I - Mission Critical Public
Rules and Groups employed by this XCCDF Profile
-
SRG-NET-000061-FW-000001
Group -
The F5 BIG-IP appliance that filters traffic from the VPN access points must be configured with organization-defined filtering rules that apply to the monitoring of remote access traffic.
Remote access devices (such as those providing remote access to network devices and information systems) that lack automated capabilities increase risk and make remote user access management diffic...Rule Medium Severity -
SRG-NET-000019-FW-000003
Group -
The F5 BIG-IP appliance must be configured to use filters that use packet headers and packet attributes, including source and destination IP addresses and ports, to prevent the flow of unauthorized or suspicious traffic between interconnected networks with different security policies, including perimeter firewalls and server VLANs.
Blocking or restricting detected harmful or suspicious communications between interconnected networks enforces approved authorizations for controlling the flow of traffic. The firewall that filter...Rule High Severity -
F5BI-FW-300005
Group -
The F5 BIG-IP appliance must generate traffic log entries containing information to establish the details of the event, including success or failure of the application of the firewall rule.
Without establishing what type of event occurred, it would be difficult to establish, correlate, and investigate the events leading up to an outage or attack. Audit event content that may be neces...Rule Medium Severity -
SRG-NET-000089-FW-000019
Group -
In the event that communication with the central audit server is lost, the F5 BIG-IP appliance must continue to queue traffic log records locally.
It is critical that when the network element is at risk of failing to process traffic logs as required, it takes action to mitigate the failure. Audit processing failures include software/hardware ...Rule Low Severity -
SRG-NET-000098-FW-000021
Group -
The F5 BIG-IP appliance must be configured to use TCP when sending log records to the central audit server.
If the default UDP protocol is used for communication between the hosts and devices to the central log server, then log records that do not reach the log server are not detected as a data loss. The...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.