1. Home
  2. Security Hardening
  3. DISA STIG VMware vSphere VCenter 6.5 V2R2
  4. VCWN-65-000019 – The vCenter Server for Windows must configure all port groups to VLAN 4095 unless Virtual Guest Tagging (VGT) is required.

VCWN-65-000019 – The vCenter Server for Windows must configure all port groups to VLAN 4095 unless Virtual Guest Tagging (VGT) is required.

Details

When a port group is set to VLAN 4095, this activates VGT mode. In this mode, the vSwitch passes all network frames to the guest VM without modifying the VLAN tags, leaving it up to the guest to deal with them. VLAN 4095 should be used only if the guest has been specifically configured to manage VLAN tags itself. If VGT is enabled inappropriately, it might cause denial-of-service or allow a guest VM to interact with traffic on an unauthorized VLAN.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

From the vSphere Web Client go to Networking >> Select a distributed switch >> Select a distributed port group >> Configure >> Settings >> Policies. Click ‘Edit’ and under the VLAN section change the VLAN ID to an appropriate VLAN ID other than ‘4095’ and click ‘OK’.

or

From a PowerCLI command prompt while connected to the vCenter server run the following command:
Get-VDPortgroup ‘portgroup name’ | Set-VDVlanConfiguration -VlanId ‘New VLAN#’

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Configuration Management.This control applies to the following type of system VMware.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles