VMware NSX-T Tier-0 Gateway RTR Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates No substantive changes
Comparison against the immediately-prior release (V1R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
No substantive changes detected against the previous release. 16 rules matched cleanly.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001368
- Version
- T0RT-3X-000003
- Vuln IDs
-
- V-251744
- Rule IDs
-
- SV-251744r810116_rule
Checks: C-55181r810114_chk
If the Tier-0 Gateway is not using eBGP, this is Not Applicable. From the NSX-T Manager web interface, go to Networking >> Tier-0 Gateways. For every Tier-0 Gateway, expand Tier-0 Gateway >>BGP. Near to BGP Neighbors, click on the number present to open the dialog. For each neighbor examine any router filters to determine if any inbound route filters are applied. If the In Filter is not configured with a prefix list that rejects prefixes belonging to the local AS, this is a finding.
Fix: F-55135r810115_fix
To configure a route filter do the following: From the NSX-T Manager web interface, go to Networking >> Tier-0 Gateways >> edit the target Tier-0 gateway. Expand Routing and open the IP Prefix List dialog. Edit an existing, or add a new prefix list that contains the prefixes belonging to the local AS to deny them. Click "Save". To apply a route filter to a BGP neighbor do the following: From the NSX-T Manager web interface, go to Networking >> Tier-0 Gateways and edit the target Tier-0 gateway. Expand BGP, and next to BGP Neighbors, click on the number present to open the dialog. Select "Edit" on the target BGP Neighbor. Open the router filter dialog and add or edit an existing router filter. Configure the In Filter with the filter previously created and click "Save", "Add", "Apply", and "Save".
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- T0RT-3X-000013
- Vuln IDs
-
- V-251745
- Rule IDs
-
- SV-251745r810119_rule
Checks: C-55182r810117_chk
From the NSX-T Manager web interface, go to Networking >> Tier-0 Gateways. For every Tier-0 Gateway, expand the Tier-0 Gateway >> Interfaces, and click on the number of interfaces present to open the interfaces dialog. Expand each interface that is not required to support multicast routing, then expand "Multicast" and verify PIM is disabled. If PIM is enabled on any interfaces that are not supporting multicast routing, this is a finding.
Fix: F-55136r810118_fix
Disable multicast PIM routing on interfaces that are not required to support multicast by doing the following: From the NSX-T Manager web interface, go to Networking >> Tier-0 Gateways and expand the target Tier-0 gateway. Expand "Interfaces", click on the number of interfaces present to open the interfaces dialog, and then select "Edit" on the target interface. Expand "Multicast", change PIM to "disabled", and then click "Save".
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001414
- Version
- T0RT-3X-000016
- Vuln IDs
-
- V-251746
- Rule IDs
-
- SV-251746r810122_rule
Checks: C-55183r810120_chk
From the NSX-T Manager web interface, go to Networking >> Tier-0 Gateways. For every Tier-0 Gateway, expand the Tier-0 Gateway >> Interfaces, and click on the number of interfaces present to open the interfaces dialog. Review each interface present to determine if they are not in use or inactive. If there are any interfaces present on a Tier-0 Gateway that are not in use or inactive, this is a finding.
Fix: F-55137r810121_fix
Disable multicast PIM routing on interfaces that are not required to support multicast by doing the following: From the NSX-T Manager web interface, go to Networking >> Tier-0 Gateways and expand the target Tier-0 gateway. Expand "Interfaces", then click on the number of interfaces present to open the interfaces dialog. Select "Delete" on the unneeded interface, and then click "Delete" again to confirm.
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- T0RT-3X-000027
- Vuln IDs
-
- V-251747
- Rule IDs
-
- SV-251747r810125_rule
Checks: C-55184r810123_chk
From the NSX-T Manager web interface, go to Networking >> Tier-0 Gateways. For every Tier-0 Gateway expand the Tier-0 Gateway to view the DHCP configuration. If a DHCP profile is configured and not in use, this is a finding.
Fix: F-55138r810124_fix
From the NSX-T Manager web interface, go to Networking >> Tier-0 Gateways and edit the target Tier-0 Gateway. Click "Set DHCP Configuration", select "No Dynamic IP Address Allocation", and then click "Save". Close "Editing".
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001095
- Version
- T0RT-3X-000034
- Vuln IDs
-
- V-251748
- Rule IDs
-
- SV-251748r810128_rule
Checks: C-55185r810126_chk
From the NSX-T Manager web interface, go to Networking >> Segments. For every Segment connected to a Tier-0 Gateway, Expand Segment >> Expand Segment Profiles >> Record QOS Segment Profile. Go to Segment Profiles >> Expand QOS Segment Profile recorded in previous steps. If there are traffic priorities specified by the Combatant Commands/Services/Agencies needed to ensure sufficient capacity for mission-critical traffic and none are configured, this is a finding.
Fix: F-55139r810127_fix
To create a segment QoS profile do the following: From the NSX-T Manager web interface, go to Networking >> Segments >> Segment Profiles. Click "Add Segment Profile" and select "QoS". Configure a profile name and QoS settings as needed, and then click "Save". To apply a QoS profile to a segment do the following: From the NSX-T Manager web interface, go to Networking >> Segments >> Edit the target segment. Expand Segment Profiles and under QoS select the profile previously created and click "Save".
- RMF Control
- SC-7
- Severity
- H
- CCI
- CCI-001097
- Version
- T0RT-3X-000038
- Vuln IDs
-
- V-251749
- Rule IDs
-
- SV-251749r810131_rule
Checks: C-55186r810129_chk
If the Tier-0 Gateway is deployed in an Active/Active HA mode, this is Not Applicable. From the NSX-T Manager web interface, go to Security >> Gateway Firewall >> Gateway Specific Rules and choose each Tier-0 Gateway in the drop-down. Review each Tier-0 Gateway Firewalls rules to verify rules exist to restrict traffic to itself. If a rule or rules do not exist to restrict traffic to external interface IPs, this is a finding.
Fix: F-55140r810130_fix
To configure firewall rule(s) to restrict traffic destined to interfaces on a Tier-0 Gateway do the following: From the NSX-T Manager web interface, go to Security >> Gateway Firewall >> Gateway Specific Rules and select the target Tier-0 Gateway from the drop-down. Click "Add Rule" (Add a policy first if needed) and configure the destinations to include all IPs for external interfaces. Update the action to "Drop" or "Reject". Enable logging, then under the "Applied To" field, select the target Tier-0 Gateways and click "Publish" to enforce the new rule. Other rules may be constructed to allow traffic to external interface IPs if required above this default deny rule.
- RMF Control
- SC-5
- Severity
- H
- CCI
- CCI-001094
- Version
- T0RT-3X-000051
- Vuln IDs
-
- V-251750
- Rule IDs
-
- SV-251750r810134_rule
Checks: C-55187r810132_chk
From the NSX-T Manager web interface, go to Networking >> Tier-0 Gateways. For every Tier-0 Gateway, expand Tier-0 Gateway >> Interfaces, and then click on the number of interfaces present to open the interfaces dialog. Expand each interface to view the URPF Mode configuration. If URPF Mode is not set to "Strict" on any interface, this is a finding.
Fix: F-55141r810133_fix
Enable strict URPF mode on interfaces by doing the following: From the NSX-T Manager web interface, go to Networking >> Tier-0 Gateways and expand the target Tier-0 gateway. Expand Interfaces, then click on the number of interfaces present to open the interfaces dialog. Select "Edit" on the target interface. From the drop-down, set the URPF mode to "Strict" and then click "Save".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- T0RT-3X-000054
- Vuln IDs
-
- V-251751
- Rule IDs
-
- SV-251751r856692_rule
Checks: C-55188r810135_chk
If the Tier-0 Gateway is not using BGP or OSPF, this is Not Applicable. Since the NSX-T Tier-0 Gateway does not reveal if a BGP password is configured, interview the router administrator to determine if a password is configured on BGP neighbors. If BGP neighbors do not have a password configured, this is a finding. To verify OSPF areas are using authentication do the following: From the NSX-T Manager web interface, go to Networking >> Tier-0 Gateways. For every Tier-0 Gateway expand the "Tier-0 Gateway". Expand "OSPF", click the number next to Area Definition, and view the Authentication field for each area. If OSPF area definitions do not have Password or MD5 set for authentication, this is a finding. Note: OSPF support was introduced in version 3.1.1.
Fix: F-55142r810136_fix
To set authentication for BGP neighbors do the following: From the NSX-T Manager web interface, go to Networking >> Tier-0 Gateways, and expand the target Tier-0 gateway. Expand BGP. Next to BGP Neighbors, click on the number present to open the dialog, then select "Edit" on the target BGP Neighbor. Under Timers & Password, enter a password up to 20 characters, and then click "Save". To set authentication for OSPF Area definitions do the following: From the NSX-T Manager web interface, go to Networking >> Tier-0 Gateways, and expand the target Tier-0 gateway. Expand OSPF. Next to Area Definition, click on the number present to open the dialog, and then select "Edit" on the target OSPF Area. Change the Authentication drop-down to Password or MD5, enter a Key ID and/or Password, and then click "Save".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- T0RT-3X-000055
- Vuln IDs
-
- V-251752
- Rule IDs
-
- SV-251752r856693_rule
Checks: C-55189r810138_chk
If the Tier-0 Gateway is not using BGP, this is Not Applicable. Since the NSX-T Tier-0 Gateway does not reveal the current password, interview the router administrator to determine if unique keys are being used. If unique keys are not being used for each AS, this is a finding.
Fix: F-55143r810139_fix
To set authentication for BGP neighbors do the following: From the NSX-T Manager web interface, go to Networking >> Tier-0 Gateways, and expand the target Tier-0 gateway. Expand BGP. Next to BGP Neighbors, click on the number present to open the dialog, and then select "Edit" on the target BGP Neighbor. Under Timers & Password, enter a password up to 20 characters that is different from other autonomous systems, and then click "Save".
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- T0RT-3X-000064
- Vuln IDs
-
- V-251753
- Rule IDs
-
- SV-251753r856694_rule
Checks: C-55190r810141_chk
If the Tier-0 Gateway is deployed in an Active/Active HA mode, this is Not Applicable. From the NSX-T Manager web interface, go to Security >> Gateway Firewall >> Gateway Specific Rules, and choose each Tier-0 Gateway in the drop-down. Review each Tier-0 Gateway Firewall rule to verify one exists to drop ICMP unreachable messages. If a rule does not exist to drop ICMP unreachable messages, this is a finding.
Fix: F-55144r810142_fix
To configure a shared rule to drop ICMP unreachable messages do the following: From the NSX-T Manager web interface, go to Security >> Gateway Firewall >> All Shared Rules. Click "Add Rule" (Add a policy first if needed), under services select "ICMP Destination Unreachable", and then click "Apply". Enable logging, and under the Applied To field select the target Tier-0 Gateways. Click "Publish" to enforce the new rule. Note: A rule can also be created under Gateway Specific Rules to meet this requirement.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- T0RT-3X-000065
- Vuln IDs
-
- V-251754
- Rule IDs
-
- SV-251754r856695_rule
Checks: C-55191r810144_chk
If the Tier-0 Gateway is deployed in an Active/Active HA mode, this is Not Applicable. From the NSX-T Manager web interface, go to Security >> Gateway Firewall >> Gateway Specific Rules, and choose each Tier-0 Gateway in the drop-down. Review each Tier-0 Gateway Firewall rule to verify one exists to drop ICMP mask replies. If a rule does not exist to drop ICMP mask replies, this is a finding.
Fix: F-55145r810145_fix
To configure a shared rule to drop ICMP unreachable messages do the following: From the NSX-T Manager web interface, go to Security >> Gateway Firewall >> All Shared Rules. Click "Add Rule" (Add a policy first if needed), under "Services" select the custom service that identifies ICMP mask replies, and then click "Apply". Enable logging, under the "Applied To" field select the target Tier-0 Gateways, and then click "Publish" to enforce the new rule. Note: A rule can also be created under Gateway Specific Rules to meet this requirement. Note: A pre-created service for ICMP mask replies does not exist by default and may need to be created.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- T0RT-3X-000066
- Vuln IDs
-
- V-251755
- Rule IDs
-
- SV-251755r856696_rule
Checks: C-55192r810147_chk
If the Tier-0 Gateway is deployed in an Active/Active HA mode, this is Not Applicable. From the NSX-T Manager web interface, go to Security >> Gateway Firewall >> Gateway Specific Rules, and choose each Tier-0 Gateway in the drop-down. Review each Tier-0 Gateway Firewalls rules to verify one exists to drop ICMP redirects. If a rule does not exist to drop ICMP redirects, this is a finding.
Fix: F-55146r810148_fix
To configure a shared rule to drop ICMP unreachable messages do the following: From the NSX-T Manager web interface, go to Security >> Gateway Firewall >> All Shared Rules. Click "Add Rule" (Add a policy first if needed), under services select "ICMP Redirect", and then click "Apply". Enable logging, under the "Applied To" field select the target Tier-0 Gateways, and then click "Publish" to enforce the new rule. Note: A rule can also be created under Gateway Specific Rules to meet this requirement.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- T0RT-3X-000067
- Vuln IDs
-
- V-251756
- Rule IDs
-
- SV-251756r856697_rule
Checks: C-55193r810150_chk
If the Tier-0 Gateway is not using BGP, this is Not Applicable. From the NSX-T Manager web interface, go to Networking >> Tier-0 Gateways. For every Tier-0 Gateway with BGP enabled, expand the Tier-0 Gateway. Expand BGP, click on the number next to BGP Neighbors, and then view the Router Filters for each neighbor. If Maximum Routes is not configured or a route filter does not exist for each BGP neighbor, this is a finding.
Fix: F-55147r810151_fix
To set maximum prefixes for BGP neighbors do the following: From the NSX-T Manager web interface, go to Networking >> Tier-0 Gateways and expand the target Tier-0 gateway. Expand BGP. Next to BGP Neighbors, click on the number present to open the dialog, and then select "Edit" on the target BGP Neighbor. Click "Router Filter", add or edit an existing router filter, enter a number for Maximum Routes, and then click "Add". Click "Apply", then click "Save" to finish the configuration.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- T0RT-3X-000084
- Vuln IDs
-
- V-251757
- Rule IDs
-
- SV-251757r810155_rule
Checks: C-55194r810153_chk
If the Tier-0 Gateway is not using iBGP, this is Not Applicable. From the NSX-T Manager web interface, go to Networking >> Tier-0 Gateways. For every Tier-0 Gateway with BGP enabled, expand the Tier-0 Gateway. Expand BGP, click on the number next to BGP Neighbors, then view the source address for each neighbor. If the Source Address is not configured as the NSX-T Tier-0 Gateway loopback address for the iBGP session, this is a finding.
Fix: F-55148r810154_fix
To configure a loopback interface do the following: From the NSX-T Manager web interface, go to Networking >> Tier-0 Gateways and expand the target Tier-0 gateway. Expand interfaces and click "Add Interface". Enter a name, select "Loopback" as the Type, enter an IP address, select an Edge Node for the interface, and then click "Save". Note: More than one loopback may need to be configured depending on the routing architecture. To set the source address for BGP neighbors do the following: From the NSX-T Manager web interface, go to Networking >> Tier-0 Gateways >> expand the target Tier-0 gateway. Expand BGP >> next to BGP Neighbors click on the number present to open the dialog >> select Edit on the target BGP Neighbor. Under Source Addresses configure the source address with the loopback address and click Save.
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- T0RT-3X-000095
- Vuln IDs
-
- V-251758
- Rule IDs
-
- SV-251758r810158_rule
Checks: C-55195r810156_chk
From the NSX-T Manager web interface, go to Networking >> Tier-0 Gateways. For every Tier-0 Gateway, expand the Tier-0 Gateway to view if BGP or OSPF is enabled. If BGP and/or OSPF is enabled and not in use, this is a finding.
Fix: F-55149r810157_fix
To disable BGP do the following: From the NSX-T Manager web interface, go to Networking >> Tier-0 Gateways and edit the target Tier-0 Gateway. Expand BGP, change from "On" to "Off", and then click "Save". To disable OSPF do the following: From the NSX-T Manager web interface, go to Networking >> Tier-0 Gateways and edit the target Tier-0 Gateway. Expand OSPF, change from "Enabled" to "Disabled", and then click "Save".
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- T0RT-3X-000096
- Vuln IDs
-
- V-251759
- Rule IDs
-
- SV-251759r810161_rule
Checks: C-55196r810159_chk
From the NSX-T Manager web interface, go to Networking >> Tier-0 Gateways. For every Tier-0 Gateway, expand the Tier-0 Gateway, then expand Multicast to view the Multicast configuration. If Multicast is enabled and not in use, this is a finding.
Fix: F-55150r810160_fix
To disable Multicast do the following: From the NSX-T Manager web interface, go to Networking >> Tier-0 Gateways and edit the target Tier-0 Gateway. Expand Multicast, change from "Enabled" to "Disabled", and then click "Save".