UCF STIG Viewer Logo

The network element must protect non-local maintenance sessions by separating the maintenance session from other network sessions with the device, by using either physically separated communications paths, or logically separated communications paths based upon encryption.


Overview

Finding ID Version Rule ID IA Controls Severity
V-34692 SRG-NET-000175-IDPS-NA SV-45575r1_rule Low
Description
Network management is the process of monitoring network elements and links, configuring network elements, and enabling network services. Network management also includes the collection of performance, diagnostics, and other relevant data about each element to ensure availability and that services are being delivered to meet or exceed service level agreements. Whether a network is being managed locally or from a Network Operations Center (NOC), achieving network management objectives depends on comprehensive and reliable network management solutions. From an architectural perspective, implementing out-of-band (OOB) management for network elements is a best practice and the first step in the deployment of a management network. OOB management networks isolate network users from communication channels dedicated to network management and thereby provide traffic separation to increase security for all network management activities. The management network should have a direct link with local connection to the managed network elements. Where this is not possible, the management traffic can traverse over the production network or transient IP backbone via private encrypted tunnel. Creating logical or physically separate communications pathways for network traffic is not a function of the IDPS.
STIG Date
Intrusion Detection and Prevention Systems (IDPS) Security Requirements Guide 2012-11-19

Details

Check Text ( C-42928r1_chk )
This requirement is NA for IDPS. No fix required.
Fix Text (F-38972r1_fix)
This requirement is NA for IDPS. No fix required.