When performing security hardening on a vCenter server, you may need to restrict access by allowing only specific IP addresses or subnets and blocking all other traffic. This is accomplished by configuring firewall rules in the vCenter Server Appliance settings.
Note that while you can set up firewall rules to accept or block traffic from specific IPs or subnets, you cannot block traffic by specific ports. The firewall rules apply to all traffic.
vCenter 7, vCenter 8.
Access the vCenter Server Appliance Management Interface:
https://appliance-IP-address-or-FQDN:5480.Log in:
Create Allow Rules:
Whitelist All ESXi Management and vSAN VMkernel IPs Ensure every ESXi host’s management interface plus its vSAN VMkernel interface addresses are in your allowlist. If you use multiple VMkernel NICs (e.g., one for vSAN, one for vMotion), include them all.
Include Core Infrastructure Services • Domain Controllers / DNS / NTP servers • vCenter HA/Witness appliances (if deployed) • vRealize Suite components, backup proxies, monitoring tools
Cover vCenter’s Multiple Interfaces VCSA often has separate NICs for management (nic0), vSAN traffic, vSphere HA networks, etc. Apply your allow/reject rules on each interface where the rhttpproxy or vpxd services listen.
Create a Rule to Block All Other Traffic:
nic00.0.0.00RejectImportant: Ensure that the access rules for the allowed IP addresses/subnets are created before applying the rule to block all other traffic. This is crucial because blocking all traffic will include your jump host access, which could prevent you from accessing the appliance if the access rules are not correctly configured.
https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/7-0/configuring-vcenter-server-7-0/about-vcenter-server-configuration.html