CASA-VN-000300 - The Cisco ASA VPN gateway must be configured to restrict what traffic is transported via the IPsec tunnel according to flow control policies - ACL

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Unrestricted traffic may contain malicious traffic which poses a threat to an enclave or to other connected networks. Additionally, unrestricted traffic may transit a network, which uses bandwidth and other resources.

VPN traffic received from another enclave with different security policy or level of trust must not bypass being inspected by the firewall before being forwarded to the private network.

Solution

Step 1: Define what traffic will be transported via the IPsec tunnel as shown in the example below.

ASA1(config)# access-list SITE1_SITE2 extended permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0

Step 2: Apply the ACL to the IPsec crypto map.

ASA1(config)# crypto map IPSEC_MAP 10 match address SITE1_SITE2

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Cisco_ASA_Y24M07_STIG.zip

Item Details

References: CAT|II, CCI|CCI-001414, Rule-ID|SV-239960r666286_rule, STIG-ID|CASA-VN-000300, Vuln-ID|V-239960

Plugin: Cisco

Control ID: cef0f69c23ff88f9f32cd5e5c78d22c067c2cec06bdb4eb8a90c99b1b8d0dcfd