UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

IPSec tunnels used to transit management traffic must be restricted to only the authorized management packets based on destination and source IP address.


Overview

Finding ID Version Rule ID IA Controls Severity
V-17754 NET1807 SV-18945r2_rule Medium
Description
The Out-of-Band Management (OOBM) network is an IP network used exclusively for the transport of OAM&P data from the network being managed to the OSS components located at the NOC. Its design provides connectivity to each managed network device enabling network management traffic to flow between the managed NEs and the NOC. This allows the use of paths separate from those used by the network being managed. Traffic from the managed network to the management network and vice-versa must be secured via IPSec encapsulation.
STIG Date
Infrastructure L3 Switch Security Technical Implementation Guide 2019-01-09

Details

Check Text ( C-19015r3_chk )
Review the device configuration to determine if IPSec tunnels used in transiting management traffic are filtered to only accept authorized traffic based on source and destination IP addresses of the management network.

If filters are not restricting only authorized management traffic into the IPSec tunnel, this is a finding.
Fix Text (F-17652r2_fix)
Configure filters based on source and destination IP address to restrict only authorized management traffic into IPSec tunnels used for transiting management data.