Audits
Settings
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Theme
Light
Dark
Auto
Help
Plugins
Overview
Plugins Pipeline
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Release Notes
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Policies
Overview
Search
AWS Resources
Azure Resources
GCP Resources
Kubernetes Resources
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Settings
Theme
Light
Dark
Auto
Detections
Plugins
Overview
Plugins Pipeline
Release Notes
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Policies
Overview
Search
AWS Resources
Azure Resources
GCP Resources
Kubernetes Resources
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Analytics
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Audits
References
CCI
CCI-001109
CCI
CCI|CCI-001109
Title
The information system at managed interfaces denies network communications traffic by default and allows network communications traffic by exception (i.e., deny all, permit by exception).
Reference Item Details
Reference:
CCI - DISA Control Correlation Identifier
Category:
2009
Audit Items
View all Reference Audit Items
Name
Plugin
Audit Name
ARST-RT-000330 - The Arista perimeter router must be configured to deny network traffic by default and allow network traffic by exception.
Arista
DISA STIG Arista MLS EOS 4.2x Router v1r1
CISC-RT-000240 - The Cisco perimeter router must be configured to deny network traffic by default and allow network traffic by exception.
Cisco
DISA STIG Cisco IOS Router RTR v2r6
CISC-RT-000240 - The Cisco perimeter router must be configured to deny network traffic by default and allow network traffic by exception.
Cisco
DISA STIG Cisco IOS XE Router RTR v2r9
CISC-RT-000240 - The Cisco perimeter router must be configured to deny network traffic by default and allow network traffic by exception.
Cisco
DISA STIG Cisco IOS-XR Router RTR v2r4
CISC-RT-000240 - The Cisco perimeter switch must be configured to deny network traffic by default and allow network traffic by exception.
Cisco
DISA STIG Cisco IOS Switch RTR v2r5
CISC-RT-000240 - The Cisco perimeter switch must be configured to deny network traffic by default and allow network traffic by exception.
Cisco
DISA STIG Cisco NX-OS Switch RTR v2r3
CISC-RT-000240 - The Cisco perimeter switch must be configured to deny network traffic by default and allow network traffic by exception.
Cisco
DISA STIG Cisco IOS XE Switch RTR v2r5
GEN008540 - The system's local firewall must implement a deny-all, allow-by-exception policy.
Unix
DISA STIG AIX 5.3 v1r2
GEN008540 - The system's local firewall must implement a deny-all, allow-by-exception policy.
Unix
DISA STIG AIX 6.1 v1r14
GEN008540 - The system's local firewall must implement a deny-all, allow-by-exception policy.
Unix
DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit
GEN008540 - The systems local firewall must implement a deny-all, allow-by-exception policy.
Unix
DISA STIG for Oracle Linux 5 v2r1
JUEX-RT-000370 - The Juniper perimeter router must be configured to deny network traffic by default and allow network traffic by exception.
Juniper
DISA Juniper EX Series Router v1r3
JUNI-RT-000240 - The Juniper perimeter router must be configured to deny network traffic by default and allow network traffic by exception.
Juniper
DISA STIG Juniper Router RTR v2r4
JUSX-AG-000128 - The Juniper SRX Services Gateway Firewall must deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception).
Juniper
DISA Juniper SRX Services Gateway ALG v2r1
PANW-AG-000051 - The Palo Alto Networks security platform must deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception).
Palo_Alto
DISA STIG Palo Alto ALG v2r3
SYMP-AG-000570 - Symantec ProxySG must deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception).
BlueCoat
DISA Symantec ProxySG Benchmark ALG v1r3