| V-251726 ||High ||The NSX-T Distributed Firewall must not have any unpublished firewall policies or rules. ||Unpublished firewall rules may be enabled inadvertently and cause unintended filtering or introduce unvetted/unauthorized traffic flows. |
| V-251727 ||Medium ||The NSX-T Distributed Firewall must generate traffic log entries containing information to establish the details of the event. ||Without sufficient information to analyze the event, it would be difficult to establish, correlate, and investigate the events leading up to an outage or attack.
Audit event content that must be... |
| V-251728 ||Medium ||The NSX-T Distributed Firewall must block outbound traffic containing denial-of-service (DoS) attacks to protect against the use of internal information systems to launch any DoS attacks against other networks or endpoints. ||DoS attacks can take multiple forms but have the common objective of overloading or blocking a network or host to deny or seriously degrade performance. If the network does not provide safeguards... |
| V-251731 ||Medium ||The NSX-T Distributed Firewall must employ filters that prevent or limit the effects of all types of commonly known denial-of-service (DoS) attacks, including flooding, packet sweeps, and unauthorized port scanning. ||Not configuring a key boundary security protection device, such as the firewall, against commonly known attacks is an immediate threat to the protected enclave because they are easily implemented... |
| V-251730 ||Medium ||The NSX-T Distributed Firewall must be configured to send traffic log entries to a central audit server for management and configuration of the traffic log entries. ||Without the ability to centrally manage the content captured in the traffic log entries, identification, troubleshooting, and correlation of suspicious behavior would be difficult and could lead... |
| V-251733 ||Medium ||The NSX-T Distributed Firewall must verify time-based firewall rules. ||With time windows, security administrators can restrict traffic from a source or to a destination, for a specific time period.
Time windows apply to a firewall policy section, and all the rules... |
| V-251732 ||Medium ||The NSX-T Distributed Firewall must configure SpoofGuard to block outbound IP packets that contain illegitimate packet attributes. ||SpoofGuard helps prevent a form of malicious attack called "web spoofing" or "phishing." A SpoofGuard policy blocks traffic determined to be spoofed.
SpoofGuard is a tool that is designed to... |
| V-251729 ||Low ||The NSX-T Distributed Firewall must deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception). ||To prevent malicious or accidental leakage of traffic, organizations must implement a deny-by-default security posture at the network perimeter. Such rulesets prevent many malicious exploits or... |