From IBM DataPower ALG Security Technical Implementation Guide
Part of SRG-NET-000132-ALG-000087
Associated with: CCI-000382
In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embedding of data types within data types); organizations must disable or restrict unused or unnecessary physical and logical ports/protocols on information systems.
Review the list of authorized applications, services, and protocols that has been added to the PPSM database. Privileged Account User logon to the WebGUI >> Log on to the Default domain >> Click Status >> Main >> Active Services >> Click Show All Domains. If any of the Active Services allows traffic that is prohibited by the PPSM CAL, this is a finding.
Review the PPSM CAL before configuring services on the DataPower Gateway. This device will either be placed in the enclave DMZ or on a private network; this must be taken into account. Configure only those services that are not prohibited and follow PPSM guidance for each service, protocol, and port.
Lavender hyperlinks in small type off to the right (of CSS
class id
, if you view the page source) point to
globally unique URIs for each document and item. Copy the
link location and paste anywhere you need to talk
unambiguously about these things.
You can obtain data about documents and items in other
formats. Simply provide an HTTP header Accept:
text/turtle
or
Accept: application/rdf+xml
.
Powered by sagemincer