STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to VMware NSX-T Tier-0 Gateway Firewall Security Technical Implementation Guide

V-251743

CAT II (Medium)

The NSX-T Tier-0 Gateway Firewall must configure SpoofGuard to block outbound IP packets that contain illegitimate packet attributes.

Rule ID

SV-251743r810096_rule

STIG

VMware NSX-T Tier-0 Gateway Firewall Security Technical Implementation Guide

Version

V1R3

CCIs

CCI-000366

Discussion

If outbound communications traffic is not filtered, hostile activity intended to harm other networks may not be detected and prevented.

Check Content

From the NSX-T Manager web interface, go to Networking >> Segments and for each Segment, view Segment Profiles >> SpoofGuard.

If a Segment is not configured with a SpoofGuard profile that has Port Binding enabled, this is a finding.

Fix Text

To create a segment profile with SpoofGuard enabled, do the following:

From the NSX-T Manager web interface, go to Networking >> Segments >> Segment Profiles >> Add Segment Profile >> SpoofGuard.

Enter a profile name, enable port bindings, and then click "Save".

To update a Segments SpoofGuard profile, do the following:

From the NSX-T Manager web interface, go to Networking >> Segments and click "Edit" from the drop-down menu next to the target Segment.

Expand Segment Profiles, choose the new SpoofGuard profile from the drop-down list, and then click "Save".