The NSX Manager must be configured to enforce the limit of three consecutive invalid logon attempts, after which time it must block any login attempt for 15 minutes.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-265293 | NMGR-4X-000012 | SV-265293r994102_rule | CCI-000044 | medium |
| Description | ||||
| By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced. | ||||
| STIG | Date | |||
| VMware NSX 4.x Manager NDM Security Technical Implementation Guide | 2024-12-13 | |||
Details
Check Text (C-265293r994102_chk)
From an NSX Manager shell, run the following commands:
> get auth-policy api lockout-reset-period
Expected result:
900 seconds
If the output does not match the expected result, this is a finding.
> get auth-policy api lockout-period
Expected result:
900 seconds
If the output does not match the expected result, this is a finding.
> get auth-policy api max-auth-failures
Expected result:
3
If the output does not match the expected result, this is a finding.
> get auth-policy cli lockout-period
Expected result:
900 seconds
If the output does not match the expected result, this is a finding.
> get auth-policy cli max-auth-failures
Expected result:
3
If the output does not match the expected result, this is a finding.
Fix Text (F-69118r994101_fix)
From an NSX Manager shell, run the following commands:
> set auth-policy api lockout-reset-period 900
> set auth-policy api lockout-period 900
> set auth-policy api max-auth-failures 3
> set auth-policy cli lockout-period 900
> set auth-policy cli max-auth-failures 3