Skip to content

The ICS must be configured to ensure inbound and outbound traffic is configured with a security policy in compliance with information flow control policies.

An XCCDF Rule

Description

Unrestricted traffic may contain malicious traffic which poses a threat to an enclave or to other connected networks. Additionally, unrestricted traffic may transit a network, which uses bandwidth and other resources. VPN traffic received from another enclave with different security policy or level of trust must not bypass be inspected by the firewall before being forwarded to the private network.

ID
SV-258583r930437_rule
Version
IVCS-VN-000010
Severity
Medium
References
Updated

Remediation Templates

A Manual Procedure

Establish Access Control policy in accordance with the site's system security plan. Policies will vary based on security policies and architecture.

In the ICS Web UI, navigate to Users >> Resource Policies >> VPN Tunneling >> Access Control.
1. Click "New Policy".
2. Enter a name.
3. Under IPv4 Resources, add all allowed ports and protocols required for users. Examples provided below: