STIGQter STIGQter: STIG Summary: VMW vSphere 6.5 vCenter Server for Windows Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 22 Jan 2021:

The vCenter Server for Windows must manage excess capacity, bandwidth, or other redundancy to limit the effects of information-flooding types of Denial of Service (DoS) attacks by enabling Network I/O Control (NIOC).

DISA Rule

SV-216830r612237_rule

Vulnerability Number

V-216830

Group Title

SRG-APP-000516

Rule Version

VCWN-65-000007

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

From the vSphere Web Client go to Networking >> Select a distributed switch >> Configure >> Settings >> Properties. In the Properties pane click "Edit" and change Network I/O Control to enabled.

or

From a PowerCLI command prompt while connected to the vCenter server run the following command:

(Get-VDSwitch "DVSwitch Name" | Get-View).EnableNetworkResourceManagement($true)

Check Contents

From the vSphere Web Client go to Networking >> Select a distributed switch >> Configure >> Settings >> Properties. View the Properties pane and verify Network I/O Control is enabled.

or

From a PowerCLI command prompt while connected to the vCenter server run the following command:

Get-VDSwitch | select Name,@{N="NIOC Enabled";E={$_.ExtensionData.config.NetworkResourceManagementEnabled}}

If Network I/O Control is disabled, this is a finding.

Vulnerability Number

V-216830

Documentable

False

Rule Version

VCWN-65-000007

Severity Override Guidance

From the vSphere Web Client go to Networking >> Select a distributed switch >> Configure >> Settings >> Properties. View the Properties pane and verify Network I/O Control is enabled.

or

From a PowerCLI command prompt while connected to the vCenter server run the following command:

Get-VDSwitch | select Name,@{N="NIOC Enabled";E={$_.ExtensionData.config.NetworkResourceManagementEnabled}}

If Network I/O Control is disabled, this is a finding.

Check Content Reference

M

Target Key

4030

Comments