Network Perimeter Router L3 Switch Version 8, Release 32 Checklist Details (Checklist Revisions)
NOTE
This is not the current revision of this Checklist, view the current revision.
Supporting Resources:
-
Download Standalone XCCDF 1.1.4 - Network Perimeter Router L3 Switch - Version 8, Release 15
- Defense Information Systems Agency
Target:
Target | CPE Name |
---|---|
Cisco PIX ASA | cpe:/h:cisco:pix_asa (View CVEs) |
Foundry Networks BigIron Router | cpe:/h:foundrynet:bigiron_router (View CVEs) |
Juniper Router M10 | cpe:/h:juniper:router_m10 (View CVEs) |
Juniper Router M16 | cpe:/h:juniper:router_m16 (View CVEs) |
Juniper Router M20 | cpe:/h:juniper:router_m20 (View CVEs) |
Juniper Router M40 | cpe:/h:juniper:router_m40 (View CVEs) |
Juniper Router M5 | cpe:/h:juniper:router_m5 (View CVEs) |
Checklist Highlights
- Checklist Name:
- Network Perimeter Router L3 Switch
- Checklist ID:
- 383
- Version:
- Version 8, Release 32
- Type:
- Compliance
- Review Status:
- Final
- Authority:
- Governmental Authority: Defense Information Systems Agency
- Original Publication Date:
- 07/28/2011
Checklist Summary:
A core mission for the Defense Information Systems Agency (DISA) Field Security Operations (FSO) is to aid in securing Department of Defense (DoD) Networks. The processes and procedures outlined in this Security Technical Implementation Guide (STIG), when applied, will decrease the vulnerability of DoD sensitive information. Network Security is clearly still one of the biggest concerns for our DoD customers (i.e., the warfighter). The intent of the Network Infrastructure STIG is to include security considerations at the network level needed to provide an acceptable level of risk for information as it is transmitted throughout an enclave. This STIG has been developed to enhance the confidentiality, integrity, and availability of sensitive DoD Automated Information Systems (AIS). Each site network/communications infrastructure must provide secure, available, and reliable data for all customers. This document is designed to supplement the security guidance provided by DoD-specific requirements. This document will assist sites in meeting the minimum requirements, standards, controls, and options that must be in place for secure network operations.
Checklist Role:
- Router
- IPv6 Border or Gateway Router
- Enterprise Router
- Ethernet LAN Switch
Known Issues:
Not provided
Target Audience:
These requirements are designed to assist Security Managers (SMs), Information Assurance Managers (IAMs), IAOs, Network Security Officers (NSOs), and System Administrators (SAs) with configuring and maintaining security controls. This guidance supports DoD system design, development, implementation, certification, and accreditation efforts.
Target Operational Environment:
- Managed
- Specialized Security-Limited Functionality (SSLF)
Testing Information:
Not provided
Regulatory Compliance:
DoD Directive 8500.1 and DoD Directive 8500.2
Comments/Warnings/Miscellaneous:
Comments or proposed revisions to this document should be sent via e-mail to fso_spt@disa.mil. DISA FSO will coordinate all change requests with the relevant DoD organizations before inclusion in this document.
Disclaimer:
Not provided
Product Support:
Not provided
Point of Contact:
fso_spt@disa.mil
Sponsor:
Not provided
Licensing:
Not provided
Change History:
Version 8, Release 15 - July 25, 2013 Version 8, Release 14 - April 26, 2013 Version 8, Release 13 - January 25, 2013 Version 8, Release 11 - July 27, 2012 Version 8, Release 10 - April 27, 2012 Version 8, Release 9 - January 24, 2012 Version 8, Release 8 - October 28, 2011
Dependency/Requirements:
URL | Description |
---|---|
http://global.ihs.com | Global Engineering Documents |
http://www.cert.org | JTF-GNO Net Defense home page |
http://www.cisco.com | Cisco |
http://www.eia.org | Electronic Industry Association/Telecommunications Industry Association (EIA/TIA) |
http://www.foundrynet.com | Foundry Networks |
http://www.iana.org | Internet Assigned Numbers Authority (IANA) |
http://www.ietf.org | Internet Engineering Task Force (IETF) |
http://www.internic.net | Network Information Center (NIC) |
http://www.juniper.net | Juniper |
References:
Reference URL | Description |
---|