UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The device must be configured to protect the network against denial of service attacks such as Ping of Death, TCP SYN floods, etc.


Overview

Finding ID Version Rule ID IA Controls Severity
V-3156 NET0375 SV-3156r2_rule EBBD-1 EBBD-2 EBBD-3 ECSC-1 Medium
Description
A SYN-flood attack is a denial-of-service attack where the attacker sends a huge amount of please-start-a-connection packets and then nothing else. This causes the device being attacked to be overloaded with the open sessions and eventually crash. A ping sweep (also known as an ICMP sweep) is a basic network scanning technique used to determine which of a range of IP addresses map to live hosts (computers).
STIG Date
Firewall Security Technical Implementation Guide 2017-03-02

Details

Check Text ( C-3670r2_chk )
Review the device configurations to determine if denial of service attacks guarded against.

If the device is not configured to mitigate denial of service attacks, this is a finding.
Fix Text (F-3181r1_fix)
If the firewall support SYN-flood or ping sweep protection then enable these features. If the firewall does not support these features, enable the security features on the router to protect the network from these attacks.