Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-233315 | FORE-NC-000070 | SV-233315r611394_rule | High |
Description |
---|
An internal rogue device can still bypass the authentication process, regardless of the policy flow. Configuring the NAC to process all device authentication will ensure that any rogue device, internal or external, will be authenticated prior to network access. |
STIG | Date |
---|---|
Forescout Network Access Control Security Technical Implementation Guide | 2020-12-11 |
Check Text ( C-36510r605648_chk ) |
---|
Check Forescout policy and ensure it is configured to prohibit the use of DHCP to separate authenticated and non-authenticated network access requests. If the NAC does not prohibit the use of DHCP to separate authenticated and non-authenticated network access requests, this is a finding. |
Fix Text (F-36475r605649_fix) |
---|
Log on to the Forescout UI. 1. Locate the Authentication & Authorization policy. 2. Ensure all traffic passing through the NAC is properly labeled and that all authenticated and non-authenticated traffic goes through the NAC. |