UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The SA must configure the firewall for the minimum content and protocol inspection requirements.


Overview

Finding ID Version Rule ID IA Controls Severity
V-14643 NET0366 SV-15269r2_rule Medium
Description
Creating a filter to allow a port or service through the firewall without content or protocol inspection creates a direct connection between the host in the private network and a host on the outside; thereby, bypassing additional security measures that could be provided. This places the internal host at a greater risk of exploitation that could make the entire network vulnerable to an attack.
STIG Date
Firewall Security Technical Implementation Guide 2016-12-21

Details

Check Text ( C-12659r3_chk )
Review the firewall configuration and verify both ingress and egress traffic is being inspected. If any traffic is able to leave or enter the enclave without being inspected by the firewall, this is a finding.
Fix Text (F-14103r2_fix)
Ensure the firewall has content and protocol inspection implemented for all ingress and egress traffic.