CISC-RT-000540 - The Cisco BGP router must be configured to reject route advertisements from BGP peers that do not list their autonomous system (AS) number as the first AS in the AS_PATH attribute. | DISA STIG Cisco IOS-XR Router RTR v3r1 | Cisco | ACCESS CONTROL |
CISC-RT-000540 - The Cisco BGP switch must be configured to reject route advertisements from BGP peers that do not list their autonomous system (AS) number as the first AS in the AS_PATH attribute. | DISA STIG Cisco IOS XE Switch RTR v3r1 | Cisco | ACCESS CONTROL |
CISC-RT-000550 - The Cisco BGP router must be configured to reject route advertisements from CE routers with an originating AS in the AS_PATH attribute that does not belong to that customer - ip as-path access-list | DISA STIG Cisco IOS Router RTR v3r1 | Cisco | ACCESS CONTROL |
CISC-RT-000550 - The Cisco BGP router must be configured to reject route advertisements from CE routers with an originating AS in the AS_PATH attribute that does not belong to that customer. | DISA STIG Cisco IOS XE Router RTR v3r1 | Cisco | ACCESS CONTROL |
CISC-RT-000550 - The Cisco BGP router must be configured to reject route advertisements from CE routers with an originating AS in the AS_PATH attribute that does not belong to that customer. | DISA STIG Cisco IOS-XR Router RTR v3r1 | Cisco | ACCESS CONTROL |
CISC-RT-000550 - The Cisco BGP switch must be configured to reject route advertisements from CE switches with an originating AS in the AS_PATH attribute that does not belong to that customer. | DISA STIG Cisco IOS XE Switch RTR v3r1 | Cisco | ACCESS CONTROL |
GEN000000-AIX00020 - AIX Trusted Computing Base (TCB) software must be implemented. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL, SYSTEM AND SERVICES ACQUISITION |
GEN000000-AIX00020 - AIX Trusted Computing Base (TCB) software must be implemented. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL, SYSTEM AND SERVICES ACQUISITION |
GEN000000-SOL00120 - The ASET master files must be located in the /usr/aset/masters directory - tune.high | DISA STIG Solaris 10 X86 v2r4 | Unix | ACCESS CONTROL |
GEN000000-SOL00120 - The ASET master files must be located in the /usr/aset/masters directory - tune.high | DISA STIG Solaris 10 SPARC v2r4 | Unix | ACCESS CONTROL |
GEN000000-SOL00120 - The ASET master files must be located in the /usr/aset/masters directory - tune.low | DISA STIG Solaris 10 SPARC v2r4 | Unix | ACCESS CONTROL |
GEN000000-SOL00120 - The ASET master files must be located in the /usr/aset/masters directory - tune.low | DISA STIG Solaris 10 X86 v2r4 | Unix | ACCESS CONTROL |
GEN000000-SOL00120 - The ASET master files must be located in the /usr/aset/masters directory - tune.med | DISA STIG Solaris 10 X86 v2r4 | Unix | ACCESS CONTROL |
GEN000000-SOL00120 - The ASET master files must be located in the /usr/aset/masters directory - tune.med | DISA STIG Solaris 10 SPARC v2r4 | Unix | ACCESS CONTROL |
GEN000000-SOL00120 - The ASET master files must be located in the /usr/aset/masters directory - uid_aliases | DISA STIG Solaris 10 X86 v2r4 | Unix | ACCESS CONTROL |
GEN000000-SOL00120 - The ASET master files must be located in the /usr/aset/masters directory - uid_aliases | DISA STIG Solaris 10 SPARC v2r4 | Unix | ACCESS CONTROL |
GEN000000-SOL00160 - If the system is a firewall, ASET must be used on the system, and the firewall parameters must be set in /usr/aset/asetenv. | DISA STIG Solaris 10 X86 v2r4 | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
GEN000000-SOL00160 - If the system is a firewall, ASET must be used on the system, and the firewall parameters must be set in /usr/aset/asetenv. | DISA STIG Solaris 10 SPARC v2r4 | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
GEN000000-SOL00180 - The Solaris system Automated Security Enhancement Tool (ASET) configurable parameters in the asetenv file must be correct - ASET configurable parameters in the asetenv file must be correct. | DISA STIG Solaris 10 X86 v2r4 | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
GEN000000-SOL00180 - The Solaris system Automated Security Enhancement Tool (ASET) configurable parameters in the asetenv file must be correct - ASET configurable parameters in the asetenv file must be correct. | DISA STIG Solaris 10 SPARC v2r4 | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
GEN000000-SOL00200 - The asetenv file YPCHECK variable must be set to true when NIS+ is configured. | DISA STIG Solaris 10 SPARC v2r4 | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
GEN000000-SOL00200 - The asetenv file YPCHECK variable must be set to true when NIS+ is configured. | DISA STIG Solaris 10 X86 v2r4 | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
GEN000000-SOL00220 - The /usr/aset/userlist file must exist - /usr/aset/userlist | DISA STIG Solaris 10 X86 v2r4 | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
GEN000000-SOL00220 - The /usr/aset/userlist file must exist - /usr/aset/userlist | DISA STIG Solaris 10 SPARC v2r4 | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
GEN000000-SOL00220 - The /usr/aset/userlist file must exist - exec with userlist | DISA STIG Solaris 10 X86 v2r4 | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
GEN000000-SOL00220 - The /usr/aset/userlist file must exist - exec with userlist | DISA STIG Solaris 10 SPARC v2r4 | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
JUNI-RT-000535 - The Juniper BGP router must be configured to reject route advertisements from CE routers with an originating AS in the AS_PATH attribute that does not belong to that customer - bgp import | DISA STIG Juniper Router RTR v3r1 | Juniper | ACCESS CONTROL |