VMware NSX-T Distributed Firewall Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates No substantive changes
Comparison against the immediately-prior release (V1R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
No substantive changes detected against the previous release. 8 rules matched cleanly.
- RMF Control
- AC-4
- Severity
- H
- CCI
- CCI-001414
- Version
- TDFW-3X-000002
- Vuln IDs
-
- V-251726
- Rule IDs
-
- SV-251726r810032_rule
Checks: C-55163r810030_chk
From the NSX-T Manager web interface, go to Security >> Distributed Firewall >> Category Specific Rules. If there is a message for Total Unpublished Changes and Publish is not greyed out, this is a finding.
Fix: F-55117r810031_fix
From the NSX-T Manager web interface, go to Security >> Distributed Firewall >> Category Specific Rules. Review any unpublished changes, and click either "Revert" or "Publish".
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- TDFW-3X-000005
- Vuln IDs
-
- V-251727
- Rule IDs
-
- SV-251727r810035_rule
Checks: C-55164r810033_chk
From the NSX-T Manager web interface, go to Security >> Distributed Firewall >> All Rules. For each rule, click the gear icon and verify the Logging setting. If Logging is not enabled for any rule, this is a finding.
Fix: F-55118r810034_fix
From the NSX-T Manager web interface, go to Security >> Distributed Firewall >> Category Specific Rules. For each rule that has logging disabled, click the gear icon, toggle the logging option to "Enable" and click "Apply". or For each Policy or Section, click the menu icon on the left and select "Enable Logging for All Rules". After all changes are made, click "Publish".
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001094
- Version
- TDFW-3X-000019
- Vuln IDs
-
- V-251728
- Rule IDs
-
- SV-251728r810038_rule
Checks: C-55165r810036_chk
From the NSX-T Manager web interface, go to Security >> Security Profiles >> Flood Protection to view Flood Protection profiles. If there are no Flood Protection profiles of type "Distributed Firewall", this is a finding. If the TCP Half Open Connection limit, UDP Active Flow Limit, ICMP Active Flow Limit, and Other Active Connection Limit are set to "not set" or SYN Cache and RST Spoofing is not Enabled on a profile, this is a finding. For each distributed firewall flood protection profile, examine the "Applied To" field to view the workloads it is protecting. If a distributed firewall flood protection profile is not applied to all workloads through one or more policies, this is a finding.
Fix: F-55119r810037_fix
To create a new Flood Protection profile do the following: From the NSX-T Manager web interface, go to Security >> Security Profiles >> Flood Protection >> Add Profile >> Add Firewall Profile. Enter a name and specify appropriate values for the following: TCP Half Open Connection limit, UDP Active Flow Limit, ICMP Active Flow Limit, and Other Active Connection Limit. Enable SYN Cache and RST Spoofing, configure the "Applied To" field with the appropriate security groups, and then click "Save".
- RMF Control
- SC-7
- Severity
- L
- CCI
- CCI-001109
- Version
- TDFW-3X-000021
- Vuln IDs
-
- V-251729
- Rule IDs
-
- SV-251729r810041_rule
Checks: C-55166r810039_chk
From the NSX-T Manager web interface, go to Security >> Distributed Firewall >> Category Specific Rules >> APPLICATION >> Default Layer3 Section >> Default Layer3 Rule >> Action. If the Default Layer3 Rule is set to "ALLOW", this is a finding.
Fix: F-55120r810040_fix
From the NSX-T Manager web interface, go to Security >> Distributed Firewall >> Category Specific Rules >> APPLICATION >> Default Layer3 Section >> Default Layer3 Rule and change action to "Drop" or "Reject". After all changes are made, click "Publish". Note: Before enabling, ensure the necessary rules to whitelist approved traffic are created and published or this change may result in loss of communication for workloads.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001844
- Version
- TDFW-3X-000026
- Vuln IDs
-
- V-251730
- Rule IDs
-
- SV-251730r856682_rule
Checks: C-55167r810042_chk
Verify NSX-T Distributed Firewall is configured to send traffic log entries to a central audit server for management and configuration of the traffic log entries. Log in to vSphere vCenter https interface with credentials authorized for administration. Navigate to Browse to the host in the vSphere Client inventory >> Configure >> System >> Advanced System Settings >> Edit >> Syslog.global.LogHost. Verify a STIG compliant events server is configured. If Syslog.global.LogHost is not configured with a STIG compliant events server, this is a finding.
Fix: F-55121r810043_fix
Change configuration of NSX-T Distributed Firewall to send traffic log entries to a central audit server for management and configuration of the traffic log entries. Log in to vSphere vCenter https interface with credentials authorized for administration, navigate to Browse to the host in the vSphere Client inventory >> Configure >> System >> Advanced System Settings >> Edit >> Syslog.global.LogHost >> value >> ssl://hostName1:1514 >> OK. Note: Configure the syslog or SNMP server to send an alert if the events server is unable to receive events from the NSX-T and also if denial-of-service (DoS) incidents are detected. This is true if the events server is STIG compliant.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- TDFW-3X-000028
- Vuln IDs
-
- V-251731
- Rule IDs
-
- SV-251731r856683_rule
Checks: C-55168r810045_chk
From the NSX-T Manager web interface, go to Security >> Security Profiles >> Flood Protection to view Flood Protection profiles. If there are no Flood Protection profiles of type "Distributed Firewall", this is a finding. If the TCP Half Open Connection limit, UDP Active Flow Limit, ICMP Active Flow Limit, and Other Active Connection Limit are set to "not set" or SYN Cache and RST Spoofing is not Enabled on a profile, this is a finding. For each distributed firewall flood protection profile, examine the "Applied To" field to view the workloads it is protecting. If a distributed firewall flood protection profile is not applied to all workloads through one or more policies, this is a finding.
Fix: F-55122r810046_fix
To create a new Flood Protection profile do the following: From the NSX-T Manager web interface, go to Security >> Security Profiles >> Flood Protection >> Add Profile >> Add Firewall Profile. Enter a name and specify appropriate values for the following: TCP Half Open Connection limit, UDP Active Flow Limit, ICMP Active Flow Limit, and Other Active Connection Limit. Enable SYN Cache and RST Spoofing then configure the "Applied To" field with the appropriate security groups, and then click "Save".
- RMF Control
- SI-4
- Severity
- M
- CCI
- CCI-002664
- Version
- TDFW-3X-000036
- Vuln IDs
-
- V-251732
- Rule IDs
-
- SV-251732r856684_rule
Checks: C-55169r810048_chk
From the NSX-T Manager web interface, go to Networking >> Segments, and for each Segment, view Segment Profiles >> SpoofGuard. If a Segment is not configured with a SpoofGuard profile that has Port Binding enabled, this is a finding.
Fix: F-55123r810049_fix
To create a segment profile with SpoofGuard enabled, do the following: From the NSX-T Manager web interface, go to Networking >> Segments >> Segment Profiles >> Add Segment Profile >> SpoofGuard. Enter a profile name and enable port bindings, then click "Save". To update a Segments SpoofGuard profile, do the following: From the NSX-T Manager web interface, go to the Networking >> Segments, and click "Edit" from the drop-down menu next to the target Segment. Expand "Segment Profiles" then choose the new SpoofGuard profile from the drop-down list, and then click "Save".
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- TDFW-3X-000042
- Vuln IDs
-
- V-251733
- Rule IDs
-
- SV-251733r810053_rule
Checks: C-55170r810051_chk
From the NSX-T Manager web interface, go to Security >> Distributed Firewall >> Category Specific Rules. For each category, verify each Policy has no time windows configured or any existing time windows are expected. This can be viewed by clicking on the clock icon in each Policy section. If there are unexpected or misconfigured time windows, this is a finding.
Fix: F-55124r810052_fix
From the NSX-T Manager web interface, go to Security >> Distributed Firewall >> Category Specific Rules. Navigate to the offending Category and Policy section, click on the clock icon, then delete or modify the time window for that Policy. Click "Apply". After all changes are made click "Publish".