VMworld 2019 San Francisco Recap

This post was originally published on this site

  This years VMworld was back in San Francisco, taking up the Moscone Centers and numerous hotels nearby.  This was a nice change from Las Vegas, and since I am originally from California, I enjoyed the chance to be back for a while.And it would seem that San Francisco is the popular choice with our VMware’s CEO, as you can read below.Once again I was part of the support staff to VMware Hans On Labs, check out the latest lab catalogs here  VMware Hands On Labs are a fant […]

Migrate NSX for vSphere to NSX-T

This post was originally published on this site

As you might know, I use a test/demo environment from my employer. In this environment, I can demo the VMware SDDC products for customers or colleagues. Since the start of the environment approx. four years ago, I had a demo around NSX for vSphere, but as you know, the product has been announced to go end of support in 2022 and there will be no more development on it. Also, VMware and my company (PQR) advise customers who start on…

Read More Read More

The post Migrate NSX for vSphere to NSX-T appeared first on .

CloudEndure Highly Automated Disaster Recovery – 80% Price Reduction

This post was originally published on this site

AWS acquired CloudEndure last year. After the acquisition we began working with our new colleagues to integrate their products into the AWS product portfolio.

CloudEndure Disaster Recovery is designed to help you minimize downtime and data loss. It continuously replicates the contents of your on-premises, virtual, or cloud-based systems to a low-cost staging area in the AWS region of your choice, within the confines of your AWS account:

The block-level replication encompasses essentially every aspect of the protected system including the operating system, configuration files, databases, applications, and data files. CloudEndure Disaster Recovery can replicate any database or application that runs on supported versions of Linux or Windows, and is commonly used with Oracle and SQL Server, as well as enterprise applications such as SAP. If you do an AWS-to-AWS replication, the AWS environment within a specified VPC is replicated; this includes the VPC itself, subnets, security groups, routes, ACLs, Internet Gateways, and other items.

Here are some of the most popular and interesting use cases for CloudEndure Disaster Recovery:

On-Premises to Cloud Disaster Recovery -This model moves your secondary data center to the AWS Cloud without downtime or performance impact. You can improve your reliability, availability, and security without having to invest in duplicate hardware, networking, or software.

Cross-Region Disaster Recovery – If your application is already on AWS, you can add an additional layer of cost-effective protection and improve your business continuity by setting up cross-region disaster recovery. You can set up continuous replication between regions or Availability Zones and meet stringent RPO (Recovery Point Objective) or RTO (Recovery Time Objective) requirements.

Cross-Cloud Disaster Recovery – If you run workloads on other clouds, you can increase your overall resilience and meet compliance requirements by using AWS as your DR site. CloudEndure Disaster Recovery will replicate and recover your workloads, including automatic conversion of your source machines so that they boot and run natively on AWS.

80% Price Reduction
Recovery is quick and robust, yet cost-effective. In fact, we are reducing the price for CloudEndure Disaster Recovery by about 80% today, making it more cost-effective than ever: $0.028 per hour, or about $20 per month per server.

If you have tried to implement a DR solution in the traditional way, you know that it requires a costly set of duplicate IT resources (storage, compute, and networking) and software licenses. By replicating your workloads into a low-cost staging area in your preferred AWS Region, CloudEndure Disaster Recovery reduces compute costs by 95% and eliminates the need to pay for duplicate OS and third-party application licenses.

To learn more, watch the Disaster Recovery to AWS Demo Video:

After that, be sure to visit the new CloudEndure Disaster Recovery page!

Jeff;

HPE Offline Bundle 3.5.0-12 for VMware ESXi

This post was originally published on this site

HPE Offline Bundle 3.5.0-12 for VMware ESXi includes important fixes for issues which can be cause of service down time. If you have VMware ESXi 6.5 or VMware ESXi 6.7, you must update HPE Offline Bundle to the new version (3.5.0-12).

The post HPE Offline Bundle 3.5.0-12 for VMware ESXi appeared first on Davoud Teimouri – Virtualization and Data Center.

Changing the vRealize Automation 7.x Management UI User

This post was originally published on this site
You can add and delete users on the Virtual Appliance Management Interface to create the appropriate level of security:

Create a new user and add the user to the Virtual Appliance Management Interface group.
useradd -G vami,root

Create a password for the user.
passwd


Disable root access on the Virtual Appliance Management Interface.
usermod -R vami root

How to Verify that the password history enforced for the root account.
 
cat /etc/pam.d/common-password-vmware.local | grep pam_pwhistory.so



AA20-020A: Critical Vulnerability in Citrix Application Delivery Controller, Gateway, and SD-WAN WANOP

This post was originally published on this site

Original release date: January 20, 2020<br/><h3>Summary</h3><p>On January 19, 2020, Citrix released firmware updates for Citrix Application Delivery Controller (ADC) and Citrix Gateway versions 11.1 and 12.0 to address CVE-2019-19781. Citrix expects to release updates for other vulnerable versions of Citrix ADC, Gateway, and SD-WAN WANOP appliances through January 24, 2020. (See Mitigations for update schedule).<a href=”https://support.citrix.com/article/CTX267027″>[1]</a></p>

<p>A remote, unauthenticated attacker could exploit CVE-2019-19781 to perform arbitrary code execution.<a href=”https://support.citrix.com/article/CTX267027″>[2]</a> This vulnerability has been detected in exploits in the wild.<a href=”https://www.ncsc.gov.uk/news/citrix-alert”>[3]</a></p>

<p>The Cybersecurity and Infrastructure Agency (CISA) strongly recommends that all users and administrators upgrade their vulnerable appliances as soon as possible once the appropriate firmware update becomes available.</p>

<h4>Timeline of Specific Events</h4>

<ul>
<li>December 17, 2019 – Citrix releases Security Bulletin CTX267027 with mitigations steps.</li>
<li>January 8, 2020 – The CERT Coordination Center (CERT/CC) releases Vulnerability Note VU#619785: Citrix Application Delivery Controller and Citrix Gateway Web Server Vulnerability, <a href=”https://www.kb.cert.org/vuls/id/619785/”>[4]</a> and CISA releases a Current Activity entry.<a href=”https://www.us-cert.gov/ncas/current-activity/2020/01/08/citrix-application-delivery-controller-and-citrix-gateway”>[5]</a></li>
<li>January 10, 2020 – The National Security Agency (NSA) releases a Cybersecurity Advisory on CVE-2019-19781.<a href=”https://media.defense.gov/2020/Jan/10/2002233132/-1/-1/0/CSA%20FOR%20CITRIXADCANDCITRIXGATEWAY_20200109.PDF”>[6]</a></li>
<li>January 11, 2020 – Citrix releases blog post on CVE-2019-19781 with timeline for fixes.<a href=”https://www.citrix.com/blogs/2020/01/11/citrix-provides-update-on-citrix-adc-citrix-gateway-vulnerability/”>[7]</a></li>
<li>January 13, 2020 – CISA releases a Current Activity entry describing their utility that enables users and administrators to test whether their Citrix ADC and Citrix Gateway firmware is susceptible to the CVE-2019-19781 vulnerability.<a href=”https://www.us-cert.gov/ncas/current-activity/2020/01/13/cisa-releases-test-citrix-adc-and-gateway-vulnerability”>[8]</a>&nbsp;</li>
<li>January 16, 2020 – Citrix announces that Citrix SD-WAN WANOP appliance is also vulnerable to CVE-2019-19781.</li>
<li>January 19, 2020 – Citrix releases firmware updates for Citrix ADC and Citrix Gateway versions 11.1 and 12.0 and blog post on accelerated schedule for fixes.<a href=”https://www.citrix.com/blogs/2020/01/19/vulnerability-update-first-permanent-fixes-available-timeline-accelerated/”>[9]</a></li>
<li>January 24, 2020 – Citrix expects to release firmware updates for Citrix ADC and Citrix Gateway versions 10.5, 12.1, and 13.0 and Citrix SD-WAN WANOP release 10.2.6 and 11.0.3.</li>
</ul>
<h3>Technical Details</h3><h4>Impact</h4>

<p>On December 17, 2019, Citrix reported vulnerability CVE-2019-19781. A remote, unauthenticated attacker could exploit this vulnerability to perform arbitrary code execution. This vulnerability has been detected in exploits in the wild.</p>

<p>The vulnerability affects the following appliances:</p>

<ul>
<li>Citrix NetScaler ADC and NetScaler Gateway version 10.5 – all supported builds</li>
<li>Citrix ADC and NetScaler Gateway version 11.1 – all supported builds before 11.1.63.15</li>
<li>Citrix ADC and NetScaler Gateway version 12.0 – all supported builds before 12.0.63.13</li>
<li>Citrix ADC and NetScaler Gateway version 12.1 – all supported builds</li>
<li>Citrix ADC and Citrix Gateway version 13.0 – all supported builds</li>
<li>Citrix SD-WAN WANOP firmware and appliance models 4000, 4100, 5000, and 5100 – all supported builds. (Citrix SD-WAN WANOP is vulnerable because it packages Citrix ADC as a load balancer).</li>
</ul>

<h4>Detection Measures</h4>

<p>CISA has released a utility that enables users and administrators to detect whether their Citrix ADC and Citrix Gateway firmware is susceptible to CVE-2019-19781.<a href=”https://www.us-cert.gov/ncas/current-activity/2020/01/13/cisa-releases-test-citrix-adc-and-gateway-vulnerability”>[10] </a>CISA encourages administrators to visit CISA’s <a href=”https://github.com/cisagov/check-cve-2019-19781″>GitHub page</a> to download and run the tool.</p>

<p>See the National Security Agency’s Cybersecurity Advisory on CVE-2020-19781 for other detection measures.<a href=”https://media.defense.gov/2020/Jan/10/2002233132/-1/-1/0/CSA%20FOR%20CITRIXADCANDCITRIXGATEWAY_20200109.PDF”>[11]</a></p>
<h3>Mitigations</h3><p>CISA strongly recommends users and administrators update Citrix ADC, Citrix Gateway, and Citrix SD-WAN WANOP once the appropriate firmware updates become available.</p>

<p>The fixed builds can be downloaded from Citrix Downloads pages for <a href=”https://www.citrix.com/downloads/citrix-adc/”>Citrix ADC</a> and <a href=”https://www.citrix.com/downloads/citrix-gateway/”>Citrix Gateway</a>.</p>

<p>Until the appropriate update is accessible, users and administrators should apply Citrix’s interim mitigation steps for CVE-2019-19781.<a href=”https://support.citrix.com/article/CTX267679″>[12]</a> Verify the successful application of the above mitigations by using the tool in <a href=”https://support.citrix.com/article/CTX269180″>CTX269180 – CVE-2019-19781 – Verification ToolTest</a>.<strong> Note:</strong> these mitigation steps apply to Citrix ADC and SD-WAN WANOP deployments.<a href=”https://support.citrix.com/article/CTX267027″>[13]</a></p>

<p>Refer to table 1 for Citrix’s planned fix schedule.<a href=”https://support.citrix.com/article/CTX267027″>[14]</a></p>

<p><strong>Table 1. Fix schedule for Citrix appliances vulnerable to CVE-2019-19781</strong></p>

<table border=”1″ cellpadding=”1″ cellspacing=”1″ class=”general-table” style=”width: 600px; height: 312px;”>
<thead>
<tr>
<th scope=”col”><strong>Vulnerable Appliance</strong></th>
<th scope=”col”><strong>Firmware Update</strong></th>
<th scope=”col”><strong>Release Date</strong></th>
</tr>
<tr>
<td scope=”col” style=”text-align: left;”>Citrix ADC and Citrix Gateway version 10.5</td>
<td scope=”col” style=”text-align: left;”>Refresh Build 10.5.70.x</td>
<td scope=”col” style=”text-align: left;”>January 24, 2020 (Expected)</td>
</tr>
<tr>
<td scope=”col” style=”text-align: left;”>Citrix ADC and Citrix Gateway version 11.1</td>
<td scope=”col” style=”text-align: left;”>Refresh Build 11.1.63.15</td>
<td scope=”col” style=”text-align: left;”>January 19, 2020</td>
</tr>
<tr>
<td scope=”col” style=”text-align: left;”>Citrix ADC and Citrix Gateway version 12.0</td>
<td scope=”col” style=”text-align: left;”>Refresh Build 12.0.63.13</td>
<td scope=”col” style=”text-align: left;”>January 19, 2020</td>
</tr>
<tr>
<td scope=”col” style=”text-align: left;”>Citrix ADC and Citrix Gateway version 12.1</td>
<td scope=”col” style=”text-align: left;”>Refresh Build 12.1.55.x</td>
<td scope=”col” style=”text-align: left;”>January 24, 2020 (Expected)</td>
</tr>
<tr>
<td scope=”col” style=”text-align: left;”>Citrix ADC and Citrix Gateway version 13.0</td>
<td scope=”col” style=”text-align: left;”>Refresh Build 13.0.47.x</td>
<td scope=”col” style=”text-align: left;”>January 24, 2020 (Expected)</td>
</tr>
<tr>
<td scope=”col” style=”text-align: left;”>Citrix SD-WAN WANOP Release 10.2.6</td>
<td scope=”col” style=”text-align: left;”>Citrix ADC Release 11.1.51.615</td>
<td scope=”col” style=”text-align: left;”>January 24, 2020 (Expected)</td>
</tr>
<tr>
<td scope=”col” style=”text-align: left;”>Citrix SD-WAN WANOP Release 11.0.3</td>
<td scope=”col” style=”text-align: left;”>Citrix ADC Release 11.1.51.615</td>
<td scope=”col” style=”text-align: left;”>January 24, 2020 (Expected)</td>
</tr>
</thead>
</table>

<p>&nbsp;</p>

<p>Administrators should review NSA’s <a href=”https://media.defense.gov/2020/Jan/10/2002233132/-1/-1/0/CSA%20FOR%20CITRIXADCANDCITRIXGATEWAY_20200109.PDF”>Citrix Advisory</a> for other mitigations, such as applying the following defense-in-depth strategy:</p>

<p>“Consider deploying a VPN capability using standardized protocols, preferably ones listed on the National Information Assurance Partnership (NIAP) Product Compliant List (PCL), in front of publicly accessible Citrix ADC and Citrix Gateway appliances to require user authentication for the VPN before being able to reach these appliances. Use of a proprietary SSLVPN/TLSVPN is discouraged.”</p>
<h3>References</h3>
<ul> <li><a href=”https://support.citrix.com/article/CTX267027″>[1] Citrix Security Bulletin CTX267027, Vulnerability in Citrix Application Delivery Controller and Citrix Gateway </a></li> <li><a href=”https://support.citrix.com/article/CTX267027″>[2] Citrix Security Bulletin CTX267027, Vulnerability in Citrix Application Delivery Controller and Citrix Gateway </a></li> <li><a href=”https://www.ncsc.gov.uk/news/citrix-alert”>[3] United Kingdom National Cyber Secrity Centre (NCSC) Alert: Actors exploiting Citrix products vulnerability </a></li> <li><a href=”https://www.kb.cert.org/vuls/id/619785/”>[4] CERT/CC Vulnerability Note VU#619785 </a></li> <li><a href=”https://www.us-cert.gov/ncas/current-activity/2020/01/08/citrix-application-delivery-controller-and-citrix-gateway”>[5] CISA Current Activity: Citrix Application Delivery Controller and Citrix Gateway Vulnerability </a></li> <li><a href=”https://media.defense.gov/2020/Jan/10/2002233132/-1/-1/0/CSA%20FOR%20CITRIXADCANDCITRIXGATEWAY_20200109.PDF”>[6] NSA Cybersecurity Advisory: Mitigate CVE-2019-19781: Critical Vulnerability in Citrix Application Delivery Controller (ADC) and Citrix Gateway </a></li> <li><a href=”https://www.citrix.com/blogs/2020/01/11/citrix-provides-update-on-citrix-adc-citrix-gateway-vulnerability/”>[7] Citrix blog: Citrix provides update on Citrix ADC, Citrix Gateway vulnerability </a></li> <li><a href=”https://www.us-cert.gov/ncas/current-activity/2020/01/13/cisa-releases-test-citrix-adc-and-gateway-vulnerability”>[8] CISA Current Activity: CISA Releases Test for Citrix ADC and Gateway Vulnerability GitHub: CISAgov – check-cve-2019-19781 </a></li> <li><a href=”https://www.citrix.com/blogs/2020/01/19/vulnerability-update-first-permanent-fixes-available-timeline-accelerated/”>[9] Citrix Blog: Vulnerability Update: First permanent fixes available, timeline accelerated </a></li> <li><a href=”https://www.us-cert.gov/ncas/current-activity/2020/01/13/cisa-releases-test-citrix-adc-and-gateway-vulnerability”>[10] CISA Current Activity: CISA Releases Test for Citrix ADC and Gateway Vulnerability GitHub: CISAgov – check-cve-2019-19781 </a></li> <li><a href=”https://media.defense.gov/2020/Jan/10/2002233132/-1/-1/0/CSA%20FOR%20CITRIXADCANDCITRIXGATEWAY_20200109.PDF”>[11] NSA Cybersecurity Advisory: Mitigate CVE-2019-19781: Critical Vulnerability in Citrix Application Delivery Controller (ADC) and Citrix Gateway </a></li> <li><a href=”https://support.citrix.com/article/CTX267679″>[12] Citrix Security Bulletin CTX267679, Mitigation Steps for CVE-2019-19781 </a></li> <li><a href=”https://support.citrix.com/article/CTX267027″>[13] Citrix Security Bulletin CTX267027, Vulnerability in Citrix Application Delivery Controller and Citrix Gateway </a></li> <li><a href=”https://support.citrix.com/article/CTX267027″>[14] Citrix Security Bulletin CTX267027, Vulnerability in Citrix Application Delivery Controller and Citrix Gateway </a></li> </ul> <h3>Revisions</h3>
<ul> <li>January 20, 2020: Initial Version</li> </ul>
<hr />
<div class=”field field–name-body field–type-text-with-summary field–label-hidden field–item”><p class=”privacy-and-terms”>This product is provided subject to this <a href=”https://www.us-cert.gov/privacy/notification”>Notification</a> and this <a href=”https://www.dhs.gov/privacy-policy”>Privacy &amp; Use</a> policy.</p>

</div>

Follow on from VMware Starting Certifications – 2020 designations now in place

This post was originally published on this site
Last year I wrote a brief introduction into the VMware starter and professional certifications.

VMware have now upgraded the certification titles with the new 2020 designations.

If you’re new to the certification trail, any exams you now sit will lead towards the new certification, VMware are currently working on their upgrade paths, and I’ll post information as I find it.

If you are a VCP-x2019 VMware have said that their system has logic to realise you’re a VCP-x and that the 2019 designation will lead to VCAP-x2020s

The new certification designations 2020 for the starter courses and the VCP are as follows.

The VMware Certified Associate


This certificate is aimed at providing a good overall knowledge of the VMware products and why they are used.

The VMware Certified Professional tracks are as follows.

Data Centre Virtualisation (DCV Track)

 This track focuses on the birth of VMware and their VM hypervisor product.
  
Network Virtualisation (NV) Track

This track focuses on the VMware NSX products, and now prioritises the VMware NSX-T product.
Cloud Management and Automation (CMA) Track
This track focuses on the vRealize suite of products, these products can be used in a truly multi-cloud environment
Desktop and Mobility (DTM) Track

This track focuses on VMware Horizon, which in its simplest form provides a Virtual Desktop Infrastructure
  
Digital Workspace (DW) Track

This track focuses on the VMware WorkspaceONE and Digital workspace solutions, this provides and extensive set of endpoint management technologies.
For more information visit the VMware Certification website

For more information on QA’s VMware training solutions visit QA

VMUG Advantage

This post was originally published on this site

Today I decided to buy the VMUG Advantage Membership. The membership is around for a while now but for some reason; I never cared to take a good look at it. It provides some great resources and discounts, and since I plan to go to VMworld, get some certifications and play around in the homelab this year, I thought: why not… VM…

vSphere Signing Certificate Expiry – What You Need To Know

This post was originally published on this site

Why Do We Sign? To guarantee the security of your download, VMware releases are cryptographically signed. The certificate used to sign legacy releases of software expires at the end of December 2019. For some time now, we have been dual signing releases with the replacement certificate and the legacy certificate. With the expiration of this

The post vSphere Signing Certificate Expiry – What You Need To Know appeared first on VMware vSphere Blog.