VMware NSX-T Tier 1 Gateway RTR Security Technical Implementation Guide
Overview
| Version | Date | Finding Count (4) | Downloads | ||
| 1 | 2022-03-09 | CAT I (High): 1 | CAT II (Medium): 1 | CAT III (Low): 2 | |
| STIG Description |
| This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil. |
Findings - MAC I - Mission Critical Sensitive
| Finding ID | Severity | Title | Description |
|---|---|---|---|
| V-251772 | The NSX-T Tier-1 Gateway must be configured to enforce a Quality-of-Service (QoS) policy to limit the effects of packet flooding denial-of-service (DoS) attacks. | DoS is a condition when a resource is not available for legitimate users. Packet flooding distributed denial-of-service (DDoS) attacks are referred to... | |
| V-251771 | The NSX-T Tier-1 Gateway must be configured to have the DHCP service disabled if not in use. | A compromised router introduces risk to the entire network infrastructure, as well as data resources that are accessible via the network. The perimete... | |
| V-251773 | The NSX-T Tier-1 Gateway must be configured to have multicast disabled if not in use. | A compromised router introduces risk to the entire network infrastructure, as well as data resources that are accessible via the network. The perimete... | |
| V-251770 | The NSX-T Tier-1 Gateway must be configured to have all inactive interfaces removed. | An inactive interface is rarely monitored or controlled and may expose a network to an undetected attack on that interface. If an interface is no lon... |