VMware vSphere Replication Security
Guide
vSphere Replication 6.5
This document supports the version of each product listed and
supports all subsequent versions until the document is
replaced by a new edition. To check for more recent editions of
this document, see http://www.vmware.com/support/pubs.
EN-002115-00
VMware vSphere Replication Security Guide
You can find the most up-to-date technical documentation on the VMware Web site at:
hp://www.vmware.com/support/
The VMware Web site also provides the latest product updates.
If you have comments about this documentation, submit your feedback to:
docfeedback@vmware.com
Copyright © 2012–2016 VMware, Inc. All rights reserved. Copyright and trademark information.
VMware, Inc.
3401 Hillview Ave.
Palo Alto, CA 94304
www.vmware.com
2 VMware, Inc.
Contents
About VMware vSphere Replication Security Guide 5
1
vSphere Replication Security Reference 7
2
Services, Ports, and External Interfaces that the vSphere Replication Virtual Appliance Uses 7
vSphere Replication Conguration Files 11
vSphere Replication Private Key, Certicate, and Keystore 11
vSphere Replication License and EULA File 11
vSphere Replication Log Files 11
vSphere Replication User Accounts 13
Security Updates and Patches for vSphere Replication 13
Index 15
VMware, Inc. 3
VMware vSphere Replication Security Guide
4 VMware, Inc.
About VMware vSphere Replication
Security Guide 1
The VMware vSphere Replication Security Guide provides a concise reference to the security features of
vSphere Replication.
To help you protect your vSphere Replication installation, this guide describes security features built into
vSphere Replication and the measures that you can take to safeguard it from aack.
External interfaces, ports, and services that are necessary for the proper operation of
n
vSphere Replication
Conguration options and seings that have security implications
n
Location of log les and their purpose
n
Required system accounts
n
Information about obtaining the latest security patches
n
Intended Audience
This information is intended for IT decision makers, architects, administrators, and others who must
familiarize themselves with the security components of vSphere Replication.
VMware, Inc.
5