STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 4 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to VMware NSX 4.x Tier-0 Gateway Router Security Technical Implementation Guide

V-265432

CAT II (Medium)

The NSX Tier-0 Gateway must be configured to use a unique password for each autonomous system (AS) with which it peers.

Rule ID

SV-265432r994646_rule

STIG

VMware NSX 4.x Tier-0 Gateway Router Security Technical Implementation Guide

Version

V1R2

CCIs

CCI-002205

Discussion

If the same keys are used between External Border Gateway Protocol (eBGP) neighbors, the chance of a hacker compromising any of the BGP sessions increases. It is possible that a malicious user exists in one autonomous system who would know the key used for the eBGP session. This user would then be able to hijack BGP sessions with other trusted neighbors.

Check Content

If the Tier-0 Gateway is not using BGP, this is Not Applicable.

Since the NSX Tier-0 Gateway does not reveal the current password, interview the router administrator to determine if unique passwords are being used.

If unique passwords are not being used for each AS, this is a finding.

Fix Text

To set authentication for BGP neighbors, do the following:

From the NSX Manager web interface, go to Networking >> Connectivity >> Tier-0 Gateways, and expand the target Tier-0 gateway.

Expand BGP. Next to "BGP Neighbors", click on the number present to open the dialog, then select "Edit" on the target BGP Neighbor.

Expand "BGP", click the number next to "BGP Neighbors". Select "Edit" on the target BGP neighbor.

Under Timers & Password, enter a password up to 20 characters that is different from other autonomous systems, and then click "Save".