VMware ESXi Hardening

⚠ IMPORTANT NOTE

Unlike iptables, VMware ESXi firewall rules are not inherently persistent.
If Survive Reboot = FALSE, changes won’t be retained after a reboot.
However, you can make them persistent by adding the appropriate esxcli commands
to the ESXi startup script:
/etc/rc.local.d/local.sh

You should always run VMware ESXi with a default-deny policy, allowing only whitelisted IPs — especially for SSH access.
Equally important is to disable any services that are not in use to further harden security.


Check Status of firewall

VMware ESXi built in firewall

List Rules

shows a list of all firewall rulesets configured on your ESXi host.

IP Filtering / Security Focused

Restrict outbound HTTP access on ESXi by disabling “allow all” and defining only specific trusted IPs.

Check What Is Listening

Displays open ports and listening IP addresses.

All the Rules

Displays all ESXi firewall rulesets with default and persistence details.

sshd_config

VMware ESXi SSH server configuration file.