1.5.4 Set the ACL for each 'snmp-server community'

Information

This feature specifies a list of IP addresses that are allowed to use the community string to gain access to the SNMP agent.

If ACLs are not applied, then anyone with a valid SNMP community string can potentially monitor and manage the router. An ACL should be defined and applied for all SNMP access to limit access to a small number of authorized management stations segmented in a trusted management zone. If possible, use SNMPv3 which uses authentication, authorization, and data privatization (encryption).

Solution

Configure authorized SNMP community string and restrict access to authorized management systems.

IOSXR(config)#snmp-server community {community_string} RO IPv4 {snmp_access-list}

Impact:

To reduce the risk of unauthorized access, Organizations should enable access control lists for all snmp-server communities and restrict the access to appropriate trusted management zones. If possible, implement SNMPv3 to apply authentication, authorization, and data privatization (encryption) for additional benefits to the organization.

See Also

https://workbench.cisecurity.org/benchmarks/10473

Item Details

Category: ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

References: 800-53|AC-17(3), 800-53|SI-7, CSCv7|11.7

Plugin: Cisco

Control ID: 6bb75aea5cd07ce351b1b21169c35d57d27d19d6f28fb7413d0089366c26b14f