UCF STIG Viewer Logo

The network element must terminate all tunnels prior to passing through the perimeter security zone.


Overview

Finding ID Version Rule ID IA Controls Severity
V-26766 SRG-NET-000031 SV-34014r1_rule Medium
Description
Allowing traffic to bypass the security checkpoints such as firewalls and intrusion detection systems puts the network infrastructure and critical data at risk. Malicious traffic could enter the network undetected and attack a key network element or the server farm. Hence, it is imperative all tunneled traffic entering the network terminate prior to the content checking devices.
STIG Date
Network Security Requirements Guide 2011-12-28

Details

Check Text ( None )
None
Fix Text (None)
None