Enclave boundary defense at the alternate site must be configured identically to that of the primary site.
MAC / CONF
A securely configured enclave boundary is essential to the maintaining the integrity of a site’s IT systems. Ensuring the identical configuration of an alternate site assures integrity of operations in the wake of an incident requiring the switch of mission operations to the alternate site.
Enclave boundary defense at the alternate site shall be configured identically to that of the primary site.
DISA Enclave Security STIG, Version 2, Release 1, 01 July 2004
DISA Enterprise Security Management STIG, 29 October 2004