3.11 Ensure Java applet filtering is enabled

Information

Removes Java applets from the HTTP reply traffic crossing the security appliance.

Rationale:

Java applets enhance users' Web experience with more interactivity. Because the applet is a code that is downloaded and executed on the users' machines, it can be used by attackers to perform malicious activities on the systems visiting untrusted websites.

Solution

* Step 1: Acquire the TCP port <port> used for the HTTP traffic containing Java objects, the IP address <internal_users_ip> and mask <internal_users_mask> of internal users generating the HTTP traffic, and the IP address <external_servers_ip> and mask <external_servers_mask> of the external servers to which the internal users connect and that are source of Java objects.
* Step 2: Run the following command to filter Java applets.

HOSTNAME(CONFIG)# FILTER JAVA _<port>__ <internal_users_ip> __<internal_users_mask> __<external_servers_ip> <external_servers_mask>_

See Also

https://workbench.cisecurity.org/files/1903

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-2, CSCv7|11.1

Plugin: Cisco

Control ID: 1ddb438919a9349b6010594448a5f2f80126933c19750583371410ccb387ea84