UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Forescout appliance must not be configured to implement a DHCP layer 3 method for separation or device authorization. This is required for compliance with C2C Step 2.


Overview

Finding ID Version Rule ID IA Controls Severity
V-233315 FORE-NC-000070 SV-233315r919222_rule High
Description
An internal rogue device can still bypass the authentication process, regardless of the policy flow. Configuring the NAC to process all device authentication will ensure that any rogue device, internal or external, will be authenticated prior to network access.
STIG Date
Forescout Network Access Control Security Technical Implementation Guide 2023-06-22

Details

Check Text ( C-36510r919220_chk )
If DOD is not at C2C Step 1 or higher, this is not a finding.

Check Forescout policy and verify it is configured to prohibit the use of DHCP to separate authenticated and nonauthenticated network access requests.

If the NAC does not prohibit the use of DHCP to separate authenticated and nonauthenticated network access requests, this is a finding.
Fix Text (F-36475r919221_fix)
Log on to the Forescout UI.

1. Locate the Authentication & Authorization policy.
2. Ensure all traffic passing through the NAC is properly labeled and that all authenticated and nonauthenticated traffic goes through the NAC.