STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 6 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Symantec ProxySG ALG Security Technical Implementation Guide

V-94319

CAT II (Medium)

Symantec ProxySG must implement load balancing to limit the effects of known and unknown types of denial-of-service (DoS) attacks.

Rule ID

SV-104273r1_rule

STIG

Symantec ProxySG ALG Security Technical Implementation Guide

Version

V1R3

CCIs

CCI-002385

Discussion

If the network does not provide safeguards against DoS attacks, network resources will be unavailable to users. Load balancing provides service redundancy, which reduces the susceptibility of the ALG to many DoS attacks. The ALG must be configured to prevent or mitigate the impact on network availability and traffic flow of DoS attacks that have occurred or are ongoing. This requirement applies to the network traffic functionality of the device as it pertains to handling network traffic. Some types of attacks may be specialized to certain network technologies, functions, or services. For each technology, known and potential DoS attacks must be identified and solutions for each type implemented. For detailed information, see the ProxySG Administration Guide, Chapter 39: Configuring Failover.

Check Content

Verify that redundancy has been configured on the ProxySG.

1. Log on to the Web Management Console.
2. Browse to Configuration >> Network >> Advanced.
3. Select the "Failover" tab and Verify that entries are present and that they are "enabled".

If Symantec ProxySG does not implement load balancing to limit the effects of known and unknown types of DoS attacks, this is a finding.

Fix Text

Configure redundancy on the ProxySG.

1. Log on to the Web Management Console.
2. Browse to Configuration >> Network >> Advanced.
3. Select the "Failover" tab and configure using the SSP requirements.