Select any two versions of this STIG to compare the individual requirements
Select any old version/release of this STIG to view the previous requirements
Verify there are no inactive router interfaces enabled. Log onto vSphere Web Client with credentials authorized for administration. Navigate and select Networking and Security >> "NSX Edges" tab on the left-side menu. Double-click the EdgeID. Click on the "Manage" tab on the top of the new screen, then Settings on the far left >> Interfaces >> Check the "Status" column for the associated interface. If any inactive router interfaces are not disabled, this is a finding.
Log onto vSphere Web Client with credentials authorized for administration. Navigate and select Networking and Security >> select the "NSX Edges" tab on the left-side menu. Double-click the EdgeID. Click on the "Manage" tab on the top of the new screen then Settings on the far left >> Interfaces. For interfaces that are not in use, highlight the interface and click the pencil icon. Move the radio button next to "Connectivity Status" to "Disconnected".
Verify for OSPF that Authentication is not set to "None" and for BGP password has been configured. Log onto vSphere Web Client with credentials authorized for administration. Navigate and select Networking and Security >> select the "NSX Edges" tab on the left-side menu. Double-click the edgeID in question, as denoted by the "Logical Router" type. Select the "Manage" tab on the top of the new screen >> Routing. If OSPF is configured, select OSPF >> Area Definitions. Select the configured areas. Click the "pencil" icon. Verify "authentication" is set to something other than "none". If Authentication is set to "None", this is a finding. If BGP is configured, select BGP >> Neighbors >> select the configured neighbor >> Click the "pencil" icon >> verify "password" is configured. If a password has not been configured for BGP, this is a finding.
Log onto vSphere Web Client with credentials authorized for administration. Navigate and select Networking and Security >> select the "NSX Edges" tab on the left-side menu. Double-click the edgeID in question, as denoted by the "Logical Router" type. Select the "Manage" tab on the top of the new screen. >> Routing. If OSPF is configured, select the "OSPF" option on the left >> select Area Definitions >> select the configured areas. Click the "pencil" icon. Select an "authentication" method and configure a value. If BGP is configured select the "BGP" option on the left. Select Neighbors >> select the configured neighbor. Click the "pencil" icon. Add a password in the "password" section.
Verify only necessary services are enabled. Log onto vSphere Web Client with credentials authorized for administration. Navigate and select Networking and Security >> select the "NSX Edges" tab on the left-side menu. Double-click the Edge ID. Navigate to Manage >> Verify the configurations under "Settings, Firewall, Routing, Bridging, and DHCP Relay" are enabled only as necessary to the deployment. If unnecessary services are enabled, this is a finding.
Log onto vSphere Web Client with credentials authorized for administration. Navigate and select Networking and Security >> select the "NSX Edges" tab on the left-side menu. Double-click the Edge ID. Navigate to Manage >> Verify the configurations under "Settings, Firewall, Routing, Bridging, and DHCP Relay" are enabled only as necessary to the deployment. If any non-essential services are enabled, select the "disable" option, or remove the configurations under the respective sections.
Verify the traffic shaping policies are properly configured to manage excess bandwidth. Log into vSphere Web Client with credentials authorized for administration navigate and select Networking >> select the respective VDS under the appropriate datacenter >> Click the dropdown to expand the list of portgroups >> select the appropriate portgroup for your network. Navigate to >> Manage >> Settings >> Properties >> Edit >> Traffic Shaping Verify the necessary values are configured to reserve bandwidth for applications in the event of bandwidth congestion. Navigate to >> Manage >> Settings >> Properties >> Edit >> Traffic filtering and marking >> Verify the necessary values for DSCP are configured to mark bandwidth for applications in the event of a DoS attack. Select checkbox for "DSCP value: Update DSCP tag" >> enter in a number between 0 and 63. Select "+" symbol under Traffic qualifiers with "New System Traffic Qualifier" and select System traffic type >> "OK". Select "OK" to accept new Network Traffic Rule. If the traffic shaping and QoS policies are not properly configured to manage excess bandwidth and to reserve bandwidth for critical applications in the event of bandwidth congestion, this is a finding.
Log into vSphere Web Client with credentials authorized for administration, navigate and select Networking >> select the respective VDS under the appropriate datacenter >> Click the dropdown to expand the list of portgroups >> select the appropriate portgroup for your network. Navigate to >> Manage >> Settings >> Properties >> Edit >> Traffic Shaping Enable traffic shaping for the portgroup. Configure average bandwidth, peak bandwidth, and burst size levels as appropriate to provide allocations sufficient to limit the effect of DoS attacks. Navigate to >> Manage >> Settings >> Properties >> Edit >> Traffic filtering and marking Verify the necessary values for DSCP are configured to provide QoS markings to preserve bandwidth for critical applications during periods of congestion. Select checkbox for "DSCP value: Update DSCP tag" >> enter in a number between 0 and 63. Select "+" symbol under Traffic qualifiers with "New System Traffic Qualifier" Select System traffic type >> "OK". Select "OK" to accept new Network Traffic Rule.