UCF STIG Viewer Logo

Management network traffic is leaking into the managed network.


Overview

Finding ID Version Rule ID IA Controls Severity
V-17819 NET0989 SV-19306r1_rule Medium
Description
If the gateway router is not a dedicated device for the OOBM network, several safeguards must be implemented for containment of management and production traffic boundaries. To provide separation, access control lists or filters must be configured to block any traffic from the management network destined for the managed network’s production address spaces.
STIG Date
Infrastructure Router - Juniper Security Technical Implementation Guide 2017-09-28

Details

Check Text ( C-20207r1_chk )
Examine the ingress filter on the OOBM interface of the gateway router to verify that traffic is only destined to the local management address space. In the example configurations below, the 10.1.1.0/24 is the local management network address space at the enclave or managed network and 10.2.2.0/24 is the management network address space at the NOC.

interfaces {
fe-0/0/0 {
description “link to our Private Net”
unit 0 {
family inet {
address 172.20.4.2/24;
}
}
}
fe-0/0/1 {
description “link to our Service Net”
unit 0 {
family inet {
address 172.20.5.2/24;
}
}
}
fe-0/0/2 {
description “link to our Management LAN”
unit 0 {
family inet {
address 10.1.1.2/24;
}
}
}
t3-3/0/3 {
description “link to OOBM Backbone”
unit 0 {
family inet {
filter {
input OOBM-ingress-filter;
output OOBM-egress-filter;
}
address 10.1.20.3/24;
}
}
}
firewall {
filter OOBM-ingress-filter {
term allow-mgmt {
from {
source-address {
10.2.2.0/24;
}
destination-address {
10.1.1.0/24;
}
}
then {
accept;
}
}


term default-action {
then {
syslog;
discard;
}
}
}
}
Fix Text (F-17734r2_fix)
Configure access control lists or filters to block any traffic from the management network destined for the managed network's production address spaces.