UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Traffic from the managed network will leak into the management network via the gateway router interface connected to the OOBM backbone.


Overview

Finding ID Version Rule ID IA Controls Severity
V-17818 NET0988 SV-19072r1_rule ECSC-1 Medium
Description
If the gateway router is not a dedicated device for the OOBM network, several safeguards must be implemented for containment of management and production traffic boundaries such as using interface ACLs or filters at the boundaries between the two networks.
STIG Date
Infrastructure L3 Switch Security Technical Implementation Guide 2017-06-27

Details

Check Text ( C-19235r1_chk )
Examine the egress filter on the OOBM interface of the gateway router to verify that only traffic sourced from the management address space is allowed to transit the OOBM backbone. In the example configurations below, the 10.1.1.0/24 is the management network address space at the enclave or managed network and 10.2.2.0/24 is the management network address space at the NOC.

Fix Text (F-17733r1_fix)
Configure the OOBM gateway router interface ACLs to ensure traffic from the managed network does not leak into the management network.