Enable SNMP monitoring on a VMware ESXI 6.5 host.
Since you'll be logging into the CLI via root, you'll want a backup incase you fat finger something and crash the host.
Run the backup command:
vim-cmd hostsvc/firmware/backup_config
You will get output like so:
Bundle can be downloaded at : http://*/downloads/5d4fc6f-1e4b-7470e-c45-ae6278684d11/configBundle-vmware.tgz
In a different CLI window replace the wildcard for your hostname/host IP, download it:
cd ~/Downloads && wget http://192.168.1.2/downloads/5206ac6f-1e4b-740e-c005-ae6265454d11/configBundle-vmware.tgz --no-check-certificate
We use --no-check-certificate
because without it, you will get (if using self-signed SSL certs):
ERROR: The certificate of ‘192.168.1.2’ is not trusted.
ERROR: The certificate of ‘192.168.1.2’ hasn't got a known issuer.
Now that you have a local backup, hopefully you won't need it.
Set the community string (I chose public
)
esxcli system snmp set --communities public
Enable the SNMP service
esxcli system snmp set --enable true
Whitelist your monitoring server in the ESXI firewall (any others probing SNMP will be denied) -- my monitoring server's IP is 192.168.1.8
esxcli network firewall ruleset set --ruleset-id snmp --allowed-all false
esxcli network firewall ruleset allowedip add --ruleset-id snmp --ip-address 192.168.1.8
esxcli network firewall ruleset set --ruleset-id snmp --enabled true
Restart the SNMP service for changes to propagate
/etc/init.d/snmpd restart
It may take a moment, so wait:
root: snmpd Running from interactive shell, running command: esxcli system snmp set -e false.
When it's done, you'll see:
root: snmpd setting up resource reservations.
root: snmpd opening firewall port(s) for notifications.
root: snmpd watchdog for snmpd started.
From PRTG:
Warning by lookup value 'Weak Protocols Available' in channel 'Security Rating' — Warning by lookup value 'Accepted' in channel 'TLS 1.0 (Weak)'
If your browser is equipped to prefer better versions of TLS than the insecure TLS1, the warnings are a non-issue and can be deleted from your sensors.
In Firefox/Waterfox:
In the address bar:
about:config
Search for:
security.tls.version.min
This value will tell you which version of TLS your browser will take, at minumum.
1 = TLS 1.0
2 = TLS 1.1
3 = TLS 1.2 (current default for most, at the time of writing)
4 = TLS 1.3
security.tls.version.min is a fallback if security.tls.version.max is not available.
Disabling TLS1 on an ESXI host will break compatibility with browsers (or scripts/processes you may be using that also aren't up-to-par with more secure options) that do not support more secure versions - like in legacy environments.
Not an inherent security issue; yet attempts to disable in my lab environment have to-date proven futile (despite the dependencies existing and returning expected values and changes); Nuthouse has a nice writeup if you want to give it a shot in your environment.