UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The network element’s management interface is not configured as passive for the IGP instance deployed in the managed network.


Overview

Finding ID Version Rule ID IA Controls Severity
V-17823 NET0993 SV-19336r2_rule Low
Description
The OOBM access switch will connect to the management interface of the managed network elements. The management interface can be a true OOBM interface or a standard interface functioning as the management interface. In either case, the management interface of the managed network element will be directly connected to the OOBM network. An OOBM interface does not forward transit traffic; thereby, providing complete separation of production and management traffic. Since all management traffic is immediately forwarded into the management network, it is not exposed to possible tampering. The separation also ensures congestion or failures in the managed network do not affect the management of the device. If the device does not have an OOBM port, the interface functioning as the management interface must be configured so management traffic, both data plane and control plane, does not leak into the managed network and production traffic does not leak into the management network.
STIG Date
Firewall Security Technical Implementation Guide - Cisco 2017-12-07

Details

Check Text ( C-20315r3_chk )
If the managed network element is a Cisco PIX or ASA firewall with an IGP enabled, review the configuration to verify the management interface is configured as passive for the IGP instance for the managed network. In the example below, OSPF is only enabled on the interface connecting to the internal network.

interface Ethernet0/2
nameif Management
security-level 90
ip address 10.1.1.23 255.255.255.0
management-only
interface GigabitEthernet0
nameif outside
security-level 0
ip address 172.20.2.1 255.255.255.0
interface GigabitEthernet1
nameif inside
security-level 100
ip address 192.168.1.0 255.255.255.0

!
router ospf 1
network 192.168.1.0 255.255.255.0 area 1


Fix Text (F-17738r2_fix)
Configure the management interface as passive for the IGP instance configured for the managed network. Depending on the platform and routing protocol, this may simply require that the interface or its IP address is not included in the IGP configuration.