This is a potential security issue, you are being redirected to https://nvd.nist.gov
|Cisco PIX ASA||cpe:/h:cisco:pix_asa (View CVEs)|
|Foundry Networks BigIron Router||cpe:/h:foundrynet:bigiron_router (View CVEs)|
|Juniper Router M10||cpe:/h:juniper:router_m10 (View CVEs)|
|Juniper Router M16||cpe:/h:juniper:router_m16 (View CVEs)|
|Juniper Router M20||cpe:/h:juniper:router_m20 (View CVEs)|
|Juniper Router M40||cpe:/h:juniper:router_m40 (View CVEs)|
|Juniper Router M5||cpe:/h:juniper:router_m5 (View CVEs)|
A core mission for the Defense Information Systems Agency (DISA) Field Security Operations (FSO) is to aid in securing Department of Defense (DoD) Networks. The processes and procedures outlined in this Security Technical Implementation Guide (STIG), when applied, will decrease the vulnerability of DoD sensitive information. Network Security is clearly still one of the biggest concerns for our DoD customers (i.e., the warfighter). The intent of the Network Infrastructure STIG is to include security considerations at the network level needed to provide an acceptable level of risk for information as it is transmitted throughout an enclave. This STIG has been developed to enhance the confidentiality, integrity, and availability of sensitive DoD Automated Information Systems (AIS). Each site network/communications infrastructure must provide secure, available, and reliable data for all customers. This document is designed to supplement the security guidance provided by DoD-specific requirements. This document will assist sites in meeting the minimum requirements, standards, controls, and options that must be in place for secure network operations.
These requirements are designed to assist Security Managers (SMs), Information Assurance Managers (IAMs), IAOs, Network Security Officers (NSOs), and System Administrators (SAs) with configuring and maintaining security controls. This guidance supports DoD system design, development, implementation, certification, and accreditation efforts.
DoD Directive 8500.1 and DoD Directive 8500.2
Comments or proposed revisions to this document should be sent via e-mail to firstname.lastname@example.org. DISA FSO will coordinate all change requests with the relevant DoD organizations before inclusion in this document.
Version 8, Release 17 - 04/25/2014 Version 8, Release 16 - 10/25/2013 Version 8, Release 15 - 07/25/2013 Version 8, Release 14 - 04/26/2013 Version 8, Release 13 - 01/25/2013 Version 8, Release 11 - 07/27/2012 Version 8, Release 10 - 04/27/2012 Version 8, Release 9 - 01/24/2012 Version 8, Release 8 - 10/28/2011 Version 8, Release 7 - 07/28/2011 Updated "Point of Contact" and "Comments" Sectons - 15 January 2015 Version 8. Release 18 - 26 January 2015 Version 8, Release 19 - 29 October 2015 Changed status from "Under Review" to "Final" - 04 December 2015 updated to - v8, r20 - 07/22/2016 Updated to FINAL - 09/12/2016 Updated STIG to v8, r21 - 10/28/2016 updated to FINAL - 12/07/2016 Updated to Version 8, Release 22 - 04/28/2017 Updated to FINAL - 06/09/2017 Updated URL to reflect change to the DISA website - http --> https Updated - 11/01/2017 Updated to FINAL - 11/27/2017 updated to v8,r25 - 02/16/2018 Updated to FINAL - 3/18/2018 updated to Ver 8, Rel 26 - 4/25/18 Updated to FINAL - 5/25/18 updated reference link - 7/11/18 updated to Version 8, Release 27 - 7/24/18 Updated to FINAL - 8/24/18 Updated to Version 8, Release 28- 10/25/18 Updated to FINAL - 11/26/18 updated to Version 8, Release 29- 1/23/19 Updated to FINAL - 2/19/19 Updated URLs - 6/12/19 Sunset per DISA - 12/3/19
|http://www.iana.org||Internet Assigned Numbers Authority (IANA)|
|http://www.ietf.org||Internet Engineering Task Force (IETF)|
|http://www.internic.net||Network Information Center (NIC)|
|https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Network_Infrastructure_V8R8_Overview.zip||Network Infrastructure Overview - Ver 8, Rel 8|
|https://www.sei.cmu.edu/about/divisions/cert/index.cfm||JTF-GNO Net Defense home page|