Item Search

NameAudit NamePluginCategory
ARST-L2-000200 - The Arista MLS layer 2 switch must not use the default VLAN for management traffic.DISA STIG Arista MLS EOS 4.2x L2S v2r1Arista

CONTINGENCY PLANNING

ARST-RT-000420 - The out-of-band management (OOBM) Arista gateway router must be configured to forward only authorized management traffic to the Network Operations Center (NOC).DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

SYSTEM AND COMMUNICATIONS PROTECTION

ARST-RT-000430 - The out-of-band management (OOBM) Arista gateway router must be configured to block any traffic destined to itself that is not sourced from the OOBM network or the NOC.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

SYSTEM AND COMMUNICATIONS PROTECTION

ARST-RT-000440 - The Arista router must be configured to only permit management traffic that ingresses and egresses the out-of-band management (OOBM) interface.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

SYSTEM AND COMMUNICATIONS PROTECTION

ARST-RT-000690 - The Arista BGP router must be configured to use its loopback address as the source address for iBGP peering sessions.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

CONTINGENCY PLANNING

ARST-RT-000700 - The MPLS router must be configured to use its loopback address as the source address for LDP peering sessions.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

CONTINGENCY PLANNING

ARST-RT-000730 - The PE router must be configured to have each Virtual Routing and Forwarding (VRF) instance bound to the appropriate physical or logical interfaces to maintain traffic separation between all MPLS L3VPNs.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

CONTINGENCY PLANNING

ARST-RT-000740 - The PE router must be configured to have each Virtual Routing and Forwarding (VRF) instance with the appropriate Route Target (RT).DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

CONTINGENCY PLANNING

ARST-RT-000750 - The PE router must be configured to have each VRF with the appropriate Route Distinguisher (RD).DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

CONTINGENCY PLANNING

ARST-RT-000760 - The PE router providing MPLS Virtual Private Wire Service (VPWS) must be configured to have the appropriate virtual circuit identification (VC ID) for each attachment circuit.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

CONTINGENCY PLANNING

ARST-RT-000770 - The Arista Multicast Source Discovery Protocol (MSDP) router must be configured to use its loopback address as the source address when originating MSDP traffic.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

CONTINGENCY PLANNING

CASA-FW-000260 - The Cisco ASA must be configured to forward management traffic to the Network Operations Center (NOC) via an IPsec tunnel - ACLDISA STIG Cisco ASA FW v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CASA-FW-000260 - The Cisco ASA must be configured to forward management traffic to the Network Operations Center (NOC) via an IPsec tunnel - authenticationDISA STIG Cisco ASA FW v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CASA-FW-000260 - The Cisco ASA must be configured to forward management traffic to the Network Operations Center (NOC) via an IPsec tunnel - crypto ipsecDISA STIG Cisco ASA FW v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CASA-FW-000260 - The Cisco ASA must be configured to forward management traffic to the Network Operations Center (NOC) via an IPsec tunnel - encryptionDISA STIG Cisco ASA FW v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CASA-FW-000260 - The Cisco ASA must be configured to forward management traffic to the Network Operations Center (NOC) via an IPsec tunnel - groupDISA STIG Cisco ASA FW v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CASA-FW-000260 - The Cisco ASA must be configured to forward management traffic to the Network Operations Center (NOC) via an IPsec tunnel - hash shaDISA STIG Cisco ASA FW v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CASA-FW-000260 - The Cisco ASA must be configured to forward management traffic to the Network Operations Center (NOC) via an IPsec tunnel - inside interfaceDISA STIG Cisco ASA FW v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CASA-FW-000260 - The Cisco ASA must be configured to forward management traffic to the Network Operations Center (NOC) via an IPsec tunnel - lifetimeDISA STIG Cisco ASA FW v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CASA-FW-000260 - The Cisco ASA must be configured to forward management traffic to the Network Operations Center (NOC) via an IPsec tunnel - match addressDISA STIG Cisco ASA FW v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CASA-FW-000260 - The Cisco ASA must be configured to forward management traffic to the Network Operations Center (NOC) via an IPsec tunnel - outside interfaceDISA STIG Cisco ASA FW v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CASA-FW-000260 - The Cisco ASA must be configured to forward management traffic to the Network Operations Center (NOC) via an IPsec tunnel - set ikev1DISA STIG Cisco ASA FW v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CASA-FW-000260 - The Cisco ASA must be configured to forward management traffic to the Network Operations Center (NOC) via an IPsec tunnel - set lifetimeDISA STIG Cisco ASA FW v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CASA-FW-000260 - The Cisco ASA must be configured to forward management traffic to the Network Operations Center (NOC) via an IPsec tunnel - set peerDISA STIG Cisco ASA FW v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CASA-FW-000260 - The Cisco ASA must be configured to forward management traffic to the Network Operations Center (NOC) via an IPsec tunnel - tunnel-groupDISA STIG Cisco ASA FW v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-L2-000240 - The Cisco switch must not use the default VLAN for management traffic.DISA STIG Cisco IOS XE Switch L2S v3r1Cisco

CONTINGENCY PLANNING

CISC-RT-000580 - The Cisco BGP router must be configured to use its loopback address as the source address for iBGP peering sessions - bgp neighborDISA STIG Cisco IOS Router RTR v3r1Cisco

CONTINGENCY PLANNING

CISC-RT-000580 - The Cisco BGP router must be configured to use its loopback address as the source address for iBGP peering sessions - interfaceDISA STIG Cisco IOS Router RTR v3r1Cisco

CONTINGENCY PLANNING

CISC-RT-000580 - The Cisco BGP router must be configured to use its loopback address as the source address for iBGP peering sessions.DISA STIG Cisco IOS XE Router RTR v3r1Cisco

CONTINGENCY PLANNING

CISC-RT-000590 - The Cisco MPLS router must be configured to use its loopback address as the source address for LDP peering sessions - loopbackDISA STIG Cisco IOS-XR Router RTR v3r1Cisco

CONTINGENCY PLANNING

CISC-RT-000590 - The Cisco MPLS router must be configured to use its loopback address as the source address for LDP peering sessions - mpls router-idDISA STIG Cisco IOS-XR Router RTR v3r1Cisco

CONTINGENCY PLANNING

CISC-RT-000590 - The Cisco MPLS router must be configured to use its loopback address as the source address for LDP peering sessions.DISA STIG Cisco IOS Router RTR v3r1Cisco

CONTINGENCY PLANNING

CISC-RT-000630 - The Cisco PE router must be configured to have each Virtual Routing and Forwarding (VRF) instance bound to the appropriate physical or logical interfaces to maintain traffic separation between all MPLS L3VPNs.DISA STIG Cisco IOS Router RTR v3r1Cisco

CONTINGENCY PLANNING

CISC-RT-000630 - The Cisco PE switch must be configured to have each Virtual Routing and Forwarding (VRF) instance bound to the appropriate physical or logical interfaces to maintain traffic separation between all MPLS L3VPNs.DISA STIG Cisco NX-OS Switch RTR v3r1Cisco

CONTINGENCY PLANNING

CISC-RT-000640 - The Cisco PE router must be configured to have each Virtual Routing and Forwarding (VRF) instance with the appropriate Route Target (RT).DISA STIG Cisco IOS XE Router RTR v3r1Cisco

CONTINGENCY PLANNING

CISC-RT-000640 - The Cisco PE router must be configured to have each Virtual Routing and Forwarding (VRF) instance with the appropriate Route Target (RT).DISA STIG Cisco IOS Router RTR v3r1Cisco

CONTINGENCY PLANNING

CISC-RT-000640 - The Cisco PE switch must be configured to have each Virtual Routing and Forwarding (VRF) instance with the appropriate Route Target (RT).DISA STIG Cisco NX-OS Switch RTR v3r1Cisco

CONTINGENCY PLANNING

CISC-RT-000650 - The Cisco PE switch must be configured to have each VRF with the appropriate Route Distinguisher (RD).DISA STIG Cisco NX-OS Switch RTR v3r1Cisco

CONTINGENCY PLANNING

CISC-RT-000670 - The Cisco PE router providing MPLS Virtual Private Wire Service (VPWS) must be configured to have the appropriate pseudowire ID for each attachment circuit - l2vpn encapsulationDISA STIG Cisco IOS-XR Router RTR v3r1Cisco

CONTINGENCY PLANNING

CISC-RT-000670 - The Cisco PE router providing MPLS Virtual Private Wire Service (VPWS) must be configured to have the appropriate pseudowire ID for each attachment circuit - xconnect groupDISA STIG Cisco IOS-XR Router RTR v3r1Cisco

CONTINGENCY PLANNING

CISC-RT-000670 - The Cisco PE router providing MPLS Virtual Private Wire Service (VPWS) must be configured to have the appropriate virtual circuit identification (VC ID) for each attachment circuit.DISA STIG Cisco IOS XE Router RTR v3r1Cisco

CONTINGENCY PLANNING

CISC-RT-000670 - The Cisco PE router providing MPLS Virtual Private Wire Service (VPWS) must be configured to have the appropriate virtual circuit identification (VC ID) for each attachment circuit.DISA STIG Cisco IOS Router RTR v3r1Cisco

CONTINGENCY PLANNING

CISC-RT-000680 - The Cisco PE switch providing Virtual Private LAN Services (VPLS) must be configured to have all attachment circuits defined to the virtual forwarding instance (VFI) with the globally unique VPN ID assigned for each customer VLAN.DISA STIG Cisco NX-OS Switch RTR v3r1Cisco

CONTINGENCY PLANNING

CISC-RT-000950 - The Cisco Multicast Source Discovery Protocol (MSDP) router must be configured to use a loopback address as the source address when originating MSDP traffic.DISA STIG Cisco IOS-XR Router RTR v3r1Cisco

CONTINGENCY PLANNING

JUEX-RT-000350 - The Juniper PE router must be configured to enforce a Quality-of-Service (QoS) policy in accordance with the QoS DODIN Technical Profile.DISA Juniper EX Series Router v2r1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUEX-RT-000360 - The Juniper PE router must be configured to enforce a Quality-of-Service (QoS) policy in accordance with the QoS GIG Technical Profile - QoS policy in accordance with the QoS GIG Technical Profile.DISA Juniper EX Series Router v2r1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUNI-RT-000570 - The Juniper MPLS router must be configured to use its loopback address as the source address for LDP peering sessions.DISA STIG Juniper Router RTR v3r1Juniper

CONTINGENCY PLANNING

JUNI-RT-000620 - The Juniper PE router must be configured to have each Virtual Routing and Forwarding (VRF) instance with the appropriate Route Target (RT) - RT.DISA STIG Juniper Router RTR v3r1Juniper

CONTINGENCY PLANNING

JUNI-RT-000630 - The Juniper PE router must be configured to have each VRF with the appropriate Route Distinguisher (RD).DISA STIG Juniper Router RTR v3r1Juniper

CONTINGENCY PLANNING

JUNI-RT-000940 - The Juniper Multicast Source Discovery Protocol (MSDP) router must be configured to use its loopback address as the source address when originating MSDP traffic.DISA STIG Juniper Router RTR v3r1Juniper

CONTINGENCY PLANNING