U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Network Perimeter Router L3 Switch Version 8, Release 32 Checklist Details (Checklist Revisions)

Supporting Resources:

Target:

Target CPE Name
Cisco PIX ASA cpe:/h:cisco:pix_asa (View CVEs)
Foundry Networks BigIron Router cpe:/h:foundrynet:bigiron_router (View CVEs)
Juniper Router M10 cpe:/h:juniper:router_m10 (View CVEs)
Juniper Router M16 cpe:/h:juniper:router_m16 (View CVEs)
Juniper Router M20 cpe:/h:juniper:router_m20 (View CVEs)
Juniper Router M40 cpe:/h:juniper:router_m40 (View CVEs)
Juniper Router M5 cpe:/h:juniper:router_m5 (View CVEs)

Checklist Highlights

Checklist Name:
Network Perimeter Router L3 Switch
Checklist ID:
383
Version:
Version 8, Release 32
Type:
Compliance
Review Status:
Archived
Authority:
Governmental Authority: Defense Information Systems Agency
Original Publication Date:
01/27/2017

Checklist Summary:

A core mission for the Defense Information Systems Agency (DISA) Field Security Operations (FSO) is to aid in securing Department of Defense (DoD) Networks. The processes and procedures outlined in this Security Technical Implementation Guide (STIG), when applied, will decrease the vulnerability of DoD sensitive information. Network Security is clearly still one of the biggest concerns for our DoD customers (i.e., the warfighter). The intent of the Network Infrastructure STIG is to include security considerations at the network level needed to provide an acceptable level of risk for information as it is transmitted throughout an enclave. This STIG has been developed to enhance the confidentiality, integrity, and availability of sensitive DoD Automated Information Systems (AIS). Each site network/communications infrastructure must provide secure, available, and reliable data for all customers. This document is designed to supplement the security guidance provided by DoD-specific requirements. This document will assist sites in meeting the minimum requirements, standards, controls, and options that must be in place for secure network operations.

Checklist Role:

  • Router
  • IPv6 Border or Gateway Router
  • Enterprise Router
  • Ethernet LAN Switch

Known Issues:

Not provided

Target Audience:

These requirements are designed to assist Security Managers (SMs), Information Assurance Managers (IAMs), IAOs, Network Security Officers (NSOs), and System Administrators (SAs) with configuring and maintaining security controls. This guidance supports DoD system design, development, implementation, certification, and accreditation efforts.

Target Operational Environment:

  • Managed
  • Specialized Security-Limited Functionality (SSLF)

Testing Information:

Not provided

Regulatory Compliance:

DoD Directive 8500.1 and DoD Directive 8500.2

Comments/Warnings/Miscellaneous:

Comments or proposed revisions to this document should be sent via e-mail to disa.stig_spt@mail.mil. DISA FSO will coordinate all change requests with the relevant DoD organizations before inclusion in this document.

Disclaimer:

Not provided

Product Support:

Not provided

Point of Contact:

disa.stig_spt@mail.mil

Sponsor:

Not provided

Licensing:

Not provided

Change History:

Changed status from "under review" to "final" - 09 September 2015
Version 8, Release 20 - 31 July, 2015
Changed status from "Under Review" to "Final" - 03 June 2015
Version 8, Release 17 - April 25, 2014
Version 8, Release 16 - October 25, 2013
Version 8, Release 15 - July 25, 2013
Version 8, Release 14 - April 26, 2013
Version 8, Release 13 - January 25, 2013
Version 8, Release 11 - July 27, 2012
Version 8, Release 10 - April 27, 2012
Version 8, Release 9 - January 24, 2012
Version 8, Release 8 - October 28, 2011
Updated "Point of Contact" and "Comments" Sectons - 15 January 2015
Version 8, Release 18 - 26 January 2015
Version 8, Release 20 - 31 July, 2015
Changed status from "under review" to "final" - 09 September 2015
Version 8, Release 21 - 29 October 2015
Changed status from "Under Review" to "Final" - 29 December 2015
updated to v8, r23 - 07/22/2016
Updated to FINAL - 09/12/2016
Updated to Version 8, Release 24 - 01/27/2017
Updated to FINAL - 03/13/2017
Updated URL to reflect change to the DISA website - http --> https
Updated - 11/01/2017
Updated to FINAL - 11/27/2017
corrected resource title - 1/24/2018
Updated to v8,r28 - 02/16/2018
Updated to FINAL - 3/18/2018
updated to Ver 8, Rel 29 - 4/25/18
Updated to FINAL - 5/25/18
updated reference link - 7/11/18
updated to Version 8, Release 30 - 7/24/18
Updated to FINAL - 8/24/18
Updated to Version 8, Release 31- 10/25/18
Updated to FINAL - 11/26/18
updated to Version 8, Release 32 - 1/23/19
Updated to FINAL - 2/19/19
Updated URLs - 6/13/19
Updated Resource Title - 6/17/19
sunset per DISA - 12/3/19

Dependency/Requirements:

URL Description
http://www.iana.org Internet Assigned Numbers Authority (IANA)
http://www.ietf.org Internet Engineering Task Force (IETF)
http://www.internic.net Network Information Center (NIC)
https://www.cisco.com Cisco
https://www.sei.cmu.edu/about/divisions/cert/index.cfm JTF-GNO Net Defense home page

References:

Reference URL Description

NIST checklist record last modified on 12/03/2019