UCF STIG Viewer Logo

The firewall implementation must limit the number of concurrent sessions for each account to an organizationally defined number.


Overview

Finding ID Version Rule ID IA Controls Severity
V-37086 SRG-NET-000053-FW-000042 SV-48847r1_rule Low
Description
This requirement addresses concurrent sessions for a given information system account and does not address concurrent sessions by a single user via multiple accounts. In many products, this value defaults to unlimited which leaves the device open to denial of service attacks. An organizationally defined value should be configured. Limiting the number of concurrent login sessions to the device per any given account mitigates the risk associated with a denial of service attack.
STIG Date
Firewall Security Requirements Guide 2013-04-24

Details

Check Text ( C-45459r1_chk )
View the user account management screens.
Verify the number of concurrent sessions setting is not set to unlimited.
Verify the number of concurrent sessions is set to an organizationally defined value.

If the number of concurrent sessions for accounts is set to unlimited, this is a finding. If the number of concurrent sessions is not set to an organizationally defined value, this is a finding.
Fix Text (F-42032r1_fix)
Set the default concurrent sessions for user accounts to an organizationally defined value.