VMware NSX 4.x Tier-1 Gateway Router Security Technical Implementation Guide

Overview

VersionDateFinding Count (4)Downloads
12024-12-20CAT I (High): 1CAT II (Medium): 0CAT III (Low): 3
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.
ClassifiedPublicSensitive
I - Mission Critical ClassifiedI - Mission Critical PublicI - Mission Critical Sensitive
II - Mission Support ClassifiedII - Mission Support PublicII - Mission Support Sensitive
III - Administrative ClassifiedIII - Administrative PublicIII - Administrative Sensitive

Findings - All

Finding IDSeverityTitleDescription
V-265518
LOWMEDIUMHIGH
The NSX Tier-1 Gateway router must be configured to have all inactive interfaces removed.An inactive interface is rarely monitored or controlled and may expose a network to an undetected attack on that interface. Unauthorized personnel wit...
V-265529
LOWMEDIUMHIGH
The NSX Tier-1 Gateway router must be configured to have the DHCP service disabled if not in use.A compromised router introduces risk to the entire network infrastructure, as well as data resources that are accessible via the network. The perimete...
V-265604
LOWMEDIUMHIGH
The NSX Tier-1 Gateway router must be configured to advertise a hop limit of at least 32 in Router Advertisement messages for IPv6 stateless auto-configuration deployments.The Neighbor Discovery protocol allows a hop limit value to be advertised by routers in a Router Advertisement message being used by hosts instead of ...
V-265608
LOWMEDIUMHIGH
The NSX Tier-1 Gateway router must be configured to have multicast disabled if not in use.A compromised router introduces risk to the entire network infrastructure, as well as data resources that are accessible via the network. The perimete...