Communications between client components and vCenter Server system or ESXi hosts are protected by SSL-based encryption by default. Linux versions of these components do not perform certificate validation, so you should restrict the use of these clients.
Even if you have replaced the self-signed certificates on the vCenter Server system and the ESXi hosts with legitimate certificates signed by your local root certificate authority or a third party CA, communications with Linux clients are still vulnerable to man-in-the-middle attacks. The following components are vulnerable when they run on the Linux operating system.
vSphere SDK for Perl scripts
Programs written using the vSphere SDK
You can relax the restriction against using Linux clients if you enforce proper controls.
Restrict management network access to authorized systems only.
Use firewalls to ensure that only authorized hosts are allowed to access vCenter Server.
Use jump-box systems to ensure that Linux clients are behind the jump.