VMware NSX-T Tier 1 Gateway Firewall Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Supporting documents 5 PDFs
Bundled by DISA alongside this STIG release: overview, revision history, and readme files. Download the full archive or open an individual PDF.
Digest of Updates −1 ✎ 3
Comparison against the immediately-prior release (V1R2). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Removed rules 1
- V-251760 High The NSX-T Tier-1 Gateway Firewall must not have any unpublished firewall policies or rules.
Content changes 3
- V-251762 Low descriptioncheckfix The NSX-T Tier-1 Gateway Firewall must generate traffic log entries containing information to establish the details of the event.
- V-251763 Medium descriptioncheck Each NSX-T Edge Node configured to host a Tier-1 Gateway Firewall must be configured to use the TLS or LI-TLS protocols to configure and secure traffic log records.
- V-251764 Medium checkfix The NSX-T Tier-1 Gateway Firewall must block outbound traffic containing denial-of-service (DoS) attacks to protect against the use of internal information systems to launch any DoS attacks against other networks or endpoints.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- T1FW-3X-000005
- Vuln IDs
-
- V-251761
- Rule IDs
-
- SV-251761r810178_rule
Checks: C-55198r810176_chk
From the NSX-T Manager web interface, go to Security >> Gateway Firewall >> Gateway Specific Rules. For each Tier-1 Gateway and for each rule, click the gear icon and verify the Logging setting. If Logging is not "Enabled", this is a finding.
Fix: F-55152r810177_fix
From the NSX-T Manager web interface, go to Security >> Gateway Firewall >> Gateway Specific Rules. For each Tier-1 Gateway and for each rule with logging disabled, click the gear icon and enable Logging, then click "Apply". After all changes are made, click "Publish".
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000131
- Version
- T1FW-3X-000006
- Vuln IDs
-
- V-251762
- Rule IDs
-
- SV-251762r919235_rule
Checks: C-55199r919233_chk
From the NSX-T Manager web interface, go to Security >> Gateway Firewall >> Gateway Specific Rules. For each Tier-1 Gateway and for each rule, click the gear icon and verify the Logging setting. If Logging is not "Enabled", this is a finding.
Fix: F-55153r919234_fix
From the NSX-T Manager web interface, go to Security >> Gateway Firewall >> Gateway Specific Rules. For each Tier-1 Gateway and for each rule with logging disabled, click the gear icon and enable Logging and then click "Apply". After all changes are made, click "Publish".
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000140
- Version
- T1FW-3X-000011
- Vuln IDs
-
- V-251763
- Rule IDs
-
- SV-251763r919237_rule
Checks: C-55200r919236_chk
From an NSX-T Edge Node shell hosting the Tier-1 Gateway, run the following command(s): > get logging-servers If any configured logging-servers are not configured with protocol of "li-tls" or "tls" and level of "info", this is a finding. If no logging-servers are configured, this is a finding. Note: This check must be run from each NSX-T Edge Node hosting the Tier-1 Gateway, as they are configured individually.
Fix: F-55154r810183_fix
(Optional) From an NSX-T Edge Gateway shell, run the following command(s) to clear any existing incorrect logging-servers: > clear logging-servers From an NSX-T Edge Node shell, run the following command(s) to configure a tls syslog server: > set logging-server <server-ip or server-name> proto tls level info serverca ca.pem clientca ca.pem certificate cert.pem key key.pem From an NSX-T Edge Node shell, run the following command(s) to configure a li-tls syslog server: > set logging-server <server-ip or server-name> proto li-tls level info serverca root-ca.crt Note: If using the protocols TLS or LI-TLS to configure a secure connection to a log server, the server and client certificates must be stored in /var/vmware/nsx/file-store/ on each NSX-T Edge Gateway appliance.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001094
- Version
- T1FW-3X-000019
- Vuln IDs
-
- V-251764
- Rule IDs
-
- SV-251764r919240_rule
Checks: C-55201r919238_chk
From the NSX-T Manager web interface, go to Security >> General Settings >> Firewall >> Flood Protection to view Flood Protection profiles. If there are no Flood Protection profiles of type "Gateway", this is a finding. For each gateway flood protection profile, verify the TCP Half Open Connection limit, UDP Active Flow Limit, ICMP Active Flow Limit, and Other Active Connection Limit are set to "None". If they are not, this is a finding. For each gateway flood protection profile, examine the "Applied To" field to view the Tier-1 Gateways to which it is applied. If a gateway flood protection profile is not applied to all Tier-1 Gateways through one or more policies, this is a finding.
Fix: F-55155r919239_fix
To create a new Flood Protection profile, do the following: From the NSX-T Manager web interface, go to Security >> General Settings >> Firewall >> Flood Protection >> Add Profile >> Add Firewall Profile. Enter a name and specify appropriate values for the following: TCP Half Open Connection limit, UDP Active Flow Limit, ICMP Active Flow Limit, and Other Active Connection Limit. Configure the "Applied To" field to contain Tier-1 Gateways and then click "Save".
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001109
- Version
- T1FW-3X-000021
- Vuln IDs
-
- V-251765
- Rule IDs
-
- SV-251765r810190_rule
Checks: C-55202r810188_chk
From the NSX-T Manager web interface, go to Security >> Gateway Firewall >> Gateway Specific Rules >> Choose each Tier-1 Gateway in drop-down >> Policy_Default_Infra Section >> Action. If the default_rule is set to Allow, this is a finding.
Fix: F-55156r810189_fix
From the NSX-T Manager web interface, go to Security >> Gateway Firewall >> Gateway Specific Rules >> Choose each Tier-1 Gateway in drop-down >> Policy_Default_Infra Section >> Action >> change the Action to Drop or Reject and click Publish.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001844
- Version
- T1FW-3X-000026
- Vuln IDs
-
- V-251766
- Rule IDs
-
- SV-251766r863248_rule
Checks: C-55203r810191_chk
Note: This check must be run from each NSX-T Edge Node hosting the Tier-1 Gateway, as they are configured individually. From an NSX-T Edge Node shell hosting the Tier-1 Gateway, run the following command(s): > get logging-servers If any configured logging-servers are not configured with protocol of "li-tls" or "tls" and level of "info", this is a finding. If no logging-servers are configured, this is a finding.
Fix: F-55157r810192_fix
(Optional) From an NSX-T Edge Gateway shell, run the following command(s) to clear any existing incorrect logging-servers: > clear logging-servers From an NSX-T Edge Node shell, run the following command(s) to configure a tls syslog server: > set logging-server <server-ip or server-name> proto tls level info serverca ca.pem clientca ca.pem certificate cert.pem key key.pem From an NSX-T Edge Node shell, run the following command(s) to configure a li-tls syslog server: > set logging-server <server-ip or server-name> proto li-tls level info serverca root-ca.crt Note: Configure the syslog or SNMP server to send an alert if the events server is unable to receive events from the NSX-T and also if DoS incidents are detected. This is true if the events server is STIG compliant. Note: If using the protocols TLS or LI-TLS to configure a secure connection to a log server, the server and client certificates must be stored in /var/vmware/nsx/file-store/ on each NSX-T Edge Gateway appliance.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- T1FW-3X-000028
- Vuln IDs
-
- V-251767
- Rule IDs
-
- SV-251767r856686_rule
Checks: C-55204r810194_chk
From the NSX-T Manager web interface, go to Security >> Security Profiles >> Flood Protection to view Flood Protection profiles. If there are no Flood Protection profiles of type "Gateway", this is a finding. For each gateway flood protection profile, verify the TCP Half Open Connection limit, UDP Active Flow Limit, ICMP Active Flow Limit, and Other Active Connection Limit are set to "not set" or SYN Cache and RST Spoofing is not Enabled on a profile, this is a finding. For each gateway flood protection profile, examine the Applied To field to view the Tier-1 Gateways to which it is applied. If a gateway flood protection profile is not applied to all Tier-1 Gateways through one or more policies, this is a finding.
Fix: F-55158r810195_fix
To create a new Flood Protection profile do the following: From the NSX-T Manager web interface, go to Security >> Security Profiles >> Flood Protection >> Add Profile >> Add Firewall Profile. Enter a name and specify appropriate values for the following: TCP Half Open Connection limit, UDP Active Flow Limit, ICMP Active Flow Limit, and Other Active Connection Limit. Enable SYN Cache and RST Spoofing, configure the Applied To field that contains Tier-1 Gateways, and then click "Save".
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- T1FW-3X-000030
- Vuln IDs
-
- V-251768
- Rule IDs
-
- SV-251768r856687_rule
Checks: C-55205r810197_chk
From the NSX-T Manager web interface, go to Security >> Gateway Firewall >> Gateway Specific Rules. Choose each Tier-1 Gateway in the drop-down and review the firewall rules "Applied To" field to verify no rules are selectively applied to interfaces instead of the Gateway Firewall entity. If any Gateway Firewall rules are applied to individual interfaces, this is a finding.
Fix: F-55159r810198_fix
From the NSX-T Manager web interface, go to Security >> Gateway Firewall >> Gateway Specific Rules and choose the target Tier-1 Gateway from the drop-down. For any rules that have individual interfaces specified in the "Applied To" field, click "Edit" on the "Applied To" column and remove the interfaces selected, leaving only the Tier-1 Gateway object type checked. Click "Publish" to save any rule changes.
- RMF Control
- SI-4
- Severity
- M
- CCI
- CCI-002664
- Version
- T1FW-3X-000036
- Vuln IDs
-
- V-251769
- Rule IDs
-
- SV-251769r856688_rule
Checks: C-55206r810200_chk
From the NSX-T Manager web interface, go to Networking >> Segments, and for each Segment, view Segment Profiles >> SpoofGuard. If a Segment is not configured with a SpoofGuard profile that has Port Binding enabled, this is a finding.
Fix: F-55160r810201_fix
To create a segment profile with SpoofGuard enabled do the following: From the NSX-T Manager web interface, go to Networking >> Segments >> Segment Profiles >> Add Segment Profile >> SpoofGuard. Enter a profile name and enable port bindings, then click "Save". To update a Segment's SpoofGuard profile, do the following: From the NSX-T Manager web interface, go to the Networking >> Segments, then click "Edit" from the drop-down menu next to the target Segment. Expand Segment Profiles, choose the new SpoofGuard profile from the drop-down list, and then click "Save".