UCF STIG Viewer Logo

The network element must disable network access by unauthorized devices and must log the information as a security violation.


Overview

Finding ID Version Rule ID IA Controls Severity
V-34667 SRG-NET-000277-IDPS-NA SV-45542r1_rule Low
Description
Local access to the private network can easily be accomplished by merely connecting a workstation or laptop to any available wall plate or a wireless connection to a nearby access point. Remote access to the network can be accomplished via connection to a VPN gateway. Eliminating unauthorized access to the network is vital to maintaining a secured network. If the package is malformed or has an anomaly, it may cause an alert or a message to the firewall or router, however the IPS does not directly disable the unauthorized access.
STIG Date
Intrusion Detection and Prevention Systems (IDPS) Security Requirements Guide 2012-11-19

Details

Check Text ( C-42891r1_chk )
This requirement is NA for IDPS. No fix required.
Fix Text (F-38939r1_fix)
This requirement is NA for IDPS. No fix required.