DISA STIGS Viewer

The NSX Tier-0 Gateway router must be configured to use encryption for border gateway protocol (BGP) routing protocol authentication.

Overview

Finding ID Version Rule ID IA Controls Severity
V-265485 NT0R-4X-000108 SV-265485r994805_rule   High
Description
A rogue router could send a fictitious routing update to convince a site's perimeter router to send traffic to an incorrect or even a rogue destination. This diverted traffic could be analyzed to learn confidential information about the site's network or used to disrupt the network's ability to communicate with other networks. This is known as a "traffic attraction attack" and is prevented by configuring neighbor router authentication for routing updates. However, using clear-text authentication provides little benefit since an attacker can intercept traffic and view the authentication key. This would allow the attacker to use the authentication key in an attack. This requirement applies to all IPv4 and IPv6 protocols that are used to exchange routing or packet forwarding information; this includes all Interior Gateway Protocols (such as Open Shortest Path First [OSPF], Enhanced Interior Gateway Routing Protocol [EIGRP], and Intermediate System to Intermediate System [IS-IS]) and Exterior Gateway Protocols (such as BGP), multiprotocol label switching (MPLS)-related protocols (such as Label Distribution Protocol [LDP]), and multicast-related protocols.
STIG Date
VMware NSX 4.x Tier-0 Gateway Router Security Technical Implementation Guide 2024-12-13

Details

Check Text (C-69402r994803_chk)
If the Tier-0 Gateway is not using BGP, this is Not Applicable.

To verify BGP neighbors are using authentication with encryption, do the following:

From the NSX Manager web interface, go to Networking >> Connectivity >> Tier-0 Gateways.

For every Tier-0 Gateway, expand the "Tier-0 Gateway".

Expand "BGP", click the number next to "BGP Neighbors" and expand each BGP neighbor.

Expand the "Timers and Password" section and review the Password field.

If any BGP neighbors do not have a password configured, this is a finding.
Fix Text (F-69310r994804_fix)
To set authentication for BGP neighbors, do the following:

From the NSX Manager web interface, go to Networking >> Connectivity >> Tier-0 Gateways, and expand the target Tier-0 gateway.

Expand BGP. Next to "BGP Neighbors", click on the number present to open the dialog, then select "Edit" on the target BGP Neighbor.

Expand "BGP", click the number next to "BGP Neighbors". Select "Edit" on the target BGP neighbor.

Under Timers & Password, enter a password up to 20 characters, and then click "Save".