UCF STIG Viewer Logo

Windows Firewall Outbound Rule - IPv6 Block Protocols 41


Overview

Finding ID Version Rule ID IA Controls Severity
V-17448 5.483 SV-25250r1_rule ECSC-1 Medium
Description
IPv6 transition technologies will be blocked (IPv6 Block of Protocols 41).
STIG Date
Windows 7 Security Technical Implementation Guide 2012-07-02

Details

Check Text ( C-18189r1_chk )
Computer Configuration -> Windows Settings -> Security Settings -> Windows Firewall with Advanced Security -> Windows Firewall with Advanced Security -> Outbound Rules “IPv6 Block of Protocols 41” will be configured as follows. (The rule could have been created with a different name – view the properties to determine correct settings.)

Navigate to the rule, right click and select Properties. View the following on the tabs specified:

General: Enabled and Block the connections
Programs and Services: All programs that meet the specified conditions
Protocols and Ports: Protocol type - IPv6
Scope: Any IP addresses (Local and Remote)
Advanced: All profiles

Note: If a third-party firewall is used, document this with the IAO and mark the Windows firewall settings as Not Applicable. The Desktop/Secure Remote Computing STIGs contain additional requirements for systems used remotely.
Fix Text (F-17362r1_fix)
Add the rule with the following steps:
Navigate to Outbound Rules.
Right click in right pane and select “New Rule”.
Select “Custom”, Next.
Select “All Programs”, Next.
Select Protocol Type: IPv6 (Protocol number 41 will be automatically selected).
Select “Any IP address” for both local and remote IP address this rule will match.
Next.
Select “Block the connection”, Next.
Select all (Domain, Private and Public) for When does this rule apply?
Next.
Supply the Name: IPv6 Block of Protocols 41.
Finish.