The A10 Networks ADC, when used to load balance web applications, must examine incoming user requests against the URI White Lists.
Kona Site Defender must only allow incoming communications from organization-defined authorized sources routed to organization-defined authorized destinations.
The Arista Multilayer Switch must only allow incoming communications from authorized sources to be routed to authorized destinations.
The ALG must only allow incoming communications from organization-defined authorized sources routed to organization-defined authorized destinations.
The Arista perimeter router must be configured to only allow incoming communications from authorized sources to be routed to authorized destinations.
The Arista perimeter router must be configured to block inbound packets with source Bogon IP address prefixes.
The Arista perimeter router must be configured to have Link Layer Discovery Protocols (LLDPs) disabled on all external interfaces.
The Arista perimeter router must be configured to have Proxy ARP disabled on all external interfaces.
The Arista multicast Designated Router (DR) must be configured to filter the Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Report messages to allow hosts to join only multicast groups that have been approved by the organization.
The Arista multicast Designated Router (DR) must be configured to filter the Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Report messages to allow hosts to join a multicast group only from sources that have been approved by the organization.
The Arista Multicast Source Discovery Protocol (MSDP) router must be configured to only accept MSDP packets from known MSDP peers.
The perimeter router must be configured to block all packets with any IP options.
The PE router must be configured to ignore or block all packets with any IP options.
The CA API Gateway must only allow incoming communications from organization-defined authorized sources routed to organization-defined authorized destinations.
The firewall must apply ingress filters to traffic that is inbound to the network through any active external interface.
The firewall must apply egress filters to traffic that is outbound from the network through any internal interface.
The premise firewall (located behind the premise router) must block all outbound management traffic.
The firewall must restrict traffic entering the VPN tunnels to the management network to only the authorized management packets based on destination address.
The FortiGate firewall must apply ingress filters to traffic that is inbound to the network through any active external interface.
The FortiGate firewall must apply egress filters to traffic outbound from the network through any internal interface.
When employed as a premise firewall, FortiGate must block all outbound management traffic.
The FortiGate firewall must restrict traffic entering the VPN tunnels to the management network to only the authorized management packets based on destination address.
The HP FlexFabric Switch must only allow incoming communications from authorized sources to be routed to authorized destinations.
The DataPower Gateway must only allow incoming communications from organization-defined authorized sources routed to organization-defined authorized destinations.
The DataPower Gateway must not use 0.0.0.0 as a listening IP address for any service.
The Sentry must only allow incoming communications from organization-defined authorized sources routed to organization-defined authorized destinations.
The Juniper perimeter router must be configured to only allow incoming communications from authorized sources to be routed to authorized destinations.
The Juniper perimeter router must be configured to block inbound packets with source Bogon IP address prefixes.
The Juniper perimeter router must be configured to block all packets with any IP options.
The Juniper perimeter router must be configured to have Link Layer Discovery Protocol (LLDP) disabled on all external interfaces.
The Juniper perimeter router must be configured to have Proxy ARP disabled on all external interfaces.
The Juniper SRX Services Gateway Firewall must only allow inbound communications from organization-defined authorized sources routed to organization-defined authorized destinations.
The Juniper PE router must be configured to ignore or block all packets with any IP options.
The Juniper multicast Designated Router (DR) must be configured to filter the Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Report messages to allow hosts to join only multicast groups that have been approved by the organization.
The Juniper multicast Designated Router (DR) must be configured to filter the Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Report messages to allow hosts to join a multicast group only from sources that have been approved by the organization.
The Juniper Multicast Source Discovery Protocol (MSDP) router must be configured to only accept MSDP packets from known MSDP peers.
The Juniper perimeter router must be configured drop IPv6 packets with a Routing Header type 0, 1, or 3255.
The Juniper perimeter router must be configured to drop IPv6 packets containing a Hop-by-Hop header with invalid option type values.
The Juniper perimeter router must be configured to drop IPv6 packets containing a Destination Option header with invalid option type values.
The Juniper perimeter router must be configured to drop IPv6 packets containing an extension header with the Endpoint Identification option.
The Juniper perimeter router must be configured to drop IPv6 packets containing the NSAP address option within Destination Option header.
The Juniper perimeter router must be configured to drop IPv6 packets containing a Hop-by-Hop or Destination Option extension header with an undefined option type.
The Juniper SRX Services Gateway VPN must only allow incoming VPN communications from organization-defined authorized sources routed to organization-defined authorized destinations.
The perimeter router must be configured to only allow incoming communications from authorized sources to be routed to authorized destinations.
The perimeter router must be configured to block inbound packets with source Bogon IP address prefixes.
The perimeter router must be configured to have Link Layer Discovery Protocols (LLDPs) disabled on all external interfaces.
The perimeter router must be configured to have Proxy ARP disabled on all external interfaces.
The multicast Designated Router (DR) must be configured to filter the Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Report messages to allow hosts to join only multicast groups that have been approved by the organization.
The multicast Designated Router (DR) must be configured to filter the Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Report messages to allow hosts to join a multicast group only from sources that have been approved by the organization.
The Multicast Source Discovery Protocol (MSDP) router must be configured to only accept MSDP packets from known MSDP peers.
The router must not be configured to have any feature enabled that calls home to the vendor.
The perimeter router must be configured to drop IPv6 undetermined transport packets.
The perimeter router must be configured drop IPv6 packets with a Routing Header type 0, 1, or 3255.
The perimeter router must be configured to drop IPv6 packets containing a Hop-by-Hop header with invalid option type values.
The perimeter router must be configured to drop IPv6 packets containing a Destination Option header with invalid option type values.
The perimeter router must be configured to drop IPv6 packets containing an extension header with the Endpoint Identification option.
The perimeter router must be configured to drop IPv6 packets containing the NSAP address option within Destination Option header.
The perimeter router must be configured to drop IPv6 packets containing a Hop-by-Hop or Destination Option extension header with an undefined option type.
The SDN controller must be configured to only allow incoming communications from organization-defined authorized sources routed to organization-defined authorized destinations.
Symantec ProxySG must allow incoming communications only from organization-defined authorized sources routed to organization-defined authorized destinations.
The NSX-T Tier-1 Gateway Firewall must apply ingress filters to traffic that is inbound to the network through any active external interface.
The NSX-T Tier-0 Gateway Firewall must apply ingress filters to traffic that is inbound to the network through any active external interface.
The Cisco ASA must be configured to filter inbound traffic on all external interfaces.
The Cisco ASA must be configured to filter outbound traffic on all internal interfaces.
The Cisco ASA perimeter firewall must be configured to block all outbound management traffic.
The Cisco ASA must be configured to forward management traffic to the Network Operations Center (NOC) via an IPsec tunnel.
The Cisco perimeter router must be configured to only allow incoming communications from authorized sources to be routed to authorized destinations.
The Cisco perimeter router must be configured to block inbound packets with source Bogon IP address prefixes.
The Cisco perimeter router must be configured to have Link Layer Discovery Protocol (LLDP) disabled on all external interfaces.
The Cisco perimeter router must be configured to have Cisco Discovery Protocol (CDP) disabled on all external interfaces.
The Cisco perimeter router must be configured to have Proxy ARP disabled on all external interfaces.
The Cisco multicast Designated Router (DR) must be configured to filter the Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Report messages to allow hosts to join only multicast groups that have been approved by the organization.
The Cisco multicast Designated Router (DR) must be configured to filter the Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Report messages to allow hosts to join a multicast group only from sources that have been approved by the organization.
The Cisco Multicast Source Discovery Protocol (MSDP) router must be configured to only accept MSDP packets from known MSDP peers.
The Cisco perimeter router must be configured to block all packets with any IP options.
The Cisco PE router must be configured to drop all packets with any IP options.
The Cisco perimeter router must be configured to drop IPv6 undetermined transport packets.
The Cisco perimeter router must be configured drop IPv6 packets with a Routing Header type 0, 1, or 3–255.
The Cisco perimeter router must be configured to drop IPv6 packets containing a Hop-by-Hop header with invalid option type values.
The Cisco perimeter router must be configured to drop IPv6 packets containing a Destination Option header with invalid option type values.
The Cisco perimeter router must be configured to drop IPv6 packets containing an extension header with the Endpoint Identification option.
The Cisco perimeter router must be configured to drop IPv6 packets containing the NSAP address option within Destination Option header.
The Cisco perimeter router must be configured to drop IPv6 packets containing a Hop-by-Hop or Destination Option extension header with an undefined option type.
The Cisco perimeter switch must be configured to only allow incoming communications from authorized sources to be routed to authorized destinations.
The Cisco perimeter switch must be configured to block inbound packets with source Bogon IP address prefixes.
The Cisco perimeter switch must be configured to have Link Layer Discovery Protocol (LLDP) disabled on all external interfaces.
The Cisco perimeter switch must be configured to have Cisco Discovery Protocol (CDP) disabled on all external interfaces.
The Cisco perimeter switch must be configured to have Proxy ARP disabled on all external interfaces.
The Cisco multicast Designated switch (DR) must be configured to filter the Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Report messages to allow hosts to join only multicast groups that have been approved by the organization.
The Cisco multicast Designated switch (DR) must be configured to filter the Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Report messages to allow hosts to join a multicast group only from sources that have been approved by the organization.
The Cisco perimeter switch must be configured to block all packets with any IP options.
The Cisco PE switch must be configured to ignore or drop all packets with any IP options.
The Cisco perimeter switch must be configured to drop IPv6 undetermined transport packets.
The Cisco perimeter switch must be configured drop IPv6 packets with a Routing Header type 0, 1, or 3-255.
The Cisco perimeter switch must be configured to drop IPv6 packets containing a Hop-by-Hop header with invalid option type values.
The Cisco perimeter switch must be configured to drop IPv6 packets containing a Destination Option header with invalid option type values.
The Cisco perimeter switch must be configured to drop IPv6 packets containing an extension header with the Endpoint Identification option.
The Cisco perimeter switch must be configured to drop IPv6 packets containing the NSAP address option within Destination Option header.
The Cisco perimeter switch must be configured to drop IPv6 packets containing a Hop-by-Hop or Destination Option extension header with an undefined option type.
The Cisco PE router must be configured to ignore or drop all packets with any IP options.
The Cisco Multicast Source Discovery Protocol (MSDP) switch must be configured to only accept MSDP packets from known MSDP peers.
The Cisco PE router must be configured to ignore or block all packets with any IP options.
The Cisco switch must not be configured to have any feature enabled that calls home to the vendor.
The Juniper router must not be configured to have any feature enabled that calls home to the vendor.
The Juniper perimeter router must be configured to have Link Layer Discovery Protocols (LLDPs) disabled on all external interfaces.
The Juniper multicast Designated Router (DR) must be configured to filter the IGMP and MLD Report messages to allow hosts to join only multicast groups that have been approved by the organization.
The Juniper multicast Designated Router (DR) must be configured to filter the IGMP and MLD Report messages to allow hosts to join a multicast group only from sources that have been approved by the organization.
The Juniper perimeter router must be configured to drop fragmented IPv6 packets where the first fragment does not include the entire IPv6 header chain.
The Windows PAW must be configured so that all inbound ports and services to a PAW are blocked except as needed for monitoring, scanning, and management tools or when the inbound communication is a response to an outbound connection request.
The network device must not be configured to have any feature enabled that calls home to the vendor.
The Palo Alto Networks security platform must only allow incoming communications from organization-defined authorized sources forwarded to organization-defined authorized destinations.
The BIG-IP AFM module must be configured to only allow incoming communications from authorized sources routed to authorized destinations.
The BIG-IP Core implementation must be configured to only allow incoming communications from authorized sources routed to authorized destinations.
The F5 BIG-IP appliance must be configured to filter inbound traffic on all external interfaces.
The F5 BIG-IP appliance must be configured to filter outbound traffic on all internal interfaces.
The F5 BIG-IP appliance must be configured to block all outbound management traffic.
The perimeter router must be configured to block all outbound management traffic.
The NSX Tier-0 Gateway Firewall must deny network communications traffic by default and allow network communications traffic by exception.
The NSX Tier-1 Gateway firewall must deny network communications traffic by default and allow network communications traffic by exception.