UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The network device must log all access control lists (ACL) deny statements.


Overview

Finding ID Version Rule ID IA Controls Severity
V-3000 NET1020 SV-15474r3_rule ECAT-1 ECAT-2 ECSC-1 Low
Description
Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done, attempted to be done, and by whom in order to compile an accurate risk assessment. Auditing the actions on network devices provides a means to recreate an attack, or identify a configuration mistake on the device.
STIG Date
Perimeter Router Security Technical Implementation Guide Cisco 2015-07-01

Details

Check Text ( C-12940r3_chk )
Review the network device interface ACLs to verify all deny statements are logged.

Cisco IOS example:
interface FastEthernet 0/0
description external interface peering with ISP or non-DoD network
ip address 199.36.92.1 255.255.255.252
ip access-group 100 in

access-list 100 deny icmp any any fragments log
access-list 100 deny ip 169.254.0.0 0.0.255.255 any log
access-list 100 deny ip 10.0.0.0 0.255.255.255 any log
access-list 100 deny ip 172.16.0.0 0.15.255.255 any log
access-list 100 deny ip 192.168.0.0 0.0.255.255 any log
access-list 100 permit icmp any host 199.36.92.1 echo-reply
access-list 100 permit icmp any host 199.36.90.10 echo-reply
access-list 100 deny icmp any any log
access-list 100 deny ip any any log
Fix Text (F-3025r4_fix)
Configure interface ACLs to log all deny statements.