3.11 Ensure Java applet filtering is enabled

Information

Removes Java applets from the HTTP reply traffic crossing the security appliance.

Rationale:

Java applets enhance users' Web experience with more interactivity. Because the applet is a code that is downloaded and executed on the users' machines, it can be used by attackers to perform malicious activities on the systems visiting untrusted websites.

Solution

Step 1: Acquire the TCP port used for the HTTP traffic containing Java objects, the IP address <internal_users_ip> and mask <internal_users_mask> of internal users generating the HTTP traffic, and the IP address <external_servers_ip> and mask <external_servers_mask> of the external servers to which the internal users connect and that are source of Java objects.

Step 2: Run the following command to filter Java applets.

hostname(config)# filter java <port> <internal_users_ip> <internal_users_mask> <external_servers_ip> <external_servers_mask>

Default Value:

Java applet filtering is disabled by default.

See Also

https://workbench.cisecurity.org/files/3246

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6

Plugin: Cisco

Control ID: 251734bf9b69392357672f508d30e7d4f31a43fd7bdbf1827f47ac8d80ff9ea8