VMware NSX 4.x Tier-0 Gateway Router Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +16 −16
Comparison against the immediately-prior release (V1R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 16
- V-265390 High The NSX Tier-0 Gateway router must be configured to disable Protocol Independent Multicast (PIM) on all interfaces that are not required to support multicast routing.
- V-265393 High The NSX Tier-0 Gateway router must be configured to have all inactive interfaces removed.
- V-265404 Low The NSX Tier-0 Gateway router must be configured to have the Dynamic Host Configuration Protocol (DHCP) service disabled if not in use.
- V-265406 High The NSX Tier-0 Gateway router must be configured to use encryption for Open Shortest Path First (OSPF) routing protocol authentication.
- V-265428 High The NSX Tier-0 Gateway router must be configured to restrict it from accepting outbound IP packets that contain an illegitimate address in the source address field by enabling Unicast Reverse Path Forwarding (uRPF).
- V-265431 High The NSX Tier-0 Gateway router must be configured to implement message authentication for all control plane protocols.
- V-265432 Medium The NSX Tier-0 Gateway must be configured to use a unique password for each autonomous system (AS) with which it peers.
- V-265441 Medium The NSX Tier-0 Gateway router must be configured to have Internet Control Message Protocol (ICMP) unreachable notifications disabled on all external interfaces.
- V-265442 Medium The NSX Tier-0 Gateway router must be configured to have Internet Control Message Protocol (ICMP) mask replies disabled on all external interfaces.
- V-265443 Medium The NSX Tier-0 Gateway router must be configured to have Internet Control Message Protocol (ICMP) redirects disabled on all external interfaces.
- V-265444 Medium The NSX Tier-0 Gateway router must be configured to use the Border Gateway Protocol (BGP) maximum prefixes feature to protect against route table flooding and prefix de-aggregation attacks.
- V-265468 Low The NSX Tier-0 Gateway router must be configured to use its loopback address as the source address for Internal Border Gateway Protocol (IBGP) peering sessions.
- V-265479 Low The NSX Tier-0 Gateway router must be configured to advertise a hop limit of at least 32 in Router Advertisement messages for IPv6 stateless auto-configuration deployments.
- V-265483 Low The NSX Tier-0 Gateway router must be configured to have routing protocols disabled if not in use.
- V-265484 Low The NSX Tier-0 Gateway router must be configured to have multicast disabled if not in use.
- V-265485 High The NSX Tier-0 Gateway router must be configured to use encryption for border gateway protocol (BGP) routing protocol authentication.
Removed rules 16
- V-263298 High The NSX Tier-0 Gateway router must be configured to disable Protocol Independent Multicast (PIM) on all interfaces that are not required to support multicast routing.
- V-263299 High The NSX Tier-0 Gateway router must be configured to have all inactive interfaces removed.
- V-263300 Info The NSX Tier-0 Gateway router must be configured to have the Dynamic Host Configuration Protocol (DHCP) service disabled if not in use.
- V-263301 High The NSX Tier-0 Gateway router must be configured to use encryption for Open Shortest Path First (OSPF) routing protocol authentication.
- V-263302 High The NSX Tier-0 Gateway router must be configured to restrict it from accepting outbound IP packets that contain an illegitimate address in the source address field by enabling Unicast Reverse Path Forwarding (uRPF).
- V-263303 High The NSX Tier-0 Gateway router must be configured to implement message authentication for all control plane protocols.
- V-263304 Medium The NSX Tier-0 Gateway must be configured to use a unique password for each autonomous system (AS) with which it peers.
- V-263305 Medium The NSX Tier-0 Gateway router must be configured to have Internet Control Message Protocol (ICMP) unreachable notifications disabled on all external interfaces.
- V-263306 Medium The NSX Tier-0 Gateway router must be configured to have Internet Control Message Protocol (ICMP) mask replies disabled on all external interfaces.
- V-263307 Medium The NSX Tier-0 Gateway router must be configured to have Internet Control Message Protocol (ICMP) redirects disabled on all external interfaces.
- V-263308 Medium The NSX Tier-0 Gateway router must be configured to use the Border Gateway Protocol (BGP) maximum prefixes feature to protect against route table flooding and prefix de-aggregation attacks.
- V-263309 Info The NSX Tier-0 Gateway router must be configured to use its loopback address as the source address for Internal Border Gateway Protocol (IBGP) peering sessions.
- V-263310 Info The NSX Tier-0 Gateway router must be configured to advertise a hop limit of at least 32 in Router Advertisement messages for IPv6 stateless auto-configuration deployments.
- V-263311 Info The NSX Tier-0 Gateway router must be configured to have routing protocols disabled if not in use.
- V-263312 Info The NSX Tier-0 Gateway router must be configured to have multicast disabled if not in use.
- V-263313 High The NSX Tier-0 Gateway router must be configured to use encryption for border gateway protocol (BGP) routing protocol authentication.
- RMF Control
- AC-4
- Severity
- H
- CCI
- CCI-001414
- Version
- NT0R-4X-000013
- Vuln IDs
-
- V-265390
- Rule IDs
-
- SV-265390r994520_rule
Checks: C-69307r994518_chk
From the NSX Manager web interface, go to Networking >> Connectivity >> Tier-0 Gateways. For every Tier-0 Gateway, expand the Tier-0 Gateway >> Interfaces and GRE Tunnels, and click on the number of interfaces present to open the interfaces dialog. Expand each interface that is not required to support multicast routing, then expand "Multicast" and verify PIM is disabled. If PIM is enabled on any interfaces that are not supporting multicast routing, this is a finding.
Fix: F-69215r994519_fix
Disable multicast PIM routing on interfaces that are not required to support multicast by doing the following: From the NSX Manager web interface, go to Networking >> Connectivity >> Tier-0 Gateways and expand the target Tier-0 gateway. Expand "Interfaces and GRE Tunnels", click on the number of interfaces present to open the interfaces dialog, and then select "Edit" on the target interface. Expand "Multicast", change PIM to "disabled", and then click "Save".
- RMF Control
- AC-4
- Severity
- H
- CCI
- CCI-001414
- Version
- NT0R-4X-000016
- Vuln IDs
-
- V-265393
- Rule IDs
-
- SV-265393r994529_rule
Checks: C-69310r994527_chk
From the NSX Manager web interface, go to Networking >> Connectivity >> Tier-0 Gateways. For every Tier-0 Gateway, expand the Tier-0 Gateway >> Interfaces and GRE Tunnels, and click on the number of interfaces present to open the interfaces dialog. Review each interface present to determine if they are not in use or inactive. If there are any interfaces present on a Tier-0 Gateway that are not in use or inactive, this is a finding.
Fix: F-69218r994528_fix
Remove unused interfaces by doing the following: From the NSX Manager web interface, go to Networking >> Connectivity >> Tier-0 Gateways and expand the target Tier-0 gateway. Expand "Interfaces and GRE Tunnels", then click on the number of interfaces present to open the interfaces dialog. Select "Delete" on the unneeded interface, and then click "Delete" again to confirm.
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- NT0R-4X-000027
- Vuln IDs
-
- V-265404
- Rule IDs
-
- SV-265404r999914_rule
Checks: C-69321r994560_chk
From the NSX Manager web interface, go to Networking >> Connectivity >> Tier-0 Gateways. For every Tier-0 Gateway, expand the Tier-0 Gateway to view the DHCP configuration. If a DHCP profile is configured and not in use, this is a finding.
Fix: F-69229r999914_fix
From the NSX Manager web interface, go to Networking >> Connectivity >> Tier-0 Gateways and edit the target Tier-0 gateway. Click "Set DHCP Configuration", select "No Dynamic IP Address Allocation", and then click "Save". Close "Editing".
- RMF Control
- IA-7
- Severity
- H
- CCI
- CCI-000803
- Version
- NT0R-4X-000029
- Vuln IDs
-
- V-265406
- Rule IDs
-
- SV-265406r994568_rule
Checks: C-69323r994566_chk
If the Tier-0 Gateway is not using OSPF, this is Not Applicable. To verify OSPF areas are using authentication with encryption, do the following: From the NSX Manager web interface, go to Networking >> Connectivity >> Tier-0 Gateways. For every Tier-0 Gateway, expand the "Tier-0 Gateway". Expand "OSPF", click the number next to "Area Definition", and view the "Authentication" field for each area. If OSPF area definitions do not have the "Authentication" field set to "MD5" and a "Key ID" and "Password" configured, this is a finding.
Fix: F-69231r994567_fix
To set authentication for OSPF area definitions, do the following: From the NSX Manager web interface, go to Networking >> Connectivity >> Tier-0 Gateways, and expand the target Tier-0 gateway. Expand "OSPF", click the number next to "Area Definition". Select "Edit" on the target OSPF Area Definition. Change the Authentication drop-down to MD5, enter a Key ID and Password, and then click "Save". Note: The MD5 password can have a maximum of 16 characters.
- RMF Control
- SC-5
- Severity
- H
- CCI
- CCI-001094
- Version
- NT0R-4X-000051
- Vuln IDs
-
- V-265428
- Rule IDs
-
- SV-265428r994634_rule
Checks: C-69345r994632_chk
From the NSX Manager web interface, go to Networking >> Connectivity >> Tier-0 Gateways. For every Tier-0 Gateway, expand Tier-0 Gateway >> Interfaces and GRE Tunnels, and then click on the number of interfaces present to open the interfaces dialog. Expand each interface to view the URPF Mode configuration. If URPF Mode is not set to "Strict" on any interface, this is a finding.
Fix: F-69253r994633_fix
Enable strict URPF mode on interfaces by doing the following: From the NSX Manager web interface, go to Networking >> Connectivity >> Tier-0 Gateways and expand the target Tier-0 gateway. Expand "Interfaces and GRE Tunnels", click on the number of interfaces present to open the interfaces dialog, and then select "Edit" on the target interface. From the drop-down, set the URPF mode to "Strict" and then click "Save".
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- NT0R-4X-000054
- Vuln IDs
-
- V-265431
- Rule IDs
-
- SV-265431r994643_rule
Checks: C-69348r994641_chk
If the Tier-0 Gateway is not using BGP or OSPF, this is Not Applicable. Since the router does not reveal if a BGP password is configured, interview the router administrator to determine if a password is configured on BGP neighbors. If BGP neighbors do not have a password configured, this is a finding. To verify OSPF areas are using authentication, do the following: From the NSX Manager web interface, go to Networking >> Connectivity >> Tier-0 Gateways. For every Tier-0 Gateway expand the "Tier-0 Gateway". Expand "OSPF", click the number next to "Area Definition", and view the "Authentication" field for each area. If OSPF area definitions do not have Password or MD5 set for authentication, this is a finding.
Fix: F-69256r994642_fix
To set authentication for BGP neighbors, do the following: From the NSX Manager web interface, go to Networking >> Connectivity >> Tier-0 Gateways, and expand the target Tier-0 gateway. Expand BGP. Next to BGP Neighbors, click on the number present to open the dialog, then select "Edit" on the target BGP Neighbor. Under Timers & Password, enter a password up to 20 characters, and then click "Save". To set authentication for OSPF Area definitions, do the following: From the NSX Manager web interface, go to Networking >> Connectivity >> Tier-0 Gateways, and expand the target Tier-0 gateway. Expand OSPF. Next to "Area Definition", click on the number present to open the dialog, and then select "Edit" on the target OSPF Area. Change the Authentication drop-down to Password or MD5, enter a Key ID and/or Password, and then click "Save".
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-002205
- Version
- NT0R-4X-000055
- Vuln IDs
-
- V-265432
- Rule IDs
-
- SV-265432r994646_rule
Checks: C-69349r994644_chk
If the Tier-0 Gateway is not using BGP, this is Not Applicable. Since the NSX Tier-0 Gateway does not reveal the current password, interview the router administrator to determine if unique passwords are being used. If unique passwords are not being used for each AS, this is a finding.
Fix: F-69257r994645_fix
To set authentication for BGP neighbors, do the following: From the NSX Manager web interface, go to Networking >> Connectivity >> Tier-0 Gateways, and expand the target Tier-0 gateway. Expand BGP. Next to "BGP Neighbors", click on the number present to open the dialog, then select "Edit" on the target BGP Neighbor. Expand "BGP", click the number next to "BGP Neighbors". Select "Edit" on the target BGP neighbor. Under Timers & Password, enter a password up to 20 characters that is different from other autonomous systems, and then click "Save".
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- NT0R-4X-000064
- Vuln IDs
-
- V-265441
- Rule IDs
-
- SV-265441r999915_rule
Checks: C-69358r994671_chk
If the Tier-0 Gateway is deployed in an Active/Active HA mode, this is Not Applicable. From the NSX Manager web interface, go to Security >> Policy Management >> Gateway Firewall >> Gateway Specific Rules, and choose each Tier-0 Gateway in the drop-down. Review each Tier-0 Gateway Firewall rule to verify one exists to drop ICMP unreachable messages. If a rule does not exist to drop ICMP unreachable messages, this is a finding.
Fix: F-69266r999915_fix
To configure a shared rule to drop ICMP unreachable messages, do the following: From the NSX Manager web interface, go to Security >> Policy Management >> Gateway Firewall >> All Shared Rules. Click "Add Rule" (add a policy first, if needed) and under "Services", select "ICMP Destination Unreachable" and "Apply". Enable logging and under the "Applied To" field select the target Tier-0 gateways and click "Publish" to enforce the new rule. Note: A rule can also be created under Gateway Specific Rules to meet this requirement.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- NT0R-4X-000065
- Vuln IDs
-
- V-265442
- Rule IDs
-
- SV-265442r999916_rule
Checks: C-69359r994674_chk
If the Tier-0 Gateway is deployed in an Active/Active HA mode, this is Not Applicable. From the NSX Manager web interface, go to Security >> Policy Management >> Gateway Firewall >> Gateway Specific Rules, and choose each Tier-0 Gateway in the drop-down menu. Review each Tier-0 Gateway Firewall rule to verify one exists to drop ICMP mask replies. If a rule does not exist to drop ICMP mask replies, this is a finding.
Fix: F-69267r999916_fix
To configure a shared rule to drop ICMP unreachable messages, do the following: From the NSX Manager web interface, go to Security >> Policy Management >> Gateway Firewall >> All Shared Rules. Click "Add Rule" (add a policy first if needed). Under "Services", select the custom service that identifies ICMP mask replies, and then click "Apply". Enable logging, under the "Applied To" field select the target Tier-0 gateways' external interfaces, and then select "Publish" to enforce the new rule. Note: A rule can also be created under Gateway Specific Rules to meet this requirement. Note: A pre-created service for ICMP mask replies does not exist by default and may need created.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- NT0R-4X-000066
- Vuln IDs
-
- V-265443
- Rule IDs
-
- SV-265443r999917_rule
Checks: C-69360r994677_chk
If the Tier-0 Gateway is deployed in an Active/Active HA mode, this is Not Applicable. From the NSX Manager web interface, go to Security >> Policy Management >> Gateway Firewall >> Gateway Specific Rules, and choose each Tier-0 Gateway in the drop-down menu. Review each Tier-0 Gateway Firewalls rules to verify one exists to drop ICMP redirects. If a rule does not exist to drop ICMP redirects, this is a finding.
Fix: F-69268r999917_fix
To configure a shared rule to drop ICMP unreachable messages, do the following: From the NSX Manager web interface, go to Security >> Policy Management >> Gateway Firewall >> All Shared Rules. Click "Add Rule" (add a policy first if needed). Under "Services", select "ICMP Redirect", and then click "Apply". To enable logging, under the "Applied To" field, select the target Tier-0 gateways' external interfaces, and then click "Publish" to enforce the new rule. Note: A rule can also be created under Gateway Specific Rules to meet this requirement.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- NT0R-4X-000067
- Vuln IDs
-
- V-265444
- Rule IDs
-
- SV-265444r994682_rule
Checks: C-69361r994680_chk
If the Tier-0 Gateway is not using BGP, this is Not Applicable. From the NSX Manager web interface, go to Networking >> Connectivity >> Tier-0 Gateways. For every Tier-0 Gateway with BGP enabled, expand the Tier-0 Gateway. Expand BGP, click on the number next to "BGP Neighbors", and then view the router filters for each neighbor. If "Maximum Routes" is not configured, or a route filter does not exist for each BGP neighbor, this is a finding.
Fix: F-69269r994681_fix
To set maximum prefixes for BGP neighbors, do the following: From the NSX Manager web interface, go to Networking >> Connectivity >> Tier-0 Gateways and expand the target Tier-0 gateway. Expand BGP. Next to "BGP Neighbors", click on the number present to open the dialog, and then select "Edit" on the target BGP Neighbor. Click "Router Filter", add or edit an existing router filter, enter a number for "Maximum Routes", and then click "Add". Click "Apply", then click "Save" to finish the configuration.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- NT0R-4X-000091
- Vuln IDs
-
- V-265468
- Rule IDs
-
- SV-265468r994754_rule
Checks: C-69385r994752_chk
If the Tier-0 Gateway is not using iBGP, this is Not Applicable. From the NSX Manager web interface, go to Networking >> Connectivity >> Tier-0 Gateways. For every Tier-0 Gateway with BGP enabled, expand the Tier-0 Gateway. Expand BGP, click on the number next to BGP Neighbors, then view the source address for each neighbor. If the Source Address is not configured as the Tier-0 Gateway loopback address for the iBGP session, this is a finding.
Fix: F-69293r994753_fix
To configure a loopback interface, do the following: From the NSX Manager web interface, go to Networking >> Connectivity >> Tier-0 Gateways and expand the target Tier-0 gateway. Expand interfaces and click "Add Interface". Enter a name, select "Loopback" as the Type, enter an IP address, select an Edge Node for the interface, then click "Save". Note: More than one loopback may need to be configured depending on the routing architecture. To set the source address for BGP neighbors, do the following: From the NSX Manager web interface, go to Networking >> Connectivity >> Tier-0 Gateways >> expand the target Tier-0 gateway. Expand BGP >> next to BGP Neighbors, click on the number present to open the dialog >> select "Edit" on the target BGP Neighbor. Under Source Addresses, configure the source address with the loopback address and click "Save".
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- NT0R-4X-000102
- Vuln IDs
-
- V-265479
- Rule IDs
-
- SV-265479r994787_rule
Checks: C-69396r994785_chk
If IPv6 forwarding is not enabled, this is Not Applicable. From the NSX Manager web interface, go to Networking >> Connectivity >> Tier-0 Gateways. For every Tier-0 Gateway, expand Tier-0 Gateway >>Additional Settings. Click on the ND profile name to view the hop limit. If the hop limit is not configured to at least 32, this is a finding.
Fix: F-69304r994786_fix
To configure the Neighbor Discovery hop limit, do the following: From the NSX Manager web interface, go to Networking >> Connectivity >> Tier-0 Gateways >> edit the target Tier-0 gateway. Expand Additional Settings and select an "ND Profile" from the drop down with a hop limit of 32 or more, then click "Close Editing". Note: The default ND profile has a hop limit of 64 and cannot be edited. If required, create a new or edit another existing ND profile to use.
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- NT0R-4X-000106
- Vuln IDs
-
- V-265483
- Rule IDs
-
- SV-265483r999918_rule
Checks: C-69400r994797_chk
From the NSX Manager web interface, go to Networking >> Connectivity >> Tier-0 Gateways. For every Tier-0 Gateway, expand the Tier-0 Gateway to view if border gateway protocol (BGP) or Open Shortest Path First (OSPF) is enabled. If BGP and/or OSPF is enabled and not in use, this is a finding.
Fix: F-69308r999918_fix
If not used in the implementation, then disable BGP, do the following: From the NSX Manager web interface, go to Networking >> Connectivity >> Tier-0 Gateways and edit the target Tier-0 gateway. Expand BGP, change from "On" to "Off", and then click "Save". If not used in the implementation, then disable OSPF, do the following: From the NSX Manager web interface, go to Networking >> Connectivity >> Tier-0 Gateways and edit the target Tier-0 gateway. Expand OSPF, change from "Enabled" to "Disabled", and then click "Save".
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- NT0R-4X-000107
- Vuln IDs
-
- V-265484
- Rule IDs
-
- SV-265484r999919_rule
Checks: C-69401r994800_chk
From the NSX Manager web interface, go to Networking >> Connectivity >> Tier-0 Gateways. For every Tier-0 Gateway, expand the Tier-0 Gateway, then expand "Multicast" to view the multicast configuration. If multicast is enabled and not in use, this is a finding.
Fix: F-69309r999919_fix
If not used, disable Multicast by doing the following: From the NSX Manager web interface, go to Networking >> Connectivity >> Tier-0 Gateways and edit the target Tier-0 gateway. Expand Multicast, change from "Enabled" to "Disabled", and then click "Save".
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- NT0R-4X-000108
- Vuln IDs
-
- V-265485
- Rule IDs
-
- SV-265485r994805_rule
Checks: C-69402r994803_chk
If the Tier-0 Gateway is not using BGP, this is Not Applicable. To verify BGP neighbors are using authentication with encryption, do the following: From the NSX Manager web interface, go to Networking >> Connectivity >> Tier-0 Gateways. For every Tier-0 Gateway, expand the "Tier-0 Gateway". Expand "BGP", click the number next to "BGP Neighbors" and expand each BGP neighbor. Expand the "Timers and Password" section and review the Password field. If any BGP neighbors do not have a password configured, this is a finding.
Fix: F-69310r994804_fix
To set authentication for BGP neighbors, do the following: From the NSX Manager web interface, go to Networking >> Connectivity >> Tier-0 Gateways, and expand the target Tier-0 gateway. Expand BGP. Next to "BGP Neighbors", click on the number present to open the dialog, then select "Edit" on the target BGP Neighbor. Expand "BGP", click the number next to "BGP Neighbors". Select "Edit" on the target BGP neighbor. Under Timers & Password, enter a password up to 20 characters, and then click "Save".