STIGQter STIGQter: STIG Summary: Virtual Private Network (VPN) Security Requirements Guide Version: 2 Release: 3 Benchmark Date: 23 Apr 2021:

For site-to-site VPN implementations, the L2TP protocol must be blocked or denied at the security boundary with the private network so unencrypted L2TP packets cannot traverse into the private network of the enclave.

DISA Rule

SV-207207r608988_rule

Vulnerability Number

V-207207

Group Title

SRG-NET-000132

Rule Version

SRG-NET-000132-VPN-000480

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

If L2TP is used for encapsulation, configure the VPN Gateway or other network element to block or deny this communications protocol unencrypted L2TP packets across the security boundary and into the private network of the enclave.

Check Contents

If L2TP communications protocol is not used, this is not applicable.

Verify the VPN Gateway or another network element (e.g., firewall) is configure to block or deny L2TP packets with a destination address within the private network of the enclave.

If L2TP communications are allowed to cross the security boundary into the private network of the enclave, this is a finding.

Vulnerability Number

V-207207

Documentable

False

Rule Version

SRG-NET-000132-VPN-000480

Severity Override Guidance

If L2TP communications protocol is not used, this is not applicable.

Verify the VPN Gateway or another network element (e.g., firewall) is configure to block or deny L2TP packets with a destination address within the private network of the enclave.

If L2TP communications are allowed to cross the security boundary into the private network of the enclave, this is a finding.

Check Content Reference

M

Target Key

2920

Comments