UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The firewall implementation must monitor and control traffic at both the external and internal boundary interfaces.


Overview

Finding ID Version Rule ID IA Controls Severity
V-37435 SRG-NET-000205-FW-000121 SV-49197r1_rule High
Description
Monitoring and controlling both inbound and outbound network traffic adds a layer of protection to the enclave. Blocking harmful inbound and outbound traffic can also prevent the network from being used as the source of an attack.
STIG Date
Firewall Security Requirements Guide 2013-04-24

Details

Check Text ( C-45627r1_chk )
Verify a firewall is configured to monitor traffic from both internal and external interfaces.
Verify ACLs or policy filters exist to detect harmful traffic on both the external and internal boundary interfaces.

If ACLs or policy filters do not exist to monitor and control traffic at both the external and internal boundary interfaces, this is a finding.
Fix Text (F-42340r1_fix)
Verify a firewall is configured to monitor traffic from both internal and external interfaces.
Verify ACLs or policy filters exist to detect harmful traffic on both the external and internal boundary interfaces.

If ACLs or policy filters do not exist to monitor and control traffic at both the external and internal boundary interfaces, this is a finding.