UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Network Address Translation (NAT) and private IP address space must not be deployed within the SIPRNet enclave.


Overview

Finding ID Version Rule ID IA Controls Severity
V-31637 NET0185 SV-41924r6_rule Medium
Description
As per CNSSI No. 1016, the DoD has an enterprise level security-focused configuration management (SecCM) requirement to support end-to-end monitoring of SIPRNet, as a National Security System (NSS). The use of NAT and private IP address space inhibits the view of specialized DISN enterprise tools in tracking client level enclave to enclave traffic, monitoring client use of enterprise level application services, and detecting anomalies and potential malicious attacks in SIPRNet client application traffic flows. Enclave nodes that communicate outside the organization’s enclave to other SIPRNet enclaves or enterprise services cannot use NATd private addresses via an enclave proxy without the permission of the SIPRNet DISN Authorizing Official, the DISA AO.
STIG Date
Network Infrastructure Policy Security Technical Implementation Guide 2016-07-11

Details

Check Text ( C-40352r12_chk )
Review network diagrams, enterprise sensor reports, and network scans submitted to the Connection Approval Office. Determine that only global IP addresses assigned by the NIC are in use within the organization's SIPRNet enclave.

Determine whether NAT and unauthorized IP address space is in use in the organization's SIPRNet enclave.

Exceptions to this requirement are listed below:
1. Closed classified networks logically transiting SIPRNet for enclave-to-enclave VPN transport only.
2. Out-of-Band management networks, where the NATd nodes do not access SIPRNet base enterprise services.
3. Thin client deployments where the hosting thin client server serves as the SIPRNet access point for its thin clients and that the organization maintains detailed thin client service usage audit logs.
4. Valid operational mission need or implementation constraints.

All exceptions must have approval by the SIPRNet DISN accreditation official, DISA AO.

If NAT and unauthorized IP address space is in use on the organization's SIPRNet infrastructure, this is a finding.
Fix Text (F-35556r5_fix)
Remove the NAT configurations and private address space from the organization's SIPRNet enclave. Configure the SIPRNet enclave with SSC authorized .smil.mil or .sgov.gov addresses. If NAT or private address space is required, as per one of the stated exceptions or for valid mission requirements, then submit a detailed approval request to use of private addressing through the DSAWG Secretariat to the DISN accreditation official, DISA AO.