Vsphere Security

Total Page:16

File Type:pdf, Size:1020Kb

Vsphere Security vSphere Security Update 2 Modified on 14 AUG 2020 VMware vSphere 6.5 VMware ESXi 6.5 vCenter Server 6.5 vSphere Security You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ VMware, Inc. 3401 Hillview Ave. Palo Alto, CA 94304 www.vmware.com © Copyright 2009-2020 VMware, Inc. All rights reserved. Copyright and trademark information. VMware, Inc. 2 Contents About vSphere Security 11 Updated Information 13 1 Security in the vSphere Environment 15 Securing the ESXi Hypervisor 15 Securing vCenter Server Systems and Associated Services 17 Securing Virtual Machines 18 Securing the Virtual Networking Layer 19 Passwords in Your vSphere Environment 21 Security Best Practices and Resources 22 2 vSphere Permissions and User Management Tasks 24 Understanding Authorization in vSphere 25 Understanding the vCenter Server Permission Model 25 Hierarchical Inheritance of Permissions 27 Multiple Permission Settings 29 Example 1: Inheritance of Multiple Permissions 30 Example 2: Child Permissions Overriding Parent Permissions 30 Example 3: User Role Overriding Group Role 31 Managing Permissions for vCenter Components 31 Add a Permission to an Inventory Object 32 Change Permissions 33 Remove Permissions 34 Change User Validation Settings 34 Global Permissions 35 Add a Global Permission 36 Permissions on Tag Objects 36 Using Roles to Assign Privileges 38 vCenter Server System Roles 39 Create a Custom Role 40 Clone a Role 41 Edit a Role 41 Best Practices for Roles and Permissions 42 Required Privileges for Common Tasks 43 3 Securing ESXi Hosts 46 Configure ESXi Hosts with Host Profiles 47 VMware, Inc. 3 vSphere Security General ESXi Security Recommendations 47 Use Scripts to Manage Host Configuration Settings 49 ESXi Passwords and Account Lockout 50 SSH Security 52 ESXi SSH Keys 53 PCI and PCIe Devices and ESXi 55 Disable the Managed Object Browser 55 ESXi Networking Security Recommendations 56 Modifying ESXi Web Proxy Settings 56 vSphere Auto Deploy Security Considerations 57 Control Access for CIM-Based Hardware Monitoring Tools 58 Certificate Management for ESXi Hosts 59 Host Upgrades and Certificates 61 Certificate Mode Switch Workflows 62 ESXi Certificate Default Settings 64 Change Certificate Default Settings 65 View Certificate Expiration Information for Multiple ESXi Hosts 66 View Certificate Details for a Single ESXi Host 66 Renew or Refresh ESXi Certificates 67 Change the Certificate Mode 68 Replacing ESXi SSL Certificates and Keys 68 Requirements for ESXi Certificate Signing Requests 69 Replace the Default Certificate and Key from the ESXi Shell 70 Replace a Default Certificate and Key with the vifs Command 71 Replace a Default Certificate Using HTTPS PUT 71 Update the vCenter Server TRUSTED_ROOTS Store (Custom Certificates) 72 Use Custom Certificates with Auto Deploy 73 Restore ESXi Certificate and Key Files 75 Customizing Hosts with the Security Profile 76 ESXi Firewall Configuration 76 Manage ESXi Firewall Settings 77 Add Allowed IP Addresses for an ESXi Host 78 Incoming and Outgoing Firewall Ports for ESXi Hosts 78 NFS Client Firewall Behavior 81 ESXi ESXCLI Firewall Commands 82 Customizing ESXi Services from the Security Profile 83 Enable or Disable a Service in the Security Profile 84 Lockdown Mode 85 Lockdown Mode Behavior 86 Enable Lockdown Mode Using the vSphere Web Client 87 Disable Lockdown Mode Using the vSphere Web Client 88 VMware, Inc. 4 vSphere Security Enable or Disable Normal Lockdown Mode from the Direct Console User Interface 89 Specifying Accounts with Access Privileges in Lockdown Mode 89 Manage the Acceptance Levels of Hosts and VIBs 91 Assigning Privileges for ESXi Hosts 93 root User Privileges 94 vpxuser Privileges 94 dcui User Privileges 95 Using Active Directory to Manage ESXi Users 95 Configure a Host to Use Active Directory 95 Add a Host to a Directory Service Domain 97 View Directory Service Settings 97 Using vSphere Authentication Proxy 98 Enable vSphere Authentication Proxy 99 Add a Domain to vSphere Authentication Proxy with the vSphere Web Client 99 Add a Domain to vSphere Authentication Proxy with the camconfig Command 100 Use vSphere Authentication Proxy to Add a Host to a Domain 101 Enable Client Authentication for vSphere Authentication Proxy 102 Import the vSphere Authentication Proxy Certificate to ESXi Host 102 Generate a New Certificate for vSphere Authentication Proxy 103 Set Up vSphere Authentication Proxy to Use Custom Certificates 104 Configuring Smart Card Authentication for ESXi 106 Enable Smart Card Authentication 107 Disable Smart Card Authentication 107 Authenticating With User Name and Password in Case of Connectivity Problems 108 Using Smart Card Authentication in Lockdown Mode 108 Using the ESXi Shell 108 Use the vSphere Web Client to Enable Access to the ESXi Shell 109 Create a Timeout for ESXi Shell Availability in the vSphere Web Client 110 Create a Timeout for Idle ESXi Shell Sessions in the vSphere Web Client 110 Use the Direct Console User Interface (DCUI) to Enable Access to the ESXi Shell 111 Create a Timeout for ESXi Shell Availability in the Direct Console User Interface 112 Create a Timeout for Idle ESXi Shell Sessions 112 Log in to the ESXi Shell for Troubleshooting 113 UEFI Secure Boot for ESXi Hosts 113 Run the Secure Boot Validation Script on an Upgraded ESXi Host 115 ESXi Log Files 116 Configure Syslog on ESXi Hosts 116 ESXi Log File Locations 117 Securing Fault Tolerance Logging Traffic 118 4 Securing vCenter Server Systems 119 VMware, Inc. 5 vSphere Security vCenter Server Security Best Practices 119 Best Practices for vCenter Server Access Control 119 Set the vCenter Server Password Policy 121 Removing Expired or Revoked Certificates and Logs from Failed Installations 121 Protecting the vCenter Server Windows Host 122 Limiting vCenter Server Network Connectivity 122 Evaluate the Use of Linux Clients with CLIs and SDKs 123 Examine vSphere Web Client Plug-Ins 123 vCenter Server Appliance Security Best Practices 124 vCenter Password Requirements and Lockout Behavior 124 Verify Thumbprints for Legacy ESXi Hosts 125 Verify that SSL Certificate Validation Over Network File Copy Is Enabled 126 Required Ports for vCenter Server and Platform Services Controller 127 Additional vCenter Server TCP and UDP Ports 133 5 Securing Virtual Machines 136 Enable or Disable UEFI Secure Boot for a Virtual Machine 136 Limit Informational Messages From Virtual Machines to VMX Files 138 Prevent Virtual Disk Shrinking 138 Virtual Machine Security Best Practices 139 General Virtual Machine Protection 140 Use Templates to Deploy Virtual Machines 141 Minimize Use of the Virtual Machine Console 141 Prevent Virtual Machines from Taking Over Resources 141 Disable Unnecessary Functions Inside Virtual Machines 142 Remove Unnecessary Hardware Devices 143 Disable Unused Display Features 143 Disable Unexposed Features 144 Disable VMware Shared Folders Sharing Host Files to the Virtual Machine 145 Disable Copy and Paste Operations Between Guest Operating System and Remote Console 145 Limiting Exposure of Sensitive Data Copied to the Clipboard 146 Restrict Users From Running Commands Within a Virtual Machine 146 Prevent a Virtual Machine User or Process From Disconnecting Devices 147 Prevent Guest Operating System Processes from Sending Configuration Messages to the Host 148 Avoid Using Independent Nonpersistent Disks 148 6 Virtual Machine Encryption 150 How vSphere Virtual Machine Encryption Protects Your Environment 151 vSphere Virtual Machine Encryption Components 153 Encryption Process Flow 154 VMware, Inc. 6 vSphere Security Virtual Disk Encryption 156 Prerequisites and Required Privileges for Encryption Tasks 157 Encrypted vSphere vMotion 158 Encryption Best Practices, Caveats, and Interoperability 159 Virtual Machine Encryption Best Practices 160 Virtual Machine Encryption Caveats 162 Virtual Machine Encryption Interoperability 163 7 Use Encryption in Your vSphere Environment 166 Set up the Key Management Server Cluster 166 Add a KMS to vCenter Server 166 Establish a Trusted Connection by Exchanging Certificates 168 Use the Root CA Certificate Option to Establish a Trusted Connection 168 Use the Certificate Option to Establish a Trusted Connection 169 Use the New Certificate Signing Request Option to Establish a Trusted Connection 169 Use the Upload Certificate and Private Key Option to Establish a Trusted Connection 170 Set the Default KMS Cluster 171 Complete the Trust Setup 171 Set Up Separate KMS Clusters for Different Users 172 Create an Encryption Storage Policy 173 Enable Host Encryption Mode Explicitly 174 Disable Host Encryption Mode 174 Create an Encrypted Virtual Machine 175 Clone an Encrypted Virtual Machine 176 Encrypt an Existing Virtual Machine or Virtual Disk 176 Decrypt an Encrypted Virtual Machine or Virtual Disk 177 Change the Encryption Policy for Virtual Disks 178 Resolve Missing Key Issues 179 Resolve ESXi Host Encryption Mode Issues 180 Set Key Management Server Certificate Expiration Threshold 181 vSphere Virtual Machine Encryption and Core Dumps 181 Collect a vm-support Package for an ESXi Host That Uses Encryption 182 Decrypt or Re-Encrypt an Encrypted Core Dump 184 8 Securing vSphere Networking 185 Introduction to vSphere Network Security 185 Securing the Network With Firewalls 187 Firewalls for Configurations With vCenter Server 187 Connecting to vCenter Server Through a Firewall 188 Connecting ESXi Hosts Through Firewalls 188 Firewalls for Configurations Without vCenter Server 189 VMware, Inc. 7 vSphere Security
Recommended publications
  • Zapfcoll Minikatalog.Indd
    Largest compilation of typefaces from the designers Gudrun and Hermann Zapf. Most of the fonts include the Euro symbol. Licensed for 5 CPUs. 143 high quality typefaces in PS and/or TT format for Mac and PC. Colombine™ a Alcuin™ a Optima™ a Marconi™ a Zapf Chancery® a Aldus™ a Carmina™ a Palatino™ a Edison™ a Zapf International® a AMS Euler™ a Marcon™ a Medici Script™ a Shakespeare™ a Zapf International® a Melior™ a Aldus™ a Melior™ a a Melior™ Noris™ a Optima™ a Vario™ a Aldus™ a Aurelia™ a Zapf International® a Carmina™ a Shakespeare™ a Palatino™ a Aurelia™ a Melior™ a Zapf book® a Kompakt™ a Alcuin™ a Carmina™ a Sistina™ a Vario™ a Zapf Renaissance Antiqua® a Optima™ a AMS Euler™ a Colombine™ a Alcuin™ a Optima™ a Marconi™ a Shakespeare™ a Zapf Chancery® Aldus™ a Carmina™ a Palatino™ a Edison™ a Zapf international® a AMS Euler™ a Marconi™ a Medici Script™ a Shakespeare™ a Zapf international® a Aldus™ a Melior™ a Zapf Chancery® a Kompakt™ a Noris™ a Zapf International® a Car na™ a Zapf book® a Palatino™ a Optima™ Alcuin™ a Carmina™ a Sistina™ a Melior™ a Zapf Renaissance Antiqua® a Medici Script™ a Aldus™ a AMS Euler™ a Colombine™ a Vario™ a Alcuin™ a Marconi™ a Marconi™ a Carmina™ a Melior™ a Edison™ a Shakespeare™ a Zapf book® aZapf international® a Optima™ a Zapf International® a Carmina™ a Zapf Chancery® Noris™ a Optima™ a Zapf international® a Carmina™ a Sistina™ a Shakespeare™ a Palatino™ a a Kompakt™ a Aurelia™ a Melior™ a Zapf Renaissance Antiqua® Antiqua® a Optima™ a AMS Euler™ a Introduction Gudrun & Hermann Zapf Collection The Gudrun and Hermann Zapf Collection is a special edition for Macintosh and PC and the largest compilation of typefaces from the designers Gudrun and Hermann Zapf.
    [Show full text]
  • Top Ten Tips for Effective Punctuation in Legal Writing
    TIPS FOR EFFECTIVE PUNCTUATION IN LEGAL WRITING* © 2005 The Writing Center at GULC. All Rights Reserved. Punctuation can be either your friend or your enemy. A typical reader will seldom notice good punctuation (though some readers do appreciate truly excellent punctuation). However, problematic punctuation will stand out to your reader and ultimately damage your credibility as a writer. The tips below are intended to help you reap the benefits of sophisticated punctuation while avoiding common pitfalls. But remember, if a sentence presents a particularly thorny punctuation problem, you may want to consider rephrasing for greater clarity. This handout addresses the following topics: THE COMMA (,)........................................................................................................................... 2 PUNCTUATING QUOTATIONS ................................................................................................. 4 THE ELLIPSIS (. .) ..................................................................................................................... 4 THE APOSTROPHE (’) ................................................................................................................ 7 THE HYPHEN (-).......................................................................................................................... 8 THE DASH (—) .......................................................................................................................... 10 THE SEMICOLON (;) ................................................................................................................
    [Show full text]
  • Exploring Open Source Wireless Tools by Jake Snyder (The Dread Pirate Roberts) @Jsnyder81 Who Am I?
    Exploring Open Source Wireless Tools By Jake Snyder (The Dread Pirate Roberts) @jsnyder81 Who am I? • Wireless Engineer at CompuNet Inc • CCIE-W #43153 • CWNE #161 • Security Enthusiast • Linux hobbiest • Wireless Field Day Delegate (http://techfieldday.com/event/wfd8/) • Blogger • Maker What does a set of professional tools cost? What I use at work: Ekahau ESS: $4000 Omnipeek: $2500 Chanalyzer + WiSpy: $1250 Aircheck: $2000 *All prices are approximates Professional tools in my first year. • Airmagnet Survey pro • Yup, that was it. http://www.popsugar.com/entertainment/Princess-Bride-Quotes-35919789#photo-35919789 “I mean, if we only had a wheelbarrow, that would be something.” -Westley Sometimes you have to build a wheelbarrow • Linux VM • Proxim 8494 • Airmon-NG • Wireshark “Well, why didn’t you list that among our assets in the first place” -Westley All these tools… Why Open Source? Pros: Cons: • Low Cost • Free if your time is worth • Flexibility nothing • Lots of available tools • Pieces of a solution, you have to put it together • Low barrier to entry • Requires knowledge • Time = investment “Please consider opensource as an alternative to suicide.” – Prince Humperdink What are my hobbiest opensource costs? Options for todays presentation: Raspberry PI: $223 Intel NUC $436 Raspberry PI 2B $38 NUC5CPYH: $134.00 ASUS USB-N53 $45 8G Memory: $34 Micro SD Card: $15 SSD: $40 Case: $5 Intel 7265 $28 Ubertooth: $120 WiSpy 2.4Ghz: $200 Existing Laptop: $8 • USB stick to boot linux • The chocolate coating makes it go down easier • VM is an option, albeit not a good one My Preferred Wireless Adapters • Asus USB-N53 • Intel 726x • 802.11n • 802.11ac • 2x2:2 • 2x2:2 • USB 2.0 • Mini PCIe half height and m.2 • Ralink RT3572 using RT2800 Driver • Intel IWLWIFI: Non-Free firmware • Works on Raspberry PI required • $45 on Amazon • $27 on amazon • Has issues with Deauth/Dissassoc • Lots of clients using them packets not being passed to host.
    [Show full text]
  • These Guidelines Are Designed to Assist SBL Editors As They Prepare Manuscript Files to Submit for Typesetting
    GUIDELINES FOR EDITORS OF COLLECTED WORKS SOCIETY OF BIBLICAL LITERATURE These guidelines are designed to assist SBL editors as they prepare manuscript files to submit for typesetting. Although the following guidelines do not address every possible question that might arise, and although every manuscript will require some work by the SBL staff, adherence to these guidelines will minimize the delays and added costs that improperly or inadequately edited books inevitably create. We strongly recommend that editors familiarize themselves with these guidelines, which address the most common problems encountered, and to use them throughout their editing work. Please feel free to contact Bob Buller ([email protected]) and Leigh Andersen (leigh.andersen@sbl- site.org) whenever you encounter questions not addressed below. 1. THE GOAL 1.1. Coherence. One mark of a well-edited volume is the level of internal coherence that it evidences. Such coherence begins, of course, with the selection and arrangement of the essays, but it does not end there. Rather, one should seek to enhance the coherence of the volume during the editing process, by striving for internal consistency in conformity to an accepted standard. 1.2. Consistency. Internal consistency enhances the reader’s sense of a volume’s overall coherence. So, for example, careful editors do not allow the same word to be spelled in several different ways (even if both are acceptable) or some essays to use footnotes for bibliographical citations and others to use the author-date system or still others to be lax in citing their references at all. Furthermore, volumes will appear more consistent if the essays evidence a certain degree of structural consistency, such as in the use of subheads (always helpful) and in the way they are labeled (e.g., numbered or unnumbered but not both; using arabic numerals, not arabic in some essays and roman numerals in others).
    [Show full text]
  • INTERNATIONAL TYPEFACE CORPORATION, to an Insightful 866 SECOND AVENUE, 18 Editorial Mix
    INTERNATIONAL CORPORATION TYPEFACE UPPER AND LOWER CASE , THE INTERNATIONAL JOURNAL OF T YPE AND GRAPHI C DESIGN , PUBLI SHED BY I NTE RN ATIONAL TYPEFAC E CORPORATION . VO LUME 2 0 , NUMBER 4 , SPRING 1994 . $5 .00 U .S . $9 .90 AUD Adobe, Bitstream &AutologicTogether On One CD-ROM. C5tta 15000L Juniper, Wm Utopia, A d a, :Viabe Fort Collection. Birc , Btarkaok, On, Pcetita Nadel-ma, Poplar. Telma, Willow are tradmarks of Adobe System 1 *animated oh. • be oglitered nt certain Mrisdictions. Agfa, Boris and Cali Graphic ate registered te a Ten fonts non is a trademark of AGFA Elaision Miles in Womb* is a ma alkali of Alpha lanida is a registered trademark of Bigelow and Holmes. Charm. Ea ha Fowl Is. sent With the purchase of the Autologic APS- Stempel Schnei Ilk and Weiss are registimi trademarks afF mdi riot 11 atea hmthille TypeScriber CD from FontHaus, you can - Berthold Easkertille Rook, Berthold Bodoni. Berthold Coy, Bertha', d i i Book, Chottiana. Colas Larger. Fermata, Berthold Garauannt, Berthold Imago a nd Noire! end tradematts of Bern select 10 FREE FONTS from the over 130 outs Berthold Bodoni Old Face. AG Book Rounded, Imaleaa rd, forma* a. Comas. AG Old Face, Poppl Autologic typefaces available. Below is Post liedimiti, AG Sitoploal, Berthold Sr tapt sad Berthold IS albami Book art tr just a sampling of this range. Itt, .11, Armed is a trademark of Haas. ITC American T}pewmer ITi A, 31n. Garde at. Bantam, ITC Reogutat. Bmigmat Buick Cad Malt, HY Bis.5155a5, ITC Caslot '2114, (11 imam.
    [Show full text]
  • Chapter: 2. En Route Operations
    Chapter 2 En Route Operations Introduction The en route phase of flight is defined as that segment of flight from the termination point of a departure procedure to the origination point of an arrival procedure. The procedures employed in the en route phase of flight are governed by a set of specific flight standards established by 14 CFR [Figure 2-1], FAA Order 8260.3, and related publications. These standards establish courses to be flown, obstacle clearance criteria, minimum altitudes, navigation performance, and communications requirements. 2-1 fly along the centerline when on a Federal airway or, on routes other than Federal airways, along the direct course between NAVAIDs or fixes defining the route. The regulation allows maneuvering to pass well clear of other air traffic or, if in visual meteorogical conditions (VMC), to clear the flightpath both before and during climb or descent. Airways Airway routing occurs along pre-defined pathways called airways. [Figure 2-2] Airways can be thought of as three- dimensional highways for aircraft. In most land areas of the world, aircraft are required to fly airways between the departure and destination airports. The rules governing airway routing, Standard Instrument Departures (SID) and Standard Terminal Arrival (STAR), are published flight procedures that cover altitude, airspeed, and requirements for entering and leaving the airway. Most airways are eight nautical miles (14 kilometers) wide, and the airway Figure 2-1. Code of Federal Regulations, Title 14 Aeronautics and Space. flight levels keep aircraft separated by at least 500 vertical En Route Navigation feet from aircraft on the flight level above and below when operating under VFR.
    [Show full text]
  • Typography for Scientific and Business Documents
    Version 1.8 Typography for Scientific and Business Documents George Yefchak Agilent Laboratories What’s the Big Deal? This paper is about typography. But first, I digress… inch marks, so you’ll probably get to enter those manually anyway.† Nothing is perfect…) Most of us agree that the use of correct grammar — or at In American English, punctuation marks are usually placed least something approaching it — is important in our printed before closing quotes rather than after them (e.g. She said documents. Of course “printed documents” refers not just to “No!”). But don’t do this if it would confuse the message words printed on paper these days, but also to things distrib- (e.g. Did she say “no!”?). Careful placement of periods and uted by slide and overhead projection, electronic broadcast- commas is particularly important when user input to ing, the web, etc. When we write something down, we computers is described: usually make our words conform to accepted rules of For username, type “john.” Wrong grammar for a selfish reason: we want the reader to think we For username, type “john”. ok know what we’re doing! But grammar has a more fundamen- tal purpose. By following the accepted rules, we help assure For username, type john . Even better, if font usage that the reader understands our message. is explained If you don’t get into the spirit of things, you might look at Dashes typography as just another set of rules to follow. But good The three characters commonly referred to as “dashes” are: typography is important, because it serves the same two purposes as good grammar.
    [Show full text]
  • Corel® Wordperfect® Office X9 Handbook
    Part One: Introduction 3 getting started Part Two: WordPerfect 17 creating professional-looking documents Part Three: Quattro Pro 135 managing data with spreadsheets Part Four: Presentations 185 making visual impact with slide shows Part Five: Utilities 243 using WordPerfect Lightning, Address Book, and more Part Six: Writing Tools 261 checking your spelling, grammar, and vocabulary Part Seven: Macros 275 streamlining and automating tasks Part Eight: Web Resources 285 finding even more information on the Internet Handbook highlights What’s included? . 3 What’s new in WordPerfect Office X9. 11 Installation . 11 Help resources. 5 Documentation conventions . 6 WordPerfect basics . 19 Quattro Pro basics. 137 Presentations basics . 187 WordPerfect Lightning . 245 Index. 287 Part One: Introduction Welcome to the Corel® WordPerfect® Office X9 Handbook! More than just a reference manual, this handbook is filled with valuable tips and insights on a wide variety of tasks and projects. The following chapters in this introductory section are key to getting started with the software: • “What’s new in WordPerfect Office X9” on page 11 • “Installation” on page 11 • “Using the Help files” on page 6 If you’re ready to explore specific components of the software in greater detail, see the subsequent sections in this handbook. For an A-to-Z look at the topics covered in this manual, see the index on page 287. What’s included? WordPerfect Office includes the following programs: • Corel® WordPerfect® — for creating professional-looking documents. See “Part Two: WordPerfect” on page 17. • Corel® Quattro Pro® — for managing, analyzing, reporting, and sharing data. See “Part Three: Quattro Pro” on page 135.
    [Show full text]
  • Typographya Quick Lesson In
    TYPOGRAPHYA QUICK LESSON IN Definition:The design and use of typefaces as a means of visual communication from calligraphy to the ever-developing use of digital type is the broad use of the term typography. However, the art and practice of typography began with the invention of moveable type and the printing press.Typography is sometimes seen as encompassing many separate fields from the type designer who creates letterforms to the graphic designer who selects typefaces and arranges them on the page. LETTERFORMS AND FONTS AT-A-GLANCE WHAT IS THE BEST WAY TO CHOOSE OR MIX AND MATCH FONTS? There are no absolutely right or wrong ways to choose fonts or mix different fonts. However, there are a few accepted standards that can speed up the font selection process and generally result in typographically attractive and readable compositions.These guidelines won't always work for you, but nine times out of ten they'll give you the results you want with the least amount of trial and error. • When in doubt, pair a serif font for body text and a sans serif font for headlines. • Avoid mixing two very similar typefaces, such as two scripts or two sans serifs.There is not enough contrast and the small differences will cause a visual clash. • Limit the number of different typefaces used in a single document to no more than three or four. • Avoid monospaced typefaces for body copy. They draw too much attention to the individual letters distracting the reader from the message. A well designed page contains no more than two different typefaces or four different type variations such as type size and bold or italic style.
    [Show full text]
  • En 301 598 V1.0.9 (2014-02)
    Final draft ETSI EN 301 598 V1.0.9 (2014-02) Harmonized European Standard White Space Devices (WSD); Wireless Access Systems operating in the 470 MHz to 790 MHz TV broadcast band; Harmonized EN covering the essential requirements of article 3.2 of the R&TTE Directive 2 Final draft ETSI EN 301 598 V1.0.9 (2014-02) Reference DEN/BRAN-0060010 Keywords access, broadband, CRS, FWA, LAN, M2M, mobile, radio ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice Individual copies of the present document can be downloaded from: http://www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http://portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission.
    [Show full text]
  • Promiscuous Mode Detection Platform
    Promiscuous Mode Detection Platform Zouheir Trabelsi and Hamza Rahmani College of Telecommunications The University of Tunisia Cité Technologique des Communications Route de Raoued Km 3,5 – 2083 El Ghazala, Ariana, Tunisia Abstract. Among various types of attacks on an Ethernet network, “sniffing attack” is probably one of the most difficult attacks to handle. Sniffers are programs that allow a host to capture any packets in an Ethernet network, by putting the host’s Network Interface Card (NIC) into the promiscuous mode. When a host’s NIC is in the normal mode, it captures only the packets sent to the host. Since many basic services, such as FTP, Telnet and SMTP, send passwords and data in clear text in the packets, sniffers can be used by hackers to capture passwords and confidential data. A number of anti-sniffers have been developed, such as PMD [18], PromiScan [17] and L0pht AntiSniff [19]. An anti-sniffer is a program that tries to detect the hosts running sniffers, in a Local Area Network (LAN). Current anti-sniffers are mainly based on three detection techniques, namely: the ARP detection, the DNS detection, and the RTT (Round Trip Time) detection techniques [13 and 16]. However, sniffers are becoming very advanced so that anti-sniffers are unable to detect them. The main drawback of these detection techniques is that they rely on the ARP, ICMP and/or DNS reply messages generated by the sniffing hosts. Therefore, in order to stay undetectable by anti-sniffers, advanced sniffers do not generate such reply messages while sniffing. This paper discusses an anti-sniffer based on a new detection technique.
    [Show full text]
  • En Dash “–” Hyphen Dashes
    Dashes: Proper use and spacing Dash Type & Keyboard Stroke Proper Use Proper Spacing Use when interrupting a thought to provide additional detail or putting Thinkso’s style is no spaces emphasis on part of a thought. before and after, but it’s Examples: also acceptable to put Access customer data directly from the tasting room—including notes, purchase history, club spaces before and after. memberships, lifetime value, and more—to provide the kind of personalized service that builds long Em dash “—” lasting relationships. WineDirect’s ecommerce platform is the only one to offer “carrots” and other advanced marketing tools MAC: SHIFT + OPTION + HYPHEN KEY to encourage customers to try—and buy—more wine. PC: ALT + 0151 The em dash is best limited to one instance per sentence (note that one instance may require two em dashes: one before and one after the phrase being set off), and in no more than one sentence every six sentences. Using it too often diminishes its effectiveness and creates choppy copy with lots of visual holes. Commas are often better choices if the two thoughts are closely related. Parentheses and colons can often be used in the same way as an em dash, but are less jolting. Use: One space before and after. • Between numbers to indicate a range. En dash “–” • When typesetting a minus sign. Examples: 10 a.m. – 10 p.m. MAC: OPTION + HYPHEN KEY June 30 – July 31 PC: ALT + 0150 24 – 10 = 14 Consider what you’re trying to say in your sentence when using the en dash. Depending on how you apply it, the en dash can be read as “to” or “through.” Use in a compound or hyphenated word.
    [Show full text]