UCF STIG Viewer Logo

The network element must deny network traffic and audits internal addresses posing a threat to external information systems.


Overview

Finding ID Version Rule ID IA Controls Severity
V-27425 SRG-NET-000204 SV-34734r1_rule Medium
Description
The firewall will build a state to allow return traffic for all initiated traffic that was allowed outbound. Monitoring and filtering the outbound traffic adds a layer of protection to the enclave, in addition to being a good Internet citizen by preventing your network from being used as an attack base.
STIG Date
Network Security Requirements Guide 2011-12-28

Details

Check Text ( None )
None
Fix Text (None)
None