The NSX-T Manager must disable SNMP v2.
Overview
Finding ID
Version
Rule ID
IA Controls
Severity
V-251799
TNDM-3X-000102
SV-251799r879588_rule
Medium
Description
SNMPv3 supports commercial-grade security, including authentication, authorization, access control, and privacy. Previous versions of the protocol contained well-known security weaknesses that were easily exploited. As such, SNMPv1/2 receivers must be disabled.
Details
Check Text (C-55259r810398_chk)
From the NSX-T Manager web interface, go to the System >> Fabric >> Profiles >> Node Profiles.
Click "All NSX Nodes" and view the SNMP Polling and Traps configuration.
If SNMP v2c Polling or Traps are configured, this is a finding.
Fix Text (F-55213r810399_fix)
From the NSX-T Manager web interface, go to the System >> Fabric >> Profiles >> Node Profiles.
Click on "All NSX Nodes" and delete and v2c Polling or Trap configurations.
A comprehensive tool for accessing, analyzing, and implementing
Defense Information Systems Agency (DISA) Security Technical
Implementation Guides (STIGs).
Featured Partners
Web page built by Cyber Protection Services. To learn more about our services, click here .
© 2025 DISA STIGS Viewer. All rights reserved.