UCF STIG Viewer Logo

The firewall implementation must disable network access by unauthorized devices and must log the information as a security violation.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-NET-000277-FW-000162 SRG-NET-000277-FW-000162 SRG-NET-000277-FW-000162_rule Low
Description
Local access to the private network can easily be accomplished by merely connecting a workstation or laptop to any available wall plate or a wireless connection to a nearby access point. Remote access to the network can be accomplished via connection to a VPN gateway. Eliminating unauthorized access to the network is vital to maintaining a secured network.
STIG Date
Firewall Security Requirements Guide 2012-12-10

Details

Check Text ( C-SRG-NET-000277-FW-000162_chk )
Review the firewall configuration. Verify a rule exists to disable network access by unauthorized devices.
Verify the firewall application log is configured to record an entry of the event.
Fix Text (F-SRG-NET-000277-FW-000162_fix)
Configure the firewall implementation to disable network access by unauthorized devices and log a record of the event in the application log.