STIGQter STIGQter: STIG Summary: VMware vSphere 6.7 vCenter Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 09 Mar 2021:

The vCenter Server must manage excess capacity, bandwidth, or other redundancy to limit the effects of information-flooding types of denial-of-service (DoS) attacks by enabling Network I/O Control (NIOC).

DISA Rule

SV-243077r719474_rule

Vulnerability Number

V-243077

Group Title

SRG-APP-000516

Rule Version

VCTR-67-000007

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

From the vSphere Client, go to Networking >> select a distributed switch >> Configure >> Settings >> Properties.

In the "Properties" pane, click "Edit" and change Network I/O Control to enabled.

or

From a PowerCLI command prompt while connected to the vCenter server, run the following command:

(Get-VDSwitch "VDSwitch Name" | Get-View).EnableNetworkResourceManagement($true)

Check Contents

From the vSphere Client, go to Networking >> select a distributed switch >> Configure >> Settings >> Properties.

View the "Properties" pane and verify Network I/O Control is enabled.

or

From a PowerCLI command prompt while connected to the vCenter server, run the following command:

Get-VDSwitch | select Name,@{N="NIOC Enabled";E={$_.ExtensionData.config.NetworkResourceManagementEnabled}}

If Network I/O Control is disabled, this is a finding.

Vulnerability Number

V-243077

Documentable

False

Rule Version

VCTR-67-000007

Severity Override Guidance

From the vSphere Client, go to Networking >> select a distributed switch >> Configure >> Settings >> Properties.

View the "Properties" pane and verify Network I/O Control is enabled.

or

From a PowerCLI command prompt while connected to the vCenter server, run the following command:

Get-VDSwitch | select Name,@{N="NIOC Enabled";E={$_.ExtensionData.config.NetworkResourceManagementEnabled}}

If Network I/O Control is disabled, this is a finding.

Check Content Reference

M

Target Key

5399

Comments