VMware VS4-STD-C Evaluator Guide - Page 89

Testing SSH Firewall Rules, one of the allowed IP addresses in the firewall configuration. Therefore

Page 89 highlights

VMware vSphere 5.0 Evaluation Guide - Volume One 5. After clicking the firewall Properties link, you will see the Firewall Properties panel, as shown in Figure 120. Select the SSH Server under the Secure Shell category, and click Firewall. 6. In this example environment, you have to enable the SSH remote access only from virtual machine VM_02 with IP address 10.91.35.55. SSH connections from all other IP addresses are denied. You can also give a range of IP addresses or subnet class in the "Only allow connections..." field shown in Figure 121. Figure 121. After configuring the firewall rule to allow remote access for only virtual machine VM_02, you can test this firewall setting by establishing PuTTY sessions from different virtual machines. Testing SSH Firewall Rules In this example environment, you will try to establish SSH sessions from the following two virtual machines that are running from Host3 (tm-pod01-esx03.tmsb.local): 1. VM_02 : With IP address 10.91.35.55 2. VM_04 : With IP address 10.91.35.67 First, you can try creating a SSH session using the PuTTY tool on VM_02. This virtual machine IP address is one of the allowed IP addresses in the firewall configuration. Therefore, you can expect the SSH connection to be established. TECHNICAL WHITE PAPER / 89

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106

TECHNICAL WHITE PAPER / 89
VMware vSphere 5.0 Evaluation Guide –
Volume One
¹²
After³clicking³the³firewall³Properties³link¶³you³will³see³the³Firewall³Properties³panel¶³as³shown³in³Figure³±´·²³
Select³the³SSH³Server³under³the³Secure³Shell³category¶³and³click³
Firewall´
º²
In³this³example³environment¶³you³have³to³enable³the³SSH³remote³access³only³from³virtual³machine³VM¾·´³
with³IP³address³±·²½±²µ¹²¹¹²³SSH³connections³from³all³other³IP³addresses³are³denied²³You³can³also³give³a³
range³of³IP³addresses³or³subnet³class³in³the³“Only³allow³connections²²²”³field³shown³in³Figure³±´±²³
Figure 121.
After configuring the firewall rule to allow remote access for only virtual machine VM_02, you can test this
firewall setting by establishing PuTTY sessions from different virtual machines.
Testing SSH Firewall Rules
In this example environment, you will try to establish SSH sessions from the following two virtual machines that
are running from Host3 (tm-pod01-esx03.tmsb.local):
±²
VM¾·´³¿³With³IP³address³±·²½±²µ¹²¹¹
´²
VM¾·¸³¿³With³IP³address³±·²½±²µ¹²º»
First, you can try creating a SSH session using the PuTTY tool on VM_02. This virtual machine IP address is
one of the allowed IP addresses in the firewall configuration. Therefore, you can expect the SSH connection to
be established.