UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

VMware NSX Distributed Logical Router Security Technical Implementation Guide


Overview

Date Finding Count (4)
2016-06-27 CAT I (High): 0 CAT II (Med): 4 CAT III (Low): 0
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via e-mail to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC III - Administrative Sensitive)

Finding ID Severity Title
V-69135 Medium The NSX Distributed Logical Router must manage excess bandwidth to limit the effects of packet flooding types of denial of service (DoS) attacks.
V-69127 Medium The NSX Distributed Logical Router must be configured so inactive router interfaces are disabled.
V-69133 Medium The NSX Distributed Logical Router must be configured to disable non-essential capabilities.
V-69129 Medium The NSX Distributed Logical Router must enable neighbor router authentication for control plane protocols.