STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Infoblox 7.x DNS Security Technical Implementation Guide

V-214225

CAT II (Medium)

The DHCP service must not be enabled on an external authoritative name server.

Rule ID

SV-214225r1043177_rule

STIG

Infoblox 7.x DNS Security Technical Implementation Guide

Version

V2R2

CCIs

CCI-000382

Discussion

The site DNS and DHCP architecture must be reviewed to ensure only the appropriate services are enabled on each Grid Member. An external authoritative name server must be configured to allow only authoritative DNS.

Check Content

Navigate to Grid >> Grid Manager >> Services tab.

Select "DHCP" and verify only internal Infoblox members have the service enabled.

If an external authoritative name server has DHCP enabled this is a finding.

Fix Text

Navigate to Data Management >> DHCP >> Members/Servers tab.

Select the Infoblox member using the check box and click "Stop" in the toolbar to disable the "DHCP" service.