STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to VMware NSX Distributed Logical Router Security Technical Implementation Guide

V-69127

CAT II (Medium)

The NSX Distributed Logical Router must be configured so inactive router interfaces are disabled.

Rule ID

SV-83731r1_rule

STIG

VMware NSX Distributed Logical Router Security Technical Implementation Guide

Version

V1R1

CCIs

CCI-001414

Discussion

An inactive interface is rarely monitored or controlled and may expose a network to an undetected attack on that interface. Unauthorized personnel with access to the communication facility could gain access to a router by connecting to a configured interface that is not in use.

Check Content

Verify there are no inactive router interfaces enabled.

Log onto vSphere Web Client with credentials authorized for administration.

Navigate and select Networking and Security >> "NSX Edges" tab on the left-side menu.

Double-click the EdgeID.

Click on the "Manage" tab on the top of the new screen, then Settings on the far left >> Interfaces >> Check the "Status" column for the associated interface.

If any inactive router interfaces are not disabled, this is a finding.

Fix Text

Log onto vSphere Web Client with credentials authorized for administration.

Navigate and select Networking and Security >> select the "NSX Edges" tab on the left-side menu.

Double-click the EdgeID.

Click on the "Manage" tab on the top of the new screen then Settings on the far left >> Interfaces.

For interfaces that are not in use, highlight the interface and click the pencil icon.

Move the radio button next to "Connectivity Status" to "Disconnected".