfg-vmknic -l command to display a list of VMkernel interfaces.

               The list shows each TSO-enabled VMkernel interface with TSO MSS set to 65535.

          What to do next

          If TSO is not enabled for a particular VMkernel interface, the only way to enable it is to delete the VMkernel
          interface and recreate the interface.


   Enabling Jumbo Frames
          Jumbo frames allow ESX to send larger frames out onto the physical network. The network must support jumbo
          frames end-to-end.

          Jumbo frames up to 9kB (9000 bytes) are supported.

          Jumbo frames must be enabled for each vSwitch or VMkernel interface through the command-line interface
          on your ESX host. Before enabling jumbo frames, check with your hardware vendor to ensure that your physical
          network adapter supports jumbo frames.




VMware, Inc.                                                                                                             61
ESX Configuration Guide




          Create a Jumbo Frames-Enabled vSwitch
          You configure a vSwitch for jumbo frames by changing the MTU size for that vSwitch.

          Procedure

          1    Use the vicfg-vswitch -m <MTU> <vSwitch> command in the VMware vSphere CLI to set the MTU size
               for the vSwitch.

               This command sets the MTU for all uplinks on that vSwitch. Set the MTU size to the largest MTU size
               among all the virtual network adapters connected to the vSwitch.

          2    Use the vicfg-vswitch -l command to display a list of vSwitches on the host and check that the
               configuration of the vSwitch is correct.

          Enable Jumbo Frames on a vNetwork Distributed Switch
          You enable a vNetwork Distributed Switch for jumbo frames by changing the MTU size for that vNetwork
          Distributed Switch.

          Procedure

          1    In the vSphere Client, display the Networking inventory view and select the vNetwork Distributed Switch.

          2    From the Inventory menu, select vNetwork Distributed Switch > Edit Settings.

          3    On the Properties tab, select Advanced.

          4    Set the Maximum MTU to the largest MTU size among all the virtual network adapters connected to the
               vNetwork Distributed Switch, and click OK.

          Enable Jumbo Frame Support on a Virtual Machine
          Enabling jumbo frame support on a virtual machine requires an enhanced vmxnet adapter for that virtual
          machine.

          Procedure

          1    Log in to the vSphere Client and select the virtual machine from the inventory panel.

          2    Click the Summary tab, and click Edit Settings.

          3    Select the network adapter from the Hardware list.

          4    Record the network settings and MAC address that the network adapter is using.

          5    Click Remove to remove the network adapter from the virtual machine.

          6    Click Add.

          7    Select Ethernet Adapter and click Next.

          8    In the Adapter Type group, select Enhanced vmxnet.

          9    Select the network that the old network adapter was using and click Next.

          10   Click Finish.

          11   Select the new network adapter from the Hardware list.

          12   Under MAC Address, select Manual, and enter the MAC address that the old network adapter was using.

          13   Click OK.

          14   Check that the Enhanced vmxnet adapter is connected to a vSwitch with jumbo frames enabled.




62                                                                                                          VMware, Inc.
Chapter 5 Advanced Networking




          15   Inside the guest operating system, configure the network adapter to allow jumbo frames.

               See your guest operating system’s documentation for details.

          16   Configure all physical switches and any physical or virtual machines to which this virtual machine
               connects to support jumbo frames.

          Create a Jumbo Frames-Enabled VMkernel Interface
          You can create a VMkernel network interface enabled with jumbo frames.

          Procedure

          1    Log in to your ESX host’s console.

          2    Use the esxcfg-vmknic -a -I <ip address> -n <netmask> -m <MTU> <port group name> command to
               create a VMkernel connection with jumbo frame support.

          3    Use the esxcfg-vmknic -l command to display a list of VMkernel interfaces and check that the
               configuration of the jumbo frame-enabled interface is correct.
          4    Check that the VMkernel interface is connected to a vSwitch with jumbo frames enabled.

          5    Configure all physical switches and any physical or virtual machines to which this VMkernel interface
               connects to support jumbo frames.


NetQueue and Networking Performance
          NetQueue in ESX takes advantage of the ability of some network adapters to deliver network traffic to the
          system in multiple receive queues that can be processed separately, allowing processing to be scaled to multiple
          CPUs, improving receive-side networking performance.


   Enable NetQueue on an ESX Host
          NetQueue is enabled by default. To use NetQueue after it has been disabled, you must reenable it.

          Prerequisites

          Familiarize yourself with the information on configuring NIC drivers in the VMware vSphere Command-Line
          Interface Installation and Reference guide.

          Procedure

          1    In the VMware vSphere CLI, use the command vicfg-advcfg --set true
               VMkernel.Boot.netNetQueueEnable.

          2    Use the VMware vSphere CLI to configure the NIC driver to use NetQueue.

          3    Reboot the ESX host.


   Disable NetQueue on an ESX Host
          NetQueue is enabled by default.

          Procedure

          1    In the VMware vSphere CLI, use the command vicfg-advcfg --set false
               VMkernel.Boot.netNetQueueEnable.

          2    To disable NetQueue on the NIC driver, use the vicfg-module -s "" module name command.

               For example, if you are using the s2io NIC driver, use vicfg-module -s "" s2io.

          3    Reboot the host.



VMware, Inc.                                                                                                             63
ESX Configuration Guide




VMDirectPath I/O
          VMDirectPath I/O allows virtual machine access to physical PCI functions on platforms with an I/O Memory
          Management Unit.

          The following features are unavailable for virtual machines configured with VMDirectPath:
          n    vMotion
          n    Hot adding and removing of virtual devices
          n    Suspend and resume
          n    Record and replay
          n    Fault tolerance
          n    High availability
          n    DRS (limited availability. The virtual machine can be part of a cluster, but cannot migrate across hosts)

          See the hardware compatibility guides for the latest systems and adapters supported with this configuration.


     Configure Passthrough Devices on a Host
          You can configure passthrough networking devices on a host.

          Procedure

          1    Select a host from the inventory panel of the vSphere Client.

          2    On the Configuration tab, click Advanced Settings.

               The Passthrough Configuration page appears, listing all available passthrough devices. A green icon
               indicates that a device is enabled and active. An orange icon indicates that the state of the device has
               changed and the host must be rebooted before the device can be used.

          3    Click Edit.

          4    Select the devices to be used for passthrough and click OK.


     Configure a PCI Device on a Virtual Machine
          You can configure a passthrough PCI device on a virtual machine.

          Procedure

          1    Select a virtual machine from the inventory panel of the vSphere Client.

          2    From the Inventory menu, select Virtual Machine > Edit Settings.

          3    On the Hardware tab, click Add.

          4    Select PCI Device and click Next.

          5    Select the passthrough device to use, and click Next.

          6    Click Finish.

          Adding a VMDirectPath device to a virtual machine sets memory reservation to the memory size of the virtual
          machine.




64                                                                                                              VMware, Inc.
Networking Best Practices, Scenarios,
and Troubleshooting                                                                                             6
          The following best practices, configuration scenarios, and troubleshooting guidelines provide suggestions for
          common networking configurations and pitfalls.

          This chapter includes the following topics:
          n    “Networking Best Practices,” on page 65
          n    “Mounting NFS Volumes,” on page 66
          n    “Networking Configuration for Software iSCSI and Dependent Hardware iSCSI,” on page 67
          n    “Configuring Networking on Blade Servers,” on page 70
          n    “Troubleshooting,” on page 72


Networking Best Practices
          Consider these best practices for configuring your network.
          n    Separate network services from one another to achieve greater security or better performance.

               To have a particular set of virtual machines function at the highest performance levels, put them on a
               separate physical NIC. This separation allows for a portion of the total networking workload to be more
               evenly shared across multiple CPUs. The isolated virtual machines can then better serve traffic from a
               Web client, for instance.
          n    You can satisfy the following recommendations either by using VLANs to segment a single physical
               network or separate physical networks (the latter is preferable).
               n   Keeping the service console on its own network is an important part of securing the ESX system.
                   Consider the service console network connectivity in the same light as any remote access device in a
                   host, because compromising the service console gives an attacker full control of all virtual machines
                   running on the system.
               n   Keeping the vMotion connection on a separate network devoted to vMotion is important because
                   when migration with vMotion occurs, the contents of the guest operating system’s memory is
                   transmitted over the network.
          n    When using passthrough devices with a Linux kernel version 2.6.20 or earlier, avoid MSI and MSI-X modes
               because these modes have significant performance impact.
          n    To physically separate network services and to dedicate a particular set of NICs to a specific network
               service, create a vSwitch for each service. If this is not possible, separate them on a single vSwitch by
               attaching them to port groups with different VLAN IDs. In either case, confirm with your network
               administrator that the networks or VLANs you choose are isolated in the rest of your environment and
               that no routers connect them.




VMware, Inc.                                                                                                           65
ESX Configuration Guide




          n    You can add and remove NICs from the vSwitch without affecting the virtual machines or the network
               service that is running behind that vSwitch. If you remove all the running hardware, the virtual machines
               can still communicate among themselves. Moreover, if you leave one NIC intact, all the virtual machines
               can still connect with the physical network.
          n    To protect your most sensitive virtual machines, deploy firewalls in virtual machines that route between
               virtual networks with uplinks to physical networks and pure virtual networks with no uplinks.


Mounting NFS Volumes
          In ESX, the model of how ESX accesses NFS storage of ISO images that are used as virtual CD-ROMs for virtual
          machines is different from the model used in ESX Server 2.x.

          ESX has support for VMkernel-based NFS mounts. The new model is to mount your NFS volume with the ISO
          images through the VMkernel NFS functionality. All NFS volumes mounted in this way appear as datastores
          in the vSphere Client. The virtual machine configuration editor allows you to browse the service console file
          system for ISO images to be used as virtual CD-ROM devices.




66                                                                                                           VMware, Inc.
Chapter 6 Networking Best Practices, Scenarios, and Troubleshooting




Networking Configuration for Software iSCSI and Dependent Hardware
iSCSI
          If you use the software iSCSI adapter or dependent hardware iSCSI adapters, you must set up the networking
          for iSCSI before you can enable and configure your iSCSI adapters. Networking configuration for iSCSI
          involves opening a VMkernel iSCSI port for the traffic between the iSCSI adapter and the physical NIC.

          Depending on the number of physical NICs you use for iSCSI traffic, the networking setup can be different.
          n    If you have a single physical NIC, create one iSCSI port on a vSwitch connected to the NIC. VMware
               recommends that you designate a separate network adapter for iSCSI. Do not use iSCSI on 100Mbps or
               slower adapters.
          n    If you have two or more physical NICs for iSCSI, create a separate iSCSI port for each physical NIC and
               use the NICs for iSCSI multipathing. See Figure 6-1.
               Figure 6-1. Networking with iSCSI
                   Two physical NICs connected to                   Two physical NICs with iSCSI
                     the software iSCSI adapter                          offload capabilities


                         software iSCSI adapter                    dependent hardware iSCSI adapters
                                vmhba#                                  vmhba33          vmhba34

                                                          iSCSI
                         vmk1             vmk2             ports            vmk1            vmk2

                                vSwitch                                       vSwitch

                 Host1                                                                             Host2     virtual

                 Host1      vmnic1           vmnic2                vmnic1          vmnic2          Host2 physical


                             physical NICs                                     physical NICs
                                                                                with iSCSI
                                                                                  offload
                                                                                capabilities


                                                      IP network




                                          iSCSI storage                                   iSCSI storage




               NOTE When you use a dependent hardware iSCSI adapter, performance reporting for a NIC associated
               with the adapter might show little or no activity, even when iSCSI traffic is heavy. This behavior occurs
               because the iSCSI traffic bypasses the regular networking stack.




VMware, Inc.                                                                                                                         67
ESX Configuration Guide




     Create iSCSI Port for a Single NIC
          Use this task to connect the VMkernel, which runs services for iSCSI storage, to a physical NIC. If you have
          just one physical network adapter to be used for iSCSI traffic, this is the only procedure you must perform to
          set up your iSCSI networking.

          Procedure

          1    Log in to the vSphere Client and select the host from the inventory panel.

          2    Click the Configuration tab and click Networking.

          3    In the Virtual Switch view, click Add Networking.

          4    Select VMkernel and click Next.

          5    Select Create a virtual switch to create a new vSwitch.

          6    Select a NIC you want to use for iSCSI traffic.

               IMPORTANT If you are creating a port for the dependent hardware iSCSI adapter, make sure to select the
               NIC that corresponds to the iSCSI component. See “Determine Association Between Dependent Hardware
               iSCSI and Physical Network Adapters,” on page 96.

          7    Click Next.

          8    Enter a network label.

               Network label is a friendly name that identifies the VMkernel port that you are creating, for example,
               iSCSI.

          9    Click Next.

          10   Specify the IP settings and click Next.

          11   Review the information and click Finish.


     Using Multiple NICs for Software and Dependent Hardware iSCSI
          If your host has more than one physical NIC for iSCSI, for each physical NIC, create a separate iSCSI port using
          1:1 mapping.

          To achieve the 1:1 mapping, designate a separate vSwitch for each network adapter and iSCSI port pair. See
          Figure 6-2.
          Figure 6-2. iSCSI Ports and NICs on Separate vSwitches




68                                                                                                             VMware, Inc.
Chapter 6 Networking Best Practices, Scenarios, and Troubleshooting




          An alternative is to add all NIC and iSCSI port pairs to a single vSwitch. See Figure 6-3. You must override the
          default setup and make sure that each port maps to only one corresponding active NIC.
          Figure 6-3. iSCSI Ports and NICs on a Single vSwitch




          For information about adding the NIC and VMkernel port pairs to a vSwitch, see “Create Additional iSCSI
          Ports for Multiple NICs,” on page 69.

          After you map iSCSI ports to network adapters, use the esxcli command to bind the ports to the iSCSI adapters.
          With dependent hardware iSCSI adapters, perform port binding, whether you use one NIC or multiple NICs.
          For information, see “Bind iSCSI Ports to iSCSI Adapters,” on page 96.


   Create Additional iSCSI Ports for Multiple NICs
          Use this task if you have two or more NICs you can designate for iSCSI and you want to connect all of your
          iSCSI NICs to a single vSwitch. In this task, you associate VMkernel iSCSI ports with the network adapters
          using 1:1 mapping.

          You now need to connect additional NICs to the existing vSwitch and map them to corresponding iSCSI ports.

          NOTE If you use a vNetwork Distributed Switch with multiple dvUplinks, for port binding, create a separate
          dvPort group per each physical NIC. Then set the team policy so that each dvPort group has only one active
          dvUplink.

          For detailed information on vNetwork Distributed Switches, see the Networking section.

          Prerequisites

          You must create a vSwitch that maps an iSCSI port to a physical NIC designated for iSCSI traffic.

          Procedure

          1    Log in to the vSphere Client and select the host from the inventory panel.

          2    Click the Configuration tab and click Networking.

          3    Select the vSwitch that you use for iSCSI and click Properties.

          4    Connect additional network adapters to the vSwitch.

               a   In the vSwitch Properties dialog box, click the Network Adapters tab and click Add.

               b   Select one or more NICs from the list and click Next.

                   With dependent hardware iSCSI adapters, make sure to select only those NICs that have a
                   corresponding iSCSI component.

               c   Review the information on the Adapter Summary page, and click Finish.

                   The list of network adapters reappears, showing the network adapters that the vSwitch now claims.




VMware, Inc.                                                                                                                     69
ESX Configuration Guide




          5    Create iSCSI ports for all NICs that you connected.

               The number of iSCSI ports must correspond to the number of NICs on the vSwitch.

               a     In the vSwitch Properties dialog box, click the Ports tab and click Add.

               b     Select VMkernel and click Next.

               c     Under Port Group Properties, enter a network label, for example iSCSI, and click Next.

               d     Specify the IP settings and click Next.

                     When you enter subnet mask, make sure that the NIC is set to the subnet of the storage system it
                     connects to.

               e     Review the information and click Finish.

               CAUTION If the NIC you use with your iSCSI adapter, either software or dependent hardware, is not in
               the same subnet as your iSCSI target, your host is not able to establish sessions from this network adapter
               to the target.

          6    Map each iSCSI port to just one active NIC.

               By default, for each iSCSI port on the vSwitch, all network adapters appear as active. You must override
               this setup, so that each port maps to only one corresponding active NIC. For example, iSCSI port vmk1
               maps to vmnic1, port vmk2 maps to vmnic2, and so on.

               a     On the Ports tab, select an iSCSI port and click Edit.

               b     Click the NIC Teaming tab and select Override vSwitch failover order.

               c     Designate only one adapter as active and move all remaining adapters to the Unused Adapters
                     category.

          7    Repeat the last step for each iSCSI port on the vSwitch.

          What to do next

          After performing this task, use the esxcli command to bind the iSCSI ports to the software iSCSI or dependent
          hardware iSCSI adapters.


Configuring Networking on Blade Servers
          Because blade servers have a limited number of network adapters, you might need to use VLANs to separate
          traffic for the service console, vMotion, IP storage, and various groups of virtual machines.

          VMware best practices recommend that the service console and vMotion have their own networks for security
          reasons. If you dedicate physical adapters to separate vSwitches for this purpose, you might need to relinquish
          redundant (teamed) connections, stop isolating the various networking clients, or both. VLANs allow you to
          achieve network segmentation without having to use multiple physical adapters.

          For the network blade of a blade server to support an ESX port group with VLAN tagged traffic, you must
          configure the blade to support 802.1Q and configure the port as a tagged port.

          The method for configuring a port as a tagged port differs from server to server. The list describes how to
          configure a tagged port on three of the most commonly used blade servers.

          Table 6-1. Port Tagging Options on Blade Servers
          Server Type                                                Configuration Option

          HP Blade                                                   Set VLAN Tagging to enabled.

          Dell PowerEdge                                             Set the port to Tagged.

          IBM eServer Blade Center                                   Select Tag in the port’s configuration.




70                                                                                                             VMware, Inc.
Chapter 6 Networking Best Practices, Scenarios, and Troubleshooting




   Configure a Virtual Machine Port Group with a VLAN on a Blade Server
          Configuring virtual machine networking on a blade server requires some special considerations.

          Procedure

          1    Log in to the vSphere Client and select the host from the inventory panel.

          2    Click the Configuration tab, and click Networking.

          3    On the right side of the page, click Properties for the vSwitch associated with the service console.

          4    On the Ports tab, click Add.

          5    Select Virtual Machines for the connection type (default).

          6    Click Next.

          7    In the Port Group Properties group, enter a network label that identifies the port group that you are
               creating.

               Use network labels to identify migration-compatible connections common to two or more hosts.

          8    For VLAN ID, enter a number between 1 and 4094.

               If you are unsure what to enter, leave this blank or ask your network administrator.

          9    Click Next.

          10   After you determine that the vSwitch is configured correctly, click Finish.


   Configure a VMkernel Port with a VLAN on a Blade Server
          You can configure a VMkernel networking interface using a VLAN on a blade server.

          Procedure

          1    Log in to the vSphere Client and select the host from the inventory panel.

          2    Click the Configuration tab, and click Networking.

          3    On the right side of the page, click Properties for the vSwitch associated with the service console.

          4    On the Ports tab, click Add.

          5    Select VMkernel and click Next.

               This option lets you connect the physical network to the VMkernel, which runs services for vMotion and
               IP storage (NFS or iSCSI).

          6    In the Port Group Properties group, select or enter a network label and a VLAN ID.

               Enter a network label to identify the port group that you are creating. This is the label that you specify
               when configuring a virtual adapter to be attached to this port group, when configuring VMkernel services,
               such as vMotion and IP storage.

               Enter a VLAN ID to identify the VLAN that the port group’s network traffic will use.

          7    Select Use this port group for vMotion to enable this port group to advertise itself to another ESX host as
               the network connection where vMotion traffic should be sent.

               You can enable this property for only one vMotion and IP storage port group for each ESX host. If this
               property is not enabled for any port group, migration with vMotion to this host is not possible.




VMware, Inc.                                                                                                                      71
ESX Configuration Guide




          8    In the IP Settings group, click Edit to set the VMkernel default gateway for VMkernel services, such as
               vMotion, NAS, and iSCSI.

               Under the DNS Configuration tab, the name of the host is entered into the name field by default. The
               DNS server addresses and the domain that were specified during installation are also preselected.

               On the Routing tab, the service console and the VMkernel each need their own gateway information. A
               gateway is needed if connectivity to machines not on the same IP subnet as the service console or
               VMkernel.

               Static IP settings is the default.

          9    Click OK and then click Next.

          10   Click Back to make any changes.

          11   Review your changes on the Ready to Complete page and click Finish.


Troubleshooting
          You might encounter host networking issues that require troubleshooting. In many cases, host networking can
          be restored with only a few configuration changes.


     Troubleshooting Service Console Networking
          If certain parts of the service console’s networking are misconfigured, you cannot access your ESX host with
          the vSphere Client.

          If your host’s service console loses network connectivity, you can reconfigure networking by connecting
          directly to the service console and using service console commands.
          n    esxcfg-vswif -l

               Provides a list of the service console’s current network interfaces. Check that vswif0 is present and that
               the current IP address and netmask are correct.
          n    esxcfg-vswitch -l

               Provides a list of the current virtual switch configurations. Check that the uplink adapter configured for
               the service console is connected to the appropriate physical network.
          n    exscfg-nics -l

               Provides a list of the current network adapters. Check that the uplink adapter configured for the service
               console is up and that the speed and duplex are both correct.
          n    esxcfg-nics -s <speed> <nic>

               Changes the speed of a network adapter.
          n    esxcfg-nics -d <duplex> <nic>

               Changes the duplex of a network adapter.
          n    esxcfg-vswif -I <new ip address> vswifX

               Changes the service console’s IP address.
          n    esxcfg-vswif -n <new netmask> vswifX

               Changes the service console’s netmask.




72                                                                                                             VMware, Inc.
Chapter 6 Networking Best Practices, Scenarios, and Troubleshooting




          n    esxcfg-vswitch -U <old vmnic> <service console vswitch>

               Removes the uplink for the service console.
          n    esxcfg-vswitch -L <new vmnic> <service console vswitch>

               Changes the uplink for the service console.

          If you encounter long waits when using esxcfg-* commands, DNS might be misconfigured. The esxcfg-*
          commands require that DNS be configured so that localhost name resolution works properly. This requires
          that the /etc/hosts file contain an entry for the configured IP address and the 127.0.0.1 localhost address.


   Rename Network Adapters by Using the Service Console
          If you lose service console connectivity after adding a new network adapter, you must use the service console
          to rename the affected network adapters. Adding a new network adapter can cause loss of service console
          connectivity and manageability by using the vSphere Client because of network adapters are renamed.

          Procedure

          1    Log in directly to the ESX host’s console.

          2    Use the esxcfg-nics -l command to see which names are assigned to the network adapters.

          3    Use the esxcfg-vswitch -l command to see which vSwitches are now associated with device names no
               longer shown by esxcfg-nics.

          4    Use the esxcfg-vswitch -U <old vmnic name> <vswitch> command to remove any network adapters that
               were renamed.

          5    Use the esxcfg-vswitch -L <new vmnic name> <vswitch> command to add the network adapters again,
               giving them the correct names.


   Troubleshooting Physical Switch Configuration
          You might lose vSwitch connectivity when a failover or failback event occurs. This causes the MAC addresses
          that the virtual machines associated with that vSwitch to appear on a different switch port.

          To avoid this problem, put your physical switch in PortFast or PortFast trunk mode.


   Troubleshooting Port Group Configuration
          Changing the name of a port group when virtual machines are already connected to that port group causes an
          invalid network configuration for the virtual machines that are configured to connect to that port group.

          The connection from virtual network adapters to port groups is made by name, and the name is the identifier
          that is stored in the virtual machine configuration. Changing the name of a port group does not cause a mass
          reconfiguration of all the virtual machines connected to that port group. Virtual machines that are already
          powered on continue to function until they are powered off, because their connections to the network are
          already established.

          Avoid renaming networks after they are in use. After you rename a port group, you must reconfigure each
          associated virtual machine by using the service console to reflect the new port group name.




VMware, Inc.                                                                                                                    73
ESX Configuration Guide




74                        VMware, Inc.
Storage




VMware, Inc.             75
ESX Configuration Guide




76                        VMware, Inc.
Introduction to Storage                                                                                              7
          This introduction describes available storage options for ESX and explains how to configure your ESX system
          so that it can use and manage different types of storage.

          This chapter includes the following topics:
          n    “About ESX Storage,” on page 77
          n    “Types of Physical Storage,” on page 78
          n    “Supported Storage Adapters,” on page 79
          n    “Target and Device Representations,” on page 79
          n    “About ESX Datastores,” on page 81
          n    “Comparing Types of Storage,” on page 84
          n    “Displaying Storage Adapters,” on page 85
          n    “Viewing Storage Devices,” on page 86
          n    “Displaying Datastores,” on page 87


About ESX Storage
          ESX storage refers to the storage space on a variety of physical storage systems, local or networked, that a host
          uses to store virtual machine disks.

          A virtual machine uses a virtual hard disk to store its operating system, program files, and other data associated
          with its activities. A virtual disk is a large physical file, or a set of files, that can be copied, moved, archived,
          and backed up as easily as any other file. To store virtual disk files and manipulate the files, a host requires
          dedicated storage space.

          The host uses storage space on a variety of physical storage systems, including your host’s internal and external
          devices, or networked storage, dedicated to the specific tasks of storing and protecting data.

          The host can discover storage devices to which it has access and format them as datastores. The datastore is a
          special logical container, analogous to a file system, where ESX places virtual disk files and other files that
          encapsulate essential components of a virtual machine. Deployed on different storage devices, the datastores
          hide specifics of each storage device and provide a uniform model for storing virtual machine files.

          Using the vSphere Client, you can set up datastores on any storage device that your host discovers. In addition,
          you can use folders to create logical groups of datastores for organizational purposes, and for setting
          permissions and alarms across the datastore group.




VMware, Inc.                                                                                                                77
ESX Configuration Guide




Types of Physical Storage
          The ESX storage management process starts with storage space that your storage administrator preallocates
          on different storage systems.

          ESX supports the following types of storage:

          Local Storage                  Stores virtual machine files on internal or directly connected external storage
                                         disks.

          Networked Storage              Stores virtual machine files on external storage disks or arrays attached to your
                                         host through a direct connection or through a high-speed network.


     Local Storage
          Local storage can be internal hard disks located inside your ESX host, or it can be external storage systems
          located outside and connected to the host directly through protocols such as SAS or SATA.

          Local storage does not require a storage network to communicate with your host. You need is a cable connected
          to the storage unit and, when required, a compatible HBA in your host.

          ESX supports a variety of internal or external local storage devices, including SCSI, IDE, SATA, USB, and SAS
          storage systems. Regardless of the type of storage you use, your host hides a physical storage layer from virtual
          machines.

          NOTE You cannot use IDE/ATA drives to store virtual machines.

          Local storage devices do not support sharing across multiple hosts. A datastore on a local storage device can
          be accessed by only one host.

          Because the majority of local storage devices do not support multiple connections, you cannot use multiple
          paths to access local storage.


     Networked Storage
          Networked storage consists of external storage systems that your ESX host uses to store virtual machine files
          remotely. Typically, the host accesses these systems over a high-speed storage network.

          Networked storage devices are shared. Datastores on networked storage devices can be accessed by multiple
          hosts concurrently. ESX supports the following networked storage technologies.

          NOTE Accessing the same storage through different transport protocols, such as iSCSI and Fibre Channel, at
          the same time is not supported.

          Fibre Channel (FC)             Stores virtual machine files remotely on an FC storage area network (SAN). FC
                                         SAN is a specialized high-speed network that connects your hosts to high-
                                         performance storage devices. The network uses Fibre Channel protocol to
                                         transport SCSI traffic from virtual machines to the FC SAN devices.




78                                                                                                              VMware, Inc.
Chapter 7 Introduction to Storage




                                           To connect to the FC SAN, your host should be equipped with Fibre Channel
                                           host bus adapters (HBAs). Unless you use Fibre Channel direct connect storage,
                                           you need Fibre Channel switches to route storage traffic. If your host contains
                                           FCoE (Fibre Channel over Ethernet) HBAs, you can connect to your shared
                                           Fibre Channel devices using an IP network.

          Internet SCSI (iSCSI)            Stores virtual machine files on remote iSCSI storage devices. iSCSI packages
                                           SCSI storage traffic into the TCP/IP protocol so that it can travel through
                                           standard TCP/IP networks instead of the specialized FC network. With an iSCSI
                                           connection, your host serves as the initiator that communicates with a target,
                                           located in remote iSCSI storage systems.

                                           ESX offers the following types of iSCSI connections:

                                           Hardware iSCSI                Your host connects to storage through a third-party
                                                                         adapter capable of offloading the iSCSI and network
                                                                         processing.

                                           Software iSCSI                Your host uses a software-based iSCSI initiator in the
                                                                         VMkernel to connect to storage. With this type of iSCSI
                                                                         connection, your host needs only a standard network
                                                                         adapter for network connectivity.

          Network-attached                 Stores virtual machine files on remote file servers accessed over a standard
          Storage (NAS)                    TCP/IP network. The NFS client built into ESX uses Network File System (NFS)
                                           protocol version 3 to communicate with the NAS/NFS servers. For network
                                           connectivity, the host requires a standard network adapter.

          Shared Serial Attached           Stores virtual machines on direct-attached SAS storage systems that offer
          SCSI (SAS)                       shared access to multiple hosts. This type of access permits multiple hosts to
                                           access the same VMFS datastore on a LUN.


Supported Storage Adapters
          Storage adapters provide connectivity for your ESX host to a specific storage unit or network.

          Depending on the type of storage you use, you might need to install or enable a storage adapter on your host.
          ESX supports different classes of adapters, including SCSI, iSCSI, RAID, Fibre Channel, Fibre Channel over
          Ethernet (FCoE), and Ethernet. ESX accesses the adapters directly through device drivers in the VMkernel.


Target and Device Representations
          In the ESX context, the term target identifies a single storage unit that the host can access. The terms device
          and LUN describe a logical volume that represents storage space on a target. Typically, the terms device and
          LUN, in the ESX context, mean a SCSI volume presented to the host from a storage target and available for
          formatting.

          Different storage vendors present the storage systems to ESX hosts in different ways. Some vendors present a
          single target with multiple storage devices or LUNs on it, while others present multiple targets with one LUN
          each.
          Figure 7-1. Target and LUN Representations

                        target                  target       target      target


               LUN       LUN         LUN         LUN         LUN         LUN



                     storage array                       storage array




VMware, Inc.                                                                                                                         79
ESX Configuration Guide




          In this illustration, three LUNs are available in each configuration. In one case, the host sees one target, but
          that target has three LUNs that can be used. Each LUN represents an individual storage volume. In the other
          example, the host sees three different targets, each having one LUN.

          Targets that are accessed through the network have unique names that are provided by the storage systems.
          The iSCSI targets use iSCSI names, while Fibre Channel targets use World Wide Names (WWNs).

          NOTE ESX does not support accessing the same LUN through different transport protocols, such as iSCSI and
          Fibre Channel.

          A device, or LUN, is identified by its UUID name. If a LUN is shared by multiple hosts, it must be presented
          to all host with the same UUID.


     Understanding Fibre Channel Naming
          In Fibre Channel SAN, a World Wide Name (WWN) uniquely identifies each element in the network, such as
          a Fibre Channel adapter or storage device.

          The WWN is a 64-bit address that consists of 16 hexadecimal numbers and might look like this:
          20:00:00:e0:8b:8b:38:77 21:00:00:e0:8b:8b:38:77

          The WWN is assigned to every Fibre Channel SAN element by its manufacturer.


     Understanding iSCSI Naming and Addressing
          In an iSCSI network, each iSCSI element that uses the network has a unique and permanent iSCSI name and
          is assigned an address for access.

          iSCSI Name
          Identifies a particular iSCSI element, regardless of its physical location. The iSCSI name can use IQN or EUI
          format.
          n    IQN (iSCSI qualified name). Can be up to 255 characters long and has the following format:
               iqn.yyyy-mm.naming-authority:unique name

               yyyy-mm                      The year and month when the naming authority was established.

               naming-authority             Usually reverse syntax of the Internet domain name of the naming
                                            authority. For example, the iscsi.vmware.com naming authority could have
                                            the iSCSI qualified name form of iqn.1998-01.com.vmware.iscsi. The name
                                            indicates that the vmware.com domain name was registered in January of
                                            1998, and iscsi is a subdomain, maintained by vmware.com.

               unique name                  Any name you want to use, for example, the name of your host. The naming
                                            authority must make sure that any names assigned following the colon are
                                            unique. For example, iqn.1998-01.com.vmware.iscsi:name1.

          n    EUI (extended unique identifier). Includes the eui. prefix, followed by the 16-character name. The name
               includes 24 bits for the company name assigned by the IEEE and 40 bits for a unique ID, such as a serial
               number.

               For example,
               eui.0123456789ABCDEF


          iSCSI Alias
          A more manageable, easy-to-remember name to use instead of the iSCSI name. iSCSI aliases are not unique,
          and are intended to be just a friendly name to associate with the node.


80                                                                                                             VMware, Inc.
Chapter 7 Introduction to Storage




          IP Address
          An address associated with each iSCSI element so that routing and switching equipment on the network can
          establish the connection between different elements, such as the host and storage. This is just like the IP address
          you assign to a computer to get access to your company's network or the Internet.


   Understanding Storage Device Naming
          In the vSphere Client, each storage device, or LUN, is identified by several names, including a friendly name,
          a UUID, and a runtime name.

          Name
          This is a friendly name that the ESX host assigns to a device based on the storage type and manufacturer. You
          can modify the name using the vSphere Client. When you modify the name of the device on one host, the
          change takes affect across all hosts that have access to this device.

          Identifier
          This is a universally unique identifier assigned to a device. Depending on the type of storage, different
          algorithms are used to create the identifier. The identifier is persistent across reboots and must be the same for
          all hosts sharing the device.

          Runtime Name
          This is the name of the first path to the device. The runtime name is created by the host, is not a reliable identifier
          for the device, and is not persistent.

          The runtime name has the following format: vmhba#:C#:T#:L#.

          vmhba#                           The name of the storage adapter. The name refers to the physical adapter on
                                           the host, not to the SCSI controller used by the virtual machines.

          C#                               The storage channel number. Software iSCSI initiators use the channel number
                                           to show multiple paths to the same target.

          T#                               The target number. Target numbering is decided by the host and might change
                                           if there is a change in the mappings of targets visible to the host. Targets that
                                           are shared by different ESX hosts might not have the same target number.

          L#                               The LUN number that shows the position of the LUN within the target. The
                                           LUN number is provided by the storage system. If a target has only one LUN,
                                           the LUN number is always zero (0).

          For example, vmhba1:C0:T3:L1 represents LUN1 on target 3 accessed through the storage adapter vmhba1 and
          channel 0.


About ESX Datastores
          Datastores are logical containers, analogous to file systems, that hide specifics of each storage device and
          provide a uniform model for storing virtual machine files. Datastores can also be used for storing ISO images,
          virtual machine templates, and floppy images.

          You use the vSphere Client to access different types of storage devices that your ESX host discovers and to
          deploy datastores on them.




VMware, Inc.                                                                                                                      81
ESX Configuration Guide




          Depending on the type of storage you use, datastores can be backed by the following file system formats:

          Virtual Machine File           High-performance file system optimized for storing virtual machines. Your
          System (VMFS)                  host can deploy a VMFS datastore on any SCSI-based local or networked
                                         storage device, including Fibre Channel and iSCSI SAN equipment.

                                         As an alternative to using the VMFS datastore, your virtual machine can have
                                         direct access to raw devices and use a mapping file (RDM) as a proxy.

          Network File System            File system on a NAS storage device. ESX supports NFS version 3 over TCP/
          (NFS)                          IP. The host can access a designated NFS volume located on an NFS server,
                                         mount the volume, and use it for any storage needs.

          If you use the service console to access your ESX host, you can see the VMFS and NFS datastores as separate
          subdirectories in the /vmfs/volumes directory.


     VMFS Datastores
          ESX can format SCSI-based storage devices as VMFS datastores. VMFS datastores primarily serve as
          repositories for virtual machines.

          You can store multiple virtual machines on the same VMFS volume. Each virtual machine, encapsulated in a
          set of files, occupies a separate single directory. For the operating system inside the virtual machine, VMFS
          preserves the internal file system semantics, which ensures correct application behavior and data integrity for
          applications running in virtual machines.

          In addition, you can use the VMFS datastores to store other files, such as virtual machine templates and ISO
          images.

          VMFS supports the following file and block sizes, enabling your virtual machines to run even the most data-
          intensive applications, including databases, ERP, and CRM, in virtual machines:
          n    Maximum virtual disk size: 2TB with 8MB block size
          n    Maximum file size: 2TB with 8MB block size
          n    Block size: 1MB (default), 2MB, 4MB, and 8MB


     Creating and Increasing VMFS Datastores
          You can set up VMFS datastores on any SCSI-based storage devices that your ESX host discovers. After you
          create the VMFS datastore, you can edit its properties.
          You can have up to 256 VMFS datastores per system, with a minimum volume size of 1.2GB.

          NOTE Always have only one VMFS datastore for each LUN.

          If your VMFS datastore requires more space, you can increase the VMFS volume. You can dynamically add
          new extents to any VMFS datastore and grow the datastore up to 64TB. An extent is a LUN or partition on a
          physical storage device. The datastore can stretch over multiple extents, yet appear as a single volume.

          Another option is to grow the existing datastore extent if the storage device where your datastore resides has
          free space. You can grow the extent up to 2 TB.




82                                                                                                            VMware, Inc.
Chapter 7 Introduction to Storage




   Sharing a VMFS Volume Across ESX Hosts
          As a cluster file system, VMFS lets multiple ESX hosts access the same VMFS datastore concurrently. You can
          connect up to 32 hosts to a single VMFS volume.
          Figure 7-2. Sharing a VMFS Volume Across Hosts
               host          host             host
                A             B                C




               VM1           VM2              VM3



                        VMFS volume

                            disk1
                                    virtual
                            disk2   disk
                                    files
                            disk3


          To ensure that the same virtual machine is not accessed by multiple servers at the same time, VMFS provides
          on-disk locking.

          Sharing the same VMFS volume across multiple hosts offers the following advantages:
          n       You can use VMware Distributed Resource Scheduling and VMware High Availability.

                  You can distribute virtual machines across different physical servers. That means you run a mix of virtual
                  machines on each server so that not all experience high demand in the same area at the same time. If a
                  server fails, you can restart virtual machines on another physical server. In case of a failure, the on-disk
                  lock for each virtual machine is released.
          n       You can use vMotion to migrate running virtual machines from one physical server to another.
          n       You can use VMware Consolidated Backup, which lets a proxy server, called VCB proxy, back up a
                  snapshot of a virtual machine while the virtual machine is powered on and is reading and writing to its
                  storage.


   NFS Datastore
          ESX can access a designated NFS volume located on a NAS server, mount the volume, and use it for its storage
          needs. You can use NFS volumes to store and boot virtual machines in the same way that you use VMFS
          datastores.

          ESX supports the following shared storage capabilities on NFS volumes:
          n       vMotion
          n       VMware DRS and VMware HA
          n       ISO images, which are presented as CD-ROMs to virtual machines
          n       Virtual machine snapshots




VMware, Inc.                                                                                                                    83
ESX Configuration Guide




     How Virtual Machines Access Storage
          When a virtual machine communicates with its virtual disk stored on a datastore, it issues SCSI commands.
          Because datastores can exist on various types of physical storage, these commands are encapsulated into other
          forms, depending on the protocol that the ESX host uses to connect to a storage device.

          ESX supports Fibre Channel (FC), Internet SCSI (iSCSI), Fibre Channel over Ethernet (FCoE), and NFS
          protocols. Regardless of the type of storage device your host uses, the virtual disk always appears to the virtual
          machine as a mounted SCSI device. The virtual disk hides a physical storage layer from the virtual machine’s
          operating system. This allows you to run operating systems that are not certified for specific storage equipment,
          such as SAN, inside the virtual machine.

          Figure 7-3 depicts five virtual machines using different types of storage to illustrate the differences between
          each type.
          Figure 7-3. Virtual machines accessing different types of storage
                                                              Host
                                                                     requires TCP/IP connectivity

                    virtual                virtual         virtual             virtual          virtual
                   machine                machine         machine             machine          machine

                               local
                               ethernet

                               SCSI
                                                                                   software
                                                                                   adapter
                                   fibre
                                                      iSCSI
                                 channel                                           ethernet               ethernet
           VMFS                                        HBA
                                   HBA                                                NIC                    NIC


                                 SAN                  LAN                          LAN                     LAN
             Key

                    physical
                    disk


                    datastore


                                   VMFS                                VMFS                    NFS
                    virtual
                    disk              fibre array                    iSCSI array               NAS appliance



          NOTE This diagram is for conceptual purposes only. It is not a recommended configuration.


Comparing Types of Storage
          Whether certain vSphere functionality is supported might depend on the storage technology that you use.

          Table 7-1 compares networked storage technologies that ESX supports.

          Table 7-1. Networked Storage that ESX Supports
          Technology                      Protocols           Transfers                             Interface

          Fibre Channel                   FC/SCSI             Block access of data/LUN              FC HBA

          iSCSI                           IP/SCSI             Block access of data/LUN              n     iSCSI HBA (hardware iSCSI)
                                                                                                    n     NIC (software iSCSI)

          NAS                             IP/NFS              File (no direct LUN access)           NIC


          Table 7-2 compares the vSphere features that different types of storage support.




84                                                                                                                                     VMware, Inc.
Chapter 7 Introduction to Storage




          Table 7-2. vSphere Features Supported by Storage
                                                                                                          VMware HA
          Storage Type          Boot VM      vMotion          Datastore         RDM         VM Cluster    and DRS          VCB

          Local Storage         Yes          No               VMFS              No          No            No               Yes

          Fibre Channel         Yes          Yes              VMFS              Yes         Yes           Yes              Yes

          iSCSI                 Yes          Yes              VMFS              Yes         Yes           Yes              Yes

          NAS over NFS          Yes          Yes              NFS               No          No            Yes              Yes



Displaying Storage Adapters
          The host uses storage adapters to access different storage devices. You can display the available storage
          adapters and review their information.

          Table 7-3 lists information that you can see when you display details for each adapter. Certain adapters, for
          example iSCSI, need to be configured or enabled before you can view their information.

          Table 7-3. Storage Adapter Information
          Adapter Information             Description

          Model                           Model of the adapter.

          Targets (Fibre Channel and      Number of targets accessed through the adapter.
          SCSI)

          Connected Targets (iSCSI)       Number of connected targets on an iSCSI adapter.

          WWN (Fibre Channel)             World Wide Name formed according to Fibre Channel standards that uniquely identifies
                                          the FC adapter.

          iSCSI Name (iSCSI)              Unique name formed according to iSCSI standards that identifies the iSCSI adapter.

          iSCSI Alias (iSCSI)             A friendly name used instead of the iSCSI name.

          IP Address (hardware iSCSI)     Address assigned to the iSCSI adapter.

          Discovery Methods (iSCSI)       Discovery methods the iSCSI adapter uses to access iSCSI targets.

          Devices                         All storage devices or LUNs the adapter can access.

          Paths                           All paths the adapter uses to access storage devices.



   View Storage Adapters Information
          You can display storage adapters that your host uses and review their information.

          Procedure

          1    In Inventory, select Hosts and Clusters.

          2    Select a host and click the Configuration tab.

          3    In Hardware, select Storage Adapters.

          4    To view details for a specific adapter, select the adapter from the Storage Adapters list.

          5    To list all storage devices the adapter can access, click Devices.

          6    To list all paths the adapter uses, click Paths.




VMware, Inc.                                                                                                                        85
ESX Configuration Guide




     Copy Storage Adapter Identifiers to the Clipboard
          If your storage adapters use unique identifiers, such as an iSCSI Name or WWN, you can copy them to a
          clipboard directly from the UI.

          Procedure

          1      In Inventory, select Hosts and Clusters.

          2      Select a host and click the Configuration tab.

          3      In Hardware, select Storage Adapters.

          4      Select the adapter from the Storage Adapters list.

          5      In the Details panel, highlight the value in the name field, and select Copy from the right-button menu.


Viewing Storage Devices
          You can display all storage devices or LUNs available to the host, including all local and networked devices.
          If you use third-party multipathing plug-ins, the storage devices available through the plug-ins also appear
          on the list.

          For each storage adapter, you can display a separate list of storage devices available for this adapter.

          Generally, when you review storage devices, you see the following information.

          Table 7-4. Storage Device Information
          Storage Device Information       Description

          Name                             A friendly name that the ESX host assigns to the device based on the storage type and
                                           manufacturer. You can change this name to a name of your choice.

          Identifier                       A universally unique identifier that is intrinsic to the device.

          Runtime Name                     The name of the first path to the device.

          LUN                              The LUN number that shows the position of the LUN within the target.

          Type                             Type of device, for example, disk or CD-ROM.

          Transport                        Transportation protocol your host uses to access the device.

          Capacity                         Total capacity of the storage device.

          Owner                            The plug-in, such as the NMP or a third-party plug-in, that the host uses to manage the
                                           storage device.

          Hardware Acceleration            Information about whether the storage device assists the host with virtual machine
                                           management operations. The status can be Supported, Not Supported, or Unknown. For
                                           details, see “Storage Hardware Acceleration,” on page 123.

          Location                         A path to the storage device in the /vmfs/devices/ directory.

          Partitions                       Primary and logical partitions, including a VMFS datastore, if configured.



     Display Storage Devices for a Host
          You can display all storage devices or LUNs available to a host. If you use any third-party multipathing plug-
          ins, the storage devices available through the plug-ins also appear on the list.

          Procedure

          1      In Inventory, select Hosts and Clusters.

          2      Select a host and click the Configuration tab.




86                                                                                                                      VMware, Inc.
Chapter 7 Introduction to Storage




          3    In Hardware, select Storage.

          4    Click Devices.

          5    To view additional details about a specific device, select the device from the list.


   Display Storage Devices for an Adapter
          You can display a list of storage devices accessible to a specific storage adapter on the host.

          Procedure

          1    In Inventory, select Hosts and Clusters.

          2    Select a host and click the Configuration tab.

          3    In Hardware, select Storage Adapters.

          4    Select the adapter from the Storage Adapters list.

          5    Click Devices.


   Copy Storage Device Identifiers to the Clipboard
          A storage device identifier is a universally unique ID assigned to a storage device or LUN. Depending on the
          type of storage, different algorithms are used to create the identifier and it can be long and complex. You can
          copy the storage device identifier directly from the UI.

          Procedure

          1    Display a list of storage devices.

          2    Right-click a device and select Copy identifier to clipboard.


Displaying Datastores
          You can display all datastores available to your hosts and analyze their properties.

          Datastores are added to the vSphere Client in the following ways:
          n    Created on an available storage device.
          n    Discovered when a host is added to the inventory. When you add a host to the inventory, the vSphere
               Client displays any datastores available to the host.

          If your vSphere Client is connected to a vCenter Server system, you can see datastore information in the
          Datastores view. This view displays all datastores in the inventory, arranged by a datacenter. Through this
          view, you can organize datastores into folder hierarchies, create datastores, edit their properties, or remove
          existing datastores.

          This view is comprehensive and shows all information for your datastores including hosts and virtual machines
          using the datastores, storage reporting information, permissions, alarms, tasks and events, storage topology,
          and storage reports. Configuration details for each datastore on all hosts connected to this datastore are
          provided on the Configuration tab of the Datastores view.

          NOTE The Datastores view is not available when the vSphere client connects directly to your host. In this case,
          review datastore information through the host storage configuration tab.

          Table 7-5 describes the datastore details that you can see when you review datastores.




VMware, Inc.                                                                                                                   87
ESX Configuration Guide




          Table 7-5. Datastore Information
          Datastore Information               Description

          Identification                      Editable name that you assign to the datastore.

          Device                              Storage device on which the datastore is deployed.

          Capacity                            Total formatted capacity of the datastore.

          Free                                Available space.

          Type                                File system that the datastore uses, either VMFS or NFS.

          Storage I/O Control                 Allows cluster-wide storage I/O prioritization. See the vSphere Resource Management
                                              Guide.

          Hardware Acceleration               Information on whether the datastore assists the host with virtual machine management
                                              operations. The status can be Supported, Not Supported, or Unknown. For details, see
                                              “Storage Hardware Acceleration,” on page 123.

          Location                            A path to the datastore in the /vmfs/volumes/ directory.

          Extents                             Individual extents that the datastore spans and their capacity (VMFS datastores only).

          Path Selection                      Path selection policy the host uses to access storage (VMFS datastores only).

          Paths                               Number of paths used to access storage and their status (VMFS datastores only).



     Review Datastore Properties
          You can display all datastores available to the hosts and analyze their properties.

          Procedure

          1      Display the host in the inventory.

          2      Select a host in the inventory and click the Configuration tab.

          3      In Hardware, select Storage.

          4      Click the Datastores view.

          5      To display details for a particular datastore, select the datastore from the list.




88                                                                                                                       VMware, Inc.
Configuring ESX Storage                                                                                         8
          The following topics contain information about configuring local SCSI storage devices, Fibre Channel SAN
          storage, iSCSI storage, and NFS storage.

          This chapter includes the following topics:
          n    “Local SCSI Storage,” on page 89
          n    “Fibre Channel Storage,” on page 90
          n    “iSCSI Storage,” on page 90
          n    “Datastore Refresh and Storage Rescan Operations,” on page 104
          n    “Create VMFS Datastores,” on page 105
          n    “Network Attached Storage,” on page 106
          n    “Creating a Diagnostic Partition,” on page 107


Local SCSI Storage
          Local storage uses a SCSI-based device such as your ESX host’s hard disk or any external dedicated storage
          system connected directly to your host.

          Figure 8-1 depicts a virtual machine using local SCSI storage.
          Figure 8-1. Local Storage

                         Host



                        virtual
                       machine


                                  local
                                  ethernet

                                  SCSI



                VMFS


          In this example of a local storage topology, the ESX host uses a single connection to a disk. On that disk, you
          can create a VMFS datastore, which you use to store virtual machine disk files.




VMware, Inc.                                                                                                           89
ESX Configuration Guide




          Although this storage configuration is possible, it is not a recommended topology. Using single connections
          between storage arrays and hosts creates single points of failure (SPOF) that can cause interruptions when a
          connection becomes unreliable or fails.

          To ensure fault tolerance, some DAS systems support redundant connection paths.


Fibre Channel Storage
          ESX supports Fibre Channel adapters, which allow a host to connect to a SAN and see storage devices on the
          SAN.

          You must install Fibre Channel (FC) adapters before the host can access FC storage devices.

          Figure 8-2 depicts virtual machines using Fibre Channel storage.
          Figure 8-2. Fibre Channel Storage

                            Host



                           virtual
                          machine



                    fibre
                  channel
                    HBA


                  SAN




                    VMFS

                      fibre array

          In this configuration, an ESX host connects to SAN fabric, which consists of Fibre Channel switches and storage
          arrays, using a Fibre Channel adapter. LUNs from a storage array become available to the host. You can access
          the LUNs and create a datastore for your storage needs. The datastore uses the VMFS format.

          For specific information on setting up the FC SAN fabric and storage arrays to work with ESX, see the Fibre
          Channel SAN Configuration Guide.


iSCSI Storage
          ESX supports iSCSI technology that allows your host to use an IP network while accessing remote storage.
          With iSCSI, SCSI storage commands that your virtual machine issues to its virtual disk are converted into TCP/
          IP packets and transmitted to a remote device, or target, that stores the virtual disk.

          To access remote targets, the host uses iSCSI initiators. Initiators transport SCSI requests and responses between
          the host and the target storage device on the IP network. ESX supports hardware, dependent and independent,
          and software iSCSI initiators.

          You must configure iSCSI initiators for the host to access and display iSCSI storage devices.

          Figure 8-3 depicts different types of iSCSI initiators.




90                                                                                                               VMware, Inc.
Chapter 8 Configuring ESX Storage




          Figure 8-3. iSCSI Storage

                                 Host



                       virtual           virtual
                      machine           machine

                                           software
                                           adapter
                  iSCSI
                   HBA                     ethernet
                                              NIC


                  LAN                       LAN




                                 VMFS

                            iSCSI array

          In the left example, the host uses the hardware iSCSI adapter to connect to the iSCSI storage system.

          In the right example, the host uses a software iSCSI adapter and an Ethernet NIC to connect to the iSCSI storage.
          iSCSI storage devices from the storage system become available to the host. You can access the storage devices
          and create VMFS datastores for your storage needs.

          For specific information on setting up the iSCSI SAN to work with ESX, see the iSCSI SAN Configuration
          Guide.


   iSCSI Initiators
          To access iSCSI targets, your host uses iSCSI initiators. The initiators transport SCSI requests and responses,
          encapsulated into the iSCSI protocol, between the host and the iSCSI target.

          VMware supports different types of initiators.

          Software iSCSI Adapter
          A software iSCSI adapter is a VMware code built into the VMkernel. It allows your host to connect to the iSCSI
          storage device through standard network adapters. The software iSCSI adapter handles iSCSI processing while
          communicating with the network adapter. With the software iSCSI adapter, you can use iSCSI technology
          without purchasing specialized hardware.

          Hardware iSCSI Adapter
          A hardware iSCSI adapter is a third-party adapter that offloads iSCSI and network processing from your host.
          Hardware iSCSI adapters are divided into categories.

          Dependent Hardware                Depends on VMware networking, and iSCSI configuration and management
          iSCSI Adapter                     interfaces provided by VMware.




VMware, Inc.                                                                                                               91
ESX Configuration Guide




                                          This type of adapter can be a card that presents a standard network adapter
                                          and iSCSI offload functionality for the same port. The iSCSI offload
                                          functionality depends on the host's network configuration to obtain the IP,
                                          MAC, and other parameters used for iSCSI sessions. An example of a
                                          dependent adapter is the iSCSI licensed Broadcom 5709 NIC.

          Independent Hardware            Implements its own networking and iSCSI configuration and management
          iSCSI Adapter                   interfaces.
                                          An example of an independent hardware iSCSI adapter is a card that either
                                          presents only iSCSI offload functionality or iSCSI offload functionality and
                                          standard NIC functionality. The iSCSI offload functionality has independent
                                          configuration management that assigns the IP, MAC, and other parameters
                                          used for the iSCSI sessions. An example of a independent adapter is the QLogic
                                          QLA4052 adapter.

          Hardware iSCSI adapters might need to be licensed. Otherwise, they will not appear in the vSphere Client or
          vSphere CLI. Contact your vendor for licensing information.


     Setting Up Independent Hardware iSCSI Adapters
          An independent hardware iSCSI adapter is a specialized third-party adapter capable of accessing iSCSI storage
          over TCP/IP. This iSCSI adapter handles all iSCSI and network processing and management for your ESX
          system.

          The setup and configuration process for the independent hardware iSCSI adapters involves these steps:

          1    Check whether the adapter needs to be licensed.

               See your vendor documentation.

          2    Install the adapter.

               For installation information, see vendor documentation.

          3    Verity that the adapter is installed correctly.

               See “View Independent Hardware iSCSI Adapters,” on page 92.

          4    Configure discovery addresses.

               See “Configuring Discovery Addresses for iSCSI Initiators,” on page 97.

          5    Configure CHAP parameters.

               See “Configuring CHAP Parameters for iSCSI Adapters,” on page 99.

          For your host to be able to access iSCSI storage, you must first install the hardware iSCSI adapter and configure
          discovery address and CHAP parameters.

          View Independent Hardware iSCSI Adapters
          View a hardware iSCSI adapter to verify that it is correctly installed and ready for configuration.

          Prerequisites

          After you install a hardware iSCSI adapter, it appears on the list of storage adapters available for configuration.
          You can view its properties.

          Required privilege: Host.Configuration.Storage Partition Configuration




92                                                                                                                VMware, Inc.
Chapter 8 Configuring ESX Storage




          Procedure

          1    Log in to the vSphere Client, and select a host from the inventory panel.

          2    Click the Configuration tab and click Storage Adapters in the Hardware panel.

               If installed, the hardware iSCSI initiator should appear on the list of storage adapters.

          3    Select the initiator to view.

               The default details for the initiator appear, including the model, iSCSI name, iSCSI alias, IP address, and
               target and paths information.

          4    Click Properties.

               The iSCSI Initiator Properties dialog box appears. The General tab displays additional characteristics of
               the initiator.

          You can now configure your hardware initiator or change its default characteristics.

          Change Name and IP Address for Independent Hardware Initiators
          When you configure your independent hardware iSCSI initiators, make sure that their names and IP addresses
          are formatted properly.

          Procedure

          1    Access the iSCSI Initiator Properties dialog box.

          2    Click Configure.

          3    To change the default iSCSI name for your initiator, enter the new name.

               Make sure the name you enter is worldwide unique and properly formatted or some storage devices might
               not recognize the hardware iSCSI initiator.

          4    (Optional) Enter the iSCSI alias.

               The alias is a name that you use to identify the hardware iSCSI initiator.

          5    Change the default IP settings.

               You must change the default IP settings so that they are configured properly for the IP SAN. Work with
               your network administrator to determine the IP setting for the HBA.

          6    Click OK to save your changes.
          If you change the iSCSI name, it is used for new iSCSI sessions. For existing sessions, new settings are not used
          until logout and re-login.


   Setting Up and Configuring Software iSCSI Adapter
          With the software-based iSCSI implementation, you can use standard NICs to connect your host to a remote
          iSCSI target on the IP network. The software iSCSI adapter that is built into ESX facilitates this connection by
          communicating with the physical NICs through the network stack.

          When you connect to a vCenter Server or a host with the vSphere Client, you can see the software iSCSI adapter
          on the list of your storage adapters. Only one software iSCSI adapter appears. Before you can use the software
          iSCSI adapter, you must set up networking, enable the adapter, and configure parameters such as discovery
          addresses and CHAP. The software iSCSI adapter configuration workflow includes these steps:

          1    Configure the iSCSI networking by creating ports for iSCSI traffic.




VMware, Inc.                                                                                                                93
ESX Configuration Guide




               See “Networking Configuration for Software iSCSI and Dependent Hardware iSCSI,” on page 67.

          2    Enable the software iSCSI adapter.

               See “Enable the Software iSCSI Adapter,” on page 94.

          3    If you use multiple NICs for the software iSCSI multipathing, perform the port binding by connecting all
               iSCSI ports to the software iSCSI adapter.

               See “Bind iSCSI Ports to iSCSI Adapters,” on page 96.

          4    If needed, enable Jumbo Frames. Jumbo Frames must be enabled for each vSwitch through the vSphere
               CLI. Also, if you use an ESX host, you must create a VMkernel network interface enabled with Jumbo
               Frames.

               See the Networking section for more information.

          5    Configure discovery addresses.

               See “Configuring Discovery Addresses for iSCSI Initiators,” on page 97.

          6    Configure CHAP parameters.

               See “Configuring CHAP Parameters for iSCSI Adapters,” on page 99.

          Enable the Software iSCSI Adapter
          You must enable your software iSCSI adapter so that your host can use it to access iSCSI storage.

          Prerequisites

          Before enabling the software iSCSI adapter, set up networking for iSCSI.

          NOTE If you boot from iSCSI using the software iSCSI adapter, the adapter is enabled and the network
          configuration is created automatically at the first boot. If you disable the adapter, it is re-enabled each time
          you boot the host.

          Procedure

          1    Log in to the vSphere Client, and select a server from the inventory panel.

          2    Click the Configuration tab and click Storage Adapters in the Hardware panel.

               The list of available storage adapters appears.
          3    Select the iSCSI initiator to configure and click Properties.

          4    Click Configure.

          5    To enable the initiator, select Enabled and click OK.

          After you enable the initiator, the host assigns the default iSCSI name to it. You can change the default name
          if needed.


     Setting Up and Configuring Dependent Hardware iSCSI Adapters
          A dependent hardware iSCSI adapter is a third-party adapter that depends on VMware networking, and iSCSI
          configuration and management interfaces provided by VMware.

          This type of adapter can be a card, such as a Broadcom 5709 NIC, that presents a standard network adapter
          and iSCSI offload functionality for the same port. The iSCSI offload functionality appears on the list of storage
          adapters as an iSCSI adapter. Although the iSCSI adapter is enabled by default, to make it functional, you must
          set up networking for the iSCSI traffic and bind the adapter and an appropriate VMkernel iSCSI port. You can
          then configure the adapter.




94                                                                                                               VMware, Inc.
Chapter 8 Configuring ESX Storage




          The entire setup and configuration process for the dependent hardware iSCSI adapters involves these steps:

          1    View the dependent hardware adapters.

               See “View Dependent Hardware iSCSI Adapters,” on page 95.

               If your dependent hardware adapters do not appear on the list of storage adapters, check whether they
               need to be licensed. See your vendor documentation.

          2    Determine the association between the dependent hardware adapters and physical NICs.

               See “Determine Association Between Dependent Hardware iSCSI and Physical Network Adapters,” on
               page 96

               Make sure to note the names of the corresponding physical NICs. For example, the vmhba33 adapter
               corresponds to vmnic1 and vmhba34 corresponds to vmnic2.

          3    Configure the iSCSI networking by creating ports for the iSCSI traffic.

               See “Networking Configuration for Software iSCSI and Dependent Hardware iSCSI,” on page 67.

               Open a port for each NIC. For example, create the vmk1 port for the vmnic1 NIC and the vmk2 port for
               vmnic2.

          4    Bind the iSCSI ports to corresponding dependent hardware iSCSI adapters. This step is necessary no
               matter whether you have multiple adapters or just one.

               See “Bind iSCSI Ports to iSCSI Adapters,” on page 96.

               In this example, you bind port vmk1 to vmhba33 and port vmk2 to vmhba34.

          5    Configure discovery addresses.

               See “Configuring Discovery Addresses for iSCSI Initiators,” on page 97.

          6    Configure CHAP parameters.

               See “Configuring CHAP Parameters for iSCSI Adapters,” on page 99.

          Dependent Hardware iSCSI Considerations
          When you use dependent hardware iSCSI adapters with ESX, certain considerations apply.
          n    When you use any dependent hardware iSCSI adapter, performance reporting for a NIC associated with
               the adapter might show little or no activity, even when iSCSI traffic is heavy. This behavior occurs because
               the iSCSI traffic bypasses the regular networking stack.
          n    The Broadcom iSCSI adapter performs data reassembly in hardware, which has a limited buffer space.
               When you use the Broadcom iSCSI adapter in a congested network or under load, enable flow control to
               avoid performance degradation.

               Flow control manages the rate of data transmission between two nodes to prevent a fast sender from
               overrunning a slow receiver. For best results, enable flow control at the end points of the I/O path, at the
               hosts and iSCSI storage systems.
          n    Broadcom iSCSI adapters do not support IPv6 and Jumbo Frames.

          View Dependent Hardware iSCSI Adapters
          View a dependent hardware iSCSI adapter to verify that it is correctly loaded.

          If the dependent hardware adapter does not appear on the list of storage adapters, check whether it needs to
          be licensed. See your vendor documentation.




VMware, Inc.                                                                                                                95
ESX Configuration Guide




          Procedure

          1    Log in to the vSphere Client, and select a host from the Inventory panel.

          2    Click the Configuration tab and click Storage Adapters in the Hardware panel.

               If installed, the dependent hardware iSCSI adapter should appear on the list of storage adapters.

          3    Select the adapter to view and click Properties.

               The iSCSI Initiator Properties dialog box displays the default details for the adapter, including the iSCSI
               name and iSCSI alias.

          Determine Association Between Dependent Hardware iSCSI and Physical Network
          Adapters
          You need to determine the name of the physical NIC with which the dependent hardware iSCSI adapter is
          associated. You need to know the association to be able to perform the port binding correctly.

          Procedure

          1    Use the vSphere CLI command to determine the name of the physical NIC, with which the iSCSI adapter
               is associated.

               esxcli swiscsi vmnic list -d vmhba#

               vmhba# is the name of the iSCSI adapter.

          2    In the output, find the vmnic name: vmnic# line.

               vmnic# is the name of the network adapter that corresponds to the iSCSI adapter.

          What to do next

          After you determined the name of the NIC, create an iSCSI port on a vSwitch connected to the NIC. You then
          bind this port to the dependent hardware iSCSI adapter, so that your host can direct the iSCSI traffic through
          the NIC.


     Bind iSCSI Ports to iSCSI Adapters
          Bind an iSCSI port that you created for a NIC to an iSCSI adapter. With the software iSCSI adapter, perform
          this task only if you set up two or more NICs for the iSCSI multipathing. If you use dependent hardware iSCSI
          adapters, the task is required regardless of whether you have multiple adapters or one adapter.

          Prerequisites

          Complete the following tasks:
          n    For dependent hardware iSCSI adapters, have the correct association between the physical NICs and iSCSI
               adapters. See “View Dependent Hardware iSCSI Adapters,” on page 95.
          n    Set up networking for the iSCSI traffic. See “Networking Configuration for Software iSCSI and Dependent
               Hardware iSCSI,” on page 67.
          n    To use the software iSCSI adapter, enable it. See “Enable the Software iSCSI Adapter,” on page 94.




96                                                                                                             VMware, Inc.
Chapter 8 Configuring ESX Storage




          Procedure

          1    Identify the name of the iSCSI port assigned to the physical NIC.

               The vSphere Client displays the port's name below the network label.

               In the following graphic, the ports' names are vmk1 and vmk2.




          2    Use the vSphere CLI command to bind the iSCSI port to the iSCSI adapter.

               esxcli swiscsi nic add -n port_name -d vmhba


               IMPORTANT For software iSCSI, repeat this command for each iSCSI port connecting all ports with the
               software iSCSI adapter. With dependent hardware iSCSI, make sure to bind each port to an appropriate
               corresponding adapter.

          3    Verify that the port was added to the iSCSI adapter.

               esxcli swiscsi nic list -d vmhba

          4    Use the vSphere Client to rescan the iSCSI adapter.


   Configuring Discovery Addresses for iSCSI Initiators
          Set up target discovery addresses so that the iSCSI initiator can determine which storage resource on the
          network is available for access.

          The ESX system supports these discovery methods:

          Dynamic Discovery              Also known as SendTargets discovery. Each time the initiator contacts a
                                         specified iSCSI server, the initiator sends the SendTargets request to the server.
                                         The server responds by supplying a list of available targets to the initiator. The
                                         names and IP addresses of these targets appear on the Static Discovery tab. If
                                         you remove a static target added by dynamic discovery, the target might be
                                         returned to the list the next time a rescan happens, the HBA is reset, or the host
                                         is rebooted.

          Static Discovery               The initiator does not have to perform any discovery. The initiator has a list of
                                         targets it can contact and uses their IP addresses and target names to
                                         communicate with them.


          Set Up Dynamic Discovery
          With Dynamic Discovery, each time the initiator contacts a specified iSCSI server, it sends the SendTargets
          request to the server. The server responds by supplying a list of available targets to the initiator.

          When you set up Dynamic Discovery, you can only add a new iSCSI server. You cannot change the IP address,
          DNS name, or port number of an existing iSCSI server. To make changes, delete the existing server and add a
          new one.




VMware, Inc.                                                                                                                97
ESX Configuration Guide




          Procedure

          1    Log in to the vSphere Client and select a server from the inventory panel.

          2    Click the Configuration tab and click Storage Adapters in the Hardware panel.

               The list of available storage adapters appears.

          3    Select the iSCSI initiator to configure and click Properties.

          4    In the iSCSI Initiator Properties dialog box, click the Dynamic Discovery tab.

          5    To add an address for the SendTargets discovery, click Add.

               The Add SendTargets Server dialog box appears.

          6    Enter the IP address or DNS name of the storage system and click OK.

               After your host establishes the SendTargets session with this system, any newly discovered targets appear
               in the Static Discovery list.

          7    To delete a specific SendTargets server, select it and click Remove.

               After you remove a SendTargets server, it might still appear in the Inheritance field as the parent of static
               targets. This entry indicates where the static targets were discovered and does not affect the functionality.

          What to do next

          After configuring Dynamic Discovery for your iSCSI adapter, rescan the adapter.

          Set Up Static Discovery
          With iSCSI initiators, in addition to the dynamic discovery method, you can use static discovery and manually
          enter information for the targets.

          When you set up Static Discovery, you can only add iSCSI targets. You cannot change the IP address, DNS
          name, iSCSI target name, or port number of an existing target. To make changes, remove the existing target
          and add a new one.

          Procedure

          1    Log in to the vSphere Client and select a server from the inventory panel.

          2    Click the Configuration tab and click Storage Adapters in the Hardware panel.

               The list of available storage adapters appears.
          3    Select the iSCSI initiator to configure and click Properties.

          4    In the iSCSI Initiator Properties dialog box, click the Static Discovery tab.

               The tab displays all dynamically discovered targets and any static targets already entered.

          5    To add a target, click Add and enter the target’s information.

          6    To delete a specific target, select the target and click Remove.

          What to do next

          After configuring Static Discovery for your iSCSI adapter, rescan the adapter.




98                                                                                                               VMware, Inc.
Chapter 8 Configuring ESX Storage




   Configuring CHAP Parameters for iSCSI Adapters
          Because the IP networks that the iSCSI technology uses to connect to remote targets do not protect the data
          they transport, you must ensure security of the connection. One of the protocols that iSCSI implements is the
          Challenge Handshake Authentication Protocol (CHAP), which verifies the legitimacy of initiators that access
          targets on the network.

          CHAP uses a three-way handshake algorithm to verify the identity of your host and, if applicable, of the iSCSI
          target when the host and target establish a connection. The verification is based on a predefined private value,
          or CHAP secret, that the initiator and target share.

          ESX supports CHAP authentication at the adapter level. In this case, all targets receive the same CHAP name
          and secret from the iSCSI initiator. For software and dependent hardware iSCSI adapters, ESX also supports
          per-target CHAP authentication, which allows you to configure different credentials for each target to achieve
          greater level of security.

          Choosing CHAP Authentication Method
          ESX supports one-way CHAP for all types of iSCSI initiators, and mutual CHAP for software and dependent
          hardware iSCSI.

          Before configuring CHAP, check whether CHAP is enabled at the iSCSI storage system and check the CHAP
          authentication method the system supports. If CHAP is enabled, enable it for your initiators, making sure that
          the CHAP authentication credentials match the credentials on the iSCSI storage.

          ESX supports the following CHAP authentication methods:

          One-way CHAP                   In one-way CHAP authentication, also called unidirectional, the target
                                         authenticates the initiator, but the initiator does not authenticate the target.

          Mutual CHAP                    In mutual CHAP authentication, also called bidirectional, an additional level
                                         of security enables the initiator to authenticate the target. VMware supports
                                         this method for software and dependent hardware iSCSI adapters only.

          For software and dependent hardware iSCSI adapters, you can set one-way CHAP and mutual CHAP for each
          initiator or at the target level. Hardware iSCSI supports CHAP only at the initiator level.

          When you set the CHAP parameters, specify a security level for CHAP.

          NOTE When you specify the CHAP security level, how the storage array responds depends on the array’s
          CHAP implementation and is vendor specific. For example, when you select Use CHAP unless prohibited by
          target, some storage arrays use CHAP in response, while others do not. For information on CHAP
          authentication behavior in different initiator and target configurations, consult the array documentation.

          Table 8-1. CHAP Security Level
          CHAP Security Level             Description                                                      Supported

          Do not use CHAP                 The host does not use CHAP authentication. Select this           Software iSCSI
                                          option to disable authentication if it is currently enabled.     Dependent hardware iSCSI
                                                                                                           Independent hardware
                                                                                                           iSCSI

          Do not use CHAP unless          The host prefers a non-CHAP connection, but can use a            Software iSCSI
          required by target              CHAP connection if required by the target.                       Dependent hardware iSCSI




VMware, Inc.                                                                                                                           99
ESX Configuration Guide




          Table 8-1. CHAP Security Level (Continued)
          CHAP Security Level              Description                                             Supported

          Use CHAP unless prohibited by    The host prefers CHAP, but can use non-CHAP             Software iSCSI
          target                           connections if the target does not support CHAP.        Dependent hardware iSCSI
                                                                                                   Independent hardware
                                                                                                   iSCSI

          Use CHAP                         The host requires successful CHAP authentication. The   Software iSCSI
                                           connection fails if CHAP negotiation fails.             Dependent hardware iSCSI



          Set Up CHAP Credentials for an iSCSI Initiator
          You can set up all targets to receive the same CHAP name and secret from the iSCSI initiator at the initiator
          level. By default, all discovery addresses or static targets inherit CHAP parameters that you set up at the
          initiator level.

          Prerequisites

          Before setting up CHAP parameters for software or dependent hardware iSCSI, determine whether to
          configure one-way or mutual CHAP. Independent hardware iSCSI adapters do not support mutual CHAP.
          n    In one-way CHAP, the target authenticates the initiator.
          n    In mutual CHAP, both the target and initiator authenticate each other. Make sure to use different secrets
               for CHAP and mutual CHAP.

          When configuring CHAP parameters, make sure that they match the parameters on the storage side.

          The CHAP name should not exceed 511 and the CHAP secret 255 alphanumeric characters. Some adapters,
          for example the QLogic adapter, might have lower limits, 255 for the CHAP name and 100 for the CHAP secret.

          Procedure

          1    Access the iSCSI Initiator Properties dialog box.

          2    On the General tab, click CHAP.

          3    To configure one-way CHAP, under CHAP specify the following:

               a     Select the CHAP security level.
                     n    Do not use CHAP unless required by target (software and dependent hardware iSCSI only)
                     n    Use CHAP unless prohibited by target
                     n    Use CHAP (software and dependent hardware iSCSI only). To be able to configure mutual
                          CHAP, you must select this option.

               b     Specify the CHAP name.

                     Make sure that the name you specify matches the name configured on the storage side.
                     n    To set the CHAP name to the iSCSI initiator name, select Use initiator name.
                     n    To set the CHAP name to anything other than the iSCSI initiator name, deselect Use initiator
                          name and enter a name in the Name field.

               c     Enter a one-way CHAP secret to be used as part of authentication. Make sure to use the same secret
                     that you enter on the storage side.




100                                                                                                              VMware, Inc.
Chapter 8 Configuring ESX Storage




          4    To configure mutual CHAP, first configure one-way CHAP by following directions in Step 3.

               Make sure to select Use CHAP as an option for one-way CHAP. Then, specify the following under Mutual
               CHAP:

               a   Select Use CHAP.

               b   Specify the mutual CHAP name.

               c   Enter the mutual CHAP secret. Make sure to use different secrets for the one-way CHAP and mutual
                   CHAP.

          5    Click OK.

          6    Rescan the initiator.

          If you change the CHAP or mutual CHAP parameters, they are used for new iSCSI sessions. For existing
          sessions, new settings are not used until you log out and login again.

          Set Up CHAP Credentials for a Target
          For software dependent hardware iSCSI adapters, you can configure different CHAP credentials for each
          discovery address or static target.

          When configuring CHAP parameters, make sure that they match the parameters on the storage side. The CHAP
          name should not exceed 511 and the CHAP secret 255 alphanumeric characters.

          Prerequisites

          Before setting up CHAP parameters for software and dependent hardware iSCSI, determine whether to
          configure one-way or mutual CHAP.
          n    In one-way CHAP, the target authenticates the initiator.
          n    In mutual CHAP, both the target and initiator authenticate each other. Make sure to use different secrets
               for CHAP and mutual CHAP.

          Procedure

          1    Access the iSCSI Initiator Properties dialog box.

          2    Select either Dynamic Discovery tab or Static Discovery tab.

          3    From the list of available targets, select a target you want to configure and click Settings > CHAP.

          4    Configure one-way CHAP in the CHAP area.

               a   Deselect Inherit from parent.

               b   Select one of the following options:
                   n    Do not use CHAP unless required by target
                   n    Use CHAP unless prohibited by target
                   n    Use CHAP. To be able to configure mutual CHAP, you must select this option.

               c   Specify the CHAP name.

                   Make sure that the name you specify matches the name configured on the storage side.
                   n    To set the CHAP name to the iSCSI initiator name, select Use initiator name.
                   n    To set the CHAP name to anything other than the iSCSI initiator name, deselect Use initiator
                        name and enter a name in the Name field.

               d   Enter a one-way CHAP secret to be used as part of authentication. Make sure to use the same secret
                   that you enter on the storage side.




VMware, Inc.                                                                                                              101
ESX Configuration Guide




          5    To configure mutual CHAP, first configure one-way CHAP by following directions in Step 4.

               Make sure to select Use CHAP as an option for one-way CHAP. Then, specify the following in the Mutual
               CHAP area:

               a     Deselect Inherit from parent.

               b     Select Use CHAP.

               c     Specify the mutual CHAP name.

               d     Enter the mutual CHAP secret. Make sure to use different secrets for the one-way CHAP and mutual
                     CHAP.

          6    Click OK.

          7    Rescan the initiator.

          If you change the CHAP or mutual CHAP parameters, they are used for new iSCSI sessions. For existing
          sessions, new settings are not used until you log out and login again.

          Disable CHAP
          You can disable CHAP if your storage system does not require it.

          If you disable CHAP on a system that requires CHAP authentication, existing iSCSI sessions remain active
          until you reboot your ESX host or the storage system forces a logout. After the session ends, you can no longer
          connect to targets that require CHAP.

          Procedure

          1    Open the CHAP Credentials dialog box.

          2    For software and dependent hardware iSCSI adapters, to disable just the mutual CHAP and leave the one-
               way CHAP, select Do not use CHAP in the Mutual CHAP area.

          3    To disable one-way CHAP, select Do not use CHAP in the CHAP area.

               The mutual CHAP, if set up, automatically turns to Do not use CHAP when you disable the one-way
               CHAP.

          4    Click OK.


      Configuring Additional Parameters for iSCSI
          You might need to configure additional parameters for your iSCSI initiators. For example, some iSCSI storage
          systems require ARP (Address Resolution Protocol) redirection to move iSCSI traffic dynamically from one
          port to another. In this case, you must activate ARP redirection on your host.

          Table 8-2 lists advanced iSCSI parameters that you can configure using the vSphere Client. In addition, you
          can use the vicfg-iscsi vSphere CLI command to configure some of the advanced parameters. For
          information, see the vSphere Command-Line Interface Installation and Scripting Guide and vSphere Command-Line
          Interface Reference.

          Do not make any changes to the advanced iSCSI settings unless you are working with the VMware support
          team or otherwise have thorough information about the values to provide for the settings.




102                                                                                                           VMware, Inc.
Chapter 8 Configuring ESX Storage




          Table 8-2. Additional Parameters for iSCSI Initiators
          Advanced Parameter     Description                                                                  Configurable On

          Header Digest          Increases data integrity. When header digest is enabled, the system          Software iSCSI
                                 performs a checksum over each iSCSI Protocol Data Unit’s (PDU’s)             Dependent Hardware
                                 header part and verifies using the CRC32C algorithm.                         iSCSI

          Data Digest            Increases data integrity. When data digest is enabled, the system            Software iSCSI
                                 performs a checksum over each PDU's data part and verifies using             Dependent Hardware
                                 the CRC32C algorithm.                                                        iSCSI
                                 NOTE Systems that use Intel Nehalem processors offload the iSCSI
                                 digest calculations for software iSCSI, thus reducing the impact on
                                 performance.

          Maximum                Defines the R2T (Ready to Transfer) PDUs that can be in transition           Software iSCSI
          Outstanding R2T        before an acknowledge PDU is received.                                       Dependent Hardware
                                                                                                              iSCSI

          First Burst Length     Specifies the maximum amount of unsolicited data an iSCSI initiator          Software iSCSI
                                 can send to the target during the execution of a single SCSI command,        Dependent Hardware
                                 in bytes.                                                                    iSCSI

          Maximum Burst          Maximum SCSI data payload in a Data-In or a solicited Data-Out               Software iSCSI
          Length                 iSCSI sequence, in bytes.                                                    Dependent Hardware
                                                                                                              iSCSI

          Maximum Receive        Maximum data segment length, in bytes, that can be received in an            Software iSCSI
          Data Segment Length    iSCSI PDU.                                                                   Independent Hardware
                                                                                                              iSCSI

          Session Recovery       Specifies the amount of time, in seconds, that can lapse while a session     Software iSCSI
          Timeout                recovery is performed. If the timeout exceeds its limit, the iSCSI           Dependent Hardware
                                 initiator terminates the session.                                            iSCSI

          No-Op Interval         Specifies the time interval, in seconds, between NOP-Out requests            Software iSCSI
                                 sent from your iSCSI initiator to an iSCSI target. The NOP-Out               Dependent Hardware
                                 requests serve as the ping mechanism to verify that a connection             iSCSI
                                 between the iSCSI initiator and the iSCSI target is active.

          No-Op Timeout          Specifies the amount of time, in seconds, that can lapse before your         Software iSCSI
                                 host receives a NOP-In message. The message is sent by the iSCSI             Dependent Hardware
                                 target in response to the NOP-Out request. When the no-op timeout            iSCSI
                                 limit is exceeded, the initiator terminates the current session and starts
                                 a new one.

          ARP Redirect           Allows storage systems to move iSCSI traffic dynamically from one            Software and
                                 port to another. ARP is required by storage systems that do array-           Independent Hardware
                                 based failover.                                                              iSCSI
                                                                                                              (Configurable through
                                                                                                              vSphere CLI)

          Delayed ACK            Allows systems to delay acknowledgment of received data packets.             Software iSCSI
                                                                                                              Dependent Hardware
                                                                                                              iSCSI



          Configure Advanced Parameters for iSCSI
          The advanced iSCSI settings control such parameters as header and data digest, ARP redirection, delayed ACK,
          and so on. Generally, you do not need to change these settings because your ESX host works with the assigned
          predefined values.

          CAUTION Do not make any changes to the advanced iSCSI settings unless you are working with the VMware
          support team or otherwise have thorough information about the values to provide for the settings.




VMware, Inc.                                                                                                                        103
ESX Configuration Guide




          Procedure

          1    Access the iSCSI Initiator Properties dialog box.

          2    To configure advanced parameters at the initiator level, on the General tab, click Advanced. Proceed to
               Step 4.

          3    Configure advanced parameters at the target level.

               At the target level, advanced parameters can be configured only for software and dependent hardware
               iSCSI adapters.

               a     Select either the Dynamic Discovery tab or Static Discovery tab.

               b     From the list of available targets, select a target to configure and click Settings > Advanced.

          4    Enter any required values for the advanced parameters you want to modify and click OK to save your
               changes.


Datastore Refresh and Storage Rescan Operations
          The datastore refresh operation updates the datastore lists and storage information, such as the datastore
          capacity, displayed in the vSphere Client. When you perform datastore management tasks or make changes
          in the SAN configuration, you might need to rescan your storage.

          When you perform VMFS datastore management operations, such as creating a VMFS datastore or RDM,
          adding an extent, and increasing or deleting a VMFS datastore, your host or the vCenter Server automatically
          rescans and updates your storage. You can disable the automatic rescan feature by turning off the Host Rescan
          Filter. See “Turn off vCenter Server Storage Filters,” on page 127.

          In certain cases, you need to perform a manual rescan. You can rescan all storage available to your host, or, if
          you are using the vCenter Server, to all hosts in a folder, cluster, and datacenter.

          If the changes you make are isolated to storage connected through a specific adapter, perform a rescan for this
          adapter.

          Perform the manual rescan each time you make one of the following changes.
          n    Create new LUNs on a SAN.
          n    Change the path masking on a host.
          n    Reconnect a cable.
          n    Change CHAP settings.
          n    Add a single host to the vCenter Server after you have edited or removed from the vCenter Server a
               datastore shared by the vCenter Server hosts and the single host.

          IMPORTANT If you rescan when a path is unavailable, the host removes the path from the list of paths to the
          device. The path reappears on the list as soon as it becomes available and starts working again.


      Perform Storage Rescan
          When you make changes in your SAN configuration, you might need to rescan your storage. You can rescan
          all storage available to your host. If the changes you make are isolated to storage accessed through a specific
          adapter, perform rescan for only this adapter.

          Use this procedure if you want to limit the rescan to storage available to a particular host or accessed through
          a particular adapter on the host. If you want to rescan storage available to all hosts managed by your vCenter
          Server system, you can do so by right-clicking a datacenter, cluster, or folder that contains the hosts and
          selecting Rescan for Datastores.




104                                                                                                              VMware, Inc.
Chapter 8 Configuring ESX Storage




          Procedure

          1    In the vSphere Client, select a host and click the Configuration tab.

          2    In the Hardware panel, select Storage Adapters, and click Rescan above the Storage Adapters panel.

               You can also right-click an individual adapter and click Rescan to rescan just that adapter.

          3    To discover new disks or LUNs, select Scan for New Storage Devices.

               If new LUNs are discovered, they appear in the device list.

          4    To discover new datastores or update a datastore after its configuration has been changed, select Scan for
               New VMFS Volumes.

               If new datastores or VMFS volumes are discovered, they appear in the datastore list.


Create VMFS Datastores
          VMFS datastores serve as repositories for virtual machines. You can set up VMFS datastores on any SCSI-based
          storage devices that the host discovers.

          Prerequisites

          Before creating datastores, you must install and configure any adapters that your storage requires. Rescan the
          adapters to discover newly added storage devices.

          Procedure

          1    Log in to the vSphere Client and select the host from the Inventory panel.

          2    Click the Configuration tab and click Storage in the Hardware panel.

          3    Click Datastores and click Add Storage.

          4    Select the Disk/LUN storage type and click Next.

          5    Select a device to use for your datastore and click Next.

               NOTE Select the device that does not have a datastore name displayed in the VMFS Label column. If a
               name is present, the device contains a copy of an existing VMFS datastore.

               If the disk you are formatting is blank, the Current Disk Layout page automatically presents the entire
               disk space for storage configuration.
          6    If the disk is not blank, review the current disk layout in the top panel of the Current Disk Layout page
               and select a configuration option from the bottom panel.

               Option                                 Description
               Use all available partitions           Dedicates the entire disk or LUN to a single VMFS datastore. If you select
                                                      this option, all file systems and data currently stored on this device is
                                                      destroyed.
               Use free space                         Deploys a VMFS datastore in the remaining free space of the disk.


          7    Click Next.

          8    In the Properties page, enter a datastore name and click Next.

          9    If needed, adjust the file system and capacity values.

               By default, the entire free space on the storage device is available.

          10   Click Next.

          11   In the Ready to Complete page, review the datastore configuration information and click Finish.



VMware, Inc.                                                                                                                   105
ESX Configuration Guide




          A datastore on the SCSI-based storage device is created. If you use the vCenter Server system to manage your
          hosts, the newly created datastore is automatically added to all hosts.


Network Attached Storage
          ESX supports using NAS through the NFS protocol. The NFS protocol enables communication between an
          NFS client and an NFS server.

          The NFS client built into ESX lets you access the NFS server and use NFS volumes for storage. ESX supports
          only NFS Version 3 over TCP.

          You use the vSphere Client to configure NFS volumes as datastores. Configured NFS datastores appear in the
          vSphere Client, and you can use them to store virtual disk files in the same way that you use VMFS-based
          datastores.

          NOTE ESX does not support the delegate user functionality that enables access to NFS volumes using non-
          root credentials.

          Figure 8-4 depicts a virtual machine using the NFS volume to store its files. In this configuration, the host
          connects to the NFS server, which stores the virtual disk files, through a regular network adapter.
          Figure 8-4. NFS Storage

                           Host



                           virtual
                          machine




                                     ethernet
                                        NIC


                                      LAN




                          NFS

                          NAS appliance

          The virtual disks that you create on NFS-based datastores use a disk format dictated by the NFS server, typically
          a thin format that requires on-demand space allocation. If the virtual machine runs out of space while writing
          to this disk, the vSphere Client notifies you that more space is needed. You have the following options:
          n    Free up additional space on the volume so that the virtual machine continues writing to the disk.
          n    Terminate the virtual machine session. Terminating the session shuts down the virtual machine.

          CAUTION When your host accesses a virtual machine disk file on an NFS-based datastore, a .lck-XXX lock file
          is generated in the same directory where the disk file resides to prevent other hosts from accessing this virtual
          disk file. Do not remove the .lck-XXX lock file, because without it, the running virtual machine cannot access
          its virtual disk file.




106                                                                                                             VMware, Inc.
Chapter 8 Configuring ESX Storage




   NFS Datastores as Repositories for Commonly Used Files
          In addition to storing virtual disks on NFS datastores, you can also use NFS as a central repository for ISO
          images, virtual machine templates, and so on.

          To use NFS as a shared repository, you create a directory on the NFS server and then mount it as a datastore
          on all hosts. If you use the datastore for ISO images, you can connect the virtual machine's CD-ROM device to
          an ISO file on the datastore and install a guest operating system from the ISO file.

          NOTE If the underlying NFS volume, on which the files are stored, is read-only, make sure that the volume is
          exported as a read-only share by the NFS server, or configure it as a read-only datastore on the ESX host.
          Otherwise, the host considers the datastore to be read-write and might not be able to open the files.


   Create an NFS-Based Datastore
          You can use the Add Storage wizard to mount an NFS volume and use it as if it were a VMFS datastore.

          Prerequisites

          Because NFS requires network connectivity to access data stored on remote servers, before configuring NFS,
          you must first configure VMkernel networking.

          Procedure

          1    Log in to the vSphere Client and select the host from the Inventory panel.

          2    Click the Configuration tab and click Storage in the Hardware panel.

          3    Click Datastores and click Add Storage.

          4    Select Network File System as the storage type and click Next.

          5    Enter the server name, the mount point folder name, and the datastore name.

               NOTE When you mount the same NFS volume on different hosts, make sure that the server and folder
               names are identical across the hosts. If the names do not match exactly, for example, if you enter share as
               the folder name on one host and /share on the other, the hosts see the same NFS volume as two different
               datastores. This might result in a failure of such features as vMotion.

          6    (Optional) Select Mount NFS read only if the volume is exported as read only by the NFS server.

          7    Click Next.

          8    In the Network File System Summary page, review the configuration options and click Finish.


Creating a Diagnostic Partition
          To run successfully, your host must have a diagnostic partition or a dump partition to store core dumps for
          debugging and technical support. You can create the diagnostic partition on a local disk or on a private or
          shared SAN LUN.

          A diagnostic partition cannot be located on an iSCSI LUN accessed through a software iSCSI initiator.

          Each host must have a diagnostic partition of 100MB. If multiple hosts share a SAN, configure a diagnostic
          partition with 100MB for each host.

          CAUTION If two hosts that share a diagnostic partition fail and save core dumps to the same slot, the core
          dumps might be lost. To collect core dump data, reboot a host and extract log files immediately after the host
          fails. However, if another host fails before you collect the diagnostic data of the first host, the second host will
          fail to save the core dump.




VMware, Inc.                                                                                                                 107
ESX Configuration Guide




          With the ESX host, you typically create a diagnostic partition when installing ESX by selecting Recommended
          Partitioning. The installer automatically creates a diagnostic partition for your host. If you select Advanced
          Partitioning and choose not to specify the diagnostic partition during installation, you can configure it using
          the Add Storage wizard.


      Create a Diagnostic Partition
          You can create a diagnostic partition for your host.

          Procedure

          1    Log in to the vSphere Client and select the host from the Inventory panel.

          2    Click the Configuration tab and click Storage in the Hardware panel.

          3    Click Datastores and click Add Storage.

          4    Select Diagnostic and click Next.

               If you do not see Diagnostic as an option, the host already has a diagnostic partition.

               You can query and scan the host’s diagnostic partition using the vicfg-dumppart -l command on the
               vSphere CLI.

          5    Specify the type of diagnostic partition.

               Option                                Description
               Private Local                         Creates the diagnostic partition on a local disk. This partition stores fault
                                                     information only for your host.
               Private SAN Storage                   Creates the diagnostic partition on a non-shared SAN LUN. This partition
                                                     stores fault information only for your host.
               Shared SAN Storage                    Creates the diagnostic partition on a shared SAN LUN. This partition is
                                                     accessed by multiple hosts and can store fault information for more than one
                                                     host.


          6    Click Next.

          7    Select the device to use for the diagnostic partition and click Next.

          8    Review the partition configuration information and click Finish.




108                                                                                                                     VMware, Inc.
Managing Storage                                                                                                    9
          After you create datastores, you can change their properties, use folders to group datastores based on your
          business needs, or delete unused datastores. You might also need to set up multipathing for your storage or
          resignature datastore copies.

          This chapter includes the following topics:
          n    “Managing Datastores,” on page 109
          n    “Changing VMFS Datastore Properties,” on page 111
          n    “Managing Duplicate VMFS Datastores,” on page 113
          n    “Using Multipathing with ESX,” on page 115
          n    “Storage Hardware Acceleration,” on page 123
          n    “Thin Provisioning,” on page 124
          n    “Turn off vCenter Server Storage Filters,” on page 127


Managing Datastores
          An ESX system uses datastores to store all files associated with its virtual machines. After you create datastores,
          you can manage them by performing a number of tasks.

          A datastore is a logical storage unit that can use disk space on one physical device, one disk partition, or span
          several physical devices. The datastore can exist on different types of physical devices, including SCSI, iSCSI,
          Fibre Channel SAN, or NFS.

          Datastores are added to the vSphere Client in one of the following ways:
          n    Discovered when a host is added to the inventory. The vSphere Client displays any datastores that the
               host can recognize.
          n    Created on an available storage device using the Add Storage command.

          After the datastores are created, you can use them to store virtual machine files. You can manage them by
          renaming, removing, and setting access control permissions. In addition, you can group datastores to organize
          them and set the same permissions across the group at one time.

          For information on setting access control permissions on a datastore, see the vSphere Client Help.




VMware, Inc.                                                                                                             109
ESX Configuration Guide




      Rename Datastores
          You can change the name of an existing datastore.

          Procedure

          1    Display the datastores.

          2    Right-click the datastore to rename and select Rename.

          3    Type a new datastore name.

          If you use the vCenter Server system to manage your hosts, the new name appears on all hosts that have access
          to the datastore.


      Group Datastores
          If you use the vCenter Server system to manage your hosts, group datastores into folders. This allows you to
          organize your datastores according to business practices and to assign the same permissions and alarms on
          the datastores in the group at one time.

          Procedure

          1    Log in to the vSphere Client.

          2    If necessary, create the datastores.

               For details, see the vSphere Client Help.

          3    In the Inventory panel, choose Datastores.

          4    Select the datacenter containing the datastores to group.

          5    In the shortcut menu, click the New Folder icon.

          6    Give the folder a descriptive name.

          7    Click and drag each datastore onto the folder.


      Delete Datastores
          You can delete any type of VMFS datastore, including copies that you have mounted without resignaturing.
          When you delete a datastore, it is destroyed and disappears from all hosts that have access to the datastore.

          Prerequisites

          Before deleting a datastore, remove all virtual machines from the datastore. Make sure that no other host is
          accessing the datastore.

          Procedure

          1    Display the datastores.

          2    Right-click the datastore to delete and click Delete.

          3    Confirm that you want to delete the datastore.




110                                                                                                          VMware, Inc.
Chapter 9 Managing Storage




   Unmount Datastores
          When you unmount a datastore, it remains intact, but can no longer be seen from the hosts that you specify.
          It continues to appear on other hosts, where it remains mounted.

          You can unmount only the following types of datastores:
          n    NFS datastores
          n    VMFS datastore copies mounted without resignaturing

          You cannot unmount an active mounted datastore.

          Procedure

          1    Display the datastores.

          2    Right-click the datastore to unmount and select Unmount.

          3    If the datastore is shared, specify which hosts should no longer access the datastore.

               a   If needed, deselect the hosts where you want to keep the datastore mounted.

                   By default, all hosts are selected.

               b   Click Next.

               c   Review the list of hosts from which to unmount the datastore, and click Finish.

          4    Confirm that you want to unmount the datastore.


Changing VMFS Datastore Properties
          After you create a VMFS-based datastore, you can modify it. For example, you can increase it if you need more
          space. If you have VMFS-2 datastores, you can upgrade them to VMFS-3 format.

          Datastores that use the VMFS format are deployed on SCSI-based storage devices.

          You cannot reformat a VMFS datastore that a remote host is using. If you attempt to, a warning appears that
          specifies the name of the datastore in use and the host that is using it. This warning also appears in the VMkernel
          and vmkwarning log files.

          Depending on whether your vSphere Client is connected to a vCenter Server system or directly to a host,
          different ways to access the Datastore Properties dialog box exist.
          n    vCenter Server only. To access the Datastore Properties dialog box, select the datastore form the inventory,
               click the Configuration tab, and click Properties.
          n    vCenter Server and ESX host. To access the Datastore Properties dialog box, select a host from the
               inventory, click the Configuration tab and click Storage. From the Datastores view, select the datastore
               to modify and click Properties.




VMware, Inc.                                                                                                               111
ESX Configuration Guide




      Increase VMFS Datastores
          When you need to create new virtual machines on a datastore, or when the virtual machines running on this
          datastore require more space, you can dynamically increase the capacity of a VMFS datastore.

          Use one of the following methods:
          n    Add a new extent. An extent is a partition on a storage device, or LUN. You can add up to 32 new extents
               of the same storage type to an existing VMFS datastore. The spanned VMFS datastore can use any of all
               its extents at any time. It does not need to fill up a particular extent before using the next one.
          n    Grow an extent in an existing VMFS datastore, so that it fills the available adjacent capacity. Only extents
               with free space immediately after them are expandable.

          NOTE If a shared datastore has powered on virtual machines and becomes 100% full, you can increase the
          datastore's capacity only from the host, with which the powered on virtual machines are registered.

          Procedure

          1    Log in to the vSphere Client and select a host from the Inventory panel.

          2    Click the Configuration tab and click Storage.

          3    From the Datastores view, select the datastore to increase and click Properties.

          4    Click Increase.

          5    Select a device from the list of storage devices and click Next.
               n     If you want to add a new extent, select the device for which the Expandable column reads No.
               n     If you want to expand an existing extent, select the device for which the Expandable column reads
                     Yes.

          6    Select a configuration option from the bottom panel.

               Depending on the current layout of the disk and on your previous selections, the options you see might
               vary.

               Option                                 Description
               Use free space to add new extent       Adds the free space on this disk as a new datastore extent.
               Use free space to expand existing      Grows an existing extent to a required capacity.
               extent
               Use free space                         Deploys an extent in the remaining free space of the disk. This option is
                                                      available only when adding an extent.
               Use all available partitions           Dedicates the entire disk to a single datastore extent. This option is available
                                                      only when adding an extent and when the disk you are formatting is not
                                                      blank. The disk is reformatted, and the datastores and any data that it
                                                      contains are erased.


          7    Set the capacity for the extent.

               By default, the entire free space on the storage device is available.

          8    Click Next.

          9    Review the proposed layout and the new configuration of your datastore, and click Finish.

          What to do next

          After you grow an extent in a shared VMFS datastore, refresh the datastore on each host that can access this
          datastore, so that the vSphere Client can display the correct datastore capacity for all hosts.




112                                                                                                                      VMware, Inc.
Chapter 9 Managing Storage




   Upgrade Datastores
          ESX includes VMFS version 3 (VMFS-3). If your datastore was formatted with VMFS-2, you can read files
          stored on VMFS-2, but you cannot write to them. To have complete access to the files, upgrade VMFS-2 to
          VMFS-3.

          When you upgrade VMFS-2 to VMFS-3, the ESX file-locking mechanism ensures that no remote host or local
          process is accessing the VMFS datastore being converted. Your host preserves all files on the datastore.

          As a precaution, before you use the upgrade option, consider the following:
          n    Commit or discard any changes to virtual disks in the VMFS-2 volume that you plan to upgrade.
          n    Back up the VMFS-2 volume.
          n    Be sure that no powered on virtual machines are using the VMFS-2 volume.
          n    Be sure that no other ESX host is accessing the VMFS-2 volume.

          The VMFS-2 to VMFS-3 conversion is a one-way process. After you convert the VMFS-based datastore to
          VMFS-3, you cannot revert it back to VMFS-2.

          To upgrade the VMFS-2 file system, its file block size must not exceed 8MB.

          Procedure

          1    Log in to the vSphere Client and select a host from the Inventory panel.

          2    Click the Configuration tab and click Storage.

          3    Select the datastore that uses the VMFS-2 format.

          4    Click Upgrade to VMFS-3.

          5    Perform a rescan on all hosts that see the datastore.


Managing Duplicate VMFS Datastores
          When a LUN contains a VMFS datastore copy, you can mount the datastore with the existing signature or
          assign a new signature.

          Each VMFS datastore created in a LUN has a unique UUID that is stored in the file system superblock. When
          the LUN is replicated or snapshotted, the resulting LUN copy is identical, byte-for-byte, with the original LUN.
          As a result, if the original LUN contains a VMFS datastore with UUID X, the LUN copy appears to contain an
          identical VMFS datastore, or a VMFS datastore copy, with exactly the same UUID X.

          ESX can determine whether a LUN contains the VMFS datastore copy, and either mount the datastore copy
          with its original UUID or change the UUID, thus resignaturing the datastore.


   Mounting VMFS Datastores with Existing Signatures
          You might not have to resignature a VMFS datastore copy. You can mount a VMFS datastore copy without
          changing its signature.

          For example, you can maintain synchronized copies of virtual machines at a secondary site as part of a disaster
          recovery plan. In the event of a disaster at the primary site, you can mount the datastore copy and power on
          the virtual machines at the secondary site.

          IMPORTANT You can mount a VMFS datastore copy only if it does not collide with the original VMFS datastore
          that has the same UUID. To mount the copy, the original VMFS datastore has to be offline.




VMware, Inc.                                                                                                            113
ESX Configuration Guide




          When you mount the VMFS datastore, ESX allows both reads and writes to the datastore residing on the LUN
          copy. The LUN copy must be writable. The datastore mounts are persistent and valid across system reboots.

          Because ESX does not allow you to resignature the mounted datastore, unmount the datastore before
          resignaturing.

          Mount a VMFS Datastore with an Existing Signature
          If you do not need to resignature a VMFS datastore copy, you can mount it without changing its signature.

          Prerequisites

          Before you mount a VMFS datastore, perform a storage rescan on your host so that it updates its view of LUNs
          presented to it.

          Procedure

          1    Log in to the vSphere Client and select the server from the inventory panel.

          2    Click the Configuration tab and click Storage in the Hardware panel.

          3    Click Add Storage.

          4    Select the Disk/LUN storage type and click Next.

          5    From the list of LUNs, select the LUN that has a datastore name displayed in the VMFS Label column and
               click Next.

               The name present in the VMFS Label column indicates that the LUN is a copy that contains a copy of an
               existing VMFS datastore.

          6    Under Mount Options, select Keep Existing Signature.

          7    In the Ready to Complete page, review the datastore configuration information and click Finish.

          What to do next

          If you later want to resignature the mounted datastore, you must unmount it first.


      Resignaturing VMFS Copies
          Use datastore resignaturing to retain the data stored on the VMFS datastore copy. When resignaturing a VMFS
          copy, ESX assigns a new UUID and a new label to the copy, and mounts the copy as a datastore distinct from
          the original.

          The default format of the new label assigned to the datastore is snap-snapID-oldLabel, where snapID is an
          integer and oldLabel is the label of the original datastore.

          When you perform datastore resignaturing, consider the following points:
          n    Datastore resignaturing is irreversible.
          n    The LUN copy that contains the VMFS datastore that you resignature is no longer treated as a LUN copy.
          n    A spanned datastore can be resignatured only if all its extents are online.
          n    The resignaturing process is crash and fault tolerant. If the process is interrupted, you can resume it later.
          n    You can mount the new VMFS datastore without a risk of its UUID colliding with UUIDs of any other
               datastore, such as an ancestor or child in a hierarchy of LUN snapshots.




114                                                                                                               VMware, Inc.
Chapter 9 Managing Storage




          Resignature a VMFS Datastore Copy
          Use datastore resignaturing if you want to retain the data stored on the VMFS datastore copy.

          Prerequisites

          To resignature a mounted datastore copy, first unmount it.

          Before you resignature a VMFS datastore, perform a storage rescan on your host so that the host updates its
          view of LUNs presented to it and discovers any LUN copies.

          Procedure

          1    Log in to the vSphere Client and select the server from the inventory panel.

          2    Click the Configuration tab and click Storage in the Hardware panel.

          3    Click Add Storage.

          4    Select the Disk/LUN storage type and click Next.
          5    From the list of LUNs, select the LUN that has a datastore name displayed in the VMFS Label column and
               click Next.

               The name present in the VMFS Label column indicates that the LUN is a copy that contains a copy of an
               existing VMFS datastore.

          6    Under Mount Options, select Assign a New Signature and click Next.

          7    In the Ready to Complete page, review the datastore configuration information and click Finish.

          What to do next

          After resignaturing, you might have to do the following:
          n    If the resignatured datastore contains virtual machines, update references to the original VMFS datastore
               in the virtual machine files, including .vmx, .vmdk, .vmsd, and .vmsn.
          n    To power on virtual machines, register them with vCenter Server.


Using Multipathing with ESX
          To maintain a constant connection between an ESX host and its storage, ESX supports multipathing.
          Multipathing is a technique that lets you use more than one physical path for transferring data between the ESX
          host and the external storage device.

          In case of a failure of an element in the SAN network, such as an HBA, switch, or cable, ESX can use alternate
          physical paths to access a storage device. This process is known as path failover. In addition to path failover,
          multipathing offers load balancing, which redistributes I/O loads between multiple paths, thus reducing or
          removing potential bottlenecks.


   Managing Multiple Paths
          To manage storage multipathing, ESX uses a special VMkernel layer, the Pluggable Storage Architecture (PSA).
          The PSA is an open, modular framework that coordinates the simultaneous operation of multiple multipathing
          plug-ins (MPPs).

          The VMkernel multipathing plug-in that ESX provides by default is the VMware Native Multipathing Plug-
          In (NMP). The NMP is an extensible module that manages sub plug-ins. There are two types of NMP sub plug-
          ins, Storage Array Type Plug-Ins (SATPs), and Path Selection Plug-Ins (PSPs). SATPs and PSPs can be built-in
          and provided by VMware, or can be provided by a third party.




VMware, Inc.                                                                                                            115
ESX Configuration Guide




          If more multipathing functionality is required, a third party can also provide an MPP to run in addition to, or
          as a replacement for, the default NMP.

          When coordinating the VMware NMP and any installed third-party MPPs, the PSA performs the following
          tasks:
          n    Loads and unloads multipathing plug-ins.
          n    Hides virtual machine specifics from a particular plug-in.
          n    Routes I/O requests for a specific logical device to the MPP managing that device.
          n    Handles I/O queuing to the logical devices.
          n    Implements logical device bandwidth sharing between virtual machines.
          n    Handles I/O queueing to the physical storage HBAs.
          n    Handles physical path discovery and removal.
          n    Provides logical device and physical path I/O statistics.

          As Figure 9-1 illustrates, multiple third-party MPPs can run in parallel with the VMware NMP. When installed,
          the third-party MPPs replace the behavior of the NMP and take complete control of the path failover and the
          load-balancing operations for specified storage devices.
          Figure 9-1. Pluggable Storage Architecture
              VMkernel

              pluggable storage architecture


                   third-party   third-party             VMware NMP
                      MPP           MPP
                                               VMware SATP        VMware PSP

                                               VMware SATP        VMware PSP

                                               VMware SATP

                                               third-party SATP   third-party PSP




          The multipathing modules perform the following operations:
          n    Manage physical path claiming and unclaiming.
          n    Manage creation, registration, and deregistration of logical devices.
          n    Associate physical paths with logical devices.
          n    Support path failure detection and remediation.
          n    Process I/O requests to logical devices:
               n       Select an optimal physical path for the request.
               n       Depending on a storage device, perform specific actions necessary to handle path failures and I/O
                       command retries.
          n    Support management tasks, such as abort or reset of logical devices.




116                                                                                                            VMware, Inc.
Chapter 9 Managing Storage




          VMware Multipathing Module
          By default, ESX provides an extensible multipathing module called the Native Multipathing Plug-In (NMP).

          Generally, the VMware NMP supports all storage arrays listed on the VMware storage HCL and provides a
          default path selection algorithm based on the array type. The NMP associates a set of physical paths with a
          specific storage device, or LUN. The specific details of handling path failover for a given storage array are
          delegated to a Storage Array Type Plug-In (SATP). The specific details for determining which physical path is
          used to issue an I/O request to a storage device are handled by a Path Selection Plug-In (PSP). SATPs and PSPs
          are sub plug-ins within the NMP module.

          Upon installation of ESX, the appropriate SATP for an array you use will be installed automatically. You do
          not need to obtain or download any SATPs.

          VMware SATPs

          Storage Array Type Plug-Ins (SATPs) run in conjunction with the VMware NMP and are responsible for array-
          specific operations.
          ESX offers a SATP for every type of array that VMware supports. It also provides default SATPs that support
          non-specific active-active and ALUA storage arrays, and the local SATP for direct-attached devices. Each SATP
          accommodates special characteristics of a certain class of storage arrays and can perform the array-specific
          operations required to detect path state and to activate an inactive path. As a result, the NMP module itself
          can work with multiple storage arrays without having to be aware of the storage device specifics.

          After the NMP determines which SATP to use for a specific storage device and associates the SATP with the
          physical paths for that storage device, the SATP implements the tasks that include the following:
          n    Monitors the health of each physical path.
          n    Reports changes in the state of each physical path.
          n    Performs array-specific actions necessary for storage fail-over. For example, for active-passive devices, it
               can activate passive paths.

          VMware PSPs

          Path Selection Plug-Ins (PSPs) run with the VMware NMP and are responsible for choosing a physical path
          for I/O requests.

          The VMware NMP assigns a default PSP for each logical device based on the SATP associated with the physical
          paths for that device. You can override the default PSP.

          By default, the VMware NMP supports the following PSPs:

          Most Recently Used             Selects the path the ESX host used most recently to access the given device. If
          (VMW_PSP_MRU)                  this path becomes unavailable, the host switches to an alternative path and
                                         continues to use the new path while it is available. MRU is the default path
                                         policy for active-passive arrays.

          Fixed                          Uses the designated preferred path, if it has been configured. Otherwise, it uses
          (VMW_PSP_FIXED)                the first working path discovered at system boot time. If the host cannot use
                                         the preferred path, it selects a random alternative available path. The host
                                         reverts back to the preferred path as soon as that path becomes available. Fixed
                                         is the default path policy for active-active arrays.

                                         CAUTION If used with active-passive arrays, the Fixed path policy might cause
                                         path thrashing.




VMware, Inc.                                                                                                             117
ESX Configuration Guide




          VMW_PSP_FIXED_AP                     Extends the Fixed functionality to active-passive and ALUA mode arrays.

          Round Robin                          Uses a path selection algorithm that rotates through all available active paths
          (VMW_PSP_RR)                         enabling load balancing across the paths.

          VMware NMP Flow of I/O

          When a virtual machine issues an I/O request to a storage device managed by the NMP, the following process
          takes place.

          1     The NMP calls the PSP assigned to this storage device.

          2     The PSP selects an appropriate physical path on which to issue the I/O.

          3     The NMP issues the I/O request on the path selected by the PSP.

          4     If the I/O operation is successful, the NMP reports its completion.

          5     If the I/O operation reports an error, the NMP calls the appropriate SATP.

          6     The SATP interprets the I/O command errors and, when appropriate, activates the inactive paths.

          7     The PSP is called to select a new path on which to issue the I/O.


      Multipathing with Local Storage and Fibre Channel SANs
          In a simple multipathing local storage topology, you can use one ESX host, which has two HBAs. The ESX host
          connects to a dual-port local storage system through two cables. This configuration ensures fault tolerance if
          one of the connection elements between the ESX host and the local storage system fails.

          To support path switching with FC SAN, the ESX host typically has two or more HBAs available from which
          the storage array can be reached using one or more switches. Alternatively, the setup can include one HBA
          and two storage processors so that the HBA can use a different path to reach the disk array.

          In Figure 9-2, multiple paths connect each server with the storage device. For example, if HBA1 or the link
          between HBA1 and the switch fails, HBA2 takes over and provides the connection between the server and the
          switch. The process of one HBA taking over for another is called HBA failover.
          Figure 9-2. Fibre Channel Multipathing
                     Host                             Host
                      1                                2




              HBA2          HBA1               HBA3          HBA4




          switch                                             switch



                     SP1                              SP2




                               storage array




118                                                                                                                 VMware, Inc.
Chapter 9 Managing Storage




          Similarly, if SP1 or the link between SP1 and the switch breaks, SP2 takes over and provides the connection
          between the switch and the storage device. This process is called SP failover. ESX supports HBA and SP failover
          with its multipathing capability.


   Multipathing with iSCSI SAN
          With iSCSI storage, you can take advantage of the multipathing support that the IP network offers. In addition,
          ESX supports host-based multipathing for all types of iSCSI initiators.

          ESX can use multipathing support built into the IP network, which allows the network to perform routing.
          Through dynamic discovery, iSCSI initiators obtain a list of target addresses that the initiators can use as
          multiple paths to iSCSI LUNs for failover purposes.

          ESX also supports host-based multipathing.

          Figure 9-3 shows multipathing setups possible with different types of iSCSI initiators.
          Figure 9-3. Host-Based Multipathing
                           hardware                         software
                            iSCSI                            iSCSI


                            host 1                          host 2

                                               software
                                                adapter
                    HBA2             HBA1            NIC2              NIC1



                                            IP network




                                               SP




                                        iSCSI storage


          Multipathing with Hardware iSCSI
          With the hardware iSCSI, the host typically has two or more hardware iSCSI adapters available, from which
          the storage system can be reached using one or more switches. Alternatively, the setup might include one
          adapter and two storage processors so that the adapter can use a different path to reach the storage system.

          In the Figure 9-3 illustration, Host1 has two hardware iSCSI adapters, HBA1 and HBA2, that provide two
          physical paths to the storage system. Multipathing plug-ins on your host, whether the VMkernel NMP or any
          third-party MPPs, have access to the paths by default and can monitor health of each physical path. If, for
          example, HBA1 or the link between HBA1 and the network fails, the multipathing plug-ins can switch the path
          over to HBA2.

          Multipathing with Software iSCSI
          With the software iSCSI, as shown on Host 2 of Figure 9-3, you can use multiple NICs that provide failover
          and load balancing capabilities for iSCSI connections between your host and storage systems.




VMware, Inc.                                                                                                              119
ESX Configuration Guide




          For this setup, because multipathing plug-ins do not have direct access to physical NICs on your host, you
          must connect each physical NIC to a separate VMkernel port. You then associate all VMkernel ports with the
          software iSCSI initiator using a port binding technique. As a result, each VMkernel port connected to a separate
          NIC becomes a different path that the iSCSI storage stack and its storage-aware multipathing plug-ins can use.

          For information about how to configure multipathing for the software iSCSI, see “Networking Configuration
          for Software iSCSI and Dependent Hardware iSCSI,” on page 67.


      Path Scanning and Claiming
          When you start your ESX host or rescan your storage adapter, the host discovers all physical paths to storage
          devices available to the host. Based on a set of claim rules defined in the /etc/vmware/esx.conf file, the host
          determines which multipathing plug-in (MPP) should claim the paths to a particular device and become
          responsible for managing the multipathing support for the device.

          By default, the host performs a periodic path evaluation every 5 minutes causing any unclaimed paths to be
          claimed by the appropriate MPP.

          The claim rules are numbered. For each physical path, the host runs through the claim rules starting with the
          lowest number first. The attributes of the physical path are compared to the path specification in the claim rule.
          If there is a match, the host assigns the MPP specified in the claim rule to manage the physical path. This
          continues until all physical paths are claimed by corresponding MPPs, either third-party multipathing plug-
          ins or the native multipathing plug-in (NMP).

          For general information on multipathing plug-ins, see “Managing Multiple Paths,” on page 115.

          For the paths managed by the NMP module, a second set of claim rules is applied. These rules determine which
          Storage Array Type Plug-In (SATP) should be used to manage the paths for a specific array type, and which
          Path Selection Plug-In (PSP) is to be used for each storage device. For example, for a storage device that belongs
          to the EMC CLARiiON CX storage family and is not configured as ALUA device, the default SATP is
          VMW_SATP_CX and the default PSP is Most Recently Used.

          Use the vSphere Client to view which SATP and PSP the host is using for a specific storage device and the
          status of all available paths for this storage device. If needed, you can change the default VMware PSP using
          the vSphere Client. To change the default SATP, you need to modify claim rules using the vSphere CLI.

          For detailed descriptions of the commands available to manage PSA, see the vSphere Command-Line Interface
          Installation and Scripting Guide and the vSphere Command-Line Interface Reference.


      Viewing the Paths Information
          Use the vSphere Client to determine which SATP and PSP the ESX host uses for a specific storage device and
          the status of all available paths for this storage device. You can access the path information from both, the
          Datastores and Devices views. For datastores, you review the paths that connect to the device the datastore is
          deployed on.

          The path information includes the SATP assigned to manage the device, the path selection policy (PSP), and
          a list of paths with their physical characteristics, such as an adapter and target each path uses, and the status
          of each path. The following path status information can appear:

          Active                         Paths available for issuing I/O to a LUN. A single or multiple working paths
                                         currently used for transferring data are marked as Active (I/O).

                                         NOTE For hosts that run ESX 3.5 or earlier, the term active means the only path
                                         that the host is using to issue I/O to a LUN.

          Standby                        The path is operational and can be used for I/O if active paths fail.




120                                                                                                              VMware, Inc.
Chapter 9 Managing Storage




          Disabled                       The path is disabled and no data can be transferred.

          Dead                           The software cannot connect to the disk through this path.

          If you are using the Fixed path policy, you can see which path is the preferred path. The preferred path is
          marked with an asterisk (*) in the Preferred column.

          View Datastore Paths
          Use the vSphere Client to review the paths that connect to storage devices the datastores are deployed on.

          Procedure

          1    Log in to the vSphere Client and select a server from the inventory panel.

          2    Click the Configuration tab and click Storage in the Hardware panel.

          3    Click Datastores under View.

          4    From the list of configured datastores, select the datastore whose paths you want to view or configure.

               The Details panel shows the total number of paths being used to access the device and whether any of
               them are broken or disabled.

          5    Click Properties > Manage Paths to open the Manage Paths dialog box.

               You can use the Manage Paths dialog box to enable or disable your paths, set multipathing policy, and
               specify the preferred path.

          View Storage Device Paths
          Use the vSphere Client to view which SATP and PSP the host uses for a specific storage device and the status
          of all available paths for this storage device.

          Procedure

          1    Log in to the vSphere Client and select a server from the inventory panel.

          2    Click the Configuration tab and click Storage in the Hardware panel.

          3    Click Devices under View.

          4    Click Manage Paths to open the Manage Paths dialog box.


   Setting a Path Selection Policy
          For each storage device, the ESX host sets the path selection policy based on the claim rules defined in the /
          etc/vmware/esx.conf file.

          By default, VMware supports the following path selection policies. If you have a third-party PSP installed on
          your host, its policy also appears on the list.

          Fixed                          The host always uses the preferred path to the disk when that path is available.
          (VMW_PSP_FIXED)                If the host cannot access the disk through the preferred path, it tries the
                                         alternative paths. The default policy for active-active storage devices is Fixed.

          Fixed AP                       Extends the Fixed functionality to active-passive and ALUA mode arrays.
          (VMW_PSP_FIXED_AP)




VMware, Inc.                                                                                                             121
ESX Configuration Guide




          Most Recently Used              The host selects the path that it used recently. When the path becomes
          (VMW_PSP_MRU)                   unavailable, the host selects an alternative path. The host does not revert back
                                          to the original path when that path becomes available again. There is no
                                          preferred path setting with the MRU policy. MRU is the default policy for
                                          active-passive storage devices.

          Round Robin                     The host uses an automatic path selection algorithm rotating through all active
          (VMW_PSP_RR)                    paths when connecting to active-passive arrays, or through all available paths
                                          when connecting to active-active arrays. This implements load balancing across
                                          the physical paths available to your host.

                                          Load balancing is the process of spreading I/O requests across the paths. The
                                          goal is to optimize performance in terms of throughput, such as I/O per second,
                                          megabytes per second, or response times.

          Table 9-1 summarizes how the behavior of host changes, depending on the type of array and the failover policy.

          Table 9-1. Path Policy Effects
          Policy/Controller             Active/Active                                   Active/Passive

          Most Recently Used            Administrator action is required to fail back   Administrator action is required to fail back
                                        after path failure.                             after path failure.

          Fixed                         VMkernel resumes using the preferred path       VMkernel attempts to resume using the
                                        when connectivity is restored.                  preferred path. This can cause path thrashing
                                                                                        or failure when another SP now owns the
                                                                                        LUN.

          Round Robin                   No fail back.                                   Next path in round robin scheduling is
                                                                                        selected.

          Fixed AP                      For ALUA arrays, VMkernel picks the path set to be the preferred path.
                                        For both A/A and A/P and ALUA arrays, VMkernel resumes using the preferred path, but
                                        only if the path-thrashing avoidance algorithm allows the fail-back.



          Change the Path Selection Policy
          Generally, you do not have to change the default multipathing settings your host uses for a specific storage
          device. However, if you want to make any changes, you can use the Manage Paths dialog box to modify a path
          selection policy and specify the preferred path for the Fixed policy.

          Procedure

          1    Open the Manage Paths dialog box either from the Datastores or Devices view.

          2    Select a path selection policy.

               By default, VMware supports the following path selection policies. If you have a third-party PSP installed
               on your host, its policy also appears on the list.
               n     Fixed (VMW_PSP_FIXED)
               n     Fixed AP (VMW_PSP_FIXED_AP)
               n     Most Recently Used (VMW_PSP_MRU)
               n     Round Robin (VMW_PSP_RR)

          3    For the fixed policy, specify the preferred path by right-clicking the path you want to assign as the
               preferred path, and selecting Preferred.

          4    Click OK to save your settings and exit the dialog box.




122                                                                                                                      VMware, Inc.
Chapter 9 Managing Storage




          Disable Paths
          You can temporarily disable paths for maintenance or other reasons. You can do so using the vSphere Client.

          Procedure

          1    Open the Manage Paths dialog box either from the Datastores or Devices view.

          2    In the Paths panel, right-click the path to disable, and select Disable.

          3    Click OK to save your settings and exit the dialog box.

          You can also disable a path from the adapter’s Paths view by right-clicking the path in the list and selecting
          Disable.


Storage Hardware Acceleration
          The hardware acceleration functionality enables your host to offload specific virtual machine and storage
          management operations to compliant storage hardware. With the storage hardware assistance, your host
          performs these operations faster and consumes less CPU, memory, and storage fabric bandwidth.

          To implement the hardware acceleration functionality, the Pluggable Storage Architecture (PSA) uses a
          combination of special array integration plug-ins, called VAAI plug-ins, and an array integration filter, called
          VAAI filter. The PSA automatically attaches the VAAI filter and vendor-specific VAAI plug-ins to those storage
          devices that support the hardware acceleration.

          To view and manage the VAAI filter and VAAI plug-ins available on your host, use the vSphere CLI commands.

          For descriptions of the commands, see the vSphere Command-Line Interface Installation and Scripting Guide and the
          vSphere Command-Line Interface Reference.


   Hardware Acceleration Requirements and Benefits
          The hardware acceleration functionality works only if you use an appropriate host and storage array
          combination.

          Use the following hosts and storage arrays:
          n    ESX version 4.1 or later.
          n    Storage arrays that support storage-based hardware acceleration. ESX version 4.1 does not support
               hardware acceleration with NAS storage devices.

          On your host, the hardware acceleration is enabled by default. To enable the hardware acceleration on the
          storage side, check with your storage vendor. Certain storage arrays require that you explicitly activate the
          hardware acceleration support on the storage side.

          When the hardware acceleration functionality is supported, the host can get hardware assistance and perform
          the following operations faster and more efficiently:
          n    Migration of virtual machines with Storage vMotion
          n    Deployment of virtual machines from templates
          n    Cloning of virtual machines or templates
          n    VMFS clustered locking and metadata operations for virtual machine files
          n    Writes to thin provisioned and thick virtual disks
          n    Creation of fault-tolerant virtual machines




VMware, Inc.                                                                                                             123
ESX Configuration Guide




      Hardware Acceleration Support Status
          For each storage device and datastore, the vSphere Client displays the hardware acceleration support status
          in the Hardware Acceleration column of the Devices view and the Datastores view.

          The status values are Unknown, Supported, and Not Supported. The initial value is Unknown. The status
          changes to Supported after the host successfully performs the offload operation. If the offload operation fails,
          the status changes to Not Supported.

          When storage devices do not support or provide only partial support for the host operations, your host reverts
          to its native methods to perform unsupported operations.


      Turn off Hardware Acceleration
          If your storage devices do not support the hardware acceleration functionality, you can turn it off by using the
          vSphere Client advanced settings.

          As with any advanced settings, before disabling the hardware acceleration, consult with the VMware support
          team.

          Procedure

          1    In the vSphere Client inventory panel, select the host.

          2    Click the Configuration tab, and click Advanced Settings under Software.

          3    Click VMFS3 and change the value in the VMFS3.HardwareAcceleratedLocking field to zero.

          4    Click DataMover and change the values in each of the following fields to zero:
               n     DataMover.HardwareAcceleratedMove
               n     DataMover.HardwareAcceleratedInit

          5    Click OK to save your changes.


Thin Provisioning
          When you create a virtual machine, a certain amount of storage space on a datastore is provisioned or allocated
          to the virtual disk files.

          By default, ESX offers a traditional storage provisioning method during creation in which you estimate how
          much storage the virtual machine will need for its entire life cycle, provision a fixed amount of storage space
          to its virtual disk, and have the entire provisioned space committed to the virtual disk. A virtual disk that
          immediately occupies the entire provisioned space is called a thick disk. Creating virtual disks in thick format
          can lead to underutilization of datastore capacity, because large amounts of storage space, pre-allocated to
          individual virtual machines, might remain unused.

          To help avoid over-allocating storage space and save storage, ESX supports thin provisioning, which lets you,
          in the beginning, use just as much storage capacity as currently needed and then add the required amount of
          storage space at a later time. Using the ESX thin provisioning feature, you can create virtual disks in a thin
          format. For a thin virtual disk, ESX provisions the entire space required for the disk’s current and future
          activities, but commits only as much storage space as the disk needs for its initial operations.




124                                                                                                            VMware, Inc.
Chapter 9 Managing Storage




   About Virtual Disk Formats
          When you perform certain virtual machine management operations, such as create a virtual disk, clone a virtual
          machine to a template, or migrate a virtual machine, you can specify a format for the virtual disk file.

          The following disk formats are supported. You cannot specify the disk format if the disk resides on an NFS
          datastore. The NFS server determines the allocation policy for the disk.

          Thin Provisioned Format          Use this format to save storage space. For the thin disk, you provision as much
                                           datastore space as the disk would require based on the value you enter for the
                                           disk size. However, the thin disk starts small and at first, uses only as much
                                           datastore space as the disk actually needs for its initial operations.

                                           NOTE If a virtual disk supports clustering solutions such as Fault Tolerance,
                                           you cannot make the disk thin.

                                           If the thin disk needs more space later, it can grow to its maximum capacity
                                           and occupy the entire datastore space provisioned to it. Also, you can manually
                                           convert the thin disk into thick.

          Thick Format                     This is the default virtual disk format. The thick virtual disk does not change
                                           its size and from the very beginning occupies the entire datastore space
                                           provisioned to it. It is not possible to convert the thick disk into thin.


   Create Thin Provisioned Virtual Disks
          When you need to save storage space, you can create a virtual disk in thin provisioned format. The thin
          provisioned virtual disk starts small and grows as more disk space is required.

          This procedure assumes that you are creating a typical or custom virtual machine using the New Virtual
          Machine wizard.

          Prerequisites

          You can create thin disks only on the datastores that support thin provisioning. If a disk resides on an NFS
          datastore, you cannot specify the disk format because the NFS server determines the allocation policy for the
          disk.

          Procedure
          u    In the Create a Disk dialog box, select Allocate and commit space on demand (Thin Provisioning).

          A virtual disk in thin format is created. If you do not select the Thin Provisioning option, your virtual disk will
          have the default thick format.

          What to do next

          If you created a virtual disk in the thin format, you can later inflate it to its full size.




VMware, Inc.                                                                                                                   125
ESX Configuration Guide




      View Virtual Machine Storage Resources
          You can view how datastore storage space is allocated for your virtual machines.

          Procedure

          1    Select the virtual machine in the inventory.

          2    Click the Summary tab.

          3    Review the space allocation information in the Resources section.
               n     Provisioned Storage – Shows datastore space guaranteed to the virtual machine. The entire space
                     might not be used by the virtual machine if it has disks in thin provisioned format. Other virtual
                     machines can occupy any unused space.
               n     Not-shared Storage – Shows datastore space occupied by the virtual machine and not shared with
                     any other virtual machines.
               n     Used Storage – Shows datastore space actually occupied by virtual machine files, including
                     configuration and log files, snapshots, virtual disks, and so on. When the virtual machine is running,
                     the used storage space also includes swap files.


      Determine the Disk Format of a Virtual Machine
          You can determine whether your virtual disk is in thick or thin format.

          Procedure

          1    Select the virtual machine in the inventory.

          2    Click Edit Settings to display the Virtual Machine Properties dialog box.

          3    Click the Hardware tab and select the appropriate hard disk in the Hardware list.

               The Disk Provisioning section on the right shows the type of your virtual disk, either Thin or Thick.

          4    Click OK.

          What to do next

          If your virtual disk is in the thin format, you can inflate it to its full size.


      Convert a Virtual Disk from Thin to Thick
          If you created a virtual disk in the thin format, you can convert it to thick.

          Procedure

          1    Select the virtual machine in the inventory.

          2    Click the Summary tab and, under Resources, double-click the datastore for the virtual machine to open
               the Datastore Browser dialog box.

          3    Click the virtual machine folder to find the virtual disk file you want to convert. The file has the .vmdk
               extension.

          4    Right-click the virtual disk file and select Inflate.

          The virtual disk in thick format occupies the entire datastore space originally provisioned to it.




126                                                                                                             VMware, Inc.
Chapter 9 Managing Storage




   Handling Datastore Over-Subscription
          Because the provisioned space for thin disks can be greater than the committed space, a datastore over-
          subscription can occur, which results in the total provisioned space for the virtual machine disks on the
          datastore being greater than the actual capacity.

          Over-subscription can be possible because usually not all virtual machines with thin disks need the entire
          provisioned datastore space simultaneously. However, if you want to avoid over-subscribing the datastore,
          you can set up an alarm that notifies you when the provisioned space reaches a certain threshold.

          For information on setting alarms, see the vSphere Datacenter Administration Guide.

          If your virtual machines require more space, the datastore space is allocated on a first come first served basis.
          When the datastore runs our of space, you can add more physical storage and increase the datastore.

          See “Increase VMFS Datastores,” on page 112.


Turn off vCenter Server Storage Filters
          When you perform VMFS datastore management operations, vCenter Server uses default storage filters. The
          filters help you to avoid storage corruption by retrieving only the storage devices, or LUNs, that can be used
          for a particular operation. Unsuitable LUNs are not displayed for selection. You can turn off the filters to view
          all LUNs.

          Before making any changes to the LUN filters, consult with the VMware support team. You can turn off the
          filters only if you have other methods to prevent LUN corruption.

          Procedure

          1    In the vSphere Client, select Administration > vCenter Server Settings.

          2    In the settings list, select Advanced Settings.

          3    In the Key text box, type a key.

               Key                                   Filter Name
               config.vpxd.filter.vmfsFilter         VMFS Filter
               config.vpxd.filter.rdmFilter          RDM Filter
               config.vpxd.filter.SameHostAndTra     Same Host and Transports Filter
               nsportsFilter
               config.vpxd.filter.hostRescanFilter   Host Rescan Filter
                                                     NOTE If you turn off the Host Rescan Filter, your hosts continue to perform
                                                     a rescan each time you present a new LUN to a host or a cluster.


          4    In the Value text box, type False for the specified key.

          5    Click Add.

          6    Click OK.

               You are not required to restart the vCenter Server system.




VMware, Inc.                                                                                                                127
ESX Configuration Guide




      vCenter Server Storage Filtering
          vCenter Server provides storage filters to help you avoid storage device corruption or performance degradation
          that can be caused by an unsupported use of LUNs. These filters are available by default.

Table 9-2. Storage Filters
Filter Name               Description                                                Key

VMFS Filter               Filters out storage devices, or LUNs, that are already     config.vpxd.filter.vmfsFilter
                          used by a VMFS datastore on any host managed by
                          vCenter Server. The LUNs do not show up as
                          candidates to be formatted with another VMFS
                          datastore or to be used as an RDM.

RDM Filter                Filters out LUNs that are already referenced by an         config.vpxd.filter.rdmFilter
                          RDM on any host managed by vCenter Server. The
                          LUNs do not show up as candidates to be formatted
                          with VMFS or to be used by a different RDM.
                          If you need virtual machines to access the same LUN,
                          the virtual machines must share the same RDM
                          mapping file. For information about this type of
                          configuration, see Setup for Failover Clustering and
                          Microsoft Cluster Service.

Same Host and             Filters out LUNs ineligible for use as VMFS datastore      config.vpxd.filter.SameHostAndTransportsFilter
Transports Filter         extents because of host or storage type incompatibility.
                          Prevents you from adding the following LUNs as
                          extents:
                          n LUNs not exposed to all hosts that share the
                               original VMFS datastore.
                          n LUNs that use a storage type different from the
                               one the original VMFS datastore uses. For
                               example, you cannot add a Fibre Channel extent
                               to a VMFS datastore on a local storage device.

Host Rescan Filter        Automatically rescans and updates VMFS datastores          config.vpxd.filter.hostRescanFilter
                          after you perform datastore management operations.
                          The filter helps provide a consistent view of all VMFS
                          datastores on all hosts managed by vCenter Server.
                          NOTE If you present a new LUN to a host or a cluster,
                          the hosts automatically perform a rescan no matter
                          whether you have the Host Rescan Filter on or off.




128                                                                                                                        VMware, Inc.
Raw Device Mapping                                                                                    10
          Raw device mapping (RDM) provides a mechanism for a virtual machine to have direct access to a LUN on
          the physical storage subsystem (Fibre Channel or iSCSI only).

          The following topics contain information about RDMs and provide instructions on how to create and manage
          RDMs.

          This chapter includes the following topics:
          n    “About Raw Device Mapping,” on page 129
          n    “Raw Device Mapping Characteristics,” on page 132
          n    “Managing Mapped LUNs,” on page 134


About Raw Device Mapping
          RDM is a mapping file in a separate VMFS volume that acts as a proxy for a raw physical storage device. The
          RDM allows a virtual machine to directly access and use the storage device. The RDM contains metadata for
          managing and redirecting disk access to the physical device.

          The file gives you some of the advantages of direct access to a physical device while keeping some advantages
          of a virtual disk in VMFS. As a result, it merges VMFS manageability with raw device access.

          RDMs can be described in terms such as mapping a raw device into a datastore, mapping a system LUN, or
          mapping a disk file to a physical disk volume. All these terms refer to RDMs.
          Figure 10-1. Raw Device Mapping

                                        Virtual
                                       machine



                               opens                reads,
                                                      writes

                VMFS volume


                                       address
                mapping file                            mapped device
                                       resolution




          Although VMware recommends that you use VMFS datastores for most virtual disk storage, on certain
          occasions, you might need to use raw LUNs or logical disks located in a SAN.




VMware, Inc.                                                                                                        129
ESX Configuration Guide




          For example, you need to use raw LUNs with RDMs in the following situations:
          n    When SAN snapshot or other layered applications are run in the virtual machine. The RDM better enables
               scalable backup offloading systems by using features inherent to the SAN.
          n    In any MSCS clustering scenario that spans physical hosts — virtual-to-virtual clusters as well as physical-
               to-virtual clusters. In this case, cluster data and quorum disks should be configured as RDMs rather than
               as files on a shared VMFS.

          Think of an RDM as a symbolic link from a VMFS volume to a raw LUN. The mapping makes LUNs appear
          as files in a VMFS volume. The RDM, not the raw LUN, is referenced in the virtual machine configuration. The
          RDM contains a reference to the raw LUN.

          Using RDMs, you can:
          n    Use vMotion to migrate virtual machines using raw LUNs.
          n    Add raw LUNs to virtual machines using the vSphere Client.
          n    Use file system features such as distributed file locking, permissions, and naming.

          Two compatibility modes are available for RDMs:
          n    Virtual compatibility mode allows an RDM to act exactly like a virtual disk file, including the use of
               snapshots.
          n    Physical compatibility mode allows direct access of the SCSI device for those applications that need lower
               level control.


      Benefits of Raw Device Mapping
          An RDM provides a number of benefits, but it should not be used in every situation. In general, virtual disk
          files are preferable to RDMs for manageability. However, when you need raw devices, you must use the RDM.

          RDM offers several benefits.

          User-Friendly Persistent       Provides a user-friendly name for a mapped device. When you use an RDM,
          Names                          you do not need to refer to the device by its device name. You refer to it by the
                                         name of the mapping file, for example:
                                         /vmfs/volumes/myVolume/myVMDirectory/myRawDisk.vmdk

          Dynamic Name                   Stores unique identification information for each mapped device. VMFS
          Resolution                     associates each RDM with its current SCSI device, regardless of changes in the
                                         physical configuration of the server because of adapter hardware changes, path
                                         changes, device relocation, and so on.

          Distributed File Locking       Makes it possible to use VMFS distributed locking for raw SCSI devices.
                                         Distributed locking on an RDM makes it safe to use a shared raw LUN without
                                         losing data when two virtual machines on different servers try to access the
                                         same LUN.

          File Permissions               Makes file permissions possible. The permissions of the mapping file are
                                         enforced at file-open time to protect the mapped volume.

          File System Operations         Makes it possible to use file system utilities to work with a mapped volume,
                                         using the mapping file as a proxy. Most operations that are valid for an ordinary
                                         file can be applied to the mapping file and are redirected to operate on the
                                         mapped device.

          Snapshots                      Makes it possible to use virtual machine snapshots on a mapped volume.
                                         Snapshots are not available when the RDM is used in physical compatibility
                                         mode.




130                                                                                                             VMware, Inc.
Chapter 10 Raw Device Mapping




          vMotion                      Lets you migrate a virtual machine with vMotion. The mapping file acts as a
                                       proxy to allow vCenter Server to migrate the virtual machine by using the same
                                       mechanism that exists for migrating virtual disk files.
                                       Figure 10-2. vMotion of a Virtual Machine Using Raw Device Mapping



                                         Host 1                        Host 2




                                                     VMotion
                                          VM1                          VM2




                                                   VMFS volume


                                                    mapping file



                                                          address
                                                          resolution



                                                  mapped device




          SAN Management               Makes it possible to run some SAN management agents inside a virtual
          Agents                       machine. Similarly, any software that needs to access a device by using
                                       hardware-specific SCSI commands can be run in a virtual machine. This kind
                                       of software is called SCSI target-based software. When you use SAN
                                       management agents, select a physical compatibility mode for the RDM.

          N-Port ID Virtualization     Makes it possible to use the NPIV technology that allows a single Fibre Channel
          (NPIV)                       HBA port to register with the Fibre Channel fabric using several worldwide
                                       port names (WWPNs). This ability makes the HBA port appear as multiple
                                       virtual ports, each having its own ID and virtual port name. Virtual machines
                                       can then claim each of these virtual ports and use them for all RDM traffic.

                                       NOTE You can use NPIV only for virtual machines with RDM disks.


          VMware works with vendors of storage management software to ensure that their software functions correctly
          in environments that include ESX. Some applications of this kind are:
          n    SAN management software
          n    Storage resource management (SRM) software
          n    Snapshot software
          n    Replication software

          Such software uses a physical compatibility mode for RDMs so that the software can access SCSI devices
          directly.




VMware, Inc.                                                                                                         131
ESX Configuration Guide




          Various management products are best run centrally (not on the ESX machine), while others run well on the
          service console or on the virtual machines. VMware does not certify these applications or provide a
          compatibility matrix. To find out whether a SAN management application is supported in an ESX environment,
          contact the SAN management software provider.


      Limitations of Raw Device Mapping
          Certain limitations exist when you use RDMs.
          n    Not available for block devices or certain RAID devices – RDM uses a SCSI serial number to identify the
               mapped device. Because block devices and some direct-attach RAID devices do not export serial numbers,
               they cannot be used with RDMs.
          n    Available with VMFS-2 and VMFS-3 volumes only – RDM requires the VMFS-2 or VMFS-3 format. In
               ESX, the VMFS-2 file system is read only. Upgrade it to VMFS-3 to use the files that VMFS-2 stores.
          n    No snapshots in physical compatibility mode – If you are using an RDM in physical compatibility mode,
               you cannot use a snapshot with the disk. Physical compatibility mode allows the virtual machine to
               manage its own snapshot or mirroring operations.

               Snapshots are available in virtual mode.
          n    No partition mapping – RDM requires the mapped device to be a whole LUN. Mapping to a partition is
               not supported.


Raw Device Mapping Characteristics
          An RDM is a special mapping file in a VMFS volume that manages metadata for its mapped device. The
          mapping file is presented to the management software as an ordinary disk file, available for the usual file-
          system operations. To the virtual machine, the storage virtualization layer presents the mapped device as a
          virtual SCSI device.

          Key contents of the metadata in the mapping file include the location of the mapped device (name resolution),
          the locking state of the mapped device, permissions, and so on.


      RDM Virtual and Physical Compatibility Modes
          You can use RDMs in virtual compatibility or physical compatibility modes. Virtual mode specifies full
          virtualization of the mapped device. Physical mode specifies minimal SCSI virtualization of the mapped
          device, allowing the greatest flexibility for SAN management software.

          In virtual mode, the VMkernel sends only READ and WRITE to the mapped device. The mapped device
          appears to the guest operating system exactly the same as a virtual disk file in a VMFS volume. The real
          hardware characteristics are hidden. If you are using a raw disk in virtual mode, you can realize the benefits
          of VMFS such as advanced file locking for data protection and snapshots for streamlining development
          processes. Virtual mode is also more portable across storage hardware than physical mode, presenting the
          same behavior as a virtual disk file.

          In physical mode, the VMkernel passes all SCSI commands to the device, with one exception: the REPORT
          LUNs command is virtualized so that the VMkernel can isolate the LUN to the owning virtual machine.
          Otherwise, all physical characteristics of the underlying hardware are exposed. Physical mode is useful to run
          SAN management agents or other SCSI target-based software in the virtual machine. Physical mode also allows
          virtual-to-physical clustering for cost-effective high availability.




132                                                                                                           VMware, Inc.
Chapter 10 Raw Device Mapping




   Dynamic Name Resolution
          The RDM file supports dynamic name resolution when a path to a raw device changes.

          VMFS uniquely identifies all mapped storage devices, and the identification is stored in its internal data
          structures. Any change in the path to a raw device, such as a Fibre Channel switch failure or the addition of a
          new HBA, can change the device name. Dynamic name resolution resolves these changes and automatically
          associates the original device with its new name.


   Raw Device Mapping with Virtual Machine Clusters
          Use an RDM with virtual machine clusters that need to access the same raw LUN for failover scenarios. The
          setup is similar to that of a virtual machine cluster that accesses the same virtual disk file, but an RDM replaces
          the virtual disk file.
          Figure 10-3. Access from Clustered Virtual Machines



               Host 3                     Host 4




                VM3                        VM4

                        “shared” access




                                              address
                         mapping file                            mapped
                                             resolutiion         device
                        VMFS volume



   Comparing Available SCSI Device Access Modes
          The ways of accessing a SCSI-based storage device include a virtual disk file on a VMFS datastore, virtual mode
          RDM, and physical mode RDM.

          To help you choose among the available access modes for SCSI devices, Table 10-1 provides a quick comparison
          of features available with the different modes.

          Table 10-1. Features Available with Virtual Disks and Raw Device Mappings
          ESX Features                       Virtual Disk File        Virtual Mode RDM         Physical Mode RDM

          SCSI Commands Passed               No                       No                       Yes
          Through                                                                              REPORT LUNs is not passed
                                                                                               through

          vCenter Server Support             Yes                      Yes                      Yes

          Snapshots                          Yes                      Yes                      No

          Distributed Locking                Yes                      Yes                      Yes

          Clustering                         Cluster-in-a-box only    Cluster-in-a-box and     Physical to Virtual Clustering
                                                                      cluster-across-boxes

          SCSI Target-Based Software         No                       No                       Yes




VMware, Inc.                                                                                                              133
ESX Configuration Guide




          VMware recommends that you use virtual disk files for the cluster-in-a-box type of clustering. If you plan to
          reconfigure your cluster-in-a-box clusters as cluster-across-boxes clusters, use virtual mode RDMs for the
          cluster-in-a-box clusters.


Managing Mapped LUNs
          You can use the vSphere Client to map a SAN LUN to a datastore and manage paths to your mapped LUN.

          Additional tools available to manage mapped LUNs and their RDMs include the vmkfstools utility and other
          commands used with the vSphere CLI. You can use the vmkfstools utility to perform many of the same
          operations available through the vSphere Client.

          You can also use common file system commands in the service console.


      Create Virtual Machines with RDMs
          When you give your virtual machine direct access to a raw SAN LUN, you create a mapping file (RDM) that
          resides on a VMFS datastore and points to the LUN. Although the mapping file has the same.vmdk extension
          as a regular virtual disk file, the RDM file contains only mapping information. The actual virtual disk data is
          stored directly on the LUN.

          You can create the RDM as an initial disk for a new virtual machine or add it to an existing virtual machine.
          When creating the RDM, you specify the LUN to be mapped and the datastore on which to put the RDM.

          Procedure

          1    Follow all steps required to create a custom virtual machine.

          2    In the Select a Disk page, select Raw Device Mapping, and click Next.

          3    From the list of SAN disks or LUNs, select a raw LUN for your virtual machine to access directly.

          4    Select a datastore for the RDM mapping file.

               You can place the RDM file on the same datastore where your virtual machine configuration file resides,
               or select a different datastore.

               NOTE To use vMotion for virtual machines with enabled NPIV, make sure that the RDM files of the virtual
               machines are located on the same datastore. You cannot perform Storage vMotion or vMotion between
               datastores when NPIV is enabled.

          5    Select a compatibility mode.

               Option                               Description
               Physical                             Allows the guest operating system to access the hardware directly. Physical
                                                    compatibility is useful if you are using SAN-aware applications on the virtual
                                                    machine. However, powered on virtual machines that use RDMs configured
                                                    for physical compatibility cannot be migrated if the migration involves
                                                    copying the disk. Such virtual machines cannot be cloned or cloned to a
                                                    template either.
               Virtual                              Allows the RDM to behave as if it were a virtual disk, so you can use such
                                                    features as snapshotting, cloning, and so on.


          6    Select a virtual device node.




134                                                                                                                   VMware, Inc.
Chapter 10 Raw Device Mapping




          7    If you select Independent mode, choose one of the following.

               Option                               Description
               Persistent                           Changes are immediately and permanently written to the disk.
               Nonpersistent                        Changes to the disk are discarded when you power off or revert to the
                                                    snapshot.


          8    Click Next.

          9    In the Ready to Complete New Virtual Machine page, review your selections.

          10   Click Finish to complete your virtual machine.


   Manage Paths for a Mapped Raw LUN
          You can manage paths for mapped raw LUNs.

          Procedure

          1    Log in as administrator or as the owner of the virtual machine to which the mapped disk belongs.

          2    Select the virtual machine from the Inventory panel.

          3    On the Summary tab, click Edit Settings.

          4    On the Hardware tab, select Hard Disk, then click Manage Paths.

          5    Use the Manage Paths dialog box to enable or disable your paths, set multipathing policy, and specify the
               preferred path.

               For information on managing paths, see “Using Multipathing with ESX,” on page 115.




VMware, Inc.                                                                                                                135
ESX Configuration Guide




136                       VMware, Inc.
Security




VMware, Inc.              137
ESX Configuration Guide




138                       VMware, Inc.
Security for ESX Systems                                                                               11
          ESX is developed with a focus on strong security. VMware ensures security in the ESX environment and
          addresses system architecture from a security standpoint.

          This chapter includes the following topics:
          n      “ESX Architecture and Security Features,” on page 139
          n      “Security Resources and Information,” on page 147


ESX Architecture and Security Features
          The components and the overall architecture of ESX are designed to ensure security of the ESX system as a
          whole.

          From a security perspective, ESX consists of four major components: the virtualization layer, the virtual
          machines, the service console, and the virtual networking layer.

          Figure 11-1 provides an overview of these components.
          Figure 11-1. ESX Architecture
                                                ESX

                  virtual          virtual         virtual       virtual
                                                                                 service console




                 machine          machine         machine       machine




               VMware
               Virtualization
               Layer (VMkernel)    Virtual
                                   Networking
                                   Layer



               CPU      memory               hardware network          storage
                                                 adapter




VMware, Inc.                                                                                                          139
ESX Configuration Guide




      Security and the Virtualization Layer
          VMware designed the virtualization layer, or VMkernel, to run virtual machines. It controls the hardware that
          hosts use and schedules the allocation of hardware resources among the virtual machines. Because the
          VMkernel is fully dedicated to supporting virtual machines and is not used for other purposes, the interface
          to the VMkernel is strictly limited to the API required to manage virtual machines.

          ESX provides additional VMkernel protection with the following features:

          Memory Hardening               The ESX kernel, user-mode applications, and executable components such as
                                         drivers and libraries are located at random, non-predictable memory
                                         addresses. Combined with the non-executable memory protections made
                                         available by microprocessors, this provides protection that makes it difficult
                                         for malicious code to use memory exploits to take advantage of vulnerabilities.

          Kernel Module Integrity        Digital signing ensures the integrity and authenticity of modules, drivers and
                                         applications as they are loaded by the VMkernel. Module signing allows ESX
                                         to identify the providers of modules, drivers, or applications and whether they
                                         are VMware-certified.


      Security and Virtual Machines
          Virtual machines are the containers in which applications and guest operating systems run. By design, all
          VMware virtual machines are isolated from one another. This isolation enables multiple virtual machines to
          run securely while sharing hardware and ensures both their ability to access hardware and their uninterrupted
          performance.

          Even a user with system administrator privileges on a virtual machine’s guest operating system cannot breach
          this layer of isolation to access another virtual machine without privileges explicitly granted by the ESX system
          administrator. As a result of virtual machine isolation, if a guest operating system running in a virtual machine
          fails, other virtual machines on the same host continue to run. The guest operating system failure has no effect
          on:
          n    The ability of users to access the other virtual machines
          n    The ability of the operational virtual machines to access the resources they need
          n    The performance of the other virtual machines

          Each virtual machine is isolated from other virtual machines running on the same hardware. Although virtual
          machines share physical resources such as CPU, memory, and I/O devices, a guest operating system on an
          individual virtual machine cannot detect any device other than the virtual devices made available to it, as
          shown in Figure 11-2.




140                                                                                                             VMware, Inc.
Chapter 11 Security for ESX Systems




          Figure 11-2. Virtual Machine Isolation
                                       Virtual Machine

                  app          app          app          app          app


                                      Operating System

                                Virtual Machine Resources



                 CPU           memory             disk         network and
                                                               video cards


                 SCSI           mouse           CD/DVD          keyboard
               controller


          Because the VMkernel mediates the physical resources and all physical hardware access takes place through
          the VMkernel, virtual machines cannot circumvent this level of isolation.

          Just as a physical machine communicates with other machines in a network through a network card, a virtual
          machine communicates with other virtual machines running in the same host through a virtual switch. Further,
          a virtual machine communicates with the physical network, including virtual machines on other ESX hosts,
          through a physical network adapter, as shown in Figure 11-3.
          Figure 11-3. Virtual Networking Through Virtual Switches
                                            ESX

                        Virtual Machine             Virtual Machine

                     virtual                       virtual
                     network                       network
                     adapter                       adapter

                VMkernel



                         Virtual                    Virtual Switch
                         Networking                 links virtual
                         Layer                      machines together


                                                  Hardware Network Adapter
                                                  links virtual machines to
                                                  the physical network
                                      Physical Network

          These characteristics apply to virtual machine isolation in a network context:
          n       If a virtual machine does not share a virtual switch with any other virtual machine, it is completely isolated
                  from virtual networks within the host.
          n       If no physical network adapter is configured for a virtual machine, the virtual machine is completely
                  isolated from any physical networks.
          n       If you use the same safeguards (firewalls, antivirus software, and so forth) to protect a virtual machine
                  from the network as you would for a physical machine, the virtual machine is as secure as the physical
                  machine.




VMware, Inc.                                                                                                                   141
ESX Configuration Guide




          You can further protect virtual machines by setting up resource reservations and limits on the host. For
          example, through the detailed resource controls available in ESX, you can configure a virtual machine so that
          it always receives at least 10 percent of the host’s CPU resources, but never more than 20 percent.

          Resource reservations and limits protect virtual machines from performance degradation that would result if
          another virtual machine consumed excessive shared hardware resources. For example, if one of the virtual
          machines on a host is incapacitated by a denial-of-service (DoS) attack, a resource limit on that machine
          prevents the attack from taking up so much of the hardware resources that the other virtual machines are also
          affected. Similarly, a resource reservation on each of the virtual machines ensures that, in the event of high
          resource demands by the virtual machine targeted by the DoS attack, all the other virtual machines still have
          enough resources to operate.

          By default, ESX imposes a form of resource reservation by applying a distribution algorithm that divides the
          available host resources equally among the virtual machines while keeping a certain percentage of resources
          for use by other system components. This default behavior provides a degree of natural protection from DoS
          and distributed denial-of-service (DDoS) attacks. You set specific resource reservations and limits on an
          individual basis to customize the default behavior so that the distribution is not equal across the virtual machine
          configuration.


      Security and the Virtual Networking Layer
          The virtual networking layer includes virtual network adapters and virtual switches. ESX relies on the virtual
          networking layer to support communications between virtual machines and their users. In addition, hosts use
          the virtual networking layer to communicate with iSCSI SANs, NAS storage, and so forth.

          The methods you use to secure a virtual machine network depend on which guest operating system is installed,
          whether the virtual machines operate in a trusted environment, and a variety of other factors. Virtual switches
          provide a substantial degree of protection when used with other common security practices, such as installing
          firewalls.

          ESX also supports IEEE 802.1q VLANs, which you can use to further protect the virtual machine network,
          service console, or storage configuration. VLANs let you segment a physical network so that two machines on
          the same physical network cannot send packets to or receive packets from each other unless they are on the
          same VLAN.

          Creating a Network DMZ on a Single ESX Host
          One example of how to use ESX isolation and virtual networking features to configure a secure environment
          is the creation of a network demilitarized zone (DMZ) on a single host.

          Figure 11-4 shows the configuration.




142                                                                                                               VMware, Inc.
Chapter 11 Security for ESX Systems




          Figure 11-4. DMZ Configured on a Single ESX Host

                                                     ESX

                 Virtual Machine 1     Virtual Machine 2      Virtual Machine 3    Virtual Machine 4

                  firewall server           web server        application server      firewall server




                         virtual switch 1                  virtual switch 2             virtual switch 3


                           hardware network                                               hardware network
                           adapter 1                                                      adapter 2

               External Network                                                Internal Network

          In this example, four virtual machines are configured to create a virtual DMZ on Virtual Switch 2:
          n      Virtual Machine 1 and Virtual Machine 4 run firewalls and are connected to virtual adapters through
                 virtual switches. Both of these virtual machines are multi homed.
          n      Virtual Machine 2 runs a Web server, and Virtual Machine 3 runs as an application server. Both of these
                 virtual machines are single-homed.

          The Web server and application server occupy the DMZ between the two firewalls. The conduit between these
          elements is Virtual Switch 2, which connects the firewalls with the servers. This switch has no direct connection
          with any elements outside the DMZ and is isolated from external traffic by the two firewalls.

          From an operational viewpoint, external traffic from the Internet enters Virtual Machine 1 through Hardware
          Network Adapter 1 (routed by Virtual Switch 1) and is verified by the firewall installed on this machine. If the
          firewall authorizes the traffic, it is routed to the virtual switch in the DMZ, Virtual Switch 2. Because the Web
          server and application server are also connected to this switch, they can serve external requests.

          Virtual Switch 2 is also connected to Virtual Machine 4. This virtual machine provides a firewall between the
          DMZ and the internal corporate network. This firewall filters packets from the Web server and application
          server. If a packet is verified, it is routed to Hardware Network Adapter 2 through Virtual Switch 3. Hardware
          Network Adapter 2 is connected to the internal corporate network.

          When creating a DMZ on a single host, you can use fairly lightweight firewalls. Although a virtual machine
          in this configuration cannot exert direct control over another virtual machine or access its memory, all the
          virtual machines are still connected through a virtual network. This network could be used for virus
          propagation or targeted for other types of attacks. The security of the virtual machines in the DMZ is equivalent
          to separate physical machines connected to the same network.




VMware, Inc.                                                                                                                           143
ESX Configuration Guide




          Creating Multiple Networks Within a Single ESX Host
          The ESX system is designed so that you can connect some groups of virtual machines to the internal network,
          others to the external network, and still others to both—all on the same host. This capability is an outgrowth
          of basic virtual machine isolation coupled with a well-planned use of virtual networking features.
          Figure 11-5. External Networks, Internal Networks, and a DMZ Configured on a Single ESX Host

                                                         ESX

                External Network                Internal Network              DMZ

                                                           VM 2


                                                          internal
                                                            user

                                                           VM 3                     VM 6



                                                          internal                firewall
                                                            user                   server

                                                           VM 4                     VM 7


                                                          internal                   Web
                                                            user                    server

                              VM 1                         VM 5                     VM 8



                              FTP                         internal                firewall
                             server                         user                   server


                          physical network
                             adapters


               External                       Internal          External    Internal
              Network 1                      Network 2         Network 2   Network 1

          In Figure 11-5 the system administrator configured a host into three distinct virtual machine zones: FTP server,
          internal virtual machines, and DMZ. Each zone serves a unique function.

          FTP server                            Virtual Machine 1 is configured with FTP software and acts as a holding area
                                                for data sent to and from outside resources such as forms and collateral
                                                localized by a vendor.
                                                This virtual machine is associated with an external network only. It has its own
                                                virtual switch and physical network adapter that connect it to External
                                                Network 1. This network is dedicated to servers that the company uses to
                                                receive data from outside sources. For example, the company uses External
                                                Network 1 to receive FTP traffic from vendors and allow vendors access to data
                                                stored on externally available servers though FTP. In addition to servicing
                                                Virtual Machine 1, External Network 1 services FTP servers configured on
                                                different ESX hosts throughout the site.




144                                                                                                                   VMware, Inc.
Chapter 11 Security for ESX Systems




                                         Because Virtual Machine 1 does not share a virtual switch or physical network
                                         adapter with any virtual machines in the host, the other resident virtual
                                         machines cannot transmit packets to or receive packets from the Virtual
                                         Machine 1 network. This restriction prevents sniffing attacks, which require
                                         sending network traffic to the victim. More importantly, an attacker cannot use
                                         the natural vulnerability of FTP to access any of the host’s other virtual
                                         machines.

          Internal virtual machines      Virtual Machines 2 through 5 are reserved for internal use. These virtual
                                         machines process and store company-private data such as medical records,
                                         legal settlements, and fraud investigations. As a result, the system
                                         administrators must ensure the highest level of protection for these virtual
                                         machines.
                                         These virtual machines connect to Internal Network 2 through their own virtual
                                         switch and network adapter. Internal Network 2 is reserved for internal use by
                                         personnel such as claims processors, in-house lawyers, or adjustors.
                                         Virtual Machines 2 through 5 can communicate with one another through the
                                         virtual switch and with internal virtual machines elsewhere on Internal
                                         Network 2 through the physical network adapter. They cannot communicate
                                         with externally facing machines. As with the FTP server, these virtual machines
                                         cannot send packets to or receive packets from the other virtual machines’
                                         networks. Similarly, the host’s other virtual machines cannot send packets to
                                         or receive packets from Virtual Machines 2 through 5.

          DMZ                            Virtual Machines 6 through 8 are configured as a DMZ that the marketing
                                         group uses to publish the company’s external Web site.
                                         This group of virtual machines is associated with External Network 2 and
                                         Internal Network 1. The company uses External Network 2 to support the Web
                                         servers that use the marketing and financial department to host the corporate
                                         Web site and other Web facilities that it hosts to outside users. Internal Network
                                         1 is the conduit that the marketing department uses to publish content to the
                                         corporate Web site, post downloads, and maintain services like user forums.
                                         Because these networks are separate from External Network 1 and Internal
                                         Network 2, and the virtual machines have no shared points of contact (switches
                                         or adapters), there is no risk of attack to or from the FTP server or the internal
                                         virtual machine group.

          By capitalizing on virtual machine isolation, correctly configuring virtual switches, and maintaining network
          separation, the system administrator can house all three virtual machine zones in the same ESX host and be
          confident that there will be no data or resource breaches.

          The company enforces isolation among the virtual machine groups by using multiple internal and external
          networks and making sure that the virtual switches and physical network adapters for each group are
          completely separate from those of other groups.

          Because none of the virtual switches straddle virtual machine zones, the system administrator succeeds in
          eliminating the risk of packet leakage from one zone to another. A virtual switch, by design, cannot leak packets
          directly to another virtual switch. The only way for packets to travel from one virtual switch to another is under
          the following circumstances:
          n    The virtual switches are connected to the same physical LAN.
          n    The virtual switches connect to a common virtual machine, which could be used to transmit packets.

          Neither of these conditions occur in the sample configuration. If system administrators want to verify that no
          common virtual switch paths exist, they can check for possible shared points of contact by reviewing the
          network switch layout in the vSphere Client or vSphere Web Access.



VMware, Inc.                                                                                                                145
ESX Configuration Guide




          To safeguard the virtual machines’ resources, the system administrator lowers the risk of DoS and DDoS attacks
          by configuring a resource reservation and a limit for each virtual machine. The system administrator further
          protects the ESX host and virtual machines by installing software firewalls at the front and back ends of the
          DMZ, ensuring that the host is behind a physical firewall, and configuring the service console and networked
          storage resources so that each has its own virtual switch.


      Security and the Service Console
          The ESX service console is a limited distribution of Linux based on Red Hat Enterprise Linux 5 (RHEL5). The
          service console provides an execution environment to monitor and administer the entire ESX host.

          If the service console is compromised in certain ways, the virtual machines it interacts with might also be
          compromised. To minimize the risk of an attack through the service console, VMware protects the service
          console with a firewall.

          In addition to implementing the service console firewall, VMware mitigates risks to the service console using
          other methods.
          n    ESX runs only services essential to managing its functions, and the distribution is limited to the features
               required to run ESX.
          n    By default, ESX is installed with a high-security setting. All outbound ports are closed, and the only
               inbound ports that are open are those required for interactions with clients such as the vSphere Client.
               Keep this security setting, unless the service console is connected to a trusted network.
          n    By default, all ports not specifically required for management access to the service console are closed. You
               must specifically open ports if you need additional services.
          n    By default, weak ciphers are disabled and all communications from clients are secured by SSL. The exact
               algorithms used for securing the channel depend on the SSL handshake. Default certificates created on
               ESX use SHA-1 with RSA encryption as the signature algorithm.
          n    The Tomcat Web service, used internally by ESX to support access to the service console by Web clients
               like vSphere Web Access, has been modified to run only those functions required for administration and
               monitoring by a Web client. As a result, ESX is not vulnerable to the Tomcat security issues reported in
               broader use.
          n    VMware monitors all security alerts that could affect service console security and, if needed, issues a
               security patch, as it would for any other security vulnerability that could affect ESX hosts. VMware
               provides security patches for RHEL 5 and later as they become available.
          n    Insecure services such as FTP and Telnet are not installed, and the ports for these services are closed by
               default. Because more secure services such as SSH and SFTP are easily available, always avoid using these
               insecure services in favor of their safer alternatives. If you must use insecure services and have
               implemented sufficient protection for the service console, you must explicitly open ports to support them.
          n    The number of applications that use a setuid or setgid flag is minimized. You can disable any setuid or
               setgid application that is optional to ESX operation.

          Although you can install and run certain types of programs designed for RHEL 5 in the service console, this
          use is not supported unless VMware explicitly states that it is. If a security vulnerability is discovered in a
          supported configuration, VMware proactively notifies all customers with valid support and subscription
          contracts and provides all necessary patches.

          NOTE Follow only VMware security advisories, found at http://www.vmware.com/security/. Do not follow
          security advisories issued by Red Hat.




146                                                                                                             VMware, Inc.
Chapter 11 Security for ESX Systems




Security Resources and Information
          You can find additional information about security on the VMware Web site.

          Table 11-1 lists security topics and the location of additional information about these topics.

          Table 11-1. VMware Security Resources on the Web
          Topic                                                 Resource

          VMware security policy, up-to-date security           http://www.vmware.com/security/
          alerts, security downloads, and focus
          discussions of security topics

          Corporate security response policy                    http://www.vmware.com/support/policies/security_response.html
                                                                VMware is committed to helping you maintain a secure environment.
                                                                Security issues are corrected in a timely manner. The VMware Security
                                                                Response Policy states our commitment to resolve possible
                                                                vulnerabilities in our products.

          Third-party software support policy                   http://www.vmware.com/support/policies/
                                                                VMware supports a variety of storage systems, software agents such as
                                                                backup agents, system management agents, and so forth. You can find
                                                                lists of agents, tools, and other software that supports ESX by searching
                                                                http://www.vmware.com/vmtn/resources/ for ESX compatibility guides.
                                                                The industry offers more products and configurations than VMware can
                                                                test. If VMware does not list a product or configuration in a compatibility
                                                                guide, Technical Support will attempt to help you with any problems,
                                                                but cannot guarantee that the product or configuration can be used.
                                                                Always evaluate security risks for unsupported products or
                                                                configurations carefully.

          Certification of VMware products                      http://www.vmware.com/security/certifications/

          General information about virtualization and          VMware Virtual Security Technical Resource Center
          security                                              http://www.vmware.com/go/security/

          Compliance and security standards, as well as         http://www.vmware.com/go/compliance/
          partner solutions and in-depth content about
          virtualization and compliance

          Information about VMsafe technology for               http://www.vmware.com/go/vmsafe/
          protection of virtual machines, including a list of
          partner solutions




VMware, Inc.                                                                                                                           147
ESX Configuration Guide




148                       VMware, Inc.
Securing an ESX Configuration                                                                            12
          You can take measures to promote a secure environment for your ESX hosts, virtual machines, and iSCSI SANs.
          Consider network configuration planning from a security perspective and the steps that you can take to protect
          the components in your configuration from attack.

          This chapter includes the following topics:
          n    “Securing the Network with Firewalls,” on page 149
          n    “Securing Virtual Machines with VLANs,” on page 158
          n    “Securing Virtual Switch Ports,” on page 163
          n    “Internet Protocol Security,” on page 165
          n    “Securing iSCSI Storage,” on page 168


Securing the Network with Firewalls
          Security administrators use firewalls to safeguard the network or selected components in the network from
          intrusion.

          Firewalls control access to devices within their perimeter by closing all communication pathways, except for
          those that the administrator explicitly or implicitly designates as authorized. The pathways, or ports, that
          administrators open in the firewall allow traffic between devices on different sides of the firewall.

          In a virtual machine environment, you can plan your layout for firewalls between components.
          n    Physical machines such as vCenter Server hosts and ESX hosts.
          n    One virtual machine and another—for example, between a virtual machine acting as an external Web
               server and a virtual machine connected to your company’s internal network.
          n    A physical machine and a virtual machine, such as when you place a firewall between a physical network
               adapter card and a virtual machine.

          How you use firewalls in an ESX configuration is based on how you plan to use the network and how secure
          any given component needs to be. For example, if you create a virtual network where each virtual machine is
          dedicated to running a different benchmark test suite for the same department, the risk of unwanted access
          from one virtual machine to the next is minimal. Therefore, a configuration where firewalls are present between
          the virtual machines is not necessary. However, to prevent interruption of a test run from an outside host, you
          might set up the configuration so that a firewall is present at the entry point of the virtual network to protect
          the entire set of virtual machines.




VMware, Inc.                                                                                                           149
ESX Configuration Guide




      Firewalls for Configurations with vCenter Server
          If you access ESX hosts through vCenter Server, you typically protect vCenter Server using a firewall. This
          firewall provides basic protection for your network.

          A firewall might lie between the clients and vCenter Server. Alternatively, vCenter Server and the clients can
          be behind the firewall, depending on your deployment. The main point is to ensure that a firewall is present
          at what you consider to be an entry point for the system.

          If you use vCenter Server, you can install firewalls at any of the locations shown in Figure 12-1. Depending on
          your configuration, you might not need all the firewalls in the illustration, or you might need firewalls in other
          locations. In addition, your configuration might include optional modules, such as VMware vCenter Update
          Manager, that are not shown. Refer to the documentation for information about firewall setups specific to
          products like Update Manager.

          For a comprehensive list of TCP and UDP ports, including those for VMware vMotion™ and VMware Fault
          Tolerance, see “TCP and UDP Ports for Management Access,” on page 157.
          Figure 12-1. Sample vSphere Network Configuration and Traffic Flow
                   22     SSH
                  427     SLPv2
                  443     HTTPS                                       third-party network
                  902     xinetd/vmware-authd                          management tool
           902 (UDP)      ESX/ESXi status update
                  903     xinetd/vmware-authd-mks
          2050 - 2250     HA
                 5989     CIM transactions
          8042 - 8045     HA                                                vSphere
                                                                           Web Access

                vSphere
                 Client
                                                    Port 443
                                                     firewall

                                                                vCenter Server




                                                                             Ports 22, 427,
                                                                               443, 902,
                    Ports 427, 443,                                               903
                       902, 903                     Ports 443,
                                                    902, 5989
                                                     firewall                               Port 443
                                       902                                 902
                                     UDP                                     UDP

                                                Ports 443, 902,
                                                 2050-2250,
                                                and 8042-8045
                                                           firewall

                 ESXi                                                                       ESX

                                                                   storage

          Networks configured with vCenter Server can receive communications through several types of clients: the
          vSphere Client, vSphere Web Access, or third-party network management clients that use the SDK to interface
          with the host. During normal operation, vCenter Server listens for data from its managed hosts and clients on
          designated ports. vCenter Server also assumes that its managed hosts listen for data from vCenter Server on
          designated ports. If a firewall is present between any of these elements, you must ensure that the firewall has
          open ports to support data transfer.




150                                                                                                              VMware, Inc.
Chapter 12 Securing an ESX Configuration




          You might also include firewalls at a variety of other access points in the network, depending on how you plan
          to use the network and the level of security various devices require. Select the locations for your firewalls based
          on the security risks that you have identified for your network configuration. The following is a list of firewall
          locations common to ESX implementations. Many of the firewall locations in the list and shown in Figure 12-1
          are optional.
          n    Between your Web browser and the vSphere Web Access HTTP and HTTPS proxy server.
          n    Between the vSphere Client, vSphere Web Access Client, or a third-party network-management client and
               vCenter Server.
          n    If your users access virtual machines through the vSphere Client, between the vSphere Client and the ESX
               host. This connection is in addition to the connection between the vSphere Client and vCenter Server, and
               it requires a different port.
          n    If your users access virtual machines through a Web browser, between the Web browser and the ESX host.
               This connection is in addition to the connection between the vSphere Web Access Client and vCenter
               Server, and it requires different ports.
          n    Between vCenter Server and the ESX hosts.
          n    Between the ESX hosts in your network. Although traffic between hosts is usually considered trusted, you
               can add firewalls between them if you are concerned about security breaches from machine to machine.

               If you add firewalls between ESX hosts and plan to migrate virtual machines between the servers, perform
               cloning, or use vMotion, you must also open ports in any firewall that divides the source host from the
               target hosts so that the source and targets can communicate.
          n    Between the ESX hosts and network storage such as NFS or iSCSI storage. These ports are not specific to
               VMware, and you configure them according to the specifications for your network.


   Firewalls for Configurations Without vCenter Server
          If you connect clients directly to your ESX network instead of using vCenter Server, your firewall configuration
          is somewhat simpler.

          You might install firewalls at any of the locations shown in Figure 12-2.

          NOTE Depending on your configuration, you might not need all the firewalls in the illustration, or you might
          need firewalls in locations not shown.




VMware, Inc.                                                                                                                 151
ESX Configuration Guide




          Figure 12-2. Firewall Configuration for ESX Networks that a Client Manages Directly
                                                       vSphere Web Access
                                 third-party network
               vSphere Client     management tool


                                                                  standard http/     Port 902
                                                                    https ports      Port 903
                                                                            firewall




              Port 902    Port 903                            Port 443
                                      firewall



                                       Ports 902, 2050-2250,
                                         8000, 8042-8045,
                                            8100, 8200
                                                       firewall

                ESXi                                                               ESX

                                                              storage

          Networks configured without vCenter Server receive communications through the same types of clients as
          they do if vCenter Server were present: vSphere Clients, third-party network management clients, or vSphere
          Web Access Clients. For the most part, the firewall needs are the same, but there are several key differences.
          n    As you would for configurations that include vCenter Server, be sure a firewall is present to protect your
               ESX layer or, depending on your configuration, your clients and ESX layer. This firewall provides basic
               protection for your network. The firewall ports you use are the same as those you use if vCenter Server is
               in place.
          n    Licensing in this type of configuration is part of the ESX package that you install on each of the hosts.
               Because licensing is resident to the server, a separate license server is not required. This eliminates the
               need for a firewall between the license server and the ESX network.


      Connecting to vCenter Server Through a Firewall
          The port that vCenter Server uses to listen for data transfer from its clients is 443. If you have a firewall between
          vCenter Server and its clients, you must configure a connection through which vCenter Server can receive data
          from the clients.

          To enable vCenter Server to receive data from the vSphere Client, open port 443 in the firewall to allow data
          transfer from the vSphere Client to vCenter Server. Contact the firewall system administrator for additional
          information on configuring ports in a firewall.

          If you are using the vSphere Client and do not want to use port 443 as the port for vSphere Client-to-vCenter
          Server communication, you can switch to another port by changing the vCenter Server settings in the vSphere
          Client. To learn how to change these settings, see the VMware vSphere Datacenter Administration Guide.




152                                                                                                                VMware, Inc.
Chapter 12 Securing an ESX Configuration




   Connecting to the Virtual Machine Console Through a Firewall
          Whether you connect your client to ESX hosts through vCenter Server or use a direct connection to the host,
          certain ports are required for user and administrator communication with virtual machine consoles. These
          ports support different client functions, interface with different layers on ESX, and use different authentication
          protocols.

          Port 902                       vCenter Server uses this port to send data to vCenter Server managed hosts.
                                         Port 902 is the port that vCenter Server assumes is available when sending data
                                         to an ESX host.
                                         Port 902 connects vCenter Server to the host through the VMware
                                         Authorization Daemon (vmware-authd). This daemon multiplexes port 902 data
                                         to the appropriate recipient for processing. VMware does not support
                                         configuring a different port for this connection.

          Port 443                       The vSphere Client, vSphere Web Access Client, and SDK use this port to send
                                         data to vCenter Server managed hosts. Also, the vSphere Client, vSphere Web
                                         Access Client, and SDK, when connected directly to an ESX host, use this port
                                         to support any management functions related to the server and its virtual
                                         machines. Port 443 is the port that clients assume is available when sending
                                         data to the ESX host. VMware does not support configuring a different port for
                                         these connections.

                                         Port 443 connects clients to the ESX host through the Tomcat Web service or
                                         the SDK. The vmware-hostd multiplexes port 443 data to the appropriate
                                         recipient for processing.

          Port 903                       The vSphere Client and vSphere Web Access use this port to provide a
                                         connection for guest operating system MKS activities on virtual machines. It is
                                         through this port that users interact with the guest operating systems and
                                         applications of the virtual machine. Port 903 is the port that the vSphere Client
                                         and vSphere Web Access assume is available when interacting with virtual
                                         machines. VMware does not support configuring a different port for this
                                         function.

                                         Port 903 connects the vSphere Client to a specified virtual machine configured
                                         on the ESX host.

          Figure 12-3 shows the relationships between vSphere Client functions, ports, and ESX processes.

          The vSphere Web Access Client uses the same basic mapping for its interactions with the ESX host.




VMware, Inc.                                                                                                                153
ESX Configuration Guide




          Figure 12-3. Port Use for vSphere Client Communications with ESX
                                         vSphere Client

                virtual machine
          management functions


                                                                    virtual machine
                                                                    console




                            Port 443           firewall       Port 903



                                                ESX

                             service console                VMkernel

                             vmware-hostd                 virtual machine


                             vmware-authd                   vmkauthd



          If you have a firewall between your vCenter Server system and vCenter Server managed host, open Ports 443
          and 903 in the firewall to allow data transfer to ESX hosts from vCenter Server and ESX hosts directly from the
          vSphere Client and vSphere Web Access.

          For additional information on configuring the ports, see the firewall system administrator.


      Connecting ESX Hosts Through Firewalls
          If you have a firewall between two ESX hosts and you want to allow transactions between the hosts or use
          vCenter Server to perform any source or target activities, such as VMware High Availability (HA) traffic,
          migration, cloning, or vMotion, you must configure a connection through which the managed hosts can receive
          data.

          To configure a connection for receiving data, open ports in the following ranges:
          n    443 (server-to-server migration and provisioning traffic)
          n    2050–2250 (for HA traffic)
          n    8000 (for vMotion)
          n    8042–8045 (for HA traffic)

          Refer to the firewall system administrator for additional information on configuring the ports.


      Configuring Firewall Ports for Supported Services and Management Agents
          You must configure firewalls in your environment to accept commonly supported services.

          Use the vSphere Client to configure the service console firewall. When you configure the ESX host security
          profile in vCenter Server, you add or remove these services or agents, automatically opening or closing
          predetermined ports in the firewall to allow communication with the service or agent.

          The following services and agents are commonly present in a vSphere environment:
          n    NFS client (insecure service)
          n    NTP client



154                                                                                                           VMware, Inc.
Chapter 12 Securing an ESX Configuration




          n    iSCSI software client
          n    CIM HTTP server (insecure service)
          n    CIM HTTPS server
          n    Syslog client
          n    NFS server (insecure service)
          n    NIS client
          n    SMB client (insecure service)
          n    FTP client (insecure service)
          n    SSH client
          n    Telnet client (insecure service)
          n    SSH server
          n    Telnet server (insecure service)
          n    FTP server (insecure service)
          n    SNMP server
          n    Other supported management agents that you install

          NOTE This list can change, so you might find that the vSphere Client provides services and agents not
          mentioned in the list. Also, not all services on the list are installed by default. You might be required to perform
          additional tasks to configure and enable these services.

          If you are installing a device, service, or agent not on this list, open ports in the service console firewall from
          a command line.

          Allow Access to ESX for a Service or Management Agent
          You can configure firewall properties to allow access for a service or management agent.

          Procedure

          1    Log in to a vCenter Server system using the vSphere Client.

          2    Select the host in the inventory panel.
          3    Click the Configuration tab and click Security Profile.

               The vSphere Client displays a list of active incoming and outgoing connections with the corresponding
               firewall ports.

          4    Click Properties to open the Firewall Properties dialog box.

               The Firewall Properties dialog box lists all the services and management agents that you can configure
               for the host.

          5    Select the services and agents to enable.

               The Incoming Ports and Outgoing Ports columns indicate the ports that the vSphere Client opens for the
               service. The Protocol column indicates the protocol that the service uses. The Daemon column indicates
               the status of daemons associated with the service.

          6    Click OK.




VMware, Inc.                                                                                                                  155
ESX Configuration Guide




          Automating Service Behavior Based on Firewall Settings
          ESX can automate whether services start based on the status of firewall ports.

          Automation helps ensure that services start if the environment is configured to enable their function. For
          example, starting a network service only if some ports are open can help avoid the situation where services
          are started, but are unable to complete the communications required to complete their intended purpose.

          In addition, having accurate information about the current time is a requirement for some protocols, such as
          Kerberos. The NTP service is a way of getting accurate time information, but this service only works when
          required ports are opened in the firewall. The service cannot achieve its goal if all ports are closed. The NTP
          services provide an option to configure the conditions when the service starts or stops. This configuration
          includes options that account for whether firewall ports are opened, and then start or stop the NTP service
          based on those conditions. Several possible configuration options exist, all of which are also applicable to the
          SSH server.

          NOTE The settings described in this section only apply to service settings configured through the vSphere
          Client or applications created with the vSphere Web services SDK. Configurations made through other means,
          such as the esxcfg-firewall utility or configuration files in /etc/init.d/, are not affected by these settings.

          n    Start automatically if any ports are open, and stop when all ports are closed – The default setting for
               these services that VMware recommends. If any port is open, the client attempts to contact the network
               resources pertinent to the service in question. If some ports are open, but the port for a particular service
               is closed, the attempt fails, but there is little drawback to such a case. If and when the applicable outgoing
               port is opened, the service begins completing its tasks.
          n    Start and stop with host– The service starts shortly after the host starts and closes shortly before the host
               shuts down. Much like Start automatically if any ports are open, and stop when all ports are closed, this
               option means that the service regularly attempts to complete its tasks, such as contacting the specified
               NTP server. If the port was closed but is subsequently opened, the client begins completing its tasks shortly
               thereafter.
          n    Start and stop manually – The host preserves the user-determined service settings, regardless of whether
               ports are open or not. When a user starts the NTP service, that service is kept running as long as the host
               is powered on. If the service is started and the host is powered off, the service is stopped as part of the
               shutdown process, but as soon as the host is powered on, the service is started again, preserving the user-
               determined state.

          Configure How Service Startup Relates to Firewall Configuration

          The Startup Policy determines when a service starts. You can configure how service startup relates to a firewall
          configuration by editing the Startup Policy.

          Procedure

          1    Log in to a vCenter Server system using the vSphere Client.

          2    Select the host in the inventory panel.

          3    Click the Configuration tab and click Security Profile.

               The vSphere Client displays a list of active incoming and outgoing connections with the corresponding
               firewall ports.

          4    Click Properties.

               The Firewall Properties dialog box lists all the services and management agents you can configure for the
               host.




156                                                                                                               VMware, Inc.
Chapter 12 Securing an ESX Configuration




          5      Select the service to configure, and click Options.

                 The Startup Policy dialog box determines when the service starts. This dialog box also provides
                 information about the current state of the service and provides an interface for manually starting, stopping,
                 or restarting the service.

          6      Select a policy from the Startup Policy list.

          7      Click OK.


   TCP and UDP Ports for Management Access
          vCenter Server, ESX hosts, and other network components are accessed using predetermined TCP and UDP
          ports. If you manage network components from outside a firewall, you might be required to reconfigure the
          firewall to allow access on the appropriate ports.

          Table 12-1 lists TCP and UDP ports, and the purpose and the type of each.

          The ports are connected through the service console interface, unless otherwise indicated.

          Table 12-1. TCP and UDP Ports
          Port               Purpose                                                                             Traffic Type

          22                 SSH Server                                                                          Incoming TCP

          80                 HTTP access                                                                         Incoming TCP
                             The default non-secure TCP Web port typically used in conjunction with port 443
                             as a front end for access to ESX networks from the Web. Port 80 redirects traffic
                             to an HTTPS landing page (port 443).
                             Connection to vSphere Web Access from the Web
                             WS-Management

          123                NTP Client                                                                          Outgoing UDP

          427                The CIM client uses the Service Location Protocol, version 2 (SLPv2) to find CIM    Incoming and
                             servers.                                                                            outgoing UDP

          443                HTTPS access                                                                        Incoming TCP
                             vCenter Server access to ESX hosts
                             Default SSL Web port
                             vSphere Client access to vCenter Server
                             vSphere Client access to ESX hosts
                             WS-Management
                             vSphere Client access to vSphere Update Manager
                             vSphere Converter access to vCenter Server
                             vSphere Web Access and third-party network management client connections to
                             vCenter Server
                             Direct vSphere Web Access and third-party network management clients access
                             to hosts

          902                Host access to other hosts for migration and provisioning                           Incoming TCP,
                             Authentication traffic for ESX (xinetd/vmware-authd)                                outgoing UDP
                             vSphere Client access to virtual machine consoles
                             (UDP) Status update (heartbeat) connection from ESX to vCenter Server

          903                Remote console traffic generated by user access to virtual machines on a specific   Incoming TCP
                             ESX host.
                             vSphere Client access to virtual machine consoles
                             vSphere Web Access Client access to virtual machine consoles
                             MKS transactions (xinetd/vmware-authd-mks)

          2049               Transactions from NFS storage devices                                               Incoming and
                             This port is used on the VMkernel interface rather than the service console         outgoing TCP
                             interface.




VMware, Inc.                                                                                                                        157
ESX Configuration Guide




          Table 12-1. TCP and UDP Ports (Continued)
          Port               Purpose                                                                          Traffic Type

          2050–2250          Traffic between ESX hosts for VMware High Availability (HA) and EMC              Outgoing TCP,
                             Autostart Manager                                                                incoming and
                                                                                                              outgoing UDP

          3260               Transactions to iSCSI storage devices                                            Outgoing TCP
                             This port is used on the VMkernel interface and the service console interface.

          5900-5964          RFB protocol, which is used by management tools such as VNC                      Incoming and
                                                                                                              outgoing TCP

          5989               CIM XML transactions over HTTPS                                                  Incoming and
                                                                                                              outgoing TCP

          8000               Requests from vMotion                                                            Incoming and
                             This port is used on the VMkernel interface rather than the service console      outgoing TCP
                             interface.

          8042–8045          Traffic between ESX hosts for HA and EMC Autostart Manager                       Outgoing TCP,
                                                                                                              incoming and
                                                                                                              outgoing UDP

          8100, 8200         Traffic between ESX hosts for VMware Fault Tolerance                             Outgoing TCP,
                                                                                                              incoming and
                                                                                                              outgoing UDP


          In addition to the TCP and UDP ports listed in Table 12-1, you can configure other ports depending on your
          needs:
          n      You can use vSphere Client to open ports for installed management agents and supported services such
                 as NFS.
          n      You can open ports in the service console firewall for other services and agents required for your network
                 by running command-line scripts.


Securing Virtual Machines with VLANs
          The network can be one of the most vulnerable parts of any system. Your virtual machine network requires as
          much protection as your physical network. You can add security to your virtual machine network in several
          ways.

          If your virtual machine network is connected to a physical network, it can be subject to breaches to the same
          degree that a network made up of physical machines is. Even if the virtual machine network is isolated from
          any physical network, virtual machines in the network can be subject to attacks from other virtual machines
          in the network. The requirements for securing virtual machines are often the same as those for physical
          machines.

          Virtual machines are isolated from each other. One virtual machine cannot read or write another virtual
          machine’s memory, access its data, use its applications, and so forth. However, within the network, any virtual
          machine or group of virtual machines can still be the target of unauthorized access from other virtual machines
          and might require further protection by external means.

          You can add this level of security in different ways.
          n      Adding firewall protection to your virtual network by installing and configuring host-based firewalls on
                 some or all of its virtual machines.

                 For efficiency, you can set up private virtual machine Ethernet networks or virtual networks. With virtual
                 networks, you install a host-based firewall on a virtual machine at the head of the virtual network. This
                 serves as a protective buffer between the physical network adapter and the remaining virtual machines
                 in the virtual network.




158                                                                                                                    VMware, Inc.
Chapter 12 Securing an ESX Configuration




               Installing a host-based firewall on virtual machines at the head of virtual networks is a good security
               practice. However, because host-based firewalls can slow performance, balance your security needs
               against performance before you decide to install host-based firewalls on virtual machines elsewhere in
               the virtual network.
          n    Keeping different virtual machine zones within a host on different network segments. If you isolate virtual
               machine zones on their own network segments, you minimize the risks of data leakage from one virtual
               machine zone to the next. Segmentation prevents various threats, including Address Resolution Protocol
               (ARP) spoofing, in which an attacker manipulates the ARP table to remap MAC and IP addresses, thereby
               gaining access to network traffic to and from a host. Attackers use ARP spoofing to generate denials of
               service, hijack the target system, and otherwise disrupt the virtual network.

               Planning segmentation carefully lowers the chances of packet transmissions between virtual machine
               zones, which prevents sniffing attacks that require sending network traffic to the victim. Also, an attacker
               cannot use an insecure service in one virtual machine zone to access other virtual machine zones in the
               host. You can implement segmentation by using either of two approaches, each of which has different
               benefits.
               n   Use separate physical network adapters for virtual machine zones to ensure that the zones are isolated.
                   Maintaining separate physical network adapters for virtual machine zones is probably the most secure
                   method and is less prone to misconfiguration after the initial segment creation.
               n   Set up virtual local area networks (VLANs) to help safeguard your network. Because VLANs provide
                   almost all of the security benefits inherent in implementing physically separate networks without the
                   hardware overhead, they offer a viable solution that can save you the cost of deploying and
                   maintaining additional devices, cabling, and so forth.

          VLANs are an IEEE standard networking scheme with specific tagging methods that allow routing of packets
          to only those ports that are part of the VLAN. When properly configured, VLANs provide a dependable means
          for you to protect a set of virtual machines from accidental or malicious intrusions.

          VLANs let you segment a physical network so that two machines in the network are unable to transmit packets
          back and forth unless they are part of the same VLAN. For example, accounting records and transactions are
          among a company’s most sensitive internal information. In a company whose sales, shipping, and accounting
          employees all use virtual machines in the same physical network, you might protect the virtual machines for
          the accounting department by setting up VLANs as shown in Figure 12-4.




VMware, Inc.                                                                                                                159
ESX Configuration Guide




          Figure 12-4. Sample VLAN Layout
                                    Host 1
                                                    vSwitch


                                             VM0     VM1      VM2
                                                                        VLAN A

          Router                                                        Broadcast
                                    Host 2
                                             VM3     VM4      VM5       Domain A


                                                    vSwitch

                                                    vSwitch
           Switch 1
                                             VM6     VM7      VM8       VLAN B

                                                                        Broadcast
                                    Host 3                              Domain B
                                                    vSwitch


                                             VM9     VM10     VM11


          Switch 2                  Host 4
                                                                        Multiple VLANs
                                                    vSwitch
                                                                        on the same
                                                                        virtual switch
                                             VM12    VM13     VM14
                                             VLAN    VLAN     VLAN
                                               B       A        B       Broadcast
                                                                        Domains A and B


          In this configuration, all employees in the accounting department use virtual machines in VLAN A and the
          employees in sales use virtual machines in VLAN B.

          The router forwards packets containing accounting data to the switches. These packets are tagged for
          distribution to VLAN A only. Therefore, the data is confined to Broadcast Domain A and cannot be routed to
          Broadcast Domain B unless the router is configured to do so.

          This VLAN configuration prevents the sales force from intercepting packets destined for the accounting
          department. It also prevents the accounting department from receiving packets intended for the sales group.
          The virtual machines serviced by a single virtual switch can be in different VLANs.


      Security Considerations for VLANs
          The way you set up VLANs to secure parts of a network depends on factors such as the guest operating system
          and the way your network equipment is configured.

          ESX features a complete IEEE 802.1q-compliant VLAN implementation. VMware cannot make specific
          recommendations on how to set up VLANs, but there are factors to consider when using a VLAN deployment
          as part of your security enforcement policy.




160                                                                                                        VMware, Inc.
Chapter 12 Securing an ESX Configuration




          VLANs as Part of a Broader Security Implementation
          VLANs are an effective means of controlling where and how widely data is transmitted within the network.
          If an attacker gains access to the network, the attack is likely to be limited to the VLAN that served as the entry
          point, lessening the risk to the network as a whole.

          VLANs provide protection only in that they control how data is routed and contained after it passes through
          the switches and enters the network. You can use VLANs to help secure Layer 2 of your network architecture
          —the data link layer. However, configuring VLANs does not protect the physical layer of your network model
          or any of the other layers. Even if you create VLANs, provide additional protection by securing your hardware
          (routers, hubs, and so forth) and encrypting data transmissions.

          VLANs are not a substitute for firewalls in your virtual machine configurations. Most network configurations
          that include VLANs also include firewalls. If you include VLANs in your virtual network, be sure that the
          firewalls that you install are VLAN-aware.

          Properly Configure VLANs
          Equipment misconfiguration and network hardware, firmware, or software defects can make a VLAN
          susceptible to VLAN-hopping attacks.

          VLAN hopping occurs when an attacker with authorized access to one VLAN creates packets that trick physical
          switches into transmitting the packets to another VLAN that the attacker is not authorized to access.
          Vulnerability to this type of attack usually results from a switch being misconfigured for native VLAN
          operation, in which the switch can receive and transmit untagged packets.

          To help prevent VLAN hopping, keep your equipment up to date by installing hardware and firmware updates
          as they become available. Also, follow your vendor’s best practice guidelines when you configure your
          equipment.

          VMware virtual switches do not support the concept of a native VLAN. All data passed on these switches is
          appropriately tagged. However, because other switches in the network might be configured for native VLAN
          operation, VLANs configured with virtual switches can still be vulnerable to VLAN hopping.

          If you plan to use VLANs to enforce network security, disable the native VLAN feature for all switches unless
          you have a compelling reason to operate some of your VLANs in native mode. If you must use native VLAN,
          see your switch vendor’s configuration guidelines for this feature.

          Create Separate Communications Between Management Tools and the Service
          Console
          Whether you use a management client or the command line, all configuration tasks for ESX are performed
          through the service console, including configuring storage, controlling aspects of virtual machine behavior,
          and setting up virtual switches or virtual networks. Because the service console is the point of control for ESX,
          safeguarding it from misuse is crucial.

          VMware ESX management clients use authentication and encryption to prevent unauthorized access to the
          service console. Other services might not offer the same protection. If attackers gain access to the service
          console, they are free to reconfigure many attributes of the ESX host. For example, they can change the entire
          virtual switch configuration or change authorization methods.

          Network connectivity for the service console is established through virtual switches. To provide better
          protection for this critical ESX component, isolate the service console by using one of the following methods:
          n    Create a separate VLAN for management tool communication with the service console.
          n    Configure network access for management tool connections with the service console through a single
               virtual switch and one or more uplink ports.




VMware, Inc.                                                                                                                 161
ESX Configuration Guide




          Both methods prevent anyone without access to the service console VLAN or virtual switch from seeing traffic
          to and from the service console. They also prevent attackers from sending any packets to the service console.
          As an alternative, you can choose to configure the service console on a separate physical network segment
          instead. Physical segmentation provides a degree of additional security because it is less prone to later
          misconfiguration

          Set up a separate VLAN or virtual switch for vMotion and network attached storage.


      Virtual Switch Protection and VLANs
          VMware virtual switches provide safeguards against certain threats to VLAN security. Because of the way that
          virtual switches are designed, they protect VLANs against a variety of attacks, many of which involve VLAN
          hopping.

          Having this protection does not guarantee that your virtual machine configuration is invulnerable to other
          types of attacks. For example, virtual switches do not protect the physical network against these attacks; they
          protect only the virtual network.

          Virtual switches and VLANs can protect against the following types of attacks.

          MAC flooding                   Floods a switch with packets that contain MAC addresses tagged as having
                                         come from different sources. Many switches use a content-addressable
                                         memory (CAM) table to learn and store the source address for each packet.
                                         When the table is full, the switch can enter a fully open state in which every
                                         incoming packet is broadcast on all ports, letting the attacker see all of the
                                         switch’s traffic. This state might result in packet leakage across VLANs.

                                         Although VMware virtual switches store a MAC address table, they do not get
                                         the MAC addresses from observable traffic and are not vulnerable to this type
                                         of attack.

          802.1q and ISL tagging         Force a switch to redirect frames from one VLAN to another by tricking the
          attacks                        switch into acting as a trunk and broadcasting the traffic to other VLANs.

                                         VMware virtual switches do not perform the dynamic trunking required for
                                         this type of attack and, therefore, are not vulnerable.

          Double-encapsulation           Occur when an attacker creates a double-encapsulated packet in which the
          attacks                        VLAN identifier in the inner tag is different from the VLAN identifier in the
                                         outer tag. For backward compatibility, native VLANs strip the outer tag from
                                         transmitted packets unless configured to do otherwise. When a native VLAN
                                         switch strips the outer tag, only the inner tag is left, and that inner tag routes
                                         the packet to a different VLAN than the one identified in the now-missing outer
                                         tag.

                                         VMware virtual switches drop any double-encapsulated frames that a virtual
                                         machine attempts to send on a port configured for a specific VLAN. Therefore,
                                         they are not vulnerable to this type of attack.

          Multicast brute-force          Involve sending large numbers of multicast frames to a known VLAN almost
          attacks                        simultaneously to overload the switch so that it mistakenly allows some of the
                                         frames to broadcast to other VLANs.

                                         VMware virtual switches do not allow frames to leave their correct broadcast
                                         domain (VLAN) and are not vulnerable to this type of attack.




162                                                                                                             VMware, Inc.
Chapter 12 Securing an ESX Configuration




          Spanning-tree attacks           Target Spanning-Tree Protocol (STP), which is used to control bridging
                                          between parts of the LAN. The attacker sends Bridge Protocol Data Unit
                                          (BPDU) packets that attempt to change the network topology, establishing
                                          themselves as the root bridge. As the root bridge, the attacker can sniff the
                                          contents of transmitted frames.

                                          VMware virtual switches do not support STP and are not vulnerable to this
                                          type of attack.

          Random frame attacks            Involve sending large numbers of packets in which the source and destination
                                          addresses stay the same, but in which fields are randomly changed in length,
                                          type, or content. The goal of this attack is to force packets to be mistakenly
                                          rerouted to a different VLAN.

                                          VMware virtual switches are not vulnerable to this type of attack.

          Because new security threats develop over time, do not consider this an exhaustive list of attacks. Regularly
          check VMware security resources on the Web to learn about security, recent security alerts, and VMware
          security tactics.


Securing Virtual Switch Ports
          As with physical network adapters, a virtual network adapter can send frames that appear to be from a different
          machine or impersonate another machine so that it can receive network frames intended for that machine.
          Also, like physical network adapters, a virtual network adapter can be configured so that it receives frames
          targeted for other machines.

          When you create a virtual switch for your network, you add port groups to impose a policy configuration for
          the virtual machines and storage systems attached to the switch. You create virtual ports through the vSphere
          Client.

          As part of adding a port or port group to a virtual switch, the vSphere Client configures a security profile for
          the port. You can use this security profile to ensure that ESX prevents the guest operating systems for its virtual
          machines from impersonating other machines on the network. This security feature is implemented so that the
          guest operating system responsible for the impersonation does not detect that the impersonation was
          prevented.

          The security profile determines how strongly you enforce protection against impersonation and interception
          attacks on virtual machines. To correctly use the settings in the security profile, you must understand the basics
          of how virtual network adapters control transmissions and how attacks are staged at this level.

          Each virtual network adapter has its own MAC address assigned when the adapter is created. This address is
          called the initial MAC address. Although the initial MAC address can be reconfigured from outside the guest
          operating system, it cannot be changed by the guest operating system. In addition, each adapter has an effective
          MAC address that filters out incoming network traffic with a destination MAC address different from the
          effective MAC address. The guest operating system is responsible for setting the effective MAC address and
          typically matches the effective MAC address to the initial MAC address.

          When sending packets, an operating system typically places its own network adapter’s effective MAC address
          in the source MAC address field of the Ethernet frame. It also places the MAC address for the receiving network
          adapter in the destination MAC address field. The receiving adapter accepts packets only when the destination
          MAC address in the packet matches its own effective MAC address.

          Upon creation, a network adapter’s effective MAC address and initial MAC address are the same. The virtual
          machine’s operating system can alter the effective MAC address to another value at any time. If an operating
          system changes the effective MAC address, its network adapter receives network traffic destined for the new
          MAC address. The operating system can send frames with an impersonated source MAC address at any time.
          This means an operating system can stage malicious attacks on the devices in a network by impersonating a
          network adapter that the receiving network authorizes.




VMware, Inc.                                                                                                                 163
ESX Configuration Guide




          You can use virtual switch security profiles on ESX hosts to protect against this type of attack by setting three
          options. If you change any default settings for a port, you must modify the security profile by editing virtual
          switch settings in the vSphere Client.


      MAC Address Changes
          The setting for the MAC Address Changes option affects traffic that a virtual machine receives.

          When the option is set to Accept, ESX accepts requests to change the effective MAC address to other than the
          initial MAC address.

          When the option is set to Reject, ESX does not honor requests to change the effective MAC address to anything
          other than the initial MAC address, which protects the host against MAC impersonation. The port that the
          virtual adapter used to send the request is disabled and the virtual adapter does not receive any more frames
          until it changes the effective MAC address to match the initial MAC address. The guest operating system does
          not detect that the MAC address change was not honored.

          NOTE The iSCSI initiator relies on being able to get MAC address changes from certain types of storage. If you
          are using ESX iSCSI and have iSCSI storage, set the MAC Address Changes option to Accept.

          In some situations, you might have a legitimate need for more than one adapter to have the same MAC address
          on a network—for example, if you are using Microsoft Network Load Balancing in unicast mode. When
          Microsoft Network Load Balancing is used in the standard multicast mode, adapters do not share MAC
          addresses.


      Forged Transmissions
          The setting for the Forged Transmits option affects traffic that is transmitted from a virtual machine.

          When the option is set to Accept, ESX does not compare source and effective MAC addresses.

          To protect against MAC impersonation, you can set this option to Reject. If you do, the host compares the
          source MAC address being transmitted by the operating system with the effective MAC address for its adapter
          to see if they match. If the addresses do not match, ESX drops the packet.

          The guest operating system does not detect that its virtual network adapter cannot send packets by using the
          impersonated MAC address. The ESX host intercepts any packets with impersonated addresses before they
          are delivered, and the guest operating system might assume that the packets are dropped.


      Promiscuous Mode Operation
          Promiscuous mode eliminates any reception filtering that the virtual network adapter would perform so that
          the guest operating system receives all traffic observed on the wire. By default, the virtual network adapter
          cannot operate in promiscuous mode.

          Although promiscuous mode can be useful for tracking network activity, it is an insecure mode of operation,
          because any adapter in promiscuous mode has access to the packets regardless of whether some of the packets
          are received only by a particular network adapter. This means that an administrator or root user within a
          virtual machine can potentially view traffic destined for other guest or host operating systems.

          NOTE In some situations, you might have a legitimate reason to configure a virtual switch to operate in
          promiscuous mode—for example, if you are running network intrusion detection software or a packet sniffer.




164                                                                                                             VMware, Inc.
Chapter 12 Securing an ESX Configuration




Internet Protocol Security
          Internet Protocol Security (IPsec) secures IP communications coming from and arriving at a host. ESX hosts
          support IPsec using IPv6.

          When you set up IPsec on a host, you enable authentication and encryption of incoming and outgoing packets.
          When and how IP traffic is encrypted is depends on how you set up the system's security associations and
          security policies

          A security association determines how the system encrypts traffic. When you create a security association, you
          specify the source and destination, encryption parameters, a name for the security association.

          A security policy determines when the system should encrypt traffic. The security policy includes source and
          destination information, the protocol and direction of traffic to be encrypted, the mode (transport or tunnel)
          and the security association to use.

          IPsec over IPv6 on the service console is unsupported.


   Add a Security Association
          Add a security association to specify encryption parameters for associated IP traffic.

          You can add a security association using the vSphere CLI. For information on using the vSphere CLI, see the
          vSphere Command-Line Interface Installation and Scripting Guide and the vSphere Command-Line Interface
          Reference.

          Procedure

          1    Use the command esxcfg-ipsec --add-sa.

          2    Specify the source address using --sa-src source address.

          3    Specify the destination address using --sa-dst destination address.

          4    Choose the mode, either transport or tunnel, using --sa-mode mode.

          5    Provide the security parameter index using --spi security parameter index.

               The security parameter index identifies the security association to the host. It must be a hexadecimal with
               a 0x prefix. Each security association you create must have a unique combination of protocol and security
               parameter index.

          6    Choose the encryption algorithm using --ealgo encryption algorithm.
               n   3des-cbc

               n   aes128-cbc

               n   null provides no encryption

          7    Provide the encryption key using --ekey encryption key.

               You can enter keys as ASCII text or as a hexadecimal with a 0x prefix.

          8    Choose the authentication algorithm, hmac-sha1 or hmac-sha2-256, using --ialgo authentication
               algorithm.

          9    Provide the authentication key using --ikey authentication key.

               You can enter keys as ASCII text or as a hexadecimal with a 0x prefix.

          10   Provide a name for the security association using name.




VMware, Inc.                                                                                                                165
ESX Configuration Guide




          Example 12-1. Example New Security Association Command
          The following example contains extra line breaks for readability.
          esxcfg-ipsec --add-sa
          --sa-src 3ffe:501:ffff:0::a
          --sa-dst 3ffe:501:ffff:0001:0000:0000:0000:0001
          --sa-mode transport
          --spi 0x1000
          --ealgo 3des-cbc
          --ekey 0x6970763672656164796c6f676f336465736362636f757432
          --ialgo hmac-sha1
          --ikey 0x6970763672656164796c6f67736861316f757432
          sa1


      Remove a Security Association
          You can remove a security association from the ESX host.

          You can remove a security association using the vSphere CLI. For information on using the vSphere CLI, see the
          vSphere Command-Line Interface Installation and Scripting Guide and the vSphere Command-Line Interface
          Reference.

          Prerequisites

          Be sure that the security association you want to use is not currently in use. If you try to remove a security
          association that is in use, the removal operation fails.

          Procedure
          u    Use the command esxcfg-ipsec --remove-sa security association name.


      List Available Security Associations
          ESX can provide a list of all security associations available for use by security policies. The list includes both
          user created security associations and any security associations the VMkernel installed using Internet Key
          Exchange.

          You can get a list of available security associations using the vSphere CLI. For information on using the vSphere
          CLI, see the vSphere Command-Line Interface Installation and Scripting Guide and the vSphere Command-Line
          Interface Reference.

          Procedure
          u    Use the command esxcfg-ipsec -l.

          ESX displays a list of all available security associations.


      Create a Security Policy
          Create a security policy to determine when to use the authentication and encryption parameters set in a security
          association.

          You can add a security policy using the vSphere CLI. For information on using the vSphere CLI, see the vSphere
          Command-Line Interface Installation and Scripting Guide and the vSphere Command-Line Interface Reference.

          Prerequisites

          Before creating a security policy, add a security association with the appropriate authentication and encryption
          parameters.




166                                                                                                              VMware, Inc.
Chapter 12 Securing an ESX Configuration




          Procedure

          1    Use the command esxcfg-ipsec --add-sp.

          2    Specify the source IP address and prefix length using --sp-src source address.

          3    Specify the destination address and prefix length using --sp-dst destination address.

          4    Specify the source port using --src-port port.

               The source port must be a number between 0 and 65535.

          5    Specify the destination port using --dst-port port.

               The destination port must be a number between 0 and 65535.

          6    Choose the upper layer protocol using --ulproto protocol.
               n      tcp

               n      udp

               n      icmp6

               n      any

          7    Choose the direction, in or out, in which you want to monitor traffic using --dir direction.

          8    Specify the action to take when traffic with the specified parameters is encountered using --action
               action.

               Option                               Description
               none                                 Take no action.
               discard                              Do not allow data in or out.
               ipsec                                Use the authentication and encryption information supplied in the security
                                                    association to determine whether the data comes from a trusted source.


          9    Choose the mode, either tunnel or transport, using --sp-mode mode.

          10   Specify the security association for this security policy to use using --sa-name security association
               name.

          11   Specify the name of the security policy by using name.

          Example 12-2. Example New Security Policy Command
          The following example includes extra line breaks for readability.
          esxcfg-ipsec --add-sp
          --sp-src 2001:db8:1::/64
          --sp-dst 2002:db8:1::/64
          --src-port 23
          --dst-port 25
          --ulproto tcp
          --dir out
          --action ipsec
          --sp-mode transport
          --sa-name sa1
          sp1




VMware, Inc.                                                                                                                167
ESX Configuration Guide




      Remove a Security Policy
          You can remove a security policy from the ESX host.

          You can remove a security policy using the vSphere CLI. For information on using the vSphere CLI, see the
          vSphere Command-Line Interface Installation and Scripting Guide and the vSphere Command-Line Interface
          Reference.

          Prerequisites

          Be sure that the security policy you want to use is not currently in use. If you try to remove a security policy
          that is in use, the removal operation fails.

          Procedure
          u    Use the command esxcfg-ipsec --remove-sp security policy name.


      List Available Security Policies
          ESX can provide a list of all security policies on the host.

          You can get a list of available security policies using the vSphere CLI. For information on using the vSphere
          CLI, see the vSphere Command-Line Interface Installation and Scripting Guide and the vSphere Command-Line
          Interface Reference.

          Procedure
          u    Use the command esxcfg-ipsec -L.

          ESX displays a list of all available security policies.


Securing iSCSI Storage
          The storage you configure for an ESX host might include one or more storage area networks (SANs) that use
          iSCSI. When you configure iSCSI on an ESX host, you can take several measures to minimize security risks.

          iSCSI is a means of accessing SCSI devices and exchanging data records by using TCP/IP over a network port
          rather than through a direct connection to a SCSI device. In iSCSI transactions, blocks of raw SCSI data are
          encapsulated in iSCSI records and transmitted to the requesting device or user.

          iSCSI SANs let you make efficient use of existing Ethernet infrastructures to provide ESX hosts access to storage
          resources that they can dynamically share. iSCSI SANs provide an economical storage solution for
          environments that rely on a common storage pool to serve numerous users. As with any networked system,
          your iSCSI SANs can be subject to security breaches.

          NOTE The requirements and procedures for securing an iSCSI SAN are similar for the hardware iSCSI adapters
          you can use with ESX hosts and for iSCSI configured directly through the ESX host.


      Securing iSCSI Devices Through Authentication
          One means of securing iSCSI devices from unwanted intrusion is to require that the ESX host, or initiator, be
          authenticated by the iSCSI device, or target, whenever the host attempts to access data on the target LUN.

          The goal of authentication is to prove that the initiator has the right to access a target, a right granted when
          you configure authentication.

          ESX does not support Kerberos, Secure Remote Protocol (SRP), or public-key authentication methods for iSCSI.
          Additionally, it does not support IPsec authentication and encryption.

          Use the vSphere Client to determine whether authentication is being performed and to configure the
          authentication method.


168                                                                                                              VMware, Inc.
Chapter 12 Securing an ESX Configuration




          Enabling Challenge Handshake Authentication Protocol (CHAP) for iSCSI SANs
          You can configure the iSCSI SAN to use CHAP authentication.

          In CHAP authentication, when the initiator contacts an iSCSI target, the target sends a predefined ID value
          and a random value, or key, to the initiator. The initiator creates a one-way hash value that it sends to the
          target. The hash contains three elements: a predefined ID value, the random value that the target sends, and
          a private value, or CHAP secret, that the initiator and target share. When the target receives the hash from the
          initiator, it creates its own hash value by using the same elements and compares it to the initiator’s hash. If the
          results match, the target authenticates the initiator.

          ESX supports unidirectional and bidirectional CHAP authentication for iSCSI. In unidirectional CHAP
          authentication, the target authenticates the initiator, but the initiator does not authenticate the target. In
          bidirectional CHAP authentication, an additional level of security enables the initiator to authenticate the
          target.

          ESX supports CHAP authentication at the adapter level, when only one set of authentication credentials can
          be sent from the host to all targets. It also supports per-target CHAP authentication, which enables you to
          configure different credentials for each target to achieve greater target refinement.
          See “Configuring CHAP Parameters for iSCSI Adapters,” on page 99 for information about how to work with
          CHAP.

          Disabling iSCSI SAN Authentication
          You can configure the iSCSI SAN to use no authentication. Communications between the initiator and target
          are still authenticated in a rudimentary way because the iSCSI target devices are typically set up to
          communicate with specific initiators only.

          Choosing not to enforce more stringent authentication can make sense if your iSCSI storage is housed in one
          location and you create a dedicated network or VLAN to service all your iSCSI devices. The iSCSI configuration
          is secure because it is isolated from any unwanted access, much as a Fibre Channel SAN is.

          As a basic rule, disable authentication only if you are willing to risk an attack to the iSCSI SAN or cope with
          problems that result from human error.

          See “Configuring CHAP Parameters for iSCSI Adapters,” on page 99 for information about how to work with
          CHAP.


   Protecting an iSCSI SAN
          When you plan your iSCSI configuration, take measures to improve the overall security of the iSCSI SAN. Your
          iSCSI configuration is only as secure as your IP network, so by enforcing good security standards when you
          set up your network, you help safeguard your iSCSI storage.

          The following are some specific suggestions for enforcing good security standards.

          Protect Transmitted Data
          A primary security risk in iSCSI SANs is that an attacker might sniff transmitted storage data.

          Take additional measures to prevent attackers from easily seeing iSCSI data. Neither the hardware iSCSI
          adapter nor the ESX host iSCSI initiator encrypts the data that they transmit to and from the targets, making
          the data more vulnerable to sniffing attacks.

          Allowing your virtual machines to share virtual switches and VLANs with your iSCSI configuration potentially
          exposes iSCSI traffic to misuse by a virtual machine attacker. To help ensure that intruders cannot listen to
          iSCSI transmissions, make sure that none of your virtual machines can see the iSCSI storage network.




VMware, Inc.                                                                                                                 169
ESX Configuration Guide




          If you use a hardware iSCSI adapter, you can accomplish this by making sure that the iSCSI adapter and ESX
          physical network adapter are not inadvertently connected outside the host by virtue of sharing a switch or
          some other means. If you configure iSCSI directly through the ESX host, you can accomplish this by configuring
          iSCSI storage through a different virtual switch than the one used by your virtual machines, as shown in
          Figure 12-5.
          Figure 12-5. iSCSI Storage on a Separate Virtual Switch




          In addition to protecting the iSCSI SAN by giving it a dedicated virtual switch, you can configure your iSCSI
          SAN on its own VLAN to improve performance and security. Placing your iSCSI configuration on a separate
          VLAN ensures that no devices other than the iSCSI adapter have visibility into transmissions within the iSCSI
          SAN. Also, network congestion from other sources cannot interfere with iSCSI traffic.

          Secure iSCSI Ports
          When you run iSCSI devices, the ESX host does not open any ports that listen for network connections. This
          measure reduces the chances that an intruder can break into the ESX host through spare ports and gain control
          over the host. Therefore, running iSCSI does not present any additional security risks at the ESX host end of
          the connection.

          Any iSCSI target device that you run must have one or more open TCP ports to listen for iSCSI connections.
          If any security vulnerabilities exist in the iSCSI device software, your data can be at risk through no fault of
          ESX. To lower this risk, install all security patches that your storage equipment manufacturer provides and
          limit the devices connected to the iSCSI network.




170                                                                                                             VMware, Inc.
Authentication and User Management                                                                     13
          ESX handles user authentication and supports user and group permissions. In addition, you can encrypt
          connections to the vSphere Client and SDK.

          This chapter includes the following topics:
          n    “Securing ESX Through Authentication and Permissions,” on page 171
          n    “About Users, Groups, Permissions, and Roles,” on page 172
          n    “Working with Users and Groups on ESX Hosts,” on page 176
          n    “Encryption and Security Certificates for ESX,” on page 181


Securing ESX Through Authentication and Permissions
          When a vSphere Client or vCenter Server user connects to a ESX host, a connection is established with the
          VMware Host Agent process. The process uses the user names and passwords for authentication.

          ESX uses the Pluggable Authentication Modules (PAM) structure for authentication when users access the ESX
          host using the vSphere Client, vSphere Web Access, or the service console. The PAM configuration for VMware
          services is located in /etc/pam.d/vmware-authd, which stores paths to authentication modules.

          The default installation of ESX uses /etc/passwd authentication as Linux does, but you can configure ESX to
          use another distributed authentication mechanism. If you plan to use a third-party authentication tool instead
          of the ESX default implementation, see the vendor documentation for instructions. As part of setting up third-
          party authentication, you might be required to update the files in /etc/pam.d folder with new module
          information.

          The reverse proxy in the VMware Host Agent (vmware-hostd) process listens on ports 80 and 443. vSphere
          Client or vCenter Server users connect to the host agent through these ports. The vmware-hostd process receives
          the user name and password from the client and forwards them to the PAM module to perform the
          authentication.

          Figure 13-1 shows a basic example of how ESX authenticates transactions from the vSphere Client.

          NOTE CIM transactions also use ticket-based authentication in connecting with the vmware-hostd process.




VMware, Inc.                                                                                                         171
ESX Configuration Guide




          Figure 13-1. Authentication for vSphere Client Communications with ESX
                                          vSphere Client


          management functions


                                                                 console




            user name/password                                   ticket-based
                  authentication                                 authentication



                                               ESX

                             service console               VMkernel

                              vmware-hostd            virtual machine


                                                           vmkauthd



          ESX authentication transactions with vSphere Web Access and third-party network management clients are
          also direct interactions with the vmware-hostd process.

          To make sure that authentication works efficiently for your site, perform basic tasks such as setting up users,
          groups, permissions, and roles, configuring user attributes, adding your own certificates, and determining
          whether you want to use SSL.


About Users, Groups, Permissions, and Roles
          vCenter Server and ESX hosts use a combination of user name, password, and permissions to authenticate a
          user for access and authorize activities. You can control access to hosts, clusters, datastores, resource pools,
          networking port groups, and virtual machines by assigning permissions.

          Access to an ESX host and its resources is granted when a known user with appropriate permissions logs in
          to the host with a correct password. vCenter Server uses a similar approach when determining whether to
          grant access to a user.

          vCenter Server and ESX hosts deny access under the following circumstances:
          n    A user not in the user list attempts to log in.
          n    A user enters the wrong password.
          n    A user is in the list but was not assigned permissions.
          n    A user who successfully logged in attempts operations that they do not have permission to perform.

          As part of managing ESX hosts and vCenter Server, you must plan how to handle particular types of users and
          permissions. ESX and vCenter Server use sets of privileges, or roles, to control which operations individual
          users or groups can perform. Predefined roles are provided, but you can also create new ones. You can manage
          users more easily by assigning them to groups. When you apply a role to the group, all users in the group
          inherit the role.

          The topics in this section apply to local users and groups. You can also use Active Directory to manage users
          and groups for ESX.




172                                                                                                             VMware, Inc.
Chapter 13 Authentication and User Management




   Understanding Users
          A user is an individual authorized to log in to either an ESX host or vCenter Server.

          ESX users fall into two categories: those who can access the host through vCenter Server and those who can
          access by directly logging in to the host from the vSphere Client, vSphere Web Access, a third-party client, or
          a command shell.

          Authorized vCenter               Authorized users for vCenter Server are those included in the Windows
          Server users                     domain list that vCenter Server references or are local Windows users on the
                                           vCenter Server host.
                                           You cannot use vCenter Server to manually create, remove, or otherwise
                                           change users. You must use the tools for managing your Windows domain.
                                           Any changes you make are reflected in vCenter Server. However, the user
                                           interface does not provide a user list for you to review.

          Direct-access users              Users authorized to work directly on an ESX host are those added to the internal
                                           user list by a system administrator.
                                           An administrator can perform a variety of management activities for these
                                           users, such as changing passwords, group memberships, and permissions as
                                           well as adding and removing users.

          The user list that ESX maintains locally is separate from the users known to vCenter Server, which are either
          local Windows users or users that are part of the Windows domain. Even if the lists appear to have common
          users (for instance, a user called devuser), treat these users separately. If you log in to vCenter Server as devuser,
          you might have permission to view and delete files from a datastore, whereas if you log in to an ESX host as
          devuser, you might not. If Active Directory authentication has been configured on the host, then the same
          Windows domain users known to vCenter Server will be available on the ESX host.

          Because of the confusion that duplicate naming can cause, check the vCenter Server user list before you create
          ESX host users to avoid duplicating names. To check for vCenter Server users, review the Windows domain
          list.


   Understanding Groups
          A group is a set of users that share a common set of rules and permissions. When you assign permissions to a
          group, all users in the group inherit them, and you do not have to work with the user profiles individually.
          As an administrator, decide how to structure groups to achieve your security and usage goals. For example,
          three part-time sales team members work different days, and you want them to share a single virtual machine
          but not use the virtual machines belonging to sales managers. In this case, you might create a group called
          SalesShare that includes the three sales people and give the group permission to interact with only one object,
          the shared virtual machine. They cannot perform any actions on the sales managers’ virtual machines.

          The group lists in vCenter Server and an ESX host are drawn from the same sources as their respective user
          lists. The group lists in vCenter Server are drawn from the local users or any trusted domain, and the group
          lists for an ESX host are drawn from the local user list or from any trusted Windows domain.


   Understanding Password Requirements
          By default, ESX enforces requirements for user passwords.
          When you create a password, include a mix of characters from four character classes: lowercase letters,
          uppercase letters, numbers, and special characters such as an underscore or dash.




VMware, Inc.                                                                                                                  173
ESX Configuration Guide




          Your user password must meet the following length requirements.
          n    Passwords containing characters from one or two character classes must be at least eight characters long.
          n    Passwords containing characters from three character classes must be at least seven characters long.
          n    Passwords containing characters from all four character classes must be at least six characters long.

          NOTE An uppercase character that begins a password does not count toward the number of character classes
          used. A number that ends a password does not count toward the number of character classes used.

          You can also use a passphrase, which is a phrase consisting of at least three words, each of which is 8 to 40
          characters long.

          Example 13-1. Sample Passwords
          The following password candidates meet the requirements of ESX.
          n    xQaTEhbU: Contains eight characters from two character classes.
          n    xQaT3pb: Contains seven characters from three character classes.
          n    xQaT3#: Contains six characters from four character classes.
          The following password candidates do not meet the requirements of ESX.
          n    Xqat3hb: Begins with an uppercase character, reducing the effective number of character classes to two.
               Eight characters are required when you use only two character classes.
          n    xQaTEh2: Ends with a number, reducing the effective number of character classes to two. Eight characters
               are required when you use only two character classes.


      Understanding Permissions
          For ESX and vCenter Server, permissions are defined as access roles that consist of a user and the user’s assigned
          role for an object such as a virtual machine or ESX host.

          Most vCenter Server and ESX users have limited ability to manipulate the objects associated with the host.
          Users with the Administrator role have full access rights and permissions on all virtual objects such as
          datastores, hosts, virtual machines, and resource pools. By default, the Administrator role is granted to the
          root user. If vCenter Server manages the host, vpxuser is also an Administrator user.

          The list of privileges is the same for both ESX and vCenter Server, and you use the same method to configure
          permissions.
          You can create roles and set permissions through a direct connection to the ESX host. Because these tasks are
          widely performed in vCenter Server, see the VMware vSphere Datacenter Administration Guide for information
          on working with permissions and roles.

          Assigning root User Permissions
          Root users can only perform activities on the specific ESX host that they are logged in to.

          For security reasons, you might not want to use the root user in the Administrator role. In this case, you can
          change permissions after installation so that the root user no longer has administrative privileges or you can
          delete the root user’s access permissions altogether through the vSphere Client as described in the VMware
          vSphere Datacenter Administration Guide. If you do so, you must first create another permission at the root level
          that has a different user assigned to the Administrator role.

          Assigning the Administrator role to a different user helps you maintain security through traceability. The
          vSphere Client logs all actions that the Administrator role user initiates as events, providing you with an audit
          trail. If all administrators log in as the root user, you cannot tell which administrator performed an action. If
          you create multiple permissions at the root level—each associated with a different user or user group—you
          can track the actions of each administrator or administrative group.


174                                                                                                              VMware, Inc.
Chapter 13 Authentication and User Management




          After you create an alternative Administrator user, you can assign a different role to the root user. To manage
          the host using vCenter server, the new user you created must have full Administrator privileges on the host.

          NOTE vicfg commands do not perform an access check. Therefore, even if you limit the root user’s privileges,
          it does not affect what that user can do using the command-line interface commands.


          Understanding vpxuser Permissions
          The vpxuser permission is used for vCenter Server when managing activities for the host. The vpxuser is
          created when an ESX host is attached to vCenter Server.

          vCenter Server has Administrator privileges on the host that it manages. For example, vCenter Server can
          move virtual machines to and from hosts and perform configuration changes needed to support virtual
          machines.

          The vCenter Server administrator can perform most of the same tasks on the host as the root user and also
          schedule tasks, work with templates, and so forth. However, the vCenter Server administrator cannot directly
          create, delete, or edit users and groups for ESX hosts. These tasks can only be performed by a user with
          Administrator permissions directly on each ESX host.

          NOTE You cannot manage the vpxuser using Active Directory.

          CAUTION Do not change vpxuser in any way and do not change its permissions. If you do so, you might
          experience problems in working with ESX hosts through vCenter Server.


   Understanding Roles
          vCenter Server and ESX grant access to objects only to users who are assigned permissions for the object. When
          you assign a user or group permissions for the object, you do so by pairing the user or group with a role. A
          role is a predefined set of privileges.

          ESX hosts provide three default roles, and you cannot change the privileges associated with these roles. Each
          subsequent default role includes the privileges of the previous role. For example, the Administrator role
          inherits the privileges of the Read Only role. Roles you create yourself do not inherit privileges from any of
          the default roles.

          You can create custom roles by using the role-editing facilities in the vSphere Client to create privilege sets
          that match your user needs. If you use the vSphere Client connected to vCenter Server to manage your ESX
          hosts, you have additional roles to choose from in vCenter Server. Also, the roles you create directly on an ESX
          host are not accessible within vCenter Server. You can work with these roles only if you log in to the host
          directly from the vSphere Client.

          If you manage ESX hosts through vCenter Server, maintaining custom roles in the host and vCenter Server
          can result in confusion and misuse. In this type of configuration, maintain custom roles only in vCenter Server.

          You can create roles and set permissions through a direct connection to the ESX host. Because most users create
          roles and set permissions in vCenter Server, see the VMware vSphere Datacenter Administration Guide for
          information on working with permissions and roles.

          Assigning the No Access Role
          Users assigned the No Access role for an object cannot view or change the object in any way. New users and
          groups are assigned this role by default. You can change the role on an object-by-object basis.

          The root user and vpxuser permissions are the only users not assigned the No Access role by default. Instead,
          they are assigned the Administrator role. You can delete the root user’s permissions altogether or change its
          role to No Access as long as you first create a replacement permission at the root level with the Administrator
          role and associate this role with a different user.




VMware, Inc.                                                                                                               175
ESX Configuration Guide




          Assigning the Read Only Role
          Users assigned the Read Only role for an object are allowed to view the state of the object and details about
          the object.

          With this role, a user can view virtual machine, host, and resource pool attributes. The user cannot view the
          remote console for a host. All actions through the menus and toolbars are disallowed.

          Assigning the Administrator Role
          Users assigned the Administrator role for an object are allowed to view and perform all actions on the object.
          This role also includes all permissions inherent in the Read Only role.

          If you are acting in the Administrator role on an ESX host, you can grant permissions to individual users and
          groups on that host. If you are acting in the Administrator role in vCenter Server, you can grant permissions
          to any user or group included in the Windows domain list that vCenter Server references.

          vCenter Server registers any selected Windows domain user or group through the process of assigning
          permissions. By default, all users who are members of the local Windows Administrators group on vCenter
          Server are granted the same access rights as any user assigned to the Administrator role. Users who are
          members of the Administrators group can log in as individuals and have full access.

          Users who are in the Active Directory group ESX Admins are automatically assigned the Administrator role.

          For security reasons, consider removing the Windows Administrators group from the Administrator role. You
          can change permissions after installation. Alternately, you can use the vSphere Client to delete the Windows
          Administrators group access permissions, but you must first create another permission at the root level that
          has a different user assigned to the Administrator role.


Working with Users and Groups on ESX Hosts
          If you are directly connected to an ESX host through the vSphere Client, you can create, edit, and delete users
          and groups. These users and groups are visible in the vSphere Client whenever you log in to the ESX host, but
          are not available if you log in to vCenter Server.

          The topics in this section apply to local users and groups. You can also use Active Directory to manage users
          and groups for ESX.


      View, Sort, and Export a List of Users and Groups
          You can view, sort, and export lists of ESX users and groups to a file that is in HTML, XML, Microsoft Excel,
          or CSV format.

          Procedure

          1    Log in to the host using the vSphere Client.

          2    Click the Users & Groups tab and click Users or Groups.

          3    Determine how to sort the table, and hide or show columns according to the information you want to see
               in the exported file.
               n     To sort the table by any of the columns, click the column heading.
               n     To show or hide columns, right-click any of the column headings and select or deselect the name of
                     the column to hide.
               n     To show or hide columns, right-click any of the column headings and select or deselect the name of
                     the column to hide.

          4    Right-click anywhere in the table and click Export List to open the Save As dialog box.




176                                                                                                           VMware, Inc.
Chapter 13 Authentication and User Management




          5    Select a path and enter a filename.

          6    Select the file type and click OK.


   Add a User to the Users Table
          Adding a user to the users table updates the internal user list that ESX maintains.

          Prerequisites

          Review the password requirements described in “Understanding Password Requirements,” on page 173.

          Procedure

          1    Log in to the host using the vSphere Client.

          2    Click the Users & Groups tab and click Users.

          3    Right-click anywhere in the Users table and click Add to open the Add New User dialog box.

          4    Enter a login, a user name, a numeric user ID (UID), and a password.
               n   Specifying the user name and UID are optional. If you do not specify the UID, the vSphere Client
                   assigns the next available UID.
               n   Create a password that meets the length and complexity requirements. The host checks for password
                   compliance using the default authentication plug-in, pam_passwdqc.so. If the password is not
                   compliant, the following error appears: A general system error occurred: passwd: Authentication
                   token manipulation error.

               n   If you switched to the pam_cracklib.so authentication plug-in, password compliance is not enforced.

          5    To allow a user to access the ESX host through a command shell, select Grant shell access to this user.

               NOTE To be granted shell access, users must also have an Administrator role for an inventory object on
               the host.

               In general, do not grant shell access unless the user has a justifiable need. Users that access the host only
               through the vSphere Client do not need shell access.

          6    To add the user to a group, select the group name from the Group drop-down menu and click Add.

          7    Click OK.


   Modify the Settings for a User
          You can change the user ID, user name, password, and group settings for a user. You can also grant a user
          shell access.

          Prerequisites

          Review the password requirements as described in “Understanding Password Requirements,” on page 173.

          Procedure

          1    Log in to the host using the vSphere Client.

          2    Click the Users & Groups tab and click Users.

          3    Right-click the user and click Edit to open the Edit User dialog box.

          4    To change the user ID, enter a numeric user UID in the UID text box.

               The vSphere Client assigns the UID when you first create the user. In most cases, you do not have to change
               this assignment.




VMware, Inc.                                                                                                                177
ESX Configuration Guide




          5    Enter a new user name.

          6    To change the user’s password, select Change Password and enter the new password.
               n     Create a password that meets the length and complexity requirements. The host checks for password
                     compliance using the default authentication plug-in, pam_passwdqc.so. If the password is not
                     compliant, the following error appears: A general system error occurred: passwd: Authentication
                     token manipulation error.

               n     If you switched to the pam_cracklib.so authentication plug-in, password compliance is not enforced.

          7    To change the user’s ability to access the ESX host through a command shell, select or deselect Grant shell
               access to this user.

               NOTE To be granted shell access, users must also have an Administrator role for an inventory object on
               the host.

               In general, do not grant shell access unless the user has a justifiable need. Users that access the host only
               through the vSphere Client do not need shell access.

          8    To add the user to a group, select the group name from the Group drop-down menu and click Add.

          9    To remove the user from a group, select the group name from the Group membership box and click
               Remove.

          10   Click OK.


      Remove a User or Group
          You can remove a user or group from the ESX host.

          CAUTION Do not remove the root user.


          If you remove a user from the host, they lose permissions to all objects on the host and cannot log in again.

          NOTE Users who are logged in and are removed from the domain keep their host permissions until you restart
          the host.

          Removing a group does not affect the permissions granted individually to the users in that group or
          permissions granted as part of inclusion in another group.

          Procedure

          1    Log in to the host using the vSphere Client.

          2    Click the Users & Groups tab and click Users or Groups.

          3    Right-click the user or group to remove and select Remove.


      Add a Group to the Groups Table
          Adding a group to the ESX groups table updates the internal group list maintained by the host.

          Procedure

          1    Log in to the host using the vSphere Client.

          2    Click the Users & Groups tab and click Groups.

          3    Right-click anywhere in the Groups table and click Add to open the Create New Group dialog box.




178                                                                                                              VMware, Inc.
Chapter 13 Authentication and User Management




          4    Enter a group name and numeric group ID (GID) in the Group ID text box.

               Specifying the GID is optional. If you do not specify a GID, the vSphere Client assigns the next available
               group ID.

          5    For each user that you want to add as a group member, select the user name from the list and click Add.

          6    Click OK.


   Add or Remove Users from a Group
          You can add or remove a user from a group in the groups table.

          Procedure

          1    Log in to the host using the vSphere Client.

          2    Click the Users & Groups tab and click Groups.

          3    Right-click the group to modify and select Properties to open the Edit Group dialog box.

          4    To add the user to a group, select the group name from the Group drop-down menu and click Add.

          5    To remove the user from a group, select the group name from the Group membership box and click
               Remove.

          6    Click OK.


   Configure a Host to Use a Directory Service
          You can configure the ESX host to use a directory service such as Active Directory to manage users and groups.

          Prerequisites

          Verify that you have set up an Active Directory domain. Refer to your directory server documentation.

          Procedure

          1    Ensure that the host name of ESX is fully qualified with the domain name of the Active Directory forest.

               fully qualified domain name = host_name.domain_name

          2    Synchronize the time between ESX and the directory service system using your preferred method.

               To use NTP, perform the following steps.

               a   In the vSphere Client, select the host in the inventory.

               b   Click the Configuration tab and click Time Configuration.

               c   Click the Properties link at the top right of the panel.

               d   Set the time and date.

               e   Select NTP Client Enabled to open the service console firewall ports that the NTP service uses.

          3    Ensure that the DNS servers you configured for the host can resolve the host names for the Active Directory
               controllers.

               You can use the vSphere Client DNS and Routing Configuration dialog box to modify host name and DNS
               server information for the host.

               a   In the vSphere Client, select the host in the inventory.

               b   Click the Configuration tab and click DNS and Routing.

               c   Click the Properties link at the top right of the panel to access the DNS and Routing Configuration
                   dialog box.



VMware, Inc.                                                                                                               179
ESX Configuration Guide




          What to do next

          Join a directory service domain using the vSphere Client.


      Add a Host to a Directory Service Domain
          To use a directory service, you must join the host to the directory service domain.

          You can enter the domain name in one of two ways:
          n    name.tld (for example, domain.com): The account is created under the default container.

          n    name.tld/container/path (for example, domain.com/OU1/OU2): The account is created under a particular
               organizational unit (OU).

          Prerequisites

          Verify that the vSphere Client is connected to a vCenter Server system or to the host.

          Procedure

          1    Select a host in the vSphere Client inventory, and click the Configuration tab.

          2    Under Software, select Authentication Services and click Properties.

          3    In the Directory Services Configuration dialog box, select the type of authentication from the drop-down
               menu.

               Option                                 Description
               If you select Active Directory         Enter a domain in the form of name.tld or name.tld/container/path
                                                      and click Join Domain.
               If the host is already using a         Select Leave Domain to leave the domain and join another.
               directory service


          4    Enter the user name and password of an Active Directory user who has permissions to join the host to the
               domain, and click OK.

          5    Click OK to close the Directory Services Configuration dialog box.


      Use Host Profiles to Apply Permissions to Hosts
          When you join a host to an Active Directory domain, you must define roles on the host for a user or group in
          that domain. Otherwise, the host is not accessible to Active Directory users or groups. You can use host profiles
          to set a required role for a user or group and to apply the change to one or more hosts.

          Prerequisites

          You must have an existing host profile. See “Creating a Host Profile,” on page 218.

          Verify that the hosts to which you apply a profile are in maintenance mode.

          Procedure

          1    Using the vSphere Client, select View > Management > Host Profiles.

          2    Right-click an existing host profile and select Edit Profile.

          3    Expand the profile tree, and then expand Security configuration.

          4    Right-click the Permission rules folder and select Add Profile.

          5    Expand Permission rules and select Permission.

          6    On the Configuration Details tab in the right pane, click the Configure a permission drop-down menu
               and select Require a Permission Rule.


180                                                                                                               VMware, Inc.
Chapter 13 Authentication and User Management




          7    Enter the name of a user and group.

               Use the format DOMAINname, where DOMAIN is the name of the Active Directory domain and name is the user
               name or group name.

          8    (Optional) If the name you entered is a group (not a single user), select the Name refers to a group of users
               check box.

          9    Enter the assigned role name for the user or group (usually Admin).

               The role name is case-sensitive. If this is a system role, you must use the nonlocalized role name. For
               example, for the Administrator role, enter Admin. For the Read-only role, enter ReadOnly.

          10   Select the Propagate permission check box and click OK.

          What to do next

          1    Attach the profile to the hosts as described in “Attach Entities from the Host,” on page 222.

          2    Apply the profile to the hosts as described in “Apply a Profile from the Host,” on page 223.


Encryption and Security Certificates for ESX
          ESX supports SSL v3 and TLS v1, generally referred to here as SSL. If SSL is enabled, data is private, protected,
          and cannot be modified in transit without detection.

          All network traffic is encrypted as long as the following conditions are true:
          n    You did not change the Web proxy service to allow unencrypted traffic for the port.
          n    Your service console firewall is configured for medium or high security.

          Host certificate checking is enabled by default and SSL certificates are used to encrypt network traffic.
          However, ESX uses automatically generated certificates that are created as part of the installation process and
          stored on the host. These certificates are unique and make it possible to begin using the server, but they are
          not verifiable and are not signed by a trusted-well-known certificate authority (CA). These default certificates
          are vulnerable to possible man-in-the-middle attacks.

          To receive the full benefit of certificate checking, particularly if you intend to use encrypted remote connections
          externally, install new certificates that are signed by a valid internal certificate authority or purchase a certificate
          from a trusted security authority.

          NOTE If the self-signed certificate is used, clients receive a warning about the certificate. To address this issue,
          install a certificate that is signed by a recognized certificate authority. If CA-signed certificates are not installed,
          all communication between vCenter Server and vSphere Clients is encrypted using a self-signed certificate.
          These certificates do not provide the authentication security you might need in a production environment.

          The default location for your certificate is /etc/vmware/ssl/ on the ESX host. The certificate consists of two
          files: the certificate itself (rui.crt) and the private-key file (rui.key).


   Enable Certificate Checking and Verify Host Thumbprints
          To prevent man-in-the-middle attacks and to fully use the security that certificates provide, certificate checking
          is enabled by default. You can verify that certificate checking is enabled in the vSphere Client.

          NOTE vCenter Server certificates are preserved across upgrades.

          Procedure

          1    Log in to a vCenter Server system using the vSphere Client.

          2    Select Administration > vCenter Server Settings.




VMware, Inc.                                                                                                                    181
ESX Configuration Guide




          3    Click SSL Settings in the left pane and verify that Check host certificates is selected.

          4    If there are hosts that require manual validation, compare the thumbprints listed for the hosts to the
               thumbprints in the host console.

               To obtain the host thumbprint for ESX, run the following command.

               openssl x509 -in /etc/vmware/ssl/rui.crt -fingerprint -sha1 -noout

          5    If the thumbprint matches, select the Verify check box next to the host.

               Hosts that are not selected will be disconnected after you click OK.

          6    Click OK.


      Generate New Certificates for the ESX Host
          The ESX host generates certificates the first time the system is started. Under certain circumstances, you might
          be required to force the host to generate new certificates. You typically generate new certificates only if you
          change the host name or accidentally delete the certificate.

          Each time you restart the vmware-hostd process, the mgmt-vmware script searches for existing certificate files
          (rui.crt and rui.key). If it cannot find them, it generates new certificate files.

          Procedure

          1    In the directory /etc/vmware/ssl, back up any existing certificates by renaming them using the following
               commands.
               mv rui.crt orig.rui.crt
               mv rui.key orig.rui.key


               NOTE If you are regenerating certificates because you accidentally deleted them, you are not required to
               rename them.

          2    Use the following command to restart the vmware-hostd process.

               service mgmt-vmware restart

          3    Confirm that the ESX host successfully generated new certificates by using the following command and
               comparing the time stamps of the new certificate files with orig.rui.crt and orig.rui.key.
               ls -la


      Replace a Default Certificate with a CA-Signed Certificate
          The ESX host uses automatically generated certificates that are created as part of the installation process. These
          certificates are unique and make it possible to begin using the server, but they are not verifiable and they are
          not signed by a trusted, well-known certificate authority (CA).

          Using default certificates might not comply with the security policy of your organization. If you require a
          certificate from a trusted certificate authority, you can replace the default certificate.

          NOTE If the host has Verify Certificates enabled, replacing the default certificate might cause vCenter Server
          to stop managing the host. If the new certificate is not verifiable by vCenter Server, you must reconnect the
          host using the vSphere Client.




182                                                                                                              VMware, Inc.
Chapter 13 Authentication and User Management




          Procedure

          1    Log in to the service console and acquire root privileges.

          2    In the directory /etc/vmware/ssl, rename the existing certificates using the following commands.
               mv rui.crt orig.rui.crt
               mv rui.key orig.rui.key

          3    Copy the new certificate and key to /etc/vmware/ssl.

          4    Rename the new certificate and key to rui.crt and rui.key.

          5    Restart the vmware-hostd process for the certificates to take effect.
               service mgmt-vmware restart


   Configure SSL Timeouts
          You can configure SSL timeouts for ESX.

          Timeout periods can be set for two types of idle connections:
          n    The Read Timeout setting applies to connections that have completed the SSL handshake process with
               port 443 of ESX.
          n    The Handshake Timeout setting applies to connections that have not completed the SSL handshake
               process with port 443 of ESX.

          Both connection timeouts are set in milliseconds.

          Idle connections are disconnected after the timeout period. By default, fully established SSL connections have
          a timeout of infinity.

          Procedure

          1    Log in to the service console and acquire root privileges.

          2    Change to the directory /etc/vmware/hostd/.

          3    Use a text editor to open the config.xml file.

          4    Enter the <readTimeoutMs> value in milliseconds.

               For example, to set the Read Timeout to 20 seconds, enter the following command.

               <readTimeoutMs>20000</readTimeoutMs>

          5    Enter the <handshakeTimeoutMs> value in milliseconds.

               For example, to set the Handshake Timeout to 20 seconds, enter the following command.

               <handshakeTimeoutMs>20000</handshakeTimeoutMs>

          6    Save your changes and close the file.
          7    Enter the following command to restart the vmware-hostd process.

               service mgmt-vmware restart




VMware, Inc.                                                                                                                    183
ESX Configuration Guide




          Example 13-2. Configuration File
          The following section from the file /etc/vmware/hostd/config.xml shows where to enter the SSL timeout
          settings.
          <vmacore>
              ...
           <http>
                      <readTimeoutMs>20000</readTimeoutMs>
              </http>
              ...
              <ssl>
                  ...
                  <handshakeTimeoutMs>20000</handshakeTimeoutMs>
                  ...
              </ssl>
          </vmacore>


      Modifying ESX Web Proxy Settings
          When you modify Web proxy settings, you have several encryption and user security guidelines to consider.

          NOTE Restart the vmware-hostd process after making any changes to host directories or authentication
          mechanisms by entering the command service mgmt-vmware restart.

          n    Do not set up certificates using pass phrases. ESX does not support pass phrases, also known as encrypted
               keys. If you set up a pass phrase, ESX processes cannot start correctly.
          n    You can configure the Web proxy so that it searches for certificates in a location other than the default
               location. This capability proves useful for companies that prefer to centralize their certificates on a single
               machine so that multiple hosts can use the certificates.

               CAUTION If certificates are not stored locally on the host—for example, if they are stored on an NFS share
               —the host cannot access those certificates if ESX loses network connectivity. As a result, a client connecting
               to the host cannot successfully participate in a secure SSL handshake with the host.

          n    To support encryption for user names, passwords, and packets, SSL is enabled by default for vSphere Web
               Access and vSphere Web services SDK connections. To configure these connections so that they do not
               encrypt transmissions, disable SSL for your vSphere Web Access connection or vSphere Web Services SDK
               connection by switching the connection from HTTPS to HTTP.

               Consider disabling SSL only if you created a fully trusted environment for these clients, where firewalls
               are in place and transmissions to and from the host are fully isolated. Disabling SSL can improve
               performance, because you avoid the overhead required to perform encryption.
          n    To protect against misuse of ESX services, such as the internal Web server that hosts vSphere Web Access,
               most internal ESX services are accessible only through port 443, the port used for HTTPS transmission.
               Port 443 acts as a reverse proxy for ESX. You can see a list of services on ESX through an HTTP welcome
               page, but you cannot directly access these services without proper authorization.

               You can change this configuration so that individual services are directly accessible through HTTP
               connections. Do not make this change unless you are using ESX in a fully trusted environment.
          n    When you upgrade vCenter Server and vSphere Web Access, the certificate remains in place. If you remove
               vCenter Server and vSphere Web Access, the certificate directory is not removed from the service console.




184                                                                                                               VMware, Inc.
Chapter 13 Authentication and User Management




          Configure the Web Proxy to Search for Certificates in Nondefault Locations
          You can configure the Web proxy so that it searches for certificates in a location other than the default location.
          This is useful for companies that centralize their certificates on a single machine so that multiple hosts can use
          the certificates.

          Procedure

          1    Log in to the service console and acquire root privileges.

          2    Change to the /etc/vmware/hostd/ directory.

          3    Use a text editor to open the proxy.xml file and find the following XML segment.
               <ssl>
               <!-- The server private key file -->
               <privateKey>/etc/vmware/ssl/rui.key</privateKey>
               <!-- The server side certificate file -->
               <certificate>/etc/vmware/ssl/rui.crt</certificate>
               </ssl>

          4    Replace /etc/vmware/ssl/rui.key with the absolute path to the private key file that you received from
               your trusted certificate authority.

               This path can be on the ESX host or on a centralized machine on which you store certificates and keys for
               your company.

               NOTE Leave the <privateKey> and </privateKey> XML tags in place.

          5    Replace /etc/vmware/ssl/rui.crt with the absolute path to the certificate file that you received from your
               trusted certificate authority.

               CAUTION Do not delete the original rui.key and rui.crt files. The ESX host uses these files.


          6    Save your changes and close the file.

          7    Enter the following command to restart the vmware-hostd process.
               service mgmt-vmware restart


          Change Security Settings for a Web Proxy Service
          You can change the security configuration so that individual services are directly accessible through HTTP
          connections.

          Procedure

          1    Log in to the service console and acquire root privileges.

          2    Change to the /etc/vmware/hostd/directory.




VMware, Inc.                                                                                                                185
ESX Configuration Guide




          3    Use a text editor to open the proxy.xml file.

               The contents of the file typically appears as follows.
               <ConfigRoot>
               <EndpointList>
               <_length>10</_length>
               <_type>vim.ProxyService.EndpointSpec[]</_type>
               <e id="0">
               <_type>vim.ProxyService.LocalServiceSpec</_type>
               <accessMode>httpsWithRedirect</accessMode>
               <port>8309</port>
               <serverNamespace>/</serverNamespace>
               </e>
               <e id="1">
               <_type>vim.ProxyService.LocalServiceSpec</_type>
               <accessMode>httpAndHttps</accessMode>
               <port>8309</port>
               <serverNamespace>/client/clients.xml</serverNamespace>
               </e>
               <e id="2">
               <_type>vim.ProxyService.LocalServiceSpec</_type>
               <accessMode>httpAndHttps</accessMode>
               <port>12001</port>
               <serverNamespace>/ha-nfc</serverNamespace>
               </e>
               <e id="3">
               <_type>vim.ProxyService.NamedPipeServiceSpec</_type>
               <accessMode>httpsWithRedirect</accessMode>
               <pipeName>/var/run/vmware/proxy-mob</pipeName>
               <serverNamespace>/mob</serverNamespace>
               </e>
               <e id="4">
               <_type>vim.ProxyService.LocalServiceSpec</_type>
               <accessMode>httpAndHttps</accessMode>
               <port>12000</port>
               <serverNamespace>/nfc</serverNamespace>
               </e>
               <e id="5">
               <_type>vim.ProxyService.LocalServiceSpec</_type>
               <accessMode>httpsWithRedirect</accessMode>
               <port>8307</port>
               <serverNamespace>/sdk</serverNamespace>
               </e>
               <e id="6">
               <_type>vim.ProxyService.NamedPipeTunnelSpec</_type>
               <accessMode>httpOnly</accessMode>
               <pipeName>/var/run/vmware/proxy-sdk-tunnel</pipeName>
               <serverNamespace>/sdkTunnel</serverNamespace>
               </e>
               <e id="7">
               <_type>vim.ProxyService.LocalServiceSpec</_type>
               <accessMode>httpsWithRedirect</accessMode>
               <port>8308</port>
               <serverNamespace>/ui</serverNamespace>
               </e>




186                                                                     VMware, Inc.
Chapter 13 Authentication and User Management




               <e id="8">
               <_type>vim.ProxyService.LocalServiceSpec</_type>
               <accessMode>httpsOnly</accessMode>
               <port>8089</port>
               <serverNamespace>/vpxa</serverNamespace>
               </e>
               <e id="9">
               <_type>vim.ProxyService.LocalServiceSpec</_type>
               <accessMode>httpsWithRedirect</accessMode>
               <port>8889</port>
               <serverNamespace>/wsman</serverNamespace>
               </e>
               </EndpointList>
               </ConfigRoot>

          4    Change the security settings as required.

               For example, you might want to modify entries for services that use HTTPS to add the option of HTTP
               access.
               n   e id is an ID number for the server ID XML tag. ID numbers must be unique within the HTTP area.
               n   _type is the name of the service you are moving.
               n   accessmode is the forms of communication the service permits. Acceptable values include:
                   n    httpOnly – The service is accessible only over plain-text HTTP connections.
                   n    httpsOnly – The service is accessible only over HTTPS connections.
                   n    httpsWithRedirect – The service is accessible only over HTTPS connections. Requests over HTTP
                        are redirected to the appropriate HTTPS URL.
                   n    httpAndHttps – The service is accessible both over HTTP and HTTPS connections.
               n   port is the port number assigned to the service. You can assign a different port number to the service.
               n   serverNamespace is the namespace for the server that provides this service, for example /sdk or /mob.

          5    Save your changes and close the file.

          6    Enter the following command to restart the vmware-hostd process:
               service mgmt-vmware restart

          Example 13-3. Setting Up vSphere Web Access to Communicate Through an Insecure Port
          vSphere Web Access normally communicates with an ESX host through a secure port (HTTPS, 443). If you are
          in a fully trusted environment, you might decide that you can almost permit an insecure port (for example,
          HTTP, 80). To do so, change the accessMode attribute for the Web server in proxy.xml file. In the following
          result, the access mode is changed from httpsWithRedirect to httpAndHttps.
          <_type>vim.ProxyService.LocalServiceSpec</_type>
          <accessMode>httpAndHttps</accessMode>
          <port>8080</port>
          <serverNamespace>/ui</serverNamespace>




VMware, Inc.                                                                                                              187
ESX Configuration Guide




188                       VMware, Inc.
Service Console Security                                                                                    14
          VMware has basic security recommendations for using the service console, including how to use some of the
          service console’s built-in security features. The service console is a management interface to ESX and, as such,
          its security is critical. To protect the service console against unauthorized intrusion and misuse, VMware
          imposes constraints on several service console parameters, settings, and activities.

          This chapter includes the following topics:
          n    “General Security Recommendations,” on page 189
          n    “Log In to the Service Console,” on page 190
          n    “Service Console Firewall Configuration,” on page 190
          n    “Password Restrictions,” on page 194
          n    “Cipher Strength,” on page 200
          n    “setuid and setgid Flags,” on page 200
          n    “SSH Security,” on page 202
          n    “Security Patches and Security Vulnerability Scanning Software,” on page 203


General Security Recommendations
          To protect the service console against unauthorized intrusion and misuse, VMware imposes constraints on
          several service console parameters, settings, and activities. You can loosen the constraints to meet your
          configuration needs, but if you do so, make sure that you are working in a trusted environment and have taken
          enough other security measures to protect the network as a whole and the devices connected to the ESX host.

          Consider the following recommendations when evaluating service console security and administering the
          service console.
          n    Limit user access.

               To improve security, restrict user access to the service console and enforce access security policies like
               setting up password restrictions—for example, character length, password aging limits, and using a grub
               password for booting the host.

               The service console has privileged access to certain parts of ESX. Therefore, provide only trusted users
               with login access. By default, root access is limited by not allowing secure shell (SSH) login as the root
               user. Strongly consider keeping this default. Require ESX system administrators to log in as regular users
               and then use the sudo command to perform specific tasks that require root privileges.

               Also, try to run as few processes on the service console as possible. Ideally, strive to run only the essential
               processes, services, and agents such as virus checkers, virtual machine backups, and so forth.
          n    Use vSphere Client to administer your ESX hosts.



VMware, Inc.                                                                                                              189
ESX Configuration Guide




               Whenever possible, use vSphere Client, vSphere Web Access, or a third-party network management tool
               to administer your ESX hosts instead of working though the command-line interface as the root user.
               Using vSphere Client lets you limit the accounts with access to the service console, safely delegate
               responsibilities, and set up roles that prevent administrators and users from using capabilities they do not
               need.
          n    Use only VMware sources to upgrade ESX components that you run on the service console.

               The service console runs a variety of third-party packages, such as the Tomcat Web service, to support
               management interfaces or tasks that you must perform. VMware does not support upgrading these
               packages from anything other than a VMware source. If you use a download or patch from another source,
               you might compromise service console security or functions. Regularly check third-party vendor sites and
               the VMware knowledge base for security alerts.


Log In to the Service Console
          Although you perform most ESX configuration activities through the vSphere Client, you use the service
          console command-line interface when you configure certain security features. Using the command-line
          interface requires that you log in to the host.

          Procedure

          1    Log in to the ESX host using one of the following methods.
               n     If you have direct access to the host, press Alt+F2 to open the login page on the machine's physical
                     console.
               n     If you are connecting to the host remotely, use SSH or another remote console connection to start a
                     session on the host.

          2    Enter a user name and password recognized by the ESX host.

               If you are performing activities that require root privileges, log in to the service console as a recognized
               user and acquire root privileges through the sudo command, which provides enhanced security compared
               to the su command.

          What to do next

          In addition to ESX-specific commands, you can use the service console command-line interface to run many
          Linux and UNIX commands. For more information about service console commands, use the man command_name
          command to check for man pages.


Service Console Firewall Configuration
          ESX includes a firewall between the service console and the network. To ensure the integrity of the service
          console, VMware has reduced the number of firewall ports that are open by default.

          At installation time, the service console firewall is configured to block all incoming and outgoing traffic, except
          for ports 22, 123, 427, 443, 902, 5989, 5988, which are used for basic communication with ESX. This setting
          enforces a high level of security for the host.

          NOTE The firewall also allows Internet Control Message Protocol (ICMP) pings and communication with
          DHCP and DNS (UDP only) clients.




190                                                                                                               VMware, Inc.
Chapter 14 Service Console Security




          In trusted environments, you might decide that a lower security level is acceptable. If so, you can set the firewall
          for either medium or low security.

          Medium security                 All incoming traffic is blocked, except on the default ports and any ports you
                                          specifically open. Outgoing traffic is not blocked.

          Low security                    There are no blocks on either incoming or outgoing traffic. This setting is
                                          equivalent to removing the firewall.

          Because the ports open by default are strictly limited, you might be required to open additional ports after
          installation. For a list of commonly used ports that you might open, see “TCP and UDP Ports for Management
          Access,” on page 157.

          As you add the supported services and management agents required to operate ESX effectively, you open
          other ports in the service console firewall. You add services and management agents through vCenter Server
          as described in “Configuring Firewall Ports for Supported Services and Management Agents,” on page 154.

          In addition to the ports you open for these services and agents, you might open other ports when you configure
          certain devices, services, or agents such as storage devices, backup agents, and management agents. For
          example, if you are using Veritas NetBackup™ 4.5 as a backup agent, open ports 13720, 13724, 13782, and
          13783, which NetBackup uses for client-media transactions, database backups, user backups or restores, and
          so forth. To determine which ports to open, see vendor specifications for the device, service, or agent.

          NOTE Do not modify default firewall rules for the service console using any command or utility other than
          esxcfg-firewall. If you modify the defaults by using a Linux command, your changes will be ignored and
          overwritten by the defaults specified for that service by the esxcfg-firewall command.


   Determine the Service Console Firewall Security Level
          Altering the security level for the service console is a two-part process: determining the service console firewall
          security level and resetting the service console firewall setting. To prevent unnecessary steps, always check
          the firewall setting before you change it.

          Procedure

          1    Log in to the service console and acquire root privileges.

          2    Use the following two commands to determine whether incoming and outgoing traffic is blocked or
               allowed.
               esxcfg-firewall -q incoming
               esxcfg-firewall -q outgoing

          Interpret the results according to Table 14-1.

          Table 14-1. Service Console Firewall Security Levels
          Command Line Response                                                                 Security Level

          Incoming ports blocked by default.                                                    High
          Outgoing ports blocked by default.

          Incoming ports blocked by default.                                                    Medium
          Outgoing ports not blocked by default.

          Incoming ports not blocked by default.                                                Low
          Outgoing ports not blocked by default.




VMware, Inc.                                                                                                                  191
ESX Configuration Guide




      Set the Service Console Firewall Security Level
          After you determine the level of firewall security for the service console, you can set the security level. Each
          time you lower your security setting or open additional ports, you increase the risk of intrusion in your network.
          Balance your access needs against how tightly you want to control the security of the network.

          Procedure

          1    Log in to the service console and acquire root privileges.

          2    Run one of the following commands to set the service console firewall security level.
               n     To set the service console firewall to medium security:
                     esxcfg-firewall --allowOutgoing --blockIncoming

               n     To set the virtual firewall to low security:
                     esxcfg-firewall --allowIncoming --allowOutgoing

                     CAUTION Using the preceding command disables all firewall protection.


               n     To return the service console firewall to high security:
                     esxcfg-firewall --blockIncoming --blockOutgoing

          3    Use the following command to restart the vmware-hostd process.
               service mgmt-vmware restart

          Changing the service console firewall security level does not affect existing connections. For example, if the
          firewall is set to low security and a backup is running on a port you did not explicitly open, raising the firewall
          setting to high does not terminate the backup. The backup completes, releases the connection, and no further
          connections are accepted for the port.


      Open a Port in the Service Console Firewall
          You can open service console firewall ports when you install third-party devices, services, and agents. Before
          you open ports to support the item you are installing, see vendor specifications to determine the necessary
          ports.

          Prerequisites

          Use this procedure only to open ports for services or agents that are not configurable through the vSphere
          Client.

          CAUTION VMware supports opening and closing firewall ports only through the vSphere Client or the esxcfg-
          firewall command. Using any other methods or scripts to open firewall ports can lead to unexpected behavior.




192                                                                                                               VMware, Inc.
Chapter 14 Service Console Security




          Procedure

          1    Log in to the service console and acquire root privileges.

          2    Use the following command to open the port.
               esxcfg-firewall --openPort port_number,tcp|udp,in|out,port_name

               n   port_number is the vendor-specified port number.
               n   Use tcp for TCP traffic or udp for UDP traffic.
               n   Use in to open the port for inbound traffic or out to open it for outbound traffic.
               n   port_name is a descriptive name to help identify the service or agent using the port. A unique name
                   is not required.

               For example:
               esxcfg-firewall --openPort 6380,tcp,in,Navisphere

          3    Run the following command to restart the vmware-hostd process.
               service mgmt-vmware restart


   Close a Port in the Service Console Firewall
          You can close particular ports in the service console firewall. If you close a port, active sessions of the service
          associated with the port are not necessarily disconnected when you close the port. For example, if a backup is
          executing and you close the port for the backup agent, the backup continues until it completes and the agent
          releases the connection.

          You can use the -closePort option to close only those ports that you opened with the -openPort option. If you
          used a different method to open the port, use an equivalent method to close it. For example, you can close the
          SSH port (22) only by disabling the SSH server incoming connection and SSH client outgoing connection in
          the vSphere Client.

          Prerequisites

          Use this procedure only to close ports for services or agents not specifically configurable through the vSphere
          Client.

          CAUTION VMware supports opening and closing firewall ports only through the vSphere Client or the esxcfg-
          firewall command. Using any other methods or scripts to open and close firewall ports can lead to unexpected
          behavior.

          Procedure

          1    Log in to the service console and acquire root privileges.

          2    Use the following command to close the port.
               esxcfg-firewall --closePort port_number,tcp|udp,in|out,port_name

               The port_name argument is optional.

               For example:
               esxcfg-firewall --closePort 6380,tcp,in

          3    Use the following command to restart the vmware-hostd process.
               service mgmt-vmware restart




VMware, Inc.                                                                                                                 193
ESX Configuration Guide




      Troubleshooting When Firewalls are Overwritten
          When firewall rules are changed after VMware High Availability (HA) traffic, migration, cloning, patching,
          or vMotion, you might need to configure the firewall defaults for esxcfg-firewall.

          Modifying firewall default rules for the service console using any command or utility other than esxcfg-
          firewall is not supported. If you modify default rules and then attempt to access the service console through
          the firewall with any tools or utilities, the firewall might revert to its default configuration when your actions
          are complete. For example, configuring HA on a host causes the firewall to revert to the default configuration
          specified by esxcfg-firewall if you have modified the rules by using a command other than esxcfg-
          firewall.

          In most cases, you do not need to change default firewall rules for the service console. If you modify the defaults
          by using a Linux command, your changes will be ignored and overwritten by the defaults specified for that
          service by the esxcfg-firewall command. If you want to change the defaults for a supported service, or define
          defaults for additional service types, you can modify or add to the rules in /etc/vmware/firewall/chains/
          default.xml.

          Procedure

          1    Log in to the service console with administrator privileges.

          2    Edit the /etc/vmware/firewall/chains/default.xml file to correspond to your security policies.

          3    Restart the service console firewall by using service firewall restart command.

          4    Use the esxcfg-firewall-e|d SERVICE command to check that the specified services are correctly enabled
               or disabled.

          Example 14-1. Modifying the INPUT Chain
          You can modify the firewall defaults for each of the service types according to your own security policies. For
          example, the following rules in the /etc/vmware/firewall/chains/default.xml file determine the firewall rules
          for the INPUT chain:
          <ConfigRoot>
            <chain name="INPUT">
              <rule>-p tcp --dport 80 -j ACCEPT</rule>
              <rule>-p tcp --dport 110 -j ACCEPT</rule>
              <rule>-p tcp --dport 25 -j ACCEPT</rule>
            </chain>...
          </ConfigRoot>



Password Restrictions
          The ease with which an attacker can log in to an ESX host depends on finding a legitimate user name and
          password combination. You can set password restrictions to help prevent attackers from obtaining user
          passwords.

          A malicious user can obtain a password in a number of ways. For example, an attacker can sniff insecure
          network traffic, such as Telnet or FTP transmissions, for successful login attempts. Another common method
          is to crack the password by running a password generator to try every character combination up to a certain
          length or use real words and simple mutations of real words.




194                                                                                                               VMware, Inc.
Chapter 14 Service Console Security




          Implementing restrictions that govern the length, character sets, and duration of passwords can make attacks
          that a password generator initiates more difficult. The longer and more complex the password, the harder it
          is for an attacker to discover. The more often users have to change passwords, the more difficult it is to find a
          password that works repeatedly.

          NOTE Always consider the human factor when you decide how to implement password restrictions. If you
          make passwords too hard to remember or enforce frequent password changes, your users might be inclined
          to write down their passwords, which eliminates any benefit.

          To help protect your password database from misuse, password shadowing is enabled so that password hashes
          are hidden from access. Also, ESX uses MD5 password hashes, which provide stronger password security and
          lets you set minimum length requirements to more than eight characters.


   Password Aging
          You can impose password aging restrictions to ensure that user passwords do not stay active for long periods.

          ESX imposes the following password aging restrictions for user logins by default.

          Maximum days                   The number of days that a user can keep a password. By default, passwords
                                         are set to never expire.

          Minimum days                   The minimum number of days between password changes. The default is 0,
                                         meaning that the users can change their passwords any time.

          Warning time                   The number of days in advance of password expiration that a reminder is sent.
                                         The default is seven days. Warnings are only displayed when logging directly
                                         in to the service console or when using SSH.

          You can tighten or loosen any of these settings. You can also override the default password aging settings for
          an individual user or group.

          Change Default Password Aging Restrictions for a Host
          You can impose stricter or looser password aging restrictions for a host than those provided by default.

          Procedure

          1    Log in to the service console and acquire root privileges.

          2    To change the maximum number of days a user can keep a password, use the following command.
               esxcfg-auth --passmaxdays=number_of_days

          3    To change the minimum number of days between password changes, use the following command.
               esxcfg-auth --passmindays=number_of_days

          4    To change the warning time before a password change, use the following command.
               esxcfg-auth --passwarnage=number_of_days


          Change Default Password Aging Restrictions for Users
          You can override the default password aging restrictions for particular users or groups.

          Procedure

          1    Log in to the service console and acquire root privileges.

          2    To change the maximum number of days, use the following command.
               chage -M number_of_days username




VMware, Inc.                                                                                                               195
ESX Configuration Guide




          3    To change the warning time, use the following command.
               chage -W number_of_days username

          4    To change the minimum number of days, use the following command.
               chage -m number_of_days username


      Password Strength and Complexity
          By default, ESX uses the pam_passwdqc.so plug-in to set the rules that users must observe when creating
          passwords and to check password strength.

          The pam_passwdqc.so plug-in lets you determine the basic standards that all passwords must meet. By default,
          ESX imposes no restrictions on the root password. However, when nonroot users attempt to change their
          passwords, the passwords they choose must meet the basic standards that pam_passwdqc.so sets.

          A valid password should contain a combination of as many character classes as possible. Character classes
          include lowercase letters, uppercase letters, numbers, and special characters such as an underscore or dash.

          NOTE When the number of character classes is counted, the plug-in does not count uppercase letters used as
          the first character in the password and numbers used as the last character of a password.

          To configure password complexity, you can change the default value of the following parameters.
          n    N0 is the number of characters required for a password that uses characters from only one character class.
               For example, the password contains only lowercase letters.
          n    N1 is the number of characters required for a password that uses characters from two character classes.
          n    N2 is used for passphrases. ESX requires three words for a passphrase. Each word in the passphrase must
               be 8-40 characters long.
          n    N3 is the number of characters required for a password that uses characters from three character classes.
          n    N4 is the number of characters required for a password that uses characters from all four character classes.
          n    match is the number of characters allowed in a string that is reused from the old password. If the
               pam_passwdqc.so plug-in finds a reused string of this length or longer, it disqualifies the string from the
               strength test and uses only the remaining characters.

          Setting any of these options to -1 directs the pam_passwdqc.so plug-in to ignore the requirement.

          Setting any of these options to disabled directs the pam_passwdqc.so plug-in to disqualify passwords with the
          associated characteristic. The values used must be in descending order except for -1 and disabled.

          NOTE The pam_passwdqc.so plug-in used in Linux provides more parameters than the parameters supported
          for ESX. You cannot specify these additional parameters in esxcfg-auth.

          For more information on the pam_passwdqc.so plug-in, see your Linux documentation.

          Change Default Password Complexity for the pam_passwdqc.so Plug-In
          Configure the pam_passwdqc.so plug-in to determine the basic standards all passwords must meet.

          Procedure

          1    Log in to the service console and acquire root privileges.

          2    Enter the following command.
               esxcfg-auth --usepamqc=N0N1N2N3N4match




196                                                                                                             VMware, Inc.
Chapter 14 Service Console Security




          Example 14-2. esxcfg-auth --usepamqc Command
          For example, you use the following command.
          esxcfg-auth --usepamqc=disabled 18 -1 12 8

          With this setting in effect, a user creating a password would never be able to set passwords that contain only
          one character class. The user needs to use at least 18 characters for a password with a two-character class, 12
          characters for a three-character class password, and eight characters for four-character class passwords.
          Attempts to create passphrases are ignored.


          Configure a Password Reuse Rule
          You can set the number of old passwords that are stored for each user.

          Procedure

          1    Log in to the service console and acquire root privileges.

          2    Change to the directory /etc/pam.d/.

          3    Use a text editor to open the system-auth-generic file.

          4    Locate the line that starts with password sufficient /lib/security/$ISA/pam_unix.so.

          5    Add the following parameter to the end of the line, where X is the number of old passwords to store for
               each user.
               remember=X

               Use a space between parameters.

          6    Save your changes and close the file.

          7    Change to the directory /etc/security/ and use the following command to make a zero (0) length file with
               opasswd as the filename.

               touch opasswd

          8    Enter the following commands:
               chmod 0600 opasswd
               chown root:root /etc/security/opasswd


          Using the pam_cracklib.so Authentication Plug-In
          The default authentication plug-in for ESX is pam_passwdqc.so, which provides stringent password strength
          enforcement for most environments. If the plug-in is not appropriate for your environment, you can use the
          pam_cracklib.so plug-in instead.

          The pam_cracklib.so plug-in checks all password change attempts to ensure that passwords meet the strength
          criteria.
          n    The new password must not be a palindrome. A palindrome is a term where the characters mirror each
               other around a central letter, as in radar or civic.
          n    The new password must not be the reverse of the old password.
          n    The new password must not be a rotation. A rotation is a version of the old password in which one or
               more characters have been rotated to the front or back of the password string.
          n    The new password must differ from the old password by more than a change of case.
          n    The new password must differ from the old password by more than a few characters.
          n    The new password must not have been used in the past. The pam_cracklib.so plug-in applies this criterion
               only if you have configured a password reuse rule.



VMware, Inc.                                                                                                              197
ESX Configuration Guide




               By default, ESX does not enforce any password reuse rules, so the pam_cracklib.so plug-in never rejects
               a password change attempt on these grounds. However, you can configure a reuse rule to ensure that
               your users do not alternate between a few passwords.

               If you configure a reuse rule, old passwords are stored in a file that the pam_cracklib.so plug-in references
               during each password change attempt. The reuse rules determine the number of old passwords that ESX
               retains. When a user creates enough passwords to reach the value specified in the reuse rule, old passwords
               are removed from the file in age order.
          n    The new password must be long enough and complex enough to meet the requirements of the plug-in.
               Configure these requirements by changing the pam_cracklib.so complexity parameters with the esxcfg-
               auth command, which lets you set the number of retries, the minimum password length, and a variety of
               character credits.

          To set password complexity with the pam_cracklib.so plug-in, you can assign values to the credit parameters
          for each of the following character classes:
          n    lc_credit represents lowercase letters
          n    uc_credit represents uppercase letters
          n    d_credit represents numbers
          n    oc_credit represents special characters, such as underscore or dash

          Credits add to a password's complexity score. A user's password must meet or exceed the minimum score,
          which you define using the minimum_length parameter.

          NOTE The pam_cracklib.so plug-in does not accept passwords less than six characters, regardless of credits
          used and regardless of the value that you assign to minimum_length. In other words, if minimum_length is 5,
          users must still enter no fewer than six characters.

          To determine whether or not a password is acceptable, the pam_cracklib.so plug-in uses several rules to
          calculate the password score.
          n    Each character in the password, regardless of type, counts as one against minimum_length.
          n    Nonzero values in the credit parameters affect password complexity differently depending on whether
               negative or positive values are used.
               n     For positive values, add one credit for the character class, up to the maximum number of credits
                     specified by the credit parameter.

                     For example, if lc_credit is 1, add one credit for using a lowercase letter in the password. In this case,
                     one is the maximum number of credits allowed for lowercase letters, regardless of how many are
                     used.
               n     For negative values, do not add credit for the character class, but require that the character class is
                     used a minimum number of times. The minimum number is specified by the credit parameter.

                     For example, if uc_credit is -1, passwords must contain at least one uppercase character. In this case,
                     no extra credit is given for using uppercase letters, regardless of how many are used.
          n    Character classes with a value of zero count toward the total length of the password, but do not receive
               extra credit, nor are they required. You can set all character classes to zero to enforce password length
               without considering complexity.

               For example, the passwords xyzpqets and Xyzpq3#s would each have a password score of eight.




198                                                                                                                 VMware, Inc.
Chapter 14 Service Console Security




          Switch to the pam_cracklib.so Plug-In

          Compared to pam_passwdqc.so, the pam_cracklib.so plug-in provides fewer options to fine-tune password
          strength and does not perform password strength tests for all users. However, if the pam_cracklib.so plug-in
          better suits your environment, you can switch from the default pam_passwdqc.so plug-in to pam_cracklib.so.

          NOTE The pam_cracklib.so plug-in used in Linux provides more parameters than the parameters supported
          for ESX. You cannot specify these additional parameters in esxcfg-auth. For more information about this plug-
          in, see your Linux documentation.

          Procedure

          1    Log in to the service console and acquire root privileges.

          2    Run the following command.
               esxcfg-auth --usecrack=retriesminimum_lengthlc_credituc_creditd_creditoc_credit

               n   retries: number of retries users are allowed before they are locked out.
               n   minimum_length: minimum password score, or effective length, after credits have been applied.

                   NOTE The pam_cracklib.so plug-in does not accept passwords less than six characters, regardless of
                   credits used and regardless of the value that you assign to minimum_length. In other words, if
                   minimum_length is 5, users must still enter no fewer than six characters.

               n   lc_credit: maximum number of credits allowed for lowercase letters.
               n   uc_credit: maximum number of credits allowed for uppercase letters.
               n   d_credit: maximum number of credits allowed for numbers.
               n   oc_credit: maximum number of credits allowed for special characters, such as underscore or dash.

          The password requirements for the plug-in are configured according to the parameters you entered.

          Example 14-3. esxcfg-auth --usecrack Command

          esxcfg-auth --usecrack=3 9 1 -1 -1 1

          n    Users are allowed three attempts to enter their password before they are locked out.
          n    The password score must be nine.
          n    Up to one credit is given for using lowercase letters.
          n    At least one uppercase letter is required. No extra credit is given for this character type.
          n    At least one number is required. No extra credit is given for this character type.
          n    Up to one credit is given for using special characters.
          Using these sample values, the password candidate xyzpqe# would fail:
          (x + y + z + p +q + e + #) + (lc_credit + oc_credit) = 9
          While the password score is nine, it does not contain the required uppercase letter and number.
          The password candidate Xyzpq3# would be accepted:
          (X + y + z + p +q + 3 + #) + (lc_credit + oc_credit) = 9
          The password score for this example is also nine, but this password includes the required uppercase letter and
          number. The uppercase letter and number do not add extra credit.




VMware, Inc.                                                                                                                 199
ESX Configuration Guide




Cipher Strength
          Transmitting data over insecure connections presents a security risk because malicious users might be able to
          scan data as it travels through the network. As a safeguard, network components commonly encrypt the data
          so that it cannot be easily read.

          To encrypt data, the sending component, such as a gateway or redirector, applies algorithms, or ciphers, to
          alter the data before transmitting it. The receiving component uses a key to decrypt the data, returning it to its
          original form. Several ciphers are in use, and the level of security that each provides is different. One measure
          of a cipher’s ability to protect data is its cipher strength—the number of bits in the encryption key. The larger
          the number, the more secure the cipher.

          To ensure the protection of the data transmitted to and from external network connections, ESX uses one of
          the strongest block ciphers available—256-bit AES block encryption. ESX also uses 1024-bit RSA for key
          exchange. These encryption algorithms are the default for the following connections.
          n    vSphere Client connections to vCenter Server and to the ESX host through the service console.
          n    vSphere Web Access connections to the ESX host through the service console.

               NOTE Because use of vSphere Web Access ciphers is determined by the Web browser you are using, this
               management tool might use other ciphers.

          n    SDK connections to vCenter Server and to ESX.
          n    Service console connections to virtual machines through the VMkernel.
          n    SSH connections to the ESX host through the service console.


setuid and setgid Flags
          During ESX installation, several applications that include the setuid and setgid flags are installed by default.
          Some of the applications provide facilities required for correct operation of the host. Others are optional, but
          they can make maintaining and troubleshooting the host and the network easier.

          setuid                         A flag that allows an application to temporarily change the permissions of the
                                         user running the application by setting the effective user ID to the program
                                         owner’s user ID.

          setgid                         A flag that allows an application to temporarily change the permissions of the
                                         group running the application by setting the effective group ID to the program
                                         owner’s group ID.


      Disable Optional Applications
          Disabling any of the required applications results in problems with ESX authentication and virtual machine
          operation, but you can disable any optional application.

          Optional applications are listed in Table 14-2 and Table 14-3.




200                                                                                                              VMware, Inc.
Chapter 14 Service Console Security




          Procedure

          1      Log in to the service console and acquire root privileges.

          2      Run one of the following commands to disable the application.
                 n   For setuid flagged applications:
                     chmod a-s path_to_executable_file

                 n   For setgid flagged applications:
                     chmod a-g path_to_executable_file


   Default setuid Applications
          Several applications that include the setuid flag are installed by default.

          Table 14-2 lists the default setuid applications and indicates whether the application is required or optional.

          Table 14-2. Default setuid Applications
          Application                       Purpose and Path                                                   Required or Optional

          crontab                           Lets individual users add cron jobs.                               Optional
                                            Path: /usr/bin/crontab

          pam_timestamp_check               Supports password authentication.                                  Required
                                            Path: /sbin/pam_timestamp_check

          passwd                            Supports password authentication.                                  Required
                                            Path: /usr/bin/passwd

          ping                              Sends and listens for control packets on the network interface.    Optional
                                            Useful for debugging networks.
                                            Path: /bin/ping

          pwdb_chkpwd                       Supports password authentication.                                  Required
                                            Path: /sbin/pwdb_chkpwd

          ssh-keysign                       Performs host-based authentication for SSH.                        Required if you use
                                            Path: /usr/libexec/openssh/ssh-keysign                             host-based
                                                                                                               authentication.
                                                                                                               Otherwise optional.
          su                                Lets a general user become the root user by changing users.        Required
                                            Path: /bin/su

          sudo                              Lets a general user act as the root user only for specific         Optional
                                            operations.
                                            Path: /usr/bin/sudo

          unix_chkpwd                       Supports password authentication.                                  Required
                                            Path: /sbin/unix_chkpwd

          vmkload_app                       Performs tasks required to run virtual machines. This              Required in both paths
                                            application is installed in two locations: one for standard use
                                            and one for debugging.
                                            Path for standard use: /usr/lib/vmware/bin/vmkload_app
                                            Path for debugging: /usr/lib/vmware/bin-debug/
                                            vmkload_app




VMware, Inc.                                                                                                                        201
ESX Configuration Guide




          Table 14-2. Default setuid Applications (Continued)
          Application                       Purpose and Path                                                  Required or Optional

          vmware-authd                      Authenticates users for use of services specific to VMware.       Required
                                            Path: /usr/sbin/vmware-authd

          vmware-vmx                        Performs tasks required to run virtual machines. This             Required in both paths
                                            application is installed in two locations: one for standard use
                                            and one for debugging.
                                            Path for standard use: /usr/lib/vmware/bin/vmware-vmx
                                            Path for debugging: /usr/lib/vmware/bin-debug/vmware-
                                            vmk



      Default setgid Applications
          Two applications that include the setgid flag are installed by default.

          Table 14-3 lists the default setgid applications and indicates whether the application is required or optional.

          Table 14-3. Default setgid Applications
          Application                       Purpose and Path                                                  Required or Optional

          wall                              Alerts all terminals that an action is about to occur. This       Optional
                                            application is called by shutdown and other commands.
                                            Path: /usr/bin/wall

          lockfile                          Performs locking for the Dell OM management agent.                Required for Dell OM
                                            Path: /usr/bin/lockfile                                           but optional otherwise




SSH Security
          SSH is a commonly used Unix and Linux command shell that lets you remotely log in to the service console
          and perform certain management and configuration tasks for the host. SSH is used for secure logins and data
          transfers because it offers stronger protection than other command shells.

          In this ESX release, the SSH configuration is enhanced to provide a higher security level. This enhancement
          includes the following key features.
          n      Version 1 SSH protocol disabled – VMware no longer supports Version 1 SSH protocol and uses Version
                 2 protocol exclusively. Version 2 eliminates certain security issues present in Version 1 and provides you
                 with a safer communications interface to the service console.
          n      Improved cipher strength – SSH now supports only 256-bit and 128-bit AES ciphers for your connections.
          n      Limits on remote logins as root – You can no longer remotely log in as root. Instead, you log in as an
                 identifiable user and either use the sudo command to run specific operations that require root privileges
                 or enter the su command to become the root user.

                 NOTE The sudo command provides security benefits in that it limits root activities and helps you check
                 for possible misuse of root privileges by generating an audit trail of any root activities that the user
                 performs.

          These settings are designed to provide solid protection for the data you transmit to the service console through
          SSH. If this configuration is too rigid for your needs, you can lower security parameters.




202                                                                                                                      VMware, Inc.
Chapter 14 Service Console Security




   Change the Default SSH Configuration
          You can change the default SSH configuration.

          Procedure

          1    Log in to the service console and acquire root privileges.

          2    Change to the /etc/ssh directory.

          3    Use a text editor to perform any of the following actions in the sshd_config file.
               n   To allow remote root login, change the setting to yes in the following line.
                   PermitRootLogin no

               n   To revert to the default SSH protocol (Version 1 and 2), comment out the following line.
                   Protocol 2

               n   To revert to the 3DES cipher and other ciphers, comment out the following line.
                   Ciphers aes256-cbc,aes128-cbc

               n   To disable Secure FTP (SFTP) on SSH, comment out the following line.
                   Subsystem ftp /usr/libexec/openssh/sftp-server

          4    Save your changes and close the file.

          5    Run the following command to restart the SSHD service.
               service sshd restart


Security Patches and Security Vulnerability Scanning Software
          Certain security scanners such as Nessus check the version number but not the patch suffix as they search for
          security holes. As a result, these scanners can falsely report that software is down-level and does not include
          the most recent security patches even though it does. If this occurs, you can perform certain checks.

          This problem is common to the industry and not specific to VMware. Some security scanners can handle this
          situation correctly, but they typically lag by a version or more. For example, the version of Nessus released
          after a Red Hat patch often does not report these false positives.

          If a fix for a particular Linux-supported software package that VMware provides as a service console
          component becomes available—for example, a service, facility, or protocol—VMware provides a bulletin that
          contains a list of vSphere Installation Bundles (VIBs) that you use to update the software on ESX. Although
          these fixes might be available from other sources, always use bulletins that VMware generates instead of using
          third-party RPM Package Manager packages.

          When providing patches for a software package, the VMware policy is to backport the fix to a version of the
          software known to be stable. This approach reduces the chance of introducing new problems and instability
          in the software. Because the patch is added to an existing version of the software, the version number of the
          software stays the same, but a patch number is added as a suffix.

          The following is an example of how this problem occurs:

          1    You initially install ESX with OpenSSL version 0.9.7a (where 0.9.7a is the original version with no patches).

          2    OpenSSL releases a patch that fixes a security hole in version 0.9.7. This version is called 0.9.7x.

          3    VMware backports the OpenSSL 0.9.7x fix to the original version, updates the patch number, and creates
               a VIB. The OpenSSL version in the VIB is 0.9.7a-1, indicating that the original version (0.9.7a) now contains
               patch 1.




VMware, Inc.                                                                                                                 203
ESX Configuration Guide




          4    You install the updates.

          5    The security scanner fails to note the -1 suffix and erroneously reports that security for OpenSSL is not up
               to date.

          If your scanner reports that security for a package is down-level, perform the following checks.
          n    Look at the patch suffix to determine if you require an update.
          n    Read the VMware VIB documentation for information on the patch contents.
          n    Look for the Common Vulnerabilities and Exposures (CVE) number from the security alert in the software
               update change log.

               If the CVE number is there, the specified package addresses that vulnerability.




204                                                                                                             VMware, Inc.
Security Best Practices and Scenarios                                                                       15
          A series of ESX deployment scenarios can help you understand how best to employ the security features in
          your own deployment. Scenarios also illustrate some basic security recommendations that you can consider
          when creating and configuring virtual machines.

          This chapter includes the following topics:
          n    “Security Approaches for Common ESX Deployments,” on page 205
          n    “Virtual Machine Recommendations,” on page 209


Security Approaches for Common ESX Deployments
          You can compare security approaches for different types of deployments to help plan security for your own ESX
          deployment.

          The complexity of ESX deployments can vary significantly depending on the size of your company, the way
          that data and resources are shared with the outside world, whether there are multiple datacenters or only one,
          and so forth. Inherent in the following deployments are policies for user access, resource sharing, and security
          level.


   Single-Customer Deployment
          In a single-customer deployment, ESX hosts are owned and maintained within a single corporation and single
          datacenter. Host resources are not shared with outside users. One site administrator maintains the hosts, which
          are run on a number of virtual machines.

          The single-customer deployment does not allow customer administrators, and the site administrator is solely
          responsible for maintaining the various virtual machines. The corporation staffs a set of system administrators
          who do not have accounts on the host and cannot access any of the ESX tools such as vCenter Server or
          command line shells for the host. These system administrators have access to virtual machines through the
          virtual machine console so that they can load software and perform other maintenance tasks inside the virtual
          machines.

          Table 15-1 shows how you might handle sharing for the components that you use and configure for the host.

          Table 15-1. Sharing for Components in a Single-Customer Deployment
          Function                           Configuration        Comments

          Service console shares the same    No                   Isolate the service console by configuring it on its own
          physical network as the virtual                         physical network.
          machines?

          Service console shares the same    No                   Isolate the service console by configuring it on its own VLAN.
          VLAN as the virtual machines?                           No virtual machine or other system facility such as vMotion
                                                                  must use this VLAN.




VMware, Inc.                                                                                                                 205
ESX Configuration Guide




          Table 15-1. Sharing for Components in a Single-Customer Deployment (Continued)
          Function                              Configuration       Comments

          Virtual machines share the same       Yes                 Configure your virtual machines on the same physical
          physical network?                                         network.

          Network adapter sharing?              Partial             Isolate the service console by configuring it on its own virtual
                                                                    switch and virtual network adapter. No virtual machine or
                                                                    other system facility must use this switch or adapter.
                                                                    You can configure your virtual machines on the same virtual
                                                                    switch and network adapter.

          VMFS sharing?                         Yes                 All .vmdk files reside in the same VMFS partition.

          Security level                        High                Open ports for needed services like FTP on an individual
                                                                    basis. See “Service Console Firewall Configuration,” on
                                                                    page 190 for information on security levels.

          Virtual machine memory                Yes                 Configure the total memory for the virtual machines as
          overcommitment?                                           greater than the total physical memory.


          Table 15-2 shows how you might set up user accounts for the host.

          Table 15-2. User Account Setup in a Single-Customer Deployment
          User Category                                         Total Number of Accounts

          Site administrators                                   1

          Customer administrators                               0

          System administrators                                 0

          Business users                                        0


          Table 15-3 shows the level of access for each user.

          Table 15-3. User Access in a Single-Customer Deployment
          Access Level                                              Site Administrator           System Administrator

          Root access?                                              Yes                          No

          Service console access through SSH?                       Yes                          No

          vCenter Server and vSphere Web Access?                    Yes                          No

          Virtual machine creation and modification?                Yes                          No

          Virtual machine access through the console?               Yes                          Yes



      Multiple-Customer Restricted Deployment
          In a multiple-customer restricted deployment, ESX hosts are in the same datacenter and are used to serve
          applications for multiple customers. The site administrator maintains the hosts, and these hosts run a number
          of virtual machines dedicated to the customers. Virtual machines that belong to the various customers can be
          on the same host, but the site administrator restricts resource sharing to prevent rogue interaction.

          Although there is only one site administrator, several customer administrators maintain the virtual machines
          assigned to their customers. This deployment also includes customer system administrators who do not have
          ESX accounts but have access to the virtual machines through the virtual machine console so that they can load
          software and perform other maintenance tasks inside the virtual machines.

          Table 15-4 shows how you might handle sharing for the components you use and configure for the host.




206                                                                                                                    VMware, Inc.
Chapter 15 Security Best Practices and Scenarios




          Table 15-4. Sharing for Components in a Multiple-Customer Restricted Deployment
          Function                              Configuration         Comments

          Service console shares the same       No                    Isolate the service console by configuring it on its own physical
          physical network as the virtual                             network.
          machines?

          Service console shares the same       No                    Isolate the service console by configuring it on its own VLAN.
          VLAN as the virtual machines?                               No virtual machine or other system facility such as vMotion
                                                                      must use this VLAN.

          Virtual machines share the same       Partial               Put the virtual machines for each customer on a different
          physical network?                                           physical network. All physical networks are independent of
                                                                      each other.

          Network adapter sharing?              Partial               Isolate the service console by configuring it on its own virtual
                                                                      switch and virtual network adapter. No virtual machine or
                                                                      other system facility must use this switch or adapter.
                                                                      You configure virtual machines for one customer so that they
                                                                      all share the same virtual switch and network adapter. They do
                                                                      not share the switch and adapter with any other customers.

          VMFS sharing?                         No                    Each customer has its own VMFS partition, and the virtual
                                                                      machine .vmdk files reside exclusively on that partition. The
                                                                      partition can span multiple LUNs.

          Security level                        High                  Open ports for services like FTP as needed.

          Virtual machine memory                Yes                   Configure the total memory for the virtual machines as greater
          overcommitment?                                             than the total physical memory.


          Table 15-5 shows how you might set up user accounts for the ESX host.

          Table 15-5. User Account Setup in a Multiple-Customer Restricted Deployment
          User Category                                               Total Number of Accounts

          Site administrators                                         1

          Customer administrators                                     10

          System administrators                                       0

          Business users                                              0


          Table 15-6 shows the level of access for each user.

          Table 15-6. User Access in a Multiple-Customer Restricted Deployment
                                                                                         Customer                System
          Access Level                                          Site Administrator       Administrator           Administrator

          Root access?                                          Yes                      No                      No

          Service console access through SSH?                   Yes                      Yes                     No

          vCenter Server and vSphere Web Access?                Yes                      Yes                     No

          Virtual machine creation and modification?            Yes                      Yes                     No

          Virtual machine access through the console?           Yes                      Yes                     Yes




VMware, Inc.                                                                                                                         207
ESX Configuration Guide




      Multiple-Customer Open Deployment
          In a multiple-customer open deployment, ESX hosts are in the same datacenter and are used to serve
          applications for multiple customers. The site administrator maintains the hosts, and these hosts run a number
          of virtual machines dedicated to the customers. Virtual machines that belong to the various customers can be
          on the same host, but there are fewer restrictions on resource sharing.

          Although there is only one site administrator in a multiple-customer open deployment, several customer
          administrators maintain the virtual machines assigned to their customers. The deployment also includes
          customer system administrators who do not have ESX accounts but have access to the virtual machines through
          the virtual machine console so that they can load software and perform other maintenance tasks inside the
          virtual machines. Lastly, a group of business users who do not have accounts can use virtual machines to run
          their applications.

          Table 15-7 shows how you might handle sharing for the components that you use and configure for the host.

          Table 15-7. Sharing for Components in a Multiple-Customer Open Deployment
          Function                               Configuration        Comments

          Service console shares the same        No                   Isolate the service console by configuring it on its own
          physical network as the virtual                             physical network.
          machines?

          Service console shares the same VLAN   No                   Isolate the service console by configuring it on its own
          as the virtual machines?                                    VLAN. No virtual machine or other system facility such as
                                                                      vMotion must use this VLAN.

          Virtual machines share the same        Yes                  Configure your virtual machines on the same physical
          physical network?                                           network.

          Network adapter sharing?               Partial              Isolate the service console by configuring it on its own
                                                                      virtual switch and virtual network adapter. No virtual
                                                                      machine or other system facility must use this switch or
                                                                      adapter.
                                                                      You configure all virtual machines on the same virtual
                                                                      switch and network adapter.

          VMFS sharing?                          Yes                  Virtual machines can share VMFS partitions, and their
                                                                      virtual machine .vmdk files can reside on shared partitions.
                                                                      Virtual machines do not share .vmdk files.

          Security level                         High                 Open ports for services like FTP as needed.

          Virtual machine memory                 Yes                  Configure the total memory for the virtual machines as
          overcommitment?                                             greater than the total physical memory.


          Table 15-8 shows how you might set up user accounts for the host.

          Table 15-8. User Account Setup in a Multiple-Customer Open Deployment
          User Category                                          Total Number of Accounts

          Site administrators                                    1

          Customer administrators                                10

          System administrators                                  0

          Business users                                         0


          Table 15-9 shows the level of access for each user.




208                                                                                                                  VMware, Inc.
Chapter 15 Security Best Practices and Scenarios




          Table 15-9. User Access in a Multiple-Customer Open Deployment
                                                                Customer            System
          Access Level                     Site Administrator   Administrator       Administrator            Business User

          Root access?                     Yes                  No                  No                       No

          Service console access through   Yes                  Yes                 No                       No
          SSH?

          vCenter Server and vSphere       Yes                  Yes                 No                       No
          Web Access?

          Virtual machine creation and     Yes                  Yes                 No                       No
          modification?

          Virtual machine access through   Yes                  Yes                 Yes                      Yes
          the console?



Virtual Machine Recommendations
          There are several safety precautions to consider when evaluating virtual machine security and administering
          virtual machines.


   Installing Antivirus Software
          Because each virtual machine hosts a standard operating system, consider protecting it from viruses by
          installing antivirus software. Depending on how you are using the virtual machine, you might also want to
          install a software firewall.

          Stagger the schedule for virus scans, particularly in deployments with a large number of virtual machines.
          Performance of systems in your environment will degrade significantly if you scan all virtual machines
          simultaneously.

          Because software firewalls and antivirus software can be virtualization-intensive, you can balance the need
          for these two security measures against virtual machine performance, especially if you are confident that your
          virtual machines are in a fully trusted environment.


   Limiting Exposure of Sensitive Data Copied to the Clipboard
          Copy and paste operations are disabled by default for ESX to prevent exposing sensitive data that has been
          copied to the clipboard.

          When copy and paste is enabled on a virtual machine running VMware Tools, you can copy and paste between
          the guest operating system and remote console. As soon as the console window gains focus, non-privileged
          users and processes running in the virtual machine can access the clipboard for the virtual machine console.
          If a user copies sensitive information to the clipboard before using the console, the user—perhaps unknowingly
          —exposes sensitive data to the virtual machine. To prevent this problem, copy and paste operations for the
          guest operating system are disabled by default.

          It is possible to enable copy and paste operations for virtual machines if necessary.

          Enable Copy and Paste Operations Between the Guest Operating System and
          Remote Console
          To copy and paste between the guest operating system and remote console, you must enable copy and paste
          operations using the vSphere Client.

          Procedure

          1    Log into a vCenter Server system using the vSphere Client and select the virtual machine.

          2    On the Summary tab, click Edit Settings.



VMware, Inc.                                                                                                                 209
ESX Configuration Guide




          3    Select Options > Advanced > General and click Configuration Parameters.

          4    Click Add Row and type the following values in the Name and Value columns.

               Name                                  Value
               isolation.tools.copy.disable          false
               isolation.tools.paste.disable         false


               NOTE These options override any settings made in the guest operating system’s VMware Tools control
               panel.

          5    Click OK to close the Configuration Parameters dialog box, and click OK again to close the Virtual Machine
               Properties dialog box.

          6    Restart the virtual machine.


      Removing Unnecessary Hardware Devices
          Users and processes without privileges on a virtual machine can connect or disconnect hardware devices, such
          as network adapters and CD-ROM drives. Therefore, removing unnecessary hardware devices can help
          prevent attacks.

          Attackers can use this capability to breach virtual machine security in several ways. For example, an attacker
          with access to a virtual machine can connect a disconnected CD-ROM drive and access sensitive information
          on the media left in the drive, or disconnect a network adapter to isolate the virtual machine from its network,
          resulting in a denial of service.

          As a general security precaution, use commands on the vSphere Client Configuration tab to remove any
          unneeded or unused hardware devices. Although this measure tightens virtual machine security, it is not a
          good solution in situations where you might bring an unused device back into service at a later time.

          Prevent a Virtual Machine User or Process from Disconnecting Devices
          If you do not want to permanently remove a device, you can prevent a virtual machine user or process from
          connecting or disconnecting the device from within the guest operating system.

          Procedure

          1    Log in to a vCenter Server system using the vSphere Client.

          2    Select the virtual machine in the inventory panel.

          3    On the Summary tab, click Edit Settings.

          4    Select Options > General Options and make a record of the path displayed in the Virtual Machine
               Configuration File text box.

          5    Log in to the service console and acquire root privileges.

          6    Change directories to access the virtual machine configuration file whose path you recorded in Step 4.

               Virtual machine configuration files are located in the /vmfs/volumes/datastore directory, where datastore
               is the name of the storage device on which the virtual machine files reside. For example, if the virtual
               machine configuration file you obtained from the Virtual Machine Properties dialog box is [vol1]vm-
               finance/vm-finance.vmx, you would change to the following directory.

               /vmfs/volumes/vol1/vm-finance/




210                                                                                                            VMware, Inc.
Chapter 15 Security Best Practices and Scenarios




          7    Use a text editor to add the following line to the .vmx file, where device_name is the name of the device you
               want to protect (for example, ethernet1).
               device_name.allowGuestConnectionControl = "false"

               NOTE By default, Ethernet 0 is configured to disallow device disconnection. The only reason you might
               change this is if a prior administrator set device_name.allowGuestConnectionControl to true.

          8    Save your changes and close the file.

          9    In the vSphere Client, right-click the virtual machine and select Power Off.

          10   Right-click the virtual machine and select Power On.


   Limiting Guest Operating System Writes to Host Memory
          The guest operating system processes send informational messages to the ESX host through VMware Tools.
          If the amount of data the host stored as a result of these messages was unlimited, an unrestricted data flow
          would provide an opportunity for an attacker to stage a denial-of-service (DoS) attack.

          The informational messages sent by guest operating processes are known as setinfo messages and typically
          contain name-value pairs that define virtual machine characteristics or identifiers that the host stores—for
          example, ipaddress=10.17.87.224. The configuration file containing these name-value pairs is limited to a size
          of 1MB, which prevents attackers from staging a DoS attack by writing software that mimics VMware Tools
          and filling the host's memory with arbitrary configuration data, which consumes space needed by the virtual
          machines.

          If you require more than 1MB of storage for name-value pairs, you can change the value as required. You can
          also prevent the guest operating system processes from writing any name-value pairs to the configuration file.

          Modify Guest Operating System Variable Memory Limit
          You can increase the guest operating system variable memory limit if large amounts of custom information
          are being stored in the configuration file.

          Procedure

          1    Log in to a vCenter Server system using the vSphere Client.

          2    Select the virtual machine in the inventory panel.

          3    On the Summary tab, click Edit Settings.

          4    Select Options > Advanced > General and click Configuration Parameters.

          5    If the size limit attribute is not present, you must add it.

               a   Click Add Row.

               b   In the Name column, type tools.setInfo.sizeLimit.

               c   In the Value column, type Number of Bytes.

               If the size limit attribute exists, modify it to reflect the appropriate limits.

          6    Click OK to close the Configuration Parameters dialog box, and click OK again to close the Virtual Machine
               Properties dialog box.




VMware, Inc.                                                                                                                      211
ESX Configuration Guide




          Prevent the Guest Operating System Processes from Sending Configuration
          Messages to the Host
          You can prevent guests from writing any name-value pairs to the configuration file. This is appropriate when
          guest operating systems must be prevented from modifying configuration settings.

          Procedure

          1    Log in to a vCenter Server system using the vSphere Client.

          2    Select the virtual machine in the inventory panel.

          3    On the Summary tab, click Edit Settings.

          4    Select Options > Advanced > General and click Configuration Parameters.

          5    Click Add Row and type the following values in the Name and Value columns.
               n     In the Name column: isolation.tools.setinfo.disable
               n     In the Value column: true

          6    Click OK to close the Configuration Parameters dialog box, and click OK again to close the Virtual Machine
               Properties dialog box.


      Configuring Logging Levels for the Guest Operating System
          Virtual machines can write troubleshooting information into a virtual machine log file stored on the VMFS
          volume. Virtual machine users and processes can abuse logging either on purpose or inadvertently so that
          large amounts of data flood the log file. Over time, the log file can consume enough file system space to cause
          a denial of service.

          To prevent this problem, consider modifying logging settings for virtual machine guest operating systems.
          These settings can limit the total size and number of log files. Normally, a new log file is created each time you
          reboot a host, so the file can grow to be quite large. You can ensure new log file creation happens more
          frequently by limiting the maximum size of the log files. VMware recommends saving 10 log files, each one
          limited to 100KB. These values are large enough to capture sufficient information to debug most problems that
          might occur.

          Each time an entry is written to the log, the size of the log is checked. If it is over the limit, the next entry is
          written to a new log. If the maximum number of log files exists, the oldest log file is deleted. A DoS attack that
          avoids these limits could be attempted by writing an enormous log entry, but each log entry is limited in size
          to 4KB, so no log files are ever more than 4KB larger than the configured limit.

          Limit Log File Numbers and Sizes
          To prevent virtual machine users and processes from flooding the log file, which can lead to denial of service,
          you can limit the number and size of the log files ESX generates.

          Procedure

          1    Log in to a vCenter Server system using the vSphere Client.

          2    On the Summary tab, click Edit Settings.

          3    Select Options > General Options and make a record of the path displayed in the Virtual Machine
               Configuration File text box.

          4    Log into the service console and acquire root privileges.




212                                                                                                               VMware, Inc.
Chapter 15 Security Best Practices and Scenarios




          5    Change directories to access the virtual machine configuration file whose path you recorded in Step 3.

               Virtual machine configuration files are located in the /vmfs/volumes/datastore directory, where datastore
               is the name of the storage device on which the virtual machine files reside. For example, if the virtual
               machine configuration file you obtained from the Virtual Machine Properties dialog box is [vol1]vm-
               finance/vm-finance.vmx, you would change to the following directory.

               /vmfs/volumes/vol1/vm-finance/

          6    To limit the log size, use a text editor to add or edit the following line to the .vmx file, where maximum_size
               is the maximum file size in bytes.
               log.rotateSize=maximum_size

               For example, to limit the size to around 100KB, enter 100000.

          7    To keep a limited number of log files, use a text editor to add or edit the following line to the .vmx file, where
               number_of_files_to_keep is the number of files the server keeps.
               log.keepOld=number_of_files_to_keep

               For example, to keep 10 log files and begin deleting the oldest ones as new ones are created, enter 10.

          8    Save your changes and close the file.

          Disable Logging for the Guest Operating System
          If you choose not to write troubleshooting information into a virtual machine log file stored on the VMFS
          volume, you can stop logging altogether.
          If you disable logging for the guest operating system, be aware that you might not be able to gather adequate
          logs to allow troubleshooting. Further, VMware does not offer technical support for virtual machine problems
          if logging has been disabled.

          Procedure

          1    Log in to a vCenter Server system using the vSphere Client and select the virtual machine in the inventory.

          2    On the Summary tab, click Edit Settings.

          3    Click the Options tab and in the options list under Advanced, select General.

          4    In Settings, deselect Enable logging.

          5    Click OK to close the Virtual Machine Properties dialog box.




VMware, Inc.                                                                                                                      213
ESX Configuration Guide




214                       VMware, Inc.
Host Profiles




VMware, Inc.                   215
ESX Configuration Guide




216                       VMware, Inc.
Managing Host Profiles                                                                                      16
          The host profiles feature creates a profile that encapsulates the host configuration and helps to manage the
          host configuration, especially in environments where an administrator manages more than one host or cluster
          in vCenter Server.

          Host profiles eliminates per-host, manual, or UI-based host configuration and maintain configuration
          consistency and correctness across the datacenter by using host profile policies. These policies capture the
          blueprint of a known, validated reference host configuration and use this to configure networking, storage,
          security, and other settings on multiple hosts or clusters. You can then check a host or cluster against a profile’s
          configuration for any deviations.

          This chapter includes the following topics:
          n    “Host Profiles Usage Model,” on page 217
          n    “Access Host Profiles View,” on page 218
          n    “Creating a Host Profile,” on page 218
          n    “Export a Host Profile,” on page 219
          n    “Import a Host Profile,” on page 219
          n    “Edit a Host Profile,” on page 220
          n    “Manage Profiles,” on page 221
          n    “Checking Compliance,” on page 225


Host Profiles Usage Model
          This topic describes the workflow of using Host Profiles.

          You must have an existing vSphere installation with at least one properly configured host.

          1    Set up and configure the host that will be used as the reference host.

               A reference host is the host from which the profile is created.

          2    Create a profile using the designated reference host.

          3    Attach a host or cluster with the profile.




VMware, Inc.                                                                                                              217
ESX Configuration Guide




          4    Check the host's compliance against a profile. This ensures that the host continues to be correctly
               configured.

          5    Apply the host profile of the reference host to other hosts or clusters of hosts.

          NOTE Host profiles is only supported for VMware vSphere 4.0 hosts. This feature is not supported for VI 3.5
          or earlier hosts. If you have VI 3.5 or earlier hosts managed by your vCenter Server 4.0, the following can occur
          if you try to use host profiles for those hosts:
          n    You cannot create a host profile that uses a VMware Infrastructure 3.5 or earlier host as a reference host.
          n    You cannot apply a host profile to any VI 3.5 or earlier hosts. The compliance check fails.
          n    While you can attach a host profile to a mixed cluster that contains VI 3.5 or earlier hosts, the compliance
               check for those hosts fails.

          As a licensed feature of vSphere, Host Profiles are only available when the appropriate licensing is in place. If
          you see errors, please ensure that you have the appropriate vSphere licensing for your hosts.

          If you want the host profile to use directory services for authentication, then the reference host needs to be set
          configured to use a directory service. See “Configure a Host to Use a Directory Service,” on page 179 for
          instructions.


Access Host Profiles View
          The Host Profiles main view lists all available profiles. Administrators can also use the Host Profiles main view
          to perform operations on host profiles and configure profiles.

          The Host Profiles main view should be used by experienced administrators who wish to perform host profile
          operations and configure advanced options and policies. Most operations such as creating new profiles,
          attaching entities, and applying profiles can be performed from the Hosts and Clusters view.

          Procedure
          u    Select View > Management > Host Profiles.

          Any existing profiles are listed on the left side in the profiles list. When a profile is selected from the profile
          list, the details of that profile are displayed on the right side.


Creating a Host Profile
          You create a new host profile by using the designated reference host's configuration.

          A host profile can be created from:
          n    Host Profile main view
          n    host's context menu


      Create a Host Profile from Host Profiles View
          You can create a host profile from the Host Profiles main view using the configuration of an existing host.

          Prerequisites

          You must have a vSphere installation and at least one properly configured host in the inventory.

          Procedure

          1    In the Host Profiles main view, click Create Profile.

               The Create Profile wizard appears.

          2    Select the option to create a new profile and click Next.



218                                                                                                                VMware, Inc.
Chapter 16 Managing Host Profiles




          3    Select the host to use to create the profile an click Next.

          4    Type the name and enter a description for the new profile and click Next.

          5    Review the summary information for the new profile and click Finish to complete creating the profile.

          The new profile appears in the profile list.


   Create a Host Profile from Host
          You can create a new host profile from the host's context menu in the Hosts and Clusters inventory view.

          Prerequisites

          You must have a vSphere installation and at least one properly configured host in the inventory.

          Procedure

          1    In the Host and Clusters view, select the host that you want to designate as the reference host for the new
               host profile.

          2    Right-click the host and select Host Profile > Create Profile from Host

               The Create Profile from Host wizard opens.

          3    Type the name and enter a description for the new profile and click Next.

          4    Review the summary information for the new profile and click Finish to complete creating the profile.

          The new profile appears in the host's Summary tab.


Export a Host Profile
          You can export a profile to a file that is in the VMware profile format (.vpf).

          NOTE When a host profile is exported, administrator passwords are not exported. This is a security measure
          and stops administrator passwords from being exported in plain text when the profile is exported. You will
          be prompted to re-enter the values for the password after the profile is imported and the password is applied
          to a host.

          Procedure

          1    In the Host Profiles view page, select the profile to export from the profile list.
          2    Right-click the profile and select the Export Profile.

          3    Select the location and type the name of the file to export the profile.

          4    Click Save.


Import a Host Profile
          You can import a profile from a file in the VMware profile format (.vpf).

          NOTE When a host profile is exported, administrator passwords are not exported. This is a security measure
          and stops administrator passwords from being exported in plain text when the profile is exported. You will
          be prompted to re-enter the values for the password after the profile is imported and the password is applied
          to a host.




VMware, Inc.                                                                                                                 219
ESX Configuration Guide




          Procedure

          1    In the Host Profiles main view, click the Create Profile icon.

               The Create Profile wizard appears.

          2    Select the option to import a profile and click Next.

          3    Enter or browse the VMware Profile Format file to import and click Next.

          4    Type the name, enter a description for the imported profile, and click Next when finished.

          5    Review the summary information for the imported profile and click Finish to complete importing the
               profile.

          The imported profile appears in the profile list.


Edit a Host Profile
          You can view and edit host profile policies, select a policy to be checked for compliance, and change the policy
          name or description.

          Procedure

          1    In the Host Profiles main view, select the profile to edit from the profile list.

          2    Click Edit Host Profile.

          3    (Optional) Change the profile name or description in the fields at the top of the Profile Editor.

          4    Edit the policy.

          5    (Optional) Enable or disable the policy compliance check.

          6    Click OK to close the Profile Editor.


      Edit a Policy
          A policy describes how a specific configuration setting should be applied. The Profile Editor allows you to edit
          policies belonging to a specific host profile.

          On the left side of the Profile Editor, you can expand the host profile. Each host profile is composed of several
          sub-profiles that are designated by functional group to represent configuration instances. Each sub-profile
          contains many policies and compliance checks that describe the configuration that is relevant to the profile.
          Each policy consists of one or more options that contains one or more parameters. The parameters consist of
          a key and a value. The value can be one of a few basic types, for example integer, string, string array, or integer
          array.

          The sub-profiles (and example policies and compliance checks) that may be configured are:

          Table 16-1. Host Profile Sub-Profile Configurations
          Sub-Profile Configuration                                  Example Policies and Compliance Checks

          Memory reservation                                         Set memory reservation to a fixed value.

          Storage                                                    Configure NFS storage.

          Networking                                                 Configure virtual switch, port groups, physical NIC speed,
                                                                     security and NIC teaming policies, vNetwork Distributed
                                                                     Switch, and vNetwork Distributed Switch uplink port.

          Date and Time                                              Configure time settings, timezone of server.

          Firewall                                                   Enable or disable a ruleset.

          Security                                                   Add a user or a usergroup, set root password.




220                                                                                                                  VMware, Inc.
Chapter 16 Managing Host Profiles




          Table 16-1. Host Profile Sub-Profile Configurations (Continued)
          Sub-Profile Configuration                                  Example Policies and Compliance Checks

          Service                                                    Configure settings for a service.

          Advanced                                                   Modify advanced options.


          Procedure

          1    Open the Profile Editor for the profile you wish to edit.

          2    On the left side of the Profile Editor, expand a sub-profile until you reach the policy you want to edit.

          3    Select the policy.

               On the right-hand side of the Profile Editor, the policy options and parameters are displayed within the
               Configuration Details tab.

          4    Select a policy option from the drop-down menu and set its parameter.

          5    (Optional) If you make a change to a policy, but wish to revert back to the default option, click Revert and
               the option is reset.


   Enable Compliance Check
          You can decide whether a host profile policy is checked for compliance.

          Procedure

          1    Open the Profile Editor for a profile and navigate to the policy you wish to enable for compliance check.

          2    On the right side of the Profile Editor, select the Compliance Details tab.

          3    Enable the check box for the policy.

               NOTE If you disable the check box so this policy is not checked for compliance, the other policies that are
               enabled for compliance check will still be checked.


Manage Profiles
          After you create a host profile, you can manage the profile by attaching a profile to a particular host or cluster
          and then applying that profile to the host or cluster.


   Attaching Entities
          Hosts that need to be configured are attached to a profile.

          Profiles can also be attached to a cluster. In order to be compliant, all hosts within an attached cluster must be
          configured according to the profile. Hosts are not automatically configured in accordance to the host profile
          that is attached with the cluster when it is added to the cluster. When a host is added to a cluster that is attached
          with a profile, the host is automatically attached with the profile. If the profile is not applied, or configured to
          what is specified in the profile, it will cause the compliance status for the profile to fail the next time a
          compliance check is performed. You fix this by applying the profile to the host.

          You can attach a host or cluster to a profile from:
          n    Host Profiles main view
          n    Host's context menu
          n    Cluster's context menu
          n    Cluster's Profile Compliance tab




VMware, Inc.                                                                                                                    221
ESX Configuration Guide




          Attach Entities from the Host Profiles View
          Before you can apply the profile to an entity (host or cluster of hosts), you need to attach the entity to the profile.

          You can attach a host or cluster to a profile from the Host Profiles main view.

          Procedure

          1    In the Host Profiles main view, select the profile to which you want to add the attachment from the profile
               list.

          2    Click the Attach Host/Cluster icon.

          3    Select the host or cluster from the expanded list and click Attach.

               The host or cluster is added to the Attached Entities list.

          4    (Optional) Click Detach to remove an attachment from a host or cluster.

          5    Click OK to close the dialog.

          Attach Entities from the Host
          Before you can apply the profile to a host you need to attach the host to the profile.

          You can attach a profile to a host from the host's context menu in the Hosts and Clusters inventory view.

          Procedure

          1    In the Host and Clusters view, select the host to which you want to attach a profile.

          2    Right-click the host and select Host Profile > Manage Profile.

               NOTE If no host profiles exist in your inventory, a dialog appears asking if you want to create and attach
               the host to this profile.

          3    In the Attach Profile dialog, select the profile to attach to the host and click OK.

          The host profile is updated in the Summary tab of the host.


      Applying Profiles
          To bring a host to the desired state as specified in the profile, apply the profile to the host.
          You can apply a profile to a host from:
          n    Host Profiles main view
          n    Host's context menu
          n    Cluster's Profile Compliance tab

          Apply a Profile from the Host Profiles View
          You can apply a profile to a host from the Host Profiles main view.

          Prerequisites

          The host must be in maintenance mode before a profile is applied to it.




222                                                                                                                  VMware, Inc.
Chapter 16 Managing Host Profiles




          Procedure

          1    In the Host Profiles main view, select the profile you want to apply to the host.

          2    Select the Hosts and Clusters tab.

               The list of attached hosts are shown under Entity Name.

          3    Click Apply Profile.

               In the Profile Editor, you might be prompted to enter the required parameters needed to apply the profile.

          4    Enter the parameters and click Next.

          5    Continue until all the required parameters are entered.

          6    Click Finish.

          Compliance Status is updated.

          Apply a Profile from the Host
          You can apply a profile to a host from the host's context menu.

          Prerequisites

          The host must be in maintenance mode before applying it to a profile

          Procedure

          1    In the Host and Clusters view, select the host to which you want to apply a profile.

          2    Right-click the host and select Host Profile > Apply Profile.

          3    In the Profile Editor, enter the parameters and click Next.

          4    Continue until all the required parameters are entered.

          5    Click Finish.

          Compliance Status is updated.


   Change Reference Host
          The reference host configuration is used to create the host profile..

          You can perform this task from the Host Profiles main view or from the host's context menu.

          Prerequisites

          The host profile must already exist.




VMware, Inc.                                                                                                               223
ESX Configuration Guide




          Procedure

          1    You can perform this task either from the Host Profiles main view or from the host.
               u     In the Host Profiles main view, right-click the profile you wish to change the reference host and select
                     Change Reference Host.
               u     In the Hosts and Clusters view, right-click the host to which you want to update references and select
                     Manage Profiles.

               The Detach or Change Host Profile dialog opens.

          2    Determine if you want to detatch the profile from the host or cluster or change the profile's reference host.
               u     Click Detach to remove the association between the host and the profile.
               u     Click Change to continue with updating the profile's reference host.
               If you selected Change, the Attach Profile dialog opens. The current host that the profile references is
               displayed as Reference Host.

          3    Expand the inventory list and select the host to which you want the profile attached.

          4    Click Update.

               The Reference Host is updated.

          5    Click OK.

          The Summary tab for the host profile lists the updated reference host.


      Manage Profiles from a Cluster
          You can create a profile, attach a profile, or update reference hosts from the cluster's context menu.

          Procedure
          u    In the Hosts and Clusters view, right-click a cluster and select Host Profile > Manage Profile. Depending
               on your host profile setup, one of the following results occurs:

               Profile Status and Task                    Result
               If the cluster is not attached to a host   a   A dialog box opens asking if you would like to create a profile and attach
               profile and no profile exist in your           it to the cluster.
               inventory, create a profile.               b   If you select Yes, the Create Profile wizard opens.
               If the cluster is not attached to a host   a   The Attach Profile dialog opens.
               profile and one or more profiles exist     b   Select the profile you want to attach to the cluster and click OK.
               in your inventory, attach a profile.
               If the cluster is already attached to a    In the dialog box, click Detach to detach the profile from the cluster or
               host profile, detach a profile or          Change to attach a different profile to the cluster.
               attach to a different profile.



      Updating Profiles from the Reference Host
          If the configuration of the host from which a profile was created (the reference host) changes, you can update
          the profile so that its configuration matches the reference host's configuration.

          Once you create a host profile, you might need to make incremental updates to the profile. You can do this
          using two methods:
          n    Make the configuration changes to the reference host in the vSphere Client, then update the profile from
               the reference host. The settings within the existing profile are updated to match those of the reference host.
          n    Update the profile directly using the Profile Editor.




224                                                                                                                         VMware, Inc.
Chapter 16 Managing Host Profiles




          While updating the profile from the Profile Editor can be more comprehensive and provide more options,
          updating the profile from the reference host allows you to validate the configuration before rolling it out to
          other hosts that are attached to the profile.

          Updating the profile from the reference host is performed from the Host Profiles main view.

          Procedure
          u    In the Host Profiles main view, right-click the profile you want to update and select Update Profile From
               Reference Host.


Checking Compliance
          Checking compliance ensures that the host or cluster continues to be correctly configured.

          After a host or cluster is configured with the reference host profile, a manual change, for example, can occur,
          making the configuration incorrect. Checking compliance on a regular basis ensures that the host or cluster
          continues to be correctly configured.


   Check Compliance from the Host Profiles View
          You can check the compliance of a host or cluster to a profile from the Host Profiles main view.

          Procedure

          1    From the Host Profiles list, select the profile that you want to check.

          2    In the Hosts and Clusters tab, select the host or cluster from the list under Entity Name.

          3    Click Check Compliance Now.

               The compliance status is updated as Compliant, Unknown, or Non-compliant.

               If the compliance status is Non-compliant, you can apply the host to the profile.


   Check Compliance from Host
          After a profile has been attached to a host, run a compliance check from the host's context menu to verify the
          configuration.

          Procedure

          1    In the Host and Clusters view, select the host on which you want to run the compliance check.

          2    Right-click the host and select Host Profile > Check Compliance.

               The host's compliance status is displayed in the host's Summary tab.

          If the host is not compliant, you must apply the profile to the host.




VMware, Inc.                                                                                                              225
ESX Configuration Guide




      Check Cluster Compliance
          A cluster may be checked for compliance with a host profile or for specific cluster requirements and settings.

          Procedure

          1    In the Host and Clusters view, select the cluster on which you want to run the compliance check.

          2    In the Profile Compliance tab, click Check Compliance Now to check the cluster's compliance with both
               the host profile that is attached to this cluster and the cluster requirements, if any.
               n     The cluster is checked for compliance with specific settings for hosts in the cluster, such as DRS, HA,
                     and DPM. For example, it may check if vMotion is enabled. The compliance status for the cluster
                     requirements is updated. This check is performed even if a host profile is not attached to the cluster.
               n     If a host profile is attached to the cluster, the cluster is checked for compliance with the host profile.
                     The compliance status for the host profile is updated.

          3    (Optional) Click Description next to the Cluster Requirements for a list of the specific cluster requirements.

          4    (Optional) Click Description next to Host Profiles for a list of the specific host profile compliance checks.

          5    (Optional) Click Change to change the host profile that is attached to the cluster.

          6    (Optional) Click Remove to detach the host profile that is attached to the cluster.

          If the cluster is not compliant, the profile must be applied separately to each host within the cluster.




226                                                                                                                 VMware, Inc.
Appendixes




VMware, Inc.                227
ESX Configuration Guide




228                       VMware, Inc.
ESX Technical Support Commands                                                                                       A
          Most of the commands in this appendix are reserved for Technical Support use and are included for your
          reference only. In a few cases, however, these commands provide the only means of performing a configuration
          task for the host. Also, if you lose your connection to the host, executing certain of these commands through
          the command-line interface may be your only recourse—for example, if networking becomes nonfunctional
          and vSphere Client access is therefore unavailable.

          NOTE If you use the commands in this appendix, you must execute the service mgmt-vmware restart
          command to restart the vmware-hostd process and alert the vSphere Client and other management tools that
          the configuration has changed. In general, avoid executing the commands in this appendix if the host is
          currently under the vSphere Client or vCenter Server management.

          The vSphere Client graphical user interface provides the preferred means of performing the configuration
          tasks described in this topic. You can use this topic to learn which vSphere Client commands to use in place
          of these commands. This topic provides a summary of the actions you take in vSphere Client, but does not
          give complete instructions. For details on using commands and performing configuration tasks through
          vSphere Client, see the online help.

          You can find additional information on a number of ESX commands by logging in to the service console and
          using the man <esxcfg_command_name> command to display man pages.

          Table A-1 lists the Technical Support commands provided for ESX, summarizes the purpose of each command,
          and provides a vSphere Client alternative. You can perform most of the vSphere Client actions listed in the
          table only after you have selected an ESX host from the inventory panel and clicked the Configuration tab.
          These actions are preliminary to any procedure discussed below unless otherwise stated.

          Table A-1. ESX Technical Support Commands
          Command                           Command Purpose and vSphere Client Procedure

          esxcfg-advcfg                     Configures advanced options for ESX.
                                            To configure advanced options in vSphere Client, click Advanced Settings. When
                                            the Advanced Settings dialog box opens, use the list on the left to select the device
                                            type or activity you want to work with and then enter the appropriate settings.
          esxcfg-auth                       Configures authentication. You can use this command to switch between the
                                            pam_cracklib.so and pam_passwdqc.so plug-ins for password change rule
                                            enforcement. You also use this command to reset options for these two plug-ins.
                                            There are no means of configuring these functions in the vSphere Client.
          esxcfg-boot                       Configures bootstrap settings. This command is used for the bootstrap process and
                                            is intended for VMware Technical Support use only. You should not issue this
                                            command unless instructed to do so by a VMware Technical Support representative.
                                            There is no means of configuring these functions in vSphere Client.




VMware, Inc.                                                                                                                   229
ESX Configuration Guide




          Table A-1. ESX Technical Support Commands (Continued)
          Command                       Command Purpose and vSphere Client Procedure

          esxcfg-dumppart               Configures a diagnostic partition or searches for existing diagnostic partitions.
                                        When you install ESX, a diagnostic partition is created to store debugging information
                                        in the event of a system fault. You don’t need to create this partition manually unless
                                        you determine that there is no diagnostic partition for the host.
                                        You can perform the following management activities for diagnostic partitions in
                                        vSphere Client:
                                        n Determine whether there is a diagnostic partition — Click Storage>AddStorage
                                             and check the first page of the Add Storage Wizard to see whether it includes the
                                             Diagnostic option. If Diagnostic is not one of the options, ESX already has a
                                             diagnostic partition.
                                        n Configure a diagnostic partition — Click Storage>Add Storage>Diagnostic and
                                             step through the wizard.
          esxcfg-firewall               Configures the service console firewall ports.
                                        To configure firewall ports for supported services and agents in vSphere Client, you
                                        select the Internet services that will be allowed to access the ESX host. Click Security
                                        Profile>Firewall>Properties and use the Firewall Properties dialog box to add
                                        services.
                                        You cannot configure unsupported services through the vSphere Client. For these
                                        services, use the esxcfg-firewall.

          esxcfg-info                   Prints information about the state of the service console, VMkernel, various
                                        subsystems in the virtual network, and storage resource hardware.
                                        vSphere Client doesn’t provide a method for printing this information, but you can
                                        obtain much of it through different tabs and functions in the user interface. For
                                        example, you can check the status of your virtual machines by reviewing the
                                        information on the Virtual Machines tab.
          esxcfg-init                   Performs internal initialization routines. This command is used for the bootstrap
                                        process you should not use it under any circumstances. Using this command can
                                        cause problems for ESX.
                                        There is no vSphere Client equivalent for this command.
          esxcfg-module                 Sets driver parameters and modifies which drivers are loaded during startup. This
                                        command is used for the bootstrap process and is intended for VMware Technical
                                        Support use only. You should not issue this command unless instructed to do so by
                                        a VMware Technical Support representative.
                                        There is no vSphere Client equivalent for this command.
          esxcfg-mpath                  Configures multipath settings for your Fibre Channel or iSCSI disks.
                                        To configure multipath settings for your storage in vSphere Client, click Storage.
                                        Select a datastore or mapped LUN and click Properties. When the Properties dialog
                                        box opens, select the desired extent if necessary. Then, click Extent Device>Manage
                                        Paths and use the Manage Path dialog box to configure the paths.
          esxcfg-nas                    Manages NFS mounts. You use this command to create or unmount an NFS datastore.
                                        To view NFS datastores in vSphere Client, click Storage > Datastores and scroll
                                        through the datastores list. You can also perform the following activities from the
                                        Storage > Datastores view:
                                        n Display the attributes of an NFS datastore – Click the datastore and review the
                                            information under Details.
                                        n Create an NFS datastore – Click Add Storage.
                                        n Unmount an NFS datastore – Click Remove, or right-click the datastore to
                                            unmount and select Unmount.




230                                                                                                                VMware, Inc.
Appendix A ESX Technical Support Commands




          Table A-1. ESX Technical Support Commands (Continued)
          Command                       Command Purpose and vSphere Client Procedure

          esxcfg-nics                   Prints a list of physical network adapters along with information on the driver, PCI
                                        device, and link state of each NIC. You can also use this command to control a physical
                                        network adapter’s speed and duplexing.
                                        To view information on the physical network adapters for the host in vSphere Client,
                                        click Network Adapters.
                                        To change the speed and duplexing for a physical network adapter in the vSphere
                                        Client, click Networking>Properties for any of the virtual switches associated with
                                        the physical network adapter. In the Properties dialog box, click Network
                                        Adapters>Edit and select the speed and duplex combination.
          esxcfg-resgrp                 Restores resource group settings and lets you perform basic resource group
                                        management.
                                        Select a resource pool from the inventory panel and click Edit Settings on the
                                        Summary tab to change the resource group settings.
          esxcfg-route                  Sets or retrieves the default VMkernel gateway route and adds, removes, or lists static
                                        routes.
                                        To view the default VMkernel gateway route in vSphere Client, click DNS and
                                        Routing. To change the default routing, click Properties and update the information
                                        in both tabs of the DNS and Routing Configuration dialog box.
          esxcfg-swiscsi                Configures your software iSCSI software adapter.
                                        To configure your software iSCSI system in vSphere Client, click Storage Adapters,
                                        select the iSCSI adapter you want to configure, and click Properties. Use the iSCSI
                                        Initiator Properties dialog box to configure the adapter.
          esxcfg-upgrade                Upgrades from ESX Server 2.x to ESX. This command is not for general use.
                                        You complete the following three tasks when upgrading from 2.x to 3.x. Some of these
                                        can be performed in vSphere Client:
                                        n Upgrade the host — You upgrade the binaries, converting from ESX Server 2.x
                                            to ESX. You cannot perform this step from vSphere Client.
                                        n Upgrade the file system — To upgrade VMFS-2 to VMFS-3, suspend or power
                                            off your virtual machines and then click Inventory>Host>Enter Maintenance
                                            Mode. Click Storage, select a storage device, and click Upgrade to VMFS-3. You
                                            must perform this step for each storage device you want to upgrade.
                                        n Upgrade the virtual machines — To upgrade a virtual machine from VMS-2 to
                                            VMS-3, right-click the virtual machine in the inventory panel and choose
                                            Upgrade Virtual Machine.
          esxcfg-scsidevs               Prints a map of VMkernel storage devices to service console devices. There is no
                                        vSphere Client equivalent for this command.
          esxcfg-vmknic                 Creates and updates VMkernel TCP/IP settings for vMotion, NAS, and iSCSI.
                                        To set up vMotion, NFS, or iSCSI network connections in vSphere Client, click
                                        Networking > Add Networking. Select VMkernel and step through the Add
                                        Network Wizard. Define the IP address subnet mask and VMkernel default gateway
                                        in the Connection Settings step.
                                        To review your settings, click the blue icon to the left of the vMotion, iSCSI, or NFS
                                        port. To edit any of these settings, click Properties for the switch. Select the port from
                                        the list on the switch Properties dialog box and click Edit to open the port Properties
                                        dialog box and change the settings for the port.




VMware, Inc.                                                                                                                  231
ESX Configuration Guide




          Table A-1. ESX Technical Support Commands (Continued)
          Command                       Command Purpose and vSphere Client Procedure

          esxcfg-vswif                  Creates and updates service console network settings. This command is used if you
                                        cannot manage the ESX host through the vSphere Client because of network
                                        configuration issues.
                                        To set up connections for the service console in vSphere Client, click Networking >
                                        Add Networking. Select Service Console and step through the Add Network
                                        Wizard. Define the IP address subnet mask and the service console default gateway
                                        in the Connection Settings step.
                                        To review your settings, click the blue icon to the left of the service console port. To
                                        edit any of these settings, click Properties for the switch. Select the service console
                                        port from the list on the switch Properties dialog box. Click Edit to open the port
                                        Properties dialog box and change the settings for the port.
          esxcfg-vswitch                Creates and updates virtual machine network settings.
                                        To set up connections for a virtual machine in vSphere Client, click Networking >
                                        Add Networking. Select Virtual Machine and step through the Add Network
                                        Wizard.
                                        To review your settings, click the speech bubble icon to the left of the virtual machine
                                        port group. To edit any of these settings, click Properties for the switch. Select the
                                        virtual machine port from the list on the switch Properties dialog box, then click Edit
                                        to open the port Properties dialog box and change the settings for the port.




232                                                                                                                VMware, Inc.
Linux Commands Used with ESX                                                                              B
          To support certain internal operations, ESX installations include a subset of standard Linux configuration
          commands, for example, network and storage configuration commands. Using these commands to perform
          configuration tasks can result in serious configuration conflicts and render some ESX functions unusable.

          Always work through the vSphere Client when configuring ESX, unless otherwise instructed in vSphere
          documentation or by VMware Technical Support.




VMware, Inc.                                                                                                      233
ESX Configuration Guide




234                       VMware, Inc.
Using vmkfstools                                                                                                  C
          You use the vmkfstools utility to create and manipulate virtual disks, file systems, logical volumes, and physical
          storage devices on the VMware ESX hosts.

          Using vmkfstools, you can create and manage virtual machine file system (VMFS) on a physical partition of a
          disk. You can also use the command to manipulate files, such as virtual disk files, stored on VMFS-2, VMFS-3,
          and NFS.

          You can perform most vmkfstools operations using the vSphere Client.

          This appendix includes the following topics:
          n    “vmkfstools Command Syntax,” on page 235
          n    “vmkfstools Options,” on page 236


vmkfstools Command Syntax
          Generally, you do not need to log in as the root user to run the vmkfstools commands. However, some
          commands, such as the file system commands, might require the root user login.

          Use the following arguments with the vmkfstools command:
          n    options are one or more command-line options and associated arguments that you use to specify the activity
               for vmkfstools to perform, for example, choosing the disk format when creating a new virtual disk.

               After entering the option, specify a file or VMFS file system on which to perform the operation by entering
               a relative or absolute file path name in the /vmfs hierarchy.
          n    partition specifies disk partitions. This argument uses a vml.vml_ID:P format, where vml_ID is the device
               ID returned by the storage array and P is an integer that represents the partition number. The partition
               digit must be greater than zero (0) and should correspond to a valid VMFS partition of type fb.
          n    device specifies devices or logical volumes. This argument uses a path name in the ESX device file system.
               The path name begins with /vmfs/devices, which is the mount point of the device file system.

               Use the following formats when you specify different types of devices:
               n   /vmfs/devices/disks for local or SAN-based disks.

               n   /vmfs/devices/lvm for ESX logical volumes.

               n   /vmfs/devices/generic for generic SCSI devices, such as tape drives.

          n    path specifies a VMFS file system or file. This argument is an absolute or relative path that names a directory
               symbolic link, a raw device mapping, or a file under /vmfs.
               n   To specify a VMFS file system, use this format:
                   /vmfs/volumes/file_system_UUID



VMware, Inc.                                                                                                              235
ESX Configuration Guide




                     or
                     /vmfs/volumes/file_system_label

               n     To specify a VMFS file, use this format:
                     /vmfs/volumes/file system label|file system UUID/[dir]/myDisk.vmdk

                     You do not need to enter the entire path if the current working directory is the parent directory of
                     myDisk.vmdk.

                     For example,
                     /vmfs/volumes/datastore1/rh9.vmdk


vmkfstools Options
          The vmkfstools command has several options. Some of the options are suggested for advanced users only.

          The long and single-letter forms of the options are equivalent. For example, the following commands are
          identical.
          vmkfstools --createfs vmfs3 --blocksize 2m vml.vml_ID:1
          vmkfstools -C vmfs3 -b 2m vml.vml_ID:1


      -v Suboption
          The -v suboption indicates the verbosity level of the command output.

          The format for this suboption is as follows:
          -v --verbose number

          You specify the number value as an integer from 1 through 10.

          You can specify the -v suboption with any vmkfstools option. If the output of the option is not suitable for use
          with the -v suboption, vmkfstools ignores -v.

          NOTE Because you can include the -v suboption in any vmkfstools command line, -v is not included as a
          suboption in the option descriptions.


      File System Options
          File system options allow you to create a VMFS file system. These options do not apply to NFS. You can perform
          many of these tasks through the vSphere Client.

          Creating a VMFS File System
          Use the vmkfstools command to create a VMFS file system.
          -C --createfs vmfs3
                -b --blocksize block_sizekK|mM
                -S --setfsname fsName

          This option creates a VMFS-3 file system on the specified SCSI partition, such as vml.vml_ID:1. The partition
          becomes the file system's head partition.

          VMFS-2 file systems are read-only on any ESX host. You cannot create or modify VMFS-2 file systems but you
          can read files stored on VMFS-2 file systems. VMFS-3 file systems are not accessible from ESX 2.x hosts.

          CAUTION You can have only one VMFS volume for a LUN.




236                                                                                                             VMware, Inc.
Appendix C Using vmkfstools




          You can specify the following suboptions with the -C option:
          n    -b --blocksize – Define the block size for the VMFS-3 file system. The default block size is 1MB. The
               block_size value you specify must be a multiple of 128kb, with a minimum value of 128kb. When you enter
               a size, indicate the unit type by adding a suffix of m or M. The unit type is not case sensitive. vmkfstools
               interprets m or M to mean megabytes and k or K to mean kilobytes.
          n    -S --setfsname – Define the volume label of a VMFS volume for the VMFS-3 file system you are creating.
               Use this suboption only in conjunction with the -C option. The label you specify can be up to 128 characters
               long and cannot contain any leading or trailing blank spaces.

               After you define a volume label, you can use it whenever you specify the VMFS volume for the vmkfstools
               command. The volume label appears in listings generated for the Linux ls -l command and as a symbolic
               link to the VMFS volume under the /vmfs/volumes directory.

               To change the VMFS volume label, use the Linux ln -sf command. Use the following as an example:
               ln -sf /vmfs/volumes/UUID /vmfs/volumes/fsName

               fsName is the new volume label to use for the UUID VMFS.

          Example for Creating a VMFS File System
          This example illustrates creating a new VMFS-3 file system named my_vmfs on the vml.vml_ID:1 partition.
          The file block size is 1MB.
          vmkfstools -C vmfs3 -b 1m -S my_vmfs /vmfs/devices/disks/vml.vml_ID:1


          Extending an Existing VMFS-3 Volume
          Use the vmkfstools command to add an extend to a VMFS volume.
          -Z --extendfs extention-device existing-VMFS-volume

          This option adds another extent to a previously created VMFS volume existing-VMFS-volume. You must specify
          the full path name, for example /vmfs/devices/disks/vml.vml_ID:1, not just the short name vml.vml_ID:1.
          Each time you use this option, you extend a VMFS-3 volume with a new extent so that the volume spans
          multiple partitions. At most, a logical VMFS-3 volume can have 32 physical extents.

          CAUTION When you run this option, you lose all data that previously existed on the SCSI device you specified in
          extension-device.


          Example for Extending a VMFS-3 Volume
          This example extends the logical file system by allowing it to span to a new partition.
          vmkfstools -Z /vmfs/devices/disks/vml.vml_ID_2:1
          /vmfs/devices/disks/vml.vml_ID_1:1

          The extended file system spans two partitions—vml.vml_ID_1:1 and vml.vml_ID_2:2. In this example,
          vml.vml_ID_1:1 is the name of the head partition.


          Listing Attributes of a VMFS Volume
          Use the vmkfstools command to list attributes of a VMFS volume.
          -P --queryfs
                -h --human-readable




VMware, Inc.                                                                                                               237
ESX Configuration Guide




          When you use this option on any file or directory that resides on a VMFS volume, the option lists the attributes
          of the specified volume. The listed attributes include the VMFS version number (VMFS-2 or VMFS-3), the
          number of extents comprising the specified VMFS volume, the volume label if any, the UUID, and a listing of
          the device names where each extent resides.

          NOTE If any device backing VMFS file system goes offline, the number of extents and available space change
          accordingly.

          You can specify the -h suboption with the -P option. If you do so, vmkfstools lists the capacity of the volume
          in a more readable form, for example, 5k, 12.1M, or 2.1G.

          Upgrading a VMFS-2 to VMFS-3
          You can upgrade a VMFS-2 file system to VMFS-3.

          CAUTION The VMFS-2 to VMFS-3 conversion is a one-way process. After you have converted a VMFS-2 volume
          to VMFS-3, you cannot revert it back to a VMFS-2 volume.

          You can upgrade a VMFS-2 file system only if its file block size does not exceed 8 MB.

          When upgrading the file system, use the following options:
          n    -T --tovmfs3 -x --upgradetype [zeroedthick|eagerzeroedthick|thin]

               This option converts a VMFS-2 file system VMFS-3 preserving all files on the file system. Before conversion,
               unload the vmfs2 and vmfs3 drivers and load the auxiliary file system driver, fsaux, with a module option
               fsauxFunction=upgrade.

               You must specify the upgrade type using the -x --upgradetype suboption as one of the following:
               n     -x zeroedthick (default) – Retains the properties of VMFS-2 thick files. With the zeroedthick file
                     format, disk space is allocated to the files for future use and the unused data blocks are not zeroed
                     out.
               n     -x eagerzeroedthick – Zeroes out unused data blocks in thick files during conversion. If you use this
                     suboption, the upgrade process might take much longer than with the other options.
               n     -x thin – Converts the VMFS-2 thick files into thin-provisioned VMFS-3 files. As opposed to thick
                     file format, the thin-provisioned format doesn't allow files to have extra space allocated for their future
                     use, but instead provides the space on demand. During this conversion, unused blocks of the thick
                     files are discarded.

               During conversion, the ESX file-locking mechanism ensures that no other local process accesses the VMFS
               volume that is being converted, although you need to make sure that no remote ESX host is accessing this
               volume. The conversion might take several minutes and returns to the command prompt when complete.

               After conversion, unload the fsaux driver and load vmfs3 and vmfs2 drivers to resume normal operations.
          n    -u --upgradefinish

               This option completes the upgrade.




238                                                                                                                 VMware, Inc.
Appendix C Using vmkfstools




   Virtual Disk Options
          Virtual disk options allow you to set up, migrate, and manage virtual disks stored in VMFS-2, VMFS-3, and
          NFS file systems. You can also perform most of these tasks through the vSphere Client.

          Supported Disk Formats
          When you create or clone a virtual disk, you can use the -d --diskformat suboption to specify the format for
          the disk.

          Choose from the following formats:
          n    zeroedthick (default) – Space required for the virtual disk is allocated during creation. Any data remaining
               on the physical device is not erased during creation, but is zeroed out on demand at a later time on first
               write from the virtual machine. The virtual machine does not read stale data from disk.
          n    eagerzeroedthick – Space required for the virtual disk is allocated at creation time. In contrast to
               zeroedthick format, the data remaining on the physical device is zeroed out during creation. It might take
               much longer to create disks in this format than to create other types of disks.
          n    thick – Space required for the virtual disk is allocated during creation. This type of formatting doesn’t
               zero out any old data that might be present on this allocated space. A non-root user is not allowed to create
               this format.
          n    thin – Thin-provisioned virtual disk. Unlike with the thick format, space required for the virtual disk is
               not allocated during creation, but is supplied, zeroed out, on demand at a later time.
          n    rdm – Virtual compatibility mode raw disk mapping.

          n    rdmp – Physical compatibility mode (pass-through) raw disk mapping.

          n    raw – Raw device.

          n    2gbsparse – A sparse disk with 2GB maximum extent size. You can use disks in this format with other
               VMware products, however, you cannot power on sparse disk on an ESX host unless you first re-import
               the disk with vmkfstools in a compatible format, such as thick or thin.
          n    monosparse – A monolithic sparse disk. You can use disks in this format with other VMware products.

          n    monoflat – A monolithic flat disk. You can use disks in this format with other VMware products.

          NOTE The only disk formats you can use for NFS are thin, thick, zerodthick and 2gbsparse.

          Thick, zeroedthick and thin usually mean the same because the NFS server and not the ESX host decides the
          allocation policy. The default allocation policy on most NFS servers is thin.


          Creating a Virtual Disk
          Use the vmkfstools command to create a virtual disk.
          -c --createvirtualdisk size[kK|mM|gG]
                -a --adaptertype [buslogic|lsilogic] srcfile
                -d --diskformat [thin|zeroedthick|eagerzeroedthick]

          This option creates a virtual disk at the specified path on a VMFS volume. Specify the size of the virtual disk.
          When you enter the value for size, you can indicate the unit type by adding a suffix of k (kilobytes), m
          (megabytes), or g (gigabytes). The unit type is not case sensitive. vmkfstools interprets either k or K to mean
          kilobytes. If you don’t specify a unit type, vmkfstools defaults to bytes.




VMware, Inc.                                                                                                               239
ESX Configuration Guide




          You can specify the following suboptions with the -c option.
          n    -a specifies the device driver that is used to communicate with the virtual disks. You can choose between
               BusLogic and LSI Logic SCSI drivers.
          n    -d specifies disk formats.


          Example for Creating a Virtual Disk
          This example illustrates creating a two-gigabyte virtual disk file named rh6.2.vmdk on the VMFS file system
          named myVMFS. This file represents an empty virtual disk that virtual machines can access.
          vmkfstools -c 2048m /vmfs/volumes/myVMFS/rh6.2.vmdk


          Initializing a Virtual Disk
          Use the vmkfstools command to initialize a virtual disk.
          -w --writezeros

          This option cleans the virtual disk by writing zeros over all its data. Depending on the size of your virtual disk
          and the I/O bandwidth to the device hosting the virtual disk, completing this command might take a long time.

          CAUTION When you use this command, you lose any existing data on the virtual disk.



          Inflating a Thin Virtual Disk
          Use the vmkfstools command to inflate a thin virtual disk.
          -j --inflatedisk

          This option converts a thin virtual disk to eagerzeroedthick, preserving all existing data. The option allocates
          and zeroes out any blocks that are not already allocated.

          Removing Zeroed Blocks
          Use the vmkfstools command to convert any thin, zeroedthick, or eagerzeroedthick virtual disk to a thin disk
          with zeroed blocks removed.
          -K --punchzero

          This option deallocates all zeroed out blocks and leaves only those blocks that were allocated previously and
          contain valid data. The resulting virtual disk is in thin format.

          Converting a Zeroedthick Virtual Disk to an Eagerzeroedthick Disk
          Use the vmkfstools command to convert any zeroedthick virtual disk to an eagerzeroedthick disk.
          -k --eagerzero

          While performing the conversion, this option preserves any data on the virtual disk.

          Deleting a Virtual Disk
          This option deletes files associated with the virtual disk listed at the specified path on the VMFS volume.
          -U --deletevirtualdisk




240                                                                                                              VMware, Inc.
Appendix C Using vmkfstools




          Renaming a Virtual Disk
          This option renames a file associated with the virtual disk listed in the path specification portion of the
          command line.

          You must specify the original file name or file path oldName and the new file name or file path newName.
          -E --renamevirtualdisk oldName newName


          Cloning a Virtual or Raw Disk
          This option creates a copy of a virtual disk or raw disk you specify.
          -I --importfile srcfile -d --diskformat
             [rdm:device|rdmp:device|
                raw:device|thin|2gbsparse|monosparse|monoflat]

          You can use the -d suboption for the -I option. This suboption specifies the disk format for the copy you create.
          A non-root user is not allowed to clone a virtual disk or a raw disk.

          NOTE To clone the ESX Redo logs while preserving their hierarchy, use the cp command.


          Example for Cloning a Virtual Disk
          This example illustrates cloning the contents of a master virtual disk from the templates repository to a virtual
          disk file named myOS.vmdk on the myVMFS file system.
          vmkfstools -I /vmfs/volumes/templates/gold-master.vmdk /vmfs/volumes/myVMFS/myOS.vmdk

          You can configure a virtual machine to use this virtual disk by adding lines to the virtual machine configuration
          file, as in the following example:
          scsi0:0.present = TRUE
          scsi0:0.fileName = /vmfs/volumes/myVMFS/myOS.vmdk


          Migrate VMware Workstation and VMware GSX Server Virtual Machines
          You cannot use a vSphere Client to migrate virtual machines created with VMware Workstation or VMware
          GSX Server into your ESX system. However, you can use the vmkfstools -I command to import the virtual
          disk into your ESX system and then attach this disk to a new virtual machine you create in ESX.

          You must import the virtual disk first because you cannot power on disks exported in 2gbsparse format on an
          ESX host.

          Procedure

          1    Import a Workstation or GSX Server disk into your /vmfs/volumes/myVMFS/ directory or any subdirectory.

          2    In the vSphere Client, create a new virtual machine using the Custom configuration option.

          3    When you configure a disk, select Use an existing virtual disk and attach the Workstation or GSX Server
               disk you imported.

          Extending a Virtual Disk
          This option extends the size of a disk allocated to a virtual machine after the virtual machine has been created.
          -X --extendvirtualdisk newSize[kK|mM|gG]

          You must power off the virtual machine that uses this disk file before you enter this command. You might
          have to update the file system on the disk so the guest operating system can recognize and use the new size
          of the disk and take advantage of the extra space.




VMware, Inc.                                                                                                              241
ESX Configuration Guide




          You specify the newSize parameter in kilobytes, megabytes, or gigabytes by adding a k (kilobytes), m
          (megabytes), or g (gigabytes) suffix. The unit type is not case sensitive. vmkfstools interprets either k or K to
          mean kilobytes. If you don’t specify a unit type, vmkfstools defaults to kilobytes.

          The newSize parameter defines the entire new size, not just the increment you add to the disk.

          For example, to extend a 4g virtual disk by 1g, enter: vmkfstools -X 5g disk name.dsk

          NOTE Do not extend the base disk of a virtual machine that has snapshots associated with it. If you do, you
          can no longer commit the snapshot or revert the base disk to its original size.


          Migrating a VMFS-2 Virtual Disk to VMFS-3
          This option converts the specified virtual disk file from ESX Server 2 format to ESX format.
          -M --migratevirtualdisk


          Creating a Virtual Compatibility Mode Raw Device Mapping
          This option creates a Raw Device Mapping (RDM) file on a VMFS-3 volume and maps a raw disk to this file.
          After this mapping is established, you can access the raw disk as you would a normal VMFS virtual disk. The
          file length of the mapping is the same as the size of the raw disk it points to.
          -r --createrdm device

          When specifying the device parameter, use the following format:
          /vmfs/devices/disks/vml.vml_ID


          NOTE All VMFS-3 file-locking mechanisms apply to RDMs.


          Example for Creating a Virtual Compatibility Mode RDM
          In this example, you create an RDM file named my_rdm.vmdk and map the vml.vml_ID raw disk to that file.
          vmkfstools -r /vmfs/devices/disks/vml.vml_ID my_rdm.vmdk

          You can configure a virtual machine to use the my_rdm.vmdk mapping file by adding the following lines to the
          virtual machine configuration file:
          scsi0:0.present = TRUE
          scsi0:0.fileName = /vmfs/volumes/myVMFS/my_rdm.vmdk


          Creating a Physical Compatibility Mode Raw Device Mapping
          This option lets you map a pass-through raw device to a file on a VMFS volume. This mapping lets a virtual
          machine bypass ESX SCSI command filtering when accessing its virtual disk.This type of mapping is useful
          when the virtual machine needs to send proprietary SCSI commands, for example, when SAN-aware software
          runs on the virtual machine.
          -z --createrdmpassthru device

          After you establish this type of mapping, you can use it to access the raw disk just as you would any other
          VMFS virtual disk.

          When specifying the device parameter, use the following format:
          /vmfs/devices/disks/vml.vml_ID




242                                                                                                              VMware, Inc.
Appendix C Using vmkfstools




          Listing Attributes of an RDM
          This option lets you list the attributes of a raw disk mapping.
          -q --queryrdm

          This option prints the name of the raw disk RDM. The option also prints other identification information, like
          the disk ID, for the raw disk.

          Displaying Virtual Disk Geometry
          This option gets information about the geometry of a virtual disk.
          -g --geometry

          The output is in the form: Geometry information C/H/S, where C represents the number of cylinders, H
          represents the number of heads, and S represents the number of sectors.

          NOTE When you import VMware Workstation virtual disks to an ESX host, you might see a disk geometry
          mismatch error message. A disk geometry mismatch might also be the cause of problems loading a guest
          operating system or running a newly-created virtual machine.


          Checking and Repairing Virtual Disks
          Use this option to check or repair a virtual disk in case of an unclean shutdown.
          -x , -fix [check|repair]


   Managing SCSI Reservations of LUNs
          The -L option allows you to perform administrative task for physical storage devices. You can perform most
          of these tasks through the vSphere Client.
          -L --lock [reserve|release|lunreset|targetreset|busreset]device

          This option lets you reserve a SCSI LUN for exclusive use by an ESX host, release a reservation so that other
          hosts can access the LUN, and reset a reservation, forcing all reservations from the target to be released.

          CAUTION Using the -L option can interrupt the operations of other servers on a SAN. Use the -L option only
          when troubleshooting clustering setups.

          Unless specifically advised by VMware, never use this option on a LUN hosting a VMFS volume.

          You can specify the -L option in several ways:
          n    -L reserve – Reserves the specified LUN. After the reservation, only the server that reserved that LUN
               can access it. If other servers attempt to access that LUN, a reservation error results.
          n    -L release – Releases the reservation on the specified LUN. Other servers can access the LUN again.

          n    -L lunreset – Resets the specified LUN by clearing any reservation on the LUN and making the LUN
               available to all servers again. The reset does not affect any of the other LUNs on the device. If another
               LUN on the device is reserved, it remains reserved.
          n    -L targetreset – Resets the entire target. The reset clears any reservations on all the LUNs associated
               with that target and makes the LUNs available to all servers again.
          n    -L busreset – Resets all accessible targets on the bus. The reset clears any reservation on all the LUNs
               accessible through the bus and makes them available to all servers again.

          When entering the device parameter, use the following format:
          /vmfs/devices/disks/vml.vml_ID:P



VMware, Inc.                                                                                                               243
ESX Configuration Guide




244                       VMware, Inc.
Index


       Symbols                                B
       * next to path 120                     bandwidth
                                                average 55, 56
       Numerics                                 peak 55, 56
       802.1Q and ISL tagging attacks 162     best practices
                                                networking 65
       A                                        security 205
                                              binding on host, dvPort groups 33
       accessing storage 84
                                              Blade servers
       active adapters 25                       and virtual networking 70
       Active Directory 179, 180                configuring a virtual machine port group 71
       active uplinks 45, 47–49                 configuring a VMkernel port 71
       active-active disk arrays 121          block devices 132
       active-passive disk arrays 121         blocked ports, dvPorts 58
       adapter, virtual 39                    burst size 55–57
       adding
          dvPort groups 32
                                              C
          NFS storage 107
                                              CA-signed certificates 182
       adding a VMkernel network adapter 20
                                              CDP 25, 26
       adding users to groups 179
                                              certificates
       Administrator role 175, 176               certificate file 181
       aging, password restrictions 195          checking 181
       antivirus software, installing 209        configuring host searches 185
       applications
                                                 default 181
          default 201, 202
                                                 disabling SSL for vSphere Web Access and
          disabling optional 200
                                                            SDK 184
          optional 200–202
                                                 generating new 182
          setgid flag 200
                                                 key file 181
          setuid flag 200
                                                 location 181
       asterisk next to path 120
                                                 SSL 181
       attacks
                                                 vCenter Server 181
          802.1Q and ISL tagging 162
                                                 vSphere Web Access 181
          double-encapsulated 162
                                              certification, security 147
          MAC flooding 162
                                              changing host proxy services 185
          multicast brute-force 162
                                              CHAP
          random frame 162                       disabling 102
          spanning tree 162                      for discovery targets 101
       authentication
                                                 for iSCSI initiators 100
          groups 173
                                                 for static targets 101
          iSCSI storage 168
                                                 mutual 99
          users 171, 173
                                                 one-way 99
          vSphere Client to ESX 171
                                              CHAP authentication 99, 169
       authentication daemon 171
                                              CHAP authentication methods 99
       average bandwidth 55, 57
                                              character classes, passwords 173
                                              CIM and firewall ports 154
                                              cipher strength, connections 200


VMware, Inc.                                                                                  245
ESX Configuration Guide




       Cisco Discovery Protocol 26, 31                  device disconnection, preventing 210
       Cisco switches 25                                DHCP 23
       claim rules 120                                  diagnostic partition, configuring 108
       clusters, managing profiles from 224             direct access 173
       command reference for ESX 229                    directory service
       commands 233                                        Active Directory 179
       compatibility modes                                 configuring a host 179
         physical 132                                   disabling
         virtual 132                                       iSCSI SAN authentication 169
       compliance checks, host profiles 221                logging for guest operating systems 212, 213
       config reset at disconnect, dvPort groups 33        setgid applications 200
       configuring                                         setuid applications 200
         dynamic discovery 97                              SSL for vSphere Web Access and SDK 184
         RDM 134                                           variable information size 211
         SCSI storage 105                               disabling paths 123
         static discovery 98                            discovery
       copy and paste                                      address 97
         enabling for guest operating systems 209
                                                           dynamic 97
         guest operating systems 209
                                                           static 98
         virtual machines 209                           disk arrays
       creating, host profiles 218, 219                    active-active 121
       current multipathing state 121                      active-passive 121
                                                        disk formats
       D                                                   NFS 106
       datastore copies, mounting 113                      thick provisioned 125
       datastores
                                                           thin provisioned 125
         adding extents 112
                                                        disks, format 126
         configuring on NFS volumes 107
                                                        DMZ 144
         creating on SCSI disk 105
                                                        DNS 58
         displaying 87
                                                        double-encapsulated attacks 162
         grouping 110
                                                        dvPort group, load balancing 48
         increasing capacity 112                        dvPort groups
         managing 109                                      binding on host 33
         managing duplicate 113                            config reset at disconnect 33
         mounting 114                                      description 33
         NFS 81                                            failback 48
         paths 121                                         failover order 48
         refreshing 104                                    live port moving 33
         renaming 110                                      name 33
         review properties 88                              network failover detection 48
         storage over-subscription 127                     notify switches 48
         unmounting 111                                    number of ports 33
         VMFS 81                                           override settings 33
       default certificates, replacing with CA-signed      port blocking 58
                certificates 182
                                                           port group type 33
       delegate user 106
                                                           port name format 33
       dependent hardware iSCSI
                                                           teaming and failover policies 48
         and associated NICs 96
                                                           traffic shaping policies 57
         configuration workflow 94
                                                           virtual machines 41
         considerations 95
                                                        dvPort Groups, adding 32
         reviewing adapters 95                          dvPorts
       deployments for security                            blocked ports 58
         multiple customer open 205, 208
                                                           blocking 58
         multiple customer restricted 206


246                                                                                            VMware, Inc.
Index




         failback 49                              Fibre Channel 78
         failover order 49                        Fibre Channel SANs, WWNs 80
         load balancing 49                        Fibre Channel storage, overview 90
         monitoring 34                            file systems, upgrading 113
                                                  firewall
         network failover detection 49
                                                      rules 194
         notify switches 49
                                                      troubleshooting 194
         port policies 58                         firewall ports
         properties 34                               automating service behavior 156
         states 34                                   backup agents 190
         teaming and failover policies 49            closing 193
         traffic shaping policies 57                 configuring with vCenter Server 150
         VLAN policies 51                            configuring without vCenter Server 151
       dvUplink 29                                   connecting to vCenter Server 152
       dynamic discovery, configuring 97             connecting virtual machine console 153
       dynamic discovery addresses 97                encryption 181
                                                     host to host 154
       E                                             management 154
       early binding port groups 33                  opening in service console 192
       editing                                       opening with vSphere Client 154
         host profile policies 220
                                                     overview 149
         host profiles 220
                                                     SDK and virtual machine console 153
       educational support 7
                                                     security level 190–192
       enabling, host profile policy compliance
                                                     service console 190–193
                 checks 221
       encryption                                    supported services 154
         certificates 181                            vSphere Client and vCenter Server 150
         enabling and disabling SSL 181              vSphere Client and virtual machine
         for user name, passwords, packets 181                 console 153
       enhanced vmxnet 60–62                         vSphere Client direct connection 151
       ESX, command reference 229                    vSphere Web Access and the virtual machine
                                                               console 153
       esxcfg commands 229
                                                     vSphere Web Access and vCenter Server 150
       esxcfg-firewall 194
                                                     vSphere Web Access direct connection 151
       examples
                                                  firewalls
         vmkfstools -C 237
                                                     access for management agents 155
         vmkfstools -Z 237
                                                     access for services 155
       exporting
         host groups 176                             configuring 156
         host profiles 219                        Fixed path policy 117, 121
         host users 176                           forged transmissions 163, 164
       extents                                    forged transmits 53, 54
         adding to datastore 112                  FTP and firewall ports 154
         growing 112
                                                  G
       F                                          generating certificates 182
       failback 45, 47–49                         groups
       failover 44, 45, 115                         about 176
       failover order 45, 47–49                     adding to hosts 178
       failover paths, status 120                   adding users 179
       failover policies                            authentication 173
          dvPort groups 48                          exporting a group list 176
          dvPorts 49                                modifying on hosts 179
          port group 47                             permissions and roles 172
          vSwitch 45



VMware, Inc.                                                                                 247
ESX Configuration Guide




         removing from hosts 178                         hosts
         viewing group lists 176                           adding groups 178
       guest operating systems                             adding to a vNetwork Distributed Switch 30
         copy and paste 209                                adding users 177
         disabling logging 212, 213                        deployments and security 205
         enabling copy and paste 209                       memory 211
         limiting variable information size 211            thumbprints 181
         logging levels 212
         security recommendations 209                    I
                                                         IDE 78
       H                                                 importing host profile 219
       hardware acceleration                             inbound traffic shaping 57
         about 123
                                                         Internet Protocol 43
         benefits 123
                                                         Internet Protocol Security (IPsec) 165
         disabling 124
                                                         IP address 31
         requirements 123
                                                         IP addresses 80
         status 124
                                                         IP storage port groups, creating 20, 37
       hardware devices, removing 210
       hardware iSCSI, and failover 119                  IPsec, See Internet Protocol Security (IPsec)
       hardware iSCSI adapters                           IPv4 43
         dependent 91                                    IPv6 43
         independent 91                                  iSCSI
       hardware iSCSI initiators                            authentication 168
         changing iSCSI name 93                             networking 20, 44
         configuring 92                                     protecting transmitted data 169
         installing 92                                      QLogic iSCSI adapters 168
         setting up discovery addresses 97                  securing ports 169
         setting up naming parameters 93                    security 168
         viewing 92                                         software client and firewall ports 154
       host, reference 223
                                                            with multiple NICs 68
       host certificate searches 185                     iSCSI adapters
       host name, configuring 179                           hardware 91
       host networking, viewing 15                          software 91
       host profile, attaching entities 221
                                                         iSCSI aliases 80
       host profiles
         accessing 218                                   iSCSI HBA, alias 93
                                                         iSCSI initiators
         applying permissions 180
                                                            advanced parameters 102
         applying profiles 222, 223
                                                            configuring advanced parameters 103
         attaching entities from host 222
                                                            configuring CHAP 100
         attaching entities from Host Profile view 222
                                                            hardware 92
         checking compliance 225, 226
                                                            setting up CHAP parameters 99
         creating 218
                                                         iSCSI names 80
         creating from host 219
                                                         iSCSI networking, creating a VMkernel port 68
         creating from host profile view 218             iSCSI SAN authentication, disabling 169
         editing a policy 220                            iSCSI storage
         editing profiles 220                               hardware-initiated 90
         enabling policy compliance checks 221              initiators 90
         exporting 219                                      software-initiated 90
         importing profiles 219                          isolation
                                                            virtual machines 140
         managing profiles 221
                                                            virtual networking layer 142
         updating from reference host 224
                                                            virtual switches 142
         usage model 217
                                                            VLANs 142
       host-to-host firewall ports 154




248                                                                                            VMware, Inc.
Index




       J                                             multipathing policy 121
       jumbo frames                                  multipathing state 121
         enabling 62                                 mutual CHAP 99
         virtual machines 61, 62
                                                     N
       L                                             NAS, mounting 66
       late binding port groups 33                   NAT 43
       Layer 2 security 51                           Native Multipathing Plug-In 115, 117
       live port moving, dvPort groups 33            Nessus 203
       load balancing 44, 45, 47–49                  netqueue, enable 63
       local SCSI storage, overview 89               NetQueue, disabling 63
       log files                                     network adapter, service console 22
          limiting number 212                        network adapters
          limiting size 212                            vDS 36, 37
       logging, disabling for guest operating          viewing 15, 31
                  systems 212, 213                   network address translation 43
       logging levels, guest operating systems 212   network failover detection 45, 47–49
       LUNs                                          networking
          creating and rescan 104                      avanced 43
          making changes and rescan 104                best practices 65
          multipathing policy 121                      introduction 13
          setting multipathing policy 121              performance 63
                                                       security policies 53, 54
       M
                                                       troubleshooting 65, 72
       MAC address
        configuration 60                             networking best practices 65
        configuring 59                               networks
                                                       dvPorts 33
        generating 59
                                                       resource pools 41
        static 60
                                                       resource settings 42
       MAC address changes 163, 164
                                                       security 158
       MAC addresses 53, 54
                                                     NFS
       MAC flooding 162                                firewall ports 154
       management access                               networking 20
        firewalls 155                                NFS datastores
        TCP and UDP ports 157                          repositories 107
       maximum MTU 31                                  unmounting 111
       maximum number of ports 31                    NFS storage
       metadata, RDMs 132                              adding 107
       modifying groups on hosts 179                   overview 106
       Most Recently Used path policy 117, 121       NIC teaming, definition 13
                                                     NICs
       mounting VMFS datastores 113
                                                       adding to a vNetwork Distributed Switch 36
       MPPs, See multipathing plug-ins
                                                       mapping to ports 69
       MRU path policy 121
                                                       removing from a vNetwork Distributed
       MTU 60, 62, 63                                            Switch 36
       multicast brute-force attacks 162             NIS and firewall ports 154
       multipathing                                  NMP
        activating for software iSCSI 96               I/O flow 118
        active paths 120                               path claiming 120
        broken paths 120                               See also Native Multipathing Plug-In
        disabled paths 120                           no access role 175
        standby paths 120                            No Access role 175
        viewing the current state of 120             notify switches 45, 47–49
       multipathing plug-ins, path claiming 120
                                                     NTP 156, 179



VMware, Inc.                                                                                         249
ESX Configuration Guide




       O                                                 physical network adapters
       one-way CHAP 99                                     adding to a vNetwork Distributed Switch 36
       outbound traffic shaping 57                         managing 36
       override settings, dvPort groups 33                 removing 36
                                                         physical switches, troubleshooting 73
                                                         plug-ins
       P                                                   pam_cracklib.so 197, 199
       pam_cracklib.so plug-in 197, 199
                                                           pam_passwdqc.so 196
       pam_passwdqc.so plug-in 196
                                                         Pluggable Storage Architecture 115
       partition mappings 132
                                                         policies, security 166
       passive disk arrays 121
                                                         port binding 67, 96, 119
       passphrase 173
                                                         port blocking, dvPort groups 58
       passthrough device, add to a virtual machine 64
                                                         port configuration 24
       passwords
         aging 195                                       port group
                                                           definition 13
         aging restrictions 195
                                                           using 18
         character classes 173
                                                         port groups
         complexity 196                                    failback 47
         criteria 196                                      failover order 47
         host 194–197, 199                                 Layer 2 Security 52
         length 196                                        load balancing 47
         pam_cracklib.so plug-in 197, 199                  network failover detection 47
         pam_passwdqc.so plug-in 196                       notify switches 47
         plug-ins 196                                      traffic shaping 56
         requirements 173                                  troubleshooting 73
         restrictions 194–196                            port name format, dvPort groups 33
         reuse rules 197                                 ports, service console 22
         service console 194                             preferred path 120
       path claiming 120                                 private VLAN
       path failover, host-based 119                       create 35
       path failure 118                                    primary 35
       path failure rescan 104                             removing 35
       path management 115                                 secondary 35
       path policies                                     privileges and permissions 174
         changing defaults 122                           profiles, managing 224
         Fixed 117, 121                                  promiscuous mode 53, 54, 163, 164
         Most Recently Used 117, 121                     properties, dvPorts 34
         MRU 121                                         proxy services
                                                           changing 185
         Round Robin 117, 121
                                                           encryption 181
       Path Selection Plug-Ins 117
                                                         PSA, See Pluggable Storage Architecture
       paths
         disabling 123                                   PSPs, See Path Selection Plug-Ins
         preferred 120
       PCI 64
                                                         R
                                                         RAID devices 132
       peak bandwidth 55–57
                                                         random frame attacks 162
       permissions
         and privileges 174                              raw device mapping, see RDM 129
                                                         RDM
         host profiles 180
                                                           advantages 130
         overview 174
                                                           and virtual disk files 133
         root user 174
                                                           creating 134
         user 174, 175
                                                           dynamic name resolution 133
         vCenter Server administrator 174
                                                           overview 129
         vpxuser 174



250                                                                                            VMware, Inc.
Index




         physical compatibility mode 132                resource guarantees and limits 140
         virtual compatibility mode 132                 scanning software 203
         with clustering 133                            scenarios 205
       RDMs                                             service console 146, 189
         and snapshots 132                              setuid and setgid flags 200
         and VMFS formats 132                           virtual machines 140
         path management 135                            virtual machines with VLANs 158
       Read Only role 175, 176                          virtual networking layer 142
       reference host 223                               virtual switch ports 163
       removing users from groups 179                   VLAN hopping 160
       replacing, default certificates 182              VMware policy 147
       rescan
                                                        vmware-authd 171
         LUN creation 104
                                                        vmware-hostd 171
         path masking 104
                                                      security associations
         when path is down 104                          adding 165
       resource limits and guarantees, security 140
                                                        available 166
       resource pool settings, vDS 42
       resource pools, networks 41                      listing 166
       roles                                            removing 166
         Administrator 175                            security policies
         and permissions 175                            available 168
         default 175                                    creating 166
         host profiles 180                              dvPorts 53, 54
         No Access 175                                  listing 168
         Read Only 175                                  removing 168
                                                      service console
         security 175
                                                        default gateway 23
       root login
         permissions 174                                direct connections 190
         SSH 202                                        firewall ports 192
       Round Robin path policy 117, 121                 firewall ports, closing 193
       routing 58                                       firewall ports, opening 192
                                                        firewall security 190
       S                                                isolating 161
       SAS 78                                           logging in 190
       SATA 78                                          network policies 23
       SATPs, See Storage Array Type Plug-Ins           networking 40
       SCSI, vmkfstools 235                             password plug-in 197, 199
       SDK, firewall ports and virtual machine          password restrictions 194
                 console 153                            recommendations for securing 189
       security
                                                        remote connections 190
         architecture 139
                                                        securing with VLANs and virtual switches 160
         best practices 205
                                                        security 189
         certification 147
                                                        setgid applications 200
         cipher strength 200
                                                        setuid applications 200
         DMZ in single host 142, 144
                                                        SSH connections 202
         ESX 139, 149
                                                        troubleshooting 73
         features 139
                                                        VLAN 23
         iSCSI storage 168
                                                      service console networking
         overview 139                                   configuration 21
         PAM authentication 171                         troubleshooting 72, 73
         patches 203                                  service console security 146, 189
         permissions 174
         recommendations for virtual machines 209




VMware, Inc.                                                                                       251
ESX Configuration Guide




       services                                overview 77
         automating 156                        provisioned 126
         starting 156                          provisioning 124
       setgid                                  SAN 90
         applications 200
                                               securing with VLANs and virtual switches 160
         default applications 202
                                               supported vSphere features 84
         disabling applications 200
                                               types 78
       setinfo 211
                                               used by virtual machines 126
       setuid                                storage adapters
         applications 200                      copying names 86
         default applications 201              Fibre Channel 90
         disabling applications 200            viewing 85
       shell access, granting 177
                                               viewing in vSphere Client 85
       single point of failure 89
                                             Storage Array Type Plug-Ins 117
       SMB and firewall ports 154
                                             storage devices
       SNMP and firewall ports 154             displaying for a host 86
       software iSCSI                          displaying for an adapter 87
         and failover 119
                                               identifiers 81, 87
         diagnostic partition 107
                                               names 81
         networking 67
                                               paths 121
       software iSCSI initiators
         configuring 93                        runtime names 81
         enabling 94                           viewing 86
                                             storage filters
         setting up discovery addresses 97
                                               disabling 127
       spanning tree attacks 162
                                               host rescan 128
       SPOF 89
                                               RDM 128
       SSH
                                               same host and transports 128
         configuring 203
                                               VMFS 128
         firewall ports 154
                                             storage space 124
         security settings 202
                                             switch, vNetwork 39
         service console 202
       SSL
          enabling and disabling 181         T
          encryption and certificates 181    targets 79
         timeouts 183                        TCP ports 157
       standby adapters 25                   TCP Segmentation Offload 60, 61
       standby uplinks 45, 47–49             TCP/IP, default gateway 23
                                             teaming policies
       states, dvPorts 34
                                                dvPort groups 48
       static discovery, configuring 98
                                                dvPorts 49
       static discovery addresses 97
                                                port group 47
       storage
         access for virtual machines 84         vSwitch 45
         adapters 79                         technical support 7, 233
         configuring 89                      thin disks, creating 125
         Fibre Channel 90                    third-party software support policy 147
         introduction 77                     third-party switch 28
         iSCSI 90                            thumbprints, hosts 181
                                             timeouts, SSL 183
         local 78
                                             Tomcat Web service 146
         local SCSI 89
                                             traffic shaping
         managing 109
                                                port groups 56
         networked 78
                                                vSwitch 55
         NFS 106
         not-shared 126



252                                                                                    VMware, Inc.
Index




       traffic shaping policies                           firewall ports 150
          dvPort groups 57                                permissions 174
          dvPorts 57                                   vCenter Server users 173
       troubleshooting                                 vDS
          firewall 194                                    adding a host to 30
          networking 65, 72                               configuration 29
          port groups 73                                  jumbo frames 62
       TSO 60                                             manage hosts 30
                                                          name 31
       U
                                                          resource pool settings 42
       UDP ports 157
                                                          service console 40
       upgrading
                                                          service console adapter 38
         vDS 32
                                                          settings 31
         vNetwork Distributed Switch 32
       uplink adapters                                    upgrading 32
         adding 25                                        virtual machines 40
         adding to a vNetwork Distributed Switch 36       virtual network adapter 38
         duplex 24                                        virtual network adapters 37
         managing 36                                   virtual adapter, VMkernel 39
                                                       virtual disk, repair 243
         removing 36
                                                       virtual disks
         speed 24                                         extending 241
       uplink assignments 31                              formats 125
       uplink port names 31                               supported formats 239
       USB 78                                          Virtual LAN 44
       user management 171                             virtual machine networking 14, 18, 19
       user permissions, vpxuser 175                   virtual machines
       user roles                                         copy and paste 209
         Administrator 176
                                                          disabling logging 212, 213
         no access 175
                                                          enabling copy and paste 209
         Read Only 176
                                                          isolation 142, 144
       users
         about 176                                        limiting variable information size 211
         adding to groups 179                             migrating to or from a vNetwork Distributed
                                                                    Switch 41
         adding to hosts 177
                                                          networking 40, 41
         authentication 173
                                                          preventing device disconnection 210
         direct access 173
                                                          resource reservations and limits 140
         exporting a user list 176
                                                          security 140
         from Windows domain 173
                                                          security recommendations 209
         modifying on hosts 177
                                                          with RDMs 134
         permissions and roles 172
                                                       virtual network, security 158
         removing from groups 179                      virtual network adapters, removing 40
         removing from hosts 178                       virtual networking layer and security 142
         security 173                                  virtual switch ports, security 163
         vCenter Server 173                            virtual switch security 160
         viewing user list 176                         virtual switches
                                                          802.1Q and ISL tagging attacks 162
       V                                                  and iSCSI 169
       variable information size for guest operating
                                                          double-encapsulated attacks 162
                 systems
         disabling 211                                    forged transmissions 163
         limiting 211                                     MAC address changes 163
       vCenter Server                                     MAC flooding 162
         connecting through firewall 152                  multicast brute-force attacks 162




VMware, Inc.                                                                                             253
ESX Configuration Guide




         promiscuous mode 163                     VMkernel ports 69
         random frame attacks 162                 vmkfstools
         scenarios for deployment 205               cloning disks 241
         security 162                               creating RDMs 242
         spanning tree attacks 162                  creating virtual disks 239
       VLAN                                         deleting virtual disks 240
         definition 13                              extending virtual disks 241
         private 35                                 file system options 236
       VLAN ID                                      geometry 243
         primary 34
                                                    inflating thin disks 240
         secondary 34
                                                    initializing virtual disks 240
       VLAN policies
         dvPort group 51                            migrating virtual disks 241
         dvPorts 51                                 overview 235
       VLAN policy 51                               RDM attributes 243
       VLAN security 160                            removing zeroed blocks 240
       VLAN trunking 51                             renaming virtual disks 241
       VLAN Trunking 32, 51                         SCSI reservations 243
       VLAN Type 51                                 syntax 235
       VLANs                                        upgrading virtual disks 242
         and iSCSI 169                              virtual disk options 239
         Layer 2 security 160                       virtual disks conversion 240
         scenarios for deployment 205             vmkfstools -C command 236
         security 158, 161                        vmkfstools -P command 237
         VLAN hopping 160                         vmkfstools -v command 236
       VLANS                                      vmkfstools -Z command 237
         configuring for security 161             vmkfstools command options 236
         service console 161                      vmkfstools examples
       VMFS                                         cloning disks 241
         conversion 238
                                                    creating RDMs 242
         sharing 205
                                                    creating virtual disks 240
         vmkfstools 235                           vMotion
         volume resignaturing 113                   definition 13
       VMFS datastores                              networking configuration 19
         adding extents 112
                                                    securing with VLANs and virtual switches 160
         changing properties 111                  VMotion, networking 20
         changing signatures 115                  vMotion interfaces, creating 20, 37
         configuring 105                          VMware NMP
         creating 82                                I/O flow 118
         deleting 110                               See also Native Multipathing Plug-In
         increasing capacity 112                  VMware PSPs, See Path Selection Plug-Ins
         resignaturing copies 114                 VMware SATPs, See Storage Array Type Plug-
                                                             Ins
         sharing 83
                                                  vmware-hostd 171
         unmounting 111
                                                  vNetwork Distributed Switch
       VMFS volume resignaturing 113
                                                    adding a host to 30
       VMkernel
                                                    jumbo frames 62
         configuring 19
                                                    new 29
         definition 13
                                                    service console 40
         jumbo frames 63
                                                    service console adapter 38
         networking 20
                                                    third-party 28
       VMkernel adapter 39
                                                    virtual network adapter 38
       VMkernel network adapters, adding 20, 37
                                                    VMkernel adapter 39
       VMkernel networking 14



254                                                                                     VMware, Inc.
Index




       vNetwork Distributed Switches                    vSphere Web Access
         adding a VMkernel network adapter 37             and host services 181
         adding hosts to 30                               disabling SSL 184
         admin contact info 31                            firewall ports connecting to virtual machine
         Cisco Discovery Protocol 31                                console 153
         configuration 29                                 firewall ports for direct connection 151
         IP address 31                                    firewall ports with vCenter Server 150
         maximum MTU 31                                 vSwitch
                                                          configuration 24
         maximum number of ports 31
                                                          definition 13
         migrating virtual machines to or from 41
                                                          failback 45
         miscellaneous policies 58
                                                          failover order 45
         name 31
                                                          Layer 2 Security 52
         settings 31
                                                          load balancing 45
         upgrading 32
                                                          network failover detection 45
         virtual machines 40
       vNetwork Standard Switch                           notify switches 45
         configuration 24                                 port configuration 24
         Layer 2 Security 52                              properties 24
         port configuration 24                            teaming and failover policies 45, 47
         traffic shaping 55                               traffic shaping 55
         using 17                                         using 17
         viewing 15                                       viewing 15
       vNewtork Distributed Switches, virtual network
                  adapters 37                           W
       volume resignaturing 113, 114                    WWNs 80
       vpxuser 175
       vSphere CLI 96
       vSphere Client
         firewall ports connecting to virtual machine
                    console 153
         firewall ports for direct connection 151
         firewall ports with vCenter Server 150




VMware, Inc.                                                                                              255
ESX Configuration Guide




256                       VMware, Inc.

More Related Content

PDF
ESX Server 3i Installable Setup Guide
PDF
Vsp 40 esxi_i_vc_setup_guide
PDF
VCP5 vs VCP4 Blue Print
PDF
Power vault md32xxi deployment guide for v mware esx4.1 r2
PDF
Eql tr symantec-backup-exec-10d-tr1024
PDF
Ccmigration 09186a00807a15d0
PDF
Vsphere esxi-vcenter-server-50-storage-guide
PPTX
VMware Advance Troubleshooting Workshop - Day 5
ESX Server 3i Installable Setup Guide
Vsp 40 esxi_i_vc_setup_guide
VCP5 vs VCP4 Blue Print
Power vault md32xxi deployment guide for v mware esx4.1 r2
Eql tr symantec-backup-exec-10d-tr1024
Ccmigration 09186a00807a15d0
Vsphere esxi-vcenter-server-50-storage-guide
VMware Advance Troubleshooting Workshop - Day 5

What's hot (20)

PDF
Getting Started with ESXServer3iEmbedded
PDF
Infraestructure WMWARE
PDF
Introduction to VMware Infrastructure
PDF
Using VMware Infrastructure for Backup and Restore
PDF
Vsp 40 Admin Guide
PDF
Boosting virtualization performance with Intel SSD DC Series P3600 NVMe SSDs ...
PDF
Diretrizes para Implementação do Citrix XenServer 6.2.0 em Servidores HP Prol...
DOCX
Installation of ESX Server
PDF
Vmware admin interview questions
PDF
Comparação entre XenServer 6.2 e VMware VSphere 5.1 - Comparison of Citrix Xe...
PDF
VMware Interview questions and answers
PDF
Cерверы Depo storm 3400 на базе новейших процессоров intel xeon e5 2600v3 fin
PDF
VSPEX Blue, une infrastructure hyper-convergée simple et sûre pour votre SDDC
 
PDF
Setup guide nos-v3_5
PPTX
Vmug v sphere storage appliance (vsa) overview
DOCX
Kumar-Jayaraman-Resume
PDF
Multi-signed Kernel Module
PDF
EMC - Copaco Cloud Event 2015 (break-out 3)
PPTX
Nexsan E5000 Family / Familia E5000 Nexsan / Enterprise NAS
PDF
The PrimeArray solution for massive data storage
Getting Started with ESXServer3iEmbedded
Infraestructure WMWARE
Introduction to VMware Infrastructure
Using VMware Infrastructure for Backup and Restore
Vsp 40 Admin Guide
Boosting virtualization performance with Intel SSD DC Series P3600 NVMe SSDs ...
Diretrizes para Implementação do Citrix XenServer 6.2.0 em Servidores HP Prol...
Installation of ESX Server
Vmware admin interview questions
Comparação entre XenServer 6.2 e VMware VSphere 5.1 - Comparison of Citrix Xe...
VMware Interview questions and answers
Cерверы Depo storm 3400 на базе новейших процессоров intel xeon e5 2600v3 fin
VSPEX Blue, une infrastructure hyper-convergée simple et sûre pour votre SDDC
 
Setup guide nos-v3_5
Vmug v sphere storage appliance (vsa) overview
Kumar-Jayaraman-Resume
Multi-signed Kernel Module
EMC - Copaco Cloud Event 2015 (break-out 3)
Nexsan E5000 Family / Familia E5000 Nexsan / Enterprise NAS
The PrimeArray solution for massive data storage
Ad

Viewers also liked (10)

DOC
Vcpfaq
PDF
Network policies
KEY
ESX Server from VMware
PPTX
Accelerating Neutron with Intel DPDK
ODP
Networking in OpenStack for non-networking people: Neutron, Open vSwitch and ...
PDF
Virtualized Networking in Virtualized Data Center and Cloud Computing
PDF
Virtual networking concepts
PPT
VMware Esx Short Presentation
PDF
Virtualized network with openvswitch
PDF
Intel DPDK Step by Step instructions
Vcpfaq
Network policies
ESX Server from VMware
Accelerating Neutron with Intel DPDK
Networking in OpenStack for non-networking people: Neutron, Open vSwitch and ...
Virtualized Networking in Virtualized Data Center and Cloud Computing
Virtual networking concepts
VMware Esx Short Presentation
Virtualized network with openvswitch
Intel DPDK Step by Step instructions
Ad

Similar to Esx configuration guide (20)

PDF
Vtguru v mware-v-sphere-administration-training
PDF
VMware Cookbook A Real World Guide to Effective VMware Use Second Edition Rya...
PDF
Vsphere esxi-vcenter-server-50-installation-setup-guide
PPTX
Denver VMUG nov 2011
PPTX
General-and-complete_Training_Slide_v0.9-TGT.pptx
PDF
Vsp 40 admin_guide
PDF
V mware implementation with ibm system storage ds4000 ds5000 redp4609
PDF
Book VMWARE VMware ESXServer Advanced Technical Design Guide
PDF
TechBook: Using EMC VNX Storage with VMware vSphere
 
DOCX
Vmware Training in Bangalore | Certification
PDF
Vmware Vsphere For Dummies Dan Mitchell Thomas Keegan
PDF
Vsicm51 m01 course_intro_
PDF
Es xi 4.1 migration guide
PDF
VMware vSphere 5 seminar
PDF
Vsos55 lab pr
PDF
Vm ware certification study and training courses
PDF
Vm ware certification study and training courses
PDF
Techbook : Using EMC Symmetrix Storage in VMware vSphere Environments
 
PPT
Vsphere 4-partner-training180
PDF
Vsicm51 m02 virtualization_intro_
Vtguru v mware-v-sphere-administration-training
VMware Cookbook A Real World Guide to Effective VMware Use Second Edition Rya...
Vsphere esxi-vcenter-server-50-installation-setup-guide
Denver VMUG nov 2011
General-and-complete_Training_Slide_v0.9-TGT.pptx
Vsp 40 admin_guide
V mware implementation with ibm system storage ds4000 ds5000 redp4609
Book VMWARE VMware ESXServer Advanced Technical Design Guide
TechBook: Using EMC VNX Storage with VMware vSphere
 
Vmware Training in Bangalore | Certification
Vmware Vsphere For Dummies Dan Mitchell Thomas Keegan
Vsicm51 m01 course_intro_
Es xi 4.1 migration guide
VMware vSphere 5 seminar
Vsos55 lab pr
Vm ware certification study and training courses
Vm ware certification study and training courses
Techbook : Using EMC Symmetrix Storage in VMware vSphere Environments
 
Vsphere 4-partner-training180
Vsicm51 m02 virtualization_intro_

Recently uploaded (20)

PPTX
OMC Textile Division Presentation 2021.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
August Patch Tuesday
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PPTX
Spectroscopy.pptx food analysis technology
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Machine learning based COVID-19 study performance prediction
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Machine Learning_overview_presentation.pptx
OMC Textile Division Presentation 2021.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
MIND Revenue Release Quarter 2 2025 Press Release
Diabetes mellitus diagnosis method based random forest with bat algorithm
August Patch Tuesday
SOPHOS-XG Firewall Administrator PPT.pptx
Spectroscopy.pptx food analysis technology
Advanced methodologies resolving dimensionality complications for autism neur...
Heart disease approach using modified random forest and particle swarm optimi...
A comparative study of natural language inference in Swahili using monolingua...
TLE Review Electricity (Electricity).pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Univ-Connecticut-ChatGPT-Presentaion.pdf
cloud_computing_Infrastucture_as_cloud_p
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Machine learning based COVID-19 study performance prediction
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Assigned Numbers - 2025 - Bluetooth® Document
Per capita expenditure prediction using model stacking based on satellite ima...
Machine Learning_overview_presentation.pptx

Esx configuration guide

  • 1. ESX Configuration Guide ESX 4.1 vCenter Server 4.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document, see http://www.vmware.com/support/pubs. EN-000328-00
  • 2. ESX Configuration Guide You can find the most up-to-date technical documentation on the VMware Web site at: http://www.vmware.com/support/ The VMware Web site also provides the latest product updates. If you have comments about this documentation, submit your feedback to: docfeedback@vmware.com Copyright © 2009, 2010 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. VMware products are covered by one or more patents listed at http://www.vmware.com/go/patents. VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. VMware, Inc. 3401 Hillview Ave. Palo Alto, CA 94304 www.vmware.com 2 VMware, Inc.
  • 3. Contents About This Book 7 1 Introduction to ESX Configuration 9 Networking 2 Introduction to Networking 13 Networking Concepts Overview 13 Network Services 14 View Networking Information in the vSphere Client 15 View Network Adapter Information in the vSphere Client 15 3 Basic Networking with vNetwork Standard Switches 17 vNetwork Standard Switches 17 Port Groups 18 Port Group Configuration for Virtual Machines 18 VMkernel Networking Configuration 19 Service Console Configuration 21 vNetwork Standard Switch Properties 24 4 Basic Networking with vNetwork Distributed Switches 27 vNetwork Distributed Switch Architecture 28 Configuring a vNetwork Distributed Switch 29 dvPort Groups 32 dvPorts 33 Private VLANs 34 Configuring vNetwork Distributed Switch Network Adapters 36 Configuring Virtual Machine Networking on a vNetwork Distributed Switch 40 Network I/O Control 41 5 Advanced Networking 43 Internet Protocol Version 6 43 VLAN Configuration 44 Networking Policies 44 Change the DNS and Routing Configuration 58 MAC Addresses 59 TCP Segmentation Offload and Jumbo Frames 60 NetQueue and Networking Performance 63 VMDirectPath I/O 64 VMware, Inc. 3
  • 4. ESX Configuration Guide 6 Networking Best Practices, Scenarios, and Troubleshooting 65 Networking Best Practices 65 Mounting NFS Volumes 66 Networking Configuration for Software iSCSI and Dependent Hardware iSCSI 67 Configuring Networking on Blade Servers 70 Troubleshooting 72 Storage 7 Introduction to Storage 77 About ESX Storage 77 Types of Physical Storage 78 Supported Storage Adapters 79 Target and Device Representations 79 About ESX Datastores 81 Comparing Types of Storage 84 Displaying Storage Adapters 85 Viewing Storage Devices 86 Displaying Datastores 87 8 Configuring ESX Storage 89 Local SCSI Storage 89 Fibre Channel Storage 90 iSCSI Storage 90 Datastore Refresh and Storage Rescan Operations 104 Create VMFS Datastores 105 Network Attached Storage 106 Creating a Diagnostic Partition 107 9 Managing Storage 109 Managing Datastores 109 Changing VMFS Datastore Properties 111 Managing Duplicate VMFS Datastores 113 Using Multipathing with ESX 115 Storage Hardware Acceleration 123 Thin Provisioning 124 Turn off vCenter Server Storage Filters 127 10 Raw Device Mapping 129 About Raw Device Mapping 129 Raw Device Mapping Characteristics 132 Managing Mapped LUNs 134 Security 11 Security for ESX Systems 139 ESX Architecture and Security Features 139 4 VMware, Inc.
  • 5. Contents Security Resources and Information 147 12 Securing an ESX Configuration 149 Securing the Network with Firewalls 149 Securing Virtual Machines with VLANs 158 Securing Virtual Switch Ports 163 Internet Protocol Security 165 Securing iSCSI Storage 168 13 Authentication and User Management 171 Securing ESX Through Authentication and Permissions 171 About Users, Groups, Permissions, and Roles 172 Working with Users and Groups on ESX Hosts 176 Encryption and Security Certificates for ESX 181 14 Service Console Security 189 General Security Recommendations 189 Log In to the Service Console 190 Service Console Firewall Configuration 190 Password Restrictions 194 Cipher Strength 200 setuid and setgid Flags 200 SSH Security 202 Security Patches and Security Vulnerability Scanning Software 203 15 Security Best Practices and Scenarios 205 Security Approaches for Common ESX Deployments 205 Virtual Machine Recommendations 209 Host Profiles 16 Managing Host Profiles 217 Host Profiles Usage Model 217 Access Host Profiles View 218 Creating a Host Profile 218 Export a Host Profile 219 Import a Host Profile 219 Edit a Host Profile 220 Manage Profiles 221 Checking Compliance 225 Appendixes A ESX Technical Support Commands 229 B Linux Commands Used with ESX 233 VMware, Inc. 5
  • 6. ESX Configuration Guide C Using vmkfstools 235 vmkfstools Command Syntax 235 vmkfstools Options 236 Index 245 6 VMware, Inc.
  • 7. About This Book This manual, the ESXConfiguration Guide, provides information on how to configure networking for ® VMware ESX, including how to create virtual switches and ports and how to set up networking for virtual machines, VMware vMotion™, and IP storage. It also discusses configuring the file system and various types of storage such as iSCSI and Fibre Channel. The guide provides a discussion of security features built into ESX and the measures that you can take to safeguard ESX from attack. In addition, it includes a list of ESX technical support commands along with their VMware vSphere™ Client equivalents and a description of the vmkfstools utility. This information covers ESX 4.1. Intended Audience This manual is intended for anyone who needs to install, upgrade, or use ESX. The information in this manual is written for experienced Windows or Linux system administrators who are familiar with virtual machine technology and datacenter operations. VMware Technical Publications Glossary VMware Technical Publications provides a glossary of terms that might be unfamiliar to you. For definitions of terms as they are used in VMware technical documentation, go to http://www.vmware.com/support/pubs. Document Feedback VMware welcomes your suggestions for improving our documentation. If you have comments, send your feedback to docfeedback@vmware.com. VMware vSphere Documentation The vSphere documentation consists of the combined VMware vCenter Server and ESX documentation set. Abbreviations Used in Figures The figures in this manual use the abbreviations listed in Table 1. Table 1. Abbreviations Abbreviation Description database vCenter Server database datastore Storage for the managed host dsk# Storage disk for the managed host VMware, Inc. 7
  • 8. ESX Configuration Guide Table 1. Abbreviations (Continued) Abbreviation Description hostn vCenter Server managed hosts SAN Storage Area Network type datastore shared between managed hosts tmplt Template user# User with access permissions VC vCenter Server VM# Virtual machines on a managed host Technical Support and Education Resources The following technical support resources are available to you. To access the current version of this book and other books, go to http://www.vmware.com/support/pubs. Online and Telephone To use online support to submit technical support requests, view your product Support and contract information, and register your products, go to http://www.vmware.com/support. Customers with appropriate support contracts should use telephone support for the fastest response on priority 1 issues. Go to http://www.vmware.com/support/phone_support.html. Support Offerings To find out how VMware support offerings can help meet your business needs, go to http://www.vmware.com/support/services. VMware Professional VMware Education Services courses offer extensive hands-on labs, case study Services examples, and course materials designed to be used as on-the-job reference tools. Courses are available onsite, in the classroom, and live online. For onsite pilot programs and implementation best practices, VMware Consulting Services provides offerings to help you assess, plan, build, and manage your virtual environment. To access information about education classes, certification programs, and consulting services, go to http://www.vmware.com/services. 8 VMware, Inc.
  • 9. Introduction to ESX Configuration 1 This guide describes the tasks you need to complete to configure ESX host networking, storage, and security. In addition, it provides overviews, recommendations, and conceptual discussions to help you understand these tasks and how to deploy a host to meet your needs. Before you use this information, read the Introduction to vSphere for an overview of system architecture and the physical and virtual devices that make up a vSphere system. This introduction summarizes the contents of this guide. Networking The networking information provides you with a conceptual understanding of physical and virtual network concepts, a description of the basic tasks you need to complete to configure your ESX host’s network connections, and a discussion of advanced networking topics and tasks. Storage The storage information provides you with a basic understanding of storage, a description of the basic tasks you perform to configure and manage your ESX host’s storage, and a discussion of how to set up raw device mapping (RDM). Security The security information discusses safeguards that VMware has built into ESX and measures that you can take to protect your host from security threats. These measures include using firewalls, taking advantage of the security features of virtual switches, and setting up user authentication and permissions. Host Profiles This section describes the host profiles feature and how it is used to encapsulate the configuration of a host into a host profile. This section also describes how to apply this host profile to another host or cluster, edit a profile, and check a host’s compliance with a profile. VMware, Inc. 9
  • 10. ESX Configuration Guide Appendixes The appendixes provide specialized information you might find useful when configuring an ESX host. n ESX Technical Support Commands – Discusses the ESX configuration commands that you can issue through a command-line shell such as secure shell (SSH). Although these commands are available for your use, do not consider them to be an API that you can build scripts on. These commands are subject to change and VMware does not support applications and scripts that rely on ESX configuration commands. This appendix provides you with vSphere Client equivalents for these commands. n Using vmkfstools – Discusses the vmkfstools utility, which you can use to create and manipulate virtual disks, file systems, logical volumes, and physical storage devices on the hosts. 10 VMware, Inc.
  • 13. Introduction to Networking 2 The basic concepts of ESX networking and how to set up and configure a network in a vSphere environment are discussed. This chapter includes the following topics: n “Networking Concepts Overview,” on page 13 n “Network Services,” on page 14 n “View Networking Information in the vSphere Client,” on page 15 n “View Network Adapter Information in the vSphere Client,” on page 15 Networking Concepts Overview A few concepts are essential for a thorough understanding of virtual networking. If you are new to ESX, it is helpful to review these concepts. A physical network is a network of physical machines that are connected so that they can send data to and receive data from each other. VMware ESX runs on a physical machine. A virtual network is a network of virtual machines running on a single physical machine that are connected logically to each other so that they can send data to and receive data from each other. Virtual machines can be connected to the virtual networks that you create when you add a network. A physical Ethernet switch manages network traffic between machines on the physical network. A switch has multiple ports, each of which can be connected to a single machine or another switch on the network. Each port can be configured to behave in certain ways depending on the needs of the machine connected to it. The switch learns which hosts are connected to which of its ports and uses that information to forward traffic to the correct physical machines. Switches are the core of a physical network. Multiple switches can be connected together to form larger networks. A virtual switch, vSwitch, works much like a physical Ethernet switch. It detects which virtual machines are logically connected to each of its virtual ports and uses that information to forward traffic to the correct virtual machines. A vSwitch can be connected to physical switches by using physical Ethernet adapters, also referred to as uplink adapters, to join virtual networks with physical networks. This type of connection is similar to connecting physical switches together to create a larger network. Even though a vSwitch works much like a physical switch, it does not have some of the advanced functionality of a physical switch. A vNetwork Distributed Switch acts as a single vSwitch across all associated hosts on a datacenter. This allows virtual machines to maintain consistent network configuration as they migrate across multiple hosts. A dvPort is a port on a vNetwork Distributed Switch that connects to a host’s service console or VMkernel or to a virtual machine’s network adapter. VMware, Inc. 13
  • 14. ESX Configuration Guide A port group specifies port configuration options such as bandwidth limitations and VLAN tagging policies for each member port. Network services connect to vSwitches through port groups. Port groups define how a connection is made through the vSwitch to the network. Typically, a single vSwitch is associated with one or more port groups. A dvPort group is a port group associated with a vNetwork Distributed Switch and specifies port configuration options for each member port. dvPort Groups define how a connection is made through the vNetwork Distributed Switch to the network. NIC teaming occurs when multiple uplink adapters are associated with a single vSwitch to form a team. A team can either share the load of traffic between physical and virtual networks among some or all of its members, or provide passive failover in the event of a hardware failure or a network outage. VLANs enable a single physical LAN segment to be further segmented so that groups of ports are isolated from one another as if they were on physically different segments. The standard is 802.1Q. The VMkernel TCP/IP networking stack supports iSCSI, NFS, and vMotion. Virtual machines run their own systems’ TCP/IP stacks and connect to the VMkernel at the Ethernet level through virtual switches. IP storage refers to any form of storage that uses TCP/IP network communication as its foundation. iSCSI can be used as a virtual machine datastore, and NFS can be used as a virtual machine datastore and for direct mounting of .ISO files, which are presented as CD-ROMs to virtual machines. TCP Segmentation Offload, TSO, allows a TCP/IP stack to emit very large frames (up to 64KB) even though the maximum transmission unit (MTU) of the interface is smaller. The network adapter then separates the large frame into MTU-sized frames and prepends an adjusted copy of the initial TCP/IP headers. Migration with vMotion enables a virtual machine that is powered on to be transferred from one ESX host to another without shutting down the virtual machine. The optional vMotion feature requires its own license key. Network Services A vNetwork provides several different services to the host and virtual machines. You can enable three types of network services in ESX: n Connecting virtual machines to the physical network and to each other. n Connecting VMkernel services (such as NFS, iSCSI, or vMotion) to the physical network. n Running management services for ESX via the service console. A service console port, which is set up by default during installation, is required for ESX to connect to any network or remote services, including the vSphere Client. Additional service console ports might be necessary for other services, such as iSCSI storage. 14 VMware, Inc.
  • 15. Chapter 2 Introduction to Networking View Networking Information in the vSphere Client The vSphere Client shows general networking information and information specific to network adapters. Procedure 1 Log in to the vSphere Client and select the host from the inventory panel. 2 Click the Configuration tab and click Networking. 3 (Optional) Choose the type of networking to view. Option Description Virtual Switch Displays vNetwork Standard Switch networking on the host. vNetwork Distributed Switch Displays vNetwork Distributed Switch networking on the host. The vNetwork Distributed Switch option appears only on hosts that are connected to one or more vNetwork Distributed Switches. Networking information is displayed for each virtual switch on the host. View Network Adapter Information in the vSphere Client For each physical network adapter on the host, you can view information such as the speed, duplex, and observed IP ranges. Procedure 1 Log in to the vSphere Client and select the host from the inventory panel. 2 Click the Configuration tab, and click Network Adapters. The network adapters panel shows the following information. Table 2-1. Network Adapter Parameters Option Description Device Name of the network adapter. Speed Actual speed and duplex of the network adapter. Configured Configured speed and duplex of the network adapter. Switch vSwitch or vDS that the network adapter is associated with. Observed IP ranges IP addresses that the network adapter has access to. Wake on LAN supported Network adapter ability to support Wake on the LAN. VMware, Inc. 15
  • 17. Basic Networking with vNetwork Standard Switches 3 vNetwork Standard Switches (vSwitches) handle network traffic at the host level in a vSphere environment. Use the vSphere Client to add networking based on the categories that reflect the types of network services: n Virtual machines n VMkernel n Service console This chapter includes the following topics: n “vNetwork Standard Switches,” on page 17 n “Port Groups,” on page 18 n “Port Group Configuration for Virtual Machines,” on page 18 n “VMkernel Networking Configuration,” on page 19 n “Service Console Configuration,” on page 21 n “vNetwork Standard Switch Properties,” on page 24 vNetwork Standard Switches You can create abstracted network devices called vNetwork Standard Switches (vSwitches). A vSwitch can route traffic internally between virtual machines and link to external networks. You can use vSwitches to combine the bandwidth of multiple network adapters and balance communications traffic among them. You can also configure a vSwitch to handle physical NIC failover. A vSwitch models a physical Ethernet switch. The default number of logical ports for a vSwitch is 120. You can connect one network adapter of a virtual machine to each port. Each uplink adapter associated with a vSwitch uses one port. Each logical port on the vSwitch is a member of a single port group. Each vSwitch can also have one or more port groups assigned to it. For information about maximum allowed ports and port groups, see Configuration Maximums for vSphere 4.1. When two or more virtual machines are connected to the same vSwitch, network traffic between them is routed locally. If an uplink adapter is attached to the vSwitch, each virtual machine can access the external network that the adapter is connected to. VMware, Inc. 17
  • 18. ESX Configuration Guide Port Groups Port groups aggregate multiple ports under a common configuration and provide a stable anchor point for virtual machines connecting to labeled networks. Figure 3-1. vNetwork Standard Switch Network VM VM VM VM VM Network C A B C D E port A B C D E groups vSwitch vSwitch Host1 Host2 virtual Host1 Host2 physical physical network adapters physical network Each port group is identified by a network label, which is unique to the current host. Network labels are used to make virtual machine configuration portable across hosts. All port groups in a datacenter that are physically connected to the same network (in the sense that each can receive broadcasts from the others) are given the same label. Conversely, if two port groups cannot receive broadcasts from each other, they have distinct labels. A VLAN ID, which restricts port group traffic to a logical Ethernet segment within the physical network, is optional. For a port group to reach port groups located on other VLANs, the VLAN ID must be set to 4095. If you use VLAN IDs, you must change the port group labels and VLAN IDs together so that the labels properly represent connectivity. Port Group Configuration for Virtual Machines You can add or modify a virtual machine port group from the vSphere Client. The vSphere Client Add Network wizard guides you through the tasks to create a virtual network to which virtual machines can connect, including creating a vSwitch and configuring settings for a network label. When you set up virtual machine networks, consider whether you want to migrate the virtual machines in the network between hosts. If so, be sure that both hosts are in the same broadcast domain—that is, the same Layer 2 subnet. ESX does not support virtual machine migration between hosts in different broadcast domains because the migrated virtual machine might require systems and resources that it would no longer have access to in the new network. Even if your network configuration is set up as a high-availability environment or includes intelligent switches that can resolve the virtual machine’s needs across different networks, you might experience lag times as the Address Resolution Protocol (ARP) table updates and resumes network traffic for the virtual machines. Virtual machines reach physical networks through uplink adapters. A vSwitch can transfer data to external networks only when one or more network adapters are attached to it. When two or more adapters are attached to a single vSwitch, they are transparently teamed. 18 VMware, Inc.
  • 19. Chapter 3 Basic Networking with vNetwork Standard Switches Add a Virtual Machine Port Group Virtual machine port groups provide networking for virtual machines. Procedure 1 Log in to the vSphere Client and select the host from the inventory panel. 2 Click the Configuration tab and click Networking. 3 Select the Virtual Switch view. vSwitches appear in an overview that includes a details layout. 4 On the right side of the page, click Add Networking. 5 Accept the default connection type, Virtual Machines, and click Next. 6 Select Create a virtual switch or one of the listed existing vSwitches and the associated physical adapters to use for this port group. You can create a new vSwitch with or without Ethernet adapters. If you create a vSwitch without physical network adapters, all traffic on that vSwitch is confined to that vSwitch. No other hosts on the physical network or virtual machines on other vSwitches can send or receive traffic over this vSwitch. You might create a vSwitch without physical network adapters if you want a group of virtual machines to be able to communicate with each other, but not with other hosts or with virtual machines outside the group. 7 Click Next. 8 In the Port Group Properties group, enter a network label that identifies the port group that you are creating. Use network labels to identify migration-compatible connections common to two or more hosts. 9 (Optional) If you are using a VLAN, for VLAN ID, enter a number between 1 and 4094. If you are not using a VLAN, leave this blank. If you enter 0 or leave the option blank, the port group can see only untagged (non-VLAN) traffic. If you enter 4095, the port group can see traffic on any VLAN while leaving the VLAN tags intact. 10 Click Next. 11 After you determine that the vSwitch is configured correctly, click Finish. VMkernel Networking Configuration A VMkernel networking interface is used for VMware vMotion, IP storage, and Fault Tolerance. Moving a virtual machine from one host to another is called migration. Using vMotion, you can migrate powered on virtual machines with no downtime. Your VMkernel networking stack must be set up properly to accommodate vMotion. IP storage refers to any form of storage that uses TCP/IP network communication as its foundation, which includes iSCSI, FCoE and NFS for ESX. Because these storage types are network based, they can use the same VMkernel interface and port group. The network services that the VMkernel provides (iSCSI, NFS, and vMotion) use a TCP/IP stack in the VMkernel. This TCP/IP stack is completely separate from the TCP/IP stack used in the service console. Each of these TCP/IP stacks accesses various networks by attaching to one or more port groups on one or more vSwitches. VMware, Inc. 19
  • 20. ESX Configuration Guide TCP/IP Stack at the VMkernel Level The VMware VMkernel TCP/IP networking stack provides networking support in multiple ways for each of the services it handles. The VMkernel TCP/IP stack handles iSCSI, NFS, and vMotion in the following ways. n iSCSI as a virtual machine datastore. n iSCSI for the direct mounting of .ISO files, which are presented as CD-ROMs to virtual machines. n NFS as a virtual machine datastore. n NFS for the direct mounting of .ISO files, which are presented as CD-ROMs to virtual machines. n Migration with vMotion. n Fault Tolerance logging. n Provides networking information to dependent hardware iSCSI adapters. If you have two or more physical NICs for iSCSI, you can create multiple paths for the software iSCSI by configuring iSCSI Multipathing. For more information about iSCSI Multipathing, see the iSCSI SAN Configuration Guide. NOTE ESX supports only NFS version 3 over TCP/IP. Set Up VMkernel Networking Create a VMkernel network adapter for use as a vMotion interface or an IP storage port group. Procedure 1 Log in to the vSphere Client and select the host from the inventory panel. 2 Click the Configuration tab and click Networking. 3 In the Virtual Switch view, click Add Networking. 4 Select VMkernel and click Next. 5 Select the vSwitch to use, or select Create a virtual switch to create a new vSwitch. 6 Select the check boxes for the network adapters your vSwitch will use. Select adapters for each vSwitch so that virtual machines or other services that connect through the adapter can reach the correct Ethernet segment. If no adapters appear under Create a new virtual switch, all the network adapters in the system are being used by existing vSwitches. You can either create a new vSwitch without a network adapter, or select a network adapter that an existing vSwitch uses. 7 Click Next. 8 Select or enter a network label and a VLAN ID. Option Description Network Label A name that identifies the port group that you are creating. This is the label that you specify when configuring a virtual adapter to be attached to this port group when configuring VMkernel services such as vMotion and IP storage. VLAN ID Identifies the VLAN that the port group’s network traffic will use. 20 VMware, Inc.
  • 21. Chapter 3 Basic Networking with vNetwork Standard Switches 9 Select Use this port group for vMotion to enable this port group to advertise itself to another host as the network connection where vMotion traffic should be sent. You can enable this property for only one vMotion and IP storage port group for each host. If this property is not enabled for any port group, migration with vMotion to this host is not possible. 10 Choose whether to use this port group for fault tolerance logging. 11 On an IPv6-enabled host, choose whether to use IP (Default), IPv6, or IP and IPv6 networking. This option does not appear on hosts that do not have IPv6 enabled. IPv6 configuration cannot be used with dependent hardware iSCSI adapters. 12 Click Next. 13 Select Obtain IP settings automatically to use DHCP to obtain IP settings, or select Use the following IP settings to specify IP settings manually. If you choose to specify IP settings manually, provide this information. DHCP cannot be used with dependent hardware iSCSI adapters. a Enter the IP address and subnet mask for the VMkernel interface. This address must be different from the IP address set for the service console. b Click Edit to set the VMkernel Default Gateway for VMkernel services, such as vMotion, NAS, and iSCSI. c On the DNS Configuration tab, the name of the host is entered by default. The DNS server addresses that were specified during installation are also preselected, as is the domain. d On the Routing tab, the service console and the VMkernel each need their own gateway information. A gateway is needed for connectivity to machines not on the same IP subnet as the service console or VMkernel. The default is static IP settings. e Click OK, then click Next. 14 If you are using IPv6 for the VMkernel interface, select one of the following options for obtaining IPv6 addresses. n Obtain IPv6 addresses automatically through DHCP n Obtain IPv6 addresses automatically through router advertisement n Static IPv6 addresses 15 If you choose to use static IPv6 addresses, complete the following steps. a Click Add to add a new IPv6 address. b Enter the IPv6 address and subnet prefix length, and click OK. c To change the VMkernel default gateway, click Edit. 16 Click Next. 17 Review the information, click Back to change any entries, and click Finish. Service Console Configuration The service console and the VMkernel use virtual Ethernet adapters to connect to a vSwitch and to reach networks that the vSwitch services. Common service console configuration modifications include changing NICs and changing the settings for a NIC that is in use. VMware, Inc. 21
  • 22. ESX Configuration Guide If there is only one service console connection, changing the service console configuration is not allowed. For a new connection, change the network settings to use an additional NIC. After you verify that the new connection is functioning properly, remove the old connection. You are switching over to the new NIC. You can create a maximum of 16 service console ports in ESX. Set Up Service Console Networking A single service console network interface is set up during the ESX installation process. You can also add additional service console interfaces after ESX is up and running. Procedure 1 Log in to the vSphere Client and select the host from the inventory panel. 2 Click the Configuration tab, and click Networking. 3 In the Virtual Switch view, click Add Networking. 4 Select Service Console, and click Next. 5 Select the vSwitch to use for network access, or select Create a new vSwitch, and click Next. If no adapters appear in the Create a new virtual switch group, all network adapters in the system are being used by existing vSwitches. 6 Enter the network label and VLAN ID, and click Next. 7 Enter the IP address and subnet mask, or select Obtain IP setting automatically. 8 Click Edit to set the service console default gateway and click Next. 9 On an IPV6-enabled host, select No IPv6 settings to use only IPv4 settings for the service console, or select Use the following IPv6 settings to configure IPv6 for the service console. This screen does not appear if IPv6 is disabled on the host. 10 If you choose to use IPv6, select how to obtain IPv6 addresses. 11 If you chose Static IPv6 addresses, do the following: a Click Add to add a new IPv6 address. b Enter the IPv6 address and subnet prefix length, and click OK. c To change the service console default gateway, click Edit. 12 Click Next. 13 Review the information, click Back to change any entries, and click Finish. Configure Service Console Ports You can edit service console port properties, such as IP settings and networking policies. Procedure 1 Log in to the vSphere Client and select the host from the inventory panel. 2 Click the Configuration tab, and click Networking. 3 On the right side of the page, click Properties for the vSwitch that you want to edit. 4 In the vSwitch Properties dialog box, click the Ports tab. 5 Select Service Console and click Edit. 6 To continue with the service console configuration, click Continue modifying this connection. 22 VMware, Inc.
  • 23. Chapter 3 Basic Networking with vNetwork Standard Switches 7 Edit port properties, IP settings, and effective policies as necessary. 8 Click OK. Set the Default Gateway You can configure one default gateway for the service console per TCP/IP stack. Routing is not available for software iSCSI Multipath configurations or dependent hardware iSCSI adapters. CAUTION Make sure that your network settings are correct before saving your changes. If the network settings are misconfigured, the UI can lose connectivity to the host, and you must then reconfigure the host from the command line at the service console. Procedure 1 Log into the vSphere Client and select the host from the inventory panel. 2 Click the Configuration tab, and click DNS and Routing. 3 Click Properties. 4 Click the Routing tab. 5 Under Service Console, set the default gateway and gateway device for service console networking. For the service console, the gateway device is needed only when two or more network adapters are using the same subnet. The gateway device determines which network adapter to use for the default route. The service console and VMkernel are often not connected to the same network, each needs its own gateway information. A gateway is needed for connectivity to machines not on the same IP subnet as the service console or VMkernel interfaces. On an IPv6-enabled host, you can also select a default gateway for IPv6 and a gateway device for IPv6 for service console networking. 6 Under VMkernel, set the default gateway for VMkernel networking. On an IPv6-enabled host, you can also select a default gateway for IPv6 for VMkernel networking. 7 Click OK. Display Service Console Information You can view service console network information, such as the VLAN ID and network policies. Procedure 1 Click the info icon to the left of the service console port group to display service console information. 2 Click the X to close the information pop-up window. Using DHCP for the Service Console In most cases, you use static IP addresses for the service console. You can also set up the service console to use dynamic addressing, DHCP, if your DNS server can map the service console’s host name to the dynamically generated IP address. If your DNS server cannot map the host name to its DHCP-generated IP address, use the service console’s numeric IP address to access the host. The numeric IP address might change as DHCP leases expire or when the system is rebooted. For this reason, VMware does not recommend using DHCP for the service console unless your DNS server can handle the host name translation. VMware, Inc. 23
  • 24. ESX Configuration Guide vNetwork Standard Switch Properties vNetwork Standard Switch settings control vSwitch-wide defaults for ports, which can be overridden by port group settings for each vSwitch. You can edit vSwitch properties, such as the uplink configuration and the number of available ports. Change the Number of Ports for a vSwitch A vSwitch serves as a container for port configurations that use a common set of network adapters, including sets that contain no network adapters at all. Each virtual switch provides a finite number of ports through which virtual machines and network services can reach one or more networks. Procedure 1 Log in to the vSphere Client and select the host from the inventory panel. 2 Click the Configuration tab and click Networking. 3 On the right side of the page, click Properties for the vSwitch that you want to edit. 4 Click the Ports tab. 5 Select the vSwitch item in the Configuration list, and click Edit. 6 Click the General tab. 7 Choose the number of ports that you want to use from the drop-down menu. 8 Click OK. What to do next Changes will not take effect until the system is restarted. Change the Speed of an Uplink Adapter You can change the connection speed and duplex of an uplink adapter. Procedure 1 Log in to the vSphere Client and select the host from the inventory panel. 2 Click the Configuration tab and click Networking. 3 Select a vSwitch and click Properties. 4 Click the Network Adapters tab. 5 To change the configured speed and duplex value of a network adapter, select the network adapter and click Edit. 6 To select the connection speed manually, select the speed and duplex from the drop-down menu. Choose the connection speed manually if the NIC and a physical switch might fail to negotiate the proper connection speed. Symptoms of mismatched speed and duplex include low bandwidth or no link connectivity. The adapter and the physical switch port it is connected to must be set to the same value, such as auto and auto or ND and ND, where ND is some speed and duplex, but not auto and ND. 7 Click OK. 24 VMware, Inc.
  • 25. Chapter 3 Basic Networking with vNetwork Standard Switches Add Uplink Adapters You can associate multiple adapters to a single vSwitch to provide NIC teaming. The team can share traffic and provide failover. Procedure 1 Log in to the vSphere Client and select the host from the inventory panel. 2 Click the Configuration tab and click Networking. 3 Select a vSwitch and click Properties. 4 Click the Network Adapters tab. 5 Click Add to launch the Add Adapter wizard. 6 Select one or more adapters from the list and click Next. 7 (Optional) To reorder the NICs into a different category, select a NIC and click Move Up and Move Down. Option Description Active Adapters Adapters that the vSwitch uses. Standby Adapters Adapters that become active if one or more of the active adapters fails. 8 Click Next. 9 Review the information on the Adapter Summary page, click Back to change any entries, and click Finish. The list of network adapters reappears, showing the adapters that the vSwitch now claims. 10 Click Close to exit the vSwitch Properties dialog box. The Networking section in the Configuration tab shows the network adapters in their designated order and categories. Cisco Discovery Protocol Cisco Discovery Protocol (CDP) allows ESX administrators to determine which Cisco switch port is connected to a given vSwitch. When CDP is enabled for a particular vSwitch, you can view properties of the Cisco switch (such as device ID, software version, and timeout) from the vSphere Client. VMware, Inc. 25
  • 26. ESX Configuration Guide Enable CDP on an ESX Host vSwitches are set to detect Cisco port information by default. You can also set the CDP mode so that a vSwitch makes information available to the Cisco switch administrator. Procedure 1 Log in directly to your ESX host's console. 2 View the current CDP mode for the a vSwitch by entering the esxcfg-vswitch -b <vSwitch> command. If CDP is disabled, the mode will be shown as down. 3 Change the CDP mode by entering the esxcfg-vswitch -B <mode> <vSwitch> command. Mode Description down CDP is disabled. listen ESX detects and displays information about the associated Cisco switch port, but information about the vSwitch is not available to the Cisco switch administrator. advertise ESX makes information about the vSwitch available to the Cisco switch administrator, but does not detect and display information about the Cisco switch. both ESX detects and displays information about the associated Cisco switch and makes information about the vSwitch available to the Cisco switch administrator. View Cisco Switch Information on the vSphere Client When CDP is set to listen or both, you can view Cisco switch information. Procedure 1 Log in to the vSphere Client and select the host from the inventory panel. 2 Click the Configuration tab and click Networking. 3 Click the info icon to the right of the vSwitch. NOTE Because the CDP advertisements of Cisco equipment typically occur once a minute, a noticeable delay might occur between enabling CDP on ESX and the availability of CDP data from the vSphere client. 26 VMware, Inc.
  • 27. Basic Networking with vNetwork Distributed Switches 4 These topics guide you through the basic concepts of networking with vNetwork Distributed Switches and how to set up and configure networking with vNetwork Distributed Switches in a vSphere environment. This chapter includes the following topics: n “vNetwork Distributed Switch Architecture,” on page 28 n “Configuring a vNetwork Distributed Switch,” on page 29 n “dvPort Groups,” on page 32 n “dvPorts,” on page 33 n “Private VLANs,” on page 34 n “Configuring vNetwork Distributed Switch Network Adapters,” on page 36 n “Configuring Virtual Machine Networking on a vNetwork Distributed Switch,” on page 40 n “Network I/O Control,” on page 41 VMware, Inc. 27
  • 28. ESX Configuration Guide vNetwork Distributed Switch Architecture A vNetwork Distributed Switch (vDS) functions as a single virtual switch across all associated hosts. This enables you to set network configurations that span across all member hosts, and allows virtual machines to maintain consistent network configuration as they migrate across multiple hosts. Figure 4-1. vNetwork Distributed Switch Network VM VM VM VM VM Network C dvPort groups A B C D E F G H I J vNetwork Distributed Switch dvUplink dvUplink virtual Host1 Host2 Host1 Host2 physical physical network adapters physical network Like a vNetwork Standard Switch, each vNetwork Distributed Switch is a network hub that virtual machines can use. A vNetwork Distributed Switch can forward traffic internally between virtual machines or link to an external network by connecting to physical Ethernet adapters, also known as uplink adapters. Each vNetwork Distributed Switch can also have one or more dvPort groups assigned to it. dvPort groups group multiple ports under a common configuration and provide a stable anchor point for virtual machines connecting to labeled networks. Each dvPort group is identified by a network label, which is unique to the current datacenter. A VLAN ID, which restricts port group traffic to a logical Ethernet segment within the physical network, is optional. Network resource pools allow you to manage network traffic by type of network traffic. In addition to VMware vNetwork Distributed Switches, vSphere 4 also provides support for third-party virtual switches. For information about configuring these third-party switches, go to http://www.cisco.com/go/1000vdocs. 28 VMware, Inc.
  • 29. Chapter 4 Basic Networking with vNetwork Distributed Switches Configuring a vNetwork Distributed Switch You can create a vNetwork Distributed Switch on a vCenter Server datacenter. After you have created a vNetwork Distributed Switch, you can add hosts, create dvPort groups, and edit vNetwork Distributed Switch properties and policies. Create a vNetwork Distributed Switch Create a vNetwork Distributed Switch to handle networking traffic for associated hosts on the datacenter. Procedure 1 Log in to the vSphere Client and choose the Networking inventory view. 2 From the Inventory menu, select Datacenter > vNetwork Distributed Switch. 3 Select a vNetwork Distributed Switch version. Option Description vNetwork Distributed Switch Compatible with ESX version 4.0 and later. Features released with later vDS Version: 4.0 versions are not supported. vNetwork Disributed Switch Version: Compatible with ESX version 4.1 and later. 4.1.0 4 Click Next. 5 Enter a name for the vNetwork Distributed Switch in the Name text box. 6 Use the arrow buttons to select the Number of dvUplink Ports and click Next. dvUplink ports connect the vNetwork Distributed Switch to physical NICs on associated hosts. The number of dvUplink ports is the maximum number of allowed physical connections to the vNetwork Distributed Switch per host. 7 Choose when to add hosts to the vDS. Option Description Add now Select the hosts and physical adapters to use by clicking the check box next to each host or adapter. You can add only physical adapters that are not already in use during vNetwork Distributed Switch creation. Add later No hosts are added to the vDS at this time. You must add hosts to the vDS before adding network adapters. You can add network adapters from the host configuration page of the vSphere Client by using the Manage Hosts functionality or by using Host Profiles. 8 Click Next. 9 (Optional) Choose Automatically create a default port group. This option creates a static binding port group with 128 ports. For systems with complex port group requirements, skip the default port group and create a new dvPort group after you have finished adding the vNetwork Distributed Switch. 10 Review the vNetwork Distributed Switch diagram to ensure proper configuration and click Finish. VMware, Inc. 29
  • 30. ESX Configuration Guide Add Hosts to a vNetwork Distributed Switch You can add hosts and physical adapters to a vNetwork Distributed Switch at the vDS level after the vDS is created. Procedure 1 In the vSphere Client, select the Networking inventory view and select the vNetwork Distributed Switch. 2 Select Inventory > vNetwork Distributed Switch > Add Host. 3 Select the hosts to add. 4 Under the selected hosts, select the physical adapters to add, and click Next. You can select physical adapters that are free and in use. NOTE Moving a physical adapter to a vDS without moving any associated virtual adapters can cause those virtual adapters to lose network connectivity. 5 For each virtual adapter, select the Destination port group from the drop-down menu to migrate the virtual adapter to the vDS or select Do not migrate. 6 Click Next. 7 (Optional) Migrate virtual machine networking to the vDS. a Select Migrate virtual machine networking. b For each virtual machine, select the Destination port group from the drop-down menu or select Do not migrate. 8 Click Next. 9 Review the settings for the vDS, and click Finish. If you need to make any changes, click Back to the appropriate screen. Manage Hosts on a vDS You can change the configuration for hosts and physical adapters on a vDS after they are added to the vDS. Procedure 1 In the vSphere Client, select the Networking inventory view and select the vNetwork Distributed Switch. 2 Select Inventory > vNetwork Distributed Switch > Manage Hosts. 3 Select the hosts to manage and click Next. 4 Select the physical adapters to add, deselect the physical adapters to remove, and click Next. 5 For each virtual adapter, select the Destination port group from the drop-down menu to migrate the virtual adapter to the vDS or select Do not migrate. 6 Click Next. 7 (Optional) Migrate virtual machine networking to the vDS. a Select Migrate virtual machine networking. b For each virtual machine, select the Destination port group from the drop-down menu or select Do not migrate. 30 VMware, Inc.
  • 31. Chapter 4 Basic Networking with vNetwork Distributed Switches 8 Click Next. 9 Review the settings for the vDS, and click Finish. If you need to make any changes, click Back to the appropriate screen. Edit General vNetwork Distributed Switch Settings You can edit the general properties for a vNetwork Distributed Switch, such as the vNetwork Distributed Switch name and the number of uplink ports on the vNetwork Distributed Switch. Procedure 1 In the vSphere Client, choose the Networking inventory view and select the vNetwork Distributed Switch. 2 From the Inventory menu, select vNetwork Distributed Switch > Edit Settings. 3 Select General to edit the following vNetwork Distributed Switch settings. n Enter the name for the vNetwork Distributed Switch. n Select the number of uplink ports. n To edit uplink port names, click Edit uplink port names, enter the new names, and click OK. n Enter any notes for the vNetwork Distributed Switch. 4 Click OK. Edit Advanced vNetwork Distributed Switch Settings Use the vNetwork Distributed Switch Settings dialog box to configure advanced vNetwork Distributed Switch settings such as Cisco Discovery Protocol and the maximum MTU for the vNetwork Distributed Switch. Procedure 1 In the vSphere Client, display the Networking inventory view and select the vNetwork Distributed Switch. 2 From the Inventory menu, select vNetwork Distributed Switch > Edit Settings. 3 Select Advanced to edit the following vNetwork Distributed Switch properties. a Specify the maximum MTU size. b Select the Enable Cisco Discovery Protocol check box to enable CDP, and set the operation to Listen, Advertise, or Both. c Enter the name and other details for the vNetwork Distributed Switch administrator in the Admin Contact Info section. 4 Click OK. View Network Adapter Information for a vNetwork Distributed Switch View physical network adapters and uplink assignments for a vNetwork Distributed Switch from the networking inventory view of the vSphere Client. Procedure 1 In the vSphere Client, choose the Networking inventory view and select the vNetwork Distributed Switch. 2 From the Inventory menu, select vNetwork Distributed Switch > Edit Settings. VMware, Inc. 31
  • 32. ESX Configuration Guide 3 On the Network Adapters tab, you can view network adapter and uplink assignments for associated hosts. This tab is read-only. vNetwork Distributed Switch network adapters must be configured at the host level. 4 Click OK. Upgrade a vDS to a Newer Version A vNetwork Distributed Switch version 4.0 can be upgraded to version 4.1, enabling the vDS to take advantage of features available only in the later version. Procedure 1 In the vSphere Client, select the Networking inventory view and select the vNetwork Distributed Switch. 2 On the Summary tab, next to Version, select Upgrade. The upgrade wizard details the features available to the upgraded vDS that are not available to the earlier version. 3 Click Next. The upgrade wizard lists the hosts associated with this vDS and whether or not they are compatible with the upgraded vDS version. You can proceed with the upgrade only if all hosts are compatible wit the new vDS version. Next to each incompatible host, the upgrade wizard lists the reason for the incompatibility. 4 Click Next. 5 Verify that the upgrade information listed is correct, and click Finish. dvPort Groups A dvPort group specifies port configuration options for each member port on a vNetwork Distributed Switch. dvPort groups define how a connection is made to a network. Add a dvPort Group Use the Create dvPort Group wizard to add a dvPort group to a vNetwork Distributed Switch. Procedure 1 In the vSphere Client, display the Networking inventory view and select the vNetwork Distributed Switch. 2 From the Inventory menu, select Distributed Virtual Switch > New Port Group. 3 Enter a name and the number of ports for the dvPort group. 4 Choose a VLAN type. Option Description None Do not use VLAN. VLAN In the VLAN ID field, enter a number between 1 and 4094. VLAN Trunking Enter a VLAN trunk range. Private VLAN Select a private VLAN entry. If you have not created any private VLANs, this menu is empty. 5 Click Next. 6 Click Finish. 32 VMware, Inc.
  • 33. Chapter 4 Basic Networking with vNetwork Distributed Switches Edit General dvPort Group Properties Use the dvPort Group Properties dialog box to configure general dvPort group properties such as the dvPort group name and port group type. Procedure 1 In the vSphere Client, display the Networking inventory view and select the dvPort group. 2 From the Inventory menu, select Network > Edit Settings. 3 Select General to edit the following dvPort group properties. Option Action Name Enter the name for the dvPort group. Description Enter a brief description of the dvPort group. Number of Ports Enter the number of ports on the dvPort group. Port binding Choose when ports are assigned to virtual machines connected to this dvPort group. n Select Static binding to assign a port to a virtual machine when the virtual machine is connected to the dvPort group. n Select Dynamic binding to assign a port to a virtual machine the first time the virtual machine powers on after it is connected to the dvPort group. n Select Ephemeral for no port binding. You can choose ephemeral binding only when connected directly to your ESX host. 4 Click OK. Edit Advanced dvPort Group Properties Use the dvPort Group Properties dialog box to configure advanced dvPort group properties such as port override settings. Procedure 1 In the vSphere Client, display the Networking inventory view and select the dvPort group. 2 From the Inventory menu, select Network > Edit Settings. 3 Select Advanced to edit the dvPort group properties. a Select Allow override of port policies to allow dvPort group policies to be overridden on a per-port level. b Click Edit Override Settings to select which policies can be overridden. c Choose whether to allow live port moving. d Select Configure reset at disconnect to discard per-port configurations when a dvPort is disconnected from a virtual machine. 4 Click OK. dvPorts A dvPort is a port on a vNetwork Distributed Switch that connects to a host's service console or VMkernel or to a virtual machine's network adapter. Default dvPort configuration is determined by the dvPort group settings, but some settings for individual dvPorts can be overridden on a per dvPort basis. VMware, Inc. 33
  • 34. ESX Configuration Guide Monitor dvPort State vSphere can monitor dvPorts and provide information on the current state of each dvPort. Procedure 1 In the vSphere Client, display the Networking inventory view and select the vNetwork Distributed Switch. 2 On the Ports tab, click Start Monitoring Port State. The State column on the Ports tab for the vNetwork Distributed Switch now displays the current state for each dvPort. Table 4-1. dvPort States State Description Link Up The link for this dvPort is up. Link Down The link for this dvPort is down. Blocked This dvPort is blocked. -- The state of this dvPort is currently unavailable. Configure dvPort Settings Use the Port Settings dialog box to configure general dvPort properties such as the port name and description. Procedure 1 Log in to the vSphere Client and display the vNetwork Distributed Switch. 2 On the Ports tab, right-click the port to modify and select Edit Settings. 3 Click General. 4 Modify the port name and description. 5 Click OK. Private VLANs Private VLANs are used to solve VLAN ID limitations and waste of IP addresses for certain network setups. A private VLAN is identified by its primary VLAN ID. A primary VLAN ID can have multiple secondary VLAN IDs associated with it. Primary VLANs are Promiscuous, so that ports on a private VLAN can communicate with ports configured as the primary VLAN. Ports on a secondary VLAN can be either Isolated, communicating only with promiscuous ports, or Community, communicating with both promiscuous ports and other ports on the same secondary VLAN. To use private VLANs between an ESX host and the rest of the physical network, the physical switch connected to the ESX host needs to be private VLAN-capable and configured with the VLAN IDs being used by ESX for the private VLAN functionality. For physical switches using dynamic MAC+VLAN ID based learning, all corresponding private VLAN IDs must be first entered into the switch's VLAN database. To configure dvPorts to use Private VLAN functionality, you must create the necessary Private VLANs on the vNetwork Distributed Switch to which the dvPorts are connected. 34 VMware, Inc.
  • 35. Chapter 4 Basic Networking with vNetwork Distributed Switches Create a Private VLAN You can create a private VLAN for use on a vNetwork Distributed Switch and its associated dvPorts. Procedure 1 In the vSphere Client, display the Networking inventory view and select the vNetwork Distributed Switch. 2 From the Inventory menu, select vNetwork Distributed Switch > Edit Settings. 3 Select the Private VLAN tab. 4 Under Primary Private VLAN ID, click [Enter a Private VLAN ID here], and enter the number of the primary private VLAN. 5 Click anywhere in the dialog box, and then select the primary private VLAN that you just added. The primary private VLAN you added appears under Secondary Private VLAN ID. 6 For each new secondary private VLAN, click [Enter a Private VLAN ID here] under Secondary Private VLAN ID, and enter the number of the secondary private VLAN. 7 Click anywhere in the dialog box, select the secondary private VLAN that you just added, and select either Isolated or Community for the port type. 8 Click OK. Remove a Primary Private VLAN Remove unused primary private VLANs from the networking inventory view of the vSphere Client. Prerequisites Before removing a private VLAN, be sure that no port groups are configured to use it. Procedure 1 In the vSphere Client, display the Networking inventory view and select the vNetwork Distributed Switch. 2 From the Inventory menu, select vNetwork Distributed Switch > Edit Settings. 3 Select the Private VLAN tab. 4 Select the primary private VLAN to remove. 5 Click Remove under Primary Private VLAN ID, and click OK. Removing a primary private VLAN also removes all associated secondary private VLANs. Remove a Secondary Private VLAN Remove unused secondary private VLANs from the networking inventory view of the vSphere Client. Prerequisites Before removing a private VLAN, be sure that no port groups are configured to use it. Procedure 1 In the vSphere Client, display the Networking inventory view and select the vNetwork Distributed Switch. 2 From the Inventory menu, select vNetwork Distributed Switch > Edit Settings. 3 Select the Private VLAN tab. 4 Select a primary private VLAN to display its associated secondary private VLANs. VMware, Inc. 35
  • 36. ESX Configuration Guide 5 Select the secondary private VLAN to remove. 6 Click Remove under Secondary Private VLAN ID, and click OK. Configuring vNetwork Distributed Switch Network Adapters The vNetwork Distributed Switch networking view of the host configuration page displays the configuration of the host’s associated vNetwork Distributed Switches and allows you to configure the vNetwork Distributed Switch network adapters and uplink ports. Managing Physical Adapters For each host associated with a vNetwork Distributed Switch, you must assign physical network adapters, or uplinks, to the vNetwork Distributed Switch. You can assign one uplink on each host per uplink port on the vNetwork Distributed Switch. Add an Uplink to a vNetwork Distributed Switch For each host associated with a vNetwork Distributed Switch, you must assign at least one physical network adapter, or uplink, to the vNetwork Distributed Switch. Procedure 1 Log in to the vSphere Client and select a host from the inventory panel. The hardware configuration page for the selected host appears. 2 Click the Configuration tab and click Networking. 3 Select the vNetwork Distributed Switch view. 4 Click Manage Physical Adapters. 5 Click Click to Add NIC for the uplink port to add an uplink to. 6 Select the physical adapter to add. If you select an adapter that is attached to another switch, it will be removed from that switch and reassigned to this vNetwork Distributed Switch. 7 Click OK. Remove an Uplink from a vNetwork Distributed Switch You can remove an uplink, or physical network adapter, from a vNetwork Distributed Switch. Procedure 1 Log in to the vSphere Client and select the host from the inventory panel. The hardware configuration page for this server appears. 2 Click the Configuration tab and click Networking. 3 Select the vNetwork Distributed Switch view. 4 Click Manage Physical Adapters. 5 Click Remove to remove the uplink from the vNetwork Distributed Switch. 6 Click OK. 36 VMware, Inc.
  • 37. Chapter 4 Basic Networking with vNetwork Distributed Switches Managing Virtual Network Adapters Virtual network adapters handle host network services over a vNetwork Distributed Switch. You can configure service console and VMkernel virtual adapters for an ESX host through an associated vNetwork Distributed Switch either by creating new virtual adapters or migrating existing virtual adapters. Create a VMkernel Network Adapter on a vNetwork Distributed Switch Create a VMkernel network adapter for use as a vMotion interface or an IP storage port group. Procedure 1 Log in to the vSphere Client and select the host from the inventory panel. 2 Click the Configuration tab and click Networking. 3 Select the vNetwork Distributed Switch view. 4 Click Manage Virtual Adapters. 5 Click Add. 6 Select New virtual adapter, and click Next. 7 Select VMkernel and click Next. 8 Choose a dvPort or dvPort group connection for the virtual adapter. Option Description Select a port group Choose the dvPort group for the virtual adapter to connect to from the drop- down menu. Select port Choose the dvPort for the virtual adapter to connect to from the drop-down menu. 9 Select Use this virtual adapter for vMotion to enable this port group to advertise itself to another ESX host as the network connection where vMotion traffic is sent. You can enable this property for only one vMotion and IP storage port group for each ESX host. If this property is not enabled for any port group, migration with vMotion to this host is not possible. 10 Choose whether to Use this virtual adapter for fault tolerance logging. 11 Under IP Settings, specify the IP address and subnet mask. IPv6 cannot be used with a dependent hardware iSCSI adapter. 12 Click Edit to set the VMkernel default gateway for VMkernel services, such as vMotion, NAS, and iSCSI. 13 On the DNS Configuration tab, the name of the host is entered by default. The DNS server addresses and domain that were specified during installation are also preselected. 14 On the Routing tab, the service console and the VMkernel each need their own gateway information. A gateway is needed for connectivity to machines not on the same IP subnet as the service console or VMkernel. Static IP settings is the default. Do not use routing with software iSCSI Multipathing configurations or dependent hardware iSCSI adapters. 15 Click OK, and then click Next. 16 Click Finish. VMware, Inc. 37
  • 38. ESX Configuration Guide Create a Service Console Network Adapter on a vNetwork Distributed Switch Create a service console network adapter on a vNetwork Distributed Switch to handle a host's service console networking on a vDS. Procedure 1 Log in to the vSphere Client and select the host from the inventory panel. 2 Click the Configuration tab and click Networking. 3 Select the vNetwork Distributed Switch view. 4 Click Manage Virtual Adapters. 5 Click Add. 6 Select New virtual adapter, and click Next. 7 Select Service Console and click Next. 8 Choose a dvPort or dvPort group connection for the virtual adapter. Option Description Select a port group Choose the dvPort group for the virtual adapter to connect to from the drop- down menu. Select port Choose the dvPort for the virtual adapter to connect to from the drop-down menu. 9 Enter the IP address and subnet mask, or select Obtain IP setting automatically. 10 (Optional) Click Edit to set the service console default gateway. 11 Click Next. 12 Click Finish. Migrate an Existing Virtual Adapter to a vNetwork Distributed Switch You can migrate an existing virtual adapter from a vNetwork Standard Switch to a vNetwork Distributed Switch. Procedure 1 Log in to the vSphere Client and select the host from the inventory panel. 2 Click the Configuration tab and click Networking. 3 Select the vNetwork Distributed Switch view. 4 Click Manage Virtual Adapters. 5 Click Add. 6 Select Migrate existing virtual network adapters and click Next. 7 Select one or more virtual network adapters to migrate. 8 For each selected adapter, choose a port group from the Select a port group drop-down menu. 9 Click Next. 10 Click Finish. 38 VMware, Inc.
  • 39. Chapter 4 Basic Networking with vNetwork Distributed Switches Migrate a Virtual Adapter to a vNetwork Standard Switch Use the Migrate to Virtual Switch wizard to migrate an existing virtual adapter from a vNetwork Distriubted Switch to a vNetwork Standard Switch. Procedure 1 Log in to the vSphere Client and select the host from the inventory panel. The hardware configuration page for this server appears. 2 Click the Configuration tab and click Networking. 3 Select the vNetwork Distributed Switch view. 4 Click Manage Virtual Adapters. 5 Select the virtual adapter to migrate, and click Migrate to Virtual Switch. The Migrate Virtual Adapter wizard appears. 6 Select the vSwitch to migrate the adapter to and click Next. 7 Enter a Network Label and optionally a VLAN ID for the virtual adapter, and click Next. 8 Click Finish to migrate the virtual adapter and complete the wizard. Edit the VMkernel Configuration on a vNetwork Distributed Switch You can edit the properties of an existing VMkernel adapter on a vNetwork Distributed Switch from the associated host. Procedure 1 Log in to the vSphere Client and select the host from the inventory panel. 2 Click the Configuration tab and click Networking. 3 Select the vNetwork Distributed Switch view. 4 Click Manage Virtual Adapters. 5 Select the VMkernel adapter to modify and click Edit. 6 Choose a dvPort or dvPort group connection for the virtual adapter. Option Description Select a port group Choose the dvPort group for the virtual adapter to connect to from the drop- down menu. Select port Choose the dvPort for the virtual adapter to connect to from the drop-down menu. 7 Select Use this virtual adapter for vMotion to enable this port group to advertise itself to another ESX host as the network connection where vMotion traffic is sent. You can enable this property for only one vMotion and IP storage port group for each ESX host. If this property is not enabled for any port group, migration with vMotion to this host is not possible. 8 Choose whether to Use this virtual adapter for fault tolerance logging. 9 Under IP Settings, specify the IP address and subnet mask, or select Obtain IP settings automatically. 10 Click Edit to set the VMkernel default gateway for VMkernel services, such as vMotion, NAS, and iSCSI. 11 Click OK. VMware, Inc. 39
  • 40. ESX Configuration Guide Edit the Service Console Configuration on a vNetwork Distributed Switch You can edit the port and IP settings for an existing service console adapter on a vNetwork Distributed Switch. Procedure 1 Log in to the vSphere Client and select the host from the inventory panel. 2 Click the Configuration tab and click Networking. 3 Select the vNetwork Distributed Switch view. 4 Click Manage Virtual Adapters. 5 Select the service console adapter to modify and click Edit. 6 Choose a dvPort or dvPort group connection for the virtual adapter. Option Description Select a port group Choose the dvPort group for the virtual adapter to connect to from the drop- down menu. Select port Choose the dvPort for the virtual adapter to connect to from the drop-down menu. 7 Enter the IP address and subnet mask, or select Obtain IP setting automatically. 8 (Optional) Click Edit to set the service console default gateway. 9 Click OK. Remove a Virtual Adapter Remove a virtual network adapter from a vNetwork Distributed Switch in the Manage Virtual Adapters dialog box. Procedure 1 Log in to the vSphere Client and select the host from the inventory panel. 2 Click the Configuration tab and click Networking. 3 Select the vNetwork Distributed Switch view. 4 Click Manage Virtual Adapters. 5 Select the virtual adapter to remove and click Remove. A dialog box appears with the message, Are you sure you want to remove <adapter name>? 6 Click Yes. Configuring Virtual Machine Networking on a vNetwork Distributed Switch Connect virtual machines to a vNetwork Distributed Switch either by configuring an individual virtual machine NIC or migrating groups of virtual machines from the vNetwork Distributed Switch itself. Connect virtual machines to vNetwork Distributed Switches by connecting their associated virtual network adapters to dvPort groups. You can do this either for an individual virtual machine by modifying the virtual machine’s network adapter configuration, or for a group of virtual machines by migrating virtual machines from an existing virtual network to a vNetwork Distributed Switch. 40 VMware, Inc.
  • 41. Chapter 4 Basic Networking with vNetwork Distributed Switches Migrate Virtual Machines to or from a vNetwork Distributed Switch In addition to connecting virtual machines to a vNetwork Distributed Switch at the individual virtual machine level, you can migrate a group of virtual machines between a vNetwork Distributed Switch network and a vNetwork Standard Switch network. Procedure 1 In the vSphere Client, display the Networking inventory view and select the vNetwork Distributed Switch. 2 From the Inventory menu, select vNetwork Distributed Switch > Migrate Virtual Machine Networking. The Migrate Virtual Machine Networking wizard appears. 3 In the Select Source Network drop-down menu, select the virtual network to migrate from. 4 Select the virtual network to migrate to from the Select Destination Network drop-down menu. 5 Click Show Virtual Machines. Virtual machines associated with the virtual network you are migrating from are displayed in the Select Virtual Machines field. 6 Select virtual machines to migrate to the destination virtual network, and click OK. Connect an Individual Virtual Machine to a dvPort Group Connect an individual virtual machine to a vNetwork Distributed Switch by modifying the virtual machine's NIC configuration. Procedure 1 Log in to the vSphere Client and select the virtual machine from the inventory panel. 2 On the Summary tab, click Edit Settings. 3 On the Hardware tab, select the virtual network adapter. 4 Select the dvPort group to migrate to from the Network Label drop-down menu, and click OK. Network I/O Control Network resource pools determine the priority that different network traffic types are given on a vDS. When Network I/O Control is enabled, vDS traffic is divided into the following network resource pools: FT traffic, iSCSI traffic, vMotion traffic, management traffic, NFS traffic, and virtual machine traffic. You can control the priority of the traffic from each of these network resource pools is given by setting the Physical adapter shares and Host limits for each network resource pool. VMware, Inc. 41
  • 42. ESX Configuration Guide The Physical adapter shares assigned to a network resource pool determine the share of the total available bandwidth guaranteed to the traffic associated with that network resource pool. The share of transmit bandwidth available to a network resource pool is determined by the network resource pool's shares and what other network resource pools are actively transmitting. For example, if you set your FT traffic and iSCSI traffic resource pools to 100 shares, while each of the other resource pools is set to 50 shares, the FT traffic and iSCSI traffic resource pools each receive 25% of the available bandwidth. The remaining resource pools each receive 12.5% of the available bandwidth. These reservations apply only when the physical adapter is saturated. NOTE The iSCSI traffic resource pool shares do not apply to iSCSI traffic on a dependent hardware iSCSI adapter. The Host limit of a network resource pool is the upper limit of bandwidth that the network resource pool can use. Enable Network I/O Control on a vDS Enable network resource management to use network resource pools to prioritize network traffic by type. Prerequisites Verify that your datacenter has at least one vNetwork Distributed Switch version 4.1. Procedure 1 In the vSphere Client, select the Networking inventory view and select the vNetwork Distributed Switch. 2 On the Resource Allocation tab, click Properties. 3 Select Enable network resource management on this vDS, and click OK. Edit Network Resource Pool Settings You can change network resource pool settings such as allocated shares and limits for the resource pool for each network resource pool. Procedure 1 In the vSphere Client, select the Networking inventory view and select the vNetwork Distributed Switch. 2 On the Resource Allocation tab, right-click the network resource pool to edit, and select Edit Settings. 3 Select the Physical adapter shares for the network resource pool. Option Description Custom Enter a specific number of shares, from 1 to 100, for this network resource pool. High Sets the shares for this resource pool to 100. Normal Sets the shares for this resource pool to 50. Low Sets the shares for this resource pool to 25. 4 Set the Host limit for the network resource pool in megabits per second or select Unlimited. 5 Click OK. 42 VMware, Inc.
  • 43. Advanced Networking 5 The following topics guide you through advanced networking in an ESX environment, and how to set up and change advanced networking configuration options. This chapter includes the following topics: n “Internet Protocol Version 6,” on page 43 n “VLAN Configuration,” on page 44 n “Networking Policies,” on page 44 n “Change the DNS and Routing Configuration,” on page 58 n “MAC Addresses,” on page 59 n “TCP Segmentation Offload and Jumbo Frames,” on page 60 n “NetQueue and Networking Performance,” on page 63 n “VMDirectPath I/O,” on page 64 Internet Protocol Version 6 vSphere supports both Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6) environments. The Internet Engineering Task Force has designated IPv6 as the successor to IPv4. The adoption of IPv6, both as a standalone protocol and in a mixed environment with IPv4, is rapidly increasing. With IPv6, you can use vSphere features in an IPv6 environment. A major difference between IPv4 and IPv6 is address length. IPv6 uses a 128-bit address rather than the 32-bit addresses used by IPv4. This helps alleviate the problem of address exhaustion that is present with IPv4 and eliminates the need for network address translation (NAT). Other notable differences include link-local addresses that appear as the interface is initialized, addresses that are set by router advertisements, and the ability to have multiple IPv6 addresses on an interface. An IPv6-specific configuration in vSphere involves providing IPv6 addresses, either by entering static addresses or by using an automatic address configuration scheme for all relevant vSphere networking interfaces. Enable IPv6 Support on an ESX Host You can enable or disable IPv6 support on the host. IPv6 is disabled by default. Procedure 1 Click the arrow next to the Inventory button in the navigation bar and select Hosts and Clusters. 2 Select the host and click the Configuration tab. VMware, Inc. 43
  • 44. ESX Configuration Guide 3 Click the Networking link under Hardware. 4 In the Virtual Switch view, click the Properties link. 5 Select Enable IPv6 support on this host and click OK. 6 Reboot the host. VLAN Configuration Virtual LANs (VLANs) enable a single physical LAN segment to be further segmented so that groups of ports are isolated from one another as if they were on physically different segments. Configuring ESX with VLANs is recommended for the following reasons. n It integrates the host into a pre-existing environment. n It secures network traffic. n It reduces network traffic congestion. n iSCSI traffic requires an isolated network. You can configure VLANs in ESX using three methods: External Switch Tagging (EST), Virtual Switch Tagging (VST), and Virtual Guest Tagging (VGT). With EST, all VLAN tagging of packets is performed on the physical switch. Host network adapters are connected to access ports on the physical switch. Port groups that are connected to the virtual switch must have their VLAN ID set to 0. With VST, all VLAN tagging of packets is performed by the virtual switch before leaving the host. Host network adapters must be connected to trunk ports on the physical switch. Port groups that are connected to the virtual switch must have an appropriate VLAN ID specified. With VGT, all VLAN tagging is performed by the virtual machine. VLAN tags are preserved between the virtual machine networking stack and external switch when frames are passed to and from virtual switches. Physical switch ports are set to trunk port. NOTE When using VGT, you must have an 802.1Q VLAN trunking driver installed on the virtual machine. Networking Policies Policies set at the vSwitch or dvPort group level apply to all of the port groups on that vSwitch or to dvPorts in the dvPort group, except for the configuration options that are overridden at the port group or dvPort level. You can apply the following networking policies. n Load balancing and failover n VLAN (vNetwork Distributed Switch only) n Security n Traffic shaping n Port blocking policies (vNetwork Distributed Switch only) 44 VMware, Inc.
  • 45. Chapter 5 Advanced Networking Load Balancing and Failover Policy Load balancing and failover policies allow you to determine how network traffic is distributed between adapters and how to re-route traffic in the event of adapter failure. You can edit your load balancing and failover policy by configuring the following parameters: n Load Balancing policy determines how outgoing traffic is distributed among the network adapters assigned to a vSwitch. NOTE Incoming traffic is controlled by the load balancing policy on the physical switch. n Failover Detection controls the link status and beacon probing. Beaconing is not supported with guest VLAN tagging. n Network Adapter Order can be active or standby. Edit the Failover and Load Balancing Policy on a vSwitch Failover and load balancing policies allow you to determine how network traffic is distributed between adapters and how to re-route traffic in the event of an adapter failure. Procedure 1 Log in to the vSphere Client and select the host from the inventory panel. 2 Click the Configuration tab, and click Networking. 3 Select a vSwitch and click Properties. 4 In the vSwitch Properties dialog box, click the Ports tab. 5 To edit the failover and load balancing values for the vSwitch, select the vSwitch item and click Properties. 6 Click the NIC Teaming tab. You can override the failover order at the port group level. By default, new adapters are active for all policies. New adapters carry traffic for the vSwitch and its port group unless you specify otherwise. VMware, Inc. 45
  • 46. ESX Configuration Guide 7 Specify the settings in the Policy Exceptions group. Option Description Load Balancing Specify how to choose an uplink. n Route based on the originating port ID. Choose an uplink based on the virtual port where the traffic entered the virtual switch. n Route based on ip hash. Choose an uplink based on a hash of the source and destination IP addresses of each packet. For non-IP packets, whatever is at those offsets is used to compute the hash. n Route based on source MAC hash. Choose an uplink based on a hash of the source Ethernet. n Use explicit failover order. Always use the highest order uplink from the list of Active adapters which passes failover detection criteria. NOTE IP-based teaming requires that the physical switch be configured with etherchannel. For all other options, etherchannel should be disabled. Network Failover Detection Specify the method to use for failover detection. n Link Status only. Relies solely on the link status that the network adapter provides. This option detects failures, such as cable pulls and physical switch power failures, but not configuration errors, such as a physical switch port being blocked by spanning tree or that is misconfigured to the wrong VLAN or cable pulls on the other side of a physical switch. n Beacon Probing. Sends out and listens for beacon probes on all NICs in the team and uses this information, in addition to link status, to determine link failure. This detects many of the failures previously mentioned that are not detected by link status alone. Notify Switches Select Yes or No to notify switches in the case of failover. If you select Yes, whenever a virtual NIC is connected to the vSwitch or whenever that virtual NIC’s traffic would be routed over a different physical NIC in the team because of a failover event, a notification is sent out over the network to update the lookup tables on physical switches. In almost all cases, this process is desirable for the lowest latency of failover occurrences and migrations with vMotion. NOTE Do not use this option when the virtual machines using the port group are using Microsoft Network Load Balancing in unicast mode. No such issue exists with NLB running in multicast mode. Failback Select Yes or No to disable or enable failback. This option determines how a physical adapter is returned to active duty after recovering from a failure. If failback is set to Yes (default), the adapter is returned to active duty immediately upon recovery, displacing the standby adapter that took over its slot, if any. If failback is set to No, a failed adapter is left inactive even after recovery until another currently active adapter fails, requiring its replacement. Failover Order Specify how to distribute the work load for uplinks. If you want to use some uplinks but reserve others for emergencies in case the uplinks in use fail, set this condition by moving them into different groups: n Active Uplinks. Continue to use the uplink when the network adapter connectivity is up and active. n Standby Uplinks. Use this uplink if one of the active adapter’s connectivity is down. n Unused Uplinks. Do not use this uplink. 8 Click OK. 46 VMware, Inc.
  • 47. Chapter 5 Advanced Networking Edit the Failover and Load Balancing Policy on a Port Group FFailover and load balancing policies allow you to determine how network traffic is distributed between adapters and how to re-route traffic in the event of an adapter failure. Procedure 1 Log in to the vSphere Client and select the host from the inventory panel. 2 Click the Configuration tab and click Networking. 3 Select a port group and click Edit. 4 In the Properties dialog box, click the Ports tab. 5 To edit the Failover and Load Balancing values for the port group, select the port group and click Properties. 6 Click the NIC Teaming tab. You can override the failover order at the port-group level. By default, new adapters are active for all policies. New adapters carry traffic for the vSwitch and its port group unless you specify otherwise. 7 Specify the settings in the Policy Exceptions group. Option Description Load Balancing Specify how to choose an uplink. n Route based on the originating port ID. Choose an uplink based on the virtual port where the traffic entered the virtual switch. n Route based on ip hash. Choose an uplink based on a hash of the source and destination IP addresses of each packet. For non-IP packets, whatever is at those offsets is used to compute the hash. n Route based on source MAC hash. Choose an uplink based on a hash of the source Ethernet. n Use explicit failover order. Always use the highest order uplink from the list of Active adapters which passes failover detection criteria. NOTE IP-based teaming requires that the physical switch be configured with etherchannel. For all other options, etherchannel should be disabled. Network Failover Detection Specify the method to use for failover detection. n Link Status only. Relies solely on the link status that the network adapter provides. This option detects failures, such as cable pulls and physical switch power failures, but not configuration errors, such as a physical switch port being blocked by spanning tree or that is misconfigured to the wrong VLAN or cable pulls on the other side of a physical switch. n Beacon Probing. Sends out and listens for beacon probes on all NICs in the team and uses this information, in addition to link status, to determine link failure. This detects many of the failures previously mentioned that are not detected by link status alone. Notify Switches Select Yes or No to notify switches in the case of failover. If you select Yes, whenever a virtual NIC is connected to the vSwitch or whenever that virtual NIC’s traffic would be routed over a different physical NIC in the team because of a failover event, a notification is sent out over the network to update the lookup tables on physical switches. In almost all cases, this process is desirable for the lowest latency of failover occurrences and migrations with vMotion. NOTE Do not use this option when the virtual machines using the port group are using Microsoft Network Load Balancing in unicast mode. No such issue exists with NLB running in multicast mode. VMware, Inc. 47
  • 48. ESX Configuration Guide Option Description Failback Select Yes or No to disable or enable failback. This option determines how a physical adapter is returned to active duty after recovering from a failure. If failback is set to Yes (default), the adapter is returned to active duty immediately upon recovery, displacing the standby adapter that took over its slot, if any. If failback is set to No, a failed adapter is left inactive even after recovery until another currently active adapter fails, requiring its replacement. Failover Order Specify how to distribute the work load for uplinks. If you want to use some uplinks but reserve others for emergencies in case the uplinks in use fail, set this condition by moving them into different groups: n Active Uplinks. Continue to use the uplink when the network adapter connectivity is up and active. n Standby Uplinks. Use this uplink if one of the active adapter’s connectivity is down. n Unused Uplinks. Do not use this uplink. 8 Click OK. Edit the Teaming and Failover Policy on a dvPort Group Teaming and Failover policies allow you to determine how network traffic is distributed between adapters and how to re-route traffic in the event of an adapter failure. Procedure 1 In the vSphere Client, display the Networking inventory view and select the dvPort group. 2 From the Inventory menu, select Network > Edit Settings. 3 Select Policies. 4 In the Teaming and Failover group, specify the following. Option Description Load Balancing Specify how to choose an uplink. n Route based on the originating port ID — Choose an uplink based on the virtual port where the traffic entered the virtual switch. n Route based on ip hash — Choose an uplink based on a hash of the source and destination IP addresses of each packet. For non-IP packets, whatever is at those offsets is used to compute the hash. n Route based on source MAC hash — Choose an uplink based on a hash of the source Ethernet. n Route based on physical NIC load — Choose an uplink based on the current loads of physical NICs. n Use explicit failover order — Always use the highest order uplink from the list of Active adapters which passes failover detection criteria. NOTE IP-based teaming requires that the physical switch be configured with etherchannel. For all other options, etherchannel should be disabled. Network Failover Detection Specify the method to use for failover detection. n Link Status only – Relies solely on the link status that the network adapter provides. This option detects failures, such as cable pulls and physical switch power failures, but not configuration errors, such as a physical switch port being blocked by spanning tree or that is misconfigured to the wrong VLAN or cable pulls on the other side of a physical switch. n Beacon Probing – Sends out and listens for beacon probes on all NICs in the team and uses this information, in addition to link status, to determine link failure. This detects many of the failures previously mentioned that are not detected by link status alone. NOTE Do not use beacon probing with IP-hash load balancing. 48 VMware, Inc.
  • 49. Chapter 5 Advanced Networking Option Description Notify Switches Select Yes or No to notify switches in the case of failover. If you select Yes, whenever a virtual NIC is connected to the vSwitch or whenever that virtual NIC’s traffic would be routed over a different physical NIC in the team because of a failover event, a notification is sent out over the network to update the lookup tables on physical switches. In almost all cases, this process is desirable for the lowest latency of failover occurrences and migrations with vMotion. NOTE Do not use this option when the virtual machines using the port group are using Microsoft Network Load Balancing in unicast mode. No such issue exists with NLB running in multicast mode. Failback Select Yes or No to disable or enable failback. This option determines how a physical adapter is returned to active duty after recovering from a failure. If failback is set to Yes (default), the adapter is returned to active duty immediately upon recovery, displacing the standby adapter that took over its slot, if any. If failback is set to No, a failed adapter is left inactive even after recovery until another currently active adapter fails, requiring its replacement. Failover Order Specify how to distribute the work load for uplinks. If you want to use some uplinks but reserve others for emergencies in case the uplinks in use fail, set this condition by moving them into different groups: n Active Uplinks — Continue to use the uplink when the network adapter connectivity is up and active. n Standby Uplinks — Use this uplink if one of the active adapter’s connectivity is down. n Unused Uplinks — Do not use this uplink. NOTE When using IP-hash load balancing, do not configure standby uplinks. 5 Click OK. Edit dvPort Teaming and Failover Policies Teaming and Failover policies allow you to determine how network traffic is distributed between adapters and how to re-route traffic in the event of an adapter failure. Prerequisites To edit the teaming and failover policies on an individual dvPort, the associated dvPort group must be set to allow policy overrides. Procedure 1 Log in to the vSphere Client and display the vNetwork Distributed Switch. 2 On the Ports tab, right-click the port to modify and select Edit Settings. The Port Settings dialog box appears. 3 Click Policies to view and modify port networking policies. VMware, Inc. 49
  • 50. ESX Configuration Guide 4 In the Teaming and Failover group, specify the following. Option Description Load Balancing Specify how to choose an uplink. n Route based on the originating port ID — Choose an uplink based on the virtual port where the traffic entered the virtual switch. n Route based on ip hash — Choose an uplink based on a hash of the source and destination IP addresses of each packet. For non-IP packets, whatever is at those offsets is used to compute the hash. n Route based on source MAC hash — Choose an uplink based on a hash of the source Ethernet. n Route based on physical NIC load — Choose an uplink based on the current loads of physical NICs. n Use explicit failover order — Always use the highest order uplink from the list of Active adapters which passes failover detection criteria. NOTE IP-based teaming requires that the physical switch be configured with etherchannel. For all other options, etherchannel should be disabled. Network Failover Detection Specify the method to use for failover detection. n Link Status only – Relies solely on the link status that the network adapter provides. This option detects failures, such as cable pulls and physical switch power failures, but not configuration errors, such as a physical switch port being blocked by spanning tree or that is misconfigured to the wrong VLAN or cable pulls on the other side of a physical switch. n Beacon Probing – Sends out and listens for beacon probes on all NICs in the team and uses this information, in addition to link status, to determine link failure. This detects many of the failures previously mentioned that are not detected by link status alone. NOTE Do not use beacon probing with IP-hash load balancing. Notify Switches Select Yes or No to notify switches in the case of failover. If you select Yes, whenever a virtual NIC is connected to the vSwitch or whenever that virtual NIC’s traffic would be routed over a different physical NIC in the team because of a failover event, a notification is sent out over the network to update the lookup tables on physical switches. In almost all cases, this process is desirable for the lowest latency of failover occurrences and migrations with vMotion. NOTE Do not use this option when the virtual machines using the port group are using Microsoft Network Load Balancing in unicast mode. No such issue exists with NLB running in multicast mode. Failback Select Yes or No to disable or enable failback. This option determines how a physical adapter is returned to active duty after recovering from a failure. If failback is set to Yes (default), the adapter is returned to active duty immediately upon recovery, displacing the standby adapter that took over its slot, if any. If failback is set to No, a failed adapter is left inactive even after recovery until another currently active adapter fails, requiring its replacement. Failover Order Specify how to distribute the work load for uplinks. If you want to use some uplinks but reserve others for emergencies in case the uplinks in use fail, set this condition by moving them into different groups: n Active Uplinks — Continue to use the uplink when the network adapter connectivity is up and active. n Standby Uplinks — Use this uplink if one of the active adapter’s connectivity is down. n Unused Uplinks — Do not use this uplink. NOTE When using IP-hash load balancing, do not configure standby uplinks. 5 Click OK. 50 VMware, Inc.
  • 51. Chapter 5 Advanced Networking VLAN Policy The VLAN policy allows virtual networks to join physical VLANs. Edit the VLAN Policy on a dvPort Group You can edit the VLAN policy configuration on a dvPort group. Procedure 1 In the vSphere Client, display the Networking inventory view and select the dvPort group. 2 From the Inventory menu, select Network > Edit Settings. 3 Select VLAN. 4 Select the VLAN Type to use. Option Description None Do not use VLAN. VLAN In the VLAN ID field, enter a number between 1 and 4094. VLAN Trunking Enter a VLAN trunk range. Private VLAN Select an available private VLAN to use. Edit dvPort VLAN Policies A VLAN policy set at the dvPort level allows the individual dvPort to override the VLAN policy set at the dvPort group level. Prerequisites To edit the VLAN policies on an individual dvPort, the associated dvPort group must be set to allow policy overrides. Procedure 1 Log in to the vSphere Client and display the vNetwork Distributed Switch. 2 On the Ports tab, right-click the port to modify and select Edit Settings. 3 Click Policies. 4 Select the VLAN type to use. Option Action None Do not use a VLAN. VLAN For the VLAN ID, enter a number between 1 and 4095. VLAN Trunking Enter a VLAN trunk range. Private VLAN Select an available private VLAN to use. 5 Click OK. Security Policy Networking security policies determine how the adapter filters inbound and outbound frames. Layer 2 is the Data Link Layer. The three elements of the security policy are promiscuous mode, MAC address changes, and forged transmits. VMware, Inc. 51
  • 52. ESX Configuration Guide In nonpromiscuous mode, a guest adapter listens only to traffic forwarded to own MAC address. In promiscuous mode, it can listen to all the frames. By default, guest adapters are set to nonpromiscuous mode. Edit the Layer 2 Security Policy on a vSwitch Control how inbound and outbound frames are handled by editing Layer 2 Security policies. Procedure 1 Log in to the VMware vSphere Client and select the host from the inventory panel. 2 Click the Configuration tab, and click Networking. 3 Click Properties for the vSwitch to edit. 4 In the Properties dialog box, click the Ports tab. 5 Select the vSwitch item and click Edit. 6 In the Properties dialog box, click the Security tab. By default, Promiscuous Mode is set to Reject, and MAC Address Changes and Forged Transmits are set to Accept. The policy applies to all virtual adapters on the vSwitch, unless the port group for the virtual adapter specifies a policy exception. 7 In the Policy Exceptions pane, select whether to reject or accept the security policy exceptions. Table 5-1. Policy Exceptions Mode Reject Accept Promiscuous Mode Placing a guest adapter in Placing a guest adapter in promiscuous mode has no effect on promiscuous mode causes it to detect which frames are received by the all frames passed on the vSwitch that adapter. are allowed under the VLAN policy for the port group that the adapter is connected to. MAC Address Changes If the guest OS changes the MAC If the MAC address from the guest OS address of the adapter to anything changes, frames to the new MAC other than what is in the .vmx address are received. configuration file, all inbound frames are dropped. If the guest OS changes the MAC address back to match the MAC address in the .vmx configuration file, inbound frames are sent again. Forged Transmits Outbound frames with a source No filtering is performed, and all MAC address that is different from outbound frames are passed. the one set on the adapter are dropped. 8 Click OK. Edit the Layer 2 Security Policy Exception on a Port Group Control how inbound and outbound frames are handled by editing Layer 2 Security policies. Procedure 1 Log in to the VMware vSphere Client and select the host from the inventory panel. 2 Click the Configuration tab, and click Networking. 3 Click Properties for the port group to edit. 52 VMware, Inc.
  • 53. Chapter 5 Advanced Networking 4 In the Properties dialog box, click the Ports tab. 5 Select the port group item and click Edit. 6 In the Properties dialog box for the port group, click the Security tab. By default, Promiscuous Mode is set to Reject. MAC Address Changes and Forged Transmits are set to Accept. The policy exception overrides any policy set at the vSwitch level. 7 In the Policy Exceptions pane, select whether to reject or accept the security policy exceptions. Table 5-2. Policy Exceptions Mode Reject Accept Promiscuous Mode Placing a guest adapter in Placing a guest adapter in promiscuous mode has no effect on promiscuous mode causes it to detect which frames are received by the all frames passed on the vSwitch that adapter. are allowed under the VLAN policy for the port group that the adapter is connected to. MAC Address Changes If the guest OS changes the MAC If the MAC address from the guest OS address of the adapter to anything changes, frames to the new MAC other than what is in the .vmx address are received. configuration file, all inbound frames are dropped. If the guest OS changes the MAC address back to match the MAC address in the .vmx configuration file, inbound frames are sent again. Forged Transmits Outbound frames with a source No filtering is performed, and all MAC address that is different from outbound frames are passed. the one set on the adapter are dropped. 8 Click OK. Edit the Security Policy on a dvPort Group Control how inbound and outbound frames for a dvPort group are handled by editing the Security policies. Procedure 1 In the vSphere Client, display the Networking inventory view and select the dvPort group. 2 From the Inventory menu, select Network > Edit Settings. 3 In the Properties dialog box for the port group, click the Security tab. By default, Promiscuous Mode is set to Reject. MAC Address Changes and Forged Transmits are set to Accept. The policy exception overrides any policy set at the vSwitch level. VMware, Inc. 53
  • 54. ESX Configuration Guide 4 In the Policy Exceptions pane, select whether to reject or accept the security policy exceptions. Table 5-3. Policy Exceptions Mode Reject Accept Promiscuous Mode Placing a guest adapter in Placing a guest adapter in promiscuous mode has no effect on promiscuous mode causes it to detect which frames are received by the all frames passed on the vSwitch that adapter. are allowed under the VLAN policy for the port group that the adapter is connected to. MAC Address Changes If the guest OS changes the MAC If the MAC address from the guest OS address of the adapter to anything changes, frames to the new MAC other than what is in the .vmx address are received. configuration file, all inbound frames are dropped. If the guest OS changes the MAC address back to match the MAC address in the .vmx configuration file, inbound frames are sent again. Forged Transmits Outbound frames with a source No filtering is performed, and all MAC address that is different from outbound frames are passed. the one set on the adapter are dropped. 5 Click OK. Edit dvPort Security Policies Control how inbound and outbound frames for a dvPort are handled by editing the Security policies. Prerequisites To edit the Security policies on an individual dvPort, the associated dvPort group must be set to allow policy overrides. Procedure 1 Log in to the vSphere Client and display the vNetwork Distributed Switch. 2 On the Ports tab, right-click the port to modify and select Edit Settings. 3 Click Policies. By default, Promiscuous Mode is set to Reject, and MAC Address Changes and Forged Transmits are set to Accept. 54 VMware, Inc.
  • 55. Chapter 5 Advanced Networking 4 In the Security group, select whether to reject or accept the security policy exceptions. Table 5-4. Policy Exceptions Mode Reject Accept Promiscuous Mode Placing a guest adapter in Placing a guest adapter in promiscuous mode has no effect on promiscuous mode causes it to detect which frames are received by the all frames passed on the vSwitch that adapter. are allowed under the VLAN policy for the port group that the adapter is connected to. MAC Address Changes If the guest OS changes the MAC If the MAC address from the guest OS address of the adapter to anything changes, frames to the new MAC other than what is in the .vmx address are received. configuration file, all inbound frames are dropped. If the guest OS changes the MAC address back to match the MAC address in the .vmx configuration file, inbound frames are sent again. Forged Transmits Outbound frames with a source No filtering is performed, and all MAC address that is different from outbound frames are passed. the one set on the adapter are dropped. 5 Click OK. Traffic Shaping Policy A traffic shaping policy is defined by three characteristics: average bandwidth, peak bandwidth, and burst size. You can establish a traffic shaping policy for each port group and each dvPort or dvPort group. ESX shapes outbound network traffic on vSwitches and both inbound and outbound traffic on a vNetwork Distributed Switch. Traffic shaping restricts the network bandwidth available on a port, but can also be configured to allow bursts of traffic to flow through at higher speeds. Average Bandwidth Establishes the number of bits per second to allow across a port, averaged over time: the allowed average load. Peak Bandwidth The maximum number of bits per second to allow across a port when it is sending or receiving a burst of traffic. This limits the bandwidth used by a port whenever it is using its burst bonus. Burst Size The maximum number of bytes to allow in a burst. If this parameter is set, a port might gain a burst bonus if it does not use all its allocated bandwidth. Whenever the port needs more bandwidth than specified by Average Bandwidth, it might be allowed to temporarily transmit data at a higher speed if a burst bonus is available. This parameter limits the number of bytes that have accumulated in the burst bonus and thus transfers at a higher speed. Edit the Traffic Shaping Policy on a vSwitch Use traffic shaping policies to control the bandwidth and burst size on a vSwitch. Procedure 1 Log in to the vSphere Client and select the host from the inventory panel. 2 Click the Configuration tab, and click Networking. 3 Click Properties for the vSwitch to edit. VMware, Inc. 55
  • 56. ESX Configuration Guide 4 In the Properties dialog box, click the Ports tab. 5 Select the vSwitch item and click Edit. 6 In the Properties dialog box, click the Traffic Shaping tab. When traffic shaping is disabled, the options are dimmed. You can selectively override all traffic-shaping features at the port group level if traffic shaping is enabled. This policy is applied to each individual virtual adapter attached to the port group, not to the vSwitch as a whole. NOTE Peak bandwidth cannot be less than the specified average bandwidth. Option Description Status If you enable the policy exception in the Status field, you are setting limits on the amount of networking bandwidth allocated for each virtual adapter associated with this particular port group. If you disable the policy, services have a free and clear connection to the physical network. Average Bandwidth A value measured over a particular period of time. Peak Bandwidth Limits the maximum bandwidth during a burst. It can never be smaller than the average bandwidth. Burst Size Specifies how large a burst can be in kilobytes (KB). Edit the Traffic Shaping Policy on a Port Group Use traffic shaping policies to control the bandwidth and burst size on a port group. Procedure 1 Log in to the vSphere Client and select the host from the inventory panel. 2 Click the Configuration tab, and click Networking. 3 Click Properties for the port group to edit. 4 In the Properties dialog box, click the Ports tab. 5 Select the port group item and click Edit. 6 In the Properties dialog box for the port group, click the Traffic Shaping tab. When traffic shaping is disabled, the options are dimmed. Option Description Status If you enable the policy exception in the Status field, you are setting limits on the amount of networking bandwidth allocated for each virtual adapter associated with this particular port group. If you disable the policy, services have a free and clear connection to the physical network. Average Bandwidth A value measured over a particular period of time. Peak Bandwidth Limits the maximum bandwidth during a burst. It can never be smaller than the average bandwidth. Burst Size Specifies how large a burst can be in kilobytes (KB). 56 VMware, Inc.
  • 57. Chapter 5 Advanced Networking Edit the Traffic Shaping Policy on a dvPort Group You can shape both inbound and outbound traffic on vNetwork Distributed Switches. You can restrict the network bandwidth available to a port, but you can also temporarily allow bursts of traffic to flow through a port at higher speeds. A traffic shaping policy is defined by three characteristics: average bandwidth, peak bandwidth, and burst size. Traffic shaping policies do not apply to iSCSI traffic on a dependent hardware iSCSI adapter. Procedure 1 In the vSphere Client, display the Networking inventory view and select the dvPort group. 2 From the Inventory menu, select Network > Edit Settings. 3 Select Traffic Shaping. 4 In the Properties dialog box for the port group, click the Traffic Shaping tab. You can configure both inbound traffic shaping and outbound traffic shaping. When traffic shaping is disabled, the options are dimmed. NOTE Peak bandwidth cannot be less than the specified average bandwidth. Option Description Status If you enable the policy exception in the Status field, you are setting limits on the amount of networking bandwidth allocated for each virtual adapter associated with this particular port group. If you disable the policy, services have a free and clear connection to the physical network. Average Bandwidth A value measured over a particular period of time. Peak Bandwidth Limits the maximum bandwidth during a burst. It can never be smaller than the average bandwidth. Burst Size Specifies how large a burst can be in kilobytes (KB). Edit dvPort Traffic Shaping Policies You can shape both inbound and outbound traffic on vNetwork Distributed Switches. You can restrict the network bandwidth available to a port, but you can also temporarily allow bursts of traffic to flow through a port at higher speeds. A traffic shaping policy is defined by three characteristics: average bandwidth, peak bandwidth, and burst size. Traffic shaping policies do not apply to iSCSI traffic on a dependent hardware iSCSI adapter. Prerequisites To edit the traffic shaping policies on an individual dvPort, the associated dvPort group must be set to allow policy overrides. Procedure 1 Log in to the vSphere Client and display the vNetwork Distributed Switch. 2 On the Ports tab, right-click the port to modify, and select Edit Settings. 3 Click Policies. VMware, Inc. 57
  • 58. ESX Configuration Guide 4 In the Traffic Shaping group, you can configure both inbound traffic shaping and outbound traffic shaping. When traffic shaping is disabled, the options are dimmed. Option Description Status If you enable the policy exception in the Status field, you are setting limits on the amount of networking bandwidth allocated for each virtual adapter associated with this particular port group. If you disable the policy, services have a free and clear connection to the physical network. Average Bandwidth A value measured over a particular period of time. Peak Bandwidth Limits the maximum bandwidth during a burst. It can never be smaller than the average bandwidth. Burst Size Specifies how large a burst can be in kilobytes (KB). 5 Click OK. Port Blocking Policies Set blocking policies for dvPorts from the miscellaneous policies dialog box. Edit the Port Blocking Policy on a dvPort Group Set the port blocking policy for a dvPort group under miscellaneous policies. Procedure 1 In the vSphere Client, display the Networking inventory view and select the dvPort group. 2 From the Inventory menu, select Network > Edit Settings. 3 Select Miscellaneous. 4 Choose whether to Block all ports on this dvPort group. Edit dvPort Port Blocking Policy The Miscellaneous policies dialog allows you to configure port blocking policies for a dvPort. Procedure 1 Log in to the vSphere Client and display the vNetwork Distributed Switch. 2 On the Ports tab, right-click the port to modify and select Edit Settings. 3 Click Policies. 4 In the Miscellaneous group, select whether to Block all ports. 5 Click OK. Change the DNS and Routing Configuration You can change the DNS server and default gateway information provided during installation from the host configuration page in the vSphere Client. Procedure 1 Log in to the vSphere Client and select the host from the inventory panel. 2 Click the Configuration tab, and click DNS and Routing. 3 On the right side of the window, click Properties. 4 In the DNS Configuration tab, enter a name and domain. 58 VMware, Inc.
  • 59. Chapter 5 Advanced Networking 5 Choose whether to obtain the DNS server address automatically or use a DNS server address. NOTE DHCP is supported only if the DHCP server is accessible to the service console. The service console must have a virtual interface (vswif) configured and attached to the network where the DHCP server resides. 6 Specify the domains in which to look for hosts. 7 On the Routing tab, change the default gateway information as needed. Select a gateway device only if you have configured the service console to connect to more than one subnet. 8 Click OK. MAC Addresses MAC addresses are generated for virtual network adapters that the service console, the VMkernel, and virtual machines use. In most cases, the generated MAC addresses are appropriate. However, you might need to set a MAC address for a virtual network adapter, as in the following cases: n Virtual network adapters on different physical hosts share the same subnet and are assigned the same MAC address, causing a conflict. n To ensure that a virtual network adapter always has the same MAC address. To circumvent the limit of 256 virtual network adapters per physical machine and possible MAC address conflicts between virtual machines, system administrators can manually assign MAC addresses. VMware uses the Organizationally Unique Identifier (OUI) 00:50:56 for manually generated addresses. The MAC address range is 00:50:56:00:00:00-00:50:56:3F:FF:FF. You can set the addresses by adding the following line to a virtual machine‘s configuration file: ethernet<number>.address = 00:50:56:XX:YY:ZZ where <number> refers to the number of the Ethernet adapter, XX is a valid hexadecimal number between 00 and 3F, and YY and ZZ are valid hexadecimal numbers between 00 and FF. The value for XX must not be greater than 3F to avoid conflict with MAC addresses that are generated by the VMware Workstation and VMware Server products. The maximum value for a manually generated MAC address is: ethernet<number>.address = 00:50:56:3F:FF:FF You must also set the option in a virtual machine’s configuration file: ethernet<number>.addressType="static" Because VMware ESX virtual machines do not support arbitrary MAC addresses, you must use the above format. As long as you choose a unique value for XX:YY:ZZ among your hard-coded addresses, conflicts between the automatically assigned MAC addresses and the manually assigned ones should never occur. MAC Address Generation Each virtual network adapter in a virtual machine is assigned its own unique MAC address. Each network adapter manufacturer is assigned a unique three-byte prefix called an Organizationally Unique Identifier (OUI), which it can use to generate unique MAC addresses. VMware has the following OUIs: n Generated MAC addresses n Manually set MAC addresses n For legacy virtual machines, but no longer used with ESX VMware, Inc. 59
  • 60. ESX Configuration Guide The first three bytes of the MAC address that is generated for each virtual network adapter consists of the OUI. The MAC address-generation algorithm produces the other three bytes. The algorithm guarantees unique MAC addresses within a machine and attempts to provide unique MAC addresses across machines. The network adapters for each virtual machine on the same subnet should have unique MAC addresses. Otherwise, they can behave unpredictably. The algorithm puts a limit on the number of running and suspended virtual machines at any one time on any given host. It also does not handle all cases when virtual machines on distinct physical machines share a subnet. The VMware Universally Unique Identifier (UUID) generates MAC addresses that are checked for conflicts. The generated MAC addresses are created by using three parts: the VMware OUI, the SMBIOS UUID for the physical ESX machine, and a hash based on the name of the entity that the MAC address is being generated for. After the MAC address has been generated, it does not change unless the virtual machine is moved to a different location, for example, to a different path on the same server. The MAC address in the configuration file of the virtual machine is saved. All MAC addresses that have been assigned to network adapters of running and suspended virtual machines on a given physical machine are tracked. The MAC address of a powered off virtual machine is not checked against those of running or suspended virtual machines. It is possible that when a virtual machine is powered on again, it can acquire a different MAC address. This acquisition is caused by a conflict with a virtual machine that was powered on when this virtual machine was powered off. Set Up a MAC Address You can assign stati MAC addresses to a powered-down virtual machine's virtual NICs. Procedure 1 Log in to the vSphere Client and select the virtual machine from the inventory panel. 2 Click the Summary tab and click Edit Settings. 3 Select the network adapter from the Hardware list. 4 In the MAC Address group, select Manual. 5 Enter the static MAC address, and click OK. TCP Segmentation Offload and Jumbo Frames You must enable jumbo frames at the host level by using the command-line interface to configure the MTU size for each vSwitch. TCP Segmentation Offload (TSO) is enabled on the VMkernel interface by default, but must be enabled at the virtual machine level. Enabling TSO To enable TSO at the virtual machine level, you must replace the existing vmxnet or flexible virtual network adapters with enhanced vmxnet virtual network adapters. This replacement might result in a change in the MAC address of the virtual network adapter. TSO support through the enhanced vmxnet network adapter is available for virtual machines that run the following guest operating systems: n Microsoft Windows 2003 Enterprise Edition with Service Pack 2 (32 bit and 64 bit) n Red Hat Enterprise Linux 4 (64 bit) n Red Hat Enterprise Linux 5 (32 bit and 64 bit) n SUSE Linux Enterprise Server 10 (32 bit and 64 bit) 60 VMware, Inc.
  • 61. Chapter 5 Advanced Networking Enable TSO Support for a Virtual Machine You can enable TSO support on a virtual machine by using an enhanced vmxnet adapter for that virtual machine. Procedure 1 Log in to the vSphere Client and select the virtual machine from the inventory panel. 2 Click the Summary tab, and click Edit Settings. 3 Select the network adapter from the Hardware list. 4 Record the network settings and MAC address that the network adapter is using. 5 Click Remove to remove the network adapter from the virtual machine. 6 Click Add. 7 Select Ethernet Adapter and click Next. 8 In the Adapter Type group, select Enhanced vmxnet. 9 Select the network setting and MAC address that the old network adapter was using and click Next. 10 Click Finish and then click OK. 11 If the virtual machine is not set to upgrade VMware Tools at each power on, you must upgrade VMware Tools manually. TSO is enabled on a VMkernel interface. If TSO becomes disabled for a particular VMkernel interface, the only way to enable TSO is to delete that VMkernel interface and recreate it with TSO enabled. Check Whether TSO Is Enabled on a VMkernel Interface You can check whether TSO is enabled on a particular VMkernel networking interface. Procedure 1 Log in to your ESX host's console. 2 Use the esxcfg-vmknic -l command to display a list of VMkernel interfaces. The list shows each TSO-enabled VMkernel interface with TSO MSS set to 65535. What to do next If TSO is not enabled for a particular VMkernel interface, the only way to enable it is to delete the VMkernel interface and recreate the interface. Enabling Jumbo Frames Jumbo frames allow ESX to send larger frames out onto the physical network. The network must support jumbo frames end-to-end. Jumbo frames up to 9kB (9000 bytes) are supported. Jumbo frames must be enabled for each vSwitch or VMkernel interface through the command-line interface on your ESX host. Before enabling jumbo frames, check with your hardware vendor to ensure that your physical network adapter supports jumbo frames. VMware, Inc. 61
  • 62. ESX Configuration Guide Create a Jumbo Frames-Enabled vSwitch You configure a vSwitch for jumbo frames by changing the MTU size for that vSwitch. Procedure 1 Use the vicfg-vswitch -m <MTU> <vSwitch> command in the VMware vSphere CLI to set the MTU size for the vSwitch. This command sets the MTU for all uplinks on that vSwitch. Set the MTU size to the largest MTU size among all the virtual network adapters connected to the vSwitch. 2 Use the vicfg-vswitch -l command to display a list of vSwitches on the host and check that the configuration of the vSwitch is correct. Enable Jumbo Frames on a vNetwork Distributed Switch You enable a vNetwork Distributed Switch for jumbo frames by changing the MTU size for that vNetwork Distributed Switch. Procedure 1 In the vSphere Client, display the Networking inventory view and select the vNetwork Distributed Switch. 2 From the Inventory menu, select vNetwork Distributed Switch > Edit Settings. 3 On the Properties tab, select Advanced. 4 Set the Maximum MTU to the largest MTU size among all the virtual network adapters connected to the vNetwork Distributed Switch, and click OK. Enable Jumbo Frame Support on a Virtual Machine Enabling jumbo frame support on a virtual machine requires an enhanced vmxnet adapter for that virtual machine. Procedure 1 Log in to the vSphere Client and select the virtual machine from the inventory panel. 2 Click the Summary tab, and click Edit Settings. 3 Select the network adapter from the Hardware list. 4 Record the network settings and MAC address that the network adapter is using. 5 Click Remove to remove the network adapter from the virtual machine. 6 Click Add. 7 Select Ethernet Adapter and click Next. 8 In the Adapter Type group, select Enhanced vmxnet. 9 Select the network that the old network adapter was using and click Next. 10 Click Finish. 11 Select the new network adapter from the Hardware list. 12 Under MAC Address, select Manual, and enter the MAC address that the old network adapter was using. 13 Click OK. 14 Check that the Enhanced vmxnet adapter is connected to a vSwitch with jumbo frames enabled. 62 VMware, Inc.
  • 63. Chapter 5 Advanced Networking 15 Inside the guest operating system, configure the network adapter to allow jumbo frames. See your guest operating system’s documentation for details. 16 Configure all physical switches and any physical or virtual machines to which this virtual machine connects to support jumbo frames. Create a Jumbo Frames-Enabled VMkernel Interface You can create a VMkernel network interface enabled with jumbo frames. Procedure 1 Log in to your ESX host’s console. 2 Use the esxcfg-vmknic -a -I <ip address> -n <netmask> -m <MTU> <port group name> command to create a VMkernel connection with jumbo frame support. 3 Use the esxcfg-vmknic -l command to display a list of VMkernel interfaces and check that the configuration of the jumbo frame-enabled interface is correct. 4 Check that the VMkernel interface is connected to a vSwitch with jumbo frames enabled. 5 Configure all physical switches and any physical or virtual machines to which this VMkernel interface connects to support jumbo frames. NetQueue and Networking Performance NetQueue in ESX takes advantage of the ability of some network adapters to deliver network traffic to the system in multiple receive queues that can be processed separately, allowing processing to be scaled to multiple CPUs, improving receive-side networking performance. Enable NetQueue on an ESX Host NetQueue is enabled by default. To use NetQueue after it has been disabled, you must reenable it. Prerequisites Familiarize yourself with the information on configuring NIC drivers in the VMware vSphere Command-Line Interface Installation and Reference guide. Procedure 1 In the VMware vSphere CLI, use the command vicfg-advcfg --set true VMkernel.Boot.netNetQueueEnable. 2 Use the VMware vSphere CLI to configure the NIC driver to use NetQueue. 3 Reboot the ESX host. Disable NetQueue on an ESX Host NetQueue is enabled by default. Procedure 1 In the VMware vSphere CLI, use the command vicfg-advcfg --set false VMkernel.Boot.netNetQueueEnable. 2 To disable NetQueue on the NIC driver, use the vicfg-module -s "" module name command. For example, if you are using the s2io NIC driver, use vicfg-module -s "" s2io. 3 Reboot the host. VMware, Inc. 63
  • 64. ESX Configuration Guide VMDirectPath I/O VMDirectPath I/O allows virtual machine access to physical PCI functions on platforms with an I/O Memory Management Unit. The following features are unavailable for virtual machines configured with VMDirectPath: n vMotion n Hot adding and removing of virtual devices n Suspend and resume n Record and replay n Fault tolerance n High availability n DRS (limited availability. The virtual machine can be part of a cluster, but cannot migrate across hosts) See the hardware compatibility guides for the latest systems and adapters supported with this configuration. Configure Passthrough Devices on a Host You can configure passthrough networking devices on a host. Procedure 1 Select a host from the inventory panel of the vSphere Client. 2 On the Configuration tab, click Advanced Settings. The Passthrough Configuration page appears, listing all available passthrough devices. A green icon indicates that a device is enabled and active. An orange icon indicates that the state of the device has changed and the host must be rebooted before the device can be used. 3 Click Edit. 4 Select the devices to be used for passthrough and click OK. Configure a PCI Device on a Virtual Machine You can configure a passthrough PCI device on a virtual machine. Procedure 1 Select a virtual machine from the inventory panel of the vSphere Client. 2 From the Inventory menu, select Virtual Machine > Edit Settings. 3 On the Hardware tab, click Add. 4 Select PCI Device and click Next. 5 Select the passthrough device to use, and click Next. 6 Click Finish. Adding a VMDirectPath device to a virtual machine sets memory reservation to the memory size of the virtual machine. 64 VMware, Inc.
  • 65. Networking Best Practices, Scenarios, and Troubleshooting 6 The following best practices, configuration scenarios, and troubleshooting guidelines provide suggestions for common networking configurations and pitfalls. This chapter includes the following topics: n “Networking Best Practices,” on page 65 n “Mounting NFS Volumes,” on page 66 n “Networking Configuration for Software iSCSI and Dependent Hardware iSCSI,” on page 67 n “Configuring Networking on Blade Servers,” on page 70 n “Troubleshooting,” on page 72 Networking Best Practices Consider these best practices for configuring your network. n Separate network services from one another to achieve greater security or better performance. To have a particular set of virtual machines function at the highest performance levels, put them on a separate physical NIC. This separation allows for a portion of the total networking workload to be more evenly shared across multiple CPUs. The isolated virtual machines can then better serve traffic from a Web client, for instance. n You can satisfy the following recommendations either by using VLANs to segment a single physical network or separate physical networks (the latter is preferable). n Keeping the service console on its own network is an important part of securing the ESX system. Consider the service console network connectivity in the same light as any remote access device in a host, because compromising the service console gives an attacker full control of all virtual machines running on the system. n Keeping the vMotion connection on a separate network devoted to vMotion is important because when migration with vMotion occurs, the contents of the guest operating system’s memory is transmitted over the network. n When using passthrough devices with a Linux kernel version 2.6.20 or earlier, avoid MSI and MSI-X modes because these modes have significant performance impact. n To physically separate network services and to dedicate a particular set of NICs to a specific network service, create a vSwitch for each service. If this is not possible, separate them on a single vSwitch by attaching them to port groups with different VLAN IDs. In either case, confirm with your network administrator that the networks or VLANs you choose are isolated in the rest of your environment and that no routers connect them. VMware, Inc. 65
  • 66. ESX Configuration Guide n You can add and remove NICs from the vSwitch without affecting the virtual machines or the network service that is running behind that vSwitch. If you remove all the running hardware, the virtual machines can still communicate among themselves. Moreover, if you leave one NIC intact, all the virtual machines can still connect with the physical network. n To protect your most sensitive virtual machines, deploy firewalls in virtual machines that route between virtual networks with uplinks to physical networks and pure virtual networks with no uplinks. Mounting NFS Volumes In ESX, the model of how ESX accesses NFS storage of ISO images that are used as virtual CD-ROMs for virtual machines is different from the model used in ESX Server 2.x. ESX has support for VMkernel-based NFS mounts. The new model is to mount your NFS volume with the ISO images through the VMkernel NFS functionality. All NFS volumes mounted in this way appear as datastores in the vSphere Client. The virtual machine configuration editor allows you to browse the service console file system for ISO images to be used as virtual CD-ROM devices. 66 VMware, Inc.
  • 67. Chapter 6 Networking Best Practices, Scenarios, and Troubleshooting Networking Configuration for Software iSCSI and Dependent Hardware iSCSI If you use the software iSCSI adapter or dependent hardware iSCSI adapters, you must set up the networking for iSCSI before you can enable and configure your iSCSI adapters. Networking configuration for iSCSI involves opening a VMkernel iSCSI port for the traffic between the iSCSI adapter and the physical NIC. Depending on the number of physical NICs you use for iSCSI traffic, the networking setup can be different. n If you have a single physical NIC, create one iSCSI port on a vSwitch connected to the NIC. VMware recommends that you designate a separate network adapter for iSCSI. Do not use iSCSI on 100Mbps or slower adapters. n If you have two or more physical NICs for iSCSI, create a separate iSCSI port for each physical NIC and use the NICs for iSCSI multipathing. See Figure 6-1. Figure 6-1. Networking with iSCSI Two physical NICs connected to Two physical NICs with iSCSI the software iSCSI adapter offload capabilities software iSCSI adapter dependent hardware iSCSI adapters vmhba# vmhba33 vmhba34 iSCSI vmk1 vmk2 ports vmk1 vmk2 vSwitch vSwitch Host1 Host2 virtual Host1 vmnic1 vmnic2 vmnic1 vmnic2 Host2 physical physical NICs physical NICs with iSCSI offload capabilities IP network iSCSI storage iSCSI storage NOTE When you use a dependent hardware iSCSI adapter, performance reporting for a NIC associated with the adapter might show little or no activity, even when iSCSI traffic is heavy. This behavior occurs because the iSCSI traffic bypasses the regular networking stack. VMware, Inc. 67
  • 68. ESX Configuration Guide Create iSCSI Port for a Single NIC Use this task to connect the VMkernel, which runs services for iSCSI storage, to a physical NIC. If you have just one physical network adapter to be used for iSCSI traffic, this is the only procedure you must perform to set up your iSCSI networking. Procedure 1 Log in to the vSphere Client and select the host from the inventory panel. 2 Click the Configuration tab and click Networking. 3 In the Virtual Switch view, click Add Networking. 4 Select VMkernel and click Next. 5 Select Create a virtual switch to create a new vSwitch. 6 Select a NIC you want to use for iSCSI traffic. IMPORTANT If you are creating a port for the dependent hardware iSCSI adapter, make sure to select the NIC that corresponds to the iSCSI component. See “Determine Association Between Dependent Hardware iSCSI and Physical Network Adapters,” on page 96. 7 Click Next. 8 Enter a network label. Network label is a friendly name that identifies the VMkernel port that you are creating, for example, iSCSI. 9 Click Next. 10 Specify the IP settings and click Next. 11 Review the information and click Finish. Using Multiple NICs for Software and Dependent Hardware iSCSI If your host has more than one physical NIC for iSCSI, for each physical NIC, create a separate iSCSI port using 1:1 mapping. To achieve the 1:1 mapping, designate a separate vSwitch for each network adapter and iSCSI port pair. See Figure 6-2. Figure 6-2. iSCSI Ports and NICs on Separate vSwitches 68 VMware, Inc.
  • 69. Chapter 6 Networking Best Practices, Scenarios, and Troubleshooting An alternative is to add all NIC and iSCSI port pairs to a single vSwitch. See Figure 6-3. You must override the default setup and make sure that each port maps to only one corresponding active NIC. Figure 6-3. iSCSI Ports and NICs on a Single vSwitch For information about adding the NIC and VMkernel port pairs to a vSwitch, see “Create Additional iSCSI Ports for Multiple NICs,” on page 69. After you map iSCSI ports to network adapters, use the esxcli command to bind the ports to the iSCSI adapters. With dependent hardware iSCSI adapters, perform port binding, whether you use one NIC or multiple NICs. For information, see “Bind iSCSI Ports to iSCSI Adapters,” on page 96. Create Additional iSCSI Ports for Multiple NICs Use this task if you have two or more NICs you can designate for iSCSI and you want to connect all of your iSCSI NICs to a single vSwitch. In this task, you associate VMkernel iSCSI ports with the network adapters using 1:1 mapping. You now need to connect additional NICs to the existing vSwitch and map them to corresponding iSCSI ports. NOTE If you use a vNetwork Distributed Switch with multiple dvUplinks, for port binding, create a separate dvPort group per each physical NIC. Then set the team policy so that each dvPort group has only one active dvUplink. For detailed information on vNetwork Distributed Switches, see the Networking section. Prerequisites You must create a vSwitch that maps an iSCSI port to a physical NIC designated for iSCSI traffic. Procedure 1 Log in to the vSphere Client and select the host from the inventory panel. 2 Click the Configuration tab and click Networking. 3 Select the vSwitch that you use for iSCSI and click Properties. 4 Connect additional network adapters to the vSwitch. a In the vSwitch Properties dialog box, click the Network Adapters tab and click Add. b Select one or more NICs from the list and click Next. With dependent hardware iSCSI adapters, make sure to select only those NICs that have a corresponding iSCSI component. c Review the information on the Adapter Summary page, and click Finish. The list of network adapters reappears, showing the network adapters that the vSwitch now claims. VMware, Inc. 69
  • 70. ESX Configuration Guide 5 Create iSCSI ports for all NICs that you connected. The number of iSCSI ports must correspond to the number of NICs on the vSwitch. a In the vSwitch Properties dialog box, click the Ports tab and click Add. b Select VMkernel and click Next. c Under Port Group Properties, enter a network label, for example iSCSI, and click Next. d Specify the IP settings and click Next. When you enter subnet mask, make sure that the NIC is set to the subnet of the storage system it connects to. e Review the information and click Finish. CAUTION If the NIC you use with your iSCSI adapter, either software or dependent hardware, is not in the same subnet as your iSCSI target, your host is not able to establish sessions from this network adapter to the target. 6 Map each iSCSI port to just one active NIC. By default, for each iSCSI port on the vSwitch, all network adapters appear as active. You must override this setup, so that each port maps to only one corresponding active NIC. For example, iSCSI port vmk1 maps to vmnic1, port vmk2 maps to vmnic2, and so on. a On the Ports tab, select an iSCSI port and click Edit. b Click the NIC Teaming tab and select Override vSwitch failover order. c Designate only one adapter as active and move all remaining adapters to the Unused Adapters category. 7 Repeat the last step for each iSCSI port on the vSwitch. What to do next After performing this task, use the esxcli command to bind the iSCSI ports to the software iSCSI or dependent hardware iSCSI adapters. Configuring Networking on Blade Servers Because blade servers have a limited number of network adapters, you might need to use VLANs to separate traffic for the service console, vMotion, IP storage, and various groups of virtual machines. VMware best practices recommend that the service console and vMotion have their own networks for security reasons. If you dedicate physical adapters to separate vSwitches for this purpose, you might need to relinquish redundant (teamed) connections, stop isolating the various networking clients, or both. VLANs allow you to achieve network segmentation without having to use multiple physical adapters. For the network blade of a blade server to support an ESX port group with VLAN tagged traffic, you must configure the blade to support 802.1Q and configure the port as a tagged port. The method for configuring a port as a tagged port differs from server to server. The list describes how to configure a tagged port on three of the most commonly used blade servers. Table 6-1. Port Tagging Options on Blade Servers Server Type Configuration Option HP Blade Set VLAN Tagging to enabled. Dell PowerEdge Set the port to Tagged. IBM eServer Blade Center Select Tag in the port’s configuration. 70 VMware, Inc.
  • 71. Chapter 6 Networking Best Practices, Scenarios, and Troubleshooting Configure a Virtual Machine Port Group with a VLAN on a Blade Server Configuring virtual machine networking on a blade server requires some special considerations. Procedure 1 Log in to the vSphere Client and select the host from the inventory panel. 2 Click the Configuration tab, and click Networking. 3 On the right side of the page, click Properties for the vSwitch associated with the service console. 4 On the Ports tab, click Add. 5 Select Virtual Machines for the connection type (default). 6 Click Next. 7 In the Port Group Properties group, enter a network label that identifies the port group that you are creating. Use network labels to identify migration-compatible connections common to two or more hosts. 8 For VLAN ID, enter a number between 1 and 4094. If you are unsure what to enter, leave this blank or ask your network administrator. 9 Click Next. 10 After you determine that the vSwitch is configured correctly, click Finish. Configure a VMkernel Port with a VLAN on a Blade Server You can configure a VMkernel networking interface using a VLAN on a blade server. Procedure 1 Log in to the vSphere Client and select the host from the inventory panel. 2 Click the Configuration tab, and click Networking. 3 On the right side of the page, click Properties for the vSwitch associated with the service console. 4 On the Ports tab, click Add. 5 Select VMkernel and click Next. This option lets you connect the physical network to the VMkernel, which runs services for vMotion and IP storage (NFS or iSCSI). 6 In the Port Group Properties group, select or enter a network label and a VLAN ID. Enter a network label to identify the port group that you are creating. This is the label that you specify when configuring a virtual adapter to be attached to this port group, when configuring VMkernel services, such as vMotion and IP storage. Enter a VLAN ID to identify the VLAN that the port group’s network traffic will use. 7 Select Use this port group for vMotion to enable this port group to advertise itself to another ESX host as the network connection where vMotion traffic should be sent. You can enable this property for only one vMotion and IP storage port group for each ESX host. If this property is not enabled for any port group, migration with vMotion to this host is not possible. VMware, Inc. 71
  • 72. ESX Configuration Guide 8 In the IP Settings group, click Edit to set the VMkernel default gateway for VMkernel services, such as vMotion, NAS, and iSCSI. Under the DNS Configuration tab, the name of the host is entered into the name field by default. The DNS server addresses and the domain that were specified during installation are also preselected. On the Routing tab, the service console and the VMkernel each need their own gateway information. A gateway is needed if connectivity to machines not on the same IP subnet as the service console or VMkernel. Static IP settings is the default. 9 Click OK and then click Next. 10 Click Back to make any changes. 11 Review your changes on the Ready to Complete page and click Finish. Troubleshooting You might encounter host networking issues that require troubleshooting. In many cases, host networking can be restored with only a few configuration changes. Troubleshooting Service Console Networking If certain parts of the service console’s networking are misconfigured, you cannot access your ESX host with the vSphere Client. If your host’s service console loses network connectivity, you can reconfigure networking by connecting directly to the service console and using service console commands. n esxcfg-vswif -l Provides a list of the service console’s current network interfaces. Check that vswif0 is present and that the current IP address and netmask are correct. n esxcfg-vswitch -l Provides a list of the current virtual switch configurations. Check that the uplink adapter configured for the service console is connected to the appropriate physical network. n exscfg-nics -l Provides a list of the current network adapters. Check that the uplink adapter configured for the service console is up and that the speed and duplex are both correct. n esxcfg-nics -s <speed> <nic> Changes the speed of a network adapter. n esxcfg-nics -d <duplex> <nic> Changes the duplex of a network adapter. n esxcfg-vswif -I <new ip address> vswifX Changes the service console’s IP address. n esxcfg-vswif -n <new netmask> vswifX Changes the service console’s netmask. 72 VMware, Inc.
  • 73. Chapter 6 Networking Best Practices, Scenarios, and Troubleshooting n esxcfg-vswitch -U <old vmnic> <service console vswitch> Removes the uplink for the service console. n esxcfg-vswitch -L <new vmnic> <service console vswitch> Changes the uplink for the service console. If you encounter long waits when using esxcfg-* commands, DNS might be misconfigured. The esxcfg-* commands require that DNS be configured so that localhost name resolution works properly. This requires that the /etc/hosts file contain an entry for the configured IP address and the 127.0.0.1 localhost address. Rename Network Adapters by Using the Service Console If you lose service console connectivity after adding a new network adapter, you must use the service console to rename the affected network adapters. Adding a new network adapter can cause loss of service console connectivity and manageability by using the vSphere Client because of network adapters are renamed. Procedure 1 Log in directly to the ESX host’s console. 2 Use the esxcfg-nics -l command to see which names are assigned to the network adapters. 3 Use the esxcfg-vswitch -l command to see which vSwitches are now associated with device names no longer shown by esxcfg-nics. 4 Use the esxcfg-vswitch -U <old vmnic name> <vswitch> command to remove any network adapters that were renamed. 5 Use the esxcfg-vswitch -L <new vmnic name> <vswitch> command to add the network adapters again, giving them the correct names. Troubleshooting Physical Switch Configuration You might lose vSwitch connectivity when a failover or failback event occurs. This causes the MAC addresses that the virtual machines associated with that vSwitch to appear on a different switch port. To avoid this problem, put your physical switch in PortFast or PortFast trunk mode. Troubleshooting Port Group Configuration Changing the name of a port group when virtual machines are already connected to that port group causes an invalid network configuration for the virtual machines that are configured to connect to that port group. The connection from virtual network adapters to port groups is made by name, and the name is the identifier that is stored in the virtual machine configuration. Changing the name of a port group does not cause a mass reconfiguration of all the virtual machines connected to that port group. Virtual machines that are already powered on continue to function until they are powered off, because their connections to the network are already established. Avoid renaming networks after they are in use. After you rename a port group, you must reconfigure each associated virtual machine by using the service console to reflect the new port group name. VMware, Inc. 73
  • 77. Introduction to Storage 7 This introduction describes available storage options for ESX and explains how to configure your ESX system so that it can use and manage different types of storage. This chapter includes the following topics: n “About ESX Storage,” on page 77 n “Types of Physical Storage,” on page 78 n “Supported Storage Adapters,” on page 79 n “Target and Device Representations,” on page 79 n “About ESX Datastores,” on page 81 n “Comparing Types of Storage,” on page 84 n “Displaying Storage Adapters,” on page 85 n “Viewing Storage Devices,” on page 86 n “Displaying Datastores,” on page 87 About ESX Storage ESX storage refers to the storage space on a variety of physical storage systems, local or networked, that a host uses to store virtual machine disks. A virtual machine uses a virtual hard disk to store its operating system, program files, and other data associated with its activities. A virtual disk is a large physical file, or a set of files, that can be copied, moved, archived, and backed up as easily as any other file. To store virtual disk files and manipulate the files, a host requires dedicated storage space. The host uses storage space on a variety of physical storage systems, including your host’s internal and external devices, or networked storage, dedicated to the specific tasks of storing and protecting data. The host can discover storage devices to which it has access and format them as datastores. The datastore is a special logical container, analogous to a file system, where ESX places virtual disk files and other files that encapsulate essential components of a virtual machine. Deployed on different storage devices, the datastores hide specifics of each storage device and provide a uniform model for storing virtual machine files. Using the vSphere Client, you can set up datastores on any storage device that your host discovers. In addition, you can use folders to create logical groups of datastores for organizational purposes, and for setting permissions and alarms across the datastore group. VMware, Inc. 77
  • 78. ESX Configuration Guide Types of Physical Storage The ESX storage management process starts with storage space that your storage administrator preallocates on different storage systems. ESX supports the following types of storage: Local Storage Stores virtual machine files on internal or directly connected external storage disks. Networked Storage Stores virtual machine files on external storage disks or arrays attached to your host through a direct connection or through a high-speed network. Local Storage Local storage can be internal hard disks located inside your ESX host, or it can be external storage systems located outside and connected to the host directly through protocols such as SAS or SATA. Local storage does not require a storage network to communicate with your host. You need is a cable connected to the storage unit and, when required, a compatible HBA in your host. ESX supports a variety of internal or external local storage devices, including SCSI, IDE, SATA, USB, and SAS storage systems. Regardless of the type of storage you use, your host hides a physical storage layer from virtual machines. NOTE You cannot use IDE/ATA drives to store virtual machines. Local storage devices do not support sharing across multiple hosts. A datastore on a local storage device can be accessed by only one host. Because the majority of local storage devices do not support multiple connections, you cannot use multiple paths to access local storage. Networked Storage Networked storage consists of external storage systems that your ESX host uses to store virtual machine files remotely. Typically, the host accesses these systems over a high-speed storage network. Networked storage devices are shared. Datastores on networked storage devices can be accessed by multiple hosts concurrently. ESX supports the following networked storage technologies. NOTE Accessing the same storage through different transport protocols, such as iSCSI and Fibre Channel, at the same time is not supported. Fibre Channel (FC) Stores virtual machine files remotely on an FC storage area network (SAN). FC SAN is a specialized high-speed network that connects your hosts to high- performance storage devices. The network uses Fibre Channel protocol to transport SCSI traffic from virtual machines to the FC SAN devices. 78 VMware, Inc.
  • 79. Chapter 7 Introduction to Storage To connect to the FC SAN, your host should be equipped with Fibre Channel host bus adapters (HBAs). Unless you use Fibre Channel direct connect storage, you need Fibre Channel switches to route storage traffic. If your host contains FCoE (Fibre Channel over Ethernet) HBAs, you can connect to your shared Fibre Channel devices using an IP network. Internet SCSI (iSCSI) Stores virtual machine files on remote iSCSI storage devices. iSCSI packages SCSI storage traffic into the TCP/IP protocol so that it can travel through standard TCP/IP networks instead of the specialized FC network. With an iSCSI connection, your host serves as the initiator that communicates with a target, located in remote iSCSI storage systems. ESX offers the following types of iSCSI connections: Hardware iSCSI Your host connects to storage through a third-party adapter capable of offloading the iSCSI and network processing. Software iSCSI Your host uses a software-based iSCSI initiator in the VMkernel to connect to storage. With this type of iSCSI connection, your host needs only a standard network adapter for network connectivity. Network-attached Stores virtual machine files on remote file servers accessed over a standard Storage (NAS) TCP/IP network. The NFS client built into ESX uses Network File System (NFS) protocol version 3 to communicate with the NAS/NFS servers. For network connectivity, the host requires a standard network adapter. Shared Serial Attached Stores virtual machines on direct-attached SAS storage systems that offer SCSI (SAS) shared access to multiple hosts. This type of access permits multiple hosts to access the same VMFS datastore on a LUN. Supported Storage Adapters Storage adapters provide connectivity for your ESX host to a specific storage unit or network. Depending on the type of storage you use, you might need to install or enable a storage adapter on your host. ESX supports different classes of adapters, including SCSI, iSCSI, RAID, Fibre Channel, Fibre Channel over Ethernet (FCoE), and Ethernet. ESX accesses the adapters directly through device drivers in the VMkernel. Target and Device Representations In the ESX context, the term target identifies a single storage unit that the host can access. The terms device and LUN describe a logical volume that represents storage space on a target. Typically, the terms device and LUN, in the ESX context, mean a SCSI volume presented to the host from a storage target and available for formatting. Different storage vendors present the storage systems to ESX hosts in different ways. Some vendors present a single target with multiple storage devices or LUNs on it, while others present multiple targets with one LUN each. Figure 7-1. Target and LUN Representations target target target target LUN LUN LUN LUN LUN LUN storage array storage array VMware, Inc. 79
  • 80. ESX Configuration Guide In this illustration, three LUNs are available in each configuration. In one case, the host sees one target, but that target has three LUNs that can be used. Each LUN represents an individual storage volume. In the other example, the host sees three different targets, each having one LUN. Targets that are accessed through the network have unique names that are provided by the storage systems. The iSCSI targets use iSCSI names, while Fibre Channel targets use World Wide Names (WWNs). NOTE ESX does not support accessing the same LUN through different transport protocols, such as iSCSI and Fibre Channel. A device, or LUN, is identified by its UUID name. If a LUN is shared by multiple hosts, it must be presented to all host with the same UUID. Understanding Fibre Channel Naming In Fibre Channel SAN, a World Wide Name (WWN) uniquely identifies each element in the network, such as a Fibre Channel adapter or storage device. The WWN is a 64-bit address that consists of 16 hexadecimal numbers and might look like this: 20:00:00:e0:8b:8b:38:77 21:00:00:e0:8b:8b:38:77 The WWN is assigned to every Fibre Channel SAN element by its manufacturer. Understanding iSCSI Naming and Addressing In an iSCSI network, each iSCSI element that uses the network has a unique and permanent iSCSI name and is assigned an address for access. iSCSI Name Identifies a particular iSCSI element, regardless of its physical location. The iSCSI name can use IQN or EUI format. n IQN (iSCSI qualified name). Can be up to 255 characters long and has the following format: iqn.yyyy-mm.naming-authority:unique name yyyy-mm The year and month when the naming authority was established. naming-authority Usually reverse syntax of the Internet domain name of the naming authority. For example, the iscsi.vmware.com naming authority could have the iSCSI qualified name form of iqn.1998-01.com.vmware.iscsi. The name indicates that the vmware.com domain name was registered in January of 1998, and iscsi is a subdomain, maintained by vmware.com. unique name Any name you want to use, for example, the name of your host. The naming authority must make sure that any names assigned following the colon are unique. For example, iqn.1998-01.com.vmware.iscsi:name1. n EUI (extended unique identifier). Includes the eui. prefix, followed by the 16-character name. The name includes 24 bits for the company name assigned by the IEEE and 40 bits for a unique ID, such as a serial number. For example, eui.0123456789ABCDEF iSCSI Alias A more manageable, easy-to-remember name to use instead of the iSCSI name. iSCSI aliases are not unique, and are intended to be just a friendly name to associate with the node. 80 VMware, Inc.
  • 81. Chapter 7 Introduction to Storage IP Address An address associated with each iSCSI element so that routing and switching equipment on the network can establish the connection between different elements, such as the host and storage. This is just like the IP address you assign to a computer to get access to your company's network or the Internet. Understanding Storage Device Naming In the vSphere Client, each storage device, or LUN, is identified by several names, including a friendly name, a UUID, and a runtime name. Name This is a friendly name that the ESX host assigns to a device based on the storage type and manufacturer. You can modify the name using the vSphere Client. When you modify the name of the device on one host, the change takes affect across all hosts that have access to this device. Identifier This is a universally unique identifier assigned to a device. Depending on the type of storage, different algorithms are used to create the identifier. The identifier is persistent across reboots and must be the same for all hosts sharing the device. Runtime Name This is the name of the first path to the device. The runtime name is created by the host, is not a reliable identifier for the device, and is not persistent. The runtime name has the following format: vmhba#:C#:T#:L#. vmhba# The name of the storage adapter. The name refers to the physical adapter on the host, not to the SCSI controller used by the virtual machines. C# The storage channel number. Software iSCSI initiators use the channel number to show multiple paths to the same target. T# The target number. Target numbering is decided by the host and might change if there is a change in the mappings of targets visible to the host. Targets that are shared by different ESX hosts might not have the same target number. L# The LUN number that shows the position of the LUN within the target. The LUN number is provided by the storage system. If a target has only one LUN, the LUN number is always zero (0). For example, vmhba1:C0:T3:L1 represents LUN1 on target 3 accessed through the storage adapter vmhba1 and channel 0. About ESX Datastores Datastores are logical containers, analogous to file systems, that hide specifics of each storage device and provide a uniform model for storing virtual machine files. Datastores can also be used for storing ISO images, virtual machine templates, and floppy images. You use the vSphere Client to access different types of storage devices that your ESX host discovers and to deploy datastores on them. VMware, Inc. 81
  • 82. ESX Configuration Guide Depending on the type of storage you use, datastores can be backed by the following file system formats: Virtual Machine File High-performance file system optimized for storing virtual machines. Your System (VMFS) host can deploy a VMFS datastore on any SCSI-based local or networked storage device, including Fibre Channel and iSCSI SAN equipment. As an alternative to using the VMFS datastore, your virtual machine can have direct access to raw devices and use a mapping file (RDM) as a proxy. Network File System File system on a NAS storage device. ESX supports NFS version 3 over TCP/ (NFS) IP. The host can access a designated NFS volume located on an NFS server, mount the volume, and use it for any storage needs. If you use the service console to access your ESX host, you can see the VMFS and NFS datastores as separate subdirectories in the /vmfs/volumes directory. VMFS Datastores ESX can format SCSI-based storage devices as VMFS datastores. VMFS datastores primarily serve as repositories for virtual machines. You can store multiple virtual machines on the same VMFS volume. Each virtual machine, encapsulated in a set of files, occupies a separate single directory. For the operating system inside the virtual machine, VMFS preserves the internal file system semantics, which ensures correct application behavior and data integrity for applications running in virtual machines. In addition, you can use the VMFS datastores to store other files, such as virtual machine templates and ISO images. VMFS supports the following file and block sizes, enabling your virtual machines to run even the most data- intensive applications, including databases, ERP, and CRM, in virtual machines: n Maximum virtual disk size: 2TB with 8MB block size n Maximum file size: 2TB with 8MB block size n Block size: 1MB (default), 2MB, 4MB, and 8MB Creating and Increasing VMFS Datastores You can set up VMFS datastores on any SCSI-based storage devices that your ESX host discovers. After you create the VMFS datastore, you can edit its properties. You can have up to 256 VMFS datastores per system, with a minimum volume size of 1.2GB. NOTE Always have only one VMFS datastore for each LUN. If your VMFS datastore requires more space, you can increase the VMFS volume. You can dynamically add new extents to any VMFS datastore and grow the datastore up to 64TB. An extent is a LUN or partition on a physical storage device. The datastore can stretch over multiple extents, yet appear as a single volume. Another option is to grow the existing datastore extent if the storage device where your datastore resides has free space. You can grow the extent up to 2 TB. 82 VMware, Inc.
  • 83. Chapter 7 Introduction to Storage Sharing a VMFS Volume Across ESX Hosts As a cluster file system, VMFS lets multiple ESX hosts access the same VMFS datastore concurrently. You can connect up to 32 hosts to a single VMFS volume. Figure 7-2. Sharing a VMFS Volume Across Hosts host host host A B C VM1 VM2 VM3 VMFS volume disk1 virtual disk2 disk files disk3 To ensure that the same virtual machine is not accessed by multiple servers at the same time, VMFS provides on-disk locking. Sharing the same VMFS volume across multiple hosts offers the following advantages: n You can use VMware Distributed Resource Scheduling and VMware High Availability. You can distribute virtual machines across different physical servers. That means you run a mix of virtual machines on each server so that not all experience high demand in the same area at the same time. If a server fails, you can restart virtual machines on another physical server. In case of a failure, the on-disk lock for each virtual machine is released. n You can use vMotion to migrate running virtual machines from one physical server to another. n You can use VMware Consolidated Backup, which lets a proxy server, called VCB proxy, back up a snapshot of a virtual machine while the virtual machine is powered on and is reading and writing to its storage. NFS Datastore ESX can access a designated NFS volume located on a NAS server, mount the volume, and use it for its storage needs. You can use NFS volumes to store and boot virtual machines in the same way that you use VMFS datastores. ESX supports the following shared storage capabilities on NFS volumes: n vMotion n VMware DRS and VMware HA n ISO images, which are presented as CD-ROMs to virtual machines n Virtual machine snapshots VMware, Inc. 83
  • 84. ESX Configuration Guide How Virtual Machines Access Storage When a virtual machine communicates with its virtual disk stored on a datastore, it issues SCSI commands. Because datastores can exist on various types of physical storage, these commands are encapsulated into other forms, depending on the protocol that the ESX host uses to connect to a storage device. ESX supports Fibre Channel (FC), Internet SCSI (iSCSI), Fibre Channel over Ethernet (FCoE), and NFS protocols. Regardless of the type of storage device your host uses, the virtual disk always appears to the virtual machine as a mounted SCSI device. The virtual disk hides a physical storage layer from the virtual machine’s operating system. This allows you to run operating systems that are not certified for specific storage equipment, such as SAN, inside the virtual machine. Figure 7-3 depicts five virtual machines using different types of storage to illustrate the differences between each type. Figure 7-3. Virtual machines accessing different types of storage Host requires TCP/IP connectivity virtual virtual virtual virtual virtual machine machine machine machine machine local ethernet SCSI software adapter fibre iSCSI channel ethernet ethernet VMFS HBA HBA NIC NIC SAN LAN LAN LAN Key physical disk datastore VMFS VMFS NFS virtual disk fibre array iSCSI array NAS appliance NOTE This diagram is for conceptual purposes only. It is not a recommended configuration. Comparing Types of Storage Whether certain vSphere functionality is supported might depend on the storage technology that you use. Table 7-1 compares networked storage technologies that ESX supports. Table 7-1. Networked Storage that ESX Supports Technology Protocols Transfers Interface Fibre Channel FC/SCSI Block access of data/LUN FC HBA iSCSI IP/SCSI Block access of data/LUN n iSCSI HBA (hardware iSCSI) n NIC (software iSCSI) NAS IP/NFS File (no direct LUN access) NIC Table 7-2 compares the vSphere features that different types of storage support. 84 VMware, Inc.
  • 85. Chapter 7 Introduction to Storage Table 7-2. vSphere Features Supported by Storage VMware HA Storage Type Boot VM vMotion Datastore RDM VM Cluster and DRS VCB Local Storage Yes No VMFS No No No Yes Fibre Channel Yes Yes VMFS Yes Yes Yes Yes iSCSI Yes Yes VMFS Yes Yes Yes Yes NAS over NFS Yes Yes NFS No No Yes Yes Displaying Storage Adapters The host uses storage adapters to access different storage devices. You can display the available storage adapters and review their information. Table 7-3 lists information that you can see when you display details for each adapter. Certain adapters, for example iSCSI, need to be configured or enabled before you can view their information. Table 7-3. Storage Adapter Information Adapter Information Description Model Model of the adapter. Targets (Fibre Channel and Number of targets accessed through the adapter. SCSI) Connected Targets (iSCSI) Number of connected targets on an iSCSI adapter. WWN (Fibre Channel) World Wide Name formed according to Fibre Channel standards that uniquely identifies the FC adapter. iSCSI Name (iSCSI) Unique name formed according to iSCSI standards that identifies the iSCSI adapter. iSCSI Alias (iSCSI) A friendly name used instead of the iSCSI name. IP Address (hardware iSCSI) Address assigned to the iSCSI adapter. Discovery Methods (iSCSI) Discovery methods the iSCSI adapter uses to access iSCSI targets. Devices All storage devices or LUNs the adapter can access. Paths All paths the adapter uses to access storage devices. View Storage Adapters Information You can display storage adapters that your host uses and review their information. Procedure 1 In Inventory, select Hosts and Clusters. 2 Select a host and click the Configuration tab. 3 In Hardware, select Storage Adapters. 4 To view details for a specific adapter, select the adapter from the Storage Adapters list. 5 To list all storage devices the adapter can access, click Devices. 6 To list all paths the adapter uses, click Paths. VMware, Inc. 85
  • 86. ESX Configuration Guide Copy Storage Adapter Identifiers to the Clipboard If your storage adapters use unique identifiers, such as an iSCSI Name or WWN, you can copy them to a clipboard directly from the UI. Procedure 1 In Inventory, select Hosts and Clusters. 2 Select a host and click the Configuration tab. 3 In Hardware, select Storage Adapters. 4 Select the adapter from the Storage Adapters list. 5 In the Details panel, highlight the value in the name field, and select Copy from the right-button menu. Viewing Storage Devices You can display all storage devices or LUNs available to the host, including all local and networked devices. If you use third-party multipathing plug-ins, the storage devices available through the plug-ins also appear on the list. For each storage adapter, you can display a separate list of storage devices available for this adapter. Generally, when you review storage devices, you see the following information. Table 7-4. Storage Device Information Storage Device Information Description Name A friendly name that the ESX host assigns to the device based on the storage type and manufacturer. You can change this name to a name of your choice. Identifier A universally unique identifier that is intrinsic to the device. Runtime Name The name of the first path to the device. LUN The LUN number that shows the position of the LUN within the target. Type Type of device, for example, disk or CD-ROM. Transport Transportation protocol your host uses to access the device. Capacity Total capacity of the storage device. Owner The plug-in, such as the NMP or a third-party plug-in, that the host uses to manage the storage device. Hardware Acceleration Information about whether the storage device assists the host with virtual machine management operations. The status can be Supported, Not Supported, or Unknown. For details, see “Storage Hardware Acceleration,” on page 123. Location A path to the storage device in the /vmfs/devices/ directory. Partitions Primary and logical partitions, including a VMFS datastore, if configured. Display Storage Devices for a Host You can display all storage devices or LUNs available to a host. If you use any third-party multipathing plug- ins, the storage devices available through the plug-ins also appear on the list. Procedure 1 In Inventory, select Hosts and Clusters. 2 Select a host and click the Configuration tab. 86 VMware, Inc.
  • 87. Chapter 7 Introduction to Storage 3 In Hardware, select Storage. 4 Click Devices. 5 To view additional details about a specific device, select the device from the list. Display Storage Devices for an Adapter You can display a list of storage devices accessible to a specific storage adapter on the host. Procedure 1 In Inventory, select Hosts and Clusters. 2 Select a host and click the Configuration tab. 3 In Hardware, select Storage Adapters. 4 Select the adapter from the Storage Adapters list. 5 Click Devices. Copy Storage Device Identifiers to the Clipboard A storage device identifier is a universally unique ID assigned to a storage device or LUN. Depending on the type of storage, different algorithms are used to create the identifier and it can be long and complex. You can copy the storage device identifier directly from the UI. Procedure 1 Display a list of storage devices. 2 Right-click a device and select Copy identifier to clipboard. Displaying Datastores You can display all datastores available to your hosts and analyze their properties. Datastores are added to the vSphere Client in the following ways: n Created on an available storage device. n Discovered when a host is added to the inventory. When you add a host to the inventory, the vSphere Client displays any datastores available to the host. If your vSphere Client is connected to a vCenter Server system, you can see datastore information in the Datastores view. This view displays all datastores in the inventory, arranged by a datacenter. Through this view, you can organize datastores into folder hierarchies, create datastores, edit their properties, or remove existing datastores. This view is comprehensive and shows all information for your datastores including hosts and virtual machines using the datastores, storage reporting information, permissions, alarms, tasks and events, storage topology, and storage reports. Configuration details for each datastore on all hosts connected to this datastore are provided on the Configuration tab of the Datastores view. NOTE The Datastores view is not available when the vSphere client connects directly to your host. In this case, review datastore information through the host storage configuration tab. Table 7-5 describes the datastore details that you can see when you review datastores. VMware, Inc. 87
  • 88. ESX Configuration Guide Table 7-5. Datastore Information Datastore Information Description Identification Editable name that you assign to the datastore. Device Storage device on which the datastore is deployed. Capacity Total formatted capacity of the datastore. Free Available space. Type File system that the datastore uses, either VMFS or NFS. Storage I/O Control Allows cluster-wide storage I/O prioritization. See the vSphere Resource Management Guide. Hardware Acceleration Information on whether the datastore assists the host with virtual machine management operations. The status can be Supported, Not Supported, or Unknown. For details, see “Storage Hardware Acceleration,” on page 123. Location A path to the datastore in the /vmfs/volumes/ directory. Extents Individual extents that the datastore spans and their capacity (VMFS datastores only). Path Selection Path selection policy the host uses to access storage (VMFS datastores only). Paths Number of paths used to access storage and their status (VMFS datastores only). Review Datastore Properties You can display all datastores available to the hosts and analyze their properties. Procedure 1 Display the host in the inventory. 2 Select a host in the inventory and click the Configuration tab. 3 In Hardware, select Storage. 4 Click the Datastores view. 5 To display details for a particular datastore, select the datastore from the list. 88 VMware, Inc.
  • 89. Configuring ESX Storage 8 The following topics contain information about configuring local SCSI storage devices, Fibre Channel SAN storage, iSCSI storage, and NFS storage. This chapter includes the following topics: n “Local SCSI Storage,” on page 89 n “Fibre Channel Storage,” on page 90 n “iSCSI Storage,” on page 90 n “Datastore Refresh and Storage Rescan Operations,” on page 104 n “Create VMFS Datastores,” on page 105 n “Network Attached Storage,” on page 106 n “Creating a Diagnostic Partition,” on page 107 Local SCSI Storage Local storage uses a SCSI-based device such as your ESX host’s hard disk or any external dedicated storage system connected directly to your host. Figure 8-1 depicts a virtual machine using local SCSI storage. Figure 8-1. Local Storage Host virtual machine local ethernet SCSI VMFS In this example of a local storage topology, the ESX host uses a single connection to a disk. On that disk, you can create a VMFS datastore, which you use to store virtual machine disk files. VMware, Inc. 89
  • 90. ESX Configuration Guide Although this storage configuration is possible, it is not a recommended topology. Using single connections between storage arrays and hosts creates single points of failure (SPOF) that can cause interruptions when a connection becomes unreliable or fails. To ensure fault tolerance, some DAS systems support redundant connection paths. Fibre Channel Storage ESX supports Fibre Channel adapters, which allow a host to connect to a SAN and see storage devices on the SAN. You must install Fibre Channel (FC) adapters before the host can access FC storage devices. Figure 8-2 depicts virtual machines using Fibre Channel storage. Figure 8-2. Fibre Channel Storage Host virtual machine fibre channel HBA SAN VMFS fibre array In this configuration, an ESX host connects to SAN fabric, which consists of Fibre Channel switches and storage arrays, using a Fibre Channel adapter. LUNs from a storage array become available to the host. You can access the LUNs and create a datastore for your storage needs. The datastore uses the VMFS format. For specific information on setting up the FC SAN fabric and storage arrays to work with ESX, see the Fibre Channel SAN Configuration Guide. iSCSI Storage ESX supports iSCSI technology that allows your host to use an IP network while accessing remote storage. With iSCSI, SCSI storage commands that your virtual machine issues to its virtual disk are converted into TCP/ IP packets and transmitted to a remote device, or target, that stores the virtual disk. To access remote targets, the host uses iSCSI initiators. Initiators transport SCSI requests and responses between the host and the target storage device on the IP network. ESX supports hardware, dependent and independent, and software iSCSI initiators. You must configure iSCSI initiators for the host to access and display iSCSI storage devices. Figure 8-3 depicts different types of iSCSI initiators. 90 VMware, Inc.
  • 91. Chapter 8 Configuring ESX Storage Figure 8-3. iSCSI Storage Host virtual virtual machine machine software adapter iSCSI HBA ethernet NIC LAN LAN VMFS iSCSI array In the left example, the host uses the hardware iSCSI adapter to connect to the iSCSI storage system. In the right example, the host uses a software iSCSI adapter and an Ethernet NIC to connect to the iSCSI storage. iSCSI storage devices from the storage system become available to the host. You can access the storage devices and create VMFS datastores for your storage needs. For specific information on setting up the iSCSI SAN to work with ESX, see the iSCSI SAN Configuration Guide. iSCSI Initiators To access iSCSI targets, your host uses iSCSI initiators. The initiators transport SCSI requests and responses, encapsulated into the iSCSI protocol, between the host and the iSCSI target. VMware supports different types of initiators. Software iSCSI Adapter A software iSCSI adapter is a VMware code built into the VMkernel. It allows your host to connect to the iSCSI storage device through standard network adapters. The software iSCSI adapter handles iSCSI processing while communicating with the network adapter. With the software iSCSI adapter, you can use iSCSI technology without purchasing specialized hardware. Hardware iSCSI Adapter A hardware iSCSI adapter is a third-party adapter that offloads iSCSI and network processing from your host. Hardware iSCSI adapters are divided into categories. Dependent Hardware Depends on VMware networking, and iSCSI configuration and management iSCSI Adapter interfaces provided by VMware. VMware, Inc. 91
  • 92. ESX Configuration Guide This type of adapter can be a card that presents a standard network adapter and iSCSI offload functionality for the same port. The iSCSI offload functionality depends on the host's network configuration to obtain the IP, MAC, and other parameters used for iSCSI sessions. An example of a dependent adapter is the iSCSI licensed Broadcom 5709 NIC. Independent Hardware Implements its own networking and iSCSI configuration and management iSCSI Adapter interfaces. An example of an independent hardware iSCSI adapter is a card that either presents only iSCSI offload functionality or iSCSI offload functionality and standard NIC functionality. The iSCSI offload functionality has independent configuration management that assigns the IP, MAC, and other parameters used for the iSCSI sessions. An example of a independent adapter is the QLogic QLA4052 adapter. Hardware iSCSI adapters might need to be licensed. Otherwise, they will not appear in the vSphere Client or vSphere CLI. Contact your vendor for licensing information. Setting Up Independent Hardware iSCSI Adapters An independent hardware iSCSI adapter is a specialized third-party adapter capable of accessing iSCSI storage over TCP/IP. This iSCSI adapter handles all iSCSI and network processing and management for your ESX system. The setup and configuration process for the independent hardware iSCSI adapters involves these steps: 1 Check whether the adapter needs to be licensed. See your vendor documentation. 2 Install the adapter. For installation information, see vendor documentation. 3 Verity that the adapter is installed correctly. See “View Independent Hardware iSCSI Adapters,” on page 92. 4 Configure discovery addresses. See “Configuring Discovery Addresses for iSCSI Initiators,” on page 97. 5 Configure CHAP parameters. See “Configuring CHAP Parameters for iSCSI Adapters,” on page 99. For your host to be able to access iSCSI storage, you must first install the hardware iSCSI adapter and configure discovery address and CHAP parameters. View Independent Hardware iSCSI Adapters View a hardware iSCSI adapter to verify that it is correctly installed and ready for configuration. Prerequisites After you install a hardware iSCSI adapter, it appears on the list of storage adapters available for configuration. You can view its properties. Required privilege: Host.Configuration.Storage Partition Configuration 92 VMware, Inc.
  • 93. Chapter 8 Configuring ESX Storage Procedure 1 Log in to the vSphere Client, and select a host from the inventory panel. 2 Click the Configuration tab and click Storage Adapters in the Hardware panel. If installed, the hardware iSCSI initiator should appear on the list of storage adapters. 3 Select the initiator to view. The default details for the initiator appear, including the model, iSCSI name, iSCSI alias, IP address, and target and paths information. 4 Click Properties. The iSCSI Initiator Properties dialog box appears. The General tab displays additional characteristics of the initiator. You can now configure your hardware initiator or change its default characteristics. Change Name and IP Address for Independent Hardware Initiators When you configure your independent hardware iSCSI initiators, make sure that their names and IP addresses are formatted properly. Procedure 1 Access the iSCSI Initiator Properties dialog box. 2 Click Configure. 3 To change the default iSCSI name for your initiator, enter the new name. Make sure the name you enter is worldwide unique and properly formatted or some storage devices might not recognize the hardware iSCSI initiator. 4 (Optional) Enter the iSCSI alias. The alias is a name that you use to identify the hardware iSCSI initiator. 5 Change the default IP settings. You must change the default IP settings so that they are configured properly for the IP SAN. Work with your network administrator to determine the IP setting for the HBA. 6 Click OK to save your changes. If you change the iSCSI name, it is used for new iSCSI sessions. For existing sessions, new settings are not used until logout and re-login. Setting Up and Configuring Software iSCSI Adapter With the software-based iSCSI implementation, you can use standard NICs to connect your host to a remote iSCSI target on the IP network. The software iSCSI adapter that is built into ESX facilitates this connection by communicating with the physical NICs through the network stack. When you connect to a vCenter Server or a host with the vSphere Client, you can see the software iSCSI adapter on the list of your storage adapters. Only one software iSCSI adapter appears. Before you can use the software iSCSI adapter, you must set up networking, enable the adapter, and configure parameters such as discovery addresses and CHAP. The software iSCSI adapter configuration workflow includes these steps: 1 Configure the iSCSI networking by creating ports for iSCSI traffic. VMware, Inc. 93
  • 94. ESX Configuration Guide See “Networking Configuration for Software iSCSI and Dependent Hardware iSCSI,” on page 67. 2 Enable the software iSCSI adapter. See “Enable the Software iSCSI Adapter,” on page 94. 3 If you use multiple NICs for the software iSCSI multipathing, perform the port binding by connecting all iSCSI ports to the software iSCSI adapter. See “Bind iSCSI Ports to iSCSI Adapters,” on page 96. 4 If needed, enable Jumbo Frames. Jumbo Frames must be enabled for each vSwitch through the vSphere CLI. Also, if you use an ESX host, you must create a VMkernel network interface enabled with Jumbo Frames. See the Networking section for more information. 5 Configure discovery addresses. See “Configuring Discovery Addresses for iSCSI Initiators,” on page 97. 6 Configure CHAP parameters. See “Configuring CHAP Parameters for iSCSI Adapters,” on page 99. Enable the Software iSCSI Adapter You must enable your software iSCSI adapter so that your host can use it to access iSCSI storage. Prerequisites Before enabling the software iSCSI adapter, set up networking for iSCSI. NOTE If you boot from iSCSI using the software iSCSI adapter, the adapter is enabled and the network configuration is created automatically at the first boot. If you disable the adapter, it is re-enabled each time you boot the host. Procedure 1 Log in to the vSphere Client, and select a server from the inventory panel. 2 Click the Configuration tab and click Storage Adapters in the Hardware panel. The list of available storage adapters appears. 3 Select the iSCSI initiator to configure and click Properties. 4 Click Configure. 5 To enable the initiator, select Enabled and click OK. After you enable the initiator, the host assigns the default iSCSI name to it. You can change the default name if needed. Setting Up and Configuring Dependent Hardware iSCSI Adapters A dependent hardware iSCSI adapter is a third-party adapter that depends on VMware networking, and iSCSI configuration and management interfaces provided by VMware. This type of adapter can be a card, such as a Broadcom 5709 NIC, that presents a standard network adapter and iSCSI offload functionality for the same port. The iSCSI offload functionality appears on the list of storage adapters as an iSCSI adapter. Although the iSCSI adapter is enabled by default, to make it functional, you must set up networking for the iSCSI traffic and bind the adapter and an appropriate VMkernel iSCSI port. You can then configure the adapter. 94 VMware, Inc.
  • 95. Chapter 8 Configuring ESX Storage The entire setup and configuration process for the dependent hardware iSCSI adapters involves these steps: 1 View the dependent hardware adapters. See “View Dependent Hardware iSCSI Adapters,” on page 95. If your dependent hardware adapters do not appear on the list of storage adapters, check whether they need to be licensed. See your vendor documentation. 2 Determine the association between the dependent hardware adapters and physical NICs. See “Determine Association Between Dependent Hardware iSCSI and Physical Network Adapters,” on page 96 Make sure to note the names of the corresponding physical NICs. For example, the vmhba33 adapter corresponds to vmnic1 and vmhba34 corresponds to vmnic2. 3 Configure the iSCSI networking by creating ports for the iSCSI traffic. See “Networking Configuration for Software iSCSI and Dependent Hardware iSCSI,” on page 67. Open a port for each NIC. For example, create the vmk1 port for the vmnic1 NIC and the vmk2 port for vmnic2. 4 Bind the iSCSI ports to corresponding dependent hardware iSCSI adapters. This step is necessary no matter whether you have multiple adapters or just one. See “Bind iSCSI Ports to iSCSI Adapters,” on page 96. In this example, you bind port vmk1 to vmhba33 and port vmk2 to vmhba34. 5 Configure discovery addresses. See “Configuring Discovery Addresses for iSCSI Initiators,” on page 97. 6 Configure CHAP parameters. See “Configuring CHAP Parameters for iSCSI Adapters,” on page 99. Dependent Hardware iSCSI Considerations When you use dependent hardware iSCSI adapters with ESX, certain considerations apply. n When you use any dependent hardware iSCSI adapter, performance reporting for a NIC associated with the adapter might show little or no activity, even when iSCSI traffic is heavy. This behavior occurs because the iSCSI traffic bypasses the regular networking stack. n The Broadcom iSCSI adapter performs data reassembly in hardware, which has a limited buffer space. When you use the Broadcom iSCSI adapter in a congested network or under load, enable flow control to avoid performance degradation. Flow control manages the rate of data transmission between two nodes to prevent a fast sender from overrunning a slow receiver. For best results, enable flow control at the end points of the I/O path, at the hosts and iSCSI storage systems. n Broadcom iSCSI adapters do not support IPv6 and Jumbo Frames. View Dependent Hardware iSCSI Adapters View a dependent hardware iSCSI adapter to verify that it is correctly loaded. If the dependent hardware adapter does not appear on the list of storage adapters, check whether it needs to be licensed. See your vendor documentation. VMware, Inc. 95
  • 96. ESX Configuration Guide Procedure 1 Log in to the vSphere Client, and select a host from the Inventory panel. 2 Click the Configuration tab and click Storage Adapters in the Hardware panel. If installed, the dependent hardware iSCSI adapter should appear on the list of storage adapters. 3 Select the adapter to view and click Properties. The iSCSI Initiator Properties dialog box displays the default details for the adapter, including the iSCSI name and iSCSI alias. Determine Association Between Dependent Hardware iSCSI and Physical Network Adapters You need to determine the name of the physical NIC with which the dependent hardware iSCSI adapter is associated. You need to know the association to be able to perform the port binding correctly. Procedure 1 Use the vSphere CLI command to determine the name of the physical NIC, with which the iSCSI adapter is associated. esxcli swiscsi vmnic list -d vmhba# vmhba# is the name of the iSCSI adapter. 2 In the output, find the vmnic name: vmnic# line. vmnic# is the name of the network adapter that corresponds to the iSCSI adapter. What to do next After you determined the name of the NIC, create an iSCSI port on a vSwitch connected to the NIC. You then bind this port to the dependent hardware iSCSI adapter, so that your host can direct the iSCSI traffic through the NIC. Bind iSCSI Ports to iSCSI Adapters Bind an iSCSI port that you created for a NIC to an iSCSI adapter. With the software iSCSI adapter, perform this task only if you set up two or more NICs for the iSCSI multipathing. If you use dependent hardware iSCSI adapters, the task is required regardless of whether you have multiple adapters or one adapter. Prerequisites Complete the following tasks: n For dependent hardware iSCSI adapters, have the correct association between the physical NICs and iSCSI adapters. See “View Dependent Hardware iSCSI Adapters,” on page 95. n Set up networking for the iSCSI traffic. See “Networking Configuration for Software iSCSI and Dependent Hardware iSCSI,” on page 67. n To use the software iSCSI adapter, enable it. See “Enable the Software iSCSI Adapter,” on page 94. 96 VMware, Inc.
  • 97. Chapter 8 Configuring ESX Storage Procedure 1 Identify the name of the iSCSI port assigned to the physical NIC. The vSphere Client displays the port's name below the network label. In the following graphic, the ports' names are vmk1 and vmk2. 2 Use the vSphere CLI command to bind the iSCSI port to the iSCSI adapter. esxcli swiscsi nic add -n port_name -d vmhba IMPORTANT For software iSCSI, repeat this command for each iSCSI port connecting all ports with the software iSCSI adapter. With dependent hardware iSCSI, make sure to bind each port to an appropriate corresponding adapter. 3 Verify that the port was added to the iSCSI adapter. esxcli swiscsi nic list -d vmhba 4 Use the vSphere Client to rescan the iSCSI adapter. Configuring Discovery Addresses for iSCSI Initiators Set up target discovery addresses so that the iSCSI initiator can determine which storage resource on the network is available for access. The ESX system supports these discovery methods: Dynamic Discovery Also known as SendTargets discovery. Each time the initiator contacts a specified iSCSI server, the initiator sends the SendTargets request to the server. The server responds by supplying a list of available targets to the initiator. The names and IP addresses of these targets appear on the Static Discovery tab. If you remove a static target added by dynamic discovery, the target might be returned to the list the next time a rescan happens, the HBA is reset, or the host is rebooted. Static Discovery The initiator does not have to perform any discovery. The initiator has a list of targets it can contact and uses their IP addresses and target names to communicate with them. Set Up Dynamic Discovery With Dynamic Discovery, each time the initiator contacts a specified iSCSI server, it sends the SendTargets request to the server. The server responds by supplying a list of available targets to the initiator. When you set up Dynamic Discovery, you can only add a new iSCSI server. You cannot change the IP address, DNS name, or port number of an existing iSCSI server. To make changes, delete the existing server and add a new one. VMware, Inc. 97
  • 98. ESX Configuration Guide Procedure 1 Log in to the vSphere Client and select a server from the inventory panel. 2 Click the Configuration tab and click Storage Adapters in the Hardware panel. The list of available storage adapters appears. 3 Select the iSCSI initiator to configure and click Properties. 4 In the iSCSI Initiator Properties dialog box, click the Dynamic Discovery tab. 5 To add an address for the SendTargets discovery, click Add. The Add SendTargets Server dialog box appears. 6 Enter the IP address or DNS name of the storage system and click OK. After your host establishes the SendTargets session with this system, any newly discovered targets appear in the Static Discovery list. 7 To delete a specific SendTargets server, select it and click Remove. After you remove a SendTargets server, it might still appear in the Inheritance field as the parent of static targets. This entry indicates where the static targets were discovered and does not affect the functionality. What to do next After configuring Dynamic Discovery for your iSCSI adapter, rescan the adapter. Set Up Static Discovery With iSCSI initiators, in addition to the dynamic discovery method, you can use static discovery and manually enter information for the targets. When you set up Static Discovery, you can only add iSCSI targets. You cannot change the IP address, DNS name, iSCSI target name, or port number of an existing target. To make changes, remove the existing target and add a new one. Procedure 1 Log in to the vSphere Client and select a server from the inventory panel. 2 Click the Configuration tab and click Storage Adapters in the Hardware panel. The list of available storage adapters appears. 3 Select the iSCSI initiator to configure and click Properties. 4 In the iSCSI Initiator Properties dialog box, click the Static Discovery tab. The tab displays all dynamically discovered targets and any static targets already entered. 5 To add a target, click Add and enter the target’s information. 6 To delete a specific target, select the target and click Remove. What to do next After configuring Static Discovery for your iSCSI adapter, rescan the adapter. 98 VMware, Inc.
  • 99. Chapter 8 Configuring ESX Storage Configuring CHAP Parameters for iSCSI Adapters Because the IP networks that the iSCSI technology uses to connect to remote targets do not protect the data they transport, you must ensure security of the connection. One of the protocols that iSCSI implements is the Challenge Handshake Authentication Protocol (CHAP), which verifies the legitimacy of initiators that access targets on the network. CHAP uses a three-way handshake algorithm to verify the identity of your host and, if applicable, of the iSCSI target when the host and target establish a connection. The verification is based on a predefined private value, or CHAP secret, that the initiator and target share. ESX supports CHAP authentication at the adapter level. In this case, all targets receive the same CHAP name and secret from the iSCSI initiator. For software and dependent hardware iSCSI adapters, ESX also supports per-target CHAP authentication, which allows you to configure different credentials for each target to achieve greater level of security. Choosing CHAP Authentication Method ESX supports one-way CHAP for all types of iSCSI initiators, and mutual CHAP for software and dependent hardware iSCSI. Before configuring CHAP, check whether CHAP is enabled at the iSCSI storage system and check the CHAP authentication method the system supports. If CHAP is enabled, enable it for your initiators, making sure that the CHAP authentication credentials match the credentials on the iSCSI storage. ESX supports the following CHAP authentication methods: One-way CHAP In one-way CHAP authentication, also called unidirectional, the target authenticates the initiator, but the initiator does not authenticate the target. Mutual CHAP In mutual CHAP authentication, also called bidirectional, an additional level of security enables the initiator to authenticate the target. VMware supports this method for software and dependent hardware iSCSI adapters only. For software and dependent hardware iSCSI adapters, you can set one-way CHAP and mutual CHAP for each initiator or at the target level. Hardware iSCSI supports CHAP only at the initiator level. When you set the CHAP parameters, specify a security level for CHAP. NOTE When you specify the CHAP security level, how the storage array responds depends on the array’s CHAP implementation and is vendor specific. For example, when you select Use CHAP unless prohibited by target, some storage arrays use CHAP in response, while others do not. For information on CHAP authentication behavior in different initiator and target configurations, consult the array documentation. Table 8-1. CHAP Security Level CHAP Security Level Description Supported Do not use CHAP The host does not use CHAP authentication. Select this Software iSCSI option to disable authentication if it is currently enabled. Dependent hardware iSCSI Independent hardware iSCSI Do not use CHAP unless The host prefers a non-CHAP connection, but can use a Software iSCSI required by target CHAP connection if required by the target. Dependent hardware iSCSI VMware, Inc. 99
  • 100. ESX Configuration Guide Table 8-1. CHAP Security Level (Continued) CHAP Security Level Description Supported Use CHAP unless prohibited by The host prefers CHAP, but can use non-CHAP Software iSCSI target connections if the target does not support CHAP. Dependent hardware iSCSI Independent hardware iSCSI Use CHAP The host requires successful CHAP authentication. The Software iSCSI connection fails if CHAP negotiation fails. Dependent hardware iSCSI Set Up CHAP Credentials for an iSCSI Initiator You can set up all targets to receive the same CHAP name and secret from the iSCSI initiator at the initiator level. By default, all discovery addresses or static targets inherit CHAP parameters that you set up at the initiator level. Prerequisites Before setting up CHAP parameters for software or dependent hardware iSCSI, determine whether to configure one-way or mutual CHAP. Independent hardware iSCSI adapters do not support mutual CHAP. n In one-way CHAP, the target authenticates the initiator. n In mutual CHAP, both the target and initiator authenticate each other. Make sure to use different secrets for CHAP and mutual CHAP. When configuring CHAP parameters, make sure that they match the parameters on the storage side. The CHAP name should not exceed 511 and the CHAP secret 255 alphanumeric characters. Some adapters, for example the QLogic adapter, might have lower limits, 255 for the CHAP name and 100 for the CHAP secret. Procedure 1 Access the iSCSI Initiator Properties dialog box. 2 On the General tab, click CHAP. 3 To configure one-way CHAP, under CHAP specify the following: a Select the CHAP security level. n Do not use CHAP unless required by target (software and dependent hardware iSCSI only) n Use CHAP unless prohibited by target n Use CHAP (software and dependent hardware iSCSI only). To be able to configure mutual CHAP, you must select this option. b Specify the CHAP name. Make sure that the name you specify matches the name configured on the storage side. n To set the CHAP name to the iSCSI initiator name, select Use initiator name. n To set the CHAP name to anything other than the iSCSI initiator name, deselect Use initiator name and enter a name in the Name field. c Enter a one-way CHAP secret to be used as part of authentication. Make sure to use the same secret that you enter on the storage side. 100 VMware, Inc.
  • 101. Chapter 8 Configuring ESX Storage 4 To configure mutual CHAP, first configure one-way CHAP by following directions in Step 3. Make sure to select Use CHAP as an option for one-way CHAP. Then, specify the following under Mutual CHAP: a Select Use CHAP. b Specify the mutual CHAP name. c Enter the mutual CHAP secret. Make sure to use different secrets for the one-way CHAP and mutual CHAP. 5 Click OK. 6 Rescan the initiator. If you change the CHAP or mutual CHAP parameters, they are used for new iSCSI sessions. For existing sessions, new settings are not used until you log out and login again. Set Up CHAP Credentials for a Target For software dependent hardware iSCSI adapters, you can configure different CHAP credentials for each discovery address or static target. When configuring CHAP parameters, make sure that they match the parameters on the storage side. The CHAP name should not exceed 511 and the CHAP secret 255 alphanumeric characters. Prerequisites Before setting up CHAP parameters for software and dependent hardware iSCSI, determine whether to configure one-way or mutual CHAP. n In one-way CHAP, the target authenticates the initiator. n In mutual CHAP, both the target and initiator authenticate each other. Make sure to use different secrets for CHAP and mutual CHAP. Procedure 1 Access the iSCSI Initiator Properties dialog box. 2 Select either Dynamic Discovery tab or Static Discovery tab. 3 From the list of available targets, select a target you want to configure and click Settings > CHAP. 4 Configure one-way CHAP in the CHAP area. a Deselect Inherit from parent. b Select one of the following options: n Do not use CHAP unless required by target n Use CHAP unless prohibited by target n Use CHAP. To be able to configure mutual CHAP, you must select this option. c Specify the CHAP name. Make sure that the name you specify matches the name configured on the storage side. n To set the CHAP name to the iSCSI initiator name, select Use initiator name. n To set the CHAP name to anything other than the iSCSI initiator name, deselect Use initiator name and enter a name in the Name field. d Enter a one-way CHAP secret to be used as part of authentication. Make sure to use the same secret that you enter on the storage side. VMware, Inc. 101
  • 102. ESX Configuration Guide 5 To configure mutual CHAP, first configure one-way CHAP by following directions in Step 4. Make sure to select Use CHAP as an option for one-way CHAP. Then, specify the following in the Mutual CHAP area: a Deselect Inherit from parent. b Select Use CHAP. c Specify the mutual CHAP name. d Enter the mutual CHAP secret. Make sure to use different secrets for the one-way CHAP and mutual CHAP. 6 Click OK. 7 Rescan the initiator. If you change the CHAP or mutual CHAP parameters, they are used for new iSCSI sessions. For existing sessions, new settings are not used until you log out and login again. Disable CHAP You can disable CHAP if your storage system does not require it. If you disable CHAP on a system that requires CHAP authentication, existing iSCSI sessions remain active until you reboot your ESX host or the storage system forces a logout. After the session ends, you can no longer connect to targets that require CHAP. Procedure 1 Open the CHAP Credentials dialog box. 2 For software and dependent hardware iSCSI adapters, to disable just the mutual CHAP and leave the one- way CHAP, select Do not use CHAP in the Mutual CHAP area. 3 To disable one-way CHAP, select Do not use CHAP in the CHAP area. The mutual CHAP, if set up, automatically turns to Do not use CHAP when you disable the one-way CHAP. 4 Click OK. Configuring Additional Parameters for iSCSI You might need to configure additional parameters for your iSCSI initiators. For example, some iSCSI storage systems require ARP (Address Resolution Protocol) redirection to move iSCSI traffic dynamically from one port to another. In this case, you must activate ARP redirection on your host. Table 8-2 lists advanced iSCSI parameters that you can configure using the vSphere Client. In addition, you can use the vicfg-iscsi vSphere CLI command to configure some of the advanced parameters. For information, see the vSphere Command-Line Interface Installation and Scripting Guide and vSphere Command-Line Interface Reference. Do not make any changes to the advanced iSCSI settings unless you are working with the VMware support team or otherwise have thorough information about the values to provide for the settings. 102 VMware, Inc.
  • 103. Chapter 8 Configuring ESX Storage Table 8-2. Additional Parameters for iSCSI Initiators Advanced Parameter Description Configurable On Header Digest Increases data integrity. When header digest is enabled, the system Software iSCSI performs a checksum over each iSCSI Protocol Data Unit’s (PDU’s) Dependent Hardware header part and verifies using the CRC32C algorithm. iSCSI Data Digest Increases data integrity. When data digest is enabled, the system Software iSCSI performs a checksum over each PDU's data part and verifies using Dependent Hardware the CRC32C algorithm. iSCSI NOTE Systems that use Intel Nehalem processors offload the iSCSI digest calculations for software iSCSI, thus reducing the impact on performance. Maximum Defines the R2T (Ready to Transfer) PDUs that can be in transition Software iSCSI Outstanding R2T before an acknowledge PDU is received. Dependent Hardware iSCSI First Burst Length Specifies the maximum amount of unsolicited data an iSCSI initiator Software iSCSI can send to the target during the execution of a single SCSI command, Dependent Hardware in bytes. iSCSI Maximum Burst Maximum SCSI data payload in a Data-In or a solicited Data-Out Software iSCSI Length iSCSI sequence, in bytes. Dependent Hardware iSCSI Maximum Receive Maximum data segment length, in bytes, that can be received in an Software iSCSI Data Segment Length iSCSI PDU. Independent Hardware iSCSI Session Recovery Specifies the amount of time, in seconds, that can lapse while a session Software iSCSI Timeout recovery is performed. If the timeout exceeds its limit, the iSCSI Dependent Hardware initiator terminates the session. iSCSI No-Op Interval Specifies the time interval, in seconds, between NOP-Out requests Software iSCSI sent from your iSCSI initiator to an iSCSI target. The NOP-Out Dependent Hardware requests serve as the ping mechanism to verify that a connection iSCSI between the iSCSI initiator and the iSCSI target is active. No-Op Timeout Specifies the amount of time, in seconds, that can lapse before your Software iSCSI host receives a NOP-In message. The message is sent by the iSCSI Dependent Hardware target in response to the NOP-Out request. When the no-op timeout iSCSI limit is exceeded, the initiator terminates the current session and starts a new one. ARP Redirect Allows storage systems to move iSCSI traffic dynamically from one Software and port to another. ARP is required by storage systems that do array- Independent Hardware based failover. iSCSI (Configurable through vSphere CLI) Delayed ACK Allows systems to delay acknowledgment of received data packets. Software iSCSI Dependent Hardware iSCSI Configure Advanced Parameters for iSCSI The advanced iSCSI settings control such parameters as header and data digest, ARP redirection, delayed ACK, and so on. Generally, you do not need to change these settings because your ESX host works with the assigned predefined values. CAUTION Do not make any changes to the advanced iSCSI settings unless you are working with the VMware support team or otherwise have thorough information about the values to provide for the settings. VMware, Inc. 103
  • 104. ESX Configuration Guide Procedure 1 Access the iSCSI Initiator Properties dialog box. 2 To configure advanced parameters at the initiator level, on the General tab, click Advanced. Proceed to Step 4. 3 Configure advanced parameters at the target level. At the target level, advanced parameters can be configured only for software and dependent hardware iSCSI adapters. a Select either the Dynamic Discovery tab or Static Discovery tab. b From the list of available targets, select a target to configure and click Settings > Advanced. 4 Enter any required values for the advanced parameters you want to modify and click OK to save your changes. Datastore Refresh and Storage Rescan Operations The datastore refresh operation updates the datastore lists and storage information, such as the datastore capacity, displayed in the vSphere Client. When you perform datastore management tasks or make changes in the SAN configuration, you might need to rescan your storage. When you perform VMFS datastore management operations, such as creating a VMFS datastore or RDM, adding an extent, and increasing or deleting a VMFS datastore, your host or the vCenter Server automatically rescans and updates your storage. You can disable the automatic rescan feature by turning off the Host Rescan Filter. See “Turn off vCenter Server Storage Filters,” on page 127. In certain cases, you need to perform a manual rescan. You can rescan all storage available to your host, or, if you are using the vCenter Server, to all hosts in a folder, cluster, and datacenter. If the changes you make are isolated to storage connected through a specific adapter, perform a rescan for this adapter. Perform the manual rescan each time you make one of the following changes. n Create new LUNs on a SAN. n Change the path masking on a host. n Reconnect a cable. n Change CHAP settings. n Add a single host to the vCenter Server after you have edited or removed from the vCenter Server a datastore shared by the vCenter Server hosts and the single host. IMPORTANT If you rescan when a path is unavailable, the host removes the path from the list of paths to the device. The path reappears on the list as soon as it becomes available and starts working again. Perform Storage Rescan When you make changes in your SAN configuration, you might need to rescan your storage. You can rescan all storage available to your host. If the changes you make are isolated to storage accessed through a specific adapter, perform rescan for only this adapter. Use this procedure if you want to limit the rescan to storage available to a particular host or accessed through a particular adapter on the host. If you want to rescan storage available to all hosts managed by your vCenter Server system, you can do so by right-clicking a datacenter, cluster, or folder that contains the hosts and selecting Rescan for Datastores. 104 VMware, Inc.
  • 105. Chapter 8 Configuring ESX Storage Procedure 1 In the vSphere Client, select a host and click the Configuration tab. 2 In the Hardware panel, select Storage Adapters, and click Rescan above the Storage Adapters panel. You can also right-click an individual adapter and click Rescan to rescan just that adapter. 3 To discover new disks or LUNs, select Scan for New Storage Devices. If new LUNs are discovered, they appear in the device list. 4 To discover new datastores or update a datastore after its configuration has been changed, select Scan for New VMFS Volumes. If new datastores or VMFS volumes are discovered, they appear in the datastore list. Create VMFS Datastores VMFS datastores serve as repositories for virtual machines. You can set up VMFS datastores on any SCSI-based storage devices that the host discovers. Prerequisites Before creating datastores, you must install and configure any adapters that your storage requires. Rescan the adapters to discover newly added storage devices. Procedure 1 Log in to the vSphere Client and select the host from the Inventory panel. 2 Click the Configuration tab and click Storage in the Hardware panel. 3 Click Datastores and click Add Storage. 4 Select the Disk/LUN storage type and click Next. 5 Select a device to use for your datastore and click Next. NOTE Select the device that does not have a datastore name displayed in the VMFS Label column. If a name is present, the device contains a copy of an existing VMFS datastore. If the disk you are formatting is blank, the Current Disk Layout page automatically presents the entire disk space for storage configuration. 6 If the disk is not blank, review the current disk layout in the top panel of the Current Disk Layout page and select a configuration option from the bottom panel. Option Description Use all available partitions Dedicates the entire disk or LUN to a single VMFS datastore. If you select this option, all file systems and data currently stored on this device is destroyed. Use free space Deploys a VMFS datastore in the remaining free space of the disk. 7 Click Next. 8 In the Properties page, enter a datastore name and click Next. 9 If needed, adjust the file system and capacity values. By default, the entire free space on the storage device is available. 10 Click Next. 11 In the Ready to Complete page, review the datastore configuration information and click Finish. VMware, Inc. 105
  • 106. ESX Configuration Guide A datastore on the SCSI-based storage device is created. If you use the vCenter Server system to manage your hosts, the newly created datastore is automatically added to all hosts. Network Attached Storage ESX supports using NAS through the NFS protocol. The NFS protocol enables communication between an NFS client and an NFS server. The NFS client built into ESX lets you access the NFS server and use NFS volumes for storage. ESX supports only NFS Version 3 over TCP. You use the vSphere Client to configure NFS volumes as datastores. Configured NFS datastores appear in the vSphere Client, and you can use them to store virtual disk files in the same way that you use VMFS-based datastores. NOTE ESX does not support the delegate user functionality that enables access to NFS volumes using non- root credentials. Figure 8-4 depicts a virtual machine using the NFS volume to store its files. In this configuration, the host connects to the NFS server, which stores the virtual disk files, through a regular network adapter. Figure 8-4. NFS Storage Host virtual machine ethernet NIC LAN NFS NAS appliance The virtual disks that you create on NFS-based datastores use a disk format dictated by the NFS server, typically a thin format that requires on-demand space allocation. If the virtual machine runs out of space while writing to this disk, the vSphere Client notifies you that more space is needed. You have the following options: n Free up additional space on the volume so that the virtual machine continues writing to the disk. n Terminate the virtual machine session. Terminating the session shuts down the virtual machine. CAUTION When your host accesses a virtual machine disk file on an NFS-based datastore, a .lck-XXX lock file is generated in the same directory where the disk file resides to prevent other hosts from accessing this virtual disk file. Do not remove the .lck-XXX lock file, because without it, the running virtual machine cannot access its virtual disk file. 106 VMware, Inc.
  • 107. Chapter 8 Configuring ESX Storage NFS Datastores as Repositories for Commonly Used Files In addition to storing virtual disks on NFS datastores, you can also use NFS as a central repository for ISO images, virtual machine templates, and so on. To use NFS as a shared repository, you create a directory on the NFS server and then mount it as a datastore on all hosts. If you use the datastore for ISO images, you can connect the virtual machine's CD-ROM device to an ISO file on the datastore and install a guest operating system from the ISO file. NOTE If the underlying NFS volume, on which the files are stored, is read-only, make sure that the volume is exported as a read-only share by the NFS server, or configure it as a read-only datastore on the ESX host. Otherwise, the host considers the datastore to be read-write and might not be able to open the files. Create an NFS-Based Datastore You can use the Add Storage wizard to mount an NFS volume and use it as if it were a VMFS datastore. Prerequisites Because NFS requires network connectivity to access data stored on remote servers, before configuring NFS, you must first configure VMkernel networking. Procedure 1 Log in to the vSphere Client and select the host from the Inventory panel. 2 Click the Configuration tab and click Storage in the Hardware panel. 3 Click Datastores and click Add Storage. 4 Select Network File System as the storage type and click Next. 5 Enter the server name, the mount point folder name, and the datastore name. NOTE When you mount the same NFS volume on different hosts, make sure that the server and folder names are identical across the hosts. If the names do not match exactly, for example, if you enter share as the folder name on one host and /share on the other, the hosts see the same NFS volume as two different datastores. This might result in a failure of such features as vMotion. 6 (Optional) Select Mount NFS read only if the volume is exported as read only by the NFS server. 7 Click Next. 8 In the Network File System Summary page, review the configuration options and click Finish. Creating a Diagnostic Partition To run successfully, your host must have a diagnostic partition or a dump partition to store core dumps for debugging and technical support. You can create the diagnostic partition on a local disk or on a private or shared SAN LUN. A diagnostic partition cannot be located on an iSCSI LUN accessed through a software iSCSI initiator. Each host must have a diagnostic partition of 100MB. If multiple hosts share a SAN, configure a diagnostic partition with 100MB for each host. CAUTION If two hosts that share a diagnostic partition fail and save core dumps to the same slot, the core dumps might be lost. To collect core dump data, reboot a host and extract log files immediately after the host fails. However, if another host fails before you collect the diagnostic data of the first host, the second host will fail to save the core dump. VMware, Inc. 107
  • 108. ESX Configuration Guide With the ESX host, you typically create a diagnostic partition when installing ESX by selecting Recommended Partitioning. The installer automatically creates a diagnostic partition for your host. If you select Advanced Partitioning and choose not to specify the diagnostic partition during installation, you can configure it using the Add Storage wizard. Create a Diagnostic Partition You can create a diagnostic partition for your host. Procedure 1 Log in to the vSphere Client and select the host from the Inventory panel. 2 Click the Configuration tab and click Storage in the Hardware panel. 3 Click Datastores and click Add Storage. 4 Select Diagnostic and click Next. If you do not see Diagnostic as an option, the host already has a diagnostic partition. You can query and scan the host’s diagnostic partition using the vicfg-dumppart -l command on the vSphere CLI. 5 Specify the type of diagnostic partition. Option Description Private Local Creates the diagnostic partition on a local disk. This partition stores fault information only for your host. Private SAN Storage Creates the diagnostic partition on a non-shared SAN LUN. This partition stores fault information only for your host. Shared SAN Storage Creates the diagnostic partition on a shared SAN LUN. This partition is accessed by multiple hosts and can store fault information for more than one host. 6 Click Next. 7 Select the device to use for the diagnostic partition and click Next. 8 Review the partition configuration information and click Finish. 108 VMware, Inc.
  • 109. Managing Storage 9 After you create datastores, you can change their properties, use folders to group datastores based on your business needs, or delete unused datastores. You might also need to set up multipathing for your storage or resignature datastore copies. This chapter includes the following topics: n “Managing Datastores,” on page 109 n “Changing VMFS Datastore Properties,” on page 111 n “Managing Duplicate VMFS Datastores,” on page 113 n “Using Multipathing with ESX,” on page 115 n “Storage Hardware Acceleration,” on page 123 n “Thin Provisioning,” on page 124 n “Turn off vCenter Server Storage Filters,” on page 127 Managing Datastores An ESX system uses datastores to store all files associated with its virtual machines. After you create datastores, you can manage them by performing a number of tasks. A datastore is a logical storage unit that can use disk space on one physical device, one disk partition, or span several physical devices. The datastore can exist on different types of physical devices, including SCSI, iSCSI, Fibre Channel SAN, or NFS. Datastores are added to the vSphere Client in one of the following ways: n Discovered when a host is added to the inventory. The vSphere Client displays any datastores that the host can recognize. n Created on an available storage device using the Add Storage command. After the datastores are created, you can use them to store virtual machine files. You can manage them by renaming, removing, and setting access control permissions. In addition, you can group datastores to organize them and set the same permissions across the group at one time. For information on setting access control permissions on a datastore, see the vSphere Client Help. VMware, Inc. 109
  • 110. ESX Configuration Guide Rename Datastores You can change the name of an existing datastore. Procedure 1 Display the datastores. 2 Right-click the datastore to rename and select Rename. 3 Type a new datastore name. If you use the vCenter Server system to manage your hosts, the new name appears on all hosts that have access to the datastore. Group Datastores If you use the vCenter Server system to manage your hosts, group datastores into folders. This allows you to organize your datastores according to business practices and to assign the same permissions and alarms on the datastores in the group at one time. Procedure 1 Log in to the vSphere Client. 2 If necessary, create the datastores. For details, see the vSphere Client Help. 3 In the Inventory panel, choose Datastores. 4 Select the datacenter containing the datastores to group. 5 In the shortcut menu, click the New Folder icon. 6 Give the folder a descriptive name. 7 Click and drag each datastore onto the folder. Delete Datastores You can delete any type of VMFS datastore, including copies that you have mounted without resignaturing. When you delete a datastore, it is destroyed and disappears from all hosts that have access to the datastore. Prerequisites Before deleting a datastore, remove all virtual machines from the datastore. Make sure that no other host is accessing the datastore. Procedure 1 Display the datastores. 2 Right-click the datastore to delete and click Delete. 3 Confirm that you want to delete the datastore. 110 VMware, Inc.
  • 111. Chapter 9 Managing Storage Unmount Datastores When you unmount a datastore, it remains intact, but can no longer be seen from the hosts that you specify. It continues to appear on other hosts, where it remains mounted. You can unmount only the following types of datastores: n NFS datastores n VMFS datastore copies mounted without resignaturing You cannot unmount an active mounted datastore. Procedure 1 Display the datastores. 2 Right-click the datastore to unmount and select Unmount. 3 If the datastore is shared, specify which hosts should no longer access the datastore. a If needed, deselect the hosts where you want to keep the datastore mounted. By default, all hosts are selected. b Click Next. c Review the list of hosts from which to unmount the datastore, and click Finish. 4 Confirm that you want to unmount the datastore. Changing VMFS Datastore Properties After you create a VMFS-based datastore, you can modify it. For example, you can increase it if you need more space. If you have VMFS-2 datastores, you can upgrade them to VMFS-3 format. Datastores that use the VMFS format are deployed on SCSI-based storage devices. You cannot reformat a VMFS datastore that a remote host is using. If you attempt to, a warning appears that specifies the name of the datastore in use and the host that is using it. This warning also appears in the VMkernel and vmkwarning log files. Depending on whether your vSphere Client is connected to a vCenter Server system or directly to a host, different ways to access the Datastore Properties dialog box exist. n vCenter Server only. To access the Datastore Properties dialog box, select the datastore form the inventory, click the Configuration tab, and click Properties. n vCenter Server and ESX host. To access the Datastore Properties dialog box, select a host from the inventory, click the Configuration tab and click Storage. From the Datastores view, select the datastore to modify and click Properties. VMware, Inc. 111
  • 112. ESX Configuration Guide Increase VMFS Datastores When you need to create new virtual machines on a datastore, or when the virtual machines running on this datastore require more space, you can dynamically increase the capacity of a VMFS datastore. Use one of the following methods: n Add a new extent. An extent is a partition on a storage device, or LUN. You can add up to 32 new extents of the same storage type to an existing VMFS datastore. The spanned VMFS datastore can use any of all its extents at any time. It does not need to fill up a particular extent before using the next one. n Grow an extent in an existing VMFS datastore, so that it fills the available adjacent capacity. Only extents with free space immediately after them are expandable. NOTE If a shared datastore has powered on virtual machines and becomes 100% full, you can increase the datastore's capacity only from the host, with which the powered on virtual machines are registered. Procedure 1 Log in to the vSphere Client and select a host from the Inventory panel. 2 Click the Configuration tab and click Storage. 3 From the Datastores view, select the datastore to increase and click Properties. 4 Click Increase. 5 Select a device from the list of storage devices and click Next. n If you want to add a new extent, select the device for which the Expandable column reads No. n If you want to expand an existing extent, select the device for which the Expandable column reads Yes. 6 Select a configuration option from the bottom panel. Depending on the current layout of the disk and on your previous selections, the options you see might vary. Option Description Use free space to add new extent Adds the free space on this disk as a new datastore extent. Use free space to expand existing Grows an existing extent to a required capacity. extent Use free space Deploys an extent in the remaining free space of the disk. This option is available only when adding an extent. Use all available partitions Dedicates the entire disk to a single datastore extent. This option is available only when adding an extent and when the disk you are formatting is not blank. The disk is reformatted, and the datastores and any data that it contains are erased. 7 Set the capacity for the extent. By default, the entire free space on the storage device is available. 8 Click Next. 9 Review the proposed layout and the new configuration of your datastore, and click Finish. What to do next After you grow an extent in a shared VMFS datastore, refresh the datastore on each host that can access this datastore, so that the vSphere Client can display the correct datastore capacity for all hosts. 112 VMware, Inc.
  • 113. Chapter 9 Managing Storage Upgrade Datastores ESX includes VMFS version 3 (VMFS-3). If your datastore was formatted with VMFS-2, you can read files stored on VMFS-2, but you cannot write to them. To have complete access to the files, upgrade VMFS-2 to VMFS-3. When you upgrade VMFS-2 to VMFS-3, the ESX file-locking mechanism ensures that no remote host or local process is accessing the VMFS datastore being converted. Your host preserves all files on the datastore. As a precaution, before you use the upgrade option, consider the following: n Commit or discard any changes to virtual disks in the VMFS-2 volume that you plan to upgrade. n Back up the VMFS-2 volume. n Be sure that no powered on virtual machines are using the VMFS-2 volume. n Be sure that no other ESX host is accessing the VMFS-2 volume. The VMFS-2 to VMFS-3 conversion is a one-way process. After you convert the VMFS-based datastore to VMFS-3, you cannot revert it back to VMFS-2. To upgrade the VMFS-2 file system, its file block size must not exceed 8MB. Procedure 1 Log in to the vSphere Client and select a host from the Inventory panel. 2 Click the Configuration tab and click Storage. 3 Select the datastore that uses the VMFS-2 format. 4 Click Upgrade to VMFS-3. 5 Perform a rescan on all hosts that see the datastore. Managing Duplicate VMFS Datastores When a LUN contains a VMFS datastore copy, you can mount the datastore with the existing signature or assign a new signature. Each VMFS datastore created in a LUN has a unique UUID that is stored in the file system superblock. When the LUN is replicated or snapshotted, the resulting LUN copy is identical, byte-for-byte, with the original LUN. As a result, if the original LUN contains a VMFS datastore with UUID X, the LUN copy appears to contain an identical VMFS datastore, or a VMFS datastore copy, with exactly the same UUID X. ESX can determine whether a LUN contains the VMFS datastore copy, and either mount the datastore copy with its original UUID or change the UUID, thus resignaturing the datastore. Mounting VMFS Datastores with Existing Signatures You might not have to resignature a VMFS datastore copy. You can mount a VMFS datastore copy without changing its signature. For example, you can maintain synchronized copies of virtual machines at a secondary site as part of a disaster recovery plan. In the event of a disaster at the primary site, you can mount the datastore copy and power on the virtual machines at the secondary site. IMPORTANT You can mount a VMFS datastore copy only if it does not collide with the original VMFS datastore that has the same UUID. To mount the copy, the original VMFS datastore has to be offline. VMware, Inc. 113
  • 114. ESX Configuration Guide When you mount the VMFS datastore, ESX allows both reads and writes to the datastore residing on the LUN copy. The LUN copy must be writable. The datastore mounts are persistent and valid across system reboots. Because ESX does not allow you to resignature the mounted datastore, unmount the datastore before resignaturing. Mount a VMFS Datastore with an Existing Signature If you do not need to resignature a VMFS datastore copy, you can mount it without changing its signature. Prerequisites Before you mount a VMFS datastore, perform a storage rescan on your host so that it updates its view of LUNs presented to it. Procedure 1 Log in to the vSphere Client and select the server from the inventory panel. 2 Click the Configuration tab and click Storage in the Hardware panel. 3 Click Add Storage. 4 Select the Disk/LUN storage type and click Next. 5 From the list of LUNs, select the LUN that has a datastore name displayed in the VMFS Label column and click Next. The name present in the VMFS Label column indicates that the LUN is a copy that contains a copy of an existing VMFS datastore. 6 Under Mount Options, select Keep Existing Signature. 7 In the Ready to Complete page, review the datastore configuration information and click Finish. What to do next If you later want to resignature the mounted datastore, you must unmount it first. Resignaturing VMFS Copies Use datastore resignaturing to retain the data stored on the VMFS datastore copy. When resignaturing a VMFS copy, ESX assigns a new UUID and a new label to the copy, and mounts the copy as a datastore distinct from the original. The default format of the new label assigned to the datastore is snap-snapID-oldLabel, where snapID is an integer and oldLabel is the label of the original datastore. When you perform datastore resignaturing, consider the following points: n Datastore resignaturing is irreversible. n The LUN copy that contains the VMFS datastore that you resignature is no longer treated as a LUN copy. n A spanned datastore can be resignatured only if all its extents are online. n The resignaturing process is crash and fault tolerant. If the process is interrupted, you can resume it later. n You can mount the new VMFS datastore without a risk of its UUID colliding with UUIDs of any other datastore, such as an ancestor or child in a hierarchy of LUN snapshots. 114 VMware, Inc.
  • 115. Chapter 9 Managing Storage Resignature a VMFS Datastore Copy Use datastore resignaturing if you want to retain the data stored on the VMFS datastore copy. Prerequisites To resignature a mounted datastore copy, first unmount it. Before you resignature a VMFS datastore, perform a storage rescan on your host so that the host updates its view of LUNs presented to it and discovers any LUN copies. Procedure 1 Log in to the vSphere Client and select the server from the inventory panel. 2 Click the Configuration tab and click Storage in the Hardware panel. 3 Click Add Storage. 4 Select the Disk/LUN storage type and click Next. 5 From the list of LUNs, select the LUN that has a datastore name displayed in the VMFS Label column and click Next. The name present in the VMFS Label column indicates that the LUN is a copy that contains a copy of an existing VMFS datastore. 6 Under Mount Options, select Assign a New Signature and click Next. 7 In the Ready to Complete page, review the datastore configuration information and click Finish. What to do next After resignaturing, you might have to do the following: n If the resignatured datastore contains virtual machines, update references to the original VMFS datastore in the virtual machine files, including .vmx, .vmdk, .vmsd, and .vmsn. n To power on virtual machines, register them with vCenter Server. Using Multipathing with ESX To maintain a constant connection between an ESX host and its storage, ESX supports multipathing. Multipathing is a technique that lets you use more than one physical path for transferring data between the ESX host and the external storage device. In case of a failure of an element in the SAN network, such as an HBA, switch, or cable, ESX can use alternate physical paths to access a storage device. This process is known as path failover. In addition to path failover, multipathing offers load balancing, which redistributes I/O loads between multiple paths, thus reducing or removing potential bottlenecks. Managing Multiple Paths To manage storage multipathing, ESX uses a special VMkernel layer, the Pluggable Storage Architecture (PSA). The PSA is an open, modular framework that coordinates the simultaneous operation of multiple multipathing plug-ins (MPPs). The VMkernel multipathing plug-in that ESX provides by default is the VMware Native Multipathing Plug- In (NMP). The NMP is an extensible module that manages sub plug-ins. There are two types of NMP sub plug- ins, Storage Array Type Plug-Ins (SATPs), and Path Selection Plug-Ins (PSPs). SATPs and PSPs can be built-in and provided by VMware, or can be provided by a third party. VMware, Inc. 115
  • 116. ESX Configuration Guide If more multipathing functionality is required, a third party can also provide an MPP to run in addition to, or as a replacement for, the default NMP. When coordinating the VMware NMP and any installed third-party MPPs, the PSA performs the following tasks: n Loads and unloads multipathing plug-ins. n Hides virtual machine specifics from a particular plug-in. n Routes I/O requests for a specific logical device to the MPP managing that device. n Handles I/O queuing to the logical devices. n Implements logical device bandwidth sharing between virtual machines. n Handles I/O queueing to the physical storage HBAs. n Handles physical path discovery and removal. n Provides logical device and physical path I/O statistics. As Figure 9-1 illustrates, multiple third-party MPPs can run in parallel with the VMware NMP. When installed, the third-party MPPs replace the behavior of the NMP and take complete control of the path failover and the load-balancing operations for specified storage devices. Figure 9-1. Pluggable Storage Architecture VMkernel pluggable storage architecture third-party third-party VMware NMP MPP MPP VMware SATP VMware PSP VMware SATP VMware PSP VMware SATP third-party SATP third-party PSP The multipathing modules perform the following operations: n Manage physical path claiming and unclaiming. n Manage creation, registration, and deregistration of logical devices. n Associate physical paths with logical devices. n Support path failure detection and remediation. n Process I/O requests to logical devices: n Select an optimal physical path for the request. n Depending on a storage device, perform specific actions necessary to handle path failures and I/O command retries. n Support management tasks, such as abort or reset of logical devices. 116 VMware, Inc.
  • 117. Chapter 9 Managing Storage VMware Multipathing Module By default, ESX provides an extensible multipathing module called the Native Multipathing Plug-In (NMP). Generally, the VMware NMP supports all storage arrays listed on the VMware storage HCL and provides a default path selection algorithm based on the array type. The NMP associates a set of physical paths with a specific storage device, or LUN. The specific details of handling path failover for a given storage array are delegated to a Storage Array Type Plug-In (SATP). The specific details for determining which physical path is used to issue an I/O request to a storage device are handled by a Path Selection Plug-In (PSP). SATPs and PSPs are sub plug-ins within the NMP module. Upon installation of ESX, the appropriate SATP for an array you use will be installed automatically. You do not need to obtain or download any SATPs. VMware SATPs Storage Array Type Plug-Ins (SATPs) run in conjunction with the VMware NMP and are responsible for array- specific operations. ESX offers a SATP for every type of array that VMware supports. It also provides default SATPs that support non-specific active-active and ALUA storage arrays, and the local SATP for direct-attached devices. Each SATP accommodates special characteristics of a certain class of storage arrays and can perform the array-specific operations required to detect path state and to activate an inactive path. As a result, the NMP module itself can work with multiple storage arrays without having to be aware of the storage device specifics. After the NMP determines which SATP to use for a specific storage device and associates the SATP with the physical paths for that storage device, the SATP implements the tasks that include the following: n Monitors the health of each physical path. n Reports changes in the state of each physical path. n Performs array-specific actions necessary for storage fail-over. For example, for active-passive devices, it can activate passive paths. VMware PSPs Path Selection Plug-Ins (PSPs) run with the VMware NMP and are responsible for choosing a physical path for I/O requests. The VMware NMP assigns a default PSP for each logical device based on the SATP associated with the physical paths for that device. You can override the default PSP. By default, the VMware NMP supports the following PSPs: Most Recently Used Selects the path the ESX host used most recently to access the given device. If (VMW_PSP_MRU) this path becomes unavailable, the host switches to an alternative path and continues to use the new path while it is available. MRU is the default path policy for active-passive arrays. Fixed Uses the designated preferred path, if it has been configured. Otherwise, it uses (VMW_PSP_FIXED) the first working path discovered at system boot time. If the host cannot use the preferred path, it selects a random alternative available path. The host reverts back to the preferred path as soon as that path becomes available. Fixed is the default path policy for active-active arrays. CAUTION If used with active-passive arrays, the Fixed path policy might cause path thrashing. VMware, Inc. 117
  • 118. ESX Configuration Guide VMW_PSP_FIXED_AP Extends the Fixed functionality to active-passive and ALUA mode arrays. Round Robin Uses a path selection algorithm that rotates through all available active paths (VMW_PSP_RR) enabling load balancing across the paths. VMware NMP Flow of I/O When a virtual machine issues an I/O request to a storage device managed by the NMP, the following process takes place. 1 The NMP calls the PSP assigned to this storage device. 2 The PSP selects an appropriate physical path on which to issue the I/O. 3 The NMP issues the I/O request on the path selected by the PSP. 4 If the I/O operation is successful, the NMP reports its completion. 5 If the I/O operation reports an error, the NMP calls the appropriate SATP. 6 The SATP interprets the I/O command errors and, when appropriate, activates the inactive paths. 7 The PSP is called to select a new path on which to issue the I/O. Multipathing with Local Storage and Fibre Channel SANs In a simple multipathing local storage topology, you can use one ESX host, which has two HBAs. The ESX host connects to a dual-port local storage system through two cables. This configuration ensures fault tolerance if one of the connection elements between the ESX host and the local storage system fails. To support path switching with FC SAN, the ESX host typically has two or more HBAs available from which the storage array can be reached using one or more switches. Alternatively, the setup can include one HBA and two storage processors so that the HBA can use a different path to reach the disk array. In Figure 9-2, multiple paths connect each server with the storage device. For example, if HBA1 or the link between HBA1 and the switch fails, HBA2 takes over and provides the connection between the server and the switch. The process of one HBA taking over for another is called HBA failover. Figure 9-2. Fibre Channel Multipathing Host Host 1 2 HBA2 HBA1 HBA3 HBA4 switch switch SP1 SP2 storage array 118 VMware, Inc.
  • 119. Chapter 9 Managing Storage Similarly, if SP1 or the link between SP1 and the switch breaks, SP2 takes over and provides the connection between the switch and the storage device. This process is called SP failover. ESX supports HBA and SP failover with its multipathing capability. Multipathing with iSCSI SAN With iSCSI storage, you can take advantage of the multipathing support that the IP network offers. In addition, ESX supports host-based multipathing for all types of iSCSI initiators. ESX can use multipathing support built into the IP network, which allows the network to perform routing. Through dynamic discovery, iSCSI initiators obtain a list of target addresses that the initiators can use as multiple paths to iSCSI LUNs for failover purposes. ESX also supports host-based multipathing. Figure 9-3 shows multipathing setups possible with different types of iSCSI initiators. Figure 9-3. Host-Based Multipathing hardware software iSCSI iSCSI host 1 host 2 software adapter HBA2 HBA1 NIC2 NIC1 IP network SP iSCSI storage Multipathing with Hardware iSCSI With the hardware iSCSI, the host typically has two or more hardware iSCSI adapters available, from which the storage system can be reached using one or more switches. Alternatively, the setup might include one adapter and two storage processors so that the adapter can use a different path to reach the storage system. In the Figure 9-3 illustration, Host1 has two hardware iSCSI adapters, HBA1 and HBA2, that provide two physical paths to the storage system. Multipathing plug-ins on your host, whether the VMkernel NMP or any third-party MPPs, have access to the paths by default and can monitor health of each physical path. If, for example, HBA1 or the link between HBA1 and the network fails, the multipathing plug-ins can switch the path over to HBA2. Multipathing with Software iSCSI With the software iSCSI, as shown on Host 2 of Figure 9-3, you can use multiple NICs that provide failover and load balancing capabilities for iSCSI connections between your host and storage systems. VMware, Inc. 119
  • 120. ESX Configuration Guide For this setup, because multipathing plug-ins do not have direct access to physical NICs on your host, you must connect each physical NIC to a separate VMkernel port. You then associate all VMkernel ports with the software iSCSI initiator using a port binding technique. As a result, each VMkernel port connected to a separate NIC becomes a different path that the iSCSI storage stack and its storage-aware multipathing plug-ins can use. For information about how to configure multipathing for the software iSCSI, see “Networking Configuration for Software iSCSI and Dependent Hardware iSCSI,” on page 67. Path Scanning and Claiming When you start your ESX host or rescan your storage adapter, the host discovers all physical paths to storage devices available to the host. Based on a set of claim rules defined in the /etc/vmware/esx.conf file, the host determines which multipathing plug-in (MPP) should claim the paths to a particular device and become responsible for managing the multipathing support for the device. By default, the host performs a periodic path evaluation every 5 minutes causing any unclaimed paths to be claimed by the appropriate MPP. The claim rules are numbered. For each physical path, the host runs through the claim rules starting with the lowest number first. The attributes of the physical path are compared to the path specification in the claim rule. If there is a match, the host assigns the MPP specified in the claim rule to manage the physical path. This continues until all physical paths are claimed by corresponding MPPs, either third-party multipathing plug- ins or the native multipathing plug-in (NMP). For general information on multipathing plug-ins, see “Managing Multiple Paths,” on page 115. For the paths managed by the NMP module, a second set of claim rules is applied. These rules determine which Storage Array Type Plug-In (SATP) should be used to manage the paths for a specific array type, and which Path Selection Plug-In (PSP) is to be used for each storage device. For example, for a storage device that belongs to the EMC CLARiiON CX storage family and is not configured as ALUA device, the default SATP is VMW_SATP_CX and the default PSP is Most Recently Used. Use the vSphere Client to view which SATP and PSP the host is using for a specific storage device and the status of all available paths for this storage device. If needed, you can change the default VMware PSP using the vSphere Client. To change the default SATP, you need to modify claim rules using the vSphere CLI. For detailed descriptions of the commands available to manage PSA, see the vSphere Command-Line Interface Installation and Scripting Guide and the vSphere Command-Line Interface Reference. Viewing the Paths Information Use the vSphere Client to determine which SATP and PSP the ESX host uses for a specific storage device and the status of all available paths for this storage device. You can access the path information from both, the Datastores and Devices views. For datastores, you review the paths that connect to the device the datastore is deployed on. The path information includes the SATP assigned to manage the device, the path selection policy (PSP), and a list of paths with their physical characteristics, such as an adapter and target each path uses, and the status of each path. The following path status information can appear: Active Paths available for issuing I/O to a LUN. A single or multiple working paths currently used for transferring data are marked as Active (I/O). NOTE For hosts that run ESX 3.5 or earlier, the term active means the only path that the host is using to issue I/O to a LUN. Standby The path is operational and can be used for I/O if active paths fail. 120 VMware, Inc.
  • 121. Chapter 9 Managing Storage Disabled The path is disabled and no data can be transferred. Dead The software cannot connect to the disk through this path. If you are using the Fixed path policy, you can see which path is the preferred path. The preferred path is marked with an asterisk (*) in the Preferred column. View Datastore Paths Use the vSphere Client to review the paths that connect to storage devices the datastores are deployed on. Procedure 1 Log in to the vSphere Client and select a server from the inventory panel. 2 Click the Configuration tab and click Storage in the Hardware panel. 3 Click Datastores under View. 4 From the list of configured datastores, select the datastore whose paths you want to view or configure. The Details panel shows the total number of paths being used to access the device and whether any of them are broken or disabled. 5 Click Properties > Manage Paths to open the Manage Paths dialog box. You can use the Manage Paths dialog box to enable or disable your paths, set multipathing policy, and specify the preferred path. View Storage Device Paths Use the vSphere Client to view which SATP and PSP the host uses for a specific storage device and the status of all available paths for this storage device. Procedure 1 Log in to the vSphere Client and select a server from the inventory panel. 2 Click the Configuration tab and click Storage in the Hardware panel. 3 Click Devices under View. 4 Click Manage Paths to open the Manage Paths dialog box. Setting a Path Selection Policy For each storage device, the ESX host sets the path selection policy based on the claim rules defined in the / etc/vmware/esx.conf file. By default, VMware supports the following path selection policies. If you have a third-party PSP installed on your host, its policy also appears on the list. Fixed The host always uses the preferred path to the disk when that path is available. (VMW_PSP_FIXED) If the host cannot access the disk through the preferred path, it tries the alternative paths. The default policy for active-active storage devices is Fixed. Fixed AP Extends the Fixed functionality to active-passive and ALUA mode arrays. (VMW_PSP_FIXED_AP) VMware, Inc. 121
  • 122. ESX Configuration Guide Most Recently Used The host selects the path that it used recently. When the path becomes (VMW_PSP_MRU) unavailable, the host selects an alternative path. The host does not revert back to the original path when that path becomes available again. There is no preferred path setting with the MRU policy. MRU is the default policy for active-passive storage devices. Round Robin The host uses an automatic path selection algorithm rotating through all active (VMW_PSP_RR) paths when connecting to active-passive arrays, or through all available paths when connecting to active-active arrays. This implements load balancing across the physical paths available to your host. Load balancing is the process of spreading I/O requests across the paths. The goal is to optimize performance in terms of throughput, such as I/O per second, megabytes per second, or response times. Table 9-1 summarizes how the behavior of host changes, depending on the type of array and the failover policy. Table 9-1. Path Policy Effects Policy/Controller Active/Active Active/Passive Most Recently Used Administrator action is required to fail back Administrator action is required to fail back after path failure. after path failure. Fixed VMkernel resumes using the preferred path VMkernel attempts to resume using the when connectivity is restored. preferred path. This can cause path thrashing or failure when another SP now owns the LUN. Round Robin No fail back. Next path in round robin scheduling is selected. Fixed AP For ALUA arrays, VMkernel picks the path set to be the preferred path. For both A/A and A/P and ALUA arrays, VMkernel resumes using the preferred path, but only if the path-thrashing avoidance algorithm allows the fail-back. Change the Path Selection Policy Generally, you do not have to change the default multipathing settings your host uses for a specific storage device. However, if you want to make any changes, you can use the Manage Paths dialog box to modify a path selection policy and specify the preferred path for the Fixed policy. Procedure 1 Open the Manage Paths dialog box either from the Datastores or Devices view. 2 Select a path selection policy. By default, VMware supports the following path selection policies. If you have a third-party PSP installed on your host, its policy also appears on the list. n Fixed (VMW_PSP_FIXED) n Fixed AP (VMW_PSP_FIXED_AP) n Most Recently Used (VMW_PSP_MRU) n Round Robin (VMW_PSP_RR) 3 For the fixed policy, specify the preferred path by right-clicking the path you want to assign as the preferred path, and selecting Preferred. 4 Click OK to save your settings and exit the dialog box. 122 VMware, Inc.
  • 123. Chapter 9 Managing Storage Disable Paths You can temporarily disable paths for maintenance or other reasons. You can do so using the vSphere Client. Procedure 1 Open the Manage Paths dialog box either from the Datastores or Devices view. 2 In the Paths panel, right-click the path to disable, and select Disable. 3 Click OK to save your settings and exit the dialog box. You can also disable a path from the adapter’s Paths view by right-clicking the path in the list and selecting Disable. Storage Hardware Acceleration The hardware acceleration functionality enables your host to offload specific virtual machine and storage management operations to compliant storage hardware. With the storage hardware assistance, your host performs these operations faster and consumes less CPU, memory, and storage fabric bandwidth. To implement the hardware acceleration functionality, the Pluggable Storage Architecture (PSA) uses a combination of special array integration plug-ins, called VAAI plug-ins, and an array integration filter, called VAAI filter. The PSA automatically attaches the VAAI filter and vendor-specific VAAI plug-ins to those storage devices that support the hardware acceleration. To view and manage the VAAI filter and VAAI plug-ins available on your host, use the vSphere CLI commands. For descriptions of the commands, see the vSphere Command-Line Interface Installation and Scripting Guide and the vSphere Command-Line Interface Reference. Hardware Acceleration Requirements and Benefits The hardware acceleration functionality works only if you use an appropriate host and storage array combination. Use the following hosts and storage arrays: n ESX version 4.1 or later. n Storage arrays that support storage-based hardware acceleration. ESX version 4.1 does not support hardware acceleration with NAS storage devices. On your host, the hardware acceleration is enabled by default. To enable the hardware acceleration on the storage side, check with your storage vendor. Certain storage arrays require that you explicitly activate the hardware acceleration support on the storage side. When the hardware acceleration functionality is supported, the host can get hardware assistance and perform the following operations faster and more efficiently: n Migration of virtual machines with Storage vMotion n Deployment of virtual machines from templates n Cloning of virtual machines or templates n VMFS clustered locking and metadata operations for virtual machine files n Writes to thin provisioned and thick virtual disks n Creation of fault-tolerant virtual machines VMware, Inc. 123
  • 124. ESX Configuration Guide Hardware Acceleration Support Status For each storage device and datastore, the vSphere Client displays the hardware acceleration support status in the Hardware Acceleration column of the Devices view and the Datastores view. The status values are Unknown, Supported, and Not Supported. The initial value is Unknown. The status changes to Supported after the host successfully performs the offload operation. If the offload operation fails, the status changes to Not Supported. When storage devices do not support or provide only partial support for the host operations, your host reverts to its native methods to perform unsupported operations. Turn off Hardware Acceleration If your storage devices do not support the hardware acceleration functionality, you can turn it off by using the vSphere Client advanced settings. As with any advanced settings, before disabling the hardware acceleration, consult with the VMware support team. Procedure 1 In the vSphere Client inventory panel, select the host. 2 Click the Configuration tab, and click Advanced Settings under Software. 3 Click VMFS3 and change the value in the VMFS3.HardwareAcceleratedLocking field to zero. 4 Click DataMover and change the values in each of the following fields to zero: n DataMover.HardwareAcceleratedMove n DataMover.HardwareAcceleratedInit 5 Click OK to save your changes. Thin Provisioning When you create a virtual machine, a certain amount of storage space on a datastore is provisioned or allocated to the virtual disk files. By default, ESX offers a traditional storage provisioning method during creation in which you estimate how much storage the virtual machine will need for its entire life cycle, provision a fixed amount of storage space to its virtual disk, and have the entire provisioned space committed to the virtual disk. A virtual disk that immediately occupies the entire provisioned space is called a thick disk. Creating virtual disks in thick format can lead to underutilization of datastore capacity, because large amounts of storage space, pre-allocated to individual virtual machines, might remain unused. To help avoid over-allocating storage space and save storage, ESX supports thin provisioning, which lets you, in the beginning, use just as much storage capacity as currently needed and then add the required amount of storage space at a later time. Using the ESX thin provisioning feature, you can create virtual disks in a thin format. For a thin virtual disk, ESX provisions the entire space required for the disk’s current and future activities, but commits only as much storage space as the disk needs for its initial operations. 124 VMware, Inc.
  • 125. Chapter 9 Managing Storage About Virtual Disk Formats When you perform certain virtual machine management operations, such as create a virtual disk, clone a virtual machine to a template, or migrate a virtual machine, you can specify a format for the virtual disk file. The following disk formats are supported. You cannot specify the disk format if the disk resides on an NFS datastore. The NFS server determines the allocation policy for the disk. Thin Provisioned Format Use this format to save storage space. For the thin disk, you provision as much datastore space as the disk would require based on the value you enter for the disk size. However, the thin disk starts small and at first, uses only as much datastore space as the disk actually needs for its initial operations. NOTE If a virtual disk supports clustering solutions such as Fault Tolerance, you cannot make the disk thin. If the thin disk needs more space later, it can grow to its maximum capacity and occupy the entire datastore space provisioned to it. Also, you can manually convert the thin disk into thick. Thick Format This is the default virtual disk format. The thick virtual disk does not change its size and from the very beginning occupies the entire datastore space provisioned to it. It is not possible to convert the thick disk into thin. Create Thin Provisioned Virtual Disks When you need to save storage space, you can create a virtual disk in thin provisioned format. The thin provisioned virtual disk starts small and grows as more disk space is required. This procedure assumes that you are creating a typical or custom virtual machine using the New Virtual Machine wizard. Prerequisites You can create thin disks only on the datastores that support thin provisioning. If a disk resides on an NFS datastore, you cannot specify the disk format because the NFS server determines the allocation policy for the disk. Procedure u In the Create a Disk dialog box, select Allocate and commit space on demand (Thin Provisioning). A virtual disk in thin format is created. If you do not select the Thin Provisioning option, your virtual disk will have the default thick format. What to do next If you created a virtual disk in the thin format, you can later inflate it to its full size. VMware, Inc. 125
  • 126. ESX Configuration Guide View Virtual Machine Storage Resources You can view how datastore storage space is allocated for your virtual machines. Procedure 1 Select the virtual machine in the inventory. 2 Click the Summary tab. 3 Review the space allocation information in the Resources section. n Provisioned Storage – Shows datastore space guaranteed to the virtual machine. The entire space might not be used by the virtual machine if it has disks in thin provisioned format. Other virtual machines can occupy any unused space. n Not-shared Storage – Shows datastore space occupied by the virtual machine and not shared with any other virtual machines. n Used Storage – Shows datastore space actually occupied by virtual machine files, including configuration and log files, snapshots, virtual disks, and so on. When the virtual machine is running, the used storage space also includes swap files. Determine the Disk Format of a Virtual Machine You can determine whether your virtual disk is in thick or thin format. Procedure 1 Select the virtual machine in the inventory. 2 Click Edit Settings to display the Virtual Machine Properties dialog box. 3 Click the Hardware tab and select the appropriate hard disk in the Hardware list. The Disk Provisioning section on the right shows the type of your virtual disk, either Thin or Thick. 4 Click OK. What to do next If your virtual disk is in the thin format, you can inflate it to its full size. Convert a Virtual Disk from Thin to Thick If you created a virtual disk in the thin format, you can convert it to thick. Procedure 1 Select the virtual machine in the inventory. 2 Click the Summary tab and, under Resources, double-click the datastore for the virtual machine to open the Datastore Browser dialog box. 3 Click the virtual machine folder to find the virtual disk file you want to convert. The file has the .vmdk extension. 4 Right-click the virtual disk file and select Inflate. The virtual disk in thick format occupies the entire datastore space originally provisioned to it. 126 VMware, Inc.
  • 127. Chapter 9 Managing Storage Handling Datastore Over-Subscription Because the provisioned space for thin disks can be greater than the committed space, a datastore over- subscription can occur, which results in the total provisioned space for the virtual machine disks on the datastore being greater than the actual capacity. Over-subscription can be possible because usually not all virtual machines with thin disks need the entire provisioned datastore space simultaneously. However, if you want to avoid over-subscribing the datastore, you can set up an alarm that notifies you when the provisioned space reaches a certain threshold. For information on setting alarms, see the vSphere Datacenter Administration Guide. If your virtual machines require more space, the datastore space is allocated on a first come first served basis. When the datastore runs our of space, you can add more physical storage and increase the datastore. See “Increase VMFS Datastores,” on page 112. Turn off vCenter Server Storage Filters When you perform VMFS datastore management operations, vCenter Server uses default storage filters. The filters help you to avoid storage corruption by retrieving only the storage devices, or LUNs, that can be used for a particular operation. Unsuitable LUNs are not displayed for selection. You can turn off the filters to view all LUNs. Before making any changes to the LUN filters, consult with the VMware support team. You can turn off the filters only if you have other methods to prevent LUN corruption. Procedure 1 In the vSphere Client, select Administration > vCenter Server Settings. 2 In the settings list, select Advanced Settings. 3 In the Key text box, type a key. Key Filter Name config.vpxd.filter.vmfsFilter VMFS Filter config.vpxd.filter.rdmFilter RDM Filter config.vpxd.filter.SameHostAndTra Same Host and Transports Filter nsportsFilter config.vpxd.filter.hostRescanFilter Host Rescan Filter NOTE If you turn off the Host Rescan Filter, your hosts continue to perform a rescan each time you present a new LUN to a host or a cluster. 4 In the Value text box, type False for the specified key. 5 Click Add. 6 Click OK. You are not required to restart the vCenter Server system. VMware, Inc. 127
  • 128. ESX Configuration Guide vCenter Server Storage Filtering vCenter Server provides storage filters to help you avoid storage device corruption or performance degradation that can be caused by an unsupported use of LUNs. These filters are available by default. Table 9-2. Storage Filters Filter Name Description Key VMFS Filter Filters out storage devices, or LUNs, that are already config.vpxd.filter.vmfsFilter used by a VMFS datastore on any host managed by vCenter Server. The LUNs do not show up as candidates to be formatted with another VMFS datastore or to be used as an RDM. RDM Filter Filters out LUNs that are already referenced by an config.vpxd.filter.rdmFilter RDM on any host managed by vCenter Server. The LUNs do not show up as candidates to be formatted with VMFS or to be used by a different RDM. If you need virtual machines to access the same LUN, the virtual machines must share the same RDM mapping file. For information about this type of configuration, see Setup for Failover Clustering and Microsoft Cluster Service. Same Host and Filters out LUNs ineligible for use as VMFS datastore config.vpxd.filter.SameHostAndTransportsFilter Transports Filter extents because of host or storage type incompatibility. Prevents you from adding the following LUNs as extents: n LUNs not exposed to all hosts that share the original VMFS datastore. n LUNs that use a storage type different from the one the original VMFS datastore uses. For example, you cannot add a Fibre Channel extent to a VMFS datastore on a local storage device. Host Rescan Filter Automatically rescans and updates VMFS datastores config.vpxd.filter.hostRescanFilter after you perform datastore management operations. The filter helps provide a consistent view of all VMFS datastores on all hosts managed by vCenter Server. NOTE If you present a new LUN to a host or a cluster, the hosts automatically perform a rescan no matter whether you have the Host Rescan Filter on or off. 128 VMware, Inc.
  • 129. Raw Device Mapping 10 Raw device mapping (RDM) provides a mechanism for a virtual machine to have direct access to a LUN on the physical storage subsystem (Fibre Channel or iSCSI only). The following topics contain information about RDMs and provide instructions on how to create and manage RDMs. This chapter includes the following topics: n “About Raw Device Mapping,” on page 129 n “Raw Device Mapping Characteristics,” on page 132 n “Managing Mapped LUNs,” on page 134 About Raw Device Mapping RDM is a mapping file in a separate VMFS volume that acts as a proxy for a raw physical storage device. The RDM allows a virtual machine to directly access and use the storage device. The RDM contains metadata for managing and redirecting disk access to the physical device. The file gives you some of the advantages of direct access to a physical device while keeping some advantages of a virtual disk in VMFS. As a result, it merges VMFS manageability with raw device access. RDMs can be described in terms such as mapping a raw device into a datastore, mapping a system LUN, or mapping a disk file to a physical disk volume. All these terms refer to RDMs. Figure 10-1. Raw Device Mapping Virtual machine opens reads, writes VMFS volume address mapping file mapped device resolution Although VMware recommends that you use VMFS datastores for most virtual disk storage, on certain occasions, you might need to use raw LUNs or logical disks located in a SAN. VMware, Inc. 129
  • 130. ESX Configuration Guide For example, you need to use raw LUNs with RDMs in the following situations: n When SAN snapshot or other layered applications are run in the virtual machine. The RDM better enables scalable backup offloading systems by using features inherent to the SAN. n In any MSCS clustering scenario that spans physical hosts — virtual-to-virtual clusters as well as physical- to-virtual clusters. In this case, cluster data and quorum disks should be configured as RDMs rather than as files on a shared VMFS. Think of an RDM as a symbolic link from a VMFS volume to a raw LUN. The mapping makes LUNs appear as files in a VMFS volume. The RDM, not the raw LUN, is referenced in the virtual machine configuration. The RDM contains a reference to the raw LUN. Using RDMs, you can: n Use vMotion to migrate virtual machines using raw LUNs. n Add raw LUNs to virtual machines using the vSphere Client. n Use file system features such as distributed file locking, permissions, and naming. Two compatibility modes are available for RDMs: n Virtual compatibility mode allows an RDM to act exactly like a virtual disk file, including the use of snapshots. n Physical compatibility mode allows direct access of the SCSI device for those applications that need lower level control. Benefits of Raw Device Mapping An RDM provides a number of benefits, but it should not be used in every situation. In general, virtual disk files are preferable to RDMs for manageability. However, when you need raw devices, you must use the RDM. RDM offers several benefits. User-Friendly Persistent Provides a user-friendly name for a mapped device. When you use an RDM, Names you do not need to refer to the device by its device name. You refer to it by the name of the mapping file, for example: /vmfs/volumes/myVolume/myVMDirectory/myRawDisk.vmdk Dynamic Name Stores unique identification information for each mapped device. VMFS Resolution associates each RDM with its current SCSI device, regardless of changes in the physical configuration of the server because of adapter hardware changes, path changes, device relocation, and so on. Distributed File Locking Makes it possible to use VMFS distributed locking for raw SCSI devices. Distributed locking on an RDM makes it safe to use a shared raw LUN without losing data when two virtual machines on different servers try to access the same LUN. File Permissions Makes file permissions possible. The permissions of the mapping file are enforced at file-open time to protect the mapped volume. File System Operations Makes it possible to use file system utilities to work with a mapped volume, using the mapping file as a proxy. Most operations that are valid for an ordinary file can be applied to the mapping file and are redirected to operate on the mapped device. Snapshots Makes it possible to use virtual machine snapshots on a mapped volume. Snapshots are not available when the RDM is used in physical compatibility mode. 130 VMware, Inc.
  • 131. Chapter 10 Raw Device Mapping vMotion Lets you migrate a virtual machine with vMotion. The mapping file acts as a proxy to allow vCenter Server to migrate the virtual machine by using the same mechanism that exists for migrating virtual disk files. Figure 10-2. vMotion of a Virtual Machine Using Raw Device Mapping Host 1 Host 2 VMotion VM1 VM2 VMFS volume mapping file address resolution mapped device SAN Management Makes it possible to run some SAN management agents inside a virtual Agents machine. Similarly, any software that needs to access a device by using hardware-specific SCSI commands can be run in a virtual machine. This kind of software is called SCSI target-based software. When you use SAN management agents, select a physical compatibility mode for the RDM. N-Port ID Virtualization Makes it possible to use the NPIV technology that allows a single Fibre Channel (NPIV) HBA port to register with the Fibre Channel fabric using several worldwide port names (WWPNs). This ability makes the HBA port appear as multiple virtual ports, each having its own ID and virtual port name. Virtual machines can then claim each of these virtual ports and use them for all RDM traffic. NOTE You can use NPIV only for virtual machines with RDM disks. VMware works with vendors of storage management software to ensure that their software functions correctly in environments that include ESX. Some applications of this kind are: n SAN management software n Storage resource management (SRM) software n Snapshot software n Replication software Such software uses a physical compatibility mode for RDMs so that the software can access SCSI devices directly. VMware, Inc. 131
  • 132. ESX Configuration Guide Various management products are best run centrally (not on the ESX machine), while others run well on the service console or on the virtual machines. VMware does not certify these applications or provide a compatibility matrix. To find out whether a SAN management application is supported in an ESX environment, contact the SAN management software provider. Limitations of Raw Device Mapping Certain limitations exist when you use RDMs. n Not available for block devices or certain RAID devices – RDM uses a SCSI serial number to identify the mapped device. Because block devices and some direct-attach RAID devices do not export serial numbers, they cannot be used with RDMs. n Available with VMFS-2 and VMFS-3 volumes only – RDM requires the VMFS-2 or VMFS-3 format. In ESX, the VMFS-2 file system is read only. Upgrade it to VMFS-3 to use the files that VMFS-2 stores. n No snapshots in physical compatibility mode – If you are using an RDM in physical compatibility mode, you cannot use a snapshot with the disk. Physical compatibility mode allows the virtual machine to manage its own snapshot or mirroring operations. Snapshots are available in virtual mode. n No partition mapping – RDM requires the mapped device to be a whole LUN. Mapping to a partition is not supported. Raw Device Mapping Characteristics An RDM is a special mapping file in a VMFS volume that manages metadata for its mapped device. The mapping file is presented to the management software as an ordinary disk file, available for the usual file- system operations. To the virtual machine, the storage virtualization layer presents the mapped device as a virtual SCSI device. Key contents of the metadata in the mapping file include the location of the mapped device (name resolution), the locking state of the mapped device, permissions, and so on. RDM Virtual and Physical Compatibility Modes You can use RDMs in virtual compatibility or physical compatibility modes. Virtual mode specifies full virtualization of the mapped device. Physical mode specifies minimal SCSI virtualization of the mapped device, allowing the greatest flexibility for SAN management software. In virtual mode, the VMkernel sends only READ and WRITE to the mapped device. The mapped device appears to the guest operating system exactly the same as a virtual disk file in a VMFS volume. The real hardware characteristics are hidden. If you are using a raw disk in virtual mode, you can realize the benefits of VMFS such as advanced file locking for data protection and snapshots for streamlining development processes. Virtual mode is also more portable across storage hardware than physical mode, presenting the same behavior as a virtual disk file. In physical mode, the VMkernel passes all SCSI commands to the device, with one exception: the REPORT LUNs command is virtualized so that the VMkernel can isolate the LUN to the owning virtual machine. Otherwise, all physical characteristics of the underlying hardware are exposed. Physical mode is useful to run SAN management agents or other SCSI target-based software in the virtual machine. Physical mode also allows virtual-to-physical clustering for cost-effective high availability. 132 VMware, Inc.
  • 133. Chapter 10 Raw Device Mapping Dynamic Name Resolution The RDM file supports dynamic name resolution when a path to a raw device changes. VMFS uniquely identifies all mapped storage devices, and the identification is stored in its internal data structures. Any change in the path to a raw device, such as a Fibre Channel switch failure or the addition of a new HBA, can change the device name. Dynamic name resolution resolves these changes and automatically associates the original device with its new name. Raw Device Mapping with Virtual Machine Clusters Use an RDM with virtual machine clusters that need to access the same raw LUN for failover scenarios. The setup is similar to that of a virtual machine cluster that accesses the same virtual disk file, but an RDM replaces the virtual disk file. Figure 10-3. Access from Clustered Virtual Machines Host 3 Host 4 VM3 VM4 “shared” access address mapping file mapped resolutiion device VMFS volume Comparing Available SCSI Device Access Modes The ways of accessing a SCSI-based storage device include a virtual disk file on a VMFS datastore, virtual mode RDM, and physical mode RDM. To help you choose among the available access modes for SCSI devices, Table 10-1 provides a quick comparison of features available with the different modes. Table 10-1. Features Available with Virtual Disks and Raw Device Mappings ESX Features Virtual Disk File Virtual Mode RDM Physical Mode RDM SCSI Commands Passed No No Yes Through REPORT LUNs is not passed through vCenter Server Support Yes Yes Yes Snapshots Yes Yes No Distributed Locking Yes Yes Yes Clustering Cluster-in-a-box only Cluster-in-a-box and Physical to Virtual Clustering cluster-across-boxes SCSI Target-Based Software No No Yes VMware, Inc. 133
  • 134. ESX Configuration Guide VMware recommends that you use virtual disk files for the cluster-in-a-box type of clustering. If you plan to reconfigure your cluster-in-a-box clusters as cluster-across-boxes clusters, use virtual mode RDMs for the cluster-in-a-box clusters. Managing Mapped LUNs You can use the vSphere Client to map a SAN LUN to a datastore and manage paths to your mapped LUN. Additional tools available to manage mapped LUNs and their RDMs include the vmkfstools utility and other commands used with the vSphere CLI. You can use the vmkfstools utility to perform many of the same operations available through the vSphere Client. You can also use common file system commands in the service console. Create Virtual Machines with RDMs When you give your virtual machine direct access to a raw SAN LUN, you create a mapping file (RDM) that resides on a VMFS datastore and points to the LUN. Although the mapping file has the same.vmdk extension as a regular virtual disk file, the RDM file contains only mapping information. The actual virtual disk data is stored directly on the LUN. You can create the RDM as an initial disk for a new virtual machine or add it to an existing virtual machine. When creating the RDM, you specify the LUN to be mapped and the datastore on which to put the RDM. Procedure 1 Follow all steps required to create a custom virtual machine. 2 In the Select a Disk page, select Raw Device Mapping, and click Next. 3 From the list of SAN disks or LUNs, select a raw LUN for your virtual machine to access directly. 4 Select a datastore for the RDM mapping file. You can place the RDM file on the same datastore where your virtual machine configuration file resides, or select a different datastore. NOTE To use vMotion for virtual machines with enabled NPIV, make sure that the RDM files of the virtual machines are located on the same datastore. You cannot perform Storage vMotion or vMotion between datastores when NPIV is enabled. 5 Select a compatibility mode. Option Description Physical Allows the guest operating system to access the hardware directly. Physical compatibility is useful if you are using SAN-aware applications on the virtual machine. However, powered on virtual machines that use RDMs configured for physical compatibility cannot be migrated if the migration involves copying the disk. Such virtual machines cannot be cloned or cloned to a template either. Virtual Allows the RDM to behave as if it were a virtual disk, so you can use such features as snapshotting, cloning, and so on. 6 Select a virtual device node. 134 VMware, Inc.
  • 135. Chapter 10 Raw Device Mapping 7 If you select Independent mode, choose one of the following. Option Description Persistent Changes are immediately and permanently written to the disk. Nonpersistent Changes to the disk are discarded when you power off or revert to the snapshot. 8 Click Next. 9 In the Ready to Complete New Virtual Machine page, review your selections. 10 Click Finish to complete your virtual machine. Manage Paths for a Mapped Raw LUN You can manage paths for mapped raw LUNs. Procedure 1 Log in as administrator or as the owner of the virtual machine to which the mapped disk belongs. 2 Select the virtual machine from the Inventory panel. 3 On the Summary tab, click Edit Settings. 4 On the Hardware tab, select Hard Disk, then click Manage Paths. 5 Use the Manage Paths dialog box to enable or disable your paths, set multipathing policy, and specify the preferred path. For information on managing paths, see “Using Multipathing with ESX,” on page 115. VMware, Inc. 135
  • 139. Security for ESX Systems 11 ESX is developed with a focus on strong security. VMware ensures security in the ESX environment and addresses system architecture from a security standpoint. This chapter includes the following topics: n “ESX Architecture and Security Features,” on page 139 n “Security Resources and Information,” on page 147 ESX Architecture and Security Features The components and the overall architecture of ESX are designed to ensure security of the ESX system as a whole. From a security perspective, ESX consists of four major components: the virtualization layer, the virtual machines, the service console, and the virtual networking layer. Figure 11-1 provides an overview of these components. Figure 11-1. ESX Architecture ESX virtual virtual virtual virtual service console machine machine machine machine VMware Virtualization Layer (VMkernel) Virtual Networking Layer CPU memory hardware network storage adapter VMware, Inc. 139
  • 140. ESX Configuration Guide Security and the Virtualization Layer VMware designed the virtualization layer, or VMkernel, to run virtual machines. It controls the hardware that hosts use and schedules the allocation of hardware resources among the virtual machines. Because the VMkernel is fully dedicated to supporting virtual machines and is not used for other purposes, the interface to the VMkernel is strictly limited to the API required to manage virtual machines. ESX provides additional VMkernel protection with the following features: Memory Hardening The ESX kernel, user-mode applications, and executable components such as drivers and libraries are located at random, non-predictable memory addresses. Combined with the non-executable memory protections made available by microprocessors, this provides protection that makes it difficult for malicious code to use memory exploits to take advantage of vulnerabilities. Kernel Module Integrity Digital signing ensures the integrity and authenticity of modules, drivers and applications as they are loaded by the VMkernel. Module signing allows ESX to identify the providers of modules, drivers, or applications and whether they are VMware-certified. Security and Virtual Machines Virtual machines are the containers in which applications and guest operating systems run. By design, all VMware virtual machines are isolated from one another. This isolation enables multiple virtual machines to run securely while sharing hardware and ensures both their ability to access hardware and their uninterrupted performance. Even a user with system administrator privileges on a virtual machine’s guest operating system cannot breach this layer of isolation to access another virtual machine without privileges explicitly granted by the ESX system administrator. As a result of virtual machine isolation, if a guest operating system running in a virtual machine fails, other virtual machines on the same host continue to run. The guest operating system failure has no effect on: n The ability of users to access the other virtual machines n The ability of the operational virtual machines to access the resources they need n The performance of the other virtual machines Each virtual machine is isolated from other virtual machines running on the same hardware. Although virtual machines share physical resources such as CPU, memory, and I/O devices, a guest operating system on an individual virtual machine cannot detect any device other than the virtual devices made available to it, as shown in Figure 11-2. 140 VMware, Inc.
  • 141. Chapter 11 Security for ESX Systems Figure 11-2. Virtual Machine Isolation Virtual Machine app app app app app Operating System Virtual Machine Resources CPU memory disk network and video cards SCSI mouse CD/DVD keyboard controller Because the VMkernel mediates the physical resources and all physical hardware access takes place through the VMkernel, virtual machines cannot circumvent this level of isolation. Just as a physical machine communicates with other machines in a network through a network card, a virtual machine communicates with other virtual machines running in the same host through a virtual switch. Further, a virtual machine communicates with the physical network, including virtual machines on other ESX hosts, through a physical network adapter, as shown in Figure 11-3. Figure 11-3. Virtual Networking Through Virtual Switches ESX Virtual Machine Virtual Machine virtual virtual network network adapter adapter VMkernel Virtual Virtual Switch Networking links virtual Layer machines together Hardware Network Adapter links virtual machines to the physical network Physical Network These characteristics apply to virtual machine isolation in a network context: n If a virtual machine does not share a virtual switch with any other virtual machine, it is completely isolated from virtual networks within the host. n If no physical network adapter is configured for a virtual machine, the virtual machine is completely isolated from any physical networks. n If you use the same safeguards (firewalls, antivirus software, and so forth) to protect a virtual machine from the network as you would for a physical machine, the virtual machine is as secure as the physical machine. VMware, Inc. 141
  • 142. ESX Configuration Guide You can further protect virtual machines by setting up resource reservations and limits on the host. For example, through the detailed resource controls available in ESX, you can configure a virtual machine so that it always receives at least 10 percent of the host’s CPU resources, but never more than 20 percent. Resource reservations and limits protect virtual machines from performance degradation that would result if another virtual machine consumed excessive shared hardware resources. For example, if one of the virtual machines on a host is incapacitated by a denial-of-service (DoS) attack, a resource limit on that machine prevents the attack from taking up so much of the hardware resources that the other virtual machines are also affected. Similarly, a resource reservation on each of the virtual machines ensures that, in the event of high resource demands by the virtual machine targeted by the DoS attack, all the other virtual machines still have enough resources to operate. By default, ESX imposes a form of resource reservation by applying a distribution algorithm that divides the available host resources equally among the virtual machines while keeping a certain percentage of resources for use by other system components. This default behavior provides a degree of natural protection from DoS and distributed denial-of-service (DDoS) attacks. You set specific resource reservations and limits on an individual basis to customize the default behavior so that the distribution is not equal across the virtual machine configuration. Security and the Virtual Networking Layer The virtual networking layer includes virtual network adapters and virtual switches. ESX relies on the virtual networking layer to support communications between virtual machines and their users. In addition, hosts use the virtual networking layer to communicate with iSCSI SANs, NAS storage, and so forth. The methods you use to secure a virtual machine network depend on which guest operating system is installed, whether the virtual machines operate in a trusted environment, and a variety of other factors. Virtual switches provide a substantial degree of protection when used with other common security practices, such as installing firewalls. ESX also supports IEEE 802.1q VLANs, which you can use to further protect the virtual machine network, service console, or storage configuration. VLANs let you segment a physical network so that two machines on the same physical network cannot send packets to or receive packets from each other unless they are on the same VLAN. Creating a Network DMZ on a Single ESX Host One example of how to use ESX isolation and virtual networking features to configure a secure environment is the creation of a network demilitarized zone (DMZ) on a single host. Figure 11-4 shows the configuration. 142 VMware, Inc.
  • 143. Chapter 11 Security for ESX Systems Figure 11-4. DMZ Configured on a Single ESX Host ESX Virtual Machine 1 Virtual Machine 2 Virtual Machine 3 Virtual Machine 4 firewall server web server application server firewall server virtual switch 1 virtual switch 2 virtual switch 3 hardware network hardware network adapter 1 adapter 2 External Network Internal Network In this example, four virtual machines are configured to create a virtual DMZ on Virtual Switch 2: n Virtual Machine 1 and Virtual Machine 4 run firewalls and are connected to virtual adapters through virtual switches. Both of these virtual machines are multi homed. n Virtual Machine 2 runs a Web server, and Virtual Machine 3 runs as an application server. Both of these virtual machines are single-homed. The Web server and application server occupy the DMZ between the two firewalls. The conduit between these elements is Virtual Switch 2, which connects the firewalls with the servers. This switch has no direct connection with any elements outside the DMZ and is isolated from external traffic by the two firewalls. From an operational viewpoint, external traffic from the Internet enters Virtual Machine 1 through Hardware Network Adapter 1 (routed by Virtual Switch 1) and is verified by the firewall installed on this machine. If the firewall authorizes the traffic, it is routed to the virtual switch in the DMZ, Virtual Switch 2. Because the Web server and application server are also connected to this switch, they can serve external requests. Virtual Switch 2 is also connected to Virtual Machine 4. This virtual machine provides a firewall between the DMZ and the internal corporate network. This firewall filters packets from the Web server and application server. If a packet is verified, it is routed to Hardware Network Adapter 2 through Virtual Switch 3. Hardware Network Adapter 2 is connected to the internal corporate network. When creating a DMZ on a single host, you can use fairly lightweight firewalls. Although a virtual machine in this configuration cannot exert direct control over another virtual machine or access its memory, all the virtual machines are still connected through a virtual network. This network could be used for virus propagation or targeted for other types of attacks. The security of the virtual machines in the DMZ is equivalent to separate physical machines connected to the same network. VMware, Inc. 143
  • 144. ESX Configuration Guide Creating Multiple Networks Within a Single ESX Host The ESX system is designed so that you can connect some groups of virtual machines to the internal network, others to the external network, and still others to both—all on the same host. This capability is an outgrowth of basic virtual machine isolation coupled with a well-planned use of virtual networking features. Figure 11-5. External Networks, Internal Networks, and a DMZ Configured on a Single ESX Host ESX External Network Internal Network DMZ VM 2 internal user VM 3 VM 6 internal firewall user server VM 4 VM 7 internal Web user server VM 1 VM 5 VM 8 FTP internal firewall server user server physical network adapters External Internal External Internal Network 1 Network 2 Network 2 Network 1 In Figure 11-5 the system administrator configured a host into three distinct virtual machine zones: FTP server, internal virtual machines, and DMZ. Each zone serves a unique function. FTP server Virtual Machine 1 is configured with FTP software and acts as a holding area for data sent to and from outside resources such as forms and collateral localized by a vendor. This virtual machine is associated with an external network only. It has its own virtual switch and physical network adapter that connect it to External Network 1. This network is dedicated to servers that the company uses to receive data from outside sources. For example, the company uses External Network 1 to receive FTP traffic from vendors and allow vendors access to data stored on externally available servers though FTP. In addition to servicing Virtual Machine 1, External Network 1 services FTP servers configured on different ESX hosts throughout the site. 144 VMware, Inc.
  • 145. Chapter 11 Security for ESX Systems Because Virtual Machine 1 does not share a virtual switch or physical network adapter with any virtual machines in the host, the other resident virtual machines cannot transmit packets to or receive packets from the Virtual Machine 1 network. This restriction prevents sniffing attacks, which require sending network traffic to the victim. More importantly, an attacker cannot use the natural vulnerability of FTP to access any of the host’s other virtual machines. Internal virtual machines Virtual Machines 2 through 5 are reserved for internal use. These virtual machines process and store company-private data such as medical records, legal settlements, and fraud investigations. As a result, the system administrators must ensure the highest level of protection for these virtual machines. These virtual machines connect to Internal Network 2 through their own virtual switch and network adapter. Internal Network 2 is reserved for internal use by personnel such as claims processors, in-house lawyers, or adjustors. Virtual Machines 2 through 5 can communicate with one another through the virtual switch and with internal virtual machines elsewhere on Internal Network 2 through the physical network adapter. They cannot communicate with externally facing machines. As with the FTP server, these virtual machines cannot send packets to or receive packets from the other virtual machines’ networks. Similarly, the host’s other virtual machines cannot send packets to or receive packets from Virtual Machines 2 through 5. DMZ Virtual Machines 6 through 8 are configured as a DMZ that the marketing group uses to publish the company’s external Web site. This group of virtual machines is associated with External Network 2 and Internal Network 1. The company uses External Network 2 to support the Web servers that use the marketing and financial department to host the corporate Web site and other Web facilities that it hosts to outside users. Internal Network 1 is the conduit that the marketing department uses to publish content to the corporate Web site, post downloads, and maintain services like user forums. Because these networks are separate from External Network 1 and Internal Network 2, and the virtual machines have no shared points of contact (switches or adapters), there is no risk of attack to or from the FTP server or the internal virtual machine group. By capitalizing on virtual machine isolation, correctly configuring virtual switches, and maintaining network separation, the system administrator can house all three virtual machine zones in the same ESX host and be confident that there will be no data or resource breaches. The company enforces isolation among the virtual machine groups by using multiple internal and external networks and making sure that the virtual switches and physical network adapters for each group are completely separate from those of other groups. Because none of the virtual switches straddle virtual machine zones, the system administrator succeeds in eliminating the risk of packet leakage from one zone to another. A virtual switch, by design, cannot leak packets directly to another virtual switch. The only way for packets to travel from one virtual switch to another is under the following circumstances: n The virtual switches are connected to the same physical LAN. n The virtual switches connect to a common virtual machine, which could be used to transmit packets. Neither of these conditions occur in the sample configuration. If system administrators want to verify that no common virtual switch paths exist, they can check for possible shared points of contact by reviewing the network switch layout in the vSphere Client or vSphere Web Access. VMware, Inc. 145
  • 146. ESX Configuration Guide To safeguard the virtual machines’ resources, the system administrator lowers the risk of DoS and DDoS attacks by configuring a resource reservation and a limit for each virtual machine. The system administrator further protects the ESX host and virtual machines by installing software firewalls at the front and back ends of the DMZ, ensuring that the host is behind a physical firewall, and configuring the service console and networked storage resources so that each has its own virtual switch. Security and the Service Console The ESX service console is a limited distribution of Linux based on Red Hat Enterprise Linux 5 (RHEL5). The service console provides an execution environment to monitor and administer the entire ESX host. If the service console is compromised in certain ways, the virtual machines it interacts with might also be compromised. To minimize the risk of an attack through the service console, VMware protects the service console with a firewall. In addition to implementing the service console firewall, VMware mitigates risks to the service console using other methods. n ESX runs only services essential to managing its functions, and the distribution is limited to the features required to run ESX. n By default, ESX is installed with a high-security setting. All outbound ports are closed, and the only inbound ports that are open are those required for interactions with clients such as the vSphere Client. Keep this security setting, unless the service console is connected to a trusted network. n By default, all ports not specifically required for management access to the service console are closed. You must specifically open ports if you need additional services. n By default, weak ciphers are disabled and all communications from clients are secured by SSL. The exact algorithms used for securing the channel depend on the SSL handshake. Default certificates created on ESX use SHA-1 with RSA encryption as the signature algorithm. n The Tomcat Web service, used internally by ESX to support access to the service console by Web clients like vSphere Web Access, has been modified to run only those functions required for administration and monitoring by a Web client. As a result, ESX is not vulnerable to the Tomcat security issues reported in broader use. n VMware monitors all security alerts that could affect service console security and, if needed, issues a security patch, as it would for any other security vulnerability that could affect ESX hosts. VMware provides security patches for RHEL 5 and later as they become available. n Insecure services such as FTP and Telnet are not installed, and the ports for these services are closed by default. Because more secure services such as SSH and SFTP are easily available, always avoid using these insecure services in favor of their safer alternatives. If you must use insecure services and have implemented sufficient protection for the service console, you must explicitly open ports to support them. n The number of applications that use a setuid or setgid flag is minimized. You can disable any setuid or setgid application that is optional to ESX operation. Although you can install and run certain types of programs designed for RHEL 5 in the service console, this use is not supported unless VMware explicitly states that it is. If a security vulnerability is discovered in a supported configuration, VMware proactively notifies all customers with valid support and subscription contracts and provides all necessary patches. NOTE Follow only VMware security advisories, found at http://www.vmware.com/security/. Do not follow security advisories issued by Red Hat. 146 VMware, Inc.
  • 147. Chapter 11 Security for ESX Systems Security Resources and Information You can find additional information about security on the VMware Web site. Table 11-1 lists security topics and the location of additional information about these topics. Table 11-1. VMware Security Resources on the Web Topic Resource VMware security policy, up-to-date security http://www.vmware.com/security/ alerts, security downloads, and focus discussions of security topics Corporate security response policy http://www.vmware.com/support/policies/security_response.html VMware is committed to helping you maintain a secure environment. Security issues are corrected in a timely manner. The VMware Security Response Policy states our commitment to resolve possible vulnerabilities in our products. Third-party software support policy http://www.vmware.com/support/policies/ VMware supports a variety of storage systems, software agents such as backup agents, system management agents, and so forth. You can find lists of agents, tools, and other software that supports ESX by searching http://www.vmware.com/vmtn/resources/ for ESX compatibility guides. The industry offers more products and configurations than VMware can test. If VMware does not list a product or configuration in a compatibility guide, Technical Support will attempt to help you with any problems, but cannot guarantee that the product or configuration can be used. Always evaluate security risks for unsupported products or configurations carefully. Certification of VMware products http://www.vmware.com/security/certifications/ General information about virtualization and VMware Virtual Security Technical Resource Center security http://www.vmware.com/go/security/ Compliance and security standards, as well as http://www.vmware.com/go/compliance/ partner solutions and in-depth content about virtualization and compliance Information about VMsafe technology for http://www.vmware.com/go/vmsafe/ protection of virtual machines, including a list of partner solutions VMware, Inc. 147
  • 149. Securing an ESX Configuration 12 You can take measures to promote a secure environment for your ESX hosts, virtual machines, and iSCSI SANs. Consider network configuration planning from a security perspective and the steps that you can take to protect the components in your configuration from attack. This chapter includes the following topics: n “Securing the Network with Firewalls,” on page 149 n “Securing Virtual Machines with VLANs,” on page 158 n “Securing Virtual Switch Ports,” on page 163 n “Internet Protocol Security,” on page 165 n “Securing iSCSI Storage,” on page 168 Securing the Network with Firewalls Security administrators use firewalls to safeguard the network or selected components in the network from intrusion. Firewalls control access to devices within their perimeter by closing all communication pathways, except for those that the administrator explicitly or implicitly designates as authorized. The pathways, or ports, that administrators open in the firewall allow traffic between devices on different sides of the firewall. In a virtual machine environment, you can plan your layout for firewalls between components. n Physical machines such as vCenter Server hosts and ESX hosts. n One virtual machine and another—for example, between a virtual machine acting as an external Web server and a virtual machine connected to your company’s internal network. n A physical machine and a virtual machine, such as when you place a firewall between a physical network adapter card and a virtual machine. How you use firewalls in an ESX configuration is based on how you plan to use the network and how secure any given component needs to be. For example, if you create a virtual network where each virtual machine is dedicated to running a different benchmark test suite for the same department, the risk of unwanted access from one virtual machine to the next is minimal. Therefore, a configuration where firewalls are present between the virtual machines is not necessary. However, to prevent interruption of a test run from an outside host, you might set up the configuration so that a firewall is present at the entry point of the virtual network to protect the entire set of virtual machines. VMware, Inc. 149
  • 150. ESX Configuration Guide Firewalls for Configurations with vCenter Server If you access ESX hosts through vCenter Server, you typically protect vCenter Server using a firewall. This firewall provides basic protection for your network. A firewall might lie between the clients and vCenter Server. Alternatively, vCenter Server and the clients can be behind the firewall, depending on your deployment. The main point is to ensure that a firewall is present at what you consider to be an entry point for the system. If you use vCenter Server, you can install firewalls at any of the locations shown in Figure 12-1. Depending on your configuration, you might not need all the firewalls in the illustration, or you might need firewalls in other locations. In addition, your configuration might include optional modules, such as VMware vCenter Update Manager, that are not shown. Refer to the documentation for information about firewall setups specific to products like Update Manager. For a comprehensive list of TCP and UDP ports, including those for VMware vMotion™ and VMware Fault Tolerance, see “TCP and UDP Ports for Management Access,” on page 157. Figure 12-1. Sample vSphere Network Configuration and Traffic Flow 22 SSH 427 SLPv2 443 HTTPS third-party network 902 xinetd/vmware-authd management tool 902 (UDP) ESX/ESXi status update 903 xinetd/vmware-authd-mks 2050 - 2250 HA 5989 CIM transactions 8042 - 8045 HA vSphere Web Access vSphere Client Port 443 firewall vCenter Server Ports 22, 427, 443, 902, Ports 427, 443, 903 902, 903 Ports 443, 902, 5989 firewall Port 443 902 902 UDP UDP Ports 443, 902, 2050-2250, and 8042-8045 firewall ESXi ESX storage Networks configured with vCenter Server can receive communications through several types of clients: the vSphere Client, vSphere Web Access, or third-party network management clients that use the SDK to interface with the host. During normal operation, vCenter Server listens for data from its managed hosts and clients on designated ports. vCenter Server also assumes that its managed hosts listen for data from vCenter Server on designated ports. If a firewall is present between any of these elements, you must ensure that the firewall has open ports to support data transfer. 150 VMware, Inc.
  • 151. Chapter 12 Securing an ESX Configuration You might also include firewalls at a variety of other access points in the network, depending on how you plan to use the network and the level of security various devices require. Select the locations for your firewalls based on the security risks that you have identified for your network configuration. The following is a list of firewall locations common to ESX implementations. Many of the firewall locations in the list and shown in Figure 12-1 are optional. n Between your Web browser and the vSphere Web Access HTTP and HTTPS proxy server. n Between the vSphere Client, vSphere Web Access Client, or a third-party network-management client and vCenter Server. n If your users access virtual machines through the vSphere Client, between the vSphere Client and the ESX host. This connection is in addition to the connection between the vSphere Client and vCenter Server, and it requires a different port. n If your users access virtual machines through a Web browser, between the Web browser and the ESX host. This connection is in addition to the connection between the vSphere Web Access Client and vCenter Server, and it requires different ports. n Between vCenter Server and the ESX hosts. n Between the ESX hosts in your network. Although traffic between hosts is usually considered trusted, you can add firewalls between them if you are concerned about security breaches from machine to machine. If you add firewalls between ESX hosts and plan to migrate virtual machines between the servers, perform cloning, or use vMotion, you must also open ports in any firewall that divides the source host from the target hosts so that the source and targets can communicate. n Between the ESX hosts and network storage such as NFS or iSCSI storage. These ports are not specific to VMware, and you configure them according to the specifications for your network. Firewalls for Configurations Without vCenter Server If you connect clients directly to your ESX network instead of using vCenter Server, your firewall configuration is somewhat simpler. You might install firewalls at any of the locations shown in Figure 12-2. NOTE Depending on your configuration, you might not need all the firewalls in the illustration, or you might need firewalls in locations not shown. VMware, Inc. 151
  • 152. ESX Configuration Guide Figure 12-2. Firewall Configuration for ESX Networks that a Client Manages Directly vSphere Web Access third-party network vSphere Client management tool standard http/ Port 902 https ports Port 903 firewall Port 902 Port 903 Port 443 firewall Ports 902, 2050-2250, 8000, 8042-8045, 8100, 8200 firewall ESXi ESX storage Networks configured without vCenter Server receive communications through the same types of clients as they do if vCenter Server were present: vSphere Clients, third-party network management clients, or vSphere Web Access Clients. For the most part, the firewall needs are the same, but there are several key differences. n As you would for configurations that include vCenter Server, be sure a firewall is present to protect your ESX layer or, depending on your configuration, your clients and ESX layer. This firewall provides basic protection for your network. The firewall ports you use are the same as those you use if vCenter Server is in place. n Licensing in this type of configuration is part of the ESX package that you install on each of the hosts. Because licensing is resident to the server, a separate license server is not required. This eliminates the need for a firewall between the license server and the ESX network. Connecting to vCenter Server Through a Firewall The port that vCenter Server uses to listen for data transfer from its clients is 443. If you have a firewall between vCenter Server and its clients, you must configure a connection through which vCenter Server can receive data from the clients. To enable vCenter Server to receive data from the vSphere Client, open port 443 in the firewall to allow data transfer from the vSphere Client to vCenter Server. Contact the firewall system administrator for additional information on configuring ports in a firewall. If you are using the vSphere Client and do not want to use port 443 as the port for vSphere Client-to-vCenter Server communication, you can switch to another port by changing the vCenter Server settings in the vSphere Client. To learn how to change these settings, see the VMware vSphere Datacenter Administration Guide. 152 VMware, Inc.
  • 153. Chapter 12 Securing an ESX Configuration Connecting to the Virtual Machine Console Through a Firewall Whether you connect your client to ESX hosts through vCenter Server or use a direct connection to the host, certain ports are required for user and administrator communication with virtual machine consoles. These ports support different client functions, interface with different layers on ESX, and use different authentication protocols. Port 902 vCenter Server uses this port to send data to vCenter Server managed hosts. Port 902 is the port that vCenter Server assumes is available when sending data to an ESX host. Port 902 connects vCenter Server to the host through the VMware Authorization Daemon (vmware-authd). This daemon multiplexes port 902 data to the appropriate recipient for processing. VMware does not support configuring a different port for this connection. Port 443 The vSphere Client, vSphere Web Access Client, and SDK use this port to send data to vCenter Server managed hosts. Also, the vSphere Client, vSphere Web Access Client, and SDK, when connected directly to an ESX host, use this port to support any management functions related to the server and its virtual machines. Port 443 is the port that clients assume is available when sending data to the ESX host. VMware does not support configuring a different port for these connections. Port 443 connects clients to the ESX host through the Tomcat Web service or the SDK. The vmware-hostd multiplexes port 443 data to the appropriate recipient for processing. Port 903 The vSphere Client and vSphere Web Access use this port to provide a connection for guest operating system MKS activities on virtual machines. It is through this port that users interact with the guest operating systems and applications of the virtual machine. Port 903 is the port that the vSphere Client and vSphere Web Access assume is available when interacting with virtual machines. VMware does not support configuring a different port for this function. Port 903 connects the vSphere Client to a specified virtual machine configured on the ESX host. Figure 12-3 shows the relationships between vSphere Client functions, ports, and ESX processes. The vSphere Web Access Client uses the same basic mapping for its interactions with the ESX host. VMware, Inc. 153
  • 154. ESX Configuration Guide Figure 12-3. Port Use for vSphere Client Communications with ESX vSphere Client virtual machine management functions virtual machine console Port 443 firewall Port 903 ESX service console VMkernel vmware-hostd virtual machine vmware-authd vmkauthd If you have a firewall between your vCenter Server system and vCenter Server managed host, open Ports 443 and 903 in the firewall to allow data transfer to ESX hosts from vCenter Server and ESX hosts directly from the vSphere Client and vSphere Web Access. For additional information on configuring the ports, see the firewall system administrator. Connecting ESX Hosts Through Firewalls If you have a firewall between two ESX hosts and you want to allow transactions between the hosts or use vCenter Server to perform any source or target activities, such as VMware High Availability (HA) traffic, migration, cloning, or vMotion, you must configure a connection through which the managed hosts can receive data. To configure a connection for receiving data, open ports in the following ranges: n 443 (server-to-server migration and provisioning traffic) n 2050–2250 (for HA traffic) n 8000 (for vMotion) n 8042–8045 (for HA traffic) Refer to the firewall system administrator for additional information on configuring the ports. Configuring Firewall Ports for Supported Services and Management Agents You must configure firewalls in your environment to accept commonly supported services. Use the vSphere Client to configure the service console firewall. When you configure the ESX host security profile in vCenter Server, you add or remove these services or agents, automatically opening or closing predetermined ports in the firewall to allow communication with the service or agent. The following services and agents are commonly present in a vSphere environment: n NFS client (insecure service) n NTP client 154 VMware, Inc.
  • 155. Chapter 12 Securing an ESX Configuration n iSCSI software client n CIM HTTP server (insecure service) n CIM HTTPS server n Syslog client n NFS server (insecure service) n NIS client n SMB client (insecure service) n FTP client (insecure service) n SSH client n Telnet client (insecure service) n SSH server n Telnet server (insecure service) n FTP server (insecure service) n SNMP server n Other supported management agents that you install NOTE This list can change, so you might find that the vSphere Client provides services and agents not mentioned in the list. Also, not all services on the list are installed by default. You might be required to perform additional tasks to configure and enable these services. If you are installing a device, service, or agent not on this list, open ports in the service console firewall from a command line. Allow Access to ESX for a Service or Management Agent You can configure firewall properties to allow access for a service or management agent. Procedure 1 Log in to a vCenter Server system using the vSphere Client. 2 Select the host in the inventory panel. 3 Click the Configuration tab and click Security Profile. The vSphere Client displays a list of active incoming and outgoing connections with the corresponding firewall ports. 4 Click Properties to open the Firewall Properties dialog box. The Firewall Properties dialog box lists all the services and management agents that you can configure for the host. 5 Select the services and agents to enable. The Incoming Ports and Outgoing Ports columns indicate the ports that the vSphere Client opens for the service. The Protocol column indicates the protocol that the service uses. The Daemon column indicates the status of daemons associated with the service. 6 Click OK. VMware, Inc. 155
  • 156. ESX Configuration Guide Automating Service Behavior Based on Firewall Settings ESX can automate whether services start based on the status of firewall ports. Automation helps ensure that services start if the environment is configured to enable their function. For example, starting a network service only if some ports are open can help avoid the situation where services are started, but are unable to complete the communications required to complete their intended purpose. In addition, having accurate information about the current time is a requirement for some protocols, such as Kerberos. The NTP service is a way of getting accurate time information, but this service only works when required ports are opened in the firewall. The service cannot achieve its goal if all ports are closed. The NTP services provide an option to configure the conditions when the service starts or stops. This configuration includes options that account for whether firewall ports are opened, and then start or stop the NTP service based on those conditions. Several possible configuration options exist, all of which are also applicable to the SSH server. NOTE The settings described in this section only apply to service settings configured through the vSphere Client or applications created with the vSphere Web services SDK. Configurations made through other means, such as the esxcfg-firewall utility or configuration files in /etc/init.d/, are not affected by these settings. n Start automatically if any ports are open, and stop when all ports are closed – The default setting for these services that VMware recommends. If any port is open, the client attempts to contact the network resources pertinent to the service in question. If some ports are open, but the port for a particular service is closed, the attempt fails, but there is little drawback to such a case. If and when the applicable outgoing port is opened, the service begins completing its tasks. n Start and stop with host– The service starts shortly after the host starts and closes shortly before the host shuts down. Much like Start automatically if any ports are open, and stop when all ports are closed, this option means that the service regularly attempts to complete its tasks, such as contacting the specified NTP server. If the port was closed but is subsequently opened, the client begins completing its tasks shortly thereafter. n Start and stop manually – The host preserves the user-determined service settings, regardless of whether ports are open or not. When a user starts the NTP service, that service is kept running as long as the host is powered on. If the service is started and the host is powered off, the service is stopped as part of the shutdown process, but as soon as the host is powered on, the service is started again, preserving the user- determined state. Configure How Service Startup Relates to Firewall Configuration The Startup Policy determines when a service starts. You can configure how service startup relates to a firewall configuration by editing the Startup Policy. Procedure 1 Log in to a vCenter Server system using the vSphere Client. 2 Select the host in the inventory panel. 3 Click the Configuration tab and click Security Profile. The vSphere Client displays a list of active incoming and outgoing connections with the corresponding firewall ports. 4 Click Properties. The Firewall Properties dialog box lists all the services and management agents you can configure for the host. 156 VMware, Inc.
  • 157. Chapter 12 Securing an ESX Configuration 5 Select the service to configure, and click Options. The Startup Policy dialog box determines when the service starts. This dialog box also provides information about the current state of the service and provides an interface for manually starting, stopping, or restarting the service. 6 Select a policy from the Startup Policy list. 7 Click OK. TCP and UDP Ports for Management Access vCenter Server, ESX hosts, and other network components are accessed using predetermined TCP and UDP ports. If you manage network components from outside a firewall, you might be required to reconfigure the firewall to allow access on the appropriate ports. Table 12-1 lists TCP and UDP ports, and the purpose and the type of each. The ports are connected through the service console interface, unless otherwise indicated. Table 12-1. TCP and UDP Ports Port Purpose Traffic Type 22 SSH Server Incoming TCP 80 HTTP access Incoming TCP The default non-secure TCP Web port typically used in conjunction with port 443 as a front end for access to ESX networks from the Web. Port 80 redirects traffic to an HTTPS landing page (port 443). Connection to vSphere Web Access from the Web WS-Management 123 NTP Client Outgoing UDP 427 The CIM client uses the Service Location Protocol, version 2 (SLPv2) to find CIM Incoming and servers. outgoing UDP 443 HTTPS access Incoming TCP vCenter Server access to ESX hosts Default SSL Web port vSphere Client access to vCenter Server vSphere Client access to ESX hosts WS-Management vSphere Client access to vSphere Update Manager vSphere Converter access to vCenter Server vSphere Web Access and third-party network management client connections to vCenter Server Direct vSphere Web Access and third-party network management clients access to hosts 902 Host access to other hosts for migration and provisioning Incoming TCP, Authentication traffic for ESX (xinetd/vmware-authd) outgoing UDP vSphere Client access to virtual machine consoles (UDP) Status update (heartbeat) connection from ESX to vCenter Server 903 Remote console traffic generated by user access to virtual machines on a specific Incoming TCP ESX host. vSphere Client access to virtual machine consoles vSphere Web Access Client access to virtual machine consoles MKS transactions (xinetd/vmware-authd-mks) 2049 Transactions from NFS storage devices Incoming and This port is used on the VMkernel interface rather than the service console outgoing TCP interface. VMware, Inc. 157
  • 158. ESX Configuration Guide Table 12-1. TCP and UDP Ports (Continued) Port Purpose Traffic Type 2050–2250 Traffic between ESX hosts for VMware High Availability (HA) and EMC Outgoing TCP, Autostart Manager incoming and outgoing UDP 3260 Transactions to iSCSI storage devices Outgoing TCP This port is used on the VMkernel interface and the service console interface. 5900-5964 RFB protocol, which is used by management tools such as VNC Incoming and outgoing TCP 5989 CIM XML transactions over HTTPS Incoming and outgoing TCP 8000 Requests from vMotion Incoming and This port is used on the VMkernel interface rather than the service console outgoing TCP interface. 8042–8045 Traffic between ESX hosts for HA and EMC Autostart Manager Outgoing TCP, incoming and outgoing UDP 8100, 8200 Traffic between ESX hosts for VMware Fault Tolerance Outgoing TCP, incoming and outgoing UDP In addition to the TCP and UDP ports listed in Table 12-1, you can configure other ports depending on your needs: n You can use vSphere Client to open ports for installed management agents and supported services such as NFS. n You can open ports in the service console firewall for other services and agents required for your network by running command-line scripts. Securing Virtual Machines with VLANs The network can be one of the most vulnerable parts of any system. Your virtual machine network requires as much protection as your physical network. You can add security to your virtual machine network in several ways. If your virtual machine network is connected to a physical network, it can be subject to breaches to the same degree that a network made up of physical machines is. Even if the virtual machine network is isolated from any physical network, virtual machines in the network can be subject to attacks from other virtual machines in the network. The requirements for securing virtual machines are often the same as those for physical machines. Virtual machines are isolated from each other. One virtual machine cannot read or write another virtual machine’s memory, access its data, use its applications, and so forth. However, within the network, any virtual machine or group of virtual machines can still be the target of unauthorized access from other virtual machines and might require further protection by external means. You can add this level of security in different ways. n Adding firewall protection to your virtual network by installing and configuring host-based firewalls on some or all of its virtual machines. For efficiency, you can set up private virtual machine Ethernet networks or virtual networks. With virtual networks, you install a host-based firewall on a virtual machine at the head of the virtual network. This serves as a protective buffer between the physical network adapter and the remaining virtual machines in the virtual network. 158 VMware, Inc.
  • 159. Chapter 12 Securing an ESX Configuration Installing a host-based firewall on virtual machines at the head of virtual networks is a good security practice. However, because host-based firewalls can slow performance, balance your security needs against performance before you decide to install host-based firewalls on virtual machines elsewhere in the virtual network. n Keeping different virtual machine zones within a host on different network segments. If you isolate virtual machine zones on their own network segments, you minimize the risks of data leakage from one virtual machine zone to the next. Segmentation prevents various threats, including Address Resolution Protocol (ARP) spoofing, in which an attacker manipulates the ARP table to remap MAC and IP addresses, thereby gaining access to network traffic to and from a host. Attackers use ARP spoofing to generate denials of service, hijack the target system, and otherwise disrupt the virtual network. Planning segmentation carefully lowers the chances of packet transmissions between virtual machine zones, which prevents sniffing attacks that require sending network traffic to the victim. Also, an attacker cannot use an insecure service in one virtual machine zone to access other virtual machine zones in the host. You can implement segmentation by using either of two approaches, each of which has different benefits. n Use separate physical network adapters for virtual machine zones to ensure that the zones are isolated. Maintaining separate physical network adapters for virtual machine zones is probably the most secure method and is less prone to misconfiguration after the initial segment creation. n Set up virtual local area networks (VLANs) to help safeguard your network. Because VLANs provide almost all of the security benefits inherent in implementing physically separate networks without the hardware overhead, they offer a viable solution that can save you the cost of deploying and maintaining additional devices, cabling, and so forth. VLANs are an IEEE standard networking scheme with specific tagging methods that allow routing of packets to only those ports that are part of the VLAN. When properly configured, VLANs provide a dependable means for you to protect a set of virtual machines from accidental or malicious intrusions. VLANs let you segment a physical network so that two machines in the network are unable to transmit packets back and forth unless they are part of the same VLAN. For example, accounting records and transactions are among a company’s most sensitive internal information. In a company whose sales, shipping, and accounting employees all use virtual machines in the same physical network, you might protect the virtual machines for the accounting department by setting up VLANs as shown in Figure 12-4. VMware, Inc. 159
  • 160. ESX Configuration Guide Figure 12-4. Sample VLAN Layout Host 1 vSwitch VM0 VM1 VM2 VLAN A Router Broadcast Host 2 VM3 VM4 VM5 Domain A vSwitch vSwitch Switch 1 VM6 VM7 VM8 VLAN B Broadcast Host 3 Domain B vSwitch VM9 VM10 VM11 Switch 2 Host 4 Multiple VLANs vSwitch on the same virtual switch VM12 VM13 VM14 VLAN VLAN VLAN B A B Broadcast Domains A and B In this configuration, all employees in the accounting department use virtual machines in VLAN A and the employees in sales use virtual machines in VLAN B. The router forwards packets containing accounting data to the switches. These packets are tagged for distribution to VLAN A only. Therefore, the data is confined to Broadcast Domain A and cannot be routed to Broadcast Domain B unless the router is configured to do so. This VLAN configuration prevents the sales force from intercepting packets destined for the accounting department. It also prevents the accounting department from receiving packets intended for the sales group. The virtual machines serviced by a single virtual switch can be in different VLANs. Security Considerations for VLANs The way you set up VLANs to secure parts of a network depends on factors such as the guest operating system and the way your network equipment is configured. ESX features a complete IEEE 802.1q-compliant VLAN implementation. VMware cannot make specific recommendations on how to set up VLANs, but there are factors to consider when using a VLAN deployment as part of your security enforcement policy. 160 VMware, Inc.
  • 161. Chapter 12 Securing an ESX Configuration VLANs as Part of a Broader Security Implementation VLANs are an effective means of controlling where and how widely data is transmitted within the network. If an attacker gains access to the network, the attack is likely to be limited to the VLAN that served as the entry point, lessening the risk to the network as a whole. VLANs provide protection only in that they control how data is routed and contained after it passes through the switches and enters the network. You can use VLANs to help secure Layer 2 of your network architecture —the data link layer. However, configuring VLANs does not protect the physical layer of your network model or any of the other layers. Even if you create VLANs, provide additional protection by securing your hardware (routers, hubs, and so forth) and encrypting data transmissions. VLANs are not a substitute for firewalls in your virtual machine configurations. Most network configurations that include VLANs also include firewalls. If you include VLANs in your virtual network, be sure that the firewalls that you install are VLAN-aware. Properly Configure VLANs Equipment misconfiguration and network hardware, firmware, or software defects can make a VLAN susceptible to VLAN-hopping attacks. VLAN hopping occurs when an attacker with authorized access to one VLAN creates packets that trick physical switches into transmitting the packets to another VLAN that the attacker is not authorized to access. Vulnerability to this type of attack usually results from a switch being misconfigured for native VLAN operation, in which the switch can receive and transmit untagged packets. To help prevent VLAN hopping, keep your equipment up to date by installing hardware and firmware updates as they become available. Also, follow your vendor’s best practice guidelines when you configure your equipment. VMware virtual switches do not support the concept of a native VLAN. All data passed on these switches is appropriately tagged. However, because other switches in the network might be configured for native VLAN operation, VLANs configured with virtual switches can still be vulnerable to VLAN hopping. If you plan to use VLANs to enforce network security, disable the native VLAN feature for all switches unless you have a compelling reason to operate some of your VLANs in native mode. If you must use native VLAN, see your switch vendor’s configuration guidelines for this feature. Create Separate Communications Between Management Tools and the Service Console Whether you use a management client or the command line, all configuration tasks for ESX are performed through the service console, including configuring storage, controlling aspects of virtual machine behavior, and setting up virtual switches or virtual networks. Because the service console is the point of control for ESX, safeguarding it from misuse is crucial. VMware ESX management clients use authentication and encryption to prevent unauthorized access to the service console. Other services might not offer the same protection. If attackers gain access to the service console, they are free to reconfigure many attributes of the ESX host. For example, they can change the entire virtual switch configuration or change authorization methods. Network connectivity for the service console is established through virtual switches. To provide better protection for this critical ESX component, isolate the service console by using one of the following methods: n Create a separate VLAN for management tool communication with the service console. n Configure network access for management tool connections with the service console through a single virtual switch and one or more uplink ports. VMware, Inc. 161
  • 162. ESX Configuration Guide Both methods prevent anyone without access to the service console VLAN or virtual switch from seeing traffic to and from the service console. They also prevent attackers from sending any packets to the service console. As an alternative, you can choose to configure the service console on a separate physical network segment instead. Physical segmentation provides a degree of additional security because it is less prone to later misconfiguration Set up a separate VLAN or virtual switch for vMotion and network attached storage. Virtual Switch Protection and VLANs VMware virtual switches provide safeguards against certain threats to VLAN security. Because of the way that virtual switches are designed, they protect VLANs against a variety of attacks, many of which involve VLAN hopping. Having this protection does not guarantee that your virtual machine configuration is invulnerable to other types of attacks. For example, virtual switches do not protect the physical network against these attacks; they protect only the virtual network. Virtual switches and VLANs can protect against the following types of attacks. MAC flooding Floods a switch with packets that contain MAC addresses tagged as having come from different sources. Many switches use a content-addressable memory (CAM) table to learn and store the source address for each packet. When the table is full, the switch can enter a fully open state in which every incoming packet is broadcast on all ports, letting the attacker see all of the switch’s traffic. This state might result in packet leakage across VLANs. Although VMware virtual switches store a MAC address table, they do not get the MAC addresses from observable traffic and are not vulnerable to this type of attack. 802.1q and ISL tagging Force a switch to redirect frames from one VLAN to another by tricking the attacks switch into acting as a trunk and broadcasting the traffic to other VLANs. VMware virtual switches do not perform the dynamic trunking required for this type of attack and, therefore, are not vulnerable. Double-encapsulation Occur when an attacker creates a double-encapsulated packet in which the attacks VLAN identifier in the inner tag is different from the VLAN identifier in the outer tag. For backward compatibility, native VLANs strip the outer tag from transmitted packets unless configured to do otherwise. When a native VLAN switch strips the outer tag, only the inner tag is left, and that inner tag routes the packet to a different VLAN than the one identified in the now-missing outer tag. VMware virtual switches drop any double-encapsulated frames that a virtual machine attempts to send on a port configured for a specific VLAN. Therefore, they are not vulnerable to this type of attack. Multicast brute-force Involve sending large numbers of multicast frames to a known VLAN almost attacks simultaneously to overload the switch so that it mistakenly allows some of the frames to broadcast to other VLANs. VMware virtual switches do not allow frames to leave their correct broadcast domain (VLAN) and are not vulnerable to this type of attack. 162 VMware, Inc.
  • 163. Chapter 12 Securing an ESX Configuration Spanning-tree attacks Target Spanning-Tree Protocol (STP), which is used to control bridging between parts of the LAN. The attacker sends Bridge Protocol Data Unit (BPDU) packets that attempt to change the network topology, establishing themselves as the root bridge. As the root bridge, the attacker can sniff the contents of transmitted frames. VMware virtual switches do not support STP and are not vulnerable to this type of attack. Random frame attacks Involve sending large numbers of packets in which the source and destination addresses stay the same, but in which fields are randomly changed in length, type, or content. The goal of this attack is to force packets to be mistakenly rerouted to a different VLAN. VMware virtual switches are not vulnerable to this type of attack. Because new security threats develop over time, do not consider this an exhaustive list of attacks. Regularly check VMware security resources on the Web to learn about security, recent security alerts, and VMware security tactics. Securing Virtual Switch Ports As with physical network adapters, a virtual network adapter can send frames that appear to be from a different machine or impersonate another machine so that it can receive network frames intended for that machine. Also, like physical network adapters, a virtual network adapter can be configured so that it receives frames targeted for other machines. When you create a virtual switch for your network, you add port groups to impose a policy configuration for the virtual machines and storage systems attached to the switch. You create virtual ports through the vSphere Client. As part of adding a port or port group to a virtual switch, the vSphere Client configures a security profile for the port. You can use this security profile to ensure that ESX prevents the guest operating systems for its virtual machines from impersonating other machines on the network. This security feature is implemented so that the guest operating system responsible for the impersonation does not detect that the impersonation was prevented. The security profile determines how strongly you enforce protection against impersonation and interception attacks on virtual machines. To correctly use the settings in the security profile, you must understand the basics of how virtual network adapters control transmissions and how attacks are staged at this level. Each virtual network adapter has its own MAC address assigned when the adapter is created. This address is called the initial MAC address. Although the initial MAC address can be reconfigured from outside the guest operating system, it cannot be changed by the guest operating system. In addition, each adapter has an effective MAC address that filters out incoming network traffic with a destination MAC address different from the effective MAC address. The guest operating system is responsible for setting the effective MAC address and typically matches the effective MAC address to the initial MAC address. When sending packets, an operating system typically places its own network adapter’s effective MAC address in the source MAC address field of the Ethernet frame. It also places the MAC address for the receiving network adapter in the destination MAC address field. The receiving adapter accepts packets only when the destination MAC address in the packet matches its own effective MAC address. Upon creation, a network adapter’s effective MAC address and initial MAC address are the same. The virtual machine’s operating system can alter the effective MAC address to another value at any time. If an operating system changes the effective MAC address, its network adapter receives network traffic destined for the new MAC address. The operating system can send frames with an impersonated source MAC address at any time. This means an operating system can stage malicious attacks on the devices in a network by impersonating a network adapter that the receiving network authorizes. VMware, Inc. 163
  • 164. ESX Configuration Guide You can use virtual switch security profiles on ESX hosts to protect against this type of attack by setting three options. If you change any default settings for a port, you must modify the security profile by editing virtual switch settings in the vSphere Client. MAC Address Changes The setting for the MAC Address Changes option affects traffic that a virtual machine receives. When the option is set to Accept, ESX accepts requests to change the effective MAC address to other than the initial MAC address. When the option is set to Reject, ESX does not honor requests to change the effective MAC address to anything other than the initial MAC address, which protects the host against MAC impersonation. The port that the virtual adapter used to send the request is disabled and the virtual adapter does not receive any more frames until it changes the effective MAC address to match the initial MAC address. The guest operating system does not detect that the MAC address change was not honored. NOTE The iSCSI initiator relies on being able to get MAC address changes from certain types of storage. If you are using ESX iSCSI and have iSCSI storage, set the MAC Address Changes option to Accept. In some situations, you might have a legitimate need for more than one adapter to have the same MAC address on a network—for example, if you are using Microsoft Network Load Balancing in unicast mode. When Microsoft Network Load Balancing is used in the standard multicast mode, adapters do not share MAC addresses. Forged Transmissions The setting for the Forged Transmits option affects traffic that is transmitted from a virtual machine. When the option is set to Accept, ESX does not compare source and effective MAC addresses. To protect against MAC impersonation, you can set this option to Reject. If you do, the host compares the source MAC address being transmitted by the operating system with the effective MAC address for its adapter to see if they match. If the addresses do not match, ESX drops the packet. The guest operating system does not detect that its virtual network adapter cannot send packets by using the impersonated MAC address. The ESX host intercepts any packets with impersonated addresses before they are delivered, and the guest operating system might assume that the packets are dropped. Promiscuous Mode Operation Promiscuous mode eliminates any reception filtering that the virtual network adapter would perform so that the guest operating system receives all traffic observed on the wire. By default, the virtual network adapter cannot operate in promiscuous mode. Although promiscuous mode can be useful for tracking network activity, it is an insecure mode of operation, because any adapter in promiscuous mode has access to the packets regardless of whether some of the packets are received only by a particular network adapter. This means that an administrator or root user within a virtual machine can potentially view traffic destined for other guest or host operating systems. NOTE In some situations, you might have a legitimate reason to configure a virtual switch to operate in promiscuous mode—for example, if you are running network intrusion detection software or a packet sniffer. 164 VMware, Inc.
  • 165. Chapter 12 Securing an ESX Configuration Internet Protocol Security Internet Protocol Security (IPsec) secures IP communications coming from and arriving at a host. ESX hosts support IPsec using IPv6. When you set up IPsec on a host, you enable authentication and encryption of incoming and outgoing packets. When and how IP traffic is encrypted is depends on how you set up the system's security associations and security policies A security association determines how the system encrypts traffic. When you create a security association, you specify the source and destination, encryption parameters, a name for the security association. A security policy determines when the system should encrypt traffic. The security policy includes source and destination information, the protocol and direction of traffic to be encrypted, the mode (transport or tunnel) and the security association to use. IPsec over IPv6 on the service console is unsupported. Add a Security Association Add a security association to specify encryption parameters for associated IP traffic. You can add a security association using the vSphere CLI. For information on using the vSphere CLI, see the vSphere Command-Line Interface Installation and Scripting Guide and the vSphere Command-Line Interface Reference. Procedure 1 Use the command esxcfg-ipsec --add-sa. 2 Specify the source address using --sa-src source address. 3 Specify the destination address using --sa-dst destination address. 4 Choose the mode, either transport or tunnel, using --sa-mode mode. 5 Provide the security parameter index using --spi security parameter index. The security parameter index identifies the security association to the host. It must be a hexadecimal with a 0x prefix. Each security association you create must have a unique combination of protocol and security parameter index. 6 Choose the encryption algorithm using --ealgo encryption algorithm. n 3des-cbc n aes128-cbc n null provides no encryption 7 Provide the encryption key using --ekey encryption key. You can enter keys as ASCII text or as a hexadecimal with a 0x prefix. 8 Choose the authentication algorithm, hmac-sha1 or hmac-sha2-256, using --ialgo authentication algorithm. 9 Provide the authentication key using --ikey authentication key. You can enter keys as ASCII text or as a hexadecimal with a 0x prefix. 10 Provide a name for the security association using name. VMware, Inc. 165
  • 166. ESX Configuration Guide Example 12-1. Example New Security Association Command The following example contains extra line breaks for readability. esxcfg-ipsec --add-sa --sa-src 3ffe:501:ffff:0::a --sa-dst 3ffe:501:ffff:0001:0000:0000:0000:0001 --sa-mode transport --spi 0x1000 --ealgo 3des-cbc --ekey 0x6970763672656164796c6f676f336465736362636f757432 --ialgo hmac-sha1 --ikey 0x6970763672656164796c6f67736861316f757432 sa1 Remove a Security Association You can remove a security association from the ESX host. You can remove a security association using the vSphere CLI. For information on using the vSphere CLI, see the vSphere Command-Line Interface Installation and Scripting Guide and the vSphere Command-Line Interface Reference. Prerequisites Be sure that the security association you want to use is not currently in use. If you try to remove a security association that is in use, the removal operation fails. Procedure u Use the command esxcfg-ipsec --remove-sa security association name. List Available Security Associations ESX can provide a list of all security associations available for use by security policies. The list includes both user created security associations and any security associations the VMkernel installed using Internet Key Exchange. You can get a list of available security associations using the vSphere CLI. For information on using the vSphere CLI, see the vSphere Command-Line Interface Installation and Scripting Guide and the vSphere Command-Line Interface Reference. Procedure u Use the command esxcfg-ipsec -l. ESX displays a list of all available security associations. Create a Security Policy Create a security policy to determine when to use the authentication and encryption parameters set in a security association. You can add a security policy using the vSphere CLI. For information on using the vSphere CLI, see the vSphere Command-Line Interface Installation and Scripting Guide and the vSphere Command-Line Interface Reference. Prerequisites Before creating a security policy, add a security association with the appropriate authentication and encryption parameters. 166 VMware, Inc.
  • 167. Chapter 12 Securing an ESX Configuration Procedure 1 Use the command esxcfg-ipsec --add-sp. 2 Specify the source IP address and prefix length using --sp-src source address. 3 Specify the destination address and prefix length using --sp-dst destination address. 4 Specify the source port using --src-port port. The source port must be a number between 0 and 65535. 5 Specify the destination port using --dst-port port. The destination port must be a number between 0 and 65535. 6 Choose the upper layer protocol using --ulproto protocol. n tcp n udp n icmp6 n any 7 Choose the direction, in or out, in which you want to monitor traffic using --dir direction. 8 Specify the action to take when traffic with the specified parameters is encountered using --action action. Option Description none Take no action. discard Do not allow data in or out. ipsec Use the authentication and encryption information supplied in the security association to determine whether the data comes from a trusted source. 9 Choose the mode, either tunnel or transport, using --sp-mode mode. 10 Specify the security association for this security policy to use using --sa-name security association name. 11 Specify the name of the security policy by using name. Example 12-2. Example New Security Policy Command The following example includes extra line breaks for readability. esxcfg-ipsec --add-sp --sp-src 2001:db8:1::/64 --sp-dst 2002:db8:1::/64 --src-port 23 --dst-port 25 --ulproto tcp --dir out --action ipsec --sp-mode transport --sa-name sa1 sp1 VMware, Inc. 167
  • 168. ESX Configuration Guide Remove a Security Policy You can remove a security policy from the ESX host. You can remove a security policy using the vSphere CLI. For information on using the vSphere CLI, see the vSphere Command-Line Interface Installation and Scripting Guide and the vSphere Command-Line Interface Reference. Prerequisites Be sure that the security policy you want to use is not currently in use. If you try to remove a security policy that is in use, the removal operation fails. Procedure u Use the command esxcfg-ipsec --remove-sp security policy name. List Available Security Policies ESX can provide a list of all security policies on the host. You can get a list of available security policies using the vSphere CLI. For information on using the vSphere CLI, see the vSphere Command-Line Interface Installation and Scripting Guide and the vSphere Command-Line Interface Reference. Procedure u Use the command esxcfg-ipsec -L. ESX displays a list of all available security policies. Securing iSCSI Storage The storage you configure for an ESX host might include one or more storage area networks (SANs) that use iSCSI. When you configure iSCSI on an ESX host, you can take several measures to minimize security risks. iSCSI is a means of accessing SCSI devices and exchanging data records by using TCP/IP over a network port rather than through a direct connection to a SCSI device. In iSCSI transactions, blocks of raw SCSI data are encapsulated in iSCSI records and transmitted to the requesting device or user. iSCSI SANs let you make efficient use of existing Ethernet infrastructures to provide ESX hosts access to storage resources that they can dynamically share. iSCSI SANs provide an economical storage solution for environments that rely on a common storage pool to serve numerous users. As with any networked system, your iSCSI SANs can be subject to security breaches. NOTE The requirements and procedures for securing an iSCSI SAN are similar for the hardware iSCSI adapters you can use with ESX hosts and for iSCSI configured directly through the ESX host. Securing iSCSI Devices Through Authentication One means of securing iSCSI devices from unwanted intrusion is to require that the ESX host, or initiator, be authenticated by the iSCSI device, or target, whenever the host attempts to access data on the target LUN. The goal of authentication is to prove that the initiator has the right to access a target, a right granted when you configure authentication. ESX does not support Kerberos, Secure Remote Protocol (SRP), or public-key authentication methods for iSCSI. Additionally, it does not support IPsec authentication and encryption. Use the vSphere Client to determine whether authentication is being performed and to configure the authentication method. 168 VMware, Inc.
  • 169. Chapter 12 Securing an ESX Configuration Enabling Challenge Handshake Authentication Protocol (CHAP) for iSCSI SANs You can configure the iSCSI SAN to use CHAP authentication. In CHAP authentication, when the initiator contacts an iSCSI target, the target sends a predefined ID value and a random value, or key, to the initiator. The initiator creates a one-way hash value that it sends to the target. The hash contains three elements: a predefined ID value, the random value that the target sends, and a private value, or CHAP secret, that the initiator and target share. When the target receives the hash from the initiator, it creates its own hash value by using the same elements and compares it to the initiator’s hash. If the results match, the target authenticates the initiator. ESX supports unidirectional and bidirectional CHAP authentication for iSCSI. In unidirectional CHAP authentication, the target authenticates the initiator, but the initiator does not authenticate the target. In bidirectional CHAP authentication, an additional level of security enables the initiator to authenticate the target. ESX supports CHAP authentication at the adapter level, when only one set of authentication credentials can be sent from the host to all targets. It also supports per-target CHAP authentication, which enables you to configure different credentials for each target to achieve greater target refinement. See “Configuring CHAP Parameters for iSCSI Adapters,” on page 99 for information about how to work with CHAP. Disabling iSCSI SAN Authentication You can configure the iSCSI SAN to use no authentication. Communications between the initiator and target are still authenticated in a rudimentary way because the iSCSI target devices are typically set up to communicate with specific initiators only. Choosing not to enforce more stringent authentication can make sense if your iSCSI storage is housed in one location and you create a dedicated network or VLAN to service all your iSCSI devices. The iSCSI configuration is secure because it is isolated from any unwanted access, much as a Fibre Channel SAN is. As a basic rule, disable authentication only if you are willing to risk an attack to the iSCSI SAN or cope with problems that result from human error. See “Configuring CHAP Parameters for iSCSI Adapters,” on page 99 for information about how to work with CHAP. Protecting an iSCSI SAN When you plan your iSCSI configuration, take measures to improve the overall security of the iSCSI SAN. Your iSCSI configuration is only as secure as your IP network, so by enforcing good security standards when you set up your network, you help safeguard your iSCSI storage. The following are some specific suggestions for enforcing good security standards. Protect Transmitted Data A primary security risk in iSCSI SANs is that an attacker might sniff transmitted storage data. Take additional measures to prevent attackers from easily seeing iSCSI data. Neither the hardware iSCSI adapter nor the ESX host iSCSI initiator encrypts the data that they transmit to and from the targets, making the data more vulnerable to sniffing attacks. Allowing your virtual machines to share virtual switches and VLANs with your iSCSI configuration potentially exposes iSCSI traffic to misuse by a virtual machine attacker. To help ensure that intruders cannot listen to iSCSI transmissions, make sure that none of your virtual machines can see the iSCSI storage network. VMware, Inc. 169
  • 170. ESX Configuration Guide If you use a hardware iSCSI adapter, you can accomplish this by making sure that the iSCSI adapter and ESX physical network adapter are not inadvertently connected outside the host by virtue of sharing a switch or some other means. If you configure iSCSI directly through the ESX host, you can accomplish this by configuring iSCSI storage through a different virtual switch than the one used by your virtual machines, as shown in Figure 12-5. Figure 12-5. iSCSI Storage on a Separate Virtual Switch In addition to protecting the iSCSI SAN by giving it a dedicated virtual switch, you can configure your iSCSI SAN on its own VLAN to improve performance and security. Placing your iSCSI configuration on a separate VLAN ensures that no devices other than the iSCSI adapter have visibility into transmissions within the iSCSI SAN. Also, network congestion from other sources cannot interfere with iSCSI traffic. Secure iSCSI Ports When you run iSCSI devices, the ESX host does not open any ports that listen for network connections. This measure reduces the chances that an intruder can break into the ESX host through spare ports and gain control over the host. Therefore, running iSCSI does not present any additional security risks at the ESX host end of the connection. Any iSCSI target device that you run must have one or more open TCP ports to listen for iSCSI connections. If any security vulnerabilities exist in the iSCSI device software, your data can be at risk through no fault of ESX. To lower this risk, install all security patches that your storage equipment manufacturer provides and limit the devices connected to the iSCSI network. 170 VMware, Inc.
  • 171. Authentication and User Management 13 ESX handles user authentication and supports user and group permissions. In addition, you can encrypt connections to the vSphere Client and SDK. This chapter includes the following topics: n “Securing ESX Through Authentication and Permissions,” on page 171 n “About Users, Groups, Permissions, and Roles,” on page 172 n “Working with Users and Groups on ESX Hosts,” on page 176 n “Encryption and Security Certificates for ESX,” on page 181 Securing ESX Through Authentication and Permissions When a vSphere Client or vCenter Server user connects to a ESX host, a connection is established with the VMware Host Agent process. The process uses the user names and passwords for authentication. ESX uses the Pluggable Authentication Modules (PAM) structure for authentication when users access the ESX host using the vSphere Client, vSphere Web Access, or the service console. The PAM configuration for VMware services is located in /etc/pam.d/vmware-authd, which stores paths to authentication modules. The default installation of ESX uses /etc/passwd authentication as Linux does, but you can configure ESX to use another distributed authentication mechanism. If you plan to use a third-party authentication tool instead of the ESX default implementation, see the vendor documentation for instructions. As part of setting up third- party authentication, you might be required to update the files in /etc/pam.d folder with new module information. The reverse proxy in the VMware Host Agent (vmware-hostd) process listens on ports 80 and 443. vSphere Client or vCenter Server users connect to the host agent through these ports. The vmware-hostd process receives the user name and password from the client and forwards them to the PAM module to perform the authentication. Figure 13-1 shows a basic example of how ESX authenticates transactions from the vSphere Client. NOTE CIM transactions also use ticket-based authentication in connecting with the vmware-hostd process. VMware, Inc. 171
  • 172. ESX Configuration Guide Figure 13-1. Authentication for vSphere Client Communications with ESX vSphere Client management functions console user name/password ticket-based authentication authentication ESX service console VMkernel vmware-hostd virtual machine vmkauthd ESX authentication transactions with vSphere Web Access and third-party network management clients are also direct interactions with the vmware-hostd process. To make sure that authentication works efficiently for your site, perform basic tasks such as setting up users, groups, permissions, and roles, configuring user attributes, adding your own certificates, and determining whether you want to use SSL. About Users, Groups, Permissions, and Roles vCenter Server and ESX hosts use a combination of user name, password, and permissions to authenticate a user for access and authorize activities. You can control access to hosts, clusters, datastores, resource pools, networking port groups, and virtual machines by assigning permissions. Access to an ESX host and its resources is granted when a known user with appropriate permissions logs in to the host with a correct password. vCenter Server uses a similar approach when determining whether to grant access to a user. vCenter Server and ESX hosts deny access under the following circumstances: n A user not in the user list attempts to log in. n A user enters the wrong password. n A user is in the list but was not assigned permissions. n A user who successfully logged in attempts operations that they do not have permission to perform. As part of managing ESX hosts and vCenter Server, you must plan how to handle particular types of users and permissions. ESX and vCenter Server use sets of privileges, or roles, to control which operations individual users or groups can perform. Predefined roles are provided, but you can also create new ones. You can manage users more easily by assigning them to groups. When you apply a role to the group, all users in the group inherit the role. The topics in this section apply to local users and groups. You can also use Active Directory to manage users and groups for ESX. 172 VMware, Inc.
  • 173. Chapter 13 Authentication and User Management Understanding Users A user is an individual authorized to log in to either an ESX host or vCenter Server. ESX users fall into two categories: those who can access the host through vCenter Server and those who can access by directly logging in to the host from the vSphere Client, vSphere Web Access, a third-party client, or a command shell. Authorized vCenter Authorized users for vCenter Server are those included in the Windows Server users domain list that vCenter Server references or are local Windows users on the vCenter Server host. You cannot use vCenter Server to manually create, remove, or otherwise change users. You must use the tools for managing your Windows domain. Any changes you make are reflected in vCenter Server. However, the user interface does not provide a user list for you to review. Direct-access users Users authorized to work directly on an ESX host are those added to the internal user list by a system administrator. An administrator can perform a variety of management activities for these users, such as changing passwords, group memberships, and permissions as well as adding and removing users. The user list that ESX maintains locally is separate from the users known to vCenter Server, which are either local Windows users or users that are part of the Windows domain. Even if the lists appear to have common users (for instance, a user called devuser), treat these users separately. If you log in to vCenter Server as devuser, you might have permission to view and delete files from a datastore, whereas if you log in to an ESX host as devuser, you might not. If Active Directory authentication has been configured on the host, then the same Windows domain users known to vCenter Server will be available on the ESX host. Because of the confusion that duplicate naming can cause, check the vCenter Server user list before you create ESX host users to avoid duplicating names. To check for vCenter Server users, review the Windows domain list. Understanding Groups A group is a set of users that share a common set of rules and permissions. When you assign permissions to a group, all users in the group inherit them, and you do not have to work with the user profiles individually. As an administrator, decide how to structure groups to achieve your security and usage goals. For example, three part-time sales team members work different days, and you want them to share a single virtual machine but not use the virtual machines belonging to sales managers. In this case, you might create a group called SalesShare that includes the three sales people and give the group permission to interact with only one object, the shared virtual machine. They cannot perform any actions on the sales managers’ virtual machines. The group lists in vCenter Server and an ESX host are drawn from the same sources as their respective user lists. The group lists in vCenter Server are drawn from the local users or any trusted domain, and the group lists for an ESX host are drawn from the local user list or from any trusted Windows domain. Understanding Password Requirements By default, ESX enforces requirements for user passwords. When you create a password, include a mix of characters from four character classes: lowercase letters, uppercase letters, numbers, and special characters such as an underscore or dash. VMware, Inc. 173
  • 174. ESX Configuration Guide Your user password must meet the following length requirements. n Passwords containing characters from one or two character classes must be at least eight characters long. n Passwords containing characters from three character classes must be at least seven characters long. n Passwords containing characters from all four character classes must be at least six characters long. NOTE An uppercase character that begins a password does not count toward the number of character classes used. A number that ends a password does not count toward the number of character classes used. You can also use a passphrase, which is a phrase consisting of at least three words, each of which is 8 to 40 characters long. Example 13-1. Sample Passwords The following password candidates meet the requirements of ESX. n xQaTEhbU: Contains eight characters from two character classes. n xQaT3pb: Contains seven characters from three character classes. n xQaT3#: Contains six characters from four character classes. The following password candidates do not meet the requirements of ESX. n Xqat3hb: Begins with an uppercase character, reducing the effective number of character classes to two. Eight characters are required when you use only two character classes. n xQaTEh2: Ends with a number, reducing the effective number of character classes to two. Eight characters are required when you use only two character classes. Understanding Permissions For ESX and vCenter Server, permissions are defined as access roles that consist of a user and the user’s assigned role for an object such as a virtual machine or ESX host. Most vCenter Server and ESX users have limited ability to manipulate the objects associated with the host. Users with the Administrator role have full access rights and permissions on all virtual objects such as datastores, hosts, virtual machines, and resource pools. By default, the Administrator role is granted to the root user. If vCenter Server manages the host, vpxuser is also an Administrator user. The list of privileges is the same for both ESX and vCenter Server, and you use the same method to configure permissions. You can create roles and set permissions through a direct connection to the ESX host. Because these tasks are widely performed in vCenter Server, see the VMware vSphere Datacenter Administration Guide for information on working with permissions and roles. Assigning root User Permissions Root users can only perform activities on the specific ESX host that they are logged in to. For security reasons, you might not want to use the root user in the Administrator role. In this case, you can change permissions after installation so that the root user no longer has administrative privileges or you can delete the root user’s access permissions altogether through the vSphere Client as described in the VMware vSphere Datacenter Administration Guide. If you do so, you must first create another permission at the root level that has a different user assigned to the Administrator role. Assigning the Administrator role to a different user helps you maintain security through traceability. The vSphere Client logs all actions that the Administrator role user initiates as events, providing you with an audit trail. If all administrators log in as the root user, you cannot tell which administrator performed an action. If you create multiple permissions at the root level—each associated with a different user or user group—you can track the actions of each administrator or administrative group. 174 VMware, Inc.
  • 175. Chapter 13 Authentication and User Management After you create an alternative Administrator user, you can assign a different role to the root user. To manage the host using vCenter server, the new user you created must have full Administrator privileges on the host. NOTE vicfg commands do not perform an access check. Therefore, even if you limit the root user’s privileges, it does not affect what that user can do using the command-line interface commands. Understanding vpxuser Permissions The vpxuser permission is used for vCenter Server when managing activities for the host. The vpxuser is created when an ESX host is attached to vCenter Server. vCenter Server has Administrator privileges on the host that it manages. For example, vCenter Server can move virtual machines to and from hosts and perform configuration changes needed to support virtual machines. The vCenter Server administrator can perform most of the same tasks on the host as the root user and also schedule tasks, work with templates, and so forth. However, the vCenter Server administrator cannot directly create, delete, or edit users and groups for ESX hosts. These tasks can only be performed by a user with Administrator permissions directly on each ESX host. NOTE You cannot manage the vpxuser using Active Directory. CAUTION Do not change vpxuser in any way and do not change its permissions. If you do so, you might experience problems in working with ESX hosts through vCenter Server. Understanding Roles vCenter Server and ESX grant access to objects only to users who are assigned permissions for the object. When you assign a user or group permissions for the object, you do so by pairing the user or group with a role. A role is a predefined set of privileges. ESX hosts provide three default roles, and you cannot change the privileges associated with these roles. Each subsequent default role includes the privileges of the previous role. For example, the Administrator role inherits the privileges of the Read Only role. Roles you create yourself do not inherit privileges from any of the default roles. You can create custom roles by using the role-editing facilities in the vSphere Client to create privilege sets that match your user needs. If you use the vSphere Client connected to vCenter Server to manage your ESX hosts, you have additional roles to choose from in vCenter Server. Also, the roles you create directly on an ESX host are not accessible within vCenter Server. You can work with these roles only if you log in to the host directly from the vSphere Client. If you manage ESX hosts through vCenter Server, maintaining custom roles in the host and vCenter Server can result in confusion and misuse. In this type of configuration, maintain custom roles only in vCenter Server. You can create roles and set permissions through a direct connection to the ESX host. Because most users create roles and set permissions in vCenter Server, see the VMware vSphere Datacenter Administration Guide for information on working with permissions and roles. Assigning the No Access Role Users assigned the No Access role for an object cannot view or change the object in any way. New users and groups are assigned this role by default. You can change the role on an object-by-object basis. The root user and vpxuser permissions are the only users not assigned the No Access role by default. Instead, they are assigned the Administrator role. You can delete the root user’s permissions altogether or change its role to No Access as long as you first create a replacement permission at the root level with the Administrator role and associate this role with a different user. VMware, Inc. 175
  • 176. ESX Configuration Guide Assigning the Read Only Role Users assigned the Read Only role for an object are allowed to view the state of the object and details about the object. With this role, a user can view virtual machine, host, and resource pool attributes. The user cannot view the remote console for a host. All actions through the menus and toolbars are disallowed. Assigning the Administrator Role Users assigned the Administrator role for an object are allowed to view and perform all actions on the object. This role also includes all permissions inherent in the Read Only role. If you are acting in the Administrator role on an ESX host, you can grant permissions to individual users and groups on that host. If you are acting in the Administrator role in vCenter Server, you can grant permissions to any user or group included in the Windows domain list that vCenter Server references. vCenter Server registers any selected Windows domain user or group through the process of assigning permissions. By default, all users who are members of the local Windows Administrators group on vCenter Server are granted the same access rights as any user assigned to the Administrator role. Users who are members of the Administrators group can log in as individuals and have full access. Users who are in the Active Directory group ESX Admins are automatically assigned the Administrator role. For security reasons, consider removing the Windows Administrators group from the Administrator role. You can change permissions after installation. Alternately, you can use the vSphere Client to delete the Windows Administrators group access permissions, but you must first create another permission at the root level that has a different user assigned to the Administrator role. Working with Users and Groups on ESX Hosts If you are directly connected to an ESX host through the vSphere Client, you can create, edit, and delete users and groups. These users and groups are visible in the vSphere Client whenever you log in to the ESX host, but are not available if you log in to vCenter Server. The topics in this section apply to local users and groups. You can also use Active Directory to manage users and groups for ESX. View, Sort, and Export a List of Users and Groups You can view, sort, and export lists of ESX users and groups to a file that is in HTML, XML, Microsoft Excel, or CSV format. Procedure 1 Log in to the host using the vSphere Client. 2 Click the Users & Groups tab and click Users or Groups. 3 Determine how to sort the table, and hide or show columns according to the information you want to see in the exported file. n To sort the table by any of the columns, click the column heading. n To show or hide columns, right-click any of the column headings and select or deselect the name of the column to hide. n To show or hide columns, right-click any of the column headings and select or deselect the name of the column to hide. 4 Right-click anywhere in the table and click Export List to open the Save As dialog box. 176 VMware, Inc.
  • 177. Chapter 13 Authentication and User Management 5 Select a path and enter a filename. 6 Select the file type and click OK. Add a User to the Users Table Adding a user to the users table updates the internal user list that ESX maintains. Prerequisites Review the password requirements described in “Understanding Password Requirements,” on page 173. Procedure 1 Log in to the host using the vSphere Client. 2 Click the Users & Groups tab and click Users. 3 Right-click anywhere in the Users table and click Add to open the Add New User dialog box. 4 Enter a login, a user name, a numeric user ID (UID), and a password. n Specifying the user name and UID are optional. If you do not specify the UID, the vSphere Client assigns the next available UID. n Create a password that meets the length and complexity requirements. The host checks for password compliance using the default authentication plug-in, pam_passwdqc.so. If the password is not compliant, the following error appears: A general system error occurred: passwd: Authentication token manipulation error. n If you switched to the pam_cracklib.so authentication plug-in, password compliance is not enforced. 5 To allow a user to access the ESX host through a command shell, select Grant shell access to this user. NOTE To be granted shell access, users must also have an Administrator role for an inventory object on the host. In general, do not grant shell access unless the user has a justifiable need. Users that access the host only through the vSphere Client do not need shell access. 6 To add the user to a group, select the group name from the Group drop-down menu and click Add. 7 Click OK. Modify the Settings for a User You can change the user ID, user name, password, and group settings for a user. You can also grant a user shell access. Prerequisites Review the password requirements as described in “Understanding Password Requirements,” on page 173. Procedure 1 Log in to the host using the vSphere Client. 2 Click the Users & Groups tab and click Users. 3 Right-click the user and click Edit to open the Edit User dialog box. 4 To change the user ID, enter a numeric user UID in the UID text box. The vSphere Client assigns the UID when you first create the user. In most cases, you do not have to change this assignment. VMware, Inc. 177
  • 178. ESX Configuration Guide 5 Enter a new user name. 6 To change the user’s password, select Change Password and enter the new password. n Create a password that meets the length and complexity requirements. The host checks for password compliance using the default authentication plug-in, pam_passwdqc.so. If the password is not compliant, the following error appears: A general system error occurred: passwd: Authentication token manipulation error. n If you switched to the pam_cracklib.so authentication plug-in, password compliance is not enforced. 7 To change the user’s ability to access the ESX host through a command shell, select or deselect Grant shell access to this user. NOTE To be granted shell access, users must also have an Administrator role for an inventory object on the host. In general, do not grant shell access unless the user has a justifiable need. Users that access the host only through the vSphere Client do not need shell access. 8 To add the user to a group, select the group name from the Group drop-down menu and click Add. 9 To remove the user from a group, select the group name from the Group membership box and click Remove. 10 Click OK. Remove a User or Group You can remove a user or group from the ESX host. CAUTION Do not remove the root user. If you remove a user from the host, they lose permissions to all objects on the host and cannot log in again. NOTE Users who are logged in and are removed from the domain keep their host permissions until you restart the host. Removing a group does not affect the permissions granted individually to the users in that group or permissions granted as part of inclusion in another group. Procedure 1 Log in to the host using the vSphere Client. 2 Click the Users & Groups tab and click Users or Groups. 3 Right-click the user or group to remove and select Remove. Add a Group to the Groups Table Adding a group to the ESX groups table updates the internal group list maintained by the host. Procedure 1 Log in to the host using the vSphere Client. 2 Click the Users & Groups tab and click Groups. 3 Right-click anywhere in the Groups table and click Add to open the Create New Group dialog box. 178 VMware, Inc.
  • 179. Chapter 13 Authentication and User Management 4 Enter a group name and numeric group ID (GID) in the Group ID text box. Specifying the GID is optional. If you do not specify a GID, the vSphere Client assigns the next available group ID. 5 For each user that you want to add as a group member, select the user name from the list and click Add. 6 Click OK. Add or Remove Users from a Group You can add or remove a user from a group in the groups table. Procedure 1 Log in to the host using the vSphere Client. 2 Click the Users & Groups tab and click Groups. 3 Right-click the group to modify and select Properties to open the Edit Group dialog box. 4 To add the user to a group, select the group name from the Group drop-down menu and click Add. 5 To remove the user from a group, select the group name from the Group membership box and click Remove. 6 Click OK. Configure a Host to Use a Directory Service You can configure the ESX host to use a directory service such as Active Directory to manage users and groups. Prerequisites Verify that you have set up an Active Directory domain. Refer to your directory server documentation. Procedure 1 Ensure that the host name of ESX is fully qualified with the domain name of the Active Directory forest. fully qualified domain name = host_name.domain_name 2 Synchronize the time between ESX and the directory service system using your preferred method. To use NTP, perform the following steps. a In the vSphere Client, select the host in the inventory. b Click the Configuration tab and click Time Configuration. c Click the Properties link at the top right of the panel. d Set the time and date. e Select NTP Client Enabled to open the service console firewall ports that the NTP service uses. 3 Ensure that the DNS servers you configured for the host can resolve the host names for the Active Directory controllers. You can use the vSphere Client DNS and Routing Configuration dialog box to modify host name and DNS server information for the host. a In the vSphere Client, select the host in the inventory. b Click the Configuration tab and click DNS and Routing. c Click the Properties link at the top right of the panel to access the DNS and Routing Configuration dialog box. VMware, Inc. 179
  • 180. ESX Configuration Guide What to do next Join a directory service domain using the vSphere Client. Add a Host to a Directory Service Domain To use a directory service, you must join the host to the directory service domain. You can enter the domain name in one of two ways: n name.tld (for example, domain.com): The account is created under the default container. n name.tld/container/path (for example, domain.com/OU1/OU2): The account is created under a particular organizational unit (OU). Prerequisites Verify that the vSphere Client is connected to a vCenter Server system or to the host. Procedure 1 Select a host in the vSphere Client inventory, and click the Configuration tab. 2 Under Software, select Authentication Services and click Properties. 3 In the Directory Services Configuration dialog box, select the type of authentication from the drop-down menu. Option Description If you select Active Directory Enter a domain in the form of name.tld or name.tld/container/path and click Join Domain. If the host is already using a Select Leave Domain to leave the domain and join another. directory service 4 Enter the user name and password of an Active Directory user who has permissions to join the host to the domain, and click OK. 5 Click OK to close the Directory Services Configuration dialog box. Use Host Profiles to Apply Permissions to Hosts When you join a host to an Active Directory domain, you must define roles on the host for a user or group in that domain. Otherwise, the host is not accessible to Active Directory users or groups. You can use host profiles to set a required role for a user or group and to apply the change to one or more hosts. Prerequisites You must have an existing host profile. See “Creating a Host Profile,” on page 218. Verify that the hosts to which you apply a profile are in maintenance mode. Procedure 1 Using the vSphere Client, select View > Management > Host Profiles. 2 Right-click an existing host profile and select Edit Profile. 3 Expand the profile tree, and then expand Security configuration. 4 Right-click the Permission rules folder and select Add Profile. 5 Expand Permission rules and select Permission. 6 On the Configuration Details tab in the right pane, click the Configure a permission drop-down menu and select Require a Permission Rule. 180 VMware, Inc.
  • 181. Chapter 13 Authentication and User Management 7 Enter the name of a user and group. Use the format DOMAINname, where DOMAIN is the name of the Active Directory domain and name is the user name or group name. 8 (Optional) If the name you entered is a group (not a single user), select the Name refers to a group of users check box. 9 Enter the assigned role name for the user or group (usually Admin). The role name is case-sensitive. If this is a system role, you must use the nonlocalized role name. For example, for the Administrator role, enter Admin. For the Read-only role, enter ReadOnly. 10 Select the Propagate permission check box and click OK. What to do next 1 Attach the profile to the hosts as described in “Attach Entities from the Host,” on page 222. 2 Apply the profile to the hosts as described in “Apply a Profile from the Host,” on page 223. Encryption and Security Certificates for ESX ESX supports SSL v3 and TLS v1, generally referred to here as SSL. If SSL is enabled, data is private, protected, and cannot be modified in transit without detection. All network traffic is encrypted as long as the following conditions are true: n You did not change the Web proxy service to allow unencrypted traffic for the port. n Your service console firewall is configured for medium or high security. Host certificate checking is enabled by default and SSL certificates are used to encrypt network traffic. However, ESX uses automatically generated certificates that are created as part of the installation process and stored on the host. These certificates are unique and make it possible to begin using the server, but they are not verifiable and are not signed by a trusted-well-known certificate authority (CA). These default certificates are vulnerable to possible man-in-the-middle attacks. To receive the full benefit of certificate checking, particularly if you intend to use encrypted remote connections externally, install new certificates that are signed by a valid internal certificate authority or purchase a certificate from a trusted security authority. NOTE If the self-signed certificate is used, clients receive a warning about the certificate. To address this issue, install a certificate that is signed by a recognized certificate authority. If CA-signed certificates are not installed, all communication between vCenter Server and vSphere Clients is encrypted using a self-signed certificate. These certificates do not provide the authentication security you might need in a production environment. The default location for your certificate is /etc/vmware/ssl/ on the ESX host. The certificate consists of two files: the certificate itself (rui.crt) and the private-key file (rui.key). Enable Certificate Checking and Verify Host Thumbprints To prevent man-in-the-middle attacks and to fully use the security that certificates provide, certificate checking is enabled by default. You can verify that certificate checking is enabled in the vSphere Client. NOTE vCenter Server certificates are preserved across upgrades. Procedure 1 Log in to a vCenter Server system using the vSphere Client. 2 Select Administration > vCenter Server Settings. VMware, Inc. 181
  • 182. ESX Configuration Guide 3 Click SSL Settings in the left pane and verify that Check host certificates is selected. 4 If there are hosts that require manual validation, compare the thumbprints listed for the hosts to the thumbprints in the host console. To obtain the host thumbprint for ESX, run the following command. openssl x509 -in /etc/vmware/ssl/rui.crt -fingerprint -sha1 -noout 5 If the thumbprint matches, select the Verify check box next to the host. Hosts that are not selected will be disconnected after you click OK. 6 Click OK. Generate New Certificates for the ESX Host The ESX host generates certificates the first time the system is started. Under certain circumstances, you might be required to force the host to generate new certificates. You typically generate new certificates only if you change the host name or accidentally delete the certificate. Each time you restart the vmware-hostd process, the mgmt-vmware script searches for existing certificate files (rui.crt and rui.key). If it cannot find them, it generates new certificate files. Procedure 1 In the directory /etc/vmware/ssl, back up any existing certificates by renaming them using the following commands. mv rui.crt orig.rui.crt mv rui.key orig.rui.key NOTE If you are regenerating certificates because you accidentally deleted them, you are not required to rename them. 2 Use the following command to restart the vmware-hostd process. service mgmt-vmware restart 3 Confirm that the ESX host successfully generated new certificates by using the following command and comparing the time stamps of the new certificate files with orig.rui.crt and orig.rui.key. ls -la Replace a Default Certificate with a CA-Signed Certificate The ESX host uses automatically generated certificates that are created as part of the installation process. These certificates are unique and make it possible to begin using the server, but they are not verifiable and they are not signed by a trusted, well-known certificate authority (CA). Using default certificates might not comply with the security policy of your organization. If you require a certificate from a trusted certificate authority, you can replace the default certificate. NOTE If the host has Verify Certificates enabled, replacing the default certificate might cause vCenter Server to stop managing the host. If the new certificate is not verifiable by vCenter Server, you must reconnect the host using the vSphere Client. 182 VMware, Inc.
  • 183. Chapter 13 Authentication and User Management Procedure 1 Log in to the service console and acquire root privileges. 2 In the directory /etc/vmware/ssl, rename the existing certificates using the following commands. mv rui.crt orig.rui.crt mv rui.key orig.rui.key 3 Copy the new certificate and key to /etc/vmware/ssl. 4 Rename the new certificate and key to rui.crt and rui.key. 5 Restart the vmware-hostd process for the certificates to take effect. service mgmt-vmware restart Configure SSL Timeouts You can configure SSL timeouts for ESX. Timeout periods can be set for two types of idle connections: n The Read Timeout setting applies to connections that have completed the SSL handshake process with port 443 of ESX. n The Handshake Timeout setting applies to connections that have not completed the SSL handshake process with port 443 of ESX. Both connection timeouts are set in milliseconds. Idle connections are disconnected after the timeout period. By default, fully established SSL connections have a timeout of infinity. Procedure 1 Log in to the service console and acquire root privileges. 2 Change to the directory /etc/vmware/hostd/. 3 Use a text editor to open the config.xml file. 4 Enter the <readTimeoutMs> value in milliseconds. For example, to set the Read Timeout to 20 seconds, enter the following command. <readTimeoutMs>20000</readTimeoutMs> 5 Enter the <handshakeTimeoutMs> value in milliseconds. For example, to set the Handshake Timeout to 20 seconds, enter the following command. <handshakeTimeoutMs>20000</handshakeTimeoutMs> 6 Save your changes and close the file. 7 Enter the following command to restart the vmware-hostd process. service mgmt-vmware restart VMware, Inc. 183
  • 184. ESX Configuration Guide Example 13-2. Configuration File The following section from the file /etc/vmware/hostd/config.xml shows where to enter the SSL timeout settings. <vmacore> ... <http> <readTimeoutMs>20000</readTimeoutMs> </http> ... <ssl> ... <handshakeTimeoutMs>20000</handshakeTimeoutMs> ... </ssl> </vmacore> Modifying ESX Web Proxy Settings When you modify Web proxy settings, you have several encryption and user security guidelines to consider. NOTE Restart the vmware-hostd process after making any changes to host directories or authentication mechanisms by entering the command service mgmt-vmware restart. n Do not set up certificates using pass phrases. ESX does not support pass phrases, also known as encrypted keys. If you set up a pass phrase, ESX processes cannot start correctly. n You can configure the Web proxy so that it searches for certificates in a location other than the default location. This capability proves useful for companies that prefer to centralize their certificates on a single machine so that multiple hosts can use the certificates. CAUTION If certificates are not stored locally on the host—for example, if they are stored on an NFS share —the host cannot access those certificates if ESX loses network connectivity. As a result, a client connecting to the host cannot successfully participate in a secure SSL handshake with the host. n To support encryption for user names, passwords, and packets, SSL is enabled by default for vSphere Web Access and vSphere Web services SDK connections. To configure these connections so that they do not encrypt transmissions, disable SSL for your vSphere Web Access connection or vSphere Web Services SDK connection by switching the connection from HTTPS to HTTP. Consider disabling SSL only if you created a fully trusted environment for these clients, where firewalls are in place and transmissions to and from the host are fully isolated. Disabling SSL can improve performance, because you avoid the overhead required to perform encryption. n To protect against misuse of ESX services, such as the internal Web server that hosts vSphere Web Access, most internal ESX services are accessible only through port 443, the port used for HTTPS transmission. Port 443 acts as a reverse proxy for ESX. You can see a list of services on ESX through an HTTP welcome page, but you cannot directly access these services without proper authorization. You can change this configuration so that individual services are directly accessible through HTTP connections. Do not make this change unless you are using ESX in a fully trusted environment. n When you upgrade vCenter Server and vSphere Web Access, the certificate remains in place. If you remove vCenter Server and vSphere Web Access, the certificate directory is not removed from the service console. 184 VMware, Inc.
  • 185. Chapter 13 Authentication and User Management Configure the Web Proxy to Search for Certificates in Nondefault Locations You can configure the Web proxy so that it searches for certificates in a location other than the default location. This is useful for companies that centralize their certificates on a single machine so that multiple hosts can use the certificates. Procedure 1 Log in to the service console and acquire root privileges. 2 Change to the /etc/vmware/hostd/ directory. 3 Use a text editor to open the proxy.xml file and find the following XML segment. <ssl> <!-- The server private key file --> <privateKey>/etc/vmware/ssl/rui.key</privateKey> <!-- The server side certificate file --> <certificate>/etc/vmware/ssl/rui.crt</certificate> </ssl> 4 Replace /etc/vmware/ssl/rui.key with the absolute path to the private key file that you received from your trusted certificate authority. This path can be on the ESX host or on a centralized machine on which you store certificates and keys for your company. NOTE Leave the <privateKey> and </privateKey> XML tags in place. 5 Replace /etc/vmware/ssl/rui.crt with the absolute path to the certificate file that you received from your trusted certificate authority. CAUTION Do not delete the original rui.key and rui.crt files. The ESX host uses these files. 6 Save your changes and close the file. 7 Enter the following command to restart the vmware-hostd process. service mgmt-vmware restart Change Security Settings for a Web Proxy Service You can change the security configuration so that individual services are directly accessible through HTTP connections. Procedure 1 Log in to the service console and acquire root privileges. 2 Change to the /etc/vmware/hostd/directory. VMware, Inc. 185
  • 186. ESX Configuration Guide 3 Use a text editor to open the proxy.xml file. The contents of the file typically appears as follows. <ConfigRoot> <EndpointList> <_length>10</_length> <_type>vim.ProxyService.EndpointSpec[]</_type> <e id="0"> <_type>vim.ProxyService.LocalServiceSpec</_type> <accessMode>httpsWithRedirect</accessMode> <port>8309</port> <serverNamespace>/</serverNamespace> </e> <e id="1"> <_type>vim.ProxyService.LocalServiceSpec</_type> <accessMode>httpAndHttps</accessMode> <port>8309</port> <serverNamespace>/client/clients.xml</serverNamespace> </e> <e id="2"> <_type>vim.ProxyService.LocalServiceSpec</_type> <accessMode>httpAndHttps</accessMode> <port>12001</port> <serverNamespace>/ha-nfc</serverNamespace> </e> <e id="3"> <_type>vim.ProxyService.NamedPipeServiceSpec</_type> <accessMode>httpsWithRedirect</accessMode> <pipeName>/var/run/vmware/proxy-mob</pipeName> <serverNamespace>/mob</serverNamespace> </e> <e id="4"> <_type>vim.ProxyService.LocalServiceSpec</_type> <accessMode>httpAndHttps</accessMode> <port>12000</port> <serverNamespace>/nfc</serverNamespace> </e> <e id="5"> <_type>vim.ProxyService.LocalServiceSpec</_type> <accessMode>httpsWithRedirect</accessMode> <port>8307</port> <serverNamespace>/sdk</serverNamespace> </e> <e id="6"> <_type>vim.ProxyService.NamedPipeTunnelSpec</_type> <accessMode>httpOnly</accessMode> <pipeName>/var/run/vmware/proxy-sdk-tunnel</pipeName> <serverNamespace>/sdkTunnel</serverNamespace> </e> <e id="7"> <_type>vim.ProxyService.LocalServiceSpec</_type> <accessMode>httpsWithRedirect</accessMode> <port>8308</port> <serverNamespace>/ui</serverNamespace> </e> 186 VMware, Inc.
  • 187. Chapter 13 Authentication and User Management <e id="8"> <_type>vim.ProxyService.LocalServiceSpec</_type> <accessMode>httpsOnly</accessMode> <port>8089</port> <serverNamespace>/vpxa</serverNamespace> </e> <e id="9"> <_type>vim.ProxyService.LocalServiceSpec</_type> <accessMode>httpsWithRedirect</accessMode> <port>8889</port> <serverNamespace>/wsman</serverNamespace> </e> </EndpointList> </ConfigRoot> 4 Change the security settings as required. For example, you might want to modify entries for services that use HTTPS to add the option of HTTP access. n e id is an ID number for the server ID XML tag. ID numbers must be unique within the HTTP area. n _type is the name of the service you are moving. n accessmode is the forms of communication the service permits. Acceptable values include: n httpOnly – The service is accessible only over plain-text HTTP connections. n httpsOnly – The service is accessible only over HTTPS connections. n httpsWithRedirect – The service is accessible only over HTTPS connections. Requests over HTTP are redirected to the appropriate HTTPS URL. n httpAndHttps – The service is accessible both over HTTP and HTTPS connections. n port is the port number assigned to the service. You can assign a different port number to the service. n serverNamespace is the namespace for the server that provides this service, for example /sdk or /mob. 5 Save your changes and close the file. 6 Enter the following command to restart the vmware-hostd process: service mgmt-vmware restart Example 13-3. Setting Up vSphere Web Access to Communicate Through an Insecure Port vSphere Web Access normally communicates with an ESX host through a secure port (HTTPS, 443). If you are in a fully trusted environment, you might decide that you can almost permit an insecure port (for example, HTTP, 80). To do so, change the accessMode attribute for the Web server in proxy.xml file. In the following result, the access mode is changed from httpsWithRedirect to httpAndHttps. <_type>vim.ProxyService.LocalServiceSpec</_type> <accessMode>httpAndHttps</accessMode> <port>8080</port> <serverNamespace>/ui</serverNamespace> VMware, Inc. 187
  • 189. Service Console Security 14 VMware has basic security recommendations for using the service console, including how to use some of the service console’s built-in security features. The service console is a management interface to ESX and, as such, its security is critical. To protect the service console against unauthorized intrusion and misuse, VMware imposes constraints on several service console parameters, settings, and activities. This chapter includes the following topics: n “General Security Recommendations,” on page 189 n “Log In to the Service Console,” on page 190 n “Service Console Firewall Configuration,” on page 190 n “Password Restrictions,” on page 194 n “Cipher Strength,” on page 200 n “setuid and setgid Flags,” on page 200 n “SSH Security,” on page 202 n “Security Patches and Security Vulnerability Scanning Software,” on page 203 General Security Recommendations To protect the service console against unauthorized intrusion and misuse, VMware imposes constraints on several service console parameters, settings, and activities. You can loosen the constraints to meet your configuration needs, but if you do so, make sure that you are working in a trusted environment and have taken enough other security measures to protect the network as a whole and the devices connected to the ESX host. Consider the following recommendations when evaluating service console security and administering the service console. n Limit user access. To improve security, restrict user access to the service console and enforce access security policies like setting up password restrictions—for example, character length, password aging limits, and using a grub password for booting the host. The service console has privileged access to certain parts of ESX. Therefore, provide only trusted users with login access. By default, root access is limited by not allowing secure shell (SSH) login as the root user. Strongly consider keeping this default. Require ESX system administrators to log in as regular users and then use the sudo command to perform specific tasks that require root privileges. Also, try to run as few processes on the service console as possible. Ideally, strive to run only the essential processes, services, and agents such as virus checkers, virtual machine backups, and so forth. n Use vSphere Client to administer your ESX hosts. VMware, Inc. 189
  • 190. ESX Configuration Guide Whenever possible, use vSphere Client, vSphere Web Access, or a third-party network management tool to administer your ESX hosts instead of working though the command-line interface as the root user. Using vSphere Client lets you limit the accounts with access to the service console, safely delegate responsibilities, and set up roles that prevent administrators and users from using capabilities they do not need. n Use only VMware sources to upgrade ESX components that you run on the service console. The service console runs a variety of third-party packages, such as the Tomcat Web service, to support management interfaces or tasks that you must perform. VMware does not support upgrading these packages from anything other than a VMware source. If you use a download or patch from another source, you might compromise service console security or functions. Regularly check third-party vendor sites and the VMware knowledge base for security alerts. Log In to the Service Console Although you perform most ESX configuration activities through the vSphere Client, you use the service console command-line interface when you configure certain security features. Using the command-line interface requires that you log in to the host. Procedure 1 Log in to the ESX host using one of the following methods. n If you have direct access to the host, press Alt+F2 to open the login page on the machine's physical console. n If you are connecting to the host remotely, use SSH or another remote console connection to start a session on the host. 2 Enter a user name and password recognized by the ESX host. If you are performing activities that require root privileges, log in to the service console as a recognized user and acquire root privileges through the sudo command, which provides enhanced security compared to the su command. What to do next In addition to ESX-specific commands, you can use the service console command-line interface to run many Linux and UNIX commands. For more information about service console commands, use the man command_name command to check for man pages. Service Console Firewall Configuration ESX includes a firewall between the service console and the network. To ensure the integrity of the service console, VMware has reduced the number of firewall ports that are open by default. At installation time, the service console firewall is configured to block all incoming and outgoing traffic, except for ports 22, 123, 427, 443, 902, 5989, 5988, which are used for basic communication with ESX. This setting enforces a high level of security for the host. NOTE The firewall also allows Internet Control Message Protocol (ICMP) pings and communication with DHCP and DNS (UDP only) clients. 190 VMware, Inc.
  • 191. Chapter 14 Service Console Security In trusted environments, you might decide that a lower security level is acceptable. If so, you can set the firewall for either medium or low security. Medium security All incoming traffic is blocked, except on the default ports and any ports you specifically open. Outgoing traffic is not blocked. Low security There are no blocks on either incoming or outgoing traffic. This setting is equivalent to removing the firewall. Because the ports open by default are strictly limited, you might be required to open additional ports after installation. For a list of commonly used ports that you might open, see “TCP and UDP Ports for Management Access,” on page 157. As you add the supported services and management agents required to operate ESX effectively, you open other ports in the service console firewall. You add services and management agents through vCenter Server as described in “Configuring Firewall Ports for Supported Services and Management Agents,” on page 154. In addition to the ports you open for these services and agents, you might open other ports when you configure certain devices, services, or agents such as storage devices, backup agents, and management agents. For example, if you are using Veritas NetBackup™ 4.5 as a backup agent, open ports 13720, 13724, 13782, and 13783, which NetBackup uses for client-media transactions, database backups, user backups or restores, and so forth. To determine which ports to open, see vendor specifications for the device, service, or agent. NOTE Do not modify default firewall rules for the service console using any command or utility other than esxcfg-firewall. If you modify the defaults by using a Linux command, your changes will be ignored and overwritten by the defaults specified for that service by the esxcfg-firewall command. Determine the Service Console Firewall Security Level Altering the security level for the service console is a two-part process: determining the service console firewall security level and resetting the service console firewall setting. To prevent unnecessary steps, always check the firewall setting before you change it. Procedure 1 Log in to the service console and acquire root privileges. 2 Use the following two commands to determine whether incoming and outgoing traffic is blocked or allowed. esxcfg-firewall -q incoming esxcfg-firewall -q outgoing Interpret the results according to Table 14-1. Table 14-1. Service Console Firewall Security Levels Command Line Response Security Level Incoming ports blocked by default. High Outgoing ports blocked by default. Incoming ports blocked by default. Medium Outgoing ports not blocked by default. Incoming ports not blocked by default. Low Outgoing ports not blocked by default. VMware, Inc. 191
  • 192. ESX Configuration Guide Set the Service Console Firewall Security Level After you determine the level of firewall security for the service console, you can set the security level. Each time you lower your security setting or open additional ports, you increase the risk of intrusion in your network. Balance your access needs against how tightly you want to control the security of the network. Procedure 1 Log in to the service console and acquire root privileges. 2 Run one of the following commands to set the service console firewall security level. n To set the service console firewall to medium security: esxcfg-firewall --allowOutgoing --blockIncoming n To set the virtual firewall to low security: esxcfg-firewall --allowIncoming --allowOutgoing CAUTION Using the preceding command disables all firewall protection. n To return the service console firewall to high security: esxcfg-firewall --blockIncoming --blockOutgoing 3 Use the following command to restart the vmware-hostd process. service mgmt-vmware restart Changing the service console firewall security level does not affect existing connections. For example, if the firewall is set to low security and a backup is running on a port you did not explicitly open, raising the firewall setting to high does not terminate the backup. The backup completes, releases the connection, and no further connections are accepted for the port. Open a Port in the Service Console Firewall You can open service console firewall ports when you install third-party devices, services, and agents. Before you open ports to support the item you are installing, see vendor specifications to determine the necessary ports. Prerequisites Use this procedure only to open ports for services or agents that are not configurable through the vSphere Client. CAUTION VMware supports opening and closing firewall ports only through the vSphere Client or the esxcfg- firewall command. Using any other methods or scripts to open firewall ports can lead to unexpected behavior. 192 VMware, Inc.
  • 193. Chapter 14 Service Console Security Procedure 1 Log in to the service console and acquire root privileges. 2 Use the following command to open the port. esxcfg-firewall --openPort port_number,tcp|udp,in|out,port_name n port_number is the vendor-specified port number. n Use tcp for TCP traffic or udp for UDP traffic. n Use in to open the port for inbound traffic or out to open it for outbound traffic. n port_name is a descriptive name to help identify the service or agent using the port. A unique name is not required. For example: esxcfg-firewall --openPort 6380,tcp,in,Navisphere 3 Run the following command to restart the vmware-hostd process. service mgmt-vmware restart Close a Port in the Service Console Firewall You can close particular ports in the service console firewall. If you close a port, active sessions of the service associated with the port are not necessarily disconnected when you close the port. For example, if a backup is executing and you close the port for the backup agent, the backup continues until it completes and the agent releases the connection. You can use the -closePort option to close only those ports that you opened with the -openPort option. If you used a different method to open the port, use an equivalent method to close it. For example, you can close the SSH port (22) only by disabling the SSH server incoming connection and SSH client outgoing connection in the vSphere Client. Prerequisites Use this procedure only to close ports for services or agents not specifically configurable through the vSphere Client. CAUTION VMware supports opening and closing firewall ports only through the vSphere Client or the esxcfg- firewall command. Using any other methods or scripts to open and close firewall ports can lead to unexpected behavior. Procedure 1 Log in to the service console and acquire root privileges. 2 Use the following command to close the port. esxcfg-firewall --closePort port_number,tcp|udp,in|out,port_name The port_name argument is optional. For example: esxcfg-firewall --closePort 6380,tcp,in 3 Use the following command to restart the vmware-hostd process. service mgmt-vmware restart VMware, Inc. 193
  • 194. ESX Configuration Guide Troubleshooting When Firewalls are Overwritten When firewall rules are changed after VMware High Availability (HA) traffic, migration, cloning, patching, or vMotion, you might need to configure the firewall defaults for esxcfg-firewall. Modifying firewall default rules for the service console using any command or utility other than esxcfg- firewall is not supported. If you modify default rules and then attempt to access the service console through the firewall with any tools or utilities, the firewall might revert to its default configuration when your actions are complete. For example, configuring HA on a host causes the firewall to revert to the default configuration specified by esxcfg-firewall if you have modified the rules by using a command other than esxcfg- firewall. In most cases, you do not need to change default firewall rules for the service console. If you modify the defaults by using a Linux command, your changes will be ignored and overwritten by the defaults specified for that service by the esxcfg-firewall command. If you want to change the defaults for a supported service, or define defaults for additional service types, you can modify or add to the rules in /etc/vmware/firewall/chains/ default.xml. Procedure 1 Log in to the service console with administrator privileges. 2 Edit the /etc/vmware/firewall/chains/default.xml file to correspond to your security policies. 3 Restart the service console firewall by using service firewall restart command. 4 Use the esxcfg-firewall-e|d SERVICE command to check that the specified services are correctly enabled or disabled. Example 14-1. Modifying the INPUT Chain You can modify the firewall defaults for each of the service types according to your own security policies. For example, the following rules in the /etc/vmware/firewall/chains/default.xml file determine the firewall rules for the INPUT chain: <ConfigRoot> <chain name="INPUT"> <rule>-p tcp --dport 80 -j ACCEPT</rule> <rule>-p tcp --dport 110 -j ACCEPT</rule> <rule>-p tcp --dport 25 -j ACCEPT</rule> </chain>... </ConfigRoot> Password Restrictions The ease with which an attacker can log in to an ESX host depends on finding a legitimate user name and password combination. You can set password restrictions to help prevent attackers from obtaining user passwords. A malicious user can obtain a password in a number of ways. For example, an attacker can sniff insecure network traffic, such as Telnet or FTP transmissions, for successful login attempts. Another common method is to crack the password by running a password generator to try every character combination up to a certain length or use real words and simple mutations of real words. 194 VMware, Inc.
  • 195. Chapter 14 Service Console Security Implementing restrictions that govern the length, character sets, and duration of passwords can make attacks that a password generator initiates more difficult. The longer and more complex the password, the harder it is for an attacker to discover. The more often users have to change passwords, the more difficult it is to find a password that works repeatedly. NOTE Always consider the human factor when you decide how to implement password restrictions. If you make passwords too hard to remember or enforce frequent password changes, your users might be inclined to write down their passwords, which eliminates any benefit. To help protect your password database from misuse, password shadowing is enabled so that password hashes are hidden from access. Also, ESX uses MD5 password hashes, which provide stronger password security and lets you set minimum length requirements to more than eight characters. Password Aging You can impose password aging restrictions to ensure that user passwords do not stay active for long periods. ESX imposes the following password aging restrictions for user logins by default. Maximum days The number of days that a user can keep a password. By default, passwords are set to never expire. Minimum days The minimum number of days between password changes. The default is 0, meaning that the users can change their passwords any time. Warning time The number of days in advance of password expiration that a reminder is sent. The default is seven days. Warnings are only displayed when logging directly in to the service console or when using SSH. You can tighten or loosen any of these settings. You can also override the default password aging settings for an individual user or group. Change Default Password Aging Restrictions for a Host You can impose stricter or looser password aging restrictions for a host than those provided by default. Procedure 1 Log in to the service console and acquire root privileges. 2 To change the maximum number of days a user can keep a password, use the following command. esxcfg-auth --passmaxdays=number_of_days 3 To change the minimum number of days between password changes, use the following command. esxcfg-auth --passmindays=number_of_days 4 To change the warning time before a password change, use the following command. esxcfg-auth --passwarnage=number_of_days Change Default Password Aging Restrictions for Users You can override the default password aging restrictions for particular users or groups. Procedure 1 Log in to the service console and acquire root privileges. 2 To change the maximum number of days, use the following command. chage -M number_of_days username VMware, Inc. 195
  • 196. ESX Configuration Guide 3 To change the warning time, use the following command. chage -W number_of_days username 4 To change the minimum number of days, use the following command. chage -m number_of_days username Password Strength and Complexity By default, ESX uses the pam_passwdqc.so plug-in to set the rules that users must observe when creating passwords and to check password strength. The pam_passwdqc.so plug-in lets you determine the basic standards that all passwords must meet. By default, ESX imposes no restrictions on the root password. However, when nonroot users attempt to change their passwords, the passwords they choose must meet the basic standards that pam_passwdqc.so sets. A valid password should contain a combination of as many character classes as possible. Character classes include lowercase letters, uppercase letters, numbers, and special characters such as an underscore or dash. NOTE When the number of character classes is counted, the plug-in does not count uppercase letters used as the first character in the password and numbers used as the last character of a password. To configure password complexity, you can change the default value of the following parameters. n N0 is the number of characters required for a password that uses characters from only one character class. For example, the password contains only lowercase letters. n N1 is the number of characters required for a password that uses characters from two character classes. n N2 is used for passphrases. ESX requires three words for a passphrase. Each word in the passphrase must be 8-40 characters long. n N3 is the number of characters required for a password that uses characters from three character classes. n N4 is the number of characters required for a password that uses characters from all four character classes. n match is the number of characters allowed in a string that is reused from the old password. If the pam_passwdqc.so plug-in finds a reused string of this length or longer, it disqualifies the string from the strength test and uses only the remaining characters. Setting any of these options to -1 directs the pam_passwdqc.so plug-in to ignore the requirement. Setting any of these options to disabled directs the pam_passwdqc.so plug-in to disqualify passwords with the associated characteristic. The values used must be in descending order except for -1 and disabled. NOTE The pam_passwdqc.so plug-in used in Linux provides more parameters than the parameters supported for ESX. You cannot specify these additional parameters in esxcfg-auth. For more information on the pam_passwdqc.so plug-in, see your Linux documentation. Change Default Password Complexity for the pam_passwdqc.so Plug-In Configure the pam_passwdqc.so plug-in to determine the basic standards all passwords must meet. Procedure 1 Log in to the service console and acquire root privileges. 2 Enter the following command. esxcfg-auth --usepamqc=N0N1N2N3N4match 196 VMware, Inc.
  • 197. Chapter 14 Service Console Security Example 14-2. esxcfg-auth --usepamqc Command For example, you use the following command. esxcfg-auth --usepamqc=disabled 18 -1 12 8 With this setting in effect, a user creating a password would never be able to set passwords that contain only one character class. The user needs to use at least 18 characters for a password with a two-character class, 12 characters for a three-character class password, and eight characters for four-character class passwords. Attempts to create passphrases are ignored. Configure a Password Reuse Rule You can set the number of old passwords that are stored for each user. Procedure 1 Log in to the service console and acquire root privileges. 2 Change to the directory /etc/pam.d/. 3 Use a text editor to open the system-auth-generic file. 4 Locate the line that starts with password sufficient /lib/security/$ISA/pam_unix.so. 5 Add the following parameter to the end of the line, where X is the number of old passwords to store for each user. remember=X Use a space between parameters. 6 Save your changes and close the file. 7 Change to the directory /etc/security/ and use the following command to make a zero (0) length file with opasswd as the filename. touch opasswd 8 Enter the following commands: chmod 0600 opasswd chown root:root /etc/security/opasswd Using the pam_cracklib.so Authentication Plug-In The default authentication plug-in for ESX is pam_passwdqc.so, which provides stringent password strength enforcement for most environments. If the plug-in is not appropriate for your environment, you can use the pam_cracklib.so plug-in instead. The pam_cracklib.so plug-in checks all password change attempts to ensure that passwords meet the strength criteria. n The new password must not be a palindrome. A palindrome is a term where the characters mirror each other around a central letter, as in radar or civic. n The new password must not be the reverse of the old password. n The new password must not be a rotation. A rotation is a version of the old password in which one or more characters have been rotated to the front or back of the password string. n The new password must differ from the old password by more than a change of case. n The new password must differ from the old password by more than a few characters. n The new password must not have been used in the past. The pam_cracklib.so plug-in applies this criterion only if you have configured a password reuse rule. VMware, Inc. 197
  • 198. ESX Configuration Guide By default, ESX does not enforce any password reuse rules, so the pam_cracklib.so plug-in never rejects a password change attempt on these grounds. However, you can configure a reuse rule to ensure that your users do not alternate between a few passwords. If you configure a reuse rule, old passwords are stored in a file that the pam_cracklib.so plug-in references during each password change attempt. The reuse rules determine the number of old passwords that ESX retains. When a user creates enough passwords to reach the value specified in the reuse rule, old passwords are removed from the file in age order. n The new password must be long enough and complex enough to meet the requirements of the plug-in. Configure these requirements by changing the pam_cracklib.so complexity parameters with the esxcfg- auth command, which lets you set the number of retries, the minimum password length, and a variety of character credits. To set password complexity with the pam_cracklib.so plug-in, you can assign values to the credit parameters for each of the following character classes: n lc_credit represents lowercase letters n uc_credit represents uppercase letters n d_credit represents numbers n oc_credit represents special characters, such as underscore or dash Credits add to a password's complexity score. A user's password must meet or exceed the minimum score, which you define using the minimum_length parameter. NOTE The pam_cracklib.so plug-in does not accept passwords less than six characters, regardless of credits used and regardless of the value that you assign to minimum_length. In other words, if minimum_length is 5, users must still enter no fewer than six characters. To determine whether or not a password is acceptable, the pam_cracklib.so plug-in uses several rules to calculate the password score. n Each character in the password, regardless of type, counts as one against minimum_length. n Nonzero values in the credit parameters affect password complexity differently depending on whether negative or positive values are used. n For positive values, add one credit for the character class, up to the maximum number of credits specified by the credit parameter. For example, if lc_credit is 1, add one credit for using a lowercase letter in the password. In this case, one is the maximum number of credits allowed for lowercase letters, regardless of how many are used. n For negative values, do not add credit for the character class, but require that the character class is used a minimum number of times. The minimum number is specified by the credit parameter. For example, if uc_credit is -1, passwords must contain at least one uppercase character. In this case, no extra credit is given for using uppercase letters, regardless of how many are used. n Character classes with a value of zero count toward the total length of the password, but do not receive extra credit, nor are they required. You can set all character classes to zero to enforce password length without considering complexity. For example, the passwords xyzpqets and Xyzpq3#s would each have a password score of eight. 198 VMware, Inc.
  • 199. Chapter 14 Service Console Security Switch to the pam_cracklib.so Plug-In Compared to pam_passwdqc.so, the pam_cracklib.so plug-in provides fewer options to fine-tune password strength and does not perform password strength tests for all users. However, if the pam_cracklib.so plug-in better suits your environment, you can switch from the default pam_passwdqc.so plug-in to pam_cracklib.so. NOTE The pam_cracklib.so plug-in used in Linux provides more parameters than the parameters supported for ESX. You cannot specify these additional parameters in esxcfg-auth. For more information about this plug- in, see your Linux documentation. Procedure 1 Log in to the service console and acquire root privileges. 2 Run the following command. esxcfg-auth --usecrack=retriesminimum_lengthlc_credituc_creditd_creditoc_credit n retries: number of retries users are allowed before they are locked out. n minimum_length: minimum password score, or effective length, after credits have been applied. NOTE The pam_cracklib.so plug-in does not accept passwords less than six characters, regardless of credits used and regardless of the value that you assign to minimum_length. In other words, if minimum_length is 5, users must still enter no fewer than six characters. n lc_credit: maximum number of credits allowed for lowercase letters. n uc_credit: maximum number of credits allowed for uppercase letters. n d_credit: maximum number of credits allowed for numbers. n oc_credit: maximum number of credits allowed for special characters, such as underscore or dash. The password requirements for the plug-in are configured according to the parameters you entered. Example 14-3. esxcfg-auth --usecrack Command esxcfg-auth --usecrack=3 9 1 -1 -1 1 n Users are allowed three attempts to enter their password before they are locked out. n The password score must be nine. n Up to one credit is given for using lowercase letters. n At least one uppercase letter is required. No extra credit is given for this character type. n At least one number is required. No extra credit is given for this character type. n Up to one credit is given for using special characters. Using these sample values, the password candidate xyzpqe# would fail: (x + y + z + p +q + e + #) + (lc_credit + oc_credit) = 9 While the password score is nine, it does not contain the required uppercase letter and number. The password candidate Xyzpq3# would be accepted: (X + y + z + p +q + 3 + #) + (lc_credit + oc_credit) = 9 The password score for this example is also nine, but this password includes the required uppercase letter and number. The uppercase letter and number do not add extra credit. VMware, Inc. 199
  • 200. ESX Configuration Guide Cipher Strength Transmitting data over insecure connections presents a security risk because malicious users might be able to scan data as it travels through the network. As a safeguard, network components commonly encrypt the data so that it cannot be easily read. To encrypt data, the sending component, such as a gateway or redirector, applies algorithms, or ciphers, to alter the data before transmitting it. The receiving component uses a key to decrypt the data, returning it to its original form. Several ciphers are in use, and the level of security that each provides is different. One measure of a cipher’s ability to protect data is its cipher strength—the number of bits in the encryption key. The larger the number, the more secure the cipher. To ensure the protection of the data transmitted to and from external network connections, ESX uses one of the strongest block ciphers available—256-bit AES block encryption. ESX also uses 1024-bit RSA for key exchange. These encryption algorithms are the default for the following connections. n vSphere Client connections to vCenter Server and to the ESX host through the service console. n vSphere Web Access connections to the ESX host through the service console. NOTE Because use of vSphere Web Access ciphers is determined by the Web browser you are using, this management tool might use other ciphers. n SDK connections to vCenter Server and to ESX. n Service console connections to virtual machines through the VMkernel. n SSH connections to the ESX host through the service console. setuid and setgid Flags During ESX installation, several applications that include the setuid and setgid flags are installed by default. Some of the applications provide facilities required for correct operation of the host. Others are optional, but they can make maintaining and troubleshooting the host and the network easier. setuid A flag that allows an application to temporarily change the permissions of the user running the application by setting the effective user ID to the program owner’s user ID. setgid A flag that allows an application to temporarily change the permissions of the group running the application by setting the effective group ID to the program owner’s group ID. Disable Optional Applications Disabling any of the required applications results in problems with ESX authentication and virtual machine operation, but you can disable any optional application. Optional applications are listed in Table 14-2 and Table 14-3. 200 VMware, Inc.
  • 201. Chapter 14 Service Console Security Procedure 1 Log in to the service console and acquire root privileges. 2 Run one of the following commands to disable the application. n For setuid flagged applications: chmod a-s path_to_executable_file n For setgid flagged applications: chmod a-g path_to_executable_file Default setuid Applications Several applications that include the setuid flag are installed by default. Table 14-2 lists the default setuid applications and indicates whether the application is required or optional. Table 14-2. Default setuid Applications Application Purpose and Path Required or Optional crontab Lets individual users add cron jobs. Optional Path: /usr/bin/crontab pam_timestamp_check Supports password authentication. Required Path: /sbin/pam_timestamp_check passwd Supports password authentication. Required Path: /usr/bin/passwd ping Sends and listens for control packets on the network interface. Optional Useful for debugging networks. Path: /bin/ping pwdb_chkpwd Supports password authentication. Required Path: /sbin/pwdb_chkpwd ssh-keysign Performs host-based authentication for SSH. Required if you use Path: /usr/libexec/openssh/ssh-keysign host-based authentication. Otherwise optional. su Lets a general user become the root user by changing users. Required Path: /bin/su sudo Lets a general user act as the root user only for specific Optional operations. Path: /usr/bin/sudo unix_chkpwd Supports password authentication. Required Path: /sbin/unix_chkpwd vmkload_app Performs tasks required to run virtual machines. This Required in both paths application is installed in two locations: one for standard use and one for debugging. Path for standard use: /usr/lib/vmware/bin/vmkload_app Path for debugging: /usr/lib/vmware/bin-debug/ vmkload_app VMware, Inc. 201
  • 202. ESX Configuration Guide Table 14-2. Default setuid Applications (Continued) Application Purpose and Path Required or Optional vmware-authd Authenticates users for use of services specific to VMware. Required Path: /usr/sbin/vmware-authd vmware-vmx Performs tasks required to run virtual machines. This Required in both paths application is installed in two locations: one for standard use and one for debugging. Path for standard use: /usr/lib/vmware/bin/vmware-vmx Path for debugging: /usr/lib/vmware/bin-debug/vmware- vmk Default setgid Applications Two applications that include the setgid flag are installed by default. Table 14-3 lists the default setgid applications and indicates whether the application is required or optional. Table 14-3. Default setgid Applications Application Purpose and Path Required or Optional wall Alerts all terminals that an action is about to occur. This Optional application is called by shutdown and other commands. Path: /usr/bin/wall lockfile Performs locking for the Dell OM management agent. Required for Dell OM Path: /usr/bin/lockfile but optional otherwise SSH Security SSH is a commonly used Unix and Linux command shell that lets you remotely log in to the service console and perform certain management and configuration tasks for the host. SSH is used for secure logins and data transfers because it offers stronger protection than other command shells. In this ESX release, the SSH configuration is enhanced to provide a higher security level. This enhancement includes the following key features. n Version 1 SSH protocol disabled – VMware no longer supports Version 1 SSH protocol and uses Version 2 protocol exclusively. Version 2 eliminates certain security issues present in Version 1 and provides you with a safer communications interface to the service console. n Improved cipher strength – SSH now supports only 256-bit and 128-bit AES ciphers for your connections. n Limits on remote logins as root – You can no longer remotely log in as root. Instead, you log in as an identifiable user and either use the sudo command to run specific operations that require root privileges or enter the su command to become the root user. NOTE The sudo command provides security benefits in that it limits root activities and helps you check for possible misuse of root privileges by generating an audit trail of any root activities that the user performs. These settings are designed to provide solid protection for the data you transmit to the service console through SSH. If this configuration is too rigid for your needs, you can lower security parameters. 202 VMware, Inc.
  • 203. Chapter 14 Service Console Security Change the Default SSH Configuration You can change the default SSH configuration. Procedure 1 Log in to the service console and acquire root privileges. 2 Change to the /etc/ssh directory. 3 Use a text editor to perform any of the following actions in the sshd_config file. n To allow remote root login, change the setting to yes in the following line. PermitRootLogin no n To revert to the default SSH protocol (Version 1 and 2), comment out the following line. Protocol 2 n To revert to the 3DES cipher and other ciphers, comment out the following line. Ciphers aes256-cbc,aes128-cbc n To disable Secure FTP (SFTP) on SSH, comment out the following line. Subsystem ftp /usr/libexec/openssh/sftp-server 4 Save your changes and close the file. 5 Run the following command to restart the SSHD service. service sshd restart Security Patches and Security Vulnerability Scanning Software Certain security scanners such as Nessus check the version number but not the patch suffix as they search for security holes. As a result, these scanners can falsely report that software is down-level and does not include the most recent security patches even though it does. If this occurs, you can perform certain checks. This problem is common to the industry and not specific to VMware. Some security scanners can handle this situation correctly, but they typically lag by a version or more. For example, the version of Nessus released after a Red Hat patch often does not report these false positives. If a fix for a particular Linux-supported software package that VMware provides as a service console component becomes available—for example, a service, facility, or protocol—VMware provides a bulletin that contains a list of vSphere Installation Bundles (VIBs) that you use to update the software on ESX. Although these fixes might be available from other sources, always use bulletins that VMware generates instead of using third-party RPM Package Manager packages. When providing patches for a software package, the VMware policy is to backport the fix to a version of the software known to be stable. This approach reduces the chance of introducing new problems and instability in the software. Because the patch is added to an existing version of the software, the version number of the software stays the same, but a patch number is added as a suffix. The following is an example of how this problem occurs: 1 You initially install ESX with OpenSSL version 0.9.7a (where 0.9.7a is the original version with no patches). 2 OpenSSL releases a patch that fixes a security hole in version 0.9.7. This version is called 0.9.7x. 3 VMware backports the OpenSSL 0.9.7x fix to the original version, updates the patch number, and creates a VIB. The OpenSSL version in the VIB is 0.9.7a-1, indicating that the original version (0.9.7a) now contains patch 1. VMware, Inc. 203
  • 204. ESX Configuration Guide 4 You install the updates. 5 The security scanner fails to note the -1 suffix and erroneously reports that security for OpenSSL is not up to date. If your scanner reports that security for a package is down-level, perform the following checks. n Look at the patch suffix to determine if you require an update. n Read the VMware VIB documentation for information on the patch contents. n Look for the Common Vulnerabilities and Exposures (CVE) number from the security alert in the software update change log. If the CVE number is there, the specified package addresses that vulnerability. 204 VMware, Inc.
  • 205. Security Best Practices and Scenarios 15 A series of ESX deployment scenarios can help you understand how best to employ the security features in your own deployment. Scenarios also illustrate some basic security recommendations that you can consider when creating and configuring virtual machines. This chapter includes the following topics: n “Security Approaches for Common ESX Deployments,” on page 205 n “Virtual Machine Recommendations,” on page 209 Security Approaches for Common ESX Deployments You can compare security approaches for different types of deployments to help plan security for your own ESX deployment. The complexity of ESX deployments can vary significantly depending on the size of your company, the way that data and resources are shared with the outside world, whether there are multiple datacenters or only one, and so forth. Inherent in the following deployments are policies for user access, resource sharing, and security level. Single-Customer Deployment In a single-customer deployment, ESX hosts are owned and maintained within a single corporation and single datacenter. Host resources are not shared with outside users. One site administrator maintains the hosts, which are run on a number of virtual machines. The single-customer deployment does not allow customer administrators, and the site administrator is solely responsible for maintaining the various virtual machines. The corporation staffs a set of system administrators who do not have accounts on the host and cannot access any of the ESX tools such as vCenter Server or command line shells for the host. These system administrators have access to virtual machines through the virtual machine console so that they can load software and perform other maintenance tasks inside the virtual machines. Table 15-1 shows how you might handle sharing for the components that you use and configure for the host. Table 15-1. Sharing for Components in a Single-Customer Deployment Function Configuration Comments Service console shares the same No Isolate the service console by configuring it on its own physical network as the virtual physical network. machines? Service console shares the same No Isolate the service console by configuring it on its own VLAN. VLAN as the virtual machines? No virtual machine or other system facility such as vMotion must use this VLAN. VMware, Inc. 205
  • 206. ESX Configuration Guide Table 15-1. Sharing for Components in a Single-Customer Deployment (Continued) Function Configuration Comments Virtual machines share the same Yes Configure your virtual machines on the same physical physical network? network. Network adapter sharing? Partial Isolate the service console by configuring it on its own virtual switch and virtual network adapter. No virtual machine or other system facility must use this switch or adapter. You can configure your virtual machines on the same virtual switch and network adapter. VMFS sharing? Yes All .vmdk files reside in the same VMFS partition. Security level High Open ports for needed services like FTP on an individual basis. See “Service Console Firewall Configuration,” on page 190 for information on security levels. Virtual machine memory Yes Configure the total memory for the virtual machines as overcommitment? greater than the total physical memory. Table 15-2 shows how you might set up user accounts for the host. Table 15-2. User Account Setup in a Single-Customer Deployment User Category Total Number of Accounts Site administrators 1 Customer administrators 0 System administrators 0 Business users 0 Table 15-3 shows the level of access for each user. Table 15-3. User Access in a Single-Customer Deployment Access Level Site Administrator System Administrator Root access? Yes No Service console access through SSH? Yes No vCenter Server and vSphere Web Access? Yes No Virtual machine creation and modification? Yes No Virtual machine access through the console? Yes Yes Multiple-Customer Restricted Deployment In a multiple-customer restricted deployment, ESX hosts are in the same datacenter and are used to serve applications for multiple customers. The site administrator maintains the hosts, and these hosts run a number of virtual machines dedicated to the customers. Virtual machines that belong to the various customers can be on the same host, but the site administrator restricts resource sharing to prevent rogue interaction. Although there is only one site administrator, several customer administrators maintain the virtual machines assigned to their customers. This deployment also includes customer system administrators who do not have ESX accounts but have access to the virtual machines through the virtual machine console so that they can load software and perform other maintenance tasks inside the virtual machines. Table 15-4 shows how you might handle sharing for the components you use and configure for the host. 206 VMware, Inc.
  • 207. Chapter 15 Security Best Practices and Scenarios Table 15-4. Sharing for Components in a Multiple-Customer Restricted Deployment Function Configuration Comments Service console shares the same No Isolate the service console by configuring it on its own physical physical network as the virtual network. machines? Service console shares the same No Isolate the service console by configuring it on its own VLAN. VLAN as the virtual machines? No virtual machine or other system facility such as vMotion must use this VLAN. Virtual machines share the same Partial Put the virtual machines for each customer on a different physical network? physical network. All physical networks are independent of each other. Network adapter sharing? Partial Isolate the service console by configuring it on its own virtual switch and virtual network adapter. No virtual machine or other system facility must use this switch or adapter. You configure virtual machines for one customer so that they all share the same virtual switch and network adapter. They do not share the switch and adapter with any other customers. VMFS sharing? No Each customer has its own VMFS partition, and the virtual machine .vmdk files reside exclusively on that partition. The partition can span multiple LUNs. Security level High Open ports for services like FTP as needed. Virtual machine memory Yes Configure the total memory for the virtual machines as greater overcommitment? than the total physical memory. Table 15-5 shows how you might set up user accounts for the ESX host. Table 15-5. User Account Setup in a Multiple-Customer Restricted Deployment User Category Total Number of Accounts Site administrators 1 Customer administrators 10 System administrators 0 Business users 0 Table 15-6 shows the level of access for each user. Table 15-6. User Access in a Multiple-Customer Restricted Deployment Customer System Access Level Site Administrator Administrator Administrator Root access? Yes No No Service console access through SSH? Yes Yes No vCenter Server and vSphere Web Access? Yes Yes No Virtual machine creation and modification? Yes Yes No Virtual machine access through the console? Yes Yes Yes VMware, Inc. 207
  • 208. ESX Configuration Guide Multiple-Customer Open Deployment In a multiple-customer open deployment, ESX hosts are in the same datacenter and are used to serve applications for multiple customers. The site administrator maintains the hosts, and these hosts run a number of virtual machines dedicated to the customers. Virtual machines that belong to the various customers can be on the same host, but there are fewer restrictions on resource sharing. Although there is only one site administrator in a multiple-customer open deployment, several customer administrators maintain the virtual machines assigned to their customers. The deployment also includes customer system administrators who do not have ESX accounts but have access to the virtual machines through the virtual machine console so that they can load software and perform other maintenance tasks inside the virtual machines. Lastly, a group of business users who do not have accounts can use virtual machines to run their applications. Table 15-7 shows how you might handle sharing for the components that you use and configure for the host. Table 15-7. Sharing for Components in a Multiple-Customer Open Deployment Function Configuration Comments Service console shares the same No Isolate the service console by configuring it on its own physical network as the virtual physical network. machines? Service console shares the same VLAN No Isolate the service console by configuring it on its own as the virtual machines? VLAN. No virtual machine or other system facility such as vMotion must use this VLAN. Virtual machines share the same Yes Configure your virtual machines on the same physical physical network? network. Network adapter sharing? Partial Isolate the service console by configuring it on its own virtual switch and virtual network adapter. No virtual machine or other system facility must use this switch or adapter. You configure all virtual machines on the same virtual switch and network adapter. VMFS sharing? Yes Virtual machines can share VMFS partitions, and their virtual machine .vmdk files can reside on shared partitions. Virtual machines do not share .vmdk files. Security level High Open ports for services like FTP as needed. Virtual machine memory Yes Configure the total memory for the virtual machines as overcommitment? greater than the total physical memory. Table 15-8 shows how you might set up user accounts for the host. Table 15-8. User Account Setup in a Multiple-Customer Open Deployment User Category Total Number of Accounts Site administrators 1 Customer administrators 10 System administrators 0 Business users 0 Table 15-9 shows the level of access for each user. 208 VMware, Inc.
  • 209. Chapter 15 Security Best Practices and Scenarios Table 15-9. User Access in a Multiple-Customer Open Deployment Customer System Access Level Site Administrator Administrator Administrator Business User Root access? Yes No No No Service console access through Yes Yes No No SSH? vCenter Server and vSphere Yes Yes No No Web Access? Virtual machine creation and Yes Yes No No modification? Virtual machine access through Yes Yes Yes Yes the console? Virtual Machine Recommendations There are several safety precautions to consider when evaluating virtual machine security and administering virtual machines. Installing Antivirus Software Because each virtual machine hosts a standard operating system, consider protecting it from viruses by installing antivirus software. Depending on how you are using the virtual machine, you might also want to install a software firewall. Stagger the schedule for virus scans, particularly in deployments with a large number of virtual machines. Performance of systems in your environment will degrade significantly if you scan all virtual machines simultaneously. Because software firewalls and antivirus software can be virtualization-intensive, you can balance the need for these two security measures against virtual machine performance, especially if you are confident that your virtual machines are in a fully trusted environment. Limiting Exposure of Sensitive Data Copied to the Clipboard Copy and paste operations are disabled by default for ESX to prevent exposing sensitive data that has been copied to the clipboard. When copy and paste is enabled on a virtual machine running VMware Tools, you can copy and paste between the guest operating system and remote console. As soon as the console window gains focus, non-privileged users and processes running in the virtual machine can access the clipboard for the virtual machine console. If a user copies sensitive information to the clipboard before using the console, the user—perhaps unknowingly —exposes sensitive data to the virtual machine. To prevent this problem, copy and paste operations for the guest operating system are disabled by default. It is possible to enable copy and paste operations for virtual machines if necessary. Enable Copy and Paste Operations Between the Guest Operating System and Remote Console To copy and paste between the guest operating system and remote console, you must enable copy and paste operations using the vSphere Client. Procedure 1 Log into a vCenter Server system using the vSphere Client and select the virtual machine. 2 On the Summary tab, click Edit Settings. VMware, Inc. 209
  • 210. ESX Configuration Guide 3 Select Options > Advanced > General and click Configuration Parameters. 4 Click Add Row and type the following values in the Name and Value columns. Name Value isolation.tools.copy.disable false isolation.tools.paste.disable false NOTE These options override any settings made in the guest operating system’s VMware Tools control panel. 5 Click OK to close the Configuration Parameters dialog box, and click OK again to close the Virtual Machine Properties dialog box. 6 Restart the virtual machine. Removing Unnecessary Hardware Devices Users and processes without privileges on a virtual machine can connect or disconnect hardware devices, such as network adapters and CD-ROM drives. Therefore, removing unnecessary hardware devices can help prevent attacks. Attackers can use this capability to breach virtual machine security in several ways. For example, an attacker with access to a virtual machine can connect a disconnected CD-ROM drive and access sensitive information on the media left in the drive, or disconnect a network adapter to isolate the virtual machine from its network, resulting in a denial of service. As a general security precaution, use commands on the vSphere Client Configuration tab to remove any unneeded or unused hardware devices. Although this measure tightens virtual machine security, it is not a good solution in situations where you might bring an unused device back into service at a later time. Prevent a Virtual Machine User or Process from Disconnecting Devices If you do not want to permanently remove a device, you can prevent a virtual machine user or process from connecting or disconnecting the device from within the guest operating system. Procedure 1 Log in to a vCenter Server system using the vSphere Client. 2 Select the virtual machine in the inventory panel. 3 On the Summary tab, click Edit Settings. 4 Select Options > General Options and make a record of the path displayed in the Virtual Machine Configuration File text box. 5 Log in to the service console and acquire root privileges. 6 Change directories to access the virtual machine configuration file whose path you recorded in Step 4. Virtual machine configuration files are located in the /vmfs/volumes/datastore directory, where datastore is the name of the storage device on which the virtual machine files reside. For example, if the virtual machine configuration file you obtained from the Virtual Machine Properties dialog box is [vol1]vm- finance/vm-finance.vmx, you would change to the following directory. /vmfs/volumes/vol1/vm-finance/ 210 VMware, Inc.
  • 211. Chapter 15 Security Best Practices and Scenarios 7 Use a text editor to add the following line to the .vmx file, where device_name is the name of the device you want to protect (for example, ethernet1). device_name.allowGuestConnectionControl = "false" NOTE By default, Ethernet 0 is configured to disallow device disconnection. The only reason you might change this is if a prior administrator set device_name.allowGuestConnectionControl to true. 8 Save your changes and close the file. 9 In the vSphere Client, right-click the virtual machine and select Power Off. 10 Right-click the virtual machine and select Power On. Limiting Guest Operating System Writes to Host Memory The guest operating system processes send informational messages to the ESX host through VMware Tools. If the amount of data the host stored as a result of these messages was unlimited, an unrestricted data flow would provide an opportunity for an attacker to stage a denial-of-service (DoS) attack. The informational messages sent by guest operating processes are known as setinfo messages and typically contain name-value pairs that define virtual machine characteristics or identifiers that the host stores—for example, ipaddress=10.17.87.224. The configuration file containing these name-value pairs is limited to a size of 1MB, which prevents attackers from staging a DoS attack by writing software that mimics VMware Tools and filling the host's memory with arbitrary configuration data, which consumes space needed by the virtual machines. If you require more than 1MB of storage for name-value pairs, you can change the value as required. You can also prevent the guest operating system processes from writing any name-value pairs to the configuration file. Modify Guest Operating System Variable Memory Limit You can increase the guest operating system variable memory limit if large amounts of custom information are being stored in the configuration file. Procedure 1 Log in to a vCenter Server system using the vSphere Client. 2 Select the virtual machine in the inventory panel. 3 On the Summary tab, click Edit Settings. 4 Select Options > Advanced > General and click Configuration Parameters. 5 If the size limit attribute is not present, you must add it. a Click Add Row. b In the Name column, type tools.setInfo.sizeLimit. c In the Value column, type Number of Bytes. If the size limit attribute exists, modify it to reflect the appropriate limits. 6 Click OK to close the Configuration Parameters dialog box, and click OK again to close the Virtual Machine Properties dialog box. VMware, Inc. 211
  • 212. ESX Configuration Guide Prevent the Guest Operating System Processes from Sending Configuration Messages to the Host You can prevent guests from writing any name-value pairs to the configuration file. This is appropriate when guest operating systems must be prevented from modifying configuration settings. Procedure 1 Log in to a vCenter Server system using the vSphere Client. 2 Select the virtual machine in the inventory panel. 3 On the Summary tab, click Edit Settings. 4 Select Options > Advanced > General and click Configuration Parameters. 5 Click Add Row and type the following values in the Name and Value columns. n In the Name column: isolation.tools.setinfo.disable n In the Value column: true 6 Click OK to close the Configuration Parameters dialog box, and click OK again to close the Virtual Machine Properties dialog box. Configuring Logging Levels for the Guest Operating System Virtual machines can write troubleshooting information into a virtual machine log file stored on the VMFS volume. Virtual machine users and processes can abuse logging either on purpose or inadvertently so that large amounts of data flood the log file. Over time, the log file can consume enough file system space to cause a denial of service. To prevent this problem, consider modifying logging settings for virtual machine guest operating systems. These settings can limit the total size and number of log files. Normally, a new log file is created each time you reboot a host, so the file can grow to be quite large. You can ensure new log file creation happens more frequently by limiting the maximum size of the log files. VMware recommends saving 10 log files, each one limited to 100KB. These values are large enough to capture sufficient information to debug most problems that might occur. Each time an entry is written to the log, the size of the log is checked. If it is over the limit, the next entry is written to a new log. If the maximum number of log files exists, the oldest log file is deleted. A DoS attack that avoids these limits could be attempted by writing an enormous log entry, but each log entry is limited in size to 4KB, so no log files are ever more than 4KB larger than the configured limit. Limit Log File Numbers and Sizes To prevent virtual machine users and processes from flooding the log file, which can lead to denial of service, you can limit the number and size of the log files ESX generates. Procedure 1 Log in to a vCenter Server system using the vSphere Client. 2 On the Summary tab, click Edit Settings. 3 Select Options > General Options and make a record of the path displayed in the Virtual Machine Configuration File text box. 4 Log into the service console and acquire root privileges. 212 VMware, Inc.
  • 213. Chapter 15 Security Best Practices and Scenarios 5 Change directories to access the virtual machine configuration file whose path you recorded in Step 3. Virtual machine configuration files are located in the /vmfs/volumes/datastore directory, where datastore is the name of the storage device on which the virtual machine files reside. For example, if the virtual machine configuration file you obtained from the Virtual Machine Properties dialog box is [vol1]vm- finance/vm-finance.vmx, you would change to the following directory. /vmfs/volumes/vol1/vm-finance/ 6 To limit the log size, use a text editor to add or edit the following line to the .vmx file, where maximum_size is the maximum file size in bytes. log.rotateSize=maximum_size For example, to limit the size to around 100KB, enter 100000. 7 To keep a limited number of log files, use a text editor to add or edit the following line to the .vmx file, where number_of_files_to_keep is the number of files the server keeps. log.keepOld=number_of_files_to_keep For example, to keep 10 log files and begin deleting the oldest ones as new ones are created, enter 10. 8 Save your changes and close the file. Disable Logging for the Guest Operating System If you choose not to write troubleshooting information into a virtual machine log file stored on the VMFS volume, you can stop logging altogether. If you disable logging for the guest operating system, be aware that you might not be able to gather adequate logs to allow troubleshooting. Further, VMware does not offer technical support for virtual machine problems if logging has been disabled. Procedure 1 Log in to a vCenter Server system using the vSphere Client and select the virtual machine in the inventory. 2 On the Summary tab, click Edit Settings. 3 Click the Options tab and in the options list under Advanced, select General. 4 In Settings, deselect Enable logging. 5 Click OK to close the Virtual Machine Properties dialog box. VMware, Inc. 213
  • 217. Managing Host Profiles 16 The host profiles feature creates a profile that encapsulates the host configuration and helps to manage the host configuration, especially in environments where an administrator manages more than one host or cluster in vCenter Server. Host profiles eliminates per-host, manual, or UI-based host configuration and maintain configuration consistency and correctness across the datacenter by using host profile policies. These policies capture the blueprint of a known, validated reference host configuration and use this to configure networking, storage, security, and other settings on multiple hosts or clusters. You can then check a host or cluster against a profile’s configuration for any deviations. This chapter includes the following topics: n “Host Profiles Usage Model,” on page 217 n “Access Host Profiles View,” on page 218 n “Creating a Host Profile,” on page 218 n “Export a Host Profile,” on page 219 n “Import a Host Profile,” on page 219 n “Edit a Host Profile,” on page 220 n “Manage Profiles,” on page 221 n “Checking Compliance,” on page 225 Host Profiles Usage Model This topic describes the workflow of using Host Profiles. You must have an existing vSphere installation with at least one properly configured host. 1 Set up and configure the host that will be used as the reference host. A reference host is the host from which the profile is created. 2 Create a profile using the designated reference host. 3 Attach a host or cluster with the profile. VMware, Inc. 217
  • 218. ESX Configuration Guide 4 Check the host's compliance against a profile. This ensures that the host continues to be correctly configured. 5 Apply the host profile of the reference host to other hosts or clusters of hosts. NOTE Host profiles is only supported for VMware vSphere 4.0 hosts. This feature is not supported for VI 3.5 or earlier hosts. If you have VI 3.5 or earlier hosts managed by your vCenter Server 4.0, the following can occur if you try to use host profiles for those hosts: n You cannot create a host profile that uses a VMware Infrastructure 3.5 or earlier host as a reference host. n You cannot apply a host profile to any VI 3.5 or earlier hosts. The compliance check fails. n While you can attach a host profile to a mixed cluster that contains VI 3.5 or earlier hosts, the compliance check for those hosts fails. As a licensed feature of vSphere, Host Profiles are only available when the appropriate licensing is in place. If you see errors, please ensure that you have the appropriate vSphere licensing for your hosts. If you want the host profile to use directory services for authentication, then the reference host needs to be set configured to use a directory service. See “Configure a Host to Use a Directory Service,” on page 179 for instructions. Access Host Profiles View The Host Profiles main view lists all available profiles. Administrators can also use the Host Profiles main view to perform operations on host profiles and configure profiles. The Host Profiles main view should be used by experienced administrators who wish to perform host profile operations and configure advanced options and policies. Most operations such as creating new profiles, attaching entities, and applying profiles can be performed from the Hosts and Clusters view. Procedure u Select View > Management > Host Profiles. Any existing profiles are listed on the left side in the profiles list. When a profile is selected from the profile list, the details of that profile are displayed on the right side. Creating a Host Profile You create a new host profile by using the designated reference host's configuration. A host profile can be created from: n Host Profile main view n host's context menu Create a Host Profile from Host Profiles View You can create a host profile from the Host Profiles main view using the configuration of an existing host. Prerequisites You must have a vSphere installation and at least one properly configured host in the inventory. Procedure 1 In the Host Profiles main view, click Create Profile. The Create Profile wizard appears. 2 Select the option to create a new profile and click Next. 218 VMware, Inc.
  • 219. Chapter 16 Managing Host Profiles 3 Select the host to use to create the profile an click Next. 4 Type the name and enter a description for the new profile and click Next. 5 Review the summary information for the new profile and click Finish to complete creating the profile. The new profile appears in the profile list. Create a Host Profile from Host You can create a new host profile from the host's context menu in the Hosts and Clusters inventory view. Prerequisites You must have a vSphere installation and at least one properly configured host in the inventory. Procedure 1 In the Host and Clusters view, select the host that you want to designate as the reference host for the new host profile. 2 Right-click the host and select Host Profile > Create Profile from Host The Create Profile from Host wizard opens. 3 Type the name and enter a description for the new profile and click Next. 4 Review the summary information for the new profile and click Finish to complete creating the profile. The new profile appears in the host's Summary tab. Export a Host Profile You can export a profile to a file that is in the VMware profile format (.vpf). NOTE When a host profile is exported, administrator passwords are not exported. This is a security measure and stops administrator passwords from being exported in plain text when the profile is exported. You will be prompted to re-enter the values for the password after the profile is imported and the password is applied to a host. Procedure 1 In the Host Profiles view page, select the profile to export from the profile list. 2 Right-click the profile and select the Export Profile. 3 Select the location and type the name of the file to export the profile. 4 Click Save. Import a Host Profile You can import a profile from a file in the VMware profile format (.vpf). NOTE When a host profile is exported, administrator passwords are not exported. This is a security measure and stops administrator passwords from being exported in plain text when the profile is exported. You will be prompted to re-enter the values for the password after the profile is imported and the password is applied to a host. VMware, Inc. 219
  • 220. ESX Configuration Guide Procedure 1 In the Host Profiles main view, click the Create Profile icon. The Create Profile wizard appears. 2 Select the option to import a profile and click Next. 3 Enter or browse the VMware Profile Format file to import and click Next. 4 Type the name, enter a description for the imported profile, and click Next when finished. 5 Review the summary information for the imported profile and click Finish to complete importing the profile. The imported profile appears in the profile list. Edit a Host Profile You can view and edit host profile policies, select a policy to be checked for compliance, and change the policy name or description. Procedure 1 In the Host Profiles main view, select the profile to edit from the profile list. 2 Click Edit Host Profile. 3 (Optional) Change the profile name or description in the fields at the top of the Profile Editor. 4 Edit the policy. 5 (Optional) Enable or disable the policy compliance check. 6 Click OK to close the Profile Editor. Edit a Policy A policy describes how a specific configuration setting should be applied. The Profile Editor allows you to edit policies belonging to a specific host profile. On the left side of the Profile Editor, you can expand the host profile. Each host profile is composed of several sub-profiles that are designated by functional group to represent configuration instances. Each sub-profile contains many policies and compliance checks that describe the configuration that is relevant to the profile. Each policy consists of one or more options that contains one or more parameters. The parameters consist of a key and a value. The value can be one of a few basic types, for example integer, string, string array, or integer array. The sub-profiles (and example policies and compliance checks) that may be configured are: Table 16-1. Host Profile Sub-Profile Configurations Sub-Profile Configuration Example Policies and Compliance Checks Memory reservation Set memory reservation to a fixed value. Storage Configure NFS storage. Networking Configure virtual switch, port groups, physical NIC speed, security and NIC teaming policies, vNetwork Distributed Switch, and vNetwork Distributed Switch uplink port. Date and Time Configure time settings, timezone of server. Firewall Enable or disable a ruleset. Security Add a user or a usergroup, set root password. 220 VMware, Inc.
  • 221. Chapter 16 Managing Host Profiles Table 16-1. Host Profile Sub-Profile Configurations (Continued) Sub-Profile Configuration Example Policies and Compliance Checks Service Configure settings for a service. Advanced Modify advanced options. Procedure 1 Open the Profile Editor for the profile you wish to edit. 2 On the left side of the Profile Editor, expand a sub-profile until you reach the policy you want to edit. 3 Select the policy. On the right-hand side of the Profile Editor, the policy options and parameters are displayed within the Configuration Details tab. 4 Select a policy option from the drop-down menu and set its parameter. 5 (Optional) If you make a change to a policy, but wish to revert back to the default option, click Revert and the option is reset. Enable Compliance Check You can decide whether a host profile policy is checked for compliance. Procedure 1 Open the Profile Editor for a profile and navigate to the policy you wish to enable for compliance check. 2 On the right side of the Profile Editor, select the Compliance Details tab. 3 Enable the check box for the policy. NOTE If you disable the check box so this policy is not checked for compliance, the other policies that are enabled for compliance check will still be checked. Manage Profiles After you create a host profile, you can manage the profile by attaching a profile to a particular host or cluster and then applying that profile to the host or cluster. Attaching Entities Hosts that need to be configured are attached to a profile. Profiles can also be attached to a cluster. In order to be compliant, all hosts within an attached cluster must be configured according to the profile. Hosts are not automatically configured in accordance to the host profile that is attached with the cluster when it is added to the cluster. When a host is added to a cluster that is attached with a profile, the host is automatically attached with the profile. If the profile is not applied, or configured to what is specified in the profile, it will cause the compliance status for the profile to fail the next time a compliance check is performed. You fix this by applying the profile to the host. You can attach a host or cluster to a profile from: n Host Profiles main view n Host's context menu n Cluster's context menu n Cluster's Profile Compliance tab VMware, Inc. 221
  • 222. ESX Configuration Guide Attach Entities from the Host Profiles View Before you can apply the profile to an entity (host or cluster of hosts), you need to attach the entity to the profile. You can attach a host or cluster to a profile from the Host Profiles main view. Procedure 1 In the Host Profiles main view, select the profile to which you want to add the attachment from the profile list. 2 Click the Attach Host/Cluster icon. 3 Select the host or cluster from the expanded list and click Attach. The host or cluster is added to the Attached Entities list. 4 (Optional) Click Detach to remove an attachment from a host or cluster. 5 Click OK to close the dialog. Attach Entities from the Host Before you can apply the profile to a host you need to attach the host to the profile. You can attach a profile to a host from the host's context menu in the Hosts and Clusters inventory view. Procedure 1 In the Host and Clusters view, select the host to which you want to attach a profile. 2 Right-click the host and select Host Profile > Manage Profile. NOTE If no host profiles exist in your inventory, a dialog appears asking if you want to create and attach the host to this profile. 3 In the Attach Profile dialog, select the profile to attach to the host and click OK. The host profile is updated in the Summary tab of the host. Applying Profiles To bring a host to the desired state as specified in the profile, apply the profile to the host. You can apply a profile to a host from: n Host Profiles main view n Host's context menu n Cluster's Profile Compliance tab Apply a Profile from the Host Profiles View You can apply a profile to a host from the Host Profiles main view. Prerequisites The host must be in maintenance mode before a profile is applied to it. 222 VMware, Inc.
  • 223. Chapter 16 Managing Host Profiles Procedure 1 In the Host Profiles main view, select the profile you want to apply to the host. 2 Select the Hosts and Clusters tab. The list of attached hosts are shown under Entity Name. 3 Click Apply Profile. In the Profile Editor, you might be prompted to enter the required parameters needed to apply the profile. 4 Enter the parameters and click Next. 5 Continue until all the required parameters are entered. 6 Click Finish. Compliance Status is updated. Apply a Profile from the Host You can apply a profile to a host from the host's context menu. Prerequisites The host must be in maintenance mode before applying it to a profile Procedure 1 In the Host and Clusters view, select the host to which you want to apply a profile. 2 Right-click the host and select Host Profile > Apply Profile. 3 In the Profile Editor, enter the parameters and click Next. 4 Continue until all the required parameters are entered. 5 Click Finish. Compliance Status is updated. Change Reference Host The reference host configuration is used to create the host profile.. You can perform this task from the Host Profiles main view or from the host's context menu. Prerequisites The host profile must already exist. VMware, Inc. 223
  • 224. ESX Configuration Guide Procedure 1 You can perform this task either from the Host Profiles main view or from the host. u In the Host Profiles main view, right-click the profile you wish to change the reference host and select Change Reference Host. u In the Hosts and Clusters view, right-click the host to which you want to update references and select Manage Profiles. The Detach or Change Host Profile dialog opens. 2 Determine if you want to detatch the profile from the host or cluster or change the profile's reference host. u Click Detach to remove the association between the host and the profile. u Click Change to continue with updating the profile's reference host. If you selected Change, the Attach Profile dialog opens. The current host that the profile references is displayed as Reference Host. 3 Expand the inventory list and select the host to which you want the profile attached. 4 Click Update. The Reference Host is updated. 5 Click OK. The Summary tab for the host profile lists the updated reference host. Manage Profiles from a Cluster You can create a profile, attach a profile, or update reference hosts from the cluster's context menu. Procedure u In the Hosts and Clusters view, right-click a cluster and select Host Profile > Manage Profile. Depending on your host profile setup, one of the following results occurs: Profile Status and Task Result If the cluster is not attached to a host a A dialog box opens asking if you would like to create a profile and attach profile and no profile exist in your it to the cluster. inventory, create a profile. b If you select Yes, the Create Profile wizard opens. If the cluster is not attached to a host a The Attach Profile dialog opens. profile and one or more profiles exist b Select the profile you want to attach to the cluster and click OK. in your inventory, attach a profile. If the cluster is already attached to a In the dialog box, click Detach to detach the profile from the cluster or host profile, detach a profile or Change to attach a different profile to the cluster. attach to a different profile. Updating Profiles from the Reference Host If the configuration of the host from which a profile was created (the reference host) changes, you can update the profile so that its configuration matches the reference host's configuration. Once you create a host profile, you might need to make incremental updates to the profile. You can do this using two methods: n Make the configuration changes to the reference host in the vSphere Client, then update the profile from the reference host. The settings within the existing profile are updated to match those of the reference host. n Update the profile directly using the Profile Editor. 224 VMware, Inc.
  • 225. Chapter 16 Managing Host Profiles While updating the profile from the Profile Editor can be more comprehensive and provide more options, updating the profile from the reference host allows you to validate the configuration before rolling it out to other hosts that are attached to the profile. Updating the profile from the reference host is performed from the Host Profiles main view. Procedure u In the Host Profiles main view, right-click the profile you want to update and select Update Profile From Reference Host. Checking Compliance Checking compliance ensures that the host or cluster continues to be correctly configured. After a host or cluster is configured with the reference host profile, a manual change, for example, can occur, making the configuration incorrect. Checking compliance on a regular basis ensures that the host or cluster continues to be correctly configured. Check Compliance from the Host Profiles View You can check the compliance of a host or cluster to a profile from the Host Profiles main view. Procedure 1 From the Host Profiles list, select the profile that you want to check. 2 In the Hosts and Clusters tab, select the host or cluster from the list under Entity Name. 3 Click Check Compliance Now. The compliance status is updated as Compliant, Unknown, or Non-compliant. If the compliance status is Non-compliant, you can apply the host to the profile. Check Compliance from Host After a profile has been attached to a host, run a compliance check from the host's context menu to verify the configuration. Procedure 1 In the Host and Clusters view, select the host on which you want to run the compliance check. 2 Right-click the host and select Host Profile > Check Compliance. The host's compliance status is displayed in the host's Summary tab. If the host is not compliant, you must apply the profile to the host. VMware, Inc. 225
  • 226. ESX Configuration Guide Check Cluster Compliance A cluster may be checked for compliance with a host profile or for specific cluster requirements and settings. Procedure 1 In the Host and Clusters view, select the cluster on which you want to run the compliance check. 2 In the Profile Compliance tab, click Check Compliance Now to check the cluster's compliance with both the host profile that is attached to this cluster and the cluster requirements, if any. n The cluster is checked for compliance with specific settings for hosts in the cluster, such as DRS, HA, and DPM. For example, it may check if vMotion is enabled. The compliance status for the cluster requirements is updated. This check is performed even if a host profile is not attached to the cluster. n If a host profile is attached to the cluster, the cluster is checked for compliance with the host profile. The compliance status for the host profile is updated. 3 (Optional) Click Description next to the Cluster Requirements for a list of the specific cluster requirements. 4 (Optional) Click Description next to Host Profiles for a list of the specific host profile compliance checks. 5 (Optional) Click Change to change the host profile that is attached to the cluster. 6 (Optional) Click Remove to detach the host profile that is attached to the cluster. If the cluster is not compliant, the profile must be applied separately to each host within the cluster. 226 VMware, Inc.
  • 229. ESX Technical Support Commands A Most of the commands in this appendix are reserved for Technical Support use and are included for your reference only. In a few cases, however, these commands provide the only means of performing a configuration task for the host. Also, if you lose your connection to the host, executing certain of these commands through the command-line interface may be your only recourse—for example, if networking becomes nonfunctional and vSphere Client access is therefore unavailable. NOTE If you use the commands in this appendix, you must execute the service mgmt-vmware restart command to restart the vmware-hostd process and alert the vSphere Client and other management tools that the configuration has changed. In general, avoid executing the commands in this appendix if the host is currently under the vSphere Client or vCenter Server management. The vSphere Client graphical user interface provides the preferred means of performing the configuration tasks described in this topic. You can use this topic to learn which vSphere Client commands to use in place of these commands. This topic provides a summary of the actions you take in vSphere Client, but does not give complete instructions. For details on using commands and performing configuration tasks through vSphere Client, see the online help. You can find additional information on a number of ESX commands by logging in to the service console and using the man <esxcfg_command_name> command to display man pages. Table A-1 lists the Technical Support commands provided for ESX, summarizes the purpose of each command, and provides a vSphere Client alternative. You can perform most of the vSphere Client actions listed in the table only after you have selected an ESX host from the inventory panel and clicked the Configuration tab. These actions are preliminary to any procedure discussed below unless otherwise stated. Table A-1. ESX Technical Support Commands Command Command Purpose and vSphere Client Procedure esxcfg-advcfg Configures advanced options for ESX. To configure advanced options in vSphere Client, click Advanced Settings. When the Advanced Settings dialog box opens, use the list on the left to select the device type or activity you want to work with and then enter the appropriate settings. esxcfg-auth Configures authentication. You can use this command to switch between the pam_cracklib.so and pam_passwdqc.so plug-ins for password change rule enforcement. You also use this command to reset options for these two plug-ins. There are no means of configuring these functions in the vSphere Client. esxcfg-boot Configures bootstrap settings. This command is used for the bootstrap process and is intended for VMware Technical Support use only. You should not issue this command unless instructed to do so by a VMware Technical Support representative. There is no means of configuring these functions in vSphere Client. VMware, Inc. 229
  • 230. ESX Configuration Guide Table A-1. ESX Technical Support Commands (Continued) Command Command Purpose and vSphere Client Procedure esxcfg-dumppart Configures a diagnostic partition or searches for existing diagnostic partitions. When you install ESX, a diagnostic partition is created to store debugging information in the event of a system fault. You don’t need to create this partition manually unless you determine that there is no diagnostic partition for the host. You can perform the following management activities for diagnostic partitions in vSphere Client: n Determine whether there is a diagnostic partition — Click Storage>AddStorage and check the first page of the Add Storage Wizard to see whether it includes the Diagnostic option. If Diagnostic is not one of the options, ESX already has a diagnostic partition. n Configure a diagnostic partition — Click Storage>Add Storage>Diagnostic and step through the wizard. esxcfg-firewall Configures the service console firewall ports. To configure firewall ports for supported services and agents in vSphere Client, you select the Internet services that will be allowed to access the ESX host. Click Security Profile>Firewall>Properties and use the Firewall Properties dialog box to add services. You cannot configure unsupported services through the vSphere Client. For these services, use the esxcfg-firewall. esxcfg-info Prints information about the state of the service console, VMkernel, various subsystems in the virtual network, and storage resource hardware. vSphere Client doesn’t provide a method for printing this information, but you can obtain much of it through different tabs and functions in the user interface. For example, you can check the status of your virtual machines by reviewing the information on the Virtual Machines tab. esxcfg-init Performs internal initialization routines. This command is used for the bootstrap process you should not use it under any circumstances. Using this command can cause problems for ESX. There is no vSphere Client equivalent for this command. esxcfg-module Sets driver parameters and modifies which drivers are loaded during startup. This command is used for the bootstrap process and is intended for VMware Technical Support use only. You should not issue this command unless instructed to do so by a VMware Technical Support representative. There is no vSphere Client equivalent for this command. esxcfg-mpath Configures multipath settings for your Fibre Channel or iSCSI disks. To configure multipath settings for your storage in vSphere Client, click Storage. Select a datastore or mapped LUN and click Properties. When the Properties dialog box opens, select the desired extent if necessary. Then, click Extent Device>Manage Paths and use the Manage Path dialog box to configure the paths. esxcfg-nas Manages NFS mounts. You use this command to create or unmount an NFS datastore. To view NFS datastores in vSphere Client, click Storage > Datastores and scroll through the datastores list. You can also perform the following activities from the Storage > Datastores view: n Display the attributes of an NFS datastore – Click the datastore and review the information under Details. n Create an NFS datastore – Click Add Storage. n Unmount an NFS datastore – Click Remove, or right-click the datastore to unmount and select Unmount. 230 VMware, Inc.
  • 231. Appendix A ESX Technical Support Commands Table A-1. ESX Technical Support Commands (Continued) Command Command Purpose and vSphere Client Procedure esxcfg-nics Prints a list of physical network adapters along with information on the driver, PCI device, and link state of each NIC. You can also use this command to control a physical network adapter’s speed and duplexing. To view information on the physical network adapters for the host in vSphere Client, click Network Adapters. To change the speed and duplexing for a physical network adapter in the vSphere Client, click Networking>Properties for any of the virtual switches associated with the physical network adapter. In the Properties dialog box, click Network Adapters>Edit and select the speed and duplex combination. esxcfg-resgrp Restores resource group settings and lets you perform basic resource group management. Select a resource pool from the inventory panel and click Edit Settings on the Summary tab to change the resource group settings. esxcfg-route Sets or retrieves the default VMkernel gateway route and adds, removes, or lists static routes. To view the default VMkernel gateway route in vSphere Client, click DNS and Routing. To change the default routing, click Properties and update the information in both tabs of the DNS and Routing Configuration dialog box. esxcfg-swiscsi Configures your software iSCSI software adapter. To configure your software iSCSI system in vSphere Client, click Storage Adapters, select the iSCSI adapter you want to configure, and click Properties. Use the iSCSI Initiator Properties dialog box to configure the adapter. esxcfg-upgrade Upgrades from ESX Server 2.x to ESX. This command is not for general use. You complete the following three tasks when upgrading from 2.x to 3.x. Some of these can be performed in vSphere Client: n Upgrade the host — You upgrade the binaries, converting from ESX Server 2.x to ESX. You cannot perform this step from vSphere Client. n Upgrade the file system — To upgrade VMFS-2 to VMFS-3, suspend or power off your virtual machines and then click Inventory>Host>Enter Maintenance Mode. Click Storage, select a storage device, and click Upgrade to VMFS-3. You must perform this step for each storage device you want to upgrade. n Upgrade the virtual machines — To upgrade a virtual machine from VMS-2 to VMS-3, right-click the virtual machine in the inventory panel and choose Upgrade Virtual Machine. esxcfg-scsidevs Prints a map of VMkernel storage devices to service console devices. There is no vSphere Client equivalent for this command. esxcfg-vmknic Creates and updates VMkernel TCP/IP settings for vMotion, NAS, and iSCSI. To set up vMotion, NFS, or iSCSI network connections in vSphere Client, click Networking > Add Networking. Select VMkernel and step through the Add Network Wizard. Define the IP address subnet mask and VMkernel default gateway in the Connection Settings step. To review your settings, click the blue icon to the left of the vMotion, iSCSI, or NFS port. To edit any of these settings, click Properties for the switch. Select the port from the list on the switch Properties dialog box and click Edit to open the port Properties dialog box and change the settings for the port. VMware, Inc. 231
  • 232. ESX Configuration Guide Table A-1. ESX Technical Support Commands (Continued) Command Command Purpose and vSphere Client Procedure esxcfg-vswif Creates and updates service console network settings. This command is used if you cannot manage the ESX host through the vSphere Client because of network configuration issues. To set up connections for the service console in vSphere Client, click Networking > Add Networking. Select Service Console and step through the Add Network Wizard. Define the IP address subnet mask and the service console default gateway in the Connection Settings step. To review your settings, click the blue icon to the left of the service console port. To edit any of these settings, click Properties for the switch. Select the service console port from the list on the switch Properties dialog box. Click Edit to open the port Properties dialog box and change the settings for the port. esxcfg-vswitch Creates and updates virtual machine network settings. To set up connections for a virtual machine in vSphere Client, click Networking > Add Networking. Select Virtual Machine and step through the Add Network Wizard. To review your settings, click the speech bubble icon to the left of the virtual machine port group. To edit any of these settings, click Properties for the switch. Select the virtual machine port from the list on the switch Properties dialog box, then click Edit to open the port Properties dialog box and change the settings for the port. 232 VMware, Inc.
  • 233. Linux Commands Used with ESX B To support certain internal operations, ESX installations include a subset of standard Linux configuration commands, for example, network and storage configuration commands. Using these commands to perform configuration tasks can result in serious configuration conflicts and render some ESX functions unusable. Always work through the vSphere Client when configuring ESX, unless otherwise instructed in vSphere documentation or by VMware Technical Support. VMware, Inc. 233
  • 235. Using vmkfstools C You use the vmkfstools utility to create and manipulate virtual disks, file systems, logical volumes, and physical storage devices on the VMware ESX hosts. Using vmkfstools, you can create and manage virtual machine file system (VMFS) on a physical partition of a disk. You can also use the command to manipulate files, such as virtual disk files, stored on VMFS-2, VMFS-3, and NFS. You can perform most vmkfstools operations using the vSphere Client. This appendix includes the following topics: n “vmkfstools Command Syntax,” on page 235 n “vmkfstools Options,” on page 236 vmkfstools Command Syntax Generally, you do not need to log in as the root user to run the vmkfstools commands. However, some commands, such as the file system commands, might require the root user login. Use the following arguments with the vmkfstools command: n options are one or more command-line options and associated arguments that you use to specify the activity for vmkfstools to perform, for example, choosing the disk format when creating a new virtual disk. After entering the option, specify a file or VMFS file system on which to perform the operation by entering a relative or absolute file path name in the /vmfs hierarchy. n partition specifies disk partitions. This argument uses a vml.vml_ID:P format, where vml_ID is the device ID returned by the storage array and P is an integer that represents the partition number. The partition digit must be greater than zero (0) and should correspond to a valid VMFS partition of type fb. n device specifies devices or logical volumes. This argument uses a path name in the ESX device file system. The path name begins with /vmfs/devices, which is the mount point of the device file system. Use the following formats when you specify different types of devices: n /vmfs/devices/disks for local or SAN-based disks. n /vmfs/devices/lvm for ESX logical volumes. n /vmfs/devices/generic for generic SCSI devices, such as tape drives. n path specifies a VMFS file system or file. This argument is an absolute or relative path that names a directory symbolic link, a raw device mapping, or a file under /vmfs. n To specify a VMFS file system, use this format: /vmfs/volumes/file_system_UUID VMware, Inc. 235
  • 236. ESX Configuration Guide or /vmfs/volumes/file_system_label n To specify a VMFS file, use this format: /vmfs/volumes/file system label|file system UUID/[dir]/myDisk.vmdk You do not need to enter the entire path if the current working directory is the parent directory of myDisk.vmdk. For example, /vmfs/volumes/datastore1/rh9.vmdk vmkfstools Options The vmkfstools command has several options. Some of the options are suggested for advanced users only. The long and single-letter forms of the options are equivalent. For example, the following commands are identical. vmkfstools --createfs vmfs3 --blocksize 2m vml.vml_ID:1 vmkfstools -C vmfs3 -b 2m vml.vml_ID:1 -v Suboption The -v suboption indicates the verbosity level of the command output. The format for this suboption is as follows: -v --verbose number You specify the number value as an integer from 1 through 10. You can specify the -v suboption with any vmkfstools option. If the output of the option is not suitable for use with the -v suboption, vmkfstools ignores -v. NOTE Because you can include the -v suboption in any vmkfstools command line, -v is not included as a suboption in the option descriptions. File System Options File system options allow you to create a VMFS file system. These options do not apply to NFS. You can perform many of these tasks through the vSphere Client. Creating a VMFS File System Use the vmkfstools command to create a VMFS file system. -C --createfs vmfs3 -b --blocksize block_sizekK|mM -S --setfsname fsName This option creates a VMFS-3 file system on the specified SCSI partition, such as vml.vml_ID:1. The partition becomes the file system's head partition. VMFS-2 file systems are read-only on any ESX host. You cannot create or modify VMFS-2 file systems but you can read files stored on VMFS-2 file systems. VMFS-3 file systems are not accessible from ESX 2.x hosts. CAUTION You can have only one VMFS volume for a LUN. 236 VMware, Inc.
  • 237. Appendix C Using vmkfstools You can specify the following suboptions with the -C option: n -b --blocksize – Define the block size for the VMFS-3 file system. The default block size is 1MB. The block_size value you specify must be a multiple of 128kb, with a minimum value of 128kb. When you enter a size, indicate the unit type by adding a suffix of m or M. The unit type is not case sensitive. vmkfstools interprets m or M to mean megabytes and k or K to mean kilobytes. n -S --setfsname – Define the volume label of a VMFS volume for the VMFS-3 file system you are creating. Use this suboption only in conjunction with the -C option. The label you specify can be up to 128 characters long and cannot contain any leading or trailing blank spaces. After you define a volume label, you can use it whenever you specify the VMFS volume for the vmkfstools command. The volume label appears in listings generated for the Linux ls -l command and as a symbolic link to the VMFS volume under the /vmfs/volumes directory. To change the VMFS volume label, use the Linux ln -sf command. Use the following as an example: ln -sf /vmfs/volumes/UUID /vmfs/volumes/fsName fsName is the new volume label to use for the UUID VMFS. Example for Creating a VMFS File System This example illustrates creating a new VMFS-3 file system named my_vmfs on the vml.vml_ID:1 partition. The file block size is 1MB. vmkfstools -C vmfs3 -b 1m -S my_vmfs /vmfs/devices/disks/vml.vml_ID:1 Extending an Existing VMFS-3 Volume Use the vmkfstools command to add an extend to a VMFS volume. -Z --extendfs extention-device existing-VMFS-volume This option adds another extent to a previously created VMFS volume existing-VMFS-volume. You must specify the full path name, for example /vmfs/devices/disks/vml.vml_ID:1, not just the short name vml.vml_ID:1. Each time you use this option, you extend a VMFS-3 volume with a new extent so that the volume spans multiple partitions. At most, a logical VMFS-3 volume can have 32 physical extents. CAUTION When you run this option, you lose all data that previously existed on the SCSI device you specified in extension-device. Example for Extending a VMFS-3 Volume This example extends the logical file system by allowing it to span to a new partition. vmkfstools -Z /vmfs/devices/disks/vml.vml_ID_2:1 /vmfs/devices/disks/vml.vml_ID_1:1 The extended file system spans two partitions—vml.vml_ID_1:1 and vml.vml_ID_2:2. In this example, vml.vml_ID_1:1 is the name of the head partition. Listing Attributes of a VMFS Volume Use the vmkfstools command to list attributes of a VMFS volume. -P --queryfs -h --human-readable VMware, Inc. 237
  • 238. ESX Configuration Guide When you use this option on any file or directory that resides on a VMFS volume, the option lists the attributes of the specified volume. The listed attributes include the VMFS version number (VMFS-2 or VMFS-3), the number of extents comprising the specified VMFS volume, the volume label if any, the UUID, and a listing of the device names where each extent resides. NOTE If any device backing VMFS file system goes offline, the number of extents and available space change accordingly. You can specify the -h suboption with the -P option. If you do so, vmkfstools lists the capacity of the volume in a more readable form, for example, 5k, 12.1M, or 2.1G. Upgrading a VMFS-2 to VMFS-3 You can upgrade a VMFS-2 file system to VMFS-3. CAUTION The VMFS-2 to VMFS-3 conversion is a one-way process. After you have converted a VMFS-2 volume to VMFS-3, you cannot revert it back to a VMFS-2 volume. You can upgrade a VMFS-2 file system only if its file block size does not exceed 8 MB. When upgrading the file system, use the following options: n -T --tovmfs3 -x --upgradetype [zeroedthick|eagerzeroedthick|thin] This option converts a VMFS-2 file system VMFS-3 preserving all files on the file system. Before conversion, unload the vmfs2 and vmfs3 drivers and load the auxiliary file system driver, fsaux, with a module option fsauxFunction=upgrade. You must specify the upgrade type using the -x --upgradetype suboption as one of the following: n -x zeroedthick (default) – Retains the properties of VMFS-2 thick files. With the zeroedthick file format, disk space is allocated to the files for future use and the unused data blocks are not zeroed out. n -x eagerzeroedthick – Zeroes out unused data blocks in thick files during conversion. If you use this suboption, the upgrade process might take much longer than with the other options. n -x thin – Converts the VMFS-2 thick files into thin-provisioned VMFS-3 files. As opposed to thick file format, the thin-provisioned format doesn't allow files to have extra space allocated for their future use, but instead provides the space on demand. During this conversion, unused blocks of the thick files are discarded. During conversion, the ESX file-locking mechanism ensures that no other local process accesses the VMFS volume that is being converted, although you need to make sure that no remote ESX host is accessing this volume. The conversion might take several minutes and returns to the command prompt when complete. After conversion, unload the fsaux driver and load vmfs3 and vmfs2 drivers to resume normal operations. n -u --upgradefinish This option completes the upgrade. 238 VMware, Inc.
  • 239. Appendix C Using vmkfstools Virtual Disk Options Virtual disk options allow you to set up, migrate, and manage virtual disks stored in VMFS-2, VMFS-3, and NFS file systems. You can also perform most of these tasks through the vSphere Client. Supported Disk Formats When you create or clone a virtual disk, you can use the -d --diskformat suboption to specify the format for the disk. Choose from the following formats: n zeroedthick (default) – Space required for the virtual disk is allocated during creation. Any data remaining on the physical device is not erased during creation, but is zeroed out on demand at a later time on first write from the virtual machine. The virtual machine does not read stale data from disk. n eagerzeroedthick – Space required for the virtual disk is allocated at creation time. In contrast to zeroedthick format, the data remaining on the physical device is zeroed out during creation. It might take much longer to create disks in this format than to create other types of disks. n thick – Space required for the virtual disk is allocated during creation. This type of formatting doesn’t zero out any old data that might be present on this allocated space. A non-root user is not allowed to create this format. n thin – Thin-provisioned virtual disk. Unlike with the thick format, space required for the virtual disk is not allocated during creation, but is supplied, zeroed out, on demand at a later time. n rdm – Virtual compatibility mode raw disk mapping. n rdmp – Physical compatibility mode (pass-through) raw disk mapping. n raw – Raw device. n 2gbsparse – A sparse disk with 2GB maximum extent size. You can use disks in this format with other VMware products, however, you cannot power on sparse disk on an ESX host unless you first re-import the disk with vmkfstools in a compatible format, such as thick or thin. n monosparse – A monolithic sparse disk. You can use disks in this format with other VMware products. n monoflat – A monolithic flat disk. You can use disks in this format with other VMware products. NOTE The only disk formats you can use for NFS are thin, thick, zerodthick and 2gbsparse. Thick, zeroedthick and thin usually mean the same because the NFS server and not the ESX host decides the allocation policy. The default allocation policy on most NFS servers is thin. Creating a Virtual Disk Use the vmkfstools command to create a virtual disk. -c --createvirtualdisk size[kK|mM|gG] -a --adaptertype [buslogic|lsilogic] srcfile -d --diskformat [thin|zeroedthick|eagerzeroedthick] This option creates a virtual disk at the specified path on a VMFS volume. Specify the size of the virtual disk. When you enter the value for size, you can indicate the unit type by adding a suffix of k (kilobytes), m (megabytes), or g (gigabytes). The unit type is not case sensitive. vmkfstools interprets either k or K to mean kilobytes. If you don’t specify a unit type, vmkfstools defaults to bytes. VMware, Inc. 239
  • 240. ESX Configuration Guide You can specify the following suboptions with the -c option. n -a specifies the device driver that is used to communicate with the virtual disks. You can choose between BusLogic and LSI Logic SCSI drivers. n -d specifies disk formats. Example for Creating a Virtual Disk This example illustrates creating a two-gigabyte virtual disk file named rh6.2.vmdk on the VMFS file system named myVMFS. This file represents an empty virtual disk that virtual machines can access. vmkfstools -c 2048m /vmfs/volumes/myVMFS/rh6.2.vmdk Initializing a Virtual Disk Use the vmkfstools command to initialize a virtual disk. -w --writezeros This option cleans the virtual disk by writing zeros over all its data. Depending on the size of your virtual disk and the I/O bandwidth to the device hosting the virtual disk, completing this command might take a long time. CAUTION When you use this command, you lose any existing data on the virtual disk. Inflating a Thin Virtual Disk Use the vmkfstools command to inflate a thin virtual disk. -j --inflatedisk This option converts a thin virtual disk to eagerzeroedthick, preserving all existing data. The option allocates and zeroes out any blocks that are not already allocated. Removing Zeroed Blocks Use the vmkfstools command to convert any thin, zeroedthick, or eagerzeroedthick virtual disk to a thin disk with zeroed blocks removed. -K --punchzero This option deallocates all zeroed out blocks and leaves only those blocks that were allocated previously and contain valid data. The resulting virtual disk is in thin format. Converting a Zeroedthick Virtual Disk to an Eagerzeroedthick Disk Use the vmkfstools command to convert any zeroedthick virtual disk to an eagerzeroedthick disk. -k --eagerzero While performing the conversion, this option preserves any data on the virtual disk. Deleting a Virtual Disk This option deletes files associated with the virtual disk listed at the specified path on the VMFS volume. -U --deletevirtualdisk 240 VMware, Inc.
  • 241. Appendix C Using vmkfstools Renaming a Virtual Disk This option renames a file associated with the virtual disk listed in the path specification portion of the command line. You must specify the original file name or file path oldName and the new file name or file path newName. -E --renamevirtualdisk oldName newName Cloning a Virtual or Raw Disk This option creates a copy of a virtual disk or raw disk you specify. -I --importfile srcfile -d --diskformat [rdm:device|rdmp:device| raw:device|thin|2gbsparse|monosparse|monoflat] You can use the -d suboption for the -I option. This suboption specifies the disk format for the copy you create. A non-root user is not allowed to clone a virtual disk or a raw disk. NOTE To clone the ESX Redo logs while preserving their hierarchy, use the cp command. Example for Cloning a Virtual Disk This example illustrates cloning the contents of a master virtual disk from the templates repository to a virtual disk file named myOS.vmdk on the myVMFS file system. vmkfstools -I /vmfs/volumes/templates/gold-master.vmdk /vmfs/volumes/myVMFS/myOS.vmdk You can configure a virtual machine to use this virtual disk by adding lines to the virtual machine configuration file, as in the following example: scsi0:0.present = TRUE scsi0:0.fileName = /vmfs/volumes/myVMFS/myOS.vmdk Migrate VMware Workstation and VMware GSX Server Virtual Machines You cannot use a vSphere Client to migrate virtual machines created with VMware Workstation or VMware GSX Server into your ESX system. However, you can use the vmkfstools -I command to import the virtual disk into your ESX system and then attach this disk to a new virtual machine you create in ESX. You must import the virtual disk first because you cannot power on disks exported in 2gbsparse format on an ESX host. Procedure 1 Import a Workstation or GSX Server disk into your /vmfs/volumes/myVMFS/ directory or any subdirectory. 2 In the vSphere Client, create a new virtual machine using the Custom configuration option. 3 When you configure a disk, select Use an existing virtual disk and attach the Workstation or GSX Server disk you imported. Extending a Virtual Disk This option extends the size of a disk allocated to a virtual machine after the virtual machine has been created. -X --extendvirtualdisk newSize[kK|mM|gG] You must power off the virtual machine that uses this disk file before you enter this command. You might have to update the file system on the disk so the guest operating system can recognize and use the new size of the disk and take advantage of the extra space. VMware, Inc. 241
  • 242. ESX Configuration Guide You specify the newSize parameter in kilobytes, megabytes, or gigabytes by adding a k (kilobytes), m (megabytes), or g (gigabytes) suffix. The unit type is not case sensitive. vmkfstools interprets either k or K to mean kilobytes. If you don’t specify a unit type, vmkfstools defaults to kilobytes. The newSize parameter defines the entire new size, not just the increment you add to the disk. For example, to extend a 4g virtual disk by 1g, enter: vmkfstools -X 5g disk name.dsk NOTE Do not extend the base disk of a virtual machine that has snapshots associated with it. If you do, you can no longer commit the snapshot or revert the base disk to its original size. Migrating a VMFS-2 Virtual Disk to VMFS-3 This option converts the specified virtual disk file from ESX Server 2 format to ESX format. -M --migratevirtualdisk Creating a Virtual Compatibility Mode Raw Device Mapping This option creates a Raw Device Mapping (RDM) file on a VMFS-3 volume and maps a raw disk to this file. After this mapping is established, you can access the raw disk as you would a normal VMFS virtual disk. The file length of the mapping is the same as the size of the raw disk it points to. -r --createrdm device When specifying the device parameter, use the following format: /vmfs/devices/disks/vml.vml_ID NOTE All VMFS-3 file-locking mechanisms apply to RDMs. Example for Creating a Virtual Compatibility Mode RDM In this example, you create an RDM file named my_rdm.vmdk and map the vml.vml_ID raw disk to that file. vmkfstools -r /vmfs/devices/disks/vml.vml_ID my_rdm.vmdk You can configure a virtual machine to use the my_rdm.vmdk mapping file by adding the following lines to the virtual machine configuration file: scsi0:0.present = TRUE scsi0:0.fileName = /vmfs/volumes/myVMFS/my_rdm.vmdk Creating a Physical Compatibility Mode Raw Device Mapping This option lets you map a pass-through raw device to a file on a VMFS volume. This mapping lets a virtual machine bypass ESX SCSI command filtering when accessing its virtual disk.This type of mapping is useful when the virtual machine needs to send proprietary SCSI commands, for example, when SAN-aware software runs on the virtual machine. -z --createrdmpassthru device After you establish this type of mapping, you can use it to access the raw disk just as you would any other VMFS virtual disk. When specifying the device parameter, use the following format: /vmfs/devices/disks/vml.vml_ID 242 VMware, Inc.
  • 243. Appendix C Using vmkfstools Listing Attributes of an RDM This option lets you list the attributes of a raw disk mapping. -q --queryrdm This option prints the name of the raw disk RDM. The option also prints other identification information, like the disk ID, for the raw disk. Displaying Virtual Disk Geometry This option gets information about the geometry of a virtual disk. -g --geometry The output is in the form: Geometry information C/H/S, where C represents the number of cylinders, H represents the number of heads, and S represents the number of sectors. NOTE When you import VMware Workstation virtual disks to an ESX host, you might see a disk geometry mismatch error message. A disk geometry mismatch might also be the cause of problems loading a guest operating system or running a newly-created virtual machine. Checking and Repairing Virtual Disks Use this option to check or repair a virtual disk in case of an unclean shutdown. -x , -fix [check|repair] Managing SCSI Reservations of LUNs The -L option allows you to perform administrative task for physical storage devices. You can perform most of these tasks through the vSphere Client. -L --lock [reserve|release|lunreset|targetreset|busreset]device This option lets you reserve a SCSI LUN for exclusive use by an ESX host, release a reservation so that other hosts can access the LUN, and reset a reservation, forcing all reservations from the target to be released. CAUTION Using the -L option can interrupt the operations of other servers on a SAN. Use the -L option only when troubleshooting clustering setups. Unless specifically advised by VMware, never use this option on a LUN hosting a VMFS volume. You can specify the -L option in several ways: n -L reserve – Reserves the specified LUN. After the reservation, only the server that reserved that LUN can access it. If other servers attempt to access that LUN, a reservation error results. n -L release – Releases the reservation on the specified LUN. Other servers can access the LUN again. n -L lunreset – Resets the specified LUN by clearing any reservation on the LUN and making the LUN available to all servers again. The reset does not affect any of the other LUNs on the device. If another LUN on the device is reserved, it remains reserved. n -L targetreset – Resets the entire target. The reset clears any reservations on all the LUNs associated with that target and makes the LUNs available to all servers again. n -L busreset – Resets all accessible targets on the bus. The reset clears any reservation on all the LUNs accessible through the bus and makes them available to all servers again. When entering the device parameter, use the following format: /vmfs/devices/disks/vml.vml_ID:P VMware, Inc. 243
  • 245. Index Symbols B * next to path 120 bandwidth average 55, 56 Numerics peak 55, 56 802.1Q and ISL tagging attacks 162 best practices networking 65 A security 205 binding on host, dvPort groups 33 accessing storage 84 Blade servers active adapters 25 and virtual networking 70 Active Directory 179, 180 configuring a virtual machine port group 71 active uplinks 45, 47–49 configuring a VMkernel port 71 active-active disk arrays 121 block devices 132 active-passive disk arrays 121 blocked ports, dvPorts 58 adapter, virtual 39 burst size 55–57 adding dvPort groups 32 C NFS storage 107 CA-signed certificates 182 adding a VMkernel network adapter 20 CDP 25, 26 adding users to groups 179 certificates Administrator role 175, 176 certificate file 181 aging, password restrictions 195 checking 181 antivirus software, installing 209 configuring host searches 185 applications default 181 default 201, 202 disabling SSL for vSphere Web Access and disabling optional 200 SDK 184 optional 200–202 generating new 182 setgid flag 200 key file 181 setuid flag 200 location 181 asterisk next to path 120 SSL 181 attacks vCenter Server 181 802.1Q and ISL tagging 162 vSphere Web Access 181 double-encapsulated 162 certification, security 147 MAC flooding 162 changing host proxy services 185 multicast brute-force 162 CHAP random frame 162 disabling 102 spanning tree 162 for discovery targets 101 authentication for iSCSI initiators 100 groups 173 for static targets 101 iSCSI storage 168 mutual 99 users 171, 173 one-way 99 vSphere Client to ESX 171 CHAP authentication 99, 169 authentication daemon 171 CHAP authentication methods 99 average bandwidth 55, 57 character classes, passwords 173 CIM and firewall ports 154 cipher strength, connections 200 VMware, Inc. 245
  • 246. ESX Configuration Guide Cisco Discovery Protocol 26, 31 device disconnection, preventing 210 Cisco switches 25 DHCP 23 claim rules 120 diagnostic partition, configuring 108 clusters, managing profiles from 224 direct access 173 command reference for ESX 229 directory service commands 233 Active Directory 179 compatibility modes configuring a host 179 physical 132 disabling virtual 132 iSCSI SAN authentication 169 compliance checks, host profiles 221 logging for guest operating systems 212, 213 config reset at disconnect, dvPort groups 33 setgid applications 200 configuring setuid applications 200 dynamic discovery 97 SSL for vSphere Web Access and SDK 184 RDM 134 variable information size 211 SCSI storage 105 disabling paths 123 static discovery 98 discovery copy and paste address 97 enabling for guest operating systems 209 dynamic 97 guest operating systems 209 static 98 virtual machines 209 disk arrays creating, host profiles 218, 219 active-active 121 current multipathing state 121 active-passive 121 disk formats D NFS 106 datastore copies, mounting 113 thick provisioned 125 datastores thin provisioned 125 adding extents 112 disks, format 126 configuring on NFS volumes 107 DMZ 144 creating on SCSI disk 105 DNS 58 displaying 87 double-encapsulated attacks 162 grouping 110 dvPort group, load balancing 48 increasing capacity 112 dvPort groups managing 109 binding on host 33 managing duplicate 113 config reset at disconnect 33 mounting 114 description 33 NFS 81 failback 48 paths 121 failover order 48 refreshing 104 live port moving 33 renaming 110 name 33 review properties 88 network failover detection 48 storage over-subscription 127 notify switches 48 unmounting 111 number of ports 33 VMFS 81 override settings 33 default certificates, replacing with CA-signed port blocking 58 certificates 182 port group type 33 delegate user 106 port name format 33 dependent hardware iSCSI teaming and failover policies 48 and associated NICs 96 traffic shaping policies 57 configuration workflow 94 virtual machines 41 considerations 95 dvPort Groups, adding 32 reviewing adapters 95 dvPorts deployments for security blocked ports 58 multiple customer open 205, 208 blocking 58 multiple customer restricted 206 246 VMware, Inc.
  • 247. Index failback 49 Fibre Channel 78 failover order 49 Fibre Channel SANs, WWNs 80 load balancing 49 Fibre Channel storage, overview 90 monitoring 34 file systems, upgrading 113 firewall network failover detection 49 rules 194 notify switches 49 troubleshooting 194 port policies 58 firewall ports properties 34 automating service behavior 156 states 34 backup agents 190 teaming and failover policies 49 closing 193 traffic shaping policies 57 configuring with vCenter Server 150 VLAN policies 51 configuring without vCenter Server 151 dvUplink 29 connecting to vCenter Server 152 dynamic discovery, configuring 97 connecting virtual machine console 153 dynamic discovery addresses 97 encryption 181 host to host 154 E management 154 early binding port groups 33 opening in service console 192 editing opening with vSphere Client 154 host profile policies 220 overview 149 host profiles 220 SDK and virtual machine console 153 educational support 7 security level 190–192 enabling, host profile policy compliance service console 190–193 checks 221 encryption supported services 154 certificates 181 vSphere Client and vCenter Server 150 enabling and disabling SSL 181 vSphere Client and virtual machine for user name, passwords, packets 181 console 153 enhanced vmxnet 60–62 vSphere Client direct connection 151 ESX, command reference 229 vSphere Web Access and the virtual machine console 153 esxcfg commands 229 vSphere Web Access and vCenter Server 150 esxcfg-firewall 194 vSphere Web Access direct connection 151 examples firewalls vmkfstools -C 237 access for management agents 155 vmkfstools -Z 237 access for services 155 exporting host groups 176 configuring 156 host profiles 219 Fixed path policy 117, 121 host users 176 forged transmissions 163, 164 extents forged transmits 53, 54 adding to datastore 112 FTP and firewall ports 154 growing 112 G F generating certificates 182 failback 45, 47–49 groups failover 44, 45, 115 about 176 failover order 45, 47–49 adding to hosts 178 failover paths, status 120 adding users 179 failover policies authentication 173 dvPort groups 48 exporting a group list 176 dvPorts 49 modifying on hosts 179 port group 47 permissions and roles 172 vSwitch 45 VMware, Inc. 247
  • 248. ESX Configuration Guide removing from hosts 178 hosts viewing group lists 176 adding groups 178 guest operating systems adding to a vNetwork Distributed Switch 30 copy and paste 209 adding users 177 disabling logging 212, 213 deployments and security 205 enabling copy and paste 209 memory 211 limiting variable information size 211 thumbprints 181 logging levels 212 security recommendations 209 I IDE 78 H importing host profile 219 hardware acceleration inbound traffic shaping 57 about 123 Internet Protocol 43 benefits 123 Internet Protocol Security (IPsec) 165 disabling 124 IP address 31 requirements 123 IP addresses 80 status 124 IP storage port groups, creating 20, 37 hardware devices, removing 210 hardware iSCSI, and failover 119 IPsec, See Internet Protocol Security (IPsec) hardware iSCSI adapters IPv4 43 dependent 91 IPv6 43 independent 91 iSCSI hardware iSCSI initiators authentication 168 changing iSCSI name 93 networking 20, 44 configuring 92 protecting transmitted data 169 installing 92 QLogic iSCSI adapters 168 setting up discovery addresses 97 securing ports 169 setting up naming parameters 93 security 168 viewing 92 software client and firewall ports 154 host, reference 223 with multiple NICs 68 host certificate searches 185 iSCSI adapters host name, configuring 179 hardware 91 host networking, viewing 15 software 91 host profile, attaching entities 221 iSCSI aliases 80 host profiles accessing 218 iSCSI HBA, alias 93 iSCSI initiators applying permissions 180 advanced parameters 102 applying profiles 222, 223 configuring advanced parameters 103 attaching entities from host 222 configuring CHAP 100 attaching entities from Host Profile view 222 hardware 92 checking compliance 225, 226 setting up CHAP parameters 99 creating 218 iSCSI names 80 creating from host 219 iSCSI networking, creating a VMkernel port 68 creating from host profile view 218 iSCSI SAN authentication, disabling 169 editing a policy 220 iSCSI storage editing profiles 220 hardware-initiated 90 enabling policy compliance checks 221 initiators 90 exporting 219 software-initiated 90 importing profiles 219 isolation virtual machines 140 managing profiles 221 virtual networking layer 142 updating from reference host 224 virtual switches 142 usage model 217 VLANs 142 host-to-host firewall ports 154 248 VMware, Inc.
  • 249. Index J multipathing policy 121 jumbo frames multipathing state 121 enabling 62 mutual CHAP 99 virtual machines 61, 62 N L NAS, mounting 66 late binding port groups 33 NAT 43 Layer 2 security 51 Native Multipathing Plug-In 115, 117 live port moving, dvPort groups 33 Nessus 203 load balancing 44, 45, 47–49 netqueue, enable 63 local SCSI storage, overview 89 NetQueue, disabling 63 log files network adapter, service console 22 limiting number 212 network adapters limiting size 212 vDS 36, 37 logging, disabling for guest operating viewing 15, 31 systems 212, 213 network address translation 43 logging levels, guest operating systems 212 network failover detection 45, 47–49 LUNs networking creating and rescan 104 avanced 43 making changes and rescan 104 best practices 65 multipathing policy 121 introduction 13 setting multipathing policy 121 performance 63 security policies 53, 54 M troubleshooting 65, 72 MAC address configuration 60 networking best practices 65 configuring 59 networks dvPorts 33 generating 59 resource pools 41 static 60 resource settings 42 MAC address changes 163, 164 security 158 MAC addresses 53, 54 NFS MAC flooding 162 firewall ports 154 management access networking 20 firewalls 155 NFS datastores TCP and UDP ports 157 repositories 107 maximum MTU 31 unmounting 111 maximum number of ports 31 NFS storage metadata, RDMs 132 adding 107 modifying groups on hosts 179 overview 106 Most Recently Used path policy 117, 121 NIC teaming, definition 13 NICs mounting VMFS datastores 113 adding to a vNetwork Distributed Switch 36 MPPs, See multipathing plug-ins mapping to ports 69 MRU path policy 121 removing from a vNetwork Distributed MTU 60, 62, 63 Switch 36 multicast brute-force attacks 162 NIS and firewall ports 154 multipathing NMP activating for software iSCSI 96 I/O flow 118 active paths 120 path claiming 120 broken paths 120 See also Native Multipathing Plug-In disabled paths 120 no access role 175 standby paths 120 No Access role 175 viewing the current state of 120 notify switches 45, 47–49 multipathing plug-ins, path claiming 120 NTP 156, 179 VMware, Inc. 249
  • 250. ESX Configuration Guide O physical network adapters one-way CHAP 99 adding to a vNetwork Distributed Switch 36 outbound traffic shaping 57 managing 36 override settings, dvPort groups 33 removing 36 physical switches, troubleshooting 73 plug-ins P pam_cracklib.so 197, 199 pam_cracklib.so plug-in 197, 199 pam_passwdqc.so 196 pam_passwdqc.so plug-in 196 Pluggable Storage Architecture 115 partition mappings 132 policies, security 166 passive disk arrays 121 port binding 67, 96, 119 passphrase 173 port blocking, dvPort groups 58 passthrough device, add to a virtual machine 64 port configuration 24 passwords aging 195 port group definition 13 aging restrictions 195 using 18 character classes 173 port groups complexity 196 failback 47 criteria 196 failover order 47 host 194–197, 199 Layer 2 Security 52 length 196 load balancing 47 pam_cracklib.so plug-in 197, 199 network failover detection 47 pam_passwdqc.so plug-in 196 notify switches 47 plug-ins 196 traffic shaping 56 requirements 173 troubleshooting 73 restrictions 194–196 port name format, dvPort groups 33 reuse rules 197 ports, service console 22 service console 194 preferred path 120 path claiming 120 private VLAN path failover, host-based 119 create 35 path failure 118 primary 35 path failure rescan 104 removing 35 path management 115 secondary 35 path policies privileges and permissions 174 changing defaults 122 profiles, managing 224 Fixed 117, 121 promiscuous mode 53, 54, 163, 164 Most Recently Used 117, 121 properties, dvPorts 34 MRU 121 proxy services changing 185 Round Robin 117, 121 encryption 181 Path Selection Plug-Ins 117 PSA, See Pluggable Storage Architecture paths disabling 123 PSPs, See Path Selection Plug-Ins preferred 120 PCI 64 R RAID devices 132 peak bandwidth 55–57 random frame attacks 162 permissions and privileges 174 raw device mapping, see RDM 129 RDM host profiles 180 advantages 130 overview 174 and virtual disk files 133 root user 174 creating 134 user 174, 175 dynamic name resolution 133 vCenter Server administrator 174 overview 129 vpxuser 174 250 VMware, Inc.
  • 251. Index physical compatibility mode 132 resource guarantees and limits 140 virtual compatibility mode 132 scanning software 203 with clustering 133 scenarios 205 RDMs service console 146, 189 and snapshots 132 setuid and setgid flags 200 and VMFS formats 132 virtual machines 140 path management 135 virtual machines with VLANs 158 Read Only role 175, 176 virtual networking layer 142 reference host 223 virtual switch ports 163 removing users from groups 179 VLAN hopping 160 replacing, default certificates 182 VMware policy 147 rescan vmware-authd 171 LUN creation 104 vmware-hostd 171 path masking 104 security associations when path is down 104 adding 165 resource limits and guarantees, security 140 available 166 resource pool settings, vDS 42 resource pools, networks 41 listing 166 roles removing 166 Administrator 175 security policies and permissions 175 available 168 default 175 creating 166 host profiles 180 dvPorts 53, 54 No Access 175 listing 168 Read Only 175 removing 168 service console security 175 default gateway 23 root login permissions 174 direct connections 190 SSH 202 firewall ports 192 Round Robin path policy 117, 121 firewall ports, closing 193 routing 58 firewall ports, opening 192 firewall security 190 S isolating 161 SAS 78 logging in 190 SATA 78 network policies 23 SATPs, See Storage Array Type Plug-Ins networking 40 SCSI, vmkfstools 235 password plug-in 197, 199 SDK, firewall ports and virtual machine password restrictions 194 console 153 recommendations for securing 189 security remote connections 190 architecture 139 securing with VLANs and virtual switches 160 best practices 205 security 189 certification 147 setgid applications 200 cipher strength 200 setuid applications 200 DMZ in single host 142, 144 SSH connections 202 ESX 139, 149 troubleshooting 73 features 139 VLAN 23 iSCSI storage 168 service console networking overview 139 configuration 21 PAM authentication 171 troubleshooting 72, 73 patches 203 service console security 146, 189 permissions 174 recommendations for virtual machines 209 VMware, Inc. 251
  • 252. ESX Configuration Guide services overview 77 automating 156 provisioned 126 starting 156 provisioning 124 setgid SAN 90 applications 200 securing with VLANs and virtual switches 160 default applications 202 supported vSphere features 84 disabling applications 200 types 78 setinfo 211 used by virtual machines 126 setuid storage adapters applications 200 copying names 86 default applications 201 Fibre Channel 90 disabling applications 200 viewing 85 shell access, granting 177 viewing in vSphere Client 85 single point of failure 89 Storage Array Type Plug-Ins 117 SMB and firewall ports 154 storage devices SNMP and firewall ports 154 displaying for a host 86 software iSCSI displaying for an adapter 87 and failover 119 identifiers 81, 87 diagnostic partition 107 names 81 networking 67 paths 121 software iSCSI initiators configuring 93 runtime names 81 enabling 94 viewing 86 storage filters setting up discovery addresses 97 disabling 127 spanning tree attacks 162 host rescan 128 SPOF 89 RDM 128 SSH same host and transports 128 configuring 203 VMFS 128 firewall ports 154 storage space 124 security settings 202 switch, vNetwork 39 service console 202 SSL enabling and disabling 181 T encryption and certificates 181 targets 79 timeouts 183 TCP ports 157 standby adapters 25 TCP Segmentation Offload 60, 61 standby uplinks 45, 47–49 TCP/IP, default gateway 23 teaming policies states, dvPorts 34 dvPort groups 48 static discovery, configuring 98 dvPorts 49 static discovery addresses 97 port group 47 storage access for virtual machines 84 vSwitch 45 adapters 79 technical support 7, 233 configuring 89 thin disks, creating 125 Fibre Channel 90 third-party software support policy 147 introduction 77 third-party switch 28 iSCSI 90 thumbprints, hosts 181 timeouts, SSL 183 local 78 Tomcat Web service 146 local SCSI 89 traffic shaping managing 109 port groups 56 networked 78 vSwitch 55 NFS 106 not-shared 126 252 VMware, Inc.
  • 253. Index traffic shaping policies firewall ports 150 dvPort groups 57 permissions 174 dvPorts 57 vCenter Server users 173 troubleshooting vDS firewall 194 adding a host to 30 networking 65, 72 configuration 29 port groups 73 jumbo frames 62 TSO 60 manage hosts 30 name 31 U resource pool settings 42 UDP ports 157 service console 40 upgrading service console adapter 38 vDS 32 settings 31 vNetwork Distributed Switch 32 uplink adapters upgrading 32 adding 25 virtual machines 40 adding to a vNetwork Distributed Switch 36 virtual network adapter 38 duplex 24 virtual network adapters 37 managing 36 virtual adapter, VMkernel 39 virtual disk, repair 243 removing 36 virtual disks speed 24 extending 241 uplink assignments 31 formats 125 uplink port names 31 supported formats 239 USB 78 Virtual LAN 44 user management 171 virtual machine networking 14, 18, 19 user permissions, vpxuser 175 virtual machines user roles copy and paste 209 Administrator 176 disabling logging 212, 213 no access 175 enabling copy and paste 209 Read Only 176 isolation 142, 144 users about 176 limiting variable information size 211 adding to groups 179 migrating to or from a vNetwork Distributed Switch 41 adding to hosts 177 networking 40, 41 authentication 173 preventing device disconnection 210 direct access 173 resource reservations and limits 140 exporting a user list 176 security 140 from Windows domain 173 security recommendations 209 modifying on hosts 177 with RDMs 134 permissions and roles 172 virtual network, security 158 removing from groups 179 virtual network adapters, removing 40 removing from hosts 178 virtual networking layer and security 142 security 173 virtual switch ports, security 163 vCenter Server 173 virtual switch security 160 viewing user list 176 virtual switches 802.1Q and ISL tagging attacks 162 V and iSCSI 169 variable information size for guest operating double-encapsulated attacks 162 systems disabling 211 forged transmissions 163 limiting 211 MAC address changes 163 vCenter Server MAC flooding 162 connecting through firewall 152 multicast brute-force attacks 162 VMware, Inc. 253
  • 254. ESX Configuration Guide promiscuous mode 163 VMkernel ports 69 random frame attacks 162 vmkfstools scenarios for deployment 205 cloning disks 241 security 162 creating RDMs 242 spanning tree attacks 162 creating virtual disks 239 VLAN deleting virtual disks 240 definition 13 extending virtual disks 241 private 35 file system options 236 VLAN ID geometry 243 primary 34 inflating thin disks 240 secondary 34 initializing virtual disks 240 VLAN policies dvPort group 51 migrating virtual disks 241 dvPorts 51 overview 235 VLAN policy 51 RDM attributes 243 VLAN security 160 removing zeroed blocks 240 VLAN trunking 51 renaming virtual disks 241 VLAN Trunking 32, 51 SCSI reservations 243 VLAN Type 51 syntax 235 VLANs upgrading virtual disks 242 and iSCSI 169 virtual disk options 239 Layer 2 security 160 virtual disks conversion 240 scenarios for deployment 205 vmkfstools -C command 236 security 158, 161 vmkfstools -P command 237 VLAN hopping 160 vmkfstools -v command 236 VLANS vmkfstools -Z command 237 configuring for security 161 vmkfstools command options 236 service console 161 vmkfstools examples VMFS cloning disks 241 conversion 238 creating RDMs 242 sharing 205 creating virtual disks 240 vmkfstools 235 vMotion volume resignaturing 113 definition 13 VMFS datastores networking configuration 19 adding extents 112 securing with VLANs and virtual switches 160 changing properties 111 VMotion, networking 20 changing signatures 115 vMotion interfaces, creating 20, 37 configuring 105 VMware NMP creating 82 I/O flow 118 deleting 110 See also Native Multipathing Plug-In increasing capacity 112 VMware PSPs, See Path Selection Plug-Ins resignaturing copies 114 VMware SATPs, See Storage Array Type Plug- Ins sharing 83 vmware-hostd 171 unmounting 111 vNetwork Distributed Switch VMFS volume resignaturing 113 adding a host to 30 VMkernel jumbo frames 62 configuring 19 new 29 definition 13 service console 40 jumbo frames 63 service console adapter 38 networking 20 third-party 28 VMkernel adapter 39 virtual network adapter 38 VMkernel network adapters, adding 20, 37 VMkernel adapter 39 VMkernel networking 14 254 VMware, Inc.
  • 255. Index vNetwork Distributed Switches vSphere Web Access adding a VMkernel network adapter 37 and host services 181 adding hosts to 30 disabling SSL 184 admin contact info 31 firewall ports connecting to virtual machine Cisco Discovery Protocol 31 console 153 configuration 29 firewall ports for direct connection 151 IP address 31 firewall ports with vCenter Server 150 maximum MTU 31 vSwitch configuration 24 maximum number of ports 31 definition 13 migrating virtual machines to or from 41 failback 45 miscellaneous policies 58 failover order 45 name 31 Layer 2 Security 52 settings 31 load balancing 45 upgrading 32 network failover detection 45 virtual machines 40 vNetwork Standard Switch notify switches 45 configuration 24 port configuration 24 Layer 2 Security 52 properties 24 port configuration 24 teaming and failover policies 45, 47 traffic shaping 55 traffic shaping 55 using 17 using 17 viewing 15 viewing 15 vNewtork Distributed Switches, virtual network adapters 37 W volume resignaturing 113, 114 WWNs 80 vpxuser 175 vSphere CLI 96 vSphere Client firewall ports connecting to virtual machine console 153 firewall ports for direct connection 151 firewall ports with vCenter Server 150 VMware, Inc. 255