UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The IAO will ensure the firewall shall reject requests for access or services where the source address received by the firewall specifies a loopback address.


Overview

Finding ID Version Rule ID IA Controls Severity
V-14644 NET0380 SV-15270r1_rule ECSC-1 Medium
Description
The loopback address is used by an Inter-Processor Control (IPC) mechanism that enables the client and server portion of an application running on the same machine to communicate, and so it is trusted. It should never be used as the source IP address of an inbound or outbound transmission.
STIG Date
Firewall Security Technical Implementation Guide 2013-10-08

Details

Check Text ( C-12660r1_chk )
Ensure any attempt from the firewall or any network to pass any packets claiming to be from a loopback address is blocked.
Fix Text (F-14104r1_fix)
Establish filters to block any attempt from the firewall or any network to pass any packets claiming to be from a loopback address.