Firewall Security Requirements Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +33 −33
Comparison against the immediately-prior release (V1R5). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 33
- V-206674 High The firewall must be configured to use filters that use packet headers and packet attributes, including source and destination IP addresses and ports, to prevent the flow of unauthorized or suspicious traffic between interconnected networks with different security policies (including perimeter firewalls and server VLANs).
- V-206675 Medium The firewall must immediately use updates made to policy enforcement mechanisms such as firewall rules, security policies, and security zones.
- V-206676 Medium The firewall that filters traffic from the VPN access points must be configured with organization-defined filtering rules that apply to the monitoring of remote access traffic.
- V-206678 Medium The firewall must generate traffic log entries containing information to establish what type of events occurred.
- V-206679 Medium The firewall must generate traffic log entries containing information to establish when (date and time) the events occurred.
- V-206680 Medium The firewall must generate traffic log entries containing information to establish the location on the network where the events occurred.
- V-206681 Low The firewall must generate traffic log entries containing information to establish the source of the events, such as the source IP address at a minimum.
- V-206682 Medium The firewall must generate traffic log entries containing information to establish the outcome of the events, such as, at a minimum, the success or failure of the application of the firewall rule.
- V-206684 Medium In the event that communication with the central audit server is lost, the firewall must continue to queue traffic log records locally.
- V-206685 Medium The firewall must be configured to use TCP when sending log records to the central audit server.
- V-206687 Medium The firewall must protect the traffic log from unauthorized modification of local log records.
- V-206688 Medium The firewall must protect the traffic log from unauthorized deletion of local log files and log records.
- V-206690 Medium The firewall must disable or remove unnecessary network services and functions that are not used as part of its role in the architecture.
- V-206692 Medium The firewall must block outbound traffic containing denial-of-service (DoS) attacks to protect against the use of internal information systems to launch any DoS attacks against other networks or endpoints.
- V-206693 Medium The firewall implementation must manage excess bandwidth to limit the effects of packet flooding types of denial-of-service (DoS) attacks.
- V-206694 High The firewall must deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception).
- V-206695 Medium The perimeter firewall must filter traffic destined to the internal enclave in accordance with the specific traffic that is approved and registered in the Ports, Protocols, and Services Management (PPSM) Category Assurance List (CAL), Vulnerability Assessments (VAs) for that the enclave.
- V-206696 Medium The firewall must fail to a secure state upon the failure of the following: system initialization, shutdown, or system abort.
- V-206698 Medium In the event of a system failure of the firewall function, the firewall must be configured to save diagnostic information, log system messages, and load the most current security policies, rules, and signatures when restarted.
- V-206699 Medium The firewall must be configured to send traffic log entries to a central audit server for management and configuration of the traffic log entries.
- V-206700 Medium If communication with the central audit server is lost, the firewall must generate a real-time alert to, at a minimum, the SCA and ISSO.
- V-206701 High The firewall must employ filters that prevent or limit the effects of all types of commonly known denial-of-service (DoS) attacks, including flooding, packet sweeps, and unauthorized port scanning.
- V-206703 Medium The firewall must apply ingress filters to traffic that is inbound to the network through any active external interface.
- V-206704 Medium The firewall must apply egress filters to traffic that is outbound from the network through any internal interface.
- V-206707 Medium The premise firewall (located behind the premise router) must block all outbound management traffic.
- V-206708 Medium The firewall must restrict traffic entering the VPN tunnels to the management network to only the authorized management packets based on destination address.
- V-206711 Low The firewall must generate an alert that can be forwarded to, at a minimum, the ISSO and ISSM when denial-of-service (DoS) incidents are detected.
- V-206712 Medium The firewall must be configured to allow authorized users to record a packet capture based IP, traffic type (TCP, UDP, or ICMP), or protocol.
- V-206713 Medium The firewall must generate traffic log records when traffic is denied, restricted, or discarded.
- V-206714 Medium The firewall must generate traffic log records when attempts are made to send packets between security zones that are not authorized to communicate.
- V-223011 Medium The firewall must be configured to inspect all inbound and outbound traffic at the application layer.
- V-223012 Medium The firewall must be configured to inspect all inbound and outbound IPv6 traffic for unknown or out-of-order extension headers.
- V-223013 Medium The firewall must be configured to restrict it from accepting outbound packets that contain an illegitimate address in the source address field via an egress filter or by enabling Unicast Reverse Path Forwarding (uRPF).
Removed rules 33
- V-101103 Medium The firewall must be configured to inspect all inbound and outbound traffic at the application layer.
- V-101105 Medium The firewall must be configured to inspect all inbound and outbound IPv6 traffic for unknown or out-of-order extension headers.
- V-101107 Medium The firewall must be configured to restrict it from accepting outbound packets that contain an illegitimate address in the source address field via an egress filter or by enabling Unicast Reverse Path Forwarding (uRPF).
- V-79409 High The firewall must be configured to use filters that use packet headers and packet attributes, including source and destination IP addresses and ports, to prevent the flow of unauthorized or suspicious traffic between interconnected networks with different security policies (including perimeter firewalls and server VLANs).
- V-79413 High The firewall must employ filters that prevent or limit the effects of all types of commonly known denial-of-service (DoS) attacks, including flooding, packet sweeps, and unauthorized port scanning.
- V-79415 High The firewall must deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception).
- V-79419 Medium The firewall must block outbound traffic containing denial-of-service (DoS) attacks to protect against the use of internal information systems to launch any DoS attacks against other networks or endpoints.
- V-79421 Medium The firewall implementation must manage excess bandwidth to limit the effects of packet flooding types of denial-of-service (DoS) attacks.
- V-79423 Medium The firewall that filters traffic from the VPN access points must be configured with organization-defined filtering rules that apply to the monitoring of remote access traffic.
- V-79427 Medium The firewall must immediately use updates made to policy enforcement mechanisms such as firewall rules, security policies, and security zones.
- V-79429 Medium The firewall must generate traffic log records when traffic is denied, restricted, or discarded.
- V-79431 Medium The firewall must generate traffic log records when attempts are made to send packets between security zones that are not authorized to communicate.
- V-79433 Medium The firewall must be configured to allow authorized users to record a packet capture based IP, traffic type (TCP, UDP, or ICMP), or protocol.
- V-79435 Medium The firewall must generate traffic log entries containing information to establish what type of events occurred.
- V-79437 Medium The firewall must generate traffic log entries containing information to establish when (date and time) the events occurred.
- V-79439 Medium The firewall must generate traffic log entries containing information to establish the location on the network where the events occurred.
- V-79441 Low The firewall must generate traffic log entries containing information to establish the source of the events, such as the source IP address at a minimum.
- V-79443 Medium The firewall must generate traffic log entries containing information to establish the outcome of the events, such as, at a minimum, the success or failure of the application of the firewall rule.
- V-79445 Medium The firewall must be configured to send traffic log entries to a central audit server for management and configuration of the traffic log entries.
- V-79447 Medium If communication with the central audit server is lost, the firewall must generate a real-time alert to, at a minimum, the SCA and ISSO.
- V-79451 Medium In the event that communication with the central audit server is lost, the firewall must continue to queue traffic log records locally.
- V-79453 Medium The firewall must be configured to use TCP when sending log records to the central audit server.
- V-79457 Medium The firewall must protect the traffic log from unauthorized modification of local log records.
- V-79459 Medium The firewall must protect the traffic log from unauthorized deletion of local log files and log records.
- V-79461 Medium The firewall must disable or remove unnecessary network services and functions that are not used as part of its role in the architecture.
- V-79463 Medium The firewall must fail to a secure state upon the failure of the following: system initialization, shutdown, or system abort.
- V-79465 Medium In the event of a system failure of the firewall function, the firewall must be configured to save diagnostic information, log system messages, and load the most current security policies, rules, and signatures when restarted.
- V-79469 Medium The firewall must apply ingress filters to traffic that is inbound to the network through any active external interface.
- V-79471 Medium The firewall must apply egress filters to traffic that is outbound from the network through any internal interface.
- V-79477 Medium The premise firewall (located behind the premise router) must block all outbound management traffic.
- V-79479 Medium The firewall must restrict traffic entering the VPN tunnels to the management network to only the authorized management packets based on destination address.
- V-79485 Medium The perimeter firewall must filter traffic destined to the internal enclave in accordance with the specific traffic that is approved and registered in the Ports, Protocols, and Services Management (PPSM) Category Assurance List (CAL), Vulnerability Assessments (VAs) for that the enclave.
- V-79489 Low The firewall must generate an alert that can be forwarded to, at a minimum, the ISSO and ISSM when denial-of-service (DoS) incidents are detected.
- RMF Control
- AC-4
- Severity
- H
- CCI
- CCI-001414
- Version
- SRG-NET-000019-FW-000003
- Vuln IDs
-
- V-206674
- V-79409
- Rule IDs
-
- SV-206674r604133_rule
- SV-94115
Checks: C-6931r297801_chk
Verify the firewall is configured to use filters to restrict or block information system services based on best practices, known threats, and guidance in the Ports, Protocols, Services Management (PPSM) database regarding restrictions for boundary crossing for ports, protocols, and services. If the firewall cannot be configured with filters that employ packet header and packet attributes, including source and destination IP addresses and ports, to prevent the flow of unauthorized or suspicious traffic between interconnected networks with different security policies, this is a finding.
Fix: F-6931r297802_fix
Configure filters in the firewall to examine characteristics of incoming and outgoing packets, including but not limited to the following: - Bit fields in the packet header, including IP fragmentation flags, IP options, and TCP flags - IP version 4 (IPv4) numeric range, including destination port, DiffServ code point (DSCP) value, fragment offset, Internet Control Message Protocol (ICMP) code, ICMP packet type, interface group, IP precedence, packet length, protocol, and TCP and UDP source and destination port - IP version 6 (IPv6) numeric range, including class of service (CoS) priority, destination address, destination port, ICMP code, ICMP packet type, interface group, IP address, next header, packet length, source address, source port, and TCP and UDP source and destination port - Source and destination address and prefix list
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-NET-000019-FW-000004
- Vuln IDs
-
- V-206675
- V-79427
- Rule IDs
-
- SV-206675r604133_rule
- SV-94133
Checks: C-6932r297804_chk
Verify the firewall immediately uses updates made to policy enforcement mechanisms such as firewall rules, security policies, and security zones. For example, there is no need to reinitialize or reboot or the action to commit the changes is prompted. If the firewall does not immediately use updates made to policy enforcement mechanisms such as firewall rules, security policies, and security zones, this is a finding.
Fix: F-6932r297805_fix
Require system administrators to commit and test changes upon configuration of the firewall.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- SRG-NET-000061-FW-000001
- Vuln IDs
-
- V-206676
- V-79423
- Rule IDs
-
- SV-206676r604133_rule
- SV-94129
Checks: C-6933r297807_chk
Review the firewall configuration statements used to create a group policy with filtering rules for remote clients accessing the network using a VPN. Verify both ingress and egress traffic on this interface is subject to the remote access policy and filtering rules required by the organization. If the firewall is used to filter traffic from the VPN access points but is not configured with filtering rules that apply to the monitoring of remote access traffic, this is a finding.
Fix: F-6933r297808_fix
Configure a group policy for remote clients and apply to the interface that is connected to allow ingress and egress to the VPN access points.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SRG-NET-000074-FW-000009
- Vuln IDs
-
- V-206678
- V-79435
- Rule IDs
-
- SV-206678r604133_rule
- SV-94141
Checks: C-6935r297813_chk
Examine the traffic log configuration on the firewall or view several alert events on the organization's central audit server. Verify the entries sent to the traffic log include sufficient information to determine the type or category for each event in the traffic log. If the traffic log entries do not include enough information to determine what type of event occurred, this is a finding.
Fix: F-6935r297814_fix
Configure the firewall to ensure entries sent to the traffic log include sufficient information to determine the type or category for each event in the traffic log.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000131
- Version
- SRG-NET-000075-FW-000010
- Vuln IDs
-
- V-206679
- V-79437
- Rule IDs
-
- SV-206679r604133_rule
- SV-94143
Checks: C-6936r297816_chk
Examine the traffic log configuration on the firewall or view several alert events on the organization's central audit server. Verify the entries sent to the traffic log include the date and time of each event. If the traffic log entries do not include the date and time the event occurred, this is a finding.
Fix: F-6936r297817_fix
Configure the firewall to ensure entries sent to the traffic log include the date and time of the event.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000132
- Version
- SRG-NET-000076-FW-000011
- Vuln IDs
-
- V-206680
- V-79439
- Rule IDs
-
- SV-206680r604133_rule
- SV-94145
Checks: C-6937r297819_chk
Examine the traffic log configuration on the firewall or view several alert events on the organization's central audit server. Verify the entries sent to the traffic log include the location of each event (e.g., network name, network subnet, port, or network segment). If the traffic log entries do not include the event location, this is a finding.
Fix: F-6937r297820_fix
Configure the firewall to ensure entries sent to the traffic log include the location of each event (e.g., network name, network subnet, network segment, or port).
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000133
- Version
- SRG-NET-000077-FW-000012
- Vuln IDs
-
- V-206681
- V-79441
- Rule IDs
-
- SV-206681r604133_rule
- SV-94147
Checks: C-6938r297822_chk
Examine the traffic log configuration on the firewall or view several alert events on the organization's central audit server. Verify the entries sent to the traffic log include sufficient information to ascertain the source of the events (e.g., IP address, session, or packet ID). If the traffic log entries do not include sufficient information to ascertain the source of the events, this is a finding.
Fix: F-6938r297823_fix
Configure the firewall implementation to ensure entries sent to the traffic log include sufficient information to ascertain the source of each event (e.g., IP address, session, or packet ID).
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- SRG-NET-000078-FW-000013
- Vuln IDs
-
- V-206682
- V-79443
- Rule IDs
-
- SV-206682r604133_rule
- SV-94149
Checks: C-6939r297825_chk
Examine the traffic log configuration on the firewall or view several alert events on the organization's central audit server. Verify the entries sent to the traffic log include sufficient information to ascertain the outcome of the firewall rules. Verify that, at a minimum, the success or failure of the event is evented. If the traffic log entries do not include sufficient information to ascertain the outcome of the application of the firewall rules, this is a finding. If the traffic log entries do not include the success or failure of the application of the firewall rules, this is a finding.
Fix: F-6939r297826_fix
Configure the firewall to generate traffic log entries containing information to establish the outcome of the events, such as, at a minimum, the success or failure of the application of the firewall rule.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000140
- Version
- SRG-NET-000089-FW-000019
- Vuln IDs
-
- V-206684
- V-79451
- Rule IDs
-
- SV-206684r604133_rule
- SV-94157
Checks: C-6941r297831_chk
Verify logging has been enabled and configured for local queuing of the traffic log. If a local log file (or files) is not configured to capture events locally if communication with the central audit server is lost, this is a finding.
Fix: F-6941r297832_fix
Configure local backup events files to capture DoD-defined auditable events either consistently or, if possible, in the event communication with the central audit server is lost.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000098-FW-000021
- Vuln IDs
-
- V-206685
- V-79453
- Rule IDs
-
- SV-206685r604133_rule
- SV-94159
Checks: C-6942r457833_chk
Review the firewall configuration and verify that it is configure to use TCP. If the firewall is not configured to use TCP when sending log records to the central audit server, this is a finding.
Fix: F-6942r457834_fix
Configure the firewall to use TCP when sending log records to the central audit server.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- SRG-NET-000099-FW-000161
- Vuln IDs
-
- V-206687
- V-79457
- Rule IDs
-
- SV-206687r604133_rule
- SV-94163
Checks: C-6944r297840_chk
Verify the firewall's fine-grained permissions are configured to prevent unauthorized modification of local log records. If the firewall does not protect traffic log records from unauthorized modification while stored locally, this is a finding.
Fix: F-6944r297841_fix
Validate the firewall includes a baseline cryptographic module that provides confidentiality and integrity services for authentication and for protecting communications with adjacent systems. Configure role-based, fine-grained permissions management for controlling commands needed to modify log records.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- SRG-NET-000100-FW-000023
- Vuln IDs
-
- V-206688
- V-79459
- Rule IDs
-
- SV-206688r604133_rule
- SV-94165
Checks: C-6945r297843_chk
Verify the firewall's fine-grained permissions are configured to prevent unauthorized deletion of local log files or log records. If the firewall does not protect traffic log records and log files from unauthorized deletion while stored locally, this is a finding.
Fix: F-6945r297844_fix
Validate the firewall includes a baseline cryptographic module that provides confidentiality and integrity services for authentication and for protecting communications with adjacent systems. Configure role-based, fine-grained permissions management for controlling commands needed to delete log files and records.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-NET-000131-FW-000025
- Vuln IDs
-
- V-206690
- V-79461
- Rule IDs
-
- SV-206690r604133_rule
- SV-94167
Checks: C-6947r297849_chk
Review the documentation and architecture for the device or check the system-installed licenses or services. Determine what services and functions are installed on the firewall. Compare installed services and functions to the documentation showing the approved services. If unneeded services and functions are installed on the device but are not part of the documented role of the device, this is a finding.
Fix: F-6947r297850_fix
Display and remove unnecessary licenses, services, and functions from the firewall. Examples include NTP, DNS, and DHCP. Note: Only remove unauthorized services. This control is not intended to restrict the use of network devices with multiple authorized roles.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001094
- Version
- SRG-NET-000192-FW-000029
- Vuln IDs
-
- V-206692
- V-79419
- Rule IDs
-
- SV-206692r604133_rule
- SV-94125
Checks: C-6949r297855_chk
Obtain and review the list of outbound interfaces and zones from site personnel. Review each of the configured outbound interfaces and zones. Verify zones that communicate outbound have been configured with the DoS firewall filter (i.e., rules, access control lists [ACLs], screens, or policies) such as IP sweeps, TCP sweeps, buffer overflows, unauthorized port scanning, SYN floods, UDP floods, and UDP sweeps. If all outbound interfaces are not configured to block DoS attacks, this is a finding.
Fix: F-6949r297856_fix
Associate a properly configured DoS firewall filter (e.g., rules, access control lists [ACLs], screens, or policies) to outbound interfaces and security zones. Apply a firewall filter to each outbound interface example: set security zones security-zone untrust interfaces <OUTBOUND-INTERFACE> set security zones security-zone trust screen untrust-screen
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001095
- Version
- SRG-NET-000193-FW-000030
- Vuln IDs
-
- V-206693
- V-79421
- Rule IDs
-
- SV-206693r604133_rule
- SV-94127
Checks: C-6950r297858_chk
Use the "show" command to verify that all inbound interfaces have a stateless firewall filter to set rate limits based on a destination. If the firewall does not have a stateless firewall filter that sets rate limits based on a destination, this is a finding.
Fix: F-6950r297859_fix
Configure a stateless firewall filter to set rate limits based on a destination of the packets. Apply the stateless firewall filter to all inbound interfaces.
- RMF Control
- SC-7
- Severity
- H
- CCI
- CCI-001109
- Version
- SRG-NET-000202-FW-000039
- Vuln IDs
-
- V-206694
- V-79415
- Rule IDs
-
- SV-206694r604133_rule
- SV-94121
Checks: C-6951r297861_chk
Determine the default security policies on the firewall for traffic from one zone to another zone (inter-zone). The default policy must be a "Deny" policy that blocks all inter-zone traffic by default. Ensure no policy that circumvents the default "Deny" inter-zone policy is allowed. Traffic through the firewall is filtered so that only the specific traffic that is approved and registered in the PPSM CAL and VAs for the enclave. Verify rules or access control statements containing "any" for either the host, destination, protocol, or port are not used. If the firewall does not deny all network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception), this is a finding.
Fix: F-6951r297862_fix
Configure the firewall with a "Deny" inter-zone policy which, by default, blocks traffic between zones and allows network communications traffic by exception (i.e., deny all, permit by exception) in accordance with PPSM CAL and VAs for the enclave.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000205-FW-000040
- Vuln IDs
-
- V-206695
- V-79485
- Rule IDs
-
- SV-206695r604133_rule
- SV-94191
Checks: C-6952r297864_chk
Review the perimeter firewall to verify it filters traffic destined to the internal enclave in accordance with the guidelines contained in the PPSM CAL and VAs for the enclave. If the perimeter firewall does not filter traffic destined to the internal enclave in accordance with the guidelines contained in the PPSM CAL and VAs for the enclave, this is a finding.
Fix: F-6952r297865_fix
Configure the perimeter firewall to filter traffic destined to the internal enclave in accordance with the guidelines contained in the PPSM CAL and VAs for the enclave.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- SRG-NET-000235-FW-000133
- Vuln IDs
-
- V-206696
- V-79463
- Rule IDs
-
- SV-206696r604133_rule
- SV-94169
Checks: C-6953r457836_chk
Verify the firewall stops forwarding traffic or maintains the configured security policies upon the failure of the following: system initialization, shutdown, or system abort. If the firewall does not stop forwarding traffic or maintain the configured security policies upon the failure of system initialization, shutdown, or system abort, this is a finding.
Fix: F-6953r457837_fix
Configure the firewall to stop forwarding traffic or maintain the configured security policies upon the failure of the following actions: system initialization, shutdown, or system abort.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001665
- Version
- SRG-NET-000236-FW-000027
- Vuln IDs
-
- V-206698
- V-79465
- Rule IDs
-
- SV-206698r604133_rule
- SV-94171
Checks: C-6955r297873_chk
View the firewall failover configuration or system documentation. Verify that in the event of a system failure of the firewall function, the firewall saves diagnostic information, logs system messages, and loads the most current security policies, rules, and signatures. Testing of this functionality in a production environment is not recommended. If in the event of a system failure of the firewall function the firewall does not save diagnostic information, log system messages, and load the most current security policies, rules, and signatures when restarted, this is a finding.
Fix: F-6955r297874_fix
Configure the firewall to fail securely in the event of a transiently corrupt state or failure condition. When the system restarts, the system boot process must not succeed without passing all self-tests for cryptographic algorithms, RNG tests, and software integrity tests.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001844
- Version
- SRG-NET-000333-FW-000014
- Vuln IDs
-
- V-206699
- V-79445
- Rule IDs
-
- SV-206699r604133_rule
- SV-94151
Checks: C-6956r297876_chk
Examine the traffic log configuration on the firewall. Verify the firewall is configured to send traffic log entries to the organization's central audit server. If the firewall is not configured to send traffic log entries to the organization's central audit server, this is a finding.
Fix: F-6956r297877_fix
Configure the firewall to ensure traffic log entries are transmitted to the organization's central audit server (e.g., syslog server).
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001858
- Version
- SRG-NET-000335-FW-000017
- Vuln IDs
-
- V-206700
- V-79447
- Rule IDs
-
- SV-206700r604133_rule
- SV-94153
Checks: C-6957r297879_chk
If a network device such as the events, network management, or SNMP server is configured to send an alert when communication is lost with the central audit server, this is not a finding. Verify the firewall is configured to send an alert via instant message, email, SNMP, or another authorized method to the SCA, ISSO, and other identified personnel when communication is lost with the central audit server. If the firewall is not configured to send an immediate alert via an approved method when communication is lost with the central audit server, this is a finding.
Fix: F-6957r297880_fix
Configure the firewall (or another network device) to send an alert via instant message, email, or another authorized method to the SCA, ISSO, and other identified personnel for any log failure event where the filtering functions are unable to write events to the central audit server.
- RMF Control
- SC-5
- Severity
- H
- CCI
- CCI-002385
- Version
- SRG-NET-000362-FW-000028
- Vuln IDs
-
- V-206701
- V-79413
- Rule IDs
-
- SV-206701r604133_rule
- SV-94119
Checks: C-6958r297882_chk
View the security filters for each interface or security zone. Verify DoS filters are configured to detect and prevent known DoS attacks such as IP sweeps, TCP sweeps, buffer overflows, unauthorized port scanning, SYN floods, UDP floods, and UDP sweeps. If filters are not configured or if the security zone is not configured with filters that guard against common DoS attacks, this is a finding.
Fix: F-6958r297883_fix
Configure the firewall to detect and prevent DoS attacks. Implement filters with thresholds that are customized for the specific environment where applicable. DoS filters are based on NIST 800-53 requirements and vendor recommendations. The following sample commands show filters that implement this requirement (these are examples only): set filter1 icmp ip-sweep threshold 1000 set filter2 tcp port-scan threshold 1000 set filter3 tcp syn-flood alarm-threshold 1000 set filter3 tcp syn-flood attack-threshold 1100 set filter4 tcp syn-flood source-threshold 100 set filter5 tcp syn-flood destination-threshold 2048 set filter6 tcp syn-flood timeout 20 set filter7 tcp tcp-sweep threshold 1000 set filter8 udp flood threshold 5000 set filter9 udp udp-sweep threshold 1000
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-FW-000031
- Vuln IDs
-
- V-206703
- V-79469
- Rule IDs
-
- SV-206703r604133_rule
- SV-94175
Checks: C-6960r297888_chk
Obtain and review the list of authorized sources and destinations. This is usually part of the System Design Specification, Accreditation or Authorization Package, ports, protocols, and services documentation, and Ports, Protocols, and Services Management (PPSM) database. If the list of authorized sources and destinations is not available, this is a finding. Review the firewall configuration for each of the configured inbound zones and interfaces. Verify an ingress filter (e.g., Access Control List) is applied to each inbound zone/interface, including the management interface. Verify ingress filters for the management interface to block all transit traffic (i.e., any traffic not destined to the firewall itself). Verify that traffic accessing the firewall originates from the Network Operations Center (NOC). If an ingress filter is not configured for each active inbound zone or interface, this is a finding.
Fix: F-6960r297889_fix
Configure a security policy to each inbound zone and/or interface to implement continuous filtering of outbound traffic. Apply security policy zones/interfaces through which inbound traffic flows from untrusted external networks or subnetworks. Configure the ingress filters for the management interface to block all transit traffic (i.e., any traffic not destined to the firewall itself) and so that traffic accessing the firewall originates from the NOC.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-FW-000032
- Vuln IDs
-
- V-206704
- V-79471
- Rule IDs
-
- SV-206704r604133_rule
- SV-94177
Checks: C-6961r297891_chk
Obtain and review the list of authorized sources and destinations. This is usually part of the System Design Specification, Accreditation or Authorization Package, ports, protocols, and services documentation, and Ports, Protocols, and Services Management (PPSM) database. If the list of authorized sources and destinations is not available, this is a finding. Review the firewall configuration for each of the configured outbound zones and interfaces. Verify a security policy is applied to each outbound zone/interface, including the management interface. If an egress filter is not configured for each active outbound zone or interface, this is a finding.
Fix: F-6961r297892_fix
Configure a security policy to each outbound zone and/or interface to implement continuous filtering of outbound traffic. Apply security policy zones/interfaces (including the management interface) through which outbound traffic flows to untrusted external networks or subnetworks.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-FW-000035
- Vuln IDs
-
- V-206707
- V-79477
- Rule IDs
-
- SV-206707r604133_rule
- SV-94183
Checks: C-6964r297900_chk
Review the firewall configuration to verify that it is blocking all outbound management traffic. If the firewall is not blocking management network from leaking to outside networks, this is a finding.
Fix: F-6964r297901_fix
With the exception of management traffic destined to perimeter equipment, configure a firewall located behind the premise router to block all outbound management traffic.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-FW-000036
- Vuln IDs
-
- V-206708
- V-79479
- Rule IDs
-
- SV-206708r604133_rule
- SV-94185
Checks: C-6965r297903_chk
Inspect the architecture diagrams. Inspect the NOC and the managed network. Note that the IPsec tunnel endpoints may be configured on the premise or gateway router, the VPN gateway firewall, or a VPN concentrator. Verify that all traffic between the managed network and management network and vice-versa is secured via IPsec encapsulation. If the firewall does not restrict traffic entering the VPN tunnels to the management network to only the authorized management packets based on destination address, this is a finding.
Fix: F-6965r297904_fix
Where IPsec technology is deployed to connect the managed network to the NOC, restrict the traffic entering the tunnels so that only the authorized management packets with authorized destination addresses are permitted.
- RMF Control
- SI-4
- Severity
- L
- CCI
- CCI-002664
- Version
- SRG-NET-000392-FW-000042
- Vuln IDs
-
- V-206711
- V-79489
- Rule IDs
-
- SV-206711r604133_rule
- SV-94195
Checks: C-6968r297912_chk
If a network device such as the events, network management, or SNMP server is configured to send an alert when DoS incidents are detected, this is not a finding. Verify the firewall is configured to send an alert via instant message, email, SNMP, or another authorized method to the ISSO, ISSM, and other identified personnel when DoS incidents are detected. If the firewall is not configured to send an alert via an approved and immediate method when DoS incidents are detected, this is a finding.
Fix: F-6968r297913_fix
Configure the firewall (or another network device) to send an alert via instant message, email, or another authorized method to the ISSO and ISSM and other identified personnel when DoS incidents are detected.
- RMF Control
- AU-14
- Severity
- M
- CCI
- CCI-001462
- Version
- SRG-NET-000399-FW-000008
- Vuln IDs
-
- V-206712
- V-79433
- Rule IDs
-
- SV-206712r604133_rule
- SV-94139
Checks: C-6969r297915_chk
View the documented process for packet capture. Verify the firewall allows authorized users to perform a packet capture based on IP, traffic type (TCP, UDP, or ICMP), or protocol. If the firewall is not configured to allow authorized users to capture, record, and log all content related to a user session, this is a finding.
Fix: F-6969r297916_fix
Document a process for authorized users to capture, record, and log all content based on IP, traffic type (TCP, UDP, or ICMP), or protocol.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-NET-000492-FW-000006
- Vuln IDs
-
- V-206713
- V-79429
- Rule IDs
-
- SV-206713r604133_rule
- SV-94135
Checks: C-6970r297918_chk
View the configuration of the firewall or the central audit server log records. Verify the firewall generates traffic log records when traffic is denied, restricted, or discarded. If the firewall does not generate traffic log records for events when traffic is denied, restricted, or discarded, this is a finding.
Fix: F-6970r297919_fix
Configure the firewall central audit server stanza to generate traffic log records for events when traffic is denied, restricted, or discarded.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-NET-000493-FW-000007
- Vuln IDs
-
- V-206714
- V-79431
- Rule IDs
-
- SV-206714r604133_rule
- SV-94137
Checks: C-6971r297921_chk
View the configuration of the firewall or the central audit server log records. Verify the firewall generates traffic log records when attempts are made to send packets between security zones that are not authorized to communicate. If the firewall does not generate traffic log records when attempts are made to send packets between security zones that are not authorized to communicate, this is a finding.
Fix: F-6971r297922_fix
Configure the firewall central audit server stanza to generate traffic log records when attempts are made to send packets between security zones that are not authorized to communicate.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000364-FW-000040
- Vuln IDs
-
- V-223011
- V-101103
- Rule IDs
-
- SV-223011r604133_rule
- SV-110207
Checks: C-24683r457848_chk
Review the firewall configuration to verify that inspection for applications deployed within the network is being performed on all interfaces. If the firewall is not configured to inspect all inbound and outbound traffic at the application layer, this is a finding.
Fix: F-24672r457849_fix
Configure the firewall to inspect all inbound and outbound traffic at the application layer.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000364-FW-000041
- Vuln IDs
-
- V-223012
- V-101105
- Rule IDs
-
- SV-223012r604133_rule
- SV-110209
Checks: C-24684r457851_chk
Review the firewall configuration to verify that IPv6 inspection is being performed on all interfaces. If the firewall is not configujred to inspect all inbound and outbound IPv6 traffic for unknown or out-of-order extension headers, this is a finding.
Fix: F-24673r457853_fix
Configure the firewall to inspect all inbound and outbound traffic at the application layer.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000364-FW-000042
- Vuln IDs
-
- V-223013
- V-101107
- Rule IDs
-
- SV-223013r604133_rule
- SV-110211
Checks: C-24686r457855_chk
Review the firewall configuration to verify uRPF or an egress filter has been configured on all internal interfaces to restrict the firewall from accepting outbound packets that contain an illegitimate address in the source address field. If uRPF or an egress ACL to restrict the firewall from accepting outbound IP packets that contain an illegitimate address in the source address field has not been configured on all internal interfaces, this is a finding.
Fix: F-24674r457856_fix
Configure the firewall with an egress filter or uRPF on all internal interfaces to restrict the firewall from accepting any outbound packet that contains an illegitimate address in the source field.