VMware vSphere Replication - 6.5 Security Guide

VMware vSphere Replication Security
Guide
vSphere Replication 6.5
This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document, see http://www.vmware.com/support/pubs.
EN-002115-00
You can find the most up-to-date technical documentation on the VMware Web site at:
hp://www.vmware.com/support/
The VMware Web site also provides the latest product updates.
If you have comments about this documentation, submit your feedback to:
docfeedback@vmware.com
Copyright © 2012–2016 VMware, Inc. All rights reserved. Copyright and trademark information.
VMware, Inc.
3401 Hillview Ave. Palo Alto, CA 94304 www.vmware.com
2 VMware, Inc.

Contents

About VMware vSphere Replication Security Guide 5
1
vSphere Replication Security Reference 7
2
Services, Ports, and External Interfaces that the vSphere Replication Virtual Appliance Uses 7
vSphere Replication Conguration Files 11
vSphere Replication Private Key, Certicate, and Keystore 11
vSphere Replication License and EULA File 11
vSphere Replication Log Files 11
vSphere Replication User Accounts 13
Security Updates and Patches for vSphere Replication 13
Index 15
VMware, Inc. 3
4 VMware, Inc.
About VMware vSphere Replication
Security Guide 1
The VMware vSphere Replication Security Guide provides a concise reference to the security features of vSphere Replication.
To help you protect your vSphere Replication installation, this guide describes security features built into vSphere Replication and the measures that you can take to safeguard it from aack.
External interfaces, ports, and services that are necessary for the proper operation of
n
vSphere Replication
Conguration options and seings that have security implications
n
Location of log les and their purpose
n
Required system accounts
n
Information about obtaining the latest security patches
n
Intended Audience
This information is intended for IT decision makers, architects, administrators, and others who must familiarize themselves with the security components of vSphere Replication.
VMware, Inc.
5
Loading...
+ 11 hidden pages