{
"stig": {
"date": "2016-06-27",
"description": "This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via e-mail to the following address: disa.stig_spt@mail.mil.",
"findings": {
"V-69127": {
"checkid": "C-69567r1_chk",
"checktext": "Verify there are no inactive router interfaces enabled.\n\nLog onto vSphere Web Client with credentials authorized for administration.\n\nNavigate and select Networking and Security >> \"NSX Edges\" tab on the left-side menu.\n\nDouble-click the EdgeID.\n\nClick on the \"Manage\" tab on the top of the new screen, then Settings on the far left >> Interfaces >> Check the \"Status\" column for the associated interface.\n\nIf any inactive router interfaces are not disabled, this is a finding.",
"description": "An inactive interface is rarely monitored or controlled and may expose a network to an undetected attack on that interface. Unauthorized personnel with access to the communication facility could gain access to a router by connecting to a configured interface that is not in use.",
"fixid": "F-75313r1_fix",
"fixtext": "Log onto vSphere Web Client with credentials authorized for administration.\n\nNavigate and select Networking and Security >> select the \"NSX Edges\" tab on the left-side menu.\n\nDouble-click the EdgeID.\n\nClick on the \"Manage\" tab on the top of the new screen then Settings on the far left >> Interfaces.\n\nFor interfaces that are not in use, highlight the interface and click the pencil icon.\n\nMove the radio button next to \"Connectivity Status\" to \"Disconnected\".",
"iacontrols": null,
"id": "V-69127",
"ruleID": "SV-83731r1_rule",
"severity": "medium",
"title": "The NSX Distributed Logical Router must be configured so inactive router interfaces are disabled.",
"version": "VNSX-RT-000005"
},
"V-69129": {
"checkid": "C-69569r1_chk",
"checktext": "Verify for OSPF that Authentication is not set to \"None\" and for BGP password has been configured.\n\nLog onto vSphere Web Client with credentials authorized for administration.\n\nNavigate and select Networking and Security >> select the \"NSX Edges\" tab on the left-side menu. \n\nDouble-click the edgeID in question, as denoted by the \"Logical Router\" type.\n\nSelect the \"Manage\" tab on the top of the new screen >> Routing.\n\nIf OSPF is configured, select OSPF >> Area Definitions.\n\nSelect the configured areas.\n\nClick the \"pencil\" icon.\n\nVerify \"authentication\" is set to something other than \"none\".\n\nIf Authentication is set to \"None\", this is a finding.\n\nIf BGP is configured, select BGP >> Neighbors >> select the configured neighbor >> Click the \"pencil\" icon >> verify \"password\" is configured.\n\nIf a password has not been configured for BGP, this is a finding.",
"description": "A rogue router could send a fictitious routing update to convince a site's perimeter router to send traffic to an incorrect or even a rogue destination. This diverted traffic could be analyzed to learn confidential information about the site's network, or merely used to disrupt the network's ability to communicate with other networks. This is known as a \"traffic attraction attack\" and is prevented by configuring neighbor router authentication for routing updates.\n\nThis requirement applies to all IPv4 and IPv6 protocols that are used to exchange routing or packet forwarding information; this includes all Interior Gateway Protocols (such as OSPF, EIGRP, and IS-IS) and Exterior Gateway Protocols (such as BGP), MPLS-related protocols (such as LDP), and Multicast-related protocols.",
"fixid": "F-75315r1_fix",
"fixtext": "Log onto vSphere Web Client with credentials authorized for administration. \n\nNavigate and select Networking and Security >> select the \"NSX Edges\" tab on the left-side menu.\n\nDouble-click the edgeID in question, as denoted by the \"Logical Router\" type.\n\nSelect the \"Manage\" tab on the top of the new screen. >> Routing.\n\nIf OSPF is configured, select the \"OSPF\" option on the left >> select Area Definitions >> select the configured areas.\n\nClick the \"pencil\" icon.\n\nSelect an \"authentication\" method and configure a value.\n\nIf BGP is configured select the \"BGP\" option on the left.\n\nSelect Neighbors >> select the configured neighbor.\n\nClick the \"pencil\" icon.\n\nAdd a password in the \"password\" section.",
"iacontrols": null,
"id": "V-69129",
"ruleID": "SV-83733r1_rule",
"severity": "medium",
"title": "The NSX Distributed Logical Router must enable neighbor router authentication for control plane protocols.",
"version": "VNSX-RT-000012"
},
"V-69133": {
"checkid": "C-69571r1_chk",
"checktext": "Verify only necessary services are enabled.\n\nLog onto vSphere Web Client with credentials authorized for administration.\n\nNavigate and select Networking and Security >> select the \"NSX Edges\" tab on the left-side menu.\n\nDouble-click the Edge ID.\n\nNavigate to Manage >> Verify the configurations under \"Settings, Firewall, Routing, Bridging, and DHCP Relay\" are enabled only as necessary to the deployment.\n\nIf unnecessary services are enabled, this is a finding.",
"description": "A compromised router introduces risk to the entire network infrastructure as well as data resources that are accessible via the network. The perimeter defense has no oversight or control of attacks by malicious users within the network. Preventing network breaches from within is dependent on implementing a comprehensive defense-in-depth strategy including securing each device connected to the network. This is accomplished by following and implementing all security guidance applicable for each node type. A fundamental step in securing each router is to enable only the capabilities required for operation.",
"fixid": "F-75319r1_fix",
"fixtext": "Log onto vSphere Web Client with credentials authorized for administration.\n\nNavigate and select Networking and Security >> select the \"NSX Edges\" tab on the left-side menu.\n\nDouble-click the Edge ID.\n\nNavigate to Manage >> Verify the configurations under \"Settings, Firewall, Routing, Bridging, and DHCP Relay\" are enabled only as necessary to the deployment.\n\nIf any non-essential services are enabled, select the \"disable\" option, or remove the configurations under the respective sections.",
"iacontrols": null,
"id": "V-69133",
"ruleID": "SV-83737r1_rule",
"severity": "medium",
"title": "The NSX Distributed Logical Router must be configured to disable non-essential capabilities.",
"version": "VNSX-RT-000015"
},
"V-69135": {
"checkid": "C-69573r1_chk",
"checktext": "Verify the traffic shaping policies are properly configured to manage excess bandwidth.\n\nLog into vSphere Web Client with credentials authorized for administration navigate and select Networking >> select the respective VDS under the appropriate datacenter >> Click the dropdown to expand the list of portgroups >> select the appropriate portgroup for your network.\n\nNavigate to >> Manage >> Settings >> Properties >> Edit >> Traffic Shaping\n\nVerify the necessary values are configured to reserve bandwidth for applications in the event of bandwidth congestion.\n\nNavigate to >> Manage >> Settings >> Properties >> Edit >> Traffic filtering and marking >> Verify the necessary values for DSCP are configured to mark bandwidth for applications in the event of a DoS attack.\n\nSelect checkbox for \"DSCP value: Update DSCP tag\" >> enter in a number between 0 and 63.\nSelect \"+\" symbol under Traffic qualifiers with \"New System Traffic Qualifier\" and select System traffic type >> \"OK\".\nSelect \"OK\" to accept new Network Traffic Rule.\n\nIf the traffic shaping and QoS policies are not properly configured to manage excess bandwidth and to reserve bandwidth for critical applications in the event of bandwidth congestion, this is a finding.",
"description": "Denial of service is a condition when a resource is not available for legitimate users. Packet flooding DDoS attacks are referred to as volumetric attacks and have the objective of overloading a network or circuit to deny or seriously degrade performance, which denies access to the services that normally traverse the network or circuit. Volumetric attacks have become relatively easy to launch using readily available tools such as Low Orbit Ion Cannon or by botnets. \n \nMeasures to mitigate the effects of a successful volumetric attack must be taken to ensure that sufficient capacity is available for mission-critical traffic. Managing capacity may include, for example, establishing selected network usage priorities or quotas and enforcing them using rate limiting, Quality of Service (QoS), or other resource reservation control methods. These measures may also mitigate the effects of sudden decreases in network capacity that are the result of accidental or intentional physical damage to telecommunications facilities (such as cable cuts or weather-related outages).",
"fixid": "F-75321r1_fix",
"fixtext": "Log into vSphere Web Client with credentials authorized for administration, navigate and select Networking >> select the respective VDS under the appropriate datacenter >> Click the dropdown to expand the list of portgroups >> select the appropriate portgroup for your network. \n\nNavigate to >> Manage >> Settings >> Properties >> Edit >> Traffic Shaping \nEnable traffic shaping for the portgroup. \nConfigure average bandwidth, peak bandwidth, and burst size levels as appropriate to provide allocations sufficient to limit the effect of DoS attacks.\n\nNavigate to >> Manage >> Settings >> Properties >> Edit >> Traffic filtering and marking \nVerify the necessary values for DSCP are configured to provide QoS markings to preserve bandwidth for critical applications during periods of congestion.\n \nSelect checkbox for \"DSCP value: Update DSCP tag\" >> enter in a number between 0 and 63. \nSelect \"+\" symbol under Traffic qualifiers with \"New System Traffic Qualifier\" \nSelect System traffic type >> \"OK\".\nSelect \"OK\" to accept new Network Traffic Rule.",
"iacontrols": null,
"id": "V-69135",
"ruleID": "SV-83739r1_rule",
"severity": "medium",
"title": "The NSX Distributed Logical Router must manage excess bandwidth to limit the effects of packet flooding types of denial of service (DoS) attacks.",
"version": "VNSX-RT-000019"
}
},
"profiles": {
"MAC-1_Classified": {
"description": "",
"findings": {
"V-69127": "true",
"V-69129": "true",
"V-69133": "true",
"V-69135": "true"
},
"id": "MAC-1_Classified",
"title": "I - Mission Critical Classified"
},
"MAC-1_Public": {
"description": "",
"findings": {
"V-69127": "true",
"V-69129": "true",
"V-69133": "true",
"V-69135": "true"
},
"id": "MAC-1_Public",
"title": "I - Mission Critical Public"
},
"MAC-1_Sensitive": {
"description": "",
"findings": {
"V-69127": "true",
"V-69129": "true",
"V-69133": "true",
"V-69135": "true"
},
"id": "MAC-1_Sensitive",
"title": "I - Mission Critical Sensitive"
},
"MAC-2_Classified": {
"description": "",
"findings": {
"V-69127": "true",
"V-69129": "true",
"V-69133": "true",
"V-69135": "true"
},
"id": "MAC-2_Classified",
"title": "II - Mission Support Classified"
},
"MAC-2_Public": {
"description": "",
"findings": {
"V-69127": "true",
"V-69129": "true",
"V-69133": "true",
"V-69135": "true"
},
"id": "MAC-2_Public",
"title": "II - Mission Support Public"
},
"MAC-2_Sensitive": {
"description": "",
"findings": {
"V-69127": "true",
"V-69129": "true",
"V-69133": "true",
"V-69135": "true"
},
"id": "MAC-2_Sensitive",
"title": "II - Mission Support Sensitive"
},
"MAC-3_Classified": {
"description": "",
"findings": {
"V-69127": "true",
"V-69129": "true",
"V-69133": "true",
"V-69135": "true"
},
"id": "MAC-3_Classified",
"title": "III - Administrative Classified"
},
"MAC-3_Public": {
"description": "",
"findings": {
"V-69127": "true",
"V-69129": "true",
"V-69133": "true",
"V-69135": "true"
},
"id": "MAC-3_Public",
"title": "III - Administrative Public"
},
"MAC-3_Sensitive": {
"description": "",
"findings": {
"V-69127": "true",
"V-69129": "true",
"V-69133": "true",
"V-69135": "true"
},
"id": "MAC-3_Sensitive",
"title": "III - Administrative Sensitive"
}
},
"slug": "vmware_nsx_distributed_logical_router",
"title": "VMware NSX Distributed Logical Router Security Technical Implementation Guide",
"version": "1"
}
}