UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The IDPS must protect non-local maintenance sessions by separating the maintenance session from other network sessions with the device, by using either physically separated communications paths, or logically separated communications paths based upon encryption.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-NET-000175-IDPS-000161 SRG-NET-000175-IDPS-000161 SRG-NET-000175-IDPS-000161_rule Medium
Description
Network management is the process of monitoring the IDPS and links, configuring the IDPS, and enabling network services. Network management also includes the collection of performance, diagnostics, and other relevant data about each element to ensure availability and that services are being delivered to meet or exceed service level agreements. Whether a network is being managed locally or from a Network Operations Center (NOC), achieving network management objectives depends on comprehensive and reliable network management solutions. From an architectural perspective, implementing out of band (OOB) management for the IDPS is a best practice and the first step in the deployment of a management network. OOBM networks isolate network users from communication channels dedicated to network management and thereby provide traffic separation to increase security for all network management activities. The management network should have a direct link with local connection to the managed the IDPS. Where this is not possible, the management traffic can traverse over the production network or transient IP backbone via private encrypted tunnel. The OOBM access switch will connect to the management interface of the managed network elements. The management interface of the managed network element will be directly connected to the OOBM network. An OOBM interface does not forward transit traffic; thereby, providing complete separation of production and management traffic. Since all management traffic is immediately forwarded into the management network, it is not exposed to possible tampering. The separation also ensures that congestion or failures in the managed network do not affect the management of the device. If the OOBM interface does not have an IP address from the managed network address space, it will not be accessible from the NOC using scalable and normal control plane and forwarding mechanisms.
STIG Date
IDPS Security Requirements Guide (SRG) 2012-03-08

Details

Check Text ( C-43301_chk )
Verify the OOBM interface for the IDPS sensors are configured with an IP address from the address space belonging to the OOBM network.
After determining which interface is connected to the OOBM access switch, examine the interface configuration of each sensor to verify the interface has been assigned an address from the local management address block.

If the managed IDPS's OOBM interface is not configured with an IP address from the address space belonging to the OOBM network, this is a finding.
Fix Text (F-43301_fix)
Configure the managed network element's OOBM interface with an IP address from the address space belonging to the OOBM network.