Hi, I have installed the CIM provider and enabled the CIM server.
They appear to be working as I can see my adapter/ RAID10 array status under the health tab.
Furthermore the port seems to be open on the ESXi host, however I can not connect to it, MSM will not recognize it.
I have no issue connecting to other servers with MSM.
Here is a nmap output, showing that the port is indeed open:
Scanning 192.168.1.2 [1000 ports]
Discovered open port 443/tcp on 192.168.1.2
Discovered open port 80/tcp on 192.168.1.2
Discovered open port 902/tcp on 192.168.1.2
Discovered open port 8300/tcp on 192.168.1.2
Discovered open port 427/tcp on 192.168.1.2
Discovered open port 8100/tcp on 192.168.1.2
Discovered open port 5989/tcp on 192.168.1.2
Discovered open port 8000/tcp on 192.168.1.2
Completed SYN Stealth Scan at 14:02, 5.32s elapsed (1000 total ports)
Initiating Service scan at 14:02
Scanning 8 services on 192.168.1.2
Completed Service scan at 14:04, 104.43s elapsed (8 services on 1 host)
Initiating OS detection (try #1) against 192.168.1.2
Retrying OS detection (try #2) against 192.168.1.2
Retrying OS detection (try #3) against 192.168.1.2
Retrying OS detection (try #4) against 192.168.1.2
Retrying OS detection (try #5) against 192.168.1.2
NSE: Script scanning 192.168.1.2.
Initiating NSE at 14:04
Completed NSE at 14:05, 31.14s elapsed
Initiating NSE at 14:05
Completed NSE at 14:05, 1.01s elapsed
Nmap scan report for 192.168.1.2
Host is up (0.00s latency).
Not shown: 992 closed ports
PORT STATE SERVICE VERSION
80/tcp open http VMware ESXi Server httpd
| http-methods:
|_ Supported Methods: GET HEAD POST OPTIONS
|_http-title: Did not follow redirect to https://192.168.1.2/
427/tcp open svrloc?
443/tcp open ssl/http VMware ESXi Server httpd
| http-methods:
|_ Supported Methods: GET HEAD POST
|_http-title: " + ID_EESX_Welcome + "
| ssl-cert: Subject: commonName=localhost.localdomain/organizationName=VMware, Inc/stateOrProvinceName=California/countryName=US
| Issuer: organizationName=VMware Installer
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2016-03-13T03:14:26
| Not valid after: 2027-09-12T03:14:26
| MD5: b467 9413 1ecd 2e91 f398 d58e 2482 a358
|_SHA-1: 1d7f 7b2a 047a 5741 f6dc 517e a0b9 3d7c 2ea3 1e00
|_ssl-date: TLS randomness does not represent time
902/tcp open ssl/vmware-auth VMware Authentication Daemon 1.10 (Uses VNC, SOAP)
5989/tcp open ssl/wbem SBLIM Small Footprint CIM Broker
| ssl-cert: Subject: commonName=localhost.localdomain/organizationName=VMware, Inc/stateOrProvinceName=California/countryName=US
| Issuer: organizationName=VMware Installer
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2016-03-13T03:14:26
| Not valid after: 2027-09-12T03:14:26
| MD5: b467 9413 1ecd 2e91 f398 d58e 2482 a358
|_SHA-1: 1d7f 7b2a 047a 5741 f6dc 517e a0b9 3d7c 2ea3 1e00
|_ssl-date: TLS randomness does not represent time
8000/tcp open http-alt?
8100/tcp open tcpwrapped
8300/tcp open tmi?
MAC Address: 00:15:17:E1:10:A0 (Intel Corporate)
No exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ).
TCP/IP fingerprint:
OS:SCAN(V=7.10%E=4%D=3/19%OT=80%CT=1%CU=37239%PV=Y%DS=1%DC=D%G=Y%M=001517%T
OS:M=56ED94DD%P=i686-pc-windows-windows)SEQ(SP=AC%GCD=8%ISR=FA%TI=I%CI=I%II
OS:=I%SS=S%TS=7)OPS(O1=M5B4NW9ST11%O2=M578NW9ST11%O3=M280NW9NNT11%O4=M5B4NW
OS:9ST11%O5=M218NW9ST11%O6=M109ST11)WIN(W1=FFFF%W2=FFFF%W3=FFFF%W4=FFFF%W5=
OS:FFFF%W6=FFFF)ECN(R=Y%DF=Y%T=40%W=FFFF%O=M5B4NW9SLL%CC=N%Q=)T1(R=Y%DF=Y%T
OS:=40%S=O%A=S+%F=AS%RD=0%Q=)T2(R=N)T3(R=N)T4(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R
OS:%O=%RD=0%Q=)T5(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=
OS:40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T7(R=Y%DF=Y%T=40%W=0%S=Z%A=S%F=AR%O=%RD=0%
OS:Q=)U1(R=Y%DF=N%T=40%IPL=38%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)IE(R=Y
OS:%DFI=S%T=40%CD=S)
Uptime guess: 0.005 days (since Sat Mar 19 13:57:49 2016)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=172 (Good luck!)
IP ID Sequence Generation: Incremental
Service Info: Host: localhost.localdomain; CPE: cpe:/o:vmware:esxi
TRACEROUTE
HOP RTT ADDRESS
1 0.00 ms 192.168.1.2