Finding ID |
Severity |
Title |
Description |
V-265633
|
High |
The NSX Distributed Firewall must configure an IP Discovery profile to disable trust on every use method. |
|
V-265630
|
Medium |
The NSX Distributed Firewall must configure SpoofGuard to restrict it from accepting outbound packets that contain an illegitimate address in the source address. |
A compromised host in an enclave can be used by a malicious platform to launch cyberattacks on third parties. This is a common practice in "botnets", which are a collection of compromised computers using malware to attack other computers or networks. Distributed denial-of-service (DDoS) attacks frequently leverage IP source address... |
V-265628
|
Medium |
The NSX Distributed Firewall must be configured to inspect traffic at the application layer. |
Application inspection enables the firewall to control traffic based on different parameters that exist within the packets such as enforcing application-specific message and field length. Inspection provides improved protection against application-based attacks by restricting the types of commands allowed for the applications. Application inspection all enforces conformance against published RFCs.... |
V-265619
|
Medium |
The NSX Distributed Firewall must deny network communications traffic by default and allow network communications traffic by exception. |
To prevent malicious or accidental leakage of traffic, organizations must implement a deny-by-default security posture at the network perimeter. Such rulesets prevent many malicious exploits or accidental leakage by restricting the traffic to only known sources and only those ports, protocols, or services that are permitted and operationally necessary.
As... |
V-265618
|
Medium |
The NSX Distributed Firewall must limit the effects of packet flooding types of denial-of-service (DoS) attacks. |
A firewall experiencing a DoS attack will not be able to handle production traffic load. The high utilization and CPU caused by a DoS attack will also have an effect on control keep-alives and timers used for neighbor peering resulting in route flapping and will eventually black hole production traffic.... |
V-265612
|
Low |
The NSX Distributed Firewall must generate traffic log entries that can be sent by the ESXi hosts to the central syslog. |
Without establishing what type of event occurred, it would be difficult to establish, correlate, and investigate the events leading up to an outage or attack.
Audit event content that may be necessary to satisfy this requirement includes, for example, time stamps, source and destination addresses, user/process identifiers, event descriptions, success/fail... |