1.2.1 Ensure 'Permitted IP Addresses' is set to those necessary for device management | CIS Palo Alto Firewall 8 Benchmark L1 v1.0.0 | Palo_Alto | SYSTEM AND COMMUNICATIONS PROTECTION |
1.2.1 Ensure 'Permitted IP Addresses' is set to those necessary for device management | CIS Palo Alto Firewall 9 v1.1.0 L1 | Palo_Alto | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
1.2.1 Ensure 'Permitted IP Addresses' is set to those necessary for device management | CIS Palo Alto Firewall 11 v1.0.0 L1 | Palo_Alto | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
1.2.1 Ensure 'Permitted IP Addresses' is set to those necessary for device management | CIS Palo Alto Firewall 10 v1.1.0 L1 | Palo_Alto | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
1.2.2 Ensure 'Permitted IP Addresses' is set for all management profiles where SSH, HTTPS, or SNMP is enabled | CIS Palo Alto Firewall 11 v1.0.0 L1 | Palo_Alto | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
1.2.2 Ensure 'Permitted IP Addresses' is set for all management profiles where SSH, HTTPS, or SNMP is enabled - SNMP | CIS Palo Alto Firewall 8 Benchmark L1 v1.0.0 | Palo_Alto | SYSTEM AND COMMUNICATIONS PROTECTION |
1.2.2 Ensure 'Permitted IP Addresses' is set for all management profiles where SSH, HTTPS, or SNMP is enabled - SSH | CIS Palo Alto Firewall 8 Benchmark L1 v1.0.0 | Palo_Alto | SYSTEM AND COMMUNICATIONS PROTECTION |
1.2.2 Ensure 'Permitted IP Addresses' is set for all management profiles where SSH, HTTPS, or SNMP is enabled - HTTPS | CIS Palo Alto Firewall 8 Benchmark L1 v1.0.0 | Palo_Alto | SYSTEM AND COMMUNICATIONS PROTECTION |
1.2.2 Ensure 'Permitted IP Addresses' is set for all management profiles where SSH, HTTPS, or SNMP is enabled - HTTPS | CIS Palo Alto Firewall 9 v1.1.0 L1 | Palo_Alto | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
1.2.2 Ensure 'Permitted IP Addresses' is set for all management profiles where SSH, HTTPS, or SNMP is enabled - HTTPS | CIS Palo Alto Firewall 10 v1.1.0 L1 | Palo_Alto | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
1.2.2 Ensure 'Permitted IP Addresses' is set for all management profiles where SSH, HTTPS, or SNMP is enabled - SNMP | CIS Palo Alto Firewall 9 v1.1.0 L1 | Palo_Alto | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
1.2.2 Ensure 'Permitted IP Addresses' is set for all management profiles where SSH, HTTPS, or SNMP is enabled - SNMP | CIS Palo Alto Firewall 10 v1.1.0 L1 | Palo_Alto | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
1.2.2 Ensure 'Permitted IP Addresses' is set for all management profiles where SSH, HTTPS, or SNMP is enabled - SSH | CIS Palo Alto Firewall 9 v1.1.0 L1 | Palo_Alto | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
1.2.2 Ensure 'Permitted IP Addresses' is set for all management profiles where SSH, HTTPS, or SNMP is enabled - SSH | CIS Palo Alto Firewall 10 v1.1.0 L1 | Palo_Alto | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
1.2.2 Restrict Access to VTY Sessions - line vty access-class | CIS Cisco NX-OS L1 v1.0.0 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
1.2.2 Restrict Access to VTY Sessions - line vty access-class | CIS Cisco NX-OS L2 v1.0.0 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
1.2.2 Restrict Access to VTY Sessions - VTY ACL | CIS Cisco NX-OS L2 v1.0.0 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
1.2.2 Restrict Access to VTY Sessions - VTY ACL | CIS Cisco NX-OS L1 v1.0.0 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
1.4.2 If SNMPv2 is in use, set Restrictions on Access - ACL | CIS Cisco NX-OS L1 v1.0.0 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
1.4.2 If SNMPv2 is in use, set Restrictions on Access - snmp-server | CIS Cisco NX-OS L1 v1.0.0 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
1.6.1 Ensure 'SSH source restriction' is set to an authorized IP address | CIS Cisco Firewall ASA 9 L1 v4.1.0 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
1.6.1 Ensure 'SSH source restriction' is set to an authorized IP address | CIS Cisco Firewall v8.x L1 v4.2.0 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
1.6.1 Ensure 'SSH source restriction' is set to an authorized IP address | CIS Cisco ASA 9.x Firewall L1 v1.0.0 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
1.6.2 Ensure 'SSH version 2' is enabled | CIS Cisco Firewall ASA 9 L1 v4.1.0 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
1.6.2 Ensure 'SSH version 2' is enabled | CIS Cisco ASA 9.x Firewall L1 v1.0.0 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
1.6.2 Ensure 'SSH version 2' is enabled | CIS Cisco Firewall v8.x L1 v4.2.0 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
1.9 Use Dedicated 'mgmt' Interface and VRF for Administrative Functions - logging | CIS Cisco NX-OS L1 v1.0.0 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
1.9 Use Dedicated 'mgmt' Interface and VRF for Administrative Functions - logging | CIS Cisco NX-OS L2 v1.0.0 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
1.9 Use Dedicated 'mgmt' Interface and VRF for Administrative Functions - ntp | CIS Cisco NX-OS L1 v1.0.0 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
1.9 Use Dedicated 'mgmt' Interface and VRF for Administrative Functions - ntp | CIS Cisco NX-OS L2 v1.0.0 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
1.9 Use Dedicated 'mgmt' Interface and VRF for Administrative Functions - snmp-server host | CIS Cisco NX-OS L2 v1.0.0 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
1.9 Use Dedicated 'mgmt' Interface and VRF for Administrative Functions - snmp-server host | CIS Cisco NX-OS L1 v1.0.0 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
1.9 Use Dedicated 'mgmt' Interface and VRF for Administrative Functions - snmp-server traps/informs | CIS Cisco NX-OS L2 v1.0.0 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
1.9 Use Dedicated 'mgmt' Interface and VRF for Administrative Functions - snmp-server traps/informs | CIS Cisco NX-OS L1 v1.0.0 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
2.4.2 Ensure all the login accounts having specific trusted hosts enabled | CIS Fortigate 7.0.x Level 1 v1.2.0 | FortiGate | ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY |