Checked | Name | Title |
---|
☐ | SV-74347r1_rule | The BIG-IP AFM module must be configured to enforce approved authorizations for controlling the flow of information within the network based on attribute- and content-based inspection of the source, destination, headers, and/or content of the communications traffic. |
☐ | SV-74351r1_rule | The BIG-IP AFM module must be configured to restrict or block harmful or suspicious communications traffic by controlling the flow of information between interconnected networks based on attribute- and content-based inspection of the source, destination, headers, and/or content of the communications traffic. |
☐ | SV-74353r1_rule | The BIG-IP AFM module must be configured to produce audit records containing information to establish what type of events occurred. |
☐ | SV-74355r1_rule | The BIG-IP AFM module must be configured to only allow incoming communications from authorized sources routed to authorized destinations. |
☐ | SV-74357r1_rule | The BIG-IP AFM module must be configured to handle invalid inputs in a predictable and documented manner that reflects organizational and system objectives. |