VMware NSX 4.x Distributed Firewall Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-NET-000074-FW-000009
Group -
SRG-NET-000193-FW-000030
Group -
The NSX Distributed Firewall must limit the effects of packet flooding types of denial-of-service (DoS) attacks.
A firewall experiencing a DoS attack will not be able to handle production traffic load. The high utilization and CPU caused by a DoS attack will also have an effect on control keep-alives and time...Rule Medium Severity -
SRG-NET-000202-FW-000039
Group -
SRG-NET-000364-FW-000040
Group -
The NSX Distributed Firewall must be configured to inspect traffic at the application layer.
Application inspection enables the firewall to control traffic based on different parameters that exist within the packets such as enforcing application-specific message and field length. Inspectio...Rule Medium Severity -
SRG-NET-000364-FW-000042
Group -
The NSX Distributed Firewall must configure SpoofGuard to restrict it from accepting outbound packets that contain an illegitimate address in the source address.
A compromised host in an enclave can be used by a malicious platform to launch cyberattacks on third parties. This is a common practice in "botnets", which are a collection of compromised computers...Rule Medium Severity -
SRG-NET-000364-FW-000042
Group -
The NSX Distributed Firewall must generate traffic log entries that can be sent by the ESXi hosts to the central syslog.
Without establishing what type of event occurred, it would be difficult to establish, correlate, and investigate the events leading up to an outage or attack. Audit event content that may be neces...Rule Low Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.