UCF STIG Viewer Logo

VMware NSX Distributed Logical Router Security Technical Implementation Guide


Overview

Date Finding Count (4)
2016-06-27 CAT I (High): 0 CAT II (Med): 4 CAT III (Low): 0
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via e-mail to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC III - Administrative Public)

Finding ID Severity Title
V-69135 Medium The NSX Distributed Logical Router must manage excess bandwidth to limit the effects of packet flooding types of denial of service (DoS) attacks.
V-69127 Medium The NSX Distributed Logical Router must be configured so inactive router interfaces are disabled.
V-69133 Medium The NSX Distributed Logical Router must be configured to disable non-essential capabilities.
V-69129 Medium The NSX Distributed Logical Router must enable neighbor router authentication for control plane protocols.