UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Windows Firewall outbound rules must block IPv6 UDP 3544.


Overview

Finding ID Version Rule ID IA Controls Severity
V-17449 5.484 SV-25251r2_rule ECSC-1 Medium
Description
IPv6 transition technologies, which tunnel packets through other protocols, do not provide visibility. Blocking UDP 3544 with the firewall aids in preventing this.
STIG Date
Windows 7 Security Technical Implementation Guide 2013-10-01

Details

Check Text ( C-45419r1_chk )
Computer Configuration -> Windows Settings -> Security Settings -> Windows Firewall with Advanced Security -> Windows Firewall with Advanced Security -> Outbound Rules "IPv6 Block of UDP 3544" will be configured as follows. (The rule could have been created with a different name – view the properties to determine correct settings.)

Navigate to the rule, right click and select Properties. View the following on the tabs specified:

General: Enabled and Block the connections
Programs and Services: All programs that meet the specified conditions
Protocols and Ports: Protocols type - UDP, Local port - 3544, Remote port - All Ports
Scope: Any IP addresses (Local and Remote)
Advanced: All profiles

If a third-party firewall is used, verify a comparable setting has been implemented.

The Remote Endpoint STIG contains additional firewall requirements for systems used remotely.
Fix Text (F-41983r2_fix)
Add the rule with the following steps:
Navigate to Outbound Rules.
Right click in right pane and select "New Rule".
Select "Port", Next.
Select "All Programs", Next.
Select Protocol Type: UDP.
Select Local Port: Specific Ports, Enter 3544.
Select Remote Port: All Ports, Next.
Select "Any IP address" for both local and remote IP address this rule will match.
Next.
Select "Block the connection", Next.
Select all (Domain, Private and Public) for When does this rule apply?
Next.
Supply the Name: IPv6 Block of UDP 3544.
Finish.

Configure a comparable setting if a third-party firewall is used.