UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

VTC endpoint connectivity is established via an unapproved DoD Wireless LAN infrastructure


Overview

Finding ID Version Rule ID IA Controls Severity
V-17714 RTS-VTC 4220.00 SV-18888r1_rule ECSC-1 Medium
Description
In the event wireless LAN connectivity is to be used for VTC endpoints, it must be implemented via an established and approved wireless LAN infrastructure which is configured, along with its connected devices, in compliance with the Wireless STIG. Key requirements include WiFi and WPA2 certification of the VTC wireless LAN Network Interface Card (NIC) and FIPS 140-2 certification of the wireless encryption module.
STIG Date
Video Services Policy STIG 2014-06-26

Details

Check Text ( C-18984r1_chk )
[IP]; Interview the IAO and validate compliance with the following requirement:

Ensure VTC endpoint connectivity is established via an approved DoD wireless LAN infrastructure. Furthermore, ensure both the LAN and VTC endpoint are configured and operated in compliance with the Wireless STIG.

Note: During APL testing, this is a finding in the event the VTU cannot come into compliance with the applicable requirements in the Wireless STIG.

Inspect VTU configuration to verify with that if wireless is not required it is disabled. If wireless connectivity is required verify/inspect that the wireless functionality is configured and operating in accordance with the Wireless STIG.
Fix Text (F-17611r1_fix)
[IP]; Perform the following tasks:
If wireless LAN connectivity is required, configure the wireless LAN capabilities of a VTU using the applicable requirements in the Wireless STIG.