Skip to content

VMware NSX 4.x Tier-0 Gateway Router Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The NSX Tier-0 Gateway router must be configured to use its loopback address as the source address for Internal Border Gateway Protocol (IBGP) peering sessions.

    Using a loopback address as the source address offers a multitude of uses for security, access, management, and scalability of the Border Gateway Protocol (BGP) routers. It is easier to construct a...
    Rule Low Severity
  • SRG-NET-000512-RTR-000012

    Group
  • The NSX Tier-0 Gateway router must be configured to advertise a hop limit of at least 32 in Router Advertisement messages for IPv6 stateless auto-configuration deployments.

    The Neighbor Discovery (ND) protocol allows a hop limit value to be advertised by routers in a Router Advertisement message being used by hosts instead of the standardized default value. If a very ...
    Rule Low Severity
  • SRG-NET-000131-RTR-000035

    Group
  • The NSX Tier-0 Gateway router must be configured to have routing protocols disabled if not in use.

    A compromised router introduces risk to the entire network infrastructure, as well as data resources that are accessible via the network. The perimeter defense has no oversight or control of attack...
    Rule Low Severity
  • SRG-NET-000131-RTR-000035

    Group
  • The NSX Tier-0 Gateway router must be configured to have multicast disabled if not in use.

    A compromised router introduces risk to the entire network infrastructure, as well as data resources that are accessible via the network. The perimeter defense has no oversight or control of attack...
    Rule Low Severity
  • SRG-NET-000168-RTR-000077

    Group
  • The NSX Tier-0 Gateway router must be configured to restrict it from accepting outbound IP packets that contain an illegitimate address in the source address field by enabling Unicast Reverse Path Forwarding (uRPF).

    A malicious platform can use a compromised host in an enclave to launch cyberattacks on third parties. This is a common practice in "botnets", which are a collection of compromised computers using ...
    Rule High Severity
  • The NSX Tier-0 Gateway router must be configured to implement message authentication for all control plane protocols.

    A rogue router could send a fictitious routing update to convince a site's perimeter router to send traffic to an incorrect or a rogue destination. This diverted traffic could be analyzed to learn ...
    Rule High Severity
  • The NSX Tier-0 Gateway router must be configured to use the Border Gateway Protocol (BGP) maximum prefixes feature to protect against route table flooding and prefix de-aggregation attacks.

    The effects of prefix de-aggregation can degrade router performance due to the size of routing tables and also result in black-holing legitimate traffic. Initiated by an attacker or a misconfigured...
    Rule Medium Severity
  • The NSX Tier-0 Gateway router must be configured to use encryption for border gateway protocol (BGP) routing protocol authentication.

    A rogue router could send a fictitious routing update to convince a site's perimeter router to send traffic to an incorrect or even a rogue destination. This diverted traffic could be analyzed to l...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules