UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The network device must prohibit or restrict network traffic in accordance with organizationally defined requirements for nonsecure ports, protocols, and/or services.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-NET-000132-NDM-000083 SRG-NET-000132-NDM-000083 SRG-NET-000132-NDM-000083_rule Medium
Description
This requirement applies to each network device installed as part of the network device. DoD continually assesses the ports, protocols, and services that can be used for network communications. Some ports, protocols, or services have known exploits or security weaknesses. These ports, protocols, and services must be prohibited or restricted in the network device configuration in accordance with DoD policy.
STIG Date
Network Device Management Security Requirements Guide 2013-07-30

Details

Check Text ( C-SRG-NET-000132-NDM-000083_chk )
View the configuration and vendor documentation of the network device application to find the minimum ports, protocols, and services which are required for operation of the network device.
Compare enabled ports, protocols, and/or services with the Ports, Protocol, and Service Management (PPSM) requirements.

If ports, protocols, and/or services are not disabled or restricted as required by the PPSM, this is a finding.
Fix Text (F-SRG-NET-000132-NDM-000083_fix)
Disable ports, protocols, and/or services not required for operation of the network device application.