Item Search

NameAudit NamePluginCategory
CASA-FW-000230 - The Cisco ASA must be configured to filter inbound traffic on all external interfaces - InterfaceDISA STIG Cisco ASA FW v1r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CASA-FW-000250 - The Cisco ASA perimeter firewall must be configured to block all outbound management traffic - InterfaceDISA STIG Cisco ASA FW v1r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CASA-FW-000260 - The Cisco ASA must be configured to forward management traffic to the Network Operations Center (NOC) via an IPsec tunnel - ACLDISA STIG Cisco ASA FW v1r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CASA-FW-000260 - The Cisco ASA must be configured to forward management traffic to the Network Operations Center (NOC) via an IPsec tunnel - crypto ipsecDISA STIG Cisco ASA FW v1r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CASA-FW-000260 - The Cisco ASA must be configured to forward management traffic to the Network Operations Center (NOC) via an IPsec tunnel - hash shaDISA STIG Cisco ASA FW v1r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CASA-FW-000260 - The Cisco ASA must be configured to forward management traffic to the Network Operations Center (NOC) via an IPsec tunnel - lifetimeDISA STIG Cisco ASA FW v1r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CASA-FW-000260 - The Cisco ASA must be configured to forward management traffic to the Network Operations Center (NOC) via an IPsec tunnel - match addressDISA STIG Cisco ASA FW v1r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CASA-FW-000260 - The Cisco ASA must be configured to forward management traffic to the Network Operations Center (NOC) via an IPsec tunnel - set lifetimeDISA STIG Cisco ASA FW v1r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CASA-FW-000260 - The Cisco ASA must be configured to forward management traffic to the Network Operations Center (NOC) via an IPsec tunnel - set peerDISA STIG Cisco ASA FW v1r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CASA-FW-000260 - The Cisco ASA must be configured to forward management traffic to the Network Operations Center (NOC) via an IPsec tunnel - tunnel-groupDISA STIG Cisco ASA FW v1r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000392 - The Cisco perimeter router must be configured to drop IPv6 undetermined transport packets - denyDISA STIG Cisco IOS XE Router RTR v2r4Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000392 - The Cisco perimeter router must be configured to drop IPv6 undetermined transport packets - outside interfaceDISA STIG Cisco IOS-XR Router RTR v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000392 - The Cisco perimeter router must be configured to drop IPv6 undetermined transport packets - outside interfaceDISA STIG Cisco IOS Router RTR v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000392 - The Cisco perimeter router must be configured to drop IPv6 undetermined transport packets - undetermined-transportDISA STIG Cisco IOS-XR Router RTR v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000392 - The Cisco perimeter switch must be configured to drop IPv6 undetermined transport packets - denyDISA STIG Cisco IOS XE Switch RTR v2r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000393 - The Cisco perimeter router must be configured drop IPv6 packets with a Routing Header type 0, 1, or 3-255 - deny ipv6 any anyDISA STIG Cisco IOS Router RTR v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000393 - The Cisco perimeter router must be configured drop IPv6 packets with a Routing Header type 0, 1, or 3-255 - permit 0, 1, or 3-255DISA STIG Cisco IOS-XR Router RTR v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000393 - The Cisco perimeter router must be configured drop IPv6 packets with a Routing Header type 0, 1, or 3-255 - traffic-filterDISA STIG Cisco IOS XE Router RTR v2r4Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000393 - The Cisco perimeter switch must be configured drop IPv6 packets with a Routing Header type 0, 1, or 3-255 - permitDISA STIG Cisco IOS XE Switch RTR v2r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000393 - The Cisco perimeter switch must be configured drop IPv6 packets with a Routing Header type 0, 1, or 3-255 - traffic-filterDISA STIG Cisco IOS XE Switch RTR v2r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000394 - The Cisco perimeter router must be configured to drop IPv6 packets containing a Hop-by-Hop header with invalid option type values - outside interfaceDISA STIG Cisco IOS-XR Router RTR v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000394 - The Cisco perimeter router must be configured to drop IPv6 packets containing a Hop-by-Hop header with invalid option type values - outside interfaceDISA STIG Cisco IOS Router RTR v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000395 - The Cisco perimeter router must be configured to drop IPv6 packets containing a Destination Option header with invalid option type values - dest-option-typeDISA STIG Cisco IOS-XR Router RTR v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000395 - The Cisco perimeter router must be configured to drop IPv6 packets containing a Destination Option header with invalid option type values - dest-option-typeDISA STIG Cisco IOS Router RTR v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000395 - The Cisco perimeter router must be configured to drop IPv6 packets containing a Destination Option header with invalid option type values - outside interfaceDISA STIG Cisco IOS Router RTR v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000395 - The Cisco perimeter router must be configured to drop IPv6 packets containing a Destination Option header with invalid option type values - traffic-filterDISA STIG Cisco IOS XE Router RTR v2r4Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000395 - The Cisco perimeter switch must be configured to drop IPv6 packets containing a Destination Option header with invalid option type values - denyDISA STIG Cisco IOS XE Switch RTR v2r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000396 - The Cisco perimeter router must be configured to drop IPv6 packets containing an extension header with the Endpoint Identification option - denyDISA STIG Cisco IOS XE Router RTR v2r4Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000396 - The Cisco perimeter router must be configured to drop IPv6 packets containing an extension header with the Endpoint Identification option - dest-option-typeDISA STIG Cisco IOS-XR Router RTR v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000396 - The Cisco perimeter router must be configured to drop IPv6 packets containing an extension header with the Endpoint Identification option - dest-option-typeDISA STIG Cisco IOS Router RTR v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000396 - The Cisco perimeter switch must be configured to drop IPv6 packets containing an extension header with the Endpoint Identification option - denyDISA STIG Cisco IOS XE Switch RTR v2r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000397 - The Cisco perimeter router must be configured to drop IPv6 packets containing the NSAP address option within Destination Option header - denyDISA STIG Cisco IOS XE Router RTR v2r4Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000397 - The Cisco perimeter router must be configured to drop IPv6 packets containing the NSAP address option within Destination Option header - dest-option-typeDISA STIG Cisco IOS Router RTR v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000397 - The Cisco perimeter router must be configured to drop IPv6 packets containing the NSAP address option within Destination Option header - outside interfaceDISA STIG Cisco IOS Router RTR v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000398 - The Cisco perimeter router must be configured to drop IPv6 packets containing a Hop-by-Hop or Destination Option extension header with an undefined option type - dest-option-typeDISA STIG Cisco IOS-XR Router RTR v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000398 - The Cisco perimeter router must be configured to drop IPv6 packets containing a Hop-by-Hop or Destination Option extension header with an undefined option type - dest-option-typeDISA STIG Cisco IOS Router RTR v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000398 - The Cisco perimeter router must be configured to drop IPv6 packets containing a Hop-by-Hop or Destination Option extension header with an undefined option type - traffic-filterDISA STIG Cisco IOS XE Router RTR v2r4Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000398 - The Cisco perimeter switch must be configured to drop IPv6 packets containing a Hop-by-Hop or Destination Option extension header with an undefined option type - denyDISA STIG Cisco IOS XE Switch RTR v2r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000398 - The Cisco perimeter switch must be configured to drop IPv6 packets containing a Hop-by-Hop or Destination Option extension header with an undefined option type - traffic-filterDISA STIG Cisco IOS XE Switch RTR v2r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

F5BI-AF-000223 - The BIG-IP AFM module must be configured to only allow incoming communications from authorized sources routed to authorized destinations - Active FW RulesDISA F5 BIG-IP Advanced Firewall Manager 11.x STIG v1r1F5

SYSTEM AND COMMUNICATIONS PROTECTION

F5BI-AF-000223 - The BIG-IP AFM module must be configured to only allow incoming communications from authorized sources routed to authorized destinations - Virtual ServersDISA F5 BIG-IP Advanced Firewall Manager 11.x STIG v1r1F5

SYSTEM AND COMMUNICATIONS PROTECTION

FNFG-FW-000115 - The FortiGate firewall must apply ingress filters to traffic that is inbound to the network through any active external interface.DISA Fortigate Firewall STIG v1r3FortiGate

SYSTEM AND COMMUNICATIONS PROTECTION

JUNI-RT-000383 - The Juniper perimeter router must be configured to drop IPv6 packets containing a Hop-by-Hop header with invalid option type values.DISA STIG Juniper Router RTR v2r4Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUNI-RT-000384 - The Juniper perimeter router must be configured to drop IPv6 packets containing a Destination Option header with invalid option type values.DISA STIG Juniper Router RTR v2r4Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUNI-RT-000385 - The Juniper perimeter router must be configured to drop IPv6 packets containing an extension header with the Endpoint Identification option - dstopsDISA STIG Juniper Router RTR v2r4Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUNI-RT-000385 - The Juniper perimeter router must be configured to drop IPv6 packets containing an extension header with the Endpoint Identification option - hop-by-hopDISA STIG Juniper Router RTR v2r4Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUNI-RT-000386 - The Juniper perimeter router must be configured to drop IPv6 packets containing the NSAP address option within Destination Option header.DISA STIG Juniper Router RTR v2r4Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUNI-RT-000387 - The Juniper perimeter router must be configured to drop IPv6 packets containing a Hop-by-Hop or Destination Option extension header with an undefined option type - dstopsDISA STIG Juniper Router RTR v2r4Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUNI-RT-000387 - The Juniper perimeter router must be configured to drop IPv6 packets containing a Hop-by-Hop or Destination Option extension header with an undefined option type - hop-by-hopDISA STIG Juniper Router RTR v2r4Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

SYMP-AG-000550 - Symantec ProxySG must allow incoming communications only from organization-defined authorized sources routed to organization-defined authorized destinations - RulesDISA Symantec ProxySG Benchmark ALG v1r3BlueCoat

SYSTEM AND COMMUNICATIONS PROTECTION