UCF STIG Viewer Logo

The router must enforce that the managed network domain and the management network domain are separate routing domains and the IGP instances are not redistributed or advertised to each other.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-NET-000019-RTR-000013 SRG-NET-000019-RTR-000013 SRG-NET-000019-RTR-000013_rule Medium
Description
If the gateway router is not a dedicated device for the OOBM network, several safeguards must be implemented for containment of management and production traffic boundaries. Since the managed network and the management network are separate routing domains, separate IGP routing instances must be configured on the router, --one for the managed network and one for the OOBM network. In addition, the routes from the two domains must not be redistributed to each other.
STIG Date
Router Security Requirements Guide 2013-07-30

Details

Check Text ( C-SRG-NET-000019-RTR-000013_chk )
Verify the IGP instance used for the managed network does not redistribute routes into the IGP instance used for the management network, and vice versa. If the IGP instance used for the managed network redistributes routes into the IGP instance used for the management network, or vice versa, this is a finding.
Fix Text (F-SRG-NET-000019-RTR-000013_fix)
Configure the IGP instance used for the managed network to prohibit redistribution of routes into the IGP instance used for the management network, and vice versa.