VMware NSX-T Tier-0 Gateway Firewall Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates No substantive changes
Comparison against the immediately-prior release (V1R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
No substantive changes detected against the previous release. 8 rules matched cleanly.
- RMF Control
- AC-4
- Severity
- H
- CCI
- CCI-001414
- Version
- T0FW-3X-000002
- Vuln IDs
-
- V-251736
- Rule IDs
-
- SV-251736r810075_rule
Checks: C-55173r810073_chk
If the Tier-0 Gateway is deployed in an Active/Active HA mode and no stateless rules exist, this is Not Applicable. From the NSX-T Manager web interface, go to Security >> Gateway Firewall >> Gateway Specific Rules. For each Tier-0 Gateway, ensure there are no Unpublished changes. If there is a message for Total Unpublished Changes and Publish is not greyed out, this is a finding.
Fix: F-55127r810074_fix
From the NSX-T Manager web interface, go to Security >> Gateway Firewall >> Gateway Specific Rules. For each Tier-0 Gateway with Unpublished changes, review any unpublished changes and click either "Revert" or "Publish".
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000130
- Version
- T0FW-3X-000006
- Vuln IDs
-
- V-251737
- Rule IDs
-
- SV-251737r810078_rule
Checks: C-55174r810076_chk
If the Tier-0 Gateway is deployed in an Active/Active HA mode and no stateless rules exist, this is Not Applicable. From the NSX-T Manager web interface, go to Security >> Gateway Firewall >> Gateway Specific Rules. For each Tier-0 Gateway and for each rule, click the gear icon and verify the Logging setting. If Logging is not Enabled, this is a finding.
Fix: F-55128r810077_fix
From the NSX-T Manager web interface, go to Security >> Gateway Firewall >> Gateway Specific Rules. For each Tier-0 Gateway and for each rule with logging disabled, click the gear icon, enable Logging, and then click "Apply". After all changes are made, click "Publish".
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000140
- Version
- T0FW-3X-000011
- Vuln IDs
-
- V-251738
- Rule IDs
-
- SV-251738r856689_rule
Checks: C-55175r810079_chk
From an NSX-T Edge Node shell hosting the Tier-1 Gateway, run the following command(s): > get logging-servers If any configured logging-servers are not configured with protocol of "li-tls" or "tls", this is a finding. If primary and secondary logging-servers are not configured to use "li-tls" or "tls", this is a finding. Note: This check must be run from each NSX-T Edge Node hosting the Tier-0 Gateway, as they are configured individually.
Fix: F-55129r810080_fix
(Optional) From an NSX-T Edge Gateway shell, run the following command(s) to clear any existing incorrect logging-servers: > clear logging-servers From an NSX-T Edge Node shell, run the following command(s) to configure a primary and backup tls syslog server: > set logging-server <server-ip or server-name> proto tls level info serverca ca.pem clientca ca.pem certificate cert.pem key key.pem From an NSX-T Edge Node shell, run the following command(s) to configure a li-tls syslog server: > set logging-server <server-ip or server-name> proto li-tls level info serverca root-ca.crt Note: If using the protocols TLS or LI-TLS to configure a secure connection to a log server, the server and client certificates must be stored in /var/vmware/nsx/file-store/ on each NSX-T Edge Gateway appliance. Note: Configure the syslog or SNMP server to send an alert if the events server is unable to receive events from the NSX-T and also if DoS incidents are detected. This is true if the events server is STIG compliant.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001094
- Version
- T0FW-3X-000019
- Vuln IDs
-
- V-251739
- Rule IDs
-
- SV-251739r810084_rule
Checks: C-55176r810082_chk
If the Tier-0 Gateway is deployed in an Active/Active HA mode and no stateless rules exist, this is Not Applicable. From the NSX-T Manager web interface, go to Security >> Security Profiles >> Flood Protection to view Flood Protection profiles. If there are no Flood Protection profiles of type "Gateway", this is a finding. For each gateway flood protection profile, verify the TCP Half Open Connection limit, UDP Active Flow Limit, ICMP Active Flow Limit, and Other Active Connection Limit are set to "not set" or SYN Cache and RST Spoofing is not Enabled on a profile, this is a finding. For each gateway flood protection profile, examine the "Applied To" field to view the Tier-0 Gateways to which it is applied. If a gateway flood protection profile is not applied to all Tier-0 Gateways through one or more policies, this is a finding.
Fix: F-55130r810083_fix
To create a new Flood Protection profile, do the following: From the NSX-T Manager web interface, go to Security >> Security Profiles >> Flood Protection >> Add Profile >> Add Firewall Profile. Enter a name and specify appropriate values for the following: TCP Half Open Connection limit, UDP Active Flow Limit, ICMP Active Flow Limit, and Other Active Connection Limit. Enable SYN Cache and RST Spoofing, configure the "Applied To" field to contain Tier-0 Gateways, and then click "Save".
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- T0FW-3X-000021
- Vuln IDs
-
- V-251740
- Rule IDs
-
- SV-251740r810087_rule
Checks: C-55177r810085_chk
From the NSX-T Manager web interface, go to Security >> Gateway Firewall >> Gateway Specific Rules. Choose each Tier-1 Gateway in drop-down, then select Policy_Default_Infra Section >> Action. If the default_rule is set to "Allow", this is a finding.
Fix: F-55131r810086_fix
From the NSX-T Manager web interface, go to Security >> Gateway Firewall >> Gateway Specific Rules. Choose each Tier-1 Gateway in drop-down, then select Policy_Default_Infra Section >> Action. Change the Action to "Drop" or "Reject", and then click "Publish".
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- T0FW-3X-000028
- Vuln IDs
-
- V-251741
- Rule IDs
-
- SV-251741r856690_rule
Checks: C-55178r810088_chk
If the Tier-0 Gateway is deployed in an Active/Active HA mode and no stateless rules exist, this is Not Applicable. From the NSX-T Manager web interface, go to Security >> Security Profiles >> Flood Protection to view Flood Protection profiles. If there are no Flood Protection profiles of type "Gateway", this is a finding. For each gateway flood protection profile, verify the TCP Half Open Connection limit, UDP Active Flow Limit, ICMP Active Flow Limit, and Other Active Connection Limit are set to "not set" or SYN Cache and RST Spoofing is not "Enabled" on a profile, this is a finding. For each gateway flood protection profile, examine the Applied To field to view the Tier-0 Gateways to which it is applied. If a gateway flood protection profile is not applied to all Tier-0 Gateways through one or more policies, this is a finding.
Fix: F-55132r810089_fix
To create a new Flood Protection profile, do the following: From the NSX-T Manager web interface, go to Security >> Security Profiles >> Flood Protection >> Add Profile >> Add Firewall Profile. Enter a name and specify appropriate values for the following: TCP Half Open Connection limit, UDP Active Flow Limit, ICMP Active Flow Limit, and Other Active Connection Limit. Enable SYN Cache and RST Spoofing, then configure the Applied To field to contain Tier-0 Gateways and click "Save".
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- T0FW-3X-000030
- Vuln IDs
-
- V-251742
- Rule IDs
-
- SV-251742r856691_rule
Checks: C-55179r810091_chk
If the Tier-0 Gateway is deployed in an Active/Active HA mode and no stateless rules exist, this is Not Applicable. From the NSX-T Manager web interface, go to Security >> Gateway Firewall >> Gateway Specific Rules. Choose each T0-Gateway in the drop-down and review the firewall rules "Applied To" field to verify no rules are selectively applied to interfaces instead of the Gateway Firewall entity. If any Gateway Firewall rules are applied to individual interfaces, this is a finding.
Fix: F-55133r810092_fix
From the NSX-T Manager web interface, go to Security >> Gateway Firewall >> Gateway Specific Rules and choose the target Tier-0 Gateway from the drop-down. For any rules that have individual interfaces specified in the "Applied To" field, click "Edit" in the "Applied To" column and remove the interfaces selected, leaving only the Tier-0 Gateway object type checked. Click "Publish" to save any rule changes.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- T0FW-3X-000036
- Vuln IDs
-
- V-251743
- Rule IDs
-
- SV-251743r810096_rule
Checks: C-55180r810094_chk
From the NSX-T Manager web interface, go to Networking >> Segments and for each Segment, view Segment Profiles >> SpoofGuard. If a Segment is not configured with a SpoofGuard profile that has Port Binding enabled, this is a finding.
Fix: F-55134r810095_fix
To create a segment profile with SpoofGuard enabled, do the following: From the NSX-T Manager web interface, go to Networking >> Segments >> Segment Profiles >> Add Segment Profile >> SpoofGuard. Enter a profile name, enable port bindings, and then click "Save". To update a Segments SpoofGuard profile, do the following: From the NSX-T Manager web interface, go to Networking >> Segments and click "Edit" from the drop-down menu next to the target Segment. Expand Segment Profiles, choose the new SpoofGuard profile from the drop-down list, and then click "Save".