The NSX-T Manager must be configured to enforce the limit of three consecutive invalid logon attempts, after which time it must block any login attempt for 15 minutes.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-251779 | TNDM-3X-000012 | SV-251779r879546_rule | CCI-000044 | medium |
| Description | ||||
| By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced. | ||||
| STIG | Date | |||
| VMware NSX-T Manager NDM Security Technical Implementation Guide | 2023-06-22 | |||
Details
Check Text (C-251779r879546_chk)
From an NSX-T Manager shell, run the following command(s):
> get auth-policy api lockout-reset-period
Expected result:
900 seconds
If the output does not match the expected result, this is a finding.
> get auth-policy api lockout-period
Expected result:
900 seconds
If the output does not match the expected result, this is a finding.
> get auth-policy api max-auth-failures
Expected result:
3
If the output does not match the expected result, this is a finding.
> get auth-policy cli lockout-period
Expected result:
900 seconds
If the output does not match the expected result, this is a finding.
> get auth-policy cli max-auth-failures
Expected result:
3
If the output does not match the expected result, this is a finding.
Fix Text (F-55193r810339_fix)
From an NSX-T Manager shell, run the following command(s):
> set auth-policy api lockout-reset-period 900
> set auth-policy api lockout-period 900
> set auth-policy api max-auth-failures 3
> set auth-policy cli lockout-period 900
> set auth-policy cli max-auth-failures 3