STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 6 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Symantec ProxySG NDM Security Technical Implementation Guide

V-94657

CAT I (High)

Symantec ProxySG must configure Web Management Console access restrictions to authorized IP address/ranges.

Rule ID

SV-104487r1_rule

STIG

Symantec ProxySG NDM Security Technical Implementation Guide

Version

V1R2

CCIs

CCI-000213

Discussion

It is important that administrative access (SSH, web) to an appliance using the account of last resort be able to be restricted to only the appropriate networks/subnets in order to reduce the likelihood of unauthorized access.

Check Content

Verify console access using the account of last resort has been restricted to specific networks/subnets.

1. Log on to the Web Management Console.
2. Click >> Configuration >> Authentication >> Console Access.
3. Confirm that the correct networks/subnets are specified in the list.

If there are no entries in the list, this is a finding.

Fix Text

Configure console access using the account of last resort to specific networks/subnets.

1. Log on to the Web Management Console.
2. Click Configuration >> Authentication >> Console Access.
3. Click "New".
4. Enter the IP address and subnet mask for the desired network and click "OK".
5. Repeat step 4 until all desired networks have been added.
6. Click "Apply".