Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-26766 | SRG-NET-000031 | SV-34014r1_rule | Medium |
Description |
---|
Allowing traffic to bypass the security checkpoints such as firewalls and intrusion detection systems puts the network infrastructure and critical data at risk. Malicious traffic could enter the network undetected and attack a key network element or the server farm. Hence, it is imperative all tunneled traffic entering the network terminate prior to the content checking devices. |
STIG | Date |
---|---|
Network Security Requirements Guide | 2011-12-28 |
Check Text ( None ) |
---|
None |
Fix Text (None) |
---|
None |