UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The network element must implement host based boundary protection mechanisms.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-NET-000196-FW-NA SRG-NET-000196-FW-NA SRG-NET-000196-FW-NA_rule Low
Description
A host-based boundary protection mechanism is a host based firewall. Host based boundary protection mechanisms are employed on devices to protect the asset where the data resides and to inspect data that has been decrypted. Host based firewall also allow for finer granularity when determining which ports, protocols, and services need to be enabled on a system by system basis. Without a host based protection mechanism, the firewall may not have adequate protection against attacks that may not be detected at the perimeter firewall. Host based boundary protection is outside the scope of the network firewall. Installation of a host based firewall on the firewall itself may impact the operation of the network firewall.
STIG Date
Firewall Security Requirements Guide 2012-12-10

Details

Check Text ( C-SRG-NET-000196-FW-NA_chk )
This requirement is NA for firewall. No fix required.
Fix Text (F-SRG-NET-000196-FW-NA_fix)
This requirement is NA for firewall. No fix required.