STIGQter STIGQter: STIG Summary: VMware vSphere 6.7 vCenter Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 09 Mar 2021:

The vCenter Server must set the distributed port group Promiscuous Mode policy to reject.

DISA Rule

SV-243084r719495_rule

Vulnerability Number

V-243084

Group Title

SRG-APP-000516

Rule Version

VCTR-67-000015

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

From the vSphere Client, go to Networking >> select a distributed switch >> select a port group >> Configure >> Settings >> Policies >> Edit >> Security.

Set "Promiscuous Mode" to reject. Click "OK".

or

From a PowerCLI command prompt while connected to the vCenter server, run the following commands:


Get-VDSwitch | Get-VDSecurityPolicy | Set-VDSecurityPolicy -AllowPromiscuous $false
Get-VDPortgroup | ?{$_.IsUplink -eq $false} | Get-VDSecurityPolicy | Set-VDSecurityPolicy -AllowPromiscuous $false

Check Contents

From the vSphere Client, go to Networking >> select a distributed switch >> select a port group >> Configure >> Settings >> Policies.

Verify "Promiscuous Mode" is set to reject.

or

From a PowerCLI command prompt while connected to the vCenter server, run the following commands:

Get-VDSwitch | Get-VDSecurityPolicy
Get-VDPortgroup | ?{$_.IsUplink -eq $false} | Get-VDSecurityPolicy

If the "Promiscuous Mode" policy is set to accept, this is a finding.

Vulnerability Number

V-243084

Documentable

False

Rule Version

VCTR-67-000015

Severity Override Guidance

From the vSphere Client, go to Networking >> select a distributed switch >> select a port group >> Configure >> Settings >> Policies.

Verify "Promiscuous Mode" is set to reject.

or

From a PowerCLI command prompt while connected to the vCenter server, run the following commands:

Get-VDSwitch | Get-VDSecurityPolicy
Get-VDPortgroup | ?{$_.IsUplink -eq $false} | Get-VDSecurityPolicy

If the "Promiscuous Mode" policy is set to accept, this is a finding.

Check Content Reference

M

Target Key

5399

Comments