Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-67967 | AADC-AG-000036 | SV-82457r1_rule | Medium |
Description |
---|
In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embedding of data types within data types); organizations must disable or restrict unused or unnecessary physical and logical ports/protocols on information systems. The device must be configured to prevent or restrict the use of prohibited ports, protocols, and services throughout the network by filtering the network traffic and disallowing or redirecting traffic as necessary. Default and updated policy filters from the vendors will disallow older version of protocols and applications and will address most known non-secure ports, protocols, and/or services. However, sources for further policy filters are the IAVMs and the PPSM requirements. |
STIG | Date |
---|---|
A10 Networks ADC ALG Security Technical Implementation Guide | 2016-04-15 |
Check Text ( C-68527r1_chk ) |
---|
Review the list of authorized applications, endpoints, services, and protocols that have been added to the PPSM database. Review the configured servers, service groups, and virtual servers. The following command shows information for SLB servers: show slb server The following command shows information for service groups (multiple servers): show slb service-group The following command shows information for virtual servers (the services visible to outside hosts): show slb virtual-server If any of the servers, service groups, or virtual servers allows traffic that is prohibited by the PPSM CAL, this is a finding. |
Fix Text (F-74083r1_fix) |
---|
Do not configure a server, service group, or virtual server for any port, protocol, or service that is prohibited by the PPSM CAL. |