Firewall Security Requirements Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates −1
Comparison against the immediately-prior release (V3R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Removed rules 1
- V-206684 Medium In the event that communication with the central audit server is lost, the firewall must continue to queue traffic log records locally.
- RMF Control
- AC-4
- Severity
- H
- CCI
- CCI-001414
- Version
- SRG-NET-000019-FW-000003
- Vuln IDs
-
- V-206674
- V-79409
- Rule IDs
-
- SV-206674r604133_rule
- SV-94115
Checks: C-6931r297801_chk
Verify the firewall is configured to use filters to restrict or block information system services based on best practices, known threats, and guidance in the Ports, Protocols, Services Management (PPSM) database regarding restrictions for boundary crossing for ports, protocols, and services. If the firewall cannot be configured with filters that employ packet header and packet attributes, including source and destination IP addresses and ports, to prevent the flow of unauthorized or suspicious traffic between interconnected networks with different security policies, this is a finding.
Fix: F-6931r297802_fix
Configure filters in the firewall to examine characteristics of incoming and outgoing packets, including but not limited to the following: - Bit fields in the packet header, including IP fragmentation flags, IP options, and TCP flags - IP version 4 (IPv4) numeric range, including destination port, DiffServ code point (DSCP) value, fragment offset, Internet Control Message Protocol (ICMP) code, ICMP packet type, interface group, IP precedence, packet length, protocol, and TCP and UDP source and destination port - IP version 6 (IPv6) numeric range, including class of service (CoS) priority, destination address, destination port, ICMP code, ICMP packet type, interface group, IP address, next header, packet length, source address, source port, and TCP and UDP source and destination port - Source and destination address and prefix list
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-NET-000019-FW-000004
- Vuln IDs
-
- V-206675
- V-79427
- Rule IDs
-
- SV-206675r604133_rule
- SV-94133
Checks: C-6932r297804_chk
Verify the firewall immediately uses updates made to policy enforcement mechanisms such as firewall rules, security policies, and security zones. For example, there is no need to reinitialize or reboot or the action to commit the changes is prompted. If the firewall does not immediately use updates made to policy enforcement mechanisms such as firewall rules, security policies, and security zones, this is a finding.
Fix: F-6932r297805_fix
Require system administrators to commit and test changes upon configuration of the firewall.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- SRG-NET-000061-FW-000001
- Vuln IDs
-
- V-206676
- V-79423
- Rule IDs
-
- SV-206676r604133_rule
- SV-94129
Checks: C-6933r297807_chk
Review the firewall configuration statements used to create a group policy with filtering rules for remote clients accessing the network using a VPN. Verify both ingress and egress traffic on this interface is subject to the remote access policy and filtering rules required by the organization. If the firewall is used to filter traffic from the VPN access points but is not configured with filtering rules that apply to the monitoring of remote access traffic, this is a finding.
Fix: F-6933r297808_fix
Configure a group policy for remote clients and apply to the interface that is connected to allow ingress and egress to the VPN access points.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SRG-NET-000074-FW-000009
- Vuln IDs
-
- V-206678
- V-79435
- Rule IDs
-
- SV-206678r604133_rule
- SV-94141
Checks: C-6935r297813_chk
Examine the traffic log configuration on the firewall or view several alert events on the organization's central audit server. Verify the entries sent to the traffic log include sufficient information to determine the type or category for each event in the traffic log. If the traffic log entries do not include enough information to determine what type of event occurred, this is a finding.
Fix: F-6935r297814_fix
Configure the firewall to ensure entries sent to the traffic log include sufficient information to determine the type or category for each event in the traffic log.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000131
- Version
- SRG-NET-000075-FW-000010
- Vuln IDs
-
- V-206679
- V-79437
- Rule IDs
-
- SV-206679r604133_rule
- SV-94143
Checks: C-6936r297816_chk
Examine the traffic log configuration on the firewall or view several alert events on the organization's central audit server. Verify the entries sent to the traffic log include the date and time of each event. If the traffic log entries do not include the date and time the event occurred, this is a finding.
Fix: F-6936r297817_fix
Configure the firewall to ensure entries sent to the traffic log include the date and time of the event.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000132
- Version
- SRG-NET-000076-FW-000011
- Vuln IDs
-
- V-206680
- V-79439
- Rule IDs
-
- SV-206680r604133_rule
- SV-94145
Checks: C-6937r297819_chk
Examine the traffic log configuration on the firewall or view several alert events on the organization's central audit server. Verify the entries sent to the traffic log include the location of each event (e.g., network name, network subnet, port, or network segment). If the traffic log entries do not include the event location, this is a finding.
Fix: F-6937r297820_fix
Configure the firewall to ensure entries sent to the traffic log include the location of each event (e.g., network name, network subnet, network segment, or port).
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000133
- Version
- SRG-NET-000077-FW-000012
- Vuln IDs
-
- V-206681
- V-79441
- Rule IDs
-
- SV-206681r604133_rule
- SV-94147
Checks: C-6938r297822_chk
Examine the traffic log configuration on the firewall or view several alert events on the organization's central audit server. Verify the entries sent to the traffic log include sufficient information to ascertain the source of the events (e.g., IP address, session, or packet ID). If the traffic log entries do not include sufficient information to ascertain the source of the events, this is a finding.
Fix: F-6938r297823_fix
Configure the firewall implementation to ensure entries sent to the traffic log include sufficient information to ascertain the source of each event (e.g., IP address, session, or packet ID).
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- SRG-NET-000078-FW-000013
- Vuln IDs
-
- V-206682
- V-79443
- Rule IDs
-
- SV-206682r604133_rule
- SV-94149
Checks: C-6939r297825_chk
Examine the traffic log configuration on the firewall or view several alert events on the organization's central audit server. Verify the entries sent to the traffic log include sufficient information to ascertain the outcome of the firewall rules. Verify that, at a minimum, the success or failure of the event is evented. If the traffic log entries do not include sufficient information to ascertain the outcome of the application of the firewall rules, this is a finding. If the traffic log entries do not include the success or failure of the application of the firewall rules, this is a finding.
Fix: F-6939r297826_fix
Configure the firewall to generate traffic log entries containing information to establish the outcome of the events, such as, at a minimum, the success or failure of the application of the firewall rule.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000098-FW-000021
- Vuln IDs
-
- V-206685
- V-79453
- Rule IDs
-
- SV-206685r604133_rule
- SV-94159
Checks: C-6942r457833_chk
Review the firewall configuration and verify that it is configure to use TCP. If the firewall is not configured to use TCP when sending log records to the central audit server, this is a finding.
Fix: F-6942r457834_fix
Configure the firewall to use TCP when sending log records to the central audit server.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- SRG-NET-000099-FW-000161
- Vuln IDs
-
- V-206687
- V-79457
- Rule IDs
-
- SV-206687r604133_rule
- SV-94163
Checks: C-6944r297840_chk
Verify the firewall's fine-grained permissions are configured to prevent unauthorized modification of local log records. If the firewall does not protect traffic log records from unauthorized modification while stored locally, this is a finding.
Fix: F-6944r297841_fix
Validate the firewall includes a baseline cryptographic module that provides confidentiality and integrity services for authentication and for protecting communications with adjacent systems. Configure role-based, fine-grained permissions management for controlling commands needed to modify log records.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- SRG-NET-000100-FW-000023
- Vuln IDs
-
- V-206688
- V-79459
- Rule IDs
-
- SV-206688r604133_rule
- SV-94165
Checks: C-6945r297843_chk
Verify the firewall's fine-grained permissions are configured to prevent unauthorized deletion of local log files or log records. If the firewall does not protect traffic log records and log files from unauthorized deletion while stored locally, this is a finding.
Fix: F-6945r297844_fix
Validate the firewall includes a baseline cryptographic module that provides confidentiality and integrity services for authentication and for protecting communications with adjacent systems. Configure role-based, fine-grained permissions management for controlling commands needed to delete log files and records.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-NET-000131-FW-000025
- Vuln IDs
-
- V-206690
- V-79461
- Rule IDs
-
- SV-206690r604133_rule
- SV-94167
Checks: C-6947r297849_chk
Review the documentation and architecture for the device or check the system-installed licenses or services. Determine what services and functions are installed on the firewall. Compare installed services and functions to the documentation showing the approved services. If unneeded services and functions are installed on the device but are not part of the documented role of the device, this is a finding.
Fix: F-6947r297850_fix
Display and remove unnecessary licenses, services, and functions from the firewall. Examples include NTP, DNS, and DHCP. Note: Only remove unauthorized services. This control is not intended to restrict the use of network devices with multiple authorized roles.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001094
- Version
- SRG-NET-000192-FW-000029
- Vuln IDs
-
- V-206692
- V-79419
- Rule IDs
-
- SV-206692r604133_rule
- SV-94125
Checks: C-6949r297855_chk
Obtain and review the list of outbound interfaces and zones from site personnel. Review each of the configured outbound interfaces and zones. Verify zones that communicate outbound have been configured with the DoS firewall filter (i.e., rules, access control lists [ACLs], screens, or policies) such as IP sweeps, TCP sweeps, buffer overflows, unauthorized port scanning, SYN floods, UDP floods, and UDP sweeps. If all outbound interfaces are not configured to block DoS attacks, this is a finding.
Fix: F-6949r297856_fix
Associate a properly configured DoS firewall filter (e.g., rules, access control lists [ACLs], screens, or policies) to outbound interfaces and security zones. Apply a firewall filter to each outbound interface example: set security zones security-zone untrust interfaces <OUTBOUND-INTERFACE> set security zones security-zone trust screen untrust-screen
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001095
- Version
- SRG-NET-000193-FW-000030
- Vuln IDs
-
- V-206693
- V-79421
- Rule IDs
-
- SV-206693r604133_rule
- SV-94127
Checks: C-6950r297858_chk
Use the "show" command to verify that all inbound interfaces have a stateless firewall filter to set rate limits based on a destination. If the firewall does not have a stateless firewall filter that sets rate limits based on a destination, this is a finding.
Fix: F-6950r297859_fix
Configure a stateless firewall filter to set rate limits based on a destination of the packets. Apply the stateless firewall filter to all inbound interfaces.
- RMF Control
- SC-7
- Severity
- H
- CCI
- CCI-001109
- Version
- SRG-NET-000202-FW-000039
- Vuln IDs
-
- V-206694
- V-79415
- Rule IDs
-
- SV-206694r604133_rule
- SV-94121
Checks: C-6951r297861_chk
Determine the default security policies on the firewall for traffic from one zone to another zone (inter-zone). The default policy must be a "Deny" policy that blocks all inter-zone traffic by default. Ensure no policy that circumvents the default "Deny" inter-zone policy is allowed. Traffic through the firewall is filtered so that only the specific traffic that is approved and registered in the PPSM CAL and VAs for the enclave. Verify rules or access control statements containing "any" for either the host, destination, protocol, or port are not used. If the firewall does not deny all network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception), this is a finding.
Fix: F-6951r297862_fix
Configure the firewall with a "Deny" inter-zone policy which, by default, blocks traffic between zones and allows network communications traffic by exception (i.e., deny all, permit by exception) in accordance with PPSM CAL and VAs for the enclave.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000205-FW-000040
- Vuln IDs
-
- V-206695
- V-79485
- Rule IDs
-
- SV-206695r604133_rule
- SV-94191
Checks: C-6952r297864_chk
Review the perimeter firewall to verify it filters traffic destined to the internal enclave in accordance with the guidelines contained in the PPSM CAL and VAs for the enclave. If the perimeter firewall does not filter traffic destined to the internal enclave in accordance with the guidelines contained in the PPSM CAL and VAs for the enclave, this is a finding.
Fix: F-6952r297865_fix
Configure the perimeter firewall to filter traffic destined to the internal enclave in accordance with the guidelines contained in the PPSM CAL and VAs for the enclave.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- SRG-NET-000235-FW-000133
- Vuln IDs
-
- V-206696
- V-79463
- Rule IDs
-
- SV-206696r604133_rule
- SV-94169
Checks: C-6953r457836_chk
Verify the firewall stops forwarding traffic or maintains the configured security policies upon the failure of the following: system initialization, shutdown, or system abort. If the firewall does not stop forwarding traffic or maintain the configured security policies upon the failure of system initialization, shutdown, or system abort, this is a finding.
Fix: F-6953r457837_fix
Configure the firewall to stop forwarding traffic or maintain the configured security policies upon the failure of the following actions: system initialization, shutdown, or system abort.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001665
- Version
- SRG-NET-000236-FW-000027
- Vuln IDs
-
- V-206698
- V-79465
- Rule IDs
-
- SV-206698r604133_rule
- SV-94171
Checks: C-6955r297873_chk
View the firewall failover configuration or system documentation. Verify that in the event of a system failure of the firewall function, the firewall saves diagnostic information, logs system messages, and loads the most current security policies, rules, and signatures. Testing of this functionality in a production environment is not recommended. If in the event of a system failure of the firewall function the firewall does not save diagnostic information, log system messages, and load the most current security policies, rules, and signatures when restarted, this is a finding.
Fix: F-6955r297874_fix
Configure the firewall to fail securely in the event of a transiently corrupt state or failure condition. When the system restarts, the system boot process must not succeed without passing all self-tests for cryptographic algorithms, RNG tests, and software integrity tests.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- SRG-NET-000333-FW-000014
- Vuln IDs
-
- V-206699
- V-79445
- Rule IDs
-
- SV-206699r953982_rule
- SV-94151
Checks: C-6956r297876_chk
Examine the traffic log configuration on the firewall. Verify the firewall is configured to send traffic log entries to the organization's central audit server. If the firewall is not configured to send traffic log entries to the organization's central audit server, this is a finding.
Fix: F-6956r297877_fix
Configure the firewall to ensure traffic log entries are transmitted to the organization's central audit server (e.g., syslog server).
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001858
- Version
- SRG-NET-000335-FW-000017
- Vuln IDs
-
- V-206700
- V-79447
- Rule IDs
-
- SV-206700r855863_rule
- SV-94153
Checks: C-6957r297879_chk
If a network device such as the events, network management, or SNMP server is configured to send an alert when communication is lost with the central audit server, this is not a finding. Verify the firewall is configured to send an alert via instant message, email, SNMP, or another authorized method to the SCA, ISSO, and other identified personnel when communication is lost with the central audit server. If the firewall is not configured to send an immediate alert via an approved method when communication is lost with the central audit server, this is a finding.
Fix: F-6957r297880_fix
Configure the firewall (or another network device) to send an alert via instant message, email, or another authorized method to the SCA, ISSO, and other identified personnel for any log failure event where the filtering functions are unable to write events to the central audit server.
- RMF Control
- SC-5
- Severity
- H
- CCI
- CCI-002385
- Version
- SRG-NET-000362-FW-000028
- Vuln IDs
-
- V-206701
- V-79413
- Rule IDs
-
- SV-206701r855864_rule
- SV-94119
Checks: C-6958r297882_chk
View the security filters for each interface or security zone. Verify DoS filters are configured to detect and prevent known DoS attacks such as IP sweeps, TCP sweeps, buffer overflows, unauthorized port scanning, SYN floods, UDP floods, and UDP sweeps. If filters are not configured or if the security zone is not configured with filters that guard against common DoS attacks, this is a finding.
Fix: F-6958r297883_fix
Configure the firewall to detect and prevent DoS attacks. Implement filters with thresholds that are customized for the specific environment where applicable. DoS filters are based on NIST 800-53 requirements and vendor recommendations. The following sample commands show filters that implement this requirement (these are examples only): set filter1 icmp ip-sweep threshold 1000 set filter2 tcp port-scan threshold 1000 set filter3 tcp syn-flood alarm-threshold 1000 set filter3 tcp syn-flood attack-threshold 1100 set filter4 tcp syn-flood source-threshold 100 set filter5 tcp syn-flood destination-threshold 2048 set filter6 tcp syn-flood timeout 20 set filter7 tcp tcp-sweep threshold 1000 set filter8 udp flood threshold 5000 set filter9 udp udp-sweep threshold 1000
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-FW-000031
- Vuln IDs
-
- V-206703
- V-79469
- Rule IDs
-
- SV-206703r855865_rule
- SV-94175
Checks: C-6960r297888_chk
Obtain and review the list of authorized sources and destinations. This is usually part of the System Design Specification, Accreditation or Authorization Package, ports, protocols, and services documentation, and Ports, Protocols, and Services Management (PPSM) database. If the list of authorized sources and destinations is not available, this is a finding. Review the firewall configuration for each of the configured inbound zones and interfaces. Verify an ingress filter (e.g., Access Control List) is applied to each inbound zone/interface, including the management interface. Verify ingress filters for the management interface to block all transit traffic (i.e., any traffic not destined to the firewall itself). Verify that traffic accessing the firewall originates from the Network Operations Center (NOC). If an ingress filter is not configured for each active inbound zone or interface, this is a finding.
Fix: F-6960r297889_fix
Configure a security policy to each inbound zone and/or interface to implement continuous filtering of outbound traffic. Apply security policy zones/interfaces through which inbound traffic flows from untrusted external networks or subnetworks. Configure the ingress filters for the management interface to block all transit traffic (i.e., any traffic not destined to the firewall itself) and so that traffic accessing the firewall originates from the NOC.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-FW-000032
- Vuln IDs
-
- V-206704
- V-79471
- Rule IDs
-
- SV-206704r855866_rule
- SV-94177
Checks: C-6961r297891_chk
Obtain and review the list of authorized sources and destinations. This is usually part of the System Design Specification, Accreditation or Authorization Package, ports, protocols, and services documentation, and Ports, Protocols, and Services Management (PPSM) database. If the list of authorized sources and destinations is not available, this is a finding. Review the firewall configuration for each of the configured outbound zones and interfaces. Verify a security policy is applied to each outbound zone/interface, including the management interface. If an egress filter is not configured for each active outbound zone or interface, this is a finding.
Fix: F-6961r297892_fix
Configure a security policy to each outbound zone and/or interface to implement continuous filtering of outbound traffic. Apply security policy zones/interfaces (including the management interface) through which outbound traffic flows to untrusted external networks or subnetworks.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-FW-000035
- Vuln IDs
-
- V-206707
- V-79477
- Rule IDs
-
- SV-206707r855867_rule
- SV-94183
Checks: C-6964r297900_chk
Review the firewall configuration to verify that it is blocking all outbound management traffic. If the firewall is not blocking management network from leaking to outside networks, this is a finding.
Fix: F-6964r297901_fix
With the exception of management traffic destined to perimeter equipment, configure a firewall located behind the premise router to block all outbound management traffic.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-FW-000036
- Vuln IDs
-
- V-206708
- V-79479
- Rule IDs
-
- SV-206708r855868_rule
- SV-94185
Checks: C-6965r297903_chk
Inspect the architecture diagrams. Inspect the NOC and the managed network. Note that the IPsec tunnel endpoints may be configured on the premise or gateway router, the VPN gateway firewall, or a VPN concentrator. Verify that all traffic between the managed network and management network and vice-versa is secured via IPsec encapsulation. If the firewall does not restrict traffic entering the VPN tunnels to the management network to only the authorized management packets based on destination address, this is a finding.
Fix: F-6965r297904_fix
Where IPsec technology is deployed to connect the managed network to the NOC, restrict the traffic entering the tunnels so that only the authorized management packets with authorized destination addresses are permitted.
- RMF Control
- SI-4
- Severity
- L
- CCI
- CCI-002664
- Version
- SRG-NET-000392-FW-000042
- Vuln IDs
-
- V-206711
- V-79489
- Rule IDs
-
- SV-206711r971533_rule
- SV-94195
Checks: C-6968r297912_chk
If a network device such as the events, network management, or SNMP server is configured to send an alert when DoS incidents are detected, this is not a finding. Verify the firewall is configured to send an alert via instant message, email, SNMP, or another authorized method to the ISSO, ISSM, and other identified personnel when DoS incidents are detected. If the firewall is not configured to send an alert via an approved and immediate method when DoS incidents are detected, this is a finding.
Fix: F-6968r297913_fix
Configure the firewall (or another network device) to send an alert via instant message, email, or another authorized method to the ISSO and ISSM and other identified personnel when DoS incidents are detected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-NET-000492-FW-000006
- Vuln IDs
-
- V-206713
- V-79429
- Rule IDs
-
- SV-206713r604133_rule
- SV-94135
Checks: C-6970r297918_chk
View the configuration of the firewall or the central audit server log records. Verify the firewall generates traffic log records when traffic is denied, restricted, or discarded. If the firewall does not generate traffic log records for events when traffic is denied, restricted, or discarded, this is a finding.
Fix: F-6970r297919_fix
Configure the firewall central audit server stanza to generate traffic log records for events when traffic is denied, restricted, or discarded.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-NET-000493-FW-000007
- Vuln IDs
-
- V-206714
- V-79431
- Rule IDs
-
- SV-206714r604133_rule
- SV-94137
Checks: C-6971r297921_chk
View the configuration of the firewall or the central audit server log records. Verify the firewall generates traffic log records when attempts are made to send packets between security zones that are not authorized to communicate. If the firewall does not generate traffic log records when attempts are made to send packets between security zones that are not authorized to communicate, this is a finding.
Fix: F-6971r297922_fix
Configure the firewall central audit server stanza to generate traffic log records when attempts are made to send packets between security zones that are not authorized to communicate.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000364-FW-000040
- Vuln IDs
-
- V-223011
- V-101103
- Rule IDs
-
- SV-223011r604133_rule
- SV-110207
Checks: C-24683r457848_chk
Review the firewall configuration to verify that inspection for applications deployed within the network is being performed on all interfaces. If the firewall is not configured to inspect all inbound and outbound traffic at the application layer, this is a finding.
Fix: F-24672r457849_fix
Configure the firewall to inspect all inbound and outbound traffic at the application layer.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000364-FW-000041
- Vuln IDs
-
- V-223012
- V-101105
- Rule IDs
-
- SV-223012r604133_rule
- SV-110209
Checks: C-24684r457851_chk
Review the firewall configuration to verify that IPv6 inspection is being performed on all interfaces. If the firewall is not configujred to inspect all inbound and outbound IPv6 traffic for unknown or out-of-order extension headers, this is a finding.
Fix: F-24673r457853_fix
Configure the firewall to inspect all inbound and outbound traffic at the application layer.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000364-FW-000042
- Vuln IDs
-
- V-223013
- V-101107
- Rule IDs
-
- SV-223013r604133_rule
- SV-110211
Checks: C-24686r457855_chk
Review the firewall configuration to verify uRPF or an egress filter has been configured on all internal interfaces to restrict the firewall from accepting outbound packets that contain an illegitimate address in the source address field. If uRPF or an egress ACL to restrict the firewall from accepting outbound IP packets that contain an illegitimate address in the source address field has not been configured on all internal interfaces, this is a finding.
Fix: F-24674r457856_fix
Configure the firewall with an egress filter or uRPF on all internal interfaces to restrict the firewall from accepting any outbound packet that contains an illegitimate address in the source field.
- RMF Control
- Severity
- M
- CCI
- CCI-004866
- Version
- SRG-NET-000705-FW-000110
- Vuln IDs
-
- V-263647
- Rule IDs
-
- SV-263647r982104_rule
Checks: C-67547r982102_chk
Verify the firewall is configured to employ organization-defined controls by type of DoS to achieve the DoS objective. If the firewall is not configured to employ organization-defined controls by type of DoS to achieve the DoS objective, this is a finding.
Fix: F-67455r982103_fix
Configure the firewall to employ organization-defined controls by type of DoS to achieve the DoS objective.
- RMF Control
- Severity
- M
- CCI
- CCI-004891
- Version
- SRG-NET-000715-FW-000120
- Vuln IDs
-
- V-263648
- Rule IDs
-
- SV-263648r982549_rule
Checks: C-67548r982548_chk
Verify the firewall is configured to implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions. If the firewall is not configured to implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions, this is a finding.
Fix: F-67456r982106_fix
Configure the firewall to implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions.
- RMF Control
- Severity
- M
- CCI
- CCI-004931
- Version
- SRG-NET-000760-FW-000160
- Vuln IDs
-
- V-263649
- Rule IDs
-
- SV-263649r982551_rule
Checks: C-67549r982550_chk
Verify the firewall is configured to establish organization-defined alternate communications paths for system operations organizational command and control. If the firewall is not configured to establish organization-defined alternate communications paths for system operations organizational command and control, this is a finding.
Fix: F-67457r982109_fix
Configure the firewall to establish organization-defined alternate communications paths for system operations organizational command and control.