NET0366 - The SA must configure the firewall for the minimum content and protocol inspection requirements.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Creating a filter to allow a port or service through the firewall without content or protocol inspection creates a direct connection between the host in the private network and a host on the outside; thereby, bypassing additional security measures that could be provided. This places the internal host at a greater risk of exploitation that could make the entire network vulnerable to an attack.

NOTE: Nessus did not perform this check as manual verification is required. Review the configuration to verify each port and service has protocol inspection.

Solution

Ensure the firewall has content and protocol inspection implemented for all ingress and egress traffic.

See Also

https://iasecontent.disa.mil/stigs/zip/U_Network_Firewall_V8R24_STIG.zip

Item Details

References: CAT|II, Rule-ID|SV-15269r2_rule, STIG-ID|NET0366, Vuln-ID|V-14643

Plugin: Cisco

Control ID: e38c1cf2a01cd88181ca68274b3992da70b51abc848ecedc45008a0ab57f1efa