{"version":"1.0","provider_name":"irgNET","provider_url":"https:\/\/irg-net.com","author_name":"vExpert","author_url":"https:\/\/irg-net.com\/index.php\/author\/vexpert\/","title":"Dynamic ESXi firewall rulset for non-standard... - irgNET","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"UVzQgNWVXw\"><a href=\"https:\/\/irg-net.com\/index.php\/dynamic-esxi-firewall-rulset-for-non-standard\/\">Dynamic ESXi firewall rulset for non-standard&#8230;<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/irg-net.com\/index.php\/dynamic-esxi-firewall-rulset-for-non-standard\/embed\/#?secret=UVzQgNWVXw\" width=\"600\" height=\"338\" title=\"&#8220;Dynamic ESXi firewall rulset for non-standard&#8230;&#8221; &#8212; irgNET\" data-secret=\"UVzQgNWVXw\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/irg-net.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"Dynamic ESXi firewall rulset for non-standard syslog ports in vSphere 8.0 Update&#8230; Dynamic ESXi firewall rulset for non-standard&#8230; For most users who configure syslog for their ESXi hosts (hopefully everyone is doing that for audit, compliance and troubleshooting purposes), they typically stick with the default syslog ports 514 for UDP\/TCP or 1415 for TLS. A [&hellip;]","thumbnail_url":"https:\/\/d3utlhu53nfcwz.cloudfront.net\/171901\/cdnImage\/article\/74367553-8a5c-4bdd-9b07-549db2c48e10\/?size=Box320"}