AMLS-L3-000180 - Arista MLS must enforce that IGP instances configured on the OOB management gateway only peer with their own routing domain

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

If the gateway router is not a dedicated device for the out-of-band management network, implementation of several safeguards for containment of management and production traffic boundaries must occur. Since the managed and management network are separate routing domains, configuration of separate Interior Gateway Protocol routing instances is critical on the router to segregate traffic from each network.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Configure the router to enforce that Interior Gateway Protocol instances configured on the out-of-band management gateway router only peer with their own routing domain.

To configure a management vrf, enter the following from the configuration mode:
vrf definition [name]
rd [AS#]:[local assignment]

Then, from the interface configuration mode, assign the interface to the VRF:
interface [type][number]
vrf forwarding [vrf name]

Then enable IP routing for the VRF:
ip routing vrf [name]

Then, from the IGP configuration mode interface, configure the routing protocols.
router [protocol] [processID]
vrf [name]
[configuration statement]

To remove offending redistribute statements, enter the command:
no redistribute [connected/ospf/bgp/etc]

See Also

http://iasecontent.disa.mil/stigs/zip/Apr2016/U_Arista_MLS_DCS-7000_Series_RTR_V1R2_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-7(21), CAT|II, CCI|CCI-001414, Group-ID|V-60905, Rule-ID|SV-75363r1_rule, STIG-ID|AMLS-L3-000180

Plugin: Arista

Control ID: eabd15b2e46192c738721f0add7dbd3eb4c341051cfc7a777608a2835c0d1584