Item Search

NameAudit NamePluginCategory
ARST-RT-000020 - The Arista BGP router must be configured to reject inbound route advertisements for any Bogon prefixes.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

ACCESS CONTROL

ARST-RT-000040 - The Arista BGP router must be configured to reject inbound route advertisements from a customer edge (CE) router for prefixes that are not allocated to that customer.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

ACCESS CONTROL

ARST-RT-000060 - The Arista BGP router must be configured to reject route advertisements from BGP peers that do not list their autonomous system (AS) number as the first AS in the AS_PATH attribute.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

ACCESS CONTROL

ARST-RT-000080 - The Arista Multicast Source Discovery Protocol (MSDP) router must be configured to filter source-active multicast advertisements to external MSDP peers to avoid global visibility of local-only multicast sources and groups.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

ACCESS CONTROL

ARST-RT-000100 - The Arista BGP router must be configured to reject route advertisements from CE routers with an originating AS in the AS_PATH attribute that does not belong to that customer.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

ACCESS CONTROL

ARST-RT-000130 - The Arista multicast router must be configured to bind a Protocol Independent Multicast (PIM) neighbor filter to interfaces that have PIM enabled.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

ACCESS CONTROL

ARST-RT-000170 - The Arista perimeter router must be configured to not be a Border Gateway Protocol (BGP) peer to an alternate gateway service provider.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

ACCESS CONTROL

ARST-RT-000180 - The Arista perimeter router must be configured to not redistribute static routes to an alternate gateway service provider into BGP or an IGP peering with the NIPRNet or to other autonomous systems.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

ACCESS CONTROL

ARST-RT-000470 - The Arista BGP router must be configured to use a unique key for each autonomous system (AS) that it peers with.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

ACCESS CONTROL

Big Sur - Disable Internet SharingNIST macOS Big Sur v1.4.0 - 800-53r5 LowUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Big Sur - Disable Internet SharingNIST macOS Big Sur v1.4.0 - CNSSI 1253Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Big Sur - Disable Internet SharingNIST macOS Big Sur v1.4.0 - 800-53r4 HighUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

CASA-FW-000010 - The Cisco ASA must be configured to filter outbound traffic, allowing only authorized ports and services - ACL AppliedDISA STIG Cisco ASA FW v2r1Cisco

ACCESS CONTROL

Catalina - Disable Internet SharingNIST macOS Catalina v1.5.0 - 800-53r4 HighUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Catalina - Disable Internet SharingNIST macOS Catalina v1.5.0 - 800-53r4 LowUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Catalina - Disable Internet SharingNIST macOS Catalina v1.5.0 - 800-53r5 LowUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Catalina - Disable Internet SharingNIST macOS Catalina v1.5.0 - 800-171Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Catalina - Disable Internet SharingNIST macOS Catalina v1.5.0 - 800-53r5 ModerateUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003600 - The system must not forward IPv4 source-routed packets.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN003602 - The system must not process ICMP timestamp requests.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN003602 - The system must not process Internet Control Message Protocol (ICMP) timestamp requests - 'timestamp-reply -j DROP'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003603 - The system must not respond to ICMPv4 echoes sent to a broadcast address.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN003604 - The system must not respond to ICMP timestamp requests sent to a broadcast address.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN003604 - The system must not respond to ICMP timestamp requests sent to a broadcast address.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003606 - The system must prevent local applications from generating source-routed packets.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN003607 - The system must not accept source-routed IPv4 packets - 'net.ipv4.conf.all.accept_source_route'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003608 - Proxy ARP must not be enabled on the system.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN003608 - Proxy ARP must not be enabled on the system.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003619 - The system must not be configured for network bridging.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003860 - The system must not have the finger service active.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003860 - The system must not have the finger service active.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN007780 - The system must not have 6to4 enabled.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN007820 - The system must not have IP tunnels configured - 'ifconfig -a'DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN007860 - The system must ignore IPv6 ICMP redirect messages.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN007860 - The system must ignore IPv6 ICMP redirect messages.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN007880 - The system must not send IPv6 ICMP redirects.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN007900 - The system must use an appropriate reverse-path filter for IPv6 network traffic, if the system uses IPv6.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN007920 - The system must not forward IPv6 source-routed packets - 'net.ipv6.conf.all.forwarding'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN007920 - The system must not forward IPv6 source-routed packets.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

JUEX-RT-000060 - The Juniper BGP router must be configured to reject route advertisements from BGP peers that do not list their autonomous system (AS) number as the first AS in the AS_PATH attribute.DISA Juniper EX Series Router v2r1Juniper

ACCESS CONTROL

JUEX-RT-000090 - The Juniper router configured for MSDP must limit the amount of source-active messages it accepts on per-peer basis.DISA Juniper EX Series Router v2r1Juniper

ACCESS CONTROL

JUEX-RT-000100 - The Juniper router configured for BGP must reject route advertisements from CE routers with an originating AS in the AS_PATH attribute that does not belong to that customer.DISA Juniper EX Series Router v2r1Juniper

ACCESS CONTROL

JUEX-RT-000150 - The Juniper multicast edge router must be configured to establish boundaries for administratively scoped multicast traffic.DISA Juniper EX Series Router v2r1Juniper

ACCESS CONTROL

JUEX-RT-000160 - The Juniper router must be configured to have all inactive interfaces disabled.DISA Juniper EX Series Router v2r1Juniper

ACCESS CONTROL

JUEX-RT-000190 - The Juniper perimeter router must not be configured to redistribute static routes to an alternate gateway service provider into BGP or an IGP peering with the NIPRNet or to other autonomous systems.DISA Juniper EX Series Router v2r1Juniper

ACCESS CONTROL

Monterey - Disable Wi-Fi InterfaceNIST macOS Monterey v1.0.0 - 800-53r4 ModerateUnix

ACCESS CONTROL

Monterey - Disable Wi-Fi InterfaceNIST macOS Monterey v1.0.0 - 800-53r5 ModerateUnix

ACCESS CONTROL

Monterey - Disable Wi-Fi InterfaceNIST macOS Monterey v1.0.0 - 800-53r4 LowUnix

ACCESS CONTROL

SHPT-00-000165 - SharePoint must enable IRM to bind attributes to information to facilitate the organization's established information flow policy as needed.DISA STIG SharePoint 2010 v1r9Windows

ACCESS CONTROL

SYMP-AG-000090 - Symantec ProxySG must immediately use updates made to policy enforcement mechanisms such as policies and rules - Web AccessDISA Symantec ProxySG Benchmark ALG v1r3BlueCoat

ACCESS CONTROL