CCI|CCI-001109

Title

The information system at managed interfaces denies network communications traffic by default and allows network communications traffic by exception (i.e., deny all, permit by exception).

Reference Item Details

Category: 2009

Audit Items

View all Reference Audit Items

NamePluginAudit Name
CISC-RT-000240 - The Cisco perimeter router must be configured to deny network traffic by default and allow network traffic by exception - access-group inCiscoDISA STIG Cisco IOS-XR Router RTR v2r1
CISC-RT-000240 - The Cisco perimeter router must be configured to deny network traffic by default and allow network traffic by exception - access-group inCiscoDISA STIG Cisco IOS XE Router RTR v2r4
CISC-RT-000240 - The Cisco perimeter router must be configured to deny network traffic by default and allow network traffic by exception - access-group inCiscoDISA STIG Cisco IOS Router RTR v2r1
CISC-RT-000240 - The Cisco perimeter router must be configured to deny network traffic by default and allow network traffic by exception - deny ruleCiscoDISA STIG Cisco IOS XE Router RTR v2r4
CISC-RT-000240 - The Cisco perimeter router must be configured to deny network traffic by default and allow network traffic by exception - deny ruleCiscoDISA STIG Cisco IOS-XR Router RTR v2r1
CISC-RT-000240 - The Cisco perimeter router must be configured to deny network traffic by default and allow network traffic by exception - deny ruleCiscoDISA STIG Cisco IOS Router RTR v2r1
CISC-RT-000240 - The Cisco perimeter switch must be configured to deny network traffic by default and allow network traffic by exception - access-group inCiscoDISA STIG Cisco NX-OS Switch RTR v2r1
CISC-RT-000240 - The Cisco perimeter switch must be configured to deny network traffic by default and allow network traffic by exception - access-group inCiscoDISA STIG Cisco IOS Switch RTR v2r2
CISC-RT-000240 - The Cisco perimeter switch must be configured to deny network traffic by default and allow network traffic by exception - access-group inCiscoDISA STIG Cisco IOS XE Switch RTR v2r2
CISC-RT-000240 - The Cisco perimeter switch must be configured to deny network traffic by default and allow network traffic by exception - deny ruleCiscoDISA STIG Cisco IOS XE Switch RTR v2r2
CISC-RT-000240 - The Cisco perimeter switch must be configured to deny network traffic by default and allow network traffic by exception - deny ruleCiscoDISA STIG Cisco NX-OS Switch RTR v2r1
CISC-RT-000240 - The Cisco perimeter switch must be configured to deny network traffic by default and allow network traffic by exception - deny ruleCiscoDISA STIG Cisco IOS Switch RTR v2r2
GEN008540 - The system's local firewall must implement a deny-all, allow-by-exception policy.UnixDISA STIG AIX 5.3 v1r2
GEN008540 - The system's local firewall must implement a deny-all, allow-by-exception policy.UnixDISA STIG AIX 6.1 v1r14
GEN008540 - The system's local firewall must implement a deny-all, allow-by-exception policy.UnixDISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit
GEN008540 - The systems local firewall must implement a deny-all, allow-by-exception policy.UnixDISA STIG for Oracle Linux 5 v2r1
JUNI-RT-000240 - The Juniper perimeter router must be configured to deny network traffic by default and allow network traffic by exception.JuniperDISA STIG Juniper Router RTR v2r4
PANW-AG-000051 - The Palo Alto Networks security platform must deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception).Palo_AltoDISA STIG Palo Alto ALG v2r3
SYMP-AG-000570 - Symantec ProxySG must deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception).BlueCoatDISA Symantec ProxySG Benchmark ALG v1r3