Item Search

NameAudit NamePluginCategory
ARST-RT-000340 - The Arista router must be configured to restrict traffic destined to itself.DISA STIG Arista MLS EOS 4.2x Router v1r1Arista
ARST-RT-000350 - The Arista router must be configured to drop all fragmented Internet Control Message Protocol (ICMP) packets destined to itself.DISA STIG Arista MLS EOS 4.2x Router v1r1Arista
ARST-RT-000400 - The Arista router must be configured to block any traffic that is destined to IP core infrastructure.DISA STIG Arista MLS EOS 4.2x Router v1r1Arista
ARST-RT-000410 - The Arista router must be configured with Unicast Reverse Path Forwarding (uRPF) loose mode enabled on all CE-facing interfaces.DISA STIG Arista MLS EOS 4.2x Router v1r1Arista
ARST-RT-000420 - The out-of-band management (OOBM) Arista gateway router must be configured to forward only authorized management traffic to the Network Operations Center (NOC).DISA STIG Arista MLS EOS 4.2x Router v1r1Arista
ARST-RT-000440 - The Arista router must be configured to only permit management traffic that ingresses and egresses the OOBM interface.DISA STIG Arista MLS EOS 4.2x Router v1r1Arista
ARST-RT-000650 - The Arista perimeter router must be configured to block all outbound management traffic.DISA STIG Arista MLS EOS 4.2x Router v1r1Arista
CASA-FW-000170 - The Cisco ASA perimeter firewall must be configured to filter traffic destined to the enclave in accordance with the specific traffic that is approved and registered in the Ports, Protocols, and Services Management (PPSM) Category Assurance List (CAL) and vulnerability assessments - ACLDISA STIG Cisco ASA FW v1r2Cisco
CASA-FW-000170 - The Cisco ASA perimeter firewall must be configured to filter traffic destined to the enclave in accordance with the specific traffic that is approved and registered in the Ports, Protocols, and Services Management (PPSM) Category Assurance List (CAL) and vulnerability assessments - ACLDISA STIG Cisco ASA FW v1r3Cisco
CASA-FW-000170 - The Cisco ASA perimeter firewall must be configured to filter traffic destined to the enclave in accordance with the specific traffic that is approved and registered in the Ports, Protocols, and Services Management (PPSM) Category Assurance List (CAL) and vulnerability assessments - InterfaceDISA STIG Cisco ASA FW v1r2Cisco
CASA-FW-000170 - The Cisco ASA perimeter firewall must be configured to filter traffic destined to the enclave in accordance with the specific traffic that is approved and registered in the Ports, Protocols, and Services Management (PPSM) Category Assurance List (CAL) and vulnerability assessments - InterfaceDISA STIG Cisco ASA FW v1r3Cisco
CASA-FW-000170 - The Cisco ASA perimeter firewall must be configured to filter traffic destined to the enclave in accordance with the specific traffic that is approved and registered in the Ports, Protocols, and Services Management (PPSM) Category Assurance List (CAL) and vulnerability assessments. - ACLDISA STIG Cisco ASA FW v1r1Cisco
CASA-FW-000170 - The Cisco ASA perimeter firewall must be configured to filter traffic destined to the enclave in accordance with the specific traffic that is approved and registered in the Ports, Protocols, and Services Management (PPSM) Category Assurance List (CAL) and vulnerability assessments. - InterfaceDISA STIG Cisco ASA FW v1r1Cisco
CISC-RT-000130 - The Cisco router must be configured to restrict traffic destined to itself.DISA STIG Cisco IOS Router RTR v1r4Cisco
CISC-RT-000130 - The Cisco switch must be configured to restrict traffic destined to itself.DISA STIG Cisco NX-OS Switch RTR v1r1Cisco
CISC-RT-000130 - The Cisco switch must be configured to restrict traffic destined to itself.DISA STIG Cisco IOS Switch RTR v1r1Cisco
CISC-RT-000140 - The Cisco router must be configured to drop all fragmented Internet Control Message Protocol (ICMP) packets destined to itself - externalDISA STIG Cisco IOS Router RTR v1r4Cisco
CISC-RT-000140 - The Cisco router must be configured to drop all fragmented Internet Control Message Protocol (ICMP) packets destined to itself - internalDISA STIG Cisco IOS Router RTR v1r4Cisco
CISC-RT-000140 - The Cisco switch must be configured to drop all fragmented Internet Control Message Protocol (ICMP) packets destined to itself.DISA STIG Cisco IOS Switch RTR v1r1Cisco
CISC-RT-000140 - The Cisco switch must be configured to drop all fragmented Internet Control Message Protocol (ICMP) packets destined to itself. - externalDISA STIG Cisco NX-OS Switch RTR v1r1Cisco
CISC-RT-000140 - The Cisco switch must be configured to drop all fragmented Internet Control Message Protocol (ICMP) packets destined to itself. - internalDISA STIG Cisco NX-OS Switch RTR v1r1Cisco
CISC-RT-000320 - The Cisco perimeter router must be configured to filter traffic destined to the enclave in accordance with the guidelines contained in DoD Instruction 8551.1.DISA STIG Cisco IOS Router RTR v1r4Cisco
CISC-RT-000320 - The Cisco perimeter switch must be configured to filter traffic destined to the enclave in accordance with the guidelines contained in DoD Instruction 8551.1.DISA STIG Cisco IOS Switch RTR v1r1Cisco
CISC-RT-000320 - The Cisco perimeter switch must be configured to filter traffic destined to the enclave in accordance with the guidelines contained in DoD Instruction 8551.1.DISA STIG Cisco NX-OS Switch RTR v1r1Cisco
CISC-RT-000330 - The Cisco perimeter router must be configured to filter ingress traffic at the external interface on an inbound direction.DISA STIG Cisco IOS Router RTR v1r4Cisco
CISC-RT-000330 - The Cisco perimeter switch must be configured to filter ingress traffic at the external interface on an inbound direction.DISA STIG Cisco NX-OS Switch RTR v1r1Cisco
CISC-RT-000330 - The Cisco perimeter switch must be configured to filter ingress traffic at the external interface on an inbound direction.DISA STIG Cisco IOS Switch RTR v1r1Cisco
CISC-RT-000340 - The Cisco perimeter router must be configured to filter egress traffic at the internal interface on an inbound direction.DISA STIG Cisco IOS Router RTR v1r4Cisco
CISC-RT-000340 - The Cisco perimeter switch must be configured to filter egress traffic at the internal interface on an inbound direction.DISA STIG Cisco IOS Switch RTR v1r1Cisco
CISC-RT-000340 - The Cisco perimeter switch must be configured to filter egress traffic at the internal interface on an inbound direction.DISA STIG Cisco NX-OS Switch RTR v1r1Cisco
CISC-RT-000390 - The Cisco perimeter router must be configured to block all outbound management traffic - ip access-group EXTERNAL_ACL_OUTBOUND outDISA STIG Cisco IOS Router RTR v1r4Cisco
CISC-RT-000390 - The Cisco perimeter router must be configured to block all outbound management traffic - ip access-list extended EXTERNAL_ACL_OUTBOUNDDISA STIG Cisco IOS Router RTR v1r4Cisco
CISC-RT-000390 - The Cisco perimeter switch must be configured to block all outbound management traffic - ip access-group EXTERNAL_ACL_OUTBOUND outDISA STIG Cisco NX-OS Switch RTR v1r1Cisco
CISC-RT-000390 - The Cisco perimeter switch must be configured to block all outbound management traffic - ip access-group EXTERNAL_ACL_OUTBOUND outDISA STIG Cisco IOS Switch RTR v1r1Cisco
CISC-RT-000390 - The Cisco perimeter switch must be configured to block all outbound management traffic - ip access-list extended EXTERNAL_ACL_OUTBOUNDDISA STIG Cisco IOS Switch RTR v1r1Cisco
CISC-RT-000390 - The Cisco perimeter switch must be configured to block all outbound management traffic - ip access-list extended EXTERNAL_ACL_OUTBOUNDDISA STIG Cisco NX-OS Switch RTR v1r1Cisco
CISC-RT-000400 - The Cisco out-of-band management (OOBM) gateway router must be configured to transport management traffic to the Network Operations Center (NOC) via dedicated circuit, MPLS/VPN service, or IPsec tunnel.DISA STIG Cisco IOS Router RTR v1r4Cisco
CISC-RT-000410 - The Cisco out-of-band management (OOBM) gateway router must be configured to forward only authorized management traffic to the Network Operations Center (NOC).DISA STIG Cisco IOS Router RTR v1r4Cisco
CISC-RT-000440 - The Cisco out-of-band management (OOBM) gateway router must be configured to block any traffic destined to itself that is not sourced from the OOBM network or the Network Operations Center (NOC).DISA STIG Cisco IOS Router RTR v1r4Cisco
CISC-RT-000450 - The Cisco router must be configured to only permit management traffic that ingresses and egresses the out-of-band management (OOBM) interface.DISA STIG Cisco IOS Router RTR v1r4Cisco
CISC-RT-000450 - The Cisco switch must be configured to only permit management traffic that ingresses and egresses the out-of-band management (OOBM) interface.DISA STIG Cisco IOS Switch RTR v1r1Cisco
CISC-RT-000450 - The Cisco switch must be configured to only permit management traffic that ingresses and egresses the out-of-band management (OOBM) interface.DISA STIG Cisco NX-OS Switch RTR v1r1Cisco
CISC-RT-000460 - The Cisco router providing connectivity to the Network Operations Center (NOC) must be configured to forward all in-band management traffic via an IPsec tunnel.DISA STIG Cisco IOS Router RTR v1r4Cisco
CISC-RT-000730 - The Cisco PE router must be configured to block any traffic that is destined to IP core infrastructure - access-group inDISA STIG Cisco IOS Router RTR v1r4Cisco
CISC-RT-000730 - The Cisco PE switch must be configured to block any traffic that is destined to the IP core infrastructure - access-group inDISA STIG Cisco NX-OS Switch RTR v1r1Cisco
CISC-RT-000730 - The Cisco PE switch must be configured to block any traffic that is destined to the IP core infrastructure - deny ip anyDISA STIG Cisco NX-OS Switch RTR v1r1Cisco
CISC-RT-000740 - The Cisco PE router must be configured with Unicast Reverse Path Forwarding (uRPF) loose mode enabled on all CE-facing interfaces.DISA STIG Cisco IOS Router RTR v1r4Cisco
CISC-RT-000740 - The Cisco PE switch must be configured with Unicast Reverse Path Forwarding (uRPF) loose mode enabled on all CE-facing interfaces.DISA STIG Cisco NX-OS Switch RTR v1r1Cisco
FNFG-FW-000085 - The FortiGate firewall must filter traffic destined to the internal enclave in accordance with the specific traffic that is approved and registered in the Ports, Protocols, and Services Management (PPSM) Category Assurance List (CAL), Vulnerability Assessments (VAs) for that the enclave. - policyDISA Fortigate Firewall STIG v1r1FortiGate
FNFG-FW-000085 - The FortiGate firewall must filter traffic destined to the internal enclave in accordance with the specific traffic that is approved and registered in the Ports, Protocols, and Services Management (PPSM) Category Assurance List (CAL), Vulnerability Assessments (VAs) for that the enclave. - policy6DISA Fortigate Firewall STIG v1r1FortiGate