Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-17819 | NET0989 | SV-19073r2_rule | ECSC-1 | Medium |
Description |
---|
If the gateway router is not a dedicated device for the OOBM network, several safeguards must be implemented for containment of management and production traffic boundaries. To provide separation, access control lists or filters must be configured to block any traffic from the management network destined for the managed network's production address spaces. |
STIG | Date |
---|---|
Perimeter L3 Switch Security Technical Implementation Guide - Cisco | 2015-04-06 |
Check Text ( C-19236r4_chk ) |
---|
Examine the ingress filter on the OOBM interface of the gateway router to verify that traffic is only destined to the local management address space. If the device is not configured from prohibiting management traffic off the managed network, this is a finding. |
Fix Text (F-17734r2_fix) |
---|
Configure access control lists or filters to block any traffic from the management network destined for the managed network's production address spaces. |