SV-214520r557389_rule
V-214520
SRG-NET-000493-ALG-000028
JUSX-AG-000037
CAT II
10
Include the log and/or syslog action in all zone configurations to log attempts to access zones. To get traffic logs from permitted sessions, add "then log session-close" to the policy. To get traffic logs from denied sessions, add "then log session-init" to the policy.
set security policies from-zone <zone_name> to-zone <zone_name> policy <policy_name> then log
Example:
set security policies from-zone untrust to-zone trust policy default-deny then log
To verify what is logged in the Syslog, view the Syslog server (Syslog server configuration is out of scope for this STIG); however, the reviewer must also verify that packets are being logged to the local log using the following commands.
From operational mode, enter the following command.
show firewall log
View the Action column; the configured action of the term matches the action taken on the packet: A (accept), D (discard).
If events in the log do not reflect the action taken on the packet, this is a finding.
V-214520
False
JUSX-AG-000037
To verify what is logged in the Syslog, view the Syslog server (Syslog server configuration is out of scope for this STIG); however, the reviewer must also verify that packets are being logged to the local log using the following commands.
From operational mode, enter the following command.
show firewall log
View the Action column; the configured action of the term matches the action taken on the packet: A (accept), D (discard).
If events in the log do not reflect the action taken on the packet, this is a finding.
M
4004