Select any two versions of this STIG to compare the individual requirements
Select any old version/release of this STIG to view the previous requirements
Verify the Voice Video Endpoint registers with a Voice Video Session Manager. If the Voice Video Endpoint does not registers with a Voice Video Session Manager, this is a finding.
Configure the Voice Video Endpoint to register with a Voice Video Session Manager.
Verify the Voice Video Endpoint dynamically implements configuration file changes. If the Voice Video Endpoint does not dynamically implement configuration file changes, this is a finding.
Configure the Voice Video Endpoint to dynamically implement configuration file changes.
If the Voice Video Endpoint is a hardware endpoint, this is Not Applicable. If the Voice Video Endpoint is a Unified Capabilities (UC) or Video Conferencing (VC) software client, verify the Voice Video Endpoint displays the Standard Mandatory DoD Notice and Consent Banner before granting access to the network. If the Voice Video Endpoint does not display the Standard Mandatory DoD Notice and Consent Banner before granting access to the network, this is a finding.
Configure the Unified Capabilities (UC) or Video Conferencing (VC) software client Voice Video Endpoint to display the Standard Mandatory DoD Notice and Consent Banner before granting access to the network.
If the Voice Video Endpoint is a hardware endpoint, this is Not Applicable. If the Voice Video Endpoint is a Unified Capabilities (UC) or Video Conferencing (VC) software client, verify the Voice Video Endpoint retains the Standard Mandatory DoD Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access. If the Voice Video Endpoint does not retain the Standard Mandatory DoD Notice and Consent Banner on the screen until users take explicit actions to log on for further access, this is a finding.
Configure the Unified Capabilities (UC) or Video Conferencing (VC) software client Voice Video Endpoint to retain the Standard Mandatory DoD Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access.
Verify the Voice Video Endpoint limits the number of concurrent sessions to two users. Local policy may justify and increase the limit on concurrent user sessions to a number higher than two. If the Voice Video Endpoint does not limit the number of concurrent sessions to two users, or the limit set by local policy, this is a finding.
Configure the Voice Video Endpoint to limit the number of concurrent sessions to two users or the limit set by local policy.
If the Voice Video Endpoint is not a hardware endpoint, this check procedure is Not Applicable. Verify the hardware Voice Video Endpoint PC port maintains VLAN separation from the voice video VLAN or is disabled. For networks with both VoIP and videoconferencing, best practice is to have a separate voice VLAN and video VLAN. If the hardware Voice Video Endpoint PC port is disabled, this is not a finding. If the hardware Voice Video Endpoint PC port does not maintain VLAN separation from the voice video VLAN, this is a finding.
Configure the hardware Voice Video Endpoint PC port to maintain VLAN separation from the voice video VLAN or be disabled.
If the Voice Video Endpoint relies exclusively on the Voice Video Session Manager for session records and does not have any capability for generating session records, this check procedure is Not Applicable. Verify the Voice Video Endpoint produces session records containing what type of connection occurred. The record must include the session type (voice/direct, voice/conference, video/direct, video/conference, etc.), the specific protocols used for control and media traffic (SIP/SRTP, H.323, etc.), and the type of endpoint (mobile, telephone, codec, etc.). If the Voice Video Endpoint does not produce session records containing what type of connection occurred, this is a finding.
Configure the Voice Video Endpoint to produce session records containing what type of connection occurred.
If the Voice Video Endpoint relies exclusively on the Voice Video Session Manager for session records and does not have any capability for generating session records, this check procedure is Not Applicable. Verify the Voice Video Endpoint produces session records containing when the connection occurred. The record must include session start/join/leave/stop times. If the Voice Video Endpoint does not produce session records containing the date and time when the connection occurred, this is a finding.
Configure the Voice Video Endpoint to produce session records containing the date and time when the connection occurred.
If the Voice Video Endpoint relies exclusively on the Voice Video Session Manager for session records and does not have any capability for generating session records, this check procedure is Not Applicable. Verify the Voice Video Endpoint produces session records containing where the connection occurred. The record must include IP addresses and port numbers. If the Voice Video Endpoint does not produce session records containing where the connection occurred, this is a finding.
Configure the Voice Video Endpoint to produce session records containing where the connection occurred.
If the Voice Video Endpoint relies exclusively on the Voice Video Session Manager for session records and does not have any capability for generating session records, this check procedure is Not Applicable. Verify the Voice Video Endpoint produces session records containing the outcome of the connection. Outcomes of the connection would include call completed, conference completed, destination busy, network busy, etc. If the Voice Video Endpoint does not produce session records containing the outcome of the connection, this is a finding.
Configure the Voice Video Endpoint to produce session records containing the outcome of the connection.
If the Voice Video Endpoint relies exclusively on the Voice Video Session Manager for session records and does not have any capability for generating session records, this check procedure is Not Applicable. Verify the Voice Video Endpoint produces session records containing the identity of all users on the call. If the Voice Video Endpoint does not produce session records containing the identity of all users on the call, this is a finding.
Configure the Voice Video Endpoint to produce session records containing the identity of all users on the call.
If the Voice Video Endpoint relies exclusively on the Voice Video Session Manager for session records and does not have any capability for generating session records, this check procedure is Not Applicable. Verify the Voice Video Endpoint provides session record generation capability. If the Voice Video Endpoint does not provide session record generation capability, this is a finding.
Configure the Voice Video Endpoint to provide session record generation capability.
Verify the Voice Video Endpoint is configured to disable or remove non-essential capabilities. Non-essential capabilities would include peer services and other functions not directly pertaining to Voice Video Endpoint functionality. If the Voice Video Endpoint cannot be configured to disable or remove non-essential capabilities, this is a finding.
Configure the Voice Video Endpoint to disable or remove non-essential capabilities.
Verify the Voice Video Endpoint only uses ports, protocols, and services allowed per the PPSM CAL and VAs. If the Voice Video Endpoint uses ports, protocols, and services not allowed per the PPSM CAL and VAs, this is a finding.
Configure the Voice Video Endpoint to only use ports, protocols, and services allowed per the PPSM CAL and VAs.
Verify the Voice Video Endpoint used for videoconferencing uniquely identifies participating users. Identification must be visible and displayed locally. If the Voice Video Endpoint used for videoconferencing does not uniquely identify participating users, this is a finding.
Configure the Voice Video Endpoint used for videoconferencing to uniquely identify participating users.
If the Voice Video Endpoint is a hardware endpoint, this check procedure is Not Applicable. Verify the Voice Video Endpoint used for videoconferencing uses multifactor authentication for network access. If the Voice Video Endpoint used for videoconferencing does not use multifactor authentication for network access, this is a finding.
Configure the Voice Video Endpoint used for videoconferencing to use multifactor authentication for network access.
Verify the Voice Video Endpoint implements replay-resistant authentication mechanisms for network access. If the Voice Video Endpoint does not implement replay-resistant authentication mechanisms for network access, this is a finding.
Configure the Voice Video Endpoint to implement replay-resistant authentication mechanisms for network access.
If the Voice Video Endpoint is not a hardware endpoint, this check procedure is Not Applicable. Verify the hardware Voice Video Endpoint using SIP or AS-SIP signaling prevents cross-site scripting attacks caused by improper filtering or validation of the content of SIP invitation fields. If the hardware Voice Video Endpoint does not use SIP or AS-SIP, this is not a finding. If the hardware Voice Video Endpoint does not prevent cross-site scripting attacks caused by improper filtering or validation of the content of SIP invitation fields, this is a finding.
Configure the hardware Voice Video Endpoint using SIP or AS-SIP signaling to prevent cross-site scripting attacks caused by improper filtering or validation of the content of SIP invitation fields.
Verify the Voice Video Endpoint used for videoconferencing, when using PKI-based authentication, validates certificates by constructing a certification path to an accepted trust anchor. The constructed certification path must include status information. If the Voice Video Endpoint used for videoconferencing, when using PKI-based authentication, does not validate certificates by constructing a certification path that includes status information to an accepted trust anchor, this is a finding.
Configure the Voice Video Endpoint used for videoconferencing, when using PKI-based authentication, to validate certificates by constructing a certification path, including status information, to an accepted trust anchor.
Verify the Voice Video Endpoint, when using PKI-based authentication, enforces authorized access only to the corresponding private key. If the Voice Video Endpoint, when using PKI-based authentication, does not enforce authorized access to the corresponding private key, this is a finding.
Configure the Voice Video Endpoint, when using PKI-based authentication, to enforce authorized access to the corresponding private key.
Verify the Voice Video Endpoint prevents unauthorized and unintended information transfer via shared system resources. If the Voice Video Endpoint does not prevent unauthorized and unintended information transfer via shared system resources, this is a finding.
Configure the Voice Video Endpoint to prevent unauthorized and unintended information transfer via shared system resources.
Verify the Voice Video Endpoint terminates all network connections associated with a communications session at the end of the session. If the Voice Video Endpoint does not terminate all network connections associated with a communications session at the end of the session, this is a finding.
Configure the Voice Video Endpoint to terminate all network connections associated with a communications session at the end of the session.
If the Voice Video Endpoint is not a hardware endpoint, this check procedure is Not Applicable. Verify that in the event of device failure, the hardware Voice Video Endpoint preserves any information necessary to determine cause of failure and return to operations with least disruption to service. If the hardware Voice Video Endpoint does not preserve any information necessary to determine cause of failure, this is a finding. If the hardware Voice Video Endpoint does not return to operations with least disruption to service after device failure, this is a finding.
Configure the hardware Voice Video Endpoint, in the event of device failure, to preserve any information necessary to determine cause of failure. Also configure the hardware Voice Video Endpoint to return to operations with least disruption to service.
If the Voice Video Endpoint is a soft client, this is Not Applicable. If the Voice Video Endpoint does not process classified calls, this is Not Applicable. Verify the Voice Video Endpoint processing classified calls is properly marked with the highest security level of the information being processed. If the Voice Video Endpoint processing classified calls is not properly marked with the highest security level of the information being processed, this is a finding.
Properly mark the Voice Video Endpoint processing classified calls with the highest security level of the information being processed.
If the Voice Video Endpoint does not process classified calls, this is Not Applicable. Verify the Voice Video Endpoint processing classified calls displays the classification level and SAL for the call or conference in progress. If the Voice Video Endpoint processing classified calls does not display the classification level and SAL for the call or conference in progress, this is a finding.
Configure the Voice Video Endpoint to display the classification level and SAL for the call or conference in progress.
If the Voice Video Endpoint is a hardware endpoint, this check procedure is Not Applicable. Verify the Voice Video Endpoint used for videoconferencing accepts a CAC or derived credentials. For hardware endpoints, the devices must use certificates to register with the session manager or multipoint controller. If the Voice Video Endpoint used for videoconferencing does not accept a CAC or derived credentials, this is a finding.
Configure the Voice Video Endpoint used for videoconferencing to accept a CAC or derived credentials.
If the Voice Video Endpoint is a hardware endpoint, this check procedure is Not Applicable. Verify the Voice Video Endpoint used for videoconferencing electronically verifies the CAC or derived credentials. For hardware endpoints, the devices must use certificates to register with the session manager or multipoint controller. If the Voice Video Endpoint used for videoconferencing does not electronically verify the CAC or derived credentials, this is a finding.
Configure the Voice Video Endpoint used for videoconferencing to electronically verify the CAC or derived credentials.
Verify the Voice Video Endpoint used for videoconferencing, when using PKI-based authentication, implements a local cache of revocation data to support path discovery and validation in the event the network path becomes unavailable. If the Voice Video Endpoint used for videoconferencing, when using PKI-based authentication, does not implement a local cache of revocation data to support path discovery and validation in the event the network path becomes unavailable, this is a finding.
Configure the Voice Video Endpoint used for videoconferencing, when using PKI-based authentication, to implement a local cache of revocation data to support path discovery and validation in the event the network path becomes unavailable.
Verify the Voice Video Endpoint processing classified information over public networks implements NSA-approved cryptography. If the Voice Video Endpoint processing classified information over public networks does not implement NSA-approved cryptography, this is a finding.
Configure the Voice Video Endpoint processing classified information over public networks to implement NSA-approved cryptography.
Verify the Voice Video Endpoint provides an explicit indication of current participants in all VC-based and IP-based online meetings and conferences. This excludes audio-only teleconferences using traditional telephony. If the Voice Video Endpoint does not provide an explicit indication of current participants in all VC-based and IP-based online meetings and conferences, this is a finding.
Configure the Voice Video Endpoint provides an explicit indication of current participants in all VC-based and IP-based online meetings and conferences.
If UC and VC clients cannot be independently configured by either end users or external service providers, this is Not Applicable. Verify the Voice Video Endpoint blocks both inbound and outbound communications traffic between UC and VC clients independently configured by end users and external service providers for voice and video. If the Voice Video Endpoint does not block both inbound and outbound communications traffic between UC and VC clients independently configured by end users and external service providers, this is a finding.
Configure the Voice Video Endpoint to block both inbound and outbound communications traffic between UC and VC clients independently configured by end users and external service providers.
Verify the Voice Video Endpoint protects the integrity of transmitted configuration files from the Voice Video Session Manager. If the Voice Video Endpoint does not protect the integrity of transmitted configuration files from the Voice Video Session Manager, this is a finding.
Configure the Voice Video Endpoint to protect the integrity of transmitted configuration files from the Voice Video Session Manager.
Verify the Voice Video Endpoint protects the confidentiality of transmitted configuration files from the Voice Video Session Manager. If the Voice Video Endpoint does not protect the confidentiality of transmitted configuration files from the Voice Video Session Manager, this is a finding.
Configure the Voice Video Endpoint to protect the confidentiality of transmitted configuration files from the Voice Video Session Manager.
Verify the Voice Video Endpoint uses encryption for signaling and media traffic. If the Voice Video Endpoint does not use encryption for signaling and media traffic, this is a finding.
Configure the Voice Video Endpoint to use encryption for signaling and media traffic.
Verify the Voice Video Endpoint, when using passwords or PINs for authentication or authorization, cryptographically protects the transmission. If the Voice Video Endpoint, when using passwords or PINs for authentication or authorization, does not cryptographically protect the transmission, this is a finding.
Configure the Voice Video Endpoint, when using passwords or PINs for authentication or authorization, to cryptographically protect the transmission.
If the Voice Video Endpoint relies exclusively on the Voice Video Session Manager for session records and does not have any capability for generating session records, this check procedure is Not Applicable. Verify the Voice Video Endpoint produces session records containing classification level and SAL. If the Voice Video Endpoint does not produce session records containing classification level and SAL, this is a finding.
Configure the Voice Video Endpoint to produce session records containing classification level and SAL.
Verify the Voice Video Endpoint processing unclassified information implements NIST FIPS-validated cryptography. If the Voice Video Endpoint processing unclassified information does not implement NIST FIPS-validated cryptography, this is a finding.
Configure the Voice Video Endpoint processing unclassified information to implement NIST FIPS-validated cryptography.
Verify the Voice Video Endpoint processing unclassified information implements NIST FIPS-validated cryptography to provision digital signatures. If the Voice Video Endpoint processing unclassified information does not implement NIST FIPS-validated cryptography to provision digital signatures, this is a finding.
Configure the Voice Video Endpoint processing unclassified information to implement NIST FIPS-validated cryptography to provision digital signatures.
Verify the Voice Video Endpoint processing unclassified information implements NIST FIPS-validated cryptography to generate cryptographic hashes. If the Voice Video Endpoint processing unclassified information does not implement NIST FIPS-validated cryptography to generate cryptographic hashes, this is a finding.
Configure the Voice Video Endpoint processing unclassified information to implement NIST FIPS-validated cryptography to generate cryptographic hashes.
If the Voice Video Endpoint is not a hardware endpoint, this check procedure is Not Applicable. Verify the hardware Voice Video Endpoint integrates into the implemented 802.1x network access control system. If the hardware Voice Video Endpoint does not integrate into the implemented 802.1x network access control system, this is a finding.
Configure the hardware Voice Video Endpoint to integrate into the implemented 802.1x network access control system.
If the Voice Video Endpoint is not a hardware endpoint, this check procedure is Not Applicable. If an 802.1x network access control system is not implemented on the network, this is Not Applicable. Verify the hardware Voice Video Endpoint is an 802.1x supplicant. If the hardware Voice Video Endpoint is not an 802.1x supplicant, this is a finding.
Configure the hardware Voice Video Endpoint to be an 802.1x supplicant in the implemented 802.1x network access control system.
If the Voice Video Endpoint is not a hardware endpoint with a PC port, this check procedure is Not Applicable. Verify the hardware Voice Video Endpoint PC port connects to an 802.1x supplicant or is disabled. If the hardware Voice Video Endpoint PC port is disabled, this is not a finding. If the hardware Voice Video Endpoint PC port is not disabled and is not an 802.1x authenticator, this is a finding.
Configure the hardware Voice Video Endpoint PC port to connect to an 802.1x supplicant in the implemented 802.1x network access control system or be disabled.
If the Voice Video Endpoint is not a hardware endpoint with a PC port, this check procedure is Not Applicable. Verify the unused hardware Voice Video Endpoint PC port is disabled. If the unused hardware Voice Video Endpoint PC port is not disabled, this is a finding.
Configure the unused hardware Video Endpoint PC port to be disabled.
If the Voice Video Endpoint is not a hardware endpoint with a PC port, this check procedure is Not Applicable. Verify the hardware Voice Video Endpoint with a PC port has the switchport configured as single-host or enable 802.1x multi-domain authentication. If the hardware Voice Video Endpoint with a PC port has the switchport configured as single-host, this is not a finding. If the hardware Voice Video Endpoint with a PC port does not have the switchport configured as single-host and does not enable 802.1x multi-domain authentication, this is a finding.
Configure the hardware Voice Video Endpoint with a PC port to have the switchport configured as single-host or enable 802.1x multi-domain authentication.
If the Voice Video Endpoint is not a hardware endpoint, this check procedure is Not Applicable. Verify the hardware Voice Video Endpoint not supporting 802.1x is configured to use MAB on the access switchport. If the hardware Voice Video Endpoint not supporting 802.1x is not configured to use MAB on the access switchport, this is a finding.
Configure the hardware Voice Video Endpoint not supporting 802.1x to use MAB on the access switchport.
If the Voice Video Endpoint does not support C2 communications, this check procedure is Not Applicable. Verify the Voice Video Endpoint supporting C2 communications implements MLPP dialing to enable Routine, Priority, Immediate, Flash, and Flash Override. If the Voice Video Endpoint supporting C2 communications does not implement MLPP dialing to enable Routine, Priority, Immediate, Flash, and Flash Override, this is a finding. If the MLPP dialing is not configured, this is a finding.
Configure the Voice Video Endpoint supporting C2 communications to implement MLPP dialing to enable Routine, Priority, Immediate, Flash, and Flash Override.
If the Voice Video Endpoint does not support C2 communications, this check procedure is Not Applicable. Verify the Voice Video Endpoint supporting C2 communications implements MLPP call disconnect to enable Routine, Priority, Immediate, Flash, and Flash Override. If the Voice Video Endpoint supporting C2 communications does not implement MLPP call disconnect to enable Routine, Priority, Immediate, Flash, and Flash Override, this is a finding. If the MLPP call disconnect is not configured for use, this is a finding.
Configure the Voice Video Endpoint supporting C2 communications to implement MLPP call disconnect to enable Routine, Priority, Immediate, Flash, and Flash Override.
If the Voice Video Endpoint does not support C2 communications, this check procedure is Not Applicable. Verify the Voice Video Endpoint supporting C2 communications implements AS-SIP. If the Voice Video Endpoint supporting C2 communications does not implement AS-SIP, this is a finding. If AS-SIP is not configured for use, this is a finding.
Configure the Voice Video Endpoint supporting C2 communications to implement AS-SIP.
If the unclassified Voice Video Endpoint is not deployed where sensitive or classified information is discussed, this check procedure is Not Applicable. Verify the Voice Video Endpoint microphone provides hardware mechanisms, such as push-to-talk handset switches, to prevent pickup and transmission of sensitive or classified information over non-secure networks. If the Voice Video Endpoint microphone does not provide hardware mechanisms, such as push-to-talk handset switches, to prevent pickup and transmission of sensitive or classified information over non-secure networks, this is a finding. If the Voice Video Endpoint microphone does provide hardware mechanisms but is not configured to use these features, this is a finding.
Configure the Voice Video Endpoint microphone hardware mechanisms, such as push-to-talk handset switches, to prevent pickup and transmission of sensitive or classified information over non-secure networks.
If the unclassified Voice Video Endpoint is not deployed where sensitive or classified information is displayed or discussed, this check procedure is Not Applicable. Verify the Voice Video Endpoint camera provides hardware mechanisms, such as push-to-see camera switches, to prevent pickup and transmission of sensitive or classified information over non-secure networks. If the Voice Video Endpoint camera does not provide hardware mechanisms, such as push-to-see camera switches, to prevent pickup and transmission of sensitive or classified information over non-secure networks, this is a finding. If the Voice Video Endpoint camera does provide hardware mechanisms but is not configured to use these features, this is a finding.
Configure the Voice Video Endpoint camera hardware mechanisms, such as push-to-see camera switches, to prevent pickup and transmission of sensitive or classified information over non-secure networks.
Verify the Voice Video Endpoint auto-answer feature is disabled. If the Voice Video Endpoint auto-answer feature is not disabled, this is a finding.
Configure the Voice Video Endpoint auto-answer feature to be disabled.
If the Voice Video Endpoint is not a hardware endpoint, this check procedure is Not Applicable. Verify the hardware Voice Video Endpoint disables or restricts web browser capabilities permitting the endpoint to browse the Internet or intranet. External applications and services approved for accessibility on the Voice Video Endpoint and implemented by the enterprise are permissible. If the hardware Voice Video does not disable or restrict web browser capabilities permitting the endpoint to browse the Internet or intranet, this is a finding.
Configure the hardware Voice Video Endpoint to disable or restrict web browser capabilities permitting the endpoint to browse the Internet or intranet.
If the Voice Video Endpoint is not a hardware endpoint, this check procedure is Not Applicable. If the hardware Voice Video Endpoint does not contain a web server, this check procedure is Not Applicable. Verify the hardware Voice Video Endpoint disables or restricts built-in web servers. Web servers embedded in hardware Voice Video Endpoints must be restricted to authorized entities’ devices through an authentication mechanism or, minimally, through IP address filtering, or be otherwise disabled. Additionally, the connection must be for direct user or administrative functions. If the hardware Voice Video Endpoint does not disable or restrict built-in web servers, this is a finding.
Configure the hardware Voice Video Endpoint to disable or restrict built-in web servers.
If the Voice Video Endpoint is not a hardware endpoint, this check procedure is Not Applicable. Verify the hardware Voice Video Endpoint prevents the configuration of network IP settings without the use of a PIN or password. If the hardware Voice Video Endpoint does not prevent the configuration of network IP settings without the use of a PIN or password, this is a finding.
Configure the hardware Voice Video Endpoint to prevent the configuration of network IP settings without the use of a PIN or password.
If the Voice Video Endpoint is not a hardware endpoint, this check procedure is Not Applicable. Verify the hardware Voice Video Endpoint prevents the display of network IP settings without the use of a PIN or password. If the hardware Voice Video Endpoint does not prevent the display of network IP settings without the use of a PIN or password, this is a finding.
Configure the hardware Voice Video Endpoint to prevent the display of network IP settings without the use of a PIN or password.
If the Voice Video Endpoint is not a hardware endpoint, this check procedure is Not Applicable. Verify the hardware Voice Video Endpoint does not use the default PIN or password to access configuration and display of network IP settings. If the hardware Voice Video Endpoint uses the default PIN or password to access configuration and display of network IP settings, this is a finding.
Configure the hardware Voice Video Endpoint to not use the default PIN or password to access configuration and display of network IP settings.
Verify the Voice Video Endpoint prevents the user from installing third-party software. If the Voice Video Endpoint does not prevent the user from installing third-party software, this is a finding.
Configure the Voice Video Endpoint to prevent the user from installing third-party software.
Verify the Voice Video Endpoint prevents installation of untrusted third-party software. If the Voice Video Endpoint does not prevent installation of untrusted third-party software, this is a finding.
Configure the Voice Video Endpoint to prevent installation of untrusted third-party software.
Verify the Voice Video Endpoint is configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs. This requirement is intended to be used to allow best practices and other security guidance to be included within a vendor-produced STIG. If the Voice Video Endpoint is not configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs, this is a finding.
Configure the Voice Video Endpoint to be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
If the Voice Video Endpoint is not used for unclassified communication within a SCIF or SAPF, this check procedure is Not Applicable. Verify the Voice Video Endpoint used for unclassified communication within a SCIF or SAPF is an NTSWG-approved device meeting the requirements outlined in CNSSI 5000. Confirm a valid NTSWG certification seal is affixed to the Voice Video Endpoint with no indication of tampering. If the Voice Video Endpoint is not an NTSWG-approved device with an affixed certification seal, this is a finding. If the Voice Video Endpoint reveals any evidence of tampering, or the seal is broken, cut, or in any way tampered with, this is a finding.
Replace the Voice Video Endpoint used for unclassified communication within a SCIF or SAPF with an NTSWG-approved device meeting the requirements outlined in CNSSI 5000. Confirm a valid NTSWG certification seal is affixed to the Voice Video Endpoint with no indication of tampering. The list of NTSWG-approved instruments is available on the National Counterintelligence and Security Center website using the URL below, then clicking on "TSG-6-Approved Telephones (PDF)" link to download the list: https://www.dni.gov/index.php/ncsc-what-we-do/ncsc-physical-security-mission The manufacturer places the certification seals prior to shipment, and if the seal is broken, cut, or in any way tampered with, it is no longer considered valid.
If the Voice Video Endpoint is not a hardware endpoint, this check procedure is Not Applicable. Verify the hardware Voice Video Endpoint applies 802.1Q VLAN tags to signaling and media traffic. If the hardware Voice Video Endpoint does not apply 802.1Q VLAN tags to signaling and media traffic, this is a finding.
Configure the hardware Voice Video Endpoint to apply 802.1Q VLAN tags to signaling and media traffic.
If the Voice Video Endpoint is not a hardware endpoint, this check procedure is Not Applicable. Verify the hardware Voice Video Endpoint uses a voice video VLAN separate from all other VLANs. For networks with both VoIP and videoconferencing, best practice is to have a separate voice VLAN and video VLAN. If the hardware Voice Video Endpoint does not use a voice video VLAN separate from all other VLANs, this is a finding.
Configure the hardware Voice Video Endpoint to use a voice video VLAN separate from all other VLANs.