CISC-RT-000420 - The Cisco out-of-band management (OOBM) gateway router must be configured to have separate IGP instances for the managed network and management network.

Information

If the gateway router is not a dedicated device for the OOBM network, implementation of several safeguards for containment of management and production traffic boundaries must occur. Since the managed and management network are separate routing domains, configuration of separate Interior Gateway Protocol routing instances is critical on the router to segregate traffic from each network.

Solution

This requirement is not applicable for the DODIN Backbone.

Configure the router to have a separate IGP instance for the management network as shown in the example below.

RP/0/0/CPU0:R2(config)#router ospf 2 vrf MGMT
RP/0/0/CPU0:R2(config-ospf-vrf)#area 0
RP/0/0/CPU0:R2(config-ospf-vrf-ar)#interface GigabitEthernet0/0/0/0.2
RP/0/0/CPU0:R2(config-ospf-vrf-ar-if)#exit
RP/0/0/CPU0:R2(config-ospf-vrf-ar)#exit
RP/0/0/CPU0:R2(config-ospf-vrf)#exit
RP/0/0/CPU0:R2(config-ospf)#exit
RP/0/0/CPU0:R2(config)#router ospf 3 vrf PROD
RP/0/0/CPU0:R2(config-ospf-vrf)#area 0
RP/0/0/CPU0:R2(config-ospf-vrf-ar)#interface GigabitEthernet0/0/0/0.3
RP/0/0/CPU0:R2(config-ospf-vrf-ar-if)#end

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Cisco_NX-OS_Switch_Y24M10_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-4, CAT|II, CCI|CCI-001414, Rule-ID|SV-216770r531087_rule, STIG-ID|CISC-RT-000420, STIG-Legacy|SV-105885, STIG-Legacy|V-96747, Vuln-ID|V-216770

Plugin: Cisco

Control ID: 023d6adac33ff129e5103900a960d522f3a4df8f200311bfe66393006882d15e