UCF STIG Viewer Logo

The network device must disable the use of organizationally defined networking protocols deemed nonsecure, except for explicitly identified components in support of specific operational requirements.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-NET-000067-NDM-NA SRG-NET-000067-NDM-NA SRG-NET-000067-NDM-NA_rule Low
Description
This control addresses nonsecure protocols used as part of remote access communications to the network device devices. Some networking protocols that allow remote access may not meet the security requirements to protect data and components. Nonsecure protocols must be turned off at the device level or the network device may use these protocols. These protocols are often enabled by default; therefore, the system administrator must use an explicit command to disable the disallowed protocols. This requirement is covered by SRG-NET-000132.
STIG Date
Network Device Management Security Requirements Guide 2013-07-30

Details

Check Text ( C-SRG-NET-000067-NDM-NA_chk )
This requirement is NA for network device management.
Fix Text (F-SRG-NET-000067-NDM-NA_fix)
This requirement is NA for network device management.