About this guide
This guide provides an overview of security configuration settings for the Dell EMC
VxRack SDDC system, and best practices for using those settings to ensure secure
operation of the product.
This guide provides information for system administrators and other users responsible
for configuring and maintaining the security for a VxRack SDDC cluster. This
document is designed for people familiar with:
l
Dell EMC systems and software
l
VMware virtualization products
l
Data center appliances and infrastructure
Revision history
The following table lists revision history for the VxRack SDDC Security Configuration
Guide.
Table 1 Revision History
Revision number
Date
Description
01
August 27, 2018
Initial release.
Support
Create an Online Support account to get access to support and product resources for
your VxRack SDDC system.
If you already have an account, register your VxRack SDDC system to access the
available resources.
For convenience, you can link your Online Support account with VxRack SDDC and
access support resources without having to log in separately.
Note
If you plan to set up ESRS, your Online Support account must be linked to VxRack
SDDC under the same party ID or the deployment will fail. Your system must also be in
an installed state in the Install Base.
Registering for online support
Create an Online Support account to access support resources.
After you register, you can:
l
Register your system
l
Obtain product license files and software updates
l
Download product documentation
l
Browse the community and support information
l
Link your support account for access to resources from within VxManager
Introduction
6
Dell EMC VxRack System SDDC
5.1.3
Security Configuration Guide
Содержание VxRack System SDDC
Страница 1: ...Dell EMC VxRack System SDDC Version 5 1 3 Security Configuration Guide REV 01 ...
Страница 4: ...CONTENTS 4 Dell EMC VxRack System SDDC 5 1 3 Security Configuration Guide ...
Страница 8: ...Introduction 8 Dell EMC VxRack System SDDC 5 1 3 Security Configuration Guide ...
Страница 9: ...CHAPTER 2 Security quick reference l Deployment models 10 Security quick reference 9 ...