UCF STIG Viewer Logo

The out-of-band management (OOBM) gateway router must be configured to have separate IGP instances for the managed network and management network.


Overview

Finding ID Version Rule ID IA Controls Severity
V-207116 SRG-NET-000019-RTR-000011 SV-207116r604135_rule Medium
Description
If the gateway router is not a dedicated device for the OOBM network, implementation of several safeguards for containment of management and production traffic boundaries must occur. Since the managed and management network are separate routing domains, configuration of separate Interior Gateway Protocol routing instances is critical on the router to segregate traffic from each network.
STIG Date
Router Security Requirements Guide 2021-03-16

Details

Check Text ( C-7377r382241_chk )
This requirement is not applicable for the DoDIN Backbone.

Verify that the OOBM interface is an adjacency in the Interior Gateway Protocol routing domain for the management network.

If the router does not enforce that Interior Gateway Protocol instances configured on the OOBM gateway router peer only with their own routing domain, this is a finding.
Fix Text (F-7377r382242_fix)
This requirement is not applicable for the DoDIN Backbone.

Configure the router to enforce that Interior Gateway Protocol instances configured on the OOBM gateway router peer only with their own routing domain.