STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 5 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Firewall Security Requirements Guide

V-206699

CAT II (Medium)

The firewall must be configured to send traffic log entries to a central audit server for management and configuration of the traffic log entries.

Rule ID

SV-206699r953982_rule

STIG

Firewall Security Requirements Guide

Version

V3R3

CCIs

CCI-001851

Discussion

Without the ability to centrally manage the content captured in the traffic log entries, identification, troubleshooting, and correlation of suspicious behavior would be difficult and could lead to a delayed or incomplete analysis of an ongoing attack. The DoD requires centralized management of all network component audit record content. Network components requiring centralized traffic log management must have the ability to support centralized management. The content captured in traffic log entries must be managed from a central location (necessitating automation). Centralized management of traffic log records and logs provides for efficiency in maintenance and management of records, as well as the backup and archiving of those records. Ensure at least one syslog server is configured on the firewall. If the product inherently has the ability to store log records locally, the local log must also be secured. However, this requirement is not met since it calls for a use of a central audit server.

Check Content

Examine the traffic log configuration on the firewall.

Verify the firewall is configured to send traffic log entries to the organization's central audit server. 

If the firewall is not configured to send traffic log entries to the organization's central audit server, this is a finding.

Fix Text

Configure the firewall to ensure traffic log entries are transmitted to the organization's central audit server (e.g., syslog server).