Item Search

NameAudit NamePluginCategory
1.1.3 Ensure 'Master Key Passphrase' is setCIS Cisco Firewall ASA 9 L1 v4.1.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

1.1.4 Ensure 'Password Recovery' is disabledCIS Cisco Firewall v8.x L1 v4.2.0Cisco

CONFIGURATION MANAGEMENT

1.1.4 Ensure 'Password Recovery' is disabledCIS Cisco Firewall ASA 9 L1 v4.1.0Cisco

CONFIGURATION MANAGEMENT

1.1.5 Ensure 'Password Policy' is enabled - minimum-lowercaseCIS Cisco Firewall ASA 9 L1 v4.1.0Cisco

IDENTIFICATION AND AUTHENTICATION

1.1.5 Ensure 'Password Policy' is enabled - minimum-lowercaseCIS Cisco Firewall v8.x L1 v4.2.0Cisco

IDENTIFICATION AND AUTHENTICATION

1.2.1 Ensure 'Domain Name' is setCIS Cisco Firewall v8.x L1 v4.2.0Cisco

CONFIGURATION MANAGEMENT

1.3.1 Ensure 'Image Integrity' is correctCIS Cisco Firewall v8.x L1 v4.2.0Cisco

SYSTEM AND INFORMATION INTEGRITY

1.3.1 Ensure 'Image Integrity' is correctCIS Cisco Firewall ASA 9 L1 v4.1.0Cisco

SYSTEM AND INFORMATION INTEGRITY

1.4.1.1 Ensure 'aaa local authentication max failed attempts' is set to less than or equal to '3'CIS Cisco Firewall v8.x L1 v4.2.0Cisco

CONFIGURATION MANAGEMENT

1.4.1.1 Ensure 'aaa local authentication max failed attempts' is set to less than or equal to '3'CIS Cisco Firewall ASA 9 L1 v4.1.0Cisco

CONFIGURATION MANAGEMENT

1.4.1.2 Ensure 'local username and password' is setCIS Cisco Firewall v8.x L1 v4.2.0Cisco

IDENTIFICATION AND AUTHENTICATION

1.4.1.3 Ensure known default accounts do not existCIS Cisco Firewall v8.x L1 v4.2.0Cisco

IDENTIFICATION AND AUTHENTICATION

1.4.3.1 Ensure 'aaa authentication enable console' is configured correctlyCIS Cisco Firewall v8.x L1 v4.2.0Cisco

ACCESS CONTROL

1.4.3.1 Ensure 'aaa authentication enable console' is configured correctlyCIS Cisco Firewall ASA 9 L1 v4.1.0Cisco

ACCESS CONTROL

1.4.3.6 Ensure 'aaa authentication telnet console' is configured correctlyCIS Cisco Firewall ASA 9 L1 v4.1.0Cisco

IDENTIFICATION AND AUTHENTICATION

1.4.5.2 Ensure 'aaa accounting for SSH' is configured correctlyCIS Cisco Firewall v8.x L1 v4.2.0Cisco

CONFIGURATION MANAGEMENT

1.4.5.3 Ensure 'aaa accounting for Serial console' is configured correctlyCIS Cisco Firewall ASA 9 L1 v4.1.0Cisco

CONFIGURATION MANAGEMENT

1.5.4 Ensure 'MOTD banner' is setCIS Cisco Firewall v8.x L1 v4.2.0Cisco

AWARENESS AND TRAINING

1.5.4 Ensure 'MOTD banner' is setCIS Cisco Firewall ASA 9 L1 v4.1.0Cisco

AWARENESS AND TRAINING

1.6.1 Ensure 'SSH source restriction' is set to an authorized IP addressCIS Cisco Firewall ASA 9 L1 v4.1.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

1.6.2 Ensure 'SSH version 2' is enabledCIS Cisco Firewall ASA 9 L1 v4.1.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

1.6.4 Ensure 'SCP protocol' is set to Enable for files transfersCIS Cisco Firewall ASA 9 L1 v4.1.0Cisco

CONFIGURATION MANAGEMENT

1.7.1 Ensure 'HTTP source restriction' is set to an authorized IP addressCIS Cisco Firewall ASA 9 L1 v4.1.0Cisco

CONFIGURATION MANAGEMENT

1.7.2 Ensure 'TLS 1.0' is set for HTTPS accessCIS Cisco Firewall ASA 9 L1 v4.1.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

1.7.3 Ensure 'SSL AES 256 encryption' is set for HTTPS accessCIS Cisco Firewall v8.x L1 v4.2.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

1.9.1.2 Ensure 'NTP authentication key' is configured correctlyCIS Cisco Firewall v8.x L1 v4.2.0Cisco

IDENTIFICATION AND AUTHENTICATION

1.10.2 Ensure 'logging to Serial console' is disabledCIS Cisco Firewall ASA 9 L1 v4.1.0Cisco

CONFIGURATION MANAGEMENT

1.10.3 Ensure 'logging to monitor' is disabledCIS Cisco Firewall ASA 9 L1 v4.1.0Cisco

CONFIGURATION MANAGEMENT

1.10.4 Ensure 'syslog hosts' is configured correctlyCIS Cisco Firewall v8.x L1 v4.2.0Cisco

AUDIT AND ACCOUNTABILITY

1.10.6 Ensure 'logging history severity level' is set to greater than or equal to '5'CIS Cisco Firewall v8.x L1 v4.2.0Cisco

AUDIT AND ACCOUNTABILITY

1.10.7 Ensure 'logging with timestamps' is enabledCIS Cisco Firewall v8.x L1 v4.2.0Cisco

AUDIT AND ACCOUNTABILITY

1.11.4 Ensure 'SNMP traps' is enabled - authenticationCIS Cisco Firewall v8.x L1 v4.2.0Cisco

CONFIGURATION MANAGEMENT

1.11.5 Ensure 'SNMP community string' is not the default stringCIS Cisco Firewall ASA 9 L1 v4.1.0Cisco

CONFIGURATION MANAGEMENT

2.1.3 Ensure 'EIGRP authentication' is enabledCIS Cisco Firewall v8.x L1 v4.2.0Cisco

CONFIGURATION MANAGEMENT

2.4 Ensure DHCP services are disabled for untrusted interfaces - dhcprelayCIS Cisco Firewall v8.x L1 v4.2.0Cisco

CONFIGURATION MANAGEMENT

2.5 Ensure ICMP is restricted for untrusted interfacesCIS Cisco Firewall ASA 9 L1 v4.1.0Cisco

CONFIGURATION MANAGEMENT

3.1 Ensure DNS services are configured correctly - name-serverCIS Cisco Firewall v8.x L1 v4.2.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

3.1 Ensure DNS services are configured correctly - name-serverCIS Cisco Firewall ASA 9 L1 v4.1.0Cisco

CONFIGURATION MANAGEMENT

3.2 Ensure intrusion prevention is enabled for untrusted interfacesCIS Cisco Firewall ASA 9 L1 v4.1.0Cisco

CONFIGURATION MANAGEMENT

3.8 Ensure 'security-level' is set to '0' for Internet-facing interfaceCIS Cisco Firewall ASA 9 L1 v4.1.0Cisco

CONFIGURATION MANAGEMENT

3.10 Ensure ActiveX filtering is enabledCIS Cisco Firewall v8.x L1 v4.2.0Cisco

CONFIGURATION MANAGEMENT

3.10 Ensure ActiveX filtering is enabledCIS Cisco Firewall ASA 9 L1 v4.1.0Cisco

CONFIGURATION MANAGEMENT

FNFG-FW-000005 - The FortiGate firewall must use filters that use packet headers and packet attributes, including source and destination IP addresses and ports.DISA Fortigate Firewall STIG v1r3FortiGate

ACCESS CONTROL

FNFG-FW-000050 - The FortiGate firewall must protect traffic log records from unauthorized access while in transit to the central audit server - enc-algorithmDISA Fortigate Firewall STIG v1r3FortiGate

AUDIT AND ACCOUNTABILITY

FNFG-FW-000050 - The FortiGate firewall must protect traffic log records from unauthorized access while in transit to the central audit server. - set serverDISA Fortigate Firewall STIG v1r3FortiGate

AUDIT AND ACCOUNTABILITY

FNFG-FW-000085 - The FortiGate firewall must filter traffic destined to the internal enclave in accordance with the specific traffic that is approved and registered in the Ports, Protocols, and Services Management (PPSM) Category Assurance List (CAL), Vulnerability Assessments (VAs) for that the enclave. - policyDISA Fortigate Firewall STIG v1r3FortiGate

SYSTEM AND COMMUNICATIONS PROTECTION

FNFG-FW-000085 - The FortiGate firewall must filter traffic destined to the internal enclave in accordance with the specific traffic that is approved and registered in the Ports, Protocols, and Services Management (PPSM) Category Assurance List (CAL), Vulnerability Assessments (VAs) for that the enclave. - policy6DISA Fortigate Firewall STIG v1r3FortiGate

SYSTEM AND COMMUNICATIONS PROTECTION

FNFG-FW-000090 - The FortiGate firewall must fail to a secure state if the firewall filtering functions fail unexpectedly - av-failopenDISA Fortigate Firewall STIG v1r3FortiGate

SYSTEM AND COMMUNICATIONS PROTECTION

FNFG-FW-000150 - The FortiGate firewall must generate an alert that can be forwarded to, at a minimum, the Information System Security Officer (ISSO) and Information System Security Manager (ISSM) when denial-of-service (DoS) incidents are detected. - set modeDISA Fortigate Firewall STIG v1r3FortiGate

SYSTEM AND INFORMATION INTEGRITY

FNFG-FW-000165 - The FortiGate firewall must generate traffic log records when attempts are made to send packets between security zones that are not authorized to communicate.DISA Fortigate Firewall STIG v1r3FortiGate

AUDIT AND ACCOUNTABILITY