Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-256023 | ARST-RT-000420 | SV-256023r882411_rule | Medium |
Description |
---|
The OOBM network is an IP network used exclusively for the transport of OAM&P data from the network being managed to the OSS components located at the NOC. Its design provides connectivity to each managed network device, enabling network management traffic to flow between the managed network elements and the NOC. This allows the use of paths separate from those used by the managed network. |
STIG | Date |
---|---|
Arista MLS EOS 4.2x Router Security Technical Implementation Guide | 2023-01-17 |
Check Text ( C-59699r882409_chk ) |
---|
This requirement is not applicable for the DODIN backbone. Review the network topology diagram to determine connectivity between the managed network and the NOC. Review the OOBM gateway router configuration to validate the path that the management traffic traverses. Step 1: To verify only management traffic is forwarded through the OOBM interface or IPsec tunnel, execute the command "sh ip access-list". ip access-list OOBM_to_MGMT 10 permit tcp 10.10.10.0/24 host 10.20.10.1 eq ssh telnet 20 permit ip 10.10.10.0/24 192.168.10.0/24 30 permit udp 10.20.20.0/24 any eq bootps snmp Step 2: To verify the ACL is applied outbound on the OOBM interface, execute the command "sh run int Eth YY". interface ethernet 1 description OOBM to MGMT link ip access-group OOBM_to_MGMT out If traffic other than authorized management traffic is permitted through the OOBM interface or IPsec tunnel, this is a finding. |
Fix Text (F-59642r882410_fix) |
---|
This requirement is not applicable for the DODIN backbone. Configure filters based on port, source IP address, and destination IP address to permit only authorized management traffic into IPsec tunnels or the OOBM interface used for forwarding management data. Step 1: To configure an ACL to allow only management traffic to be forwarded through the OOBM interface or IPsec tunnel, execute the command "sh ip access-list". ip access-list OOBM_to_MGMT 10 permit tcp 10.10.10.0/24 host 10.20.10.1 eq ssh 20 permit ip 10.10.10.0/24 192.168.10.0/24 30 permit udp 10.20.20.0/24 any eq bootps snmp Step 2: To apply the ACL outbound on the OOBM interface, execute the command "sh run int Eth YY". interface ethernet 1 description OOBM to MGMT link ip access-group OOBM_to_MGMT out |