STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 4 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to HPE 3PAR SSMC Web Server Security Technical Implementation Guide

V-255263

CAT II (Medium)

SSMC web server must restrict connections from nonsecure zones.

Rule ID

SV-255263r961278_rule

STIG

HPE 3PAR SSMC Web Server Security Technical Implementation Guide

Version

V2R1

CCIs

CCI-002314

Discussion

Remote access to the web server is any access that communicates through an external, non-organization-controlled network. Remote access can be used to access hosted applications or to perform management functions. A web server can be accessed remotely and must be capable of restricting access from what the DOD defines as nonsecure zones. Nonsecure zones are defined as any IP, subnet, or region that is defined as a threat to the organization. The nonsecure zones must be defined for public web servers logically located in a DMZ, as well as private web servers with perimeter protection devices. By restricting access from nonsecure zones, through internal web server access list, the web server can stop or slow denial of service (DoS) attacks on the web server. Satisfies: SRG-APP-000315-WSR-000004, SRG-APP-000315-WSR-000003

Check Content

Verify that SSMC is configured to block DOD-defined nonsecure zones  using remote host access controls by doing the following:

1. Log on to SSMC appliance as ssmcadmin. Press "X" to escape to general bash shell.

2. Execute the following command: 

$ sudo /ssmc/bin/config_security.sh -o host_access -a status

Host access is configured

If the command output does not read "Host access is configured", this is a finding.

3. Review the inbound and outbound allow lists by executing the following command:

$ grep ^ssmc.*.hosts.allow /ssmc/conf/security_config.properties

ssmc.inbound.hosts.allow=<comma separated list or range of hosts>

ssmc.outbound.hosts.allow=<comma separated list or range of hosts>

If the inbound and outbound allow lists do not restrict connections from nonsecure zones, this is a finding.

Fix Text

Configure SSMC to block access from DOD-defined nonsecure zones by enabling remote host access control by doing the following:

1. Log on to SSMC appliance as ssmcadmin. Press "X" to escape to general bash shell.

2. Configure all hosts to which network traffic needs to be allowed by setting these two properties in /ssmc/conf/security_config.properties.

ssmc.inbound.hosts.allow=<comma separated list or range of hosts; cidr and range notations are supported>

ssmc.outbound.hosts.allow=<comma separated list or range of hosts; cidr and range notations are supported>

3. Execute the following command: 

$ sudo /ssmc/bin/config_security.sh -o host_access -a set