UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The network element must connect to external networks only through managed interfaces consisting of boundary protection devices arranged in accordance with organizational security architecture.


Overview

Finding ID Version Rule ID IA Controls Severity
V-34721 SRG-NET-000206-IDPS-NA SV-45616r1_rule Low
Description
The firewall will build a state to allow return traffic for all initiated traffic that was allowed outbound. Monitoring and filtering the outbound traffic adds a layer of protection to the enclave, in addition to being a good Internet citizen by preventing your network from being used as an attack base. All network elements must be configured to ensure all traffic is forwarded through the perimeter security infrastructure when sending traffic to external destinations. The IDPS itself does not originate traffic destined for external devices.
STIG Date
Intrusion Detection and Prevention Systems (IDPS) Security Requirements Guide 2012-11-19

Details

Check Text ( C-42982r1_chk )
This requirement is NA for IDPS. No fix required.
Fix Text (F-39013r1_fix)
This requirement is NA for IDPS. No fix required.