Nutanix AOS 5.20.x Application Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates ⚠ 1
Comparison against the immediately-prior release (V1R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Severity changes 1
- V-254119 Medium High Nutanix AOS must be running an operating system release that is currently supported by the vendor.
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- NUTX-AP-000010
- Vuln IDs
-
- V-254097
- Rule IDs
-
- SV-254097r961221_rule
Checks: C-57582r846377_chk
Confirm Nutanix AOS Session Timeout settings are set to 15 minutes. 1. Log in to Prism Element. 2. Click on the gear icon in the upper right. 3. Navigate to "UI Settings" in the left navigation pane. For each user type, verify that the Session Timeout is set correctly. If not, this is a finding.
Fix: F-57533r846378_fix
Configure Nutanix AOS Session Timeout settings to 15 minutes. 1. Log in to Prism Element. 2. Click on the gear icon in the upper right. 3. Navigate to "UI Settings" in the left navigation pane. 4. Set the Session Timeout settings to 15 minutes per user type.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002314
- Version
- NUTX-AP-000020
- Vuln IDs
-
- V-254098
- Rule IDs
-
- SV-254098r961278_rule
Checks: C-57583r846380_chk
Confirm Nutanix AOS Prism Elements is configured to manage remote access. 1. Log in to Prism Element. 2. Click on the gear icon in the upper right. 3. Navigate to the Remote Support section to verify the ability to disable remote sessions, and that it is checked. If Disable Remote Sessions is not available, or is not checked, this is a finding.
Fix: F-57534r846381_fix
Configure Nutanix AOS Prism Elements to disable Remote Sessions. If the ability to disable Remote Sessions is not available there is corruption within the CVM. A rebuild is necessary to clear out the corruption and get the CVM back to a positive state. Rebuild the CVM by booting from ISO.
- RMF Control
- AC-17
- Severity
- H
- CCI
- CCI-000068
- Version
- NUTX-AP-000040
- Vuln IDs
-
- V-254099
- Rule IDs
-
- SV-254099r960759_rule
Checks: C-57584r846383_chk
Validate that the Signing Algorithm of the current SSL certificate. In the Prism UI, click the gear icon, and then select Settings >> SSL Certificate. If there is no SSL Certificate loaded, this is a finding.
Fix: F-57535r858120_fix
Import a DoD PKI issued SSL Certificate by Following the "Install an SSL Certificate" instructions in the "AOS Security Guide" located on the Nutanix Portal or by completing the following steps. 1. Click the gear icon in the main menu, and then select SSL Certificate in the Settings page. The SSL Certificate dialog box appears. 2. To replace (or install) a certificate, click "Replace Certificate". 3. To apply a custom certificate that the user provides: a. Click the Import Key and Certificate option, and then click "Next". b. Complete the fields as follows, and then click the "Import Files". Note: All three imported files for the custom certificate must be PEM encoded. i. Private Key Type: Select the appropriate type for the signed certificate from the pull-down list (RSA 4096 bit, RSA 2048 bit, EC DSA 256 bit, EC DSA 384 bit, or EC DSA 521). ii. Private Key: Click "Browse", and then select the private key associated with the certificate to be imported. iii. Public Certificate: Click "Browse", and then select the signed public portion of the server certificate corresponding to the private key. iv. CA Certificate/Chain: Click "Browse", and then select the certificate or chain of the signing authority for the public certificate. Use the "cat" command to concatenate a list of CA certificates into a chain file. $ cat signer.crt inter.crt root.crt > server.cert
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- NUTX-AP-000060
- Vuln IDs
-
- V-254100
- Rule IDs
-
- SV-254100r960792_rule
Checks: C-57585r846386_chk
Nutanix AOS supports user and group role mapping. Ensure all users or groups match that of the documented mapping policies defined by the ISSO. 1. Log in to Prism Element. 2. Click on the gear icon in the upper right. 3. Navigate to "role mapping". For each user or group listed, ensure the role granted is according to access control policies. If not, this is a finding.
Fix: F-57536r846387_fix
Configure the user and group mappings to be compliant with the documented mapping policies defined by the ISSO. 1. Log in to Prism Element. 2. Click on the gear icon in the upper right. 3. Navigate to "role mapping". 4. Add users and groups to role mappings per policy.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- NUTX-AP-000070
- Vuln IDs
-
- V-254101
- Rule IDs
-
- SV-254101r961353_rule
Checks: C-57586r846389_chk
Display a list of configured users and their roles on the Prism UI: 1. Log in to Prism Element. 2. Click on the gear icon in the upper right. 3. Navigate to "Local User Management". Validate that only authorized accounts have been assigned the "Cluster Admin" role by comparing the above list against the approved user list provided by the ISSM. If there are any users assigned the "Cluster Admin" role that have not been authorized by the ISSM, this is a finding.
Fix: F-57537r846390_fix
Assign the privileged users identified by the ISSM to the Cluster Admin role.
- RMF Control
- AC-8
- Severity
- L
- CCI
- CCI-000048
- Version
- NUTX-AP-000080
- Vuln IDs
-
- V-254102
- Rule IDs
-
- SV-254102r960843_rule
Checks: C-57587r846392_chk
Validate that the Prism WebUI "Welcome Banner" is enabled. 1. Log in to Prism Element. 2. Click on the gear icon in the upper right. 3. Navigate to the "Welcome Banner". 4. Verify the "Enable Banner" box is selected. If the "Enable Banner" box is not checked, this is a finding. Confirm Nutanix AOS Prism WebUI is set to display the Standard Mandatory DoD Notice and Consent Banner. 1. Log in to Prism Element. 2. Click on the gear icon in the upper right. 3. Navigate to the "Welcome Banner". If the Welcome Banner is not configured with the Standard Mandatory DoD Notice and Consent Banner, this is a finding.
Fix: F-57538r846393_fix
Configure Nutanix AOS Prism Elements WebUI to display the Standard Mandatory DoD Notice and Consent Banner. 1. Log in to Prism Element. 2. Click on the gear icon in the upper right. 3. Navigate to the "Welcome Banner". 4. Set the Welcome Banner to be configured with the Standardized DoD Use Notification. 5. Check "Enable Banner". 6. Click "Save".
- RMF Control
- AU-10
- Severity
- M
- CCI
- CCI-000166
- Version
- NUTX-AP-000110
- Vuln IDs
-
- V-254103
- Rule IDs
-
- SV-254103r960864_rule
Checks: C-57588r846395_chk
Confirm Nutanix AOS is configured to offload log records onto a different system. $ ncli rsyslog-config ls-servers If no remote syslog servers are defined, this is a finding.
Fix: F-57539r846396_fix
Configure Nutanix AOS to offload log records onto a different system by running the following command. $ ncli rsyslog-config add-server name=<remote_server_name> relp-enabled=<true | false> ip-address=<remote_ip_address> port=<port_num> network-protocol=<tcp | udp>
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001855
- Version
- NUTX-AP-000130
- Vuln IDs
-
- V-254104
- Rule IDs
-
- SV-254104r961398_rule
Checks: C-57589r846398_chk
Confirm Nutanix Cluster Check (NCC) "CVM DISK | System Audit Volume Usage" is enabled and the threshold values are set correctly. 1. Log in to Prism Element. 2. Select "Health dashboard" from navigation dropdown. 3. Select Actions >> Manage Checks. 4. Scroll down to CVM | Disk section, and then select "System Audit Volume Usage". If the selected check is Disabled, this is a finding. Validate the Alert Policy settings for Warning and Critical are set to 75 percent. If the Warning or Critical values are not set to 75 percent, this is a finding.
Fix: F-57540r846399_fix
Configure Nutanix Cluster Check (NCC) "CVM DISK | System Audit Volume Usage" is enabled and the threshold values are set to organization-defined values. 1. Log in to Prism Element. 2. Select "Health dashboard" from navigation dropdown. 3. Select Actions >> Manage Checks. 4. Scroll down to CVM | Disk section, select "System Audit Volume Usage". 5. If check is disabled, click to enable the check. 6. Select "Alert Policy", set the values for "Warning" and "Critical" thresholds to 75 percent and click "Save".
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000139
- Version
- NUTX-AP-000150
- Vuln IDs
-
- V-254105
- Rule IDs
-
- SV-254105r960912_rule
Checks: C-57590r846401_chk
Confirm Nutanix AOS is set to send SMTP alerts to the organization identified email address(es). 1. Log in to Nutanix Prism Elements. 2. Select "Health" dashboard. 3. On the Actions tab, select "Set NCC Frequency". If the Frequency setting and email address(es) are not set to organization-identified frequency and recipient, this is a finding.
Fix: F-57541r846402_fix
Configure Nutanix Cluster Check (NCC) within Prism Elements to meet the Organization identified frequency and recipient. 1. Log in to Nutanix Prism Elements. 2. Select "Health" dashboard. 3. On the Actions tab, select "Set NCC Frequency". 4. Enter frequency timeframe. 5. Enter recipient email address(es).
- RMF Control
- AU-8
- Severity
- L
- CCI
- CCI-000159
- Version
- NUTX-AP-000160
- Vuln IDs
-
- V-254106
- Rule IDs
-
- SV-254106r981685_rule
Checks: C-57591r846404_chk
Confirm Nutanix AOS Prism Elements is configured to use redundant NTP sources. 1. Log in to Prism Element. 2. Click on the gear icon in the upper right. 3. Navigate to the NTP Servers section. 4. Ensure external NTP servers have been configured. If external NTP sources are not configured, this is a finding.
Fix: F-57542r846405_fix
Configure Nutanix AOS Prism Elements to use redundant authoritative NTP time sources. 1. Log in to Prism Element. 2. Click on the gear icon in the upper right. 3. Navigate to the NTP Servers section. 4. Configure two authoritative NTP servers.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- NUTX-AP-000190
- Vuln IDs
-
- V-254107
- Rule IDs
-
- SV-254107r960930_rule
Checks: C-57592r846407_chk
Confirm Nutanix AOS application server log files are protected from unauthorized read access. The Nutanix AOS application server log files are owned by the Nutanix user and have a file permission of "640". Step 1. Identify actual file name by looking at alert_manager.INFO, which is a symlink for the actual rotating file name. $ sudo ls -al /home/nutanix/data/logs/alert_manager.INFO lrwxrwxrwx. 1 nutanix nutanix 75 Nov 1 17:50 /home/nutanix/data/logs/alert_manager.INFO -> alert_manager.ntnx-<CVM_NAME>.nutanix.log.INFO.<LOG_NUMBER> Step 2. Execute a stat command on the actual application server log file name. $ sudo stat -c "%a %n" /home/nutanix/data/logs/alert_manager.ntnx-<CVM_NAME>.nutanix.log.INFO.<LOG_NUMBER> 640 /home/nutanix/data/logs/alert_manager.ntnx<CVM_NAME>.nutanix.log.INFO.<LOG_NUMBER> If the output of the actual log file name is not "640", this is a finding.
Fix: F-57543r846408_fix
To configure Nutanix AOS Prism Elements application server log file permissions, run the following command: $ sudo salt-call state.sls security/CVM/interactivenutanixCVM
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001813
- Version
- NUTX-AP-000220
- Vuln IDs
-
- V-254108
- Rule IDs
-
- SV-254108r961461_rule
Checks: C-57593r858121_chk
Confirm Nutanix Prism Elements is setup with Role Based Access Controls. 1. Log in into Nutanix Prism Elements. 2. Select the gear icon on top right corner. 3. Select "Authentication" from left navigation pane. If no Organizational approved Directory (AD/LDAP) is listed, this is a finding. 4. Select "Role Mapping". If no Role mappings are listed, this is a finding.
Fix: F-57544r846411_fix
Configure Nutanix AOS Prism Elements to use Role Base Access Control with an Organization approved Directory (AD, LDAP). 1. Log in into Nutanix Prism Elements. 2. Select the gear icon on top right corner. 3. Select "Authentication" from left navigation pane. 4. Add an authenticated Organization approved Directory. 5. Setup Role Mappings for Users and or Groups.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000764
- Version
- NUTX-AP-000270
- Vuln IDs
-
- V-254109
- Rule IDs
-
- SV-254109r960969_rule
Checks: C-57594r858122_chk
Verify that Nutanix AOS is set to use enterprise user management systems. 1. Log in to Prism Element. 2. Click on the gear icon in the upper right. 3. Navigate to the "Authentication" settings. If an Active Directory or OpenLDAP server is not configured, this is a finding. Verify that only one local user account exists as the account of last resort. Navigate to Local User Management. If more than one local user account exists, this is a finding.
Fix: F-57545r846414_fix
Configure Nutanix AOS to use an enterprise user management system to authenticate individual users. 1. Log in to Prism Element. 2. Click on the gear icon in the upper right. 3. Navigate to the Authentication settings. 4. Add an Active Directory or OpenLDAP server to the Directory List. Configure one local admin user as the account of last resort. 1. Log in to Prism Element. 2. Click on the gear icon in the upper right. 3. Navigate to "Local User Management". 4. Select "+ New Users".
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000765
- Version
- NUTX-AP-000280
- Vuln IDs
-
- V-254110
- Rule IDs
-
- SV-254110r960972_rule
Checks: C-57595r858123_chk
Confirm Nutanix AOS is set to use multifactor authentication. 1. Log in to Prism Element. 2. Click on the gear icon in the upper right. 3. Navigate to the Authentication settings. If CAC authentication is not enabled, this is a finding.
Fix: F-57546r858401_fix
Configure Nutanix AOS Prism Elements to use CAC authentication. 1. Log in to Prism Elements. 2. Click on the gear icon in the upper right. 3. Navigate to the Authentication settings. 4. Select the "Configure Service Account" check box, and then complete the following in the indicated fields: a. Select the authentication directory that contains the CAC users that to be authenticated. This list includes the directories configured on the Directory List tab. b. Service Username: Enter the username in the user name@domain.com format the web console will use to log in to the Active Directory. c. Service Password: Enter the password for the service user name. d. Click "Enable CAC".
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000187
- Version
- NUTX-AP-000290
- Vuln IDs
-
- V-254111
- Rule IDs
-
- SV-254111r961494_rule
Checks: C-57596r858124_chk
Confirm Nutanix AOS is set to use multifactor authentication. 1. Log in to Prism Element. 2. Click on the gear icon in the upper right. 3. Navigate to the Authentication settings. If CAC authentication is not enabled, this is a finding.
Fix: F-57547r858402_fix
Configure Nutanix AOS Prism Elements to use CAC authentication. 1. Log in to Prism Elements. 2. Click on the gear icon in the upper right. 3. Navigate to the Authentication settings. 4. Select the "Configure Service Account" check box, and then complete the following in the indicated fields: a. Select the authentication directory that contains the CAC users to be authenticated. This list includes the directories configured on the Directory List tab. b. Service Username: Enter the username in the user name@domain.com format that the web console will use to log in to the Active Directory. c. Service Password: Enter the password for the service user name. d. Click "Enable CAC".
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000197
- Version
- NUTX-AP-000340
- Vuln IDs
-
- V-254112
- Rule IDs
-
- SV-254112r961029_rule
Checks: C-57597r858125_chk
Confirm Nutanix AOS is set to use encryption when using LDAP. 1. Log in to Prism Element. 2. Click on the gear icon in the upper right. 3. Navigate to the Authentication settings. 4. Add an Active Directory or OpenLDAP server to the Directory List. If an Active Directory or OpenLDAP server is not using port 636, this is a finding.
Fix: F-57548r846423_fix
Configure Nutanix AOS to utilize an Active Directory server to authenticate individual users. 1. Log in to Prism Element. 2. Click on the gear icon in the upper right. 3. Navigate to the Authentication settings. 4. Add an Active Directory or OpenLDAP server to the Directory List utilizing SSL encrypted port 636.
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000185
- Version
- NUTX-AP-000360
- Vuln IDs
-
- V-254113
- Rule IDs
-
- SV-254113r961038_rule
Checks: C-57598r846425_chk
Confirm Nutanix AOS is that OCSP checking is enabled. $ ncli authconfig get-client-authentication-config 'Auth Config Status : true' If "Auth config status" is not set to "true", this is a finding.
Fix: F-57549r846426_fix
Configure Nutanix AOS to use OCSP for certificate revocation. Set the OCSP responder URL. $ ncli authconfig set-certificate-revocation set-ocsp-responder=<ocsp url><ocsp url>
- RMF Control
- SC-13
- Severity
- H
- CCI
- CCI-002450
- Version
- NUTX-AP-000430
- Vuln IDs
-
- V-254114
- Rule IDs
-
- SV-254114r961857_rule
Checks: C-57599r846428_chk
Confirm Nutanix AOS is configured with a trusted DoD root CA signed certificate. 1. Log in to Prism Element. 2. Click on the gear icon in the upper right. 3. Navigate to the SSL Certificate section. 4. Ensure the approved CA signed certificate is installed. If the certificate used is not from an approved DoD-approved CA, this is a finding.
Fix: F-57550r846429_fix
Configure Nutanix AOS to use a trusted DoD root CA signed certificate. 1. Log in to Prism Element. 2. Click on the gear icon in the upper right. 3. Navigate to the SSL Certificate section. 4. Click "Relace Certificate". 5. Select "Import Key and Certificate". 6. Select the Private Key Type and upload the Private key; Public Certificate, and the CA Certificate or chain. 7. Select "Import Files".
- RMF Control
- SC-28
- Severity
- H
- CCI
- CCI-001199
- Version
- NUTX-AP-000450
- Vuln IDs
-
- V-254115
- Rule IDs
-
- SV-254115r961128_rule
Checks: C-57600r846431_chk
Confirm Nutanix AOS is set to use data at rest encryption. 1. Log in to Prism Element. 2. Click on the gear icon in the upper right. 3. Navigate to the Data-at-Rest Encryption section. 4. Ensure "Software Encryption" is enabled. If Software Encryption is not configured, this is a finding.
Fix: F-57551r846432_fix
Configure Nutanix AOS to use data at rest encryption 1. Log in to Prism Element. 2. Click on the gear icon in the upper right. 3. Navigate to the Data-at-Rest Encryption section. 4. Select "edit configuration". 5. Select either the Cluster local KMS or an External KMS. 6. Click "Protect" and then type "ENCRYPT" to confirm.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001314
- Version
- NUTX-AP-000490
- Vuln IDs
-
- V-254116
- Rule IDs
-
- SV-254116r961170_rule
Checks: C-57601r846434_chk
The Nutanix AOS application server log files are owned by the Nutanix user and have a file permission of "640". Step 1. Identify actual file name by looking at alert_manager.INFO, which is a symlink, the actual rotating file name. $ sudo ls -al /home/nutanix/data/logs/alert_manager.INFO lrwxrwxrwx. 1 nutanix nutanix 75 Nov 1 17:50 /home/nutanix/data/logs/alert_manager.INFO -> alert_manager.ntnx-<CVM_NAME>.nutanix.log.INFO.<LOG_NUMBER> Step 2. Execute a stat command on the actual application server log file name. $ sudo stat -c "%a %n" /home/nutanix/data/logs/alert_manager.ntnx-<CVM_NAME>.nutanix.log.INFO.<LOG_NUMBER> 640 /home/nutanix/data/logs/alert_manager.ntnx<CVM_NAME>.nutanix.log.INFO.<LOG_NUMBER> If the output of the actual log file name is not "640", this is a finding.
Fix: F-57552r846435_fix
Configure Nutanix AOS Prism Elements application server log file permissions, run the following command: $ sudo salt-call state.sls security/CVM/interactivenutanixCVM
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- NUTX-AP-000890
- Vuln IDs
-
- V-254117
- Rule IDs
-
- SV-254117r961095_rule
Checks: C-57602r846437_chk
Management information flow can be isolated to a separate vLAN from the guest VMs. 1. Log in to Prism Element. 2. Click on the gear icon in the upper right corner. 3. Under the "Settings" menu click "Network Configuration", and then select the "Internal Interfaces" tab. 4. Click on the "Management LAN" option. If VLAN ID is "0" or blank, this is a finding.
Fix: F-57553r846438_fix
1. Log in to Prism Element. 2. Click on the gear icon in the upper right corner. 3. Under the "Settings" menu click "Network Configuration", and then select the "Internal Interfaces" tab. 4. Click the "Management LAN" option. 5. Set the VLAN to the VLAN used for management functions. SSH into each CVM host as user nutanix and issue the following command: change_cvm_vlan vlan_id. SSH into each AHV host as root and issue the following command: ovs-vsctl set port br0 tag=vlan_id Note: Network switches connected to all Nutanix nodes must be appropriately configured with the same vlan_id.
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- NUTX-AP-000895
- Vuln IDs
-
- V-254118
- Rule IDs
-
- SV-254118r961095_rule
Checks: C-57603r846440_chk
DR network traffic segmentation is required when using Disaster Recovery Services. Disaster recovery can be used with Asynchronous, NearSync, and Metro Availability replications only if both the primary site and the recovery site are configured with Network Segmentation. Validate that Disaster Recovery Services is configured to use Specific Network Traffic Segmentation. If Disaster Recovery services are not in use this check is NA. 1. Log in to the Prism Elements web console and click the gear icon at the top-right corner of the page. 2. In the left pane, click "Network Configuration". 3. In the details pane, on the Internal Interfaces tab, review the existing interfaces to ensure there is an identified interface for DR traffic. If no identified network interface is defined for DR traffic, this is a finding.
Fix: F-57554r858375_fix
For the most current setup instructions, refer to the version-specific AOC Security Guide on the Nutanix Portal: https://portal.nutanix.com/page/documents/details?targetId=Nutanix-Security-Guide-v5_20:Nutanix-Security-Guide-v5_20 An excerpt from the AOS Security Guide is provided. Isolating the traffic associated with a specific service (DR) is a two-step process. To isolate a service to a separate virtual network, complete the following: 1. Log in to the Prism web console and click the gear icon at the top-right corner of the page. 2. In the left pane, click "Network Configuration". 3. In the details pane, on the Internal Interfaces tab, click "Create New Interface". 4. On the Interface Details tab, complete the following: a. Specify a descriptive name for the network segment. b. (On AHV) Optionally, in VLAN ID, specify a VLAN ID. Note: Ensure that the VLAN ID is configured on the physical switch. c. In Bridge (on AHV) or CVM Port Group (on ESXi), select the bridge or port group created for the network segment. d. To specify an IP address pool for the network segment, click "Create New IP Pool", and then, in the IP Pool dialog box, do the following: i. In Name, specify a name for the pool. ii. In Netmask, specify the network mask for the pool. iii. Click "Add an IP Range", specify the start and end IP addresses in the IP Range dialog box that is displayed. iv. Use Add an IP Range to add as many IP address ranges as needed. Note: Add at least n+1 IP addresses in an IP range considering n is the number of nodes in the cluster. v. Click "Save". vi. Use Add an IP Pool to add more IP address pools. Use only one IP address pool at any given time. vii. Select the IP address pool to be used, and then click "Next". Note: An existing unused IP address pool can also be used. 5. On the Feature Selection tab, do the following: Note: Network segmentation cannot be enabled for multiple services at the same time. Complete the configuration for one service before enabling network segmentation for another service. a. Select the service whose traffic is to be isolated. b. Configure the settings for the selected service. Note: The settings on this page depend on the services selected. For information about service-specific settings, refer to Service-Specific Settings and Configurations. c. Click "Save". 6. In the "Create Interface" dialog box, click "Save". Note: The CVMs are rebooted multiple times, one after another. This procedure might trigger more tasks on the cluster. For example, if configuring network segmentation for disaster recovery, the firewall rules are added on the CVM to allow traffic on the specified ports through the new CVM interface and updated when a new recovery cluster is added or an existing cluster is modified. What to do next: Refer to Service-Specific Settings and Configurations for any additional tasks that are required after the network for a service is segmented. Disaster Recovery with Protection Domains: The settings for configuring network segmentation for disaster recovery apply to all Asynchronous, NearSync, and Metro Availability replication schedules. Disaster recovery can be used with Asynchronous, NearSync, and Metro Availability replications only if both the primary site and the recovery site are configured with Network Segmentation. Before enabling or disabling the network segmentation on a host, disable all the disaster recovery replication schedules running on that host. Note: Network segmentation does not support disaster recovery with Leap. Remote Site Configuration: After configuring network segmentation for disaster recovery, configure remote sites at both locations. Reconfigure remote sites if network segmentation is disabled. For information about configuring remote sites, refer to Site Configuration in the Data Protection and Recovery with Prism Element Guide. Segmenting a Stretched Layer 2 Network for Disaster Recovery: A stretched Layer 2 network configuration allows the source and remote metro clusters to be in the same broadcast domain and communicate without a gateway. About this task: Network segmentation can be enabled for disaster recovery on a stretched Layer 2 network that does not have a gateway. A stretched Layer 2 network is usually configured across the physically remote clusters such as a metro availability cluster deployment. A stretched Layer 2 network allows the source and remote clusters to be configured in the same broadcast domain without the usual gateway. Refer to AOS Release Notes for minimum AOS version required to configure a stretched Layer 2 network. To configure a network segment as a stretched L2 network, do the following. Procedure: Run the following command: nutanix@cvm$ network_segmentation --service_network --service_name=kDR --ip_pool=DR-ip-pool-name --service_vlan=DR-vlan-id --desc_name=Description --host_physical_network=portgroup/bridge --stretched_metro Replace the following: (Refer to Isolating Service-Specific Traffic for the information) * DR-ip-pool-name with the name of the IP Pool created for the DR service or any existing unused IP address pool. * DR-vlan-id with the VLAN ID being used for the DR service. * Description with a suitable description of this stretched L2 network segment. * portgroup/bridge with the details of Bridge or CVM Port Group used for the DR service.
- RMF Control
- SI-2
- Severity
- H
- CCI
- CCI-002605
- Version
- NUTX-AP-001080
- Vuln IDs
-
- V-254119
- Rule IDs
-
- SV-254119r1001000_rule
Checks: C-57604r1000998_chk
Product version is end of life and no longer supported. If the system is running AOS version 5.20.x, this is a finding.
Fix: F-57555r1000999_fix
Upgrade to a supported version.