CISC-RT-000430 - The Cisco out-of-band management (OOBM) gateway router must be configured to not redistribute routes between the management network routing domain and the managed network routing domain.

Information

If the gateway router is not a dedicated device for the OOBM network, several safeguards must be implemented for containment of management and production traffic boundaries; otherwise, it is possible that management traffic will not be separated from production traffic.

Since the managed network and the management network are separate routing domains, separate Interior Gateway Protocol routing instances must be configured on the router, one for the managed network and one for the OOBM network. In addition, the routes from the two domains must not be redistributed to each other.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

This requirement is not applicable for the DODIN Backbone.

Remove the configuration that imports routes from the managed network into the management network or vice versa as shown in the example below.

RP/0/0/CPU0:R2(config)#vrf MGMT
RP/0/0/CPU0:R2(config-vrf)#address-family ipv4 unicast
RP/0/0/CPU0:R2(config-vrf-af)#no import route-target 8:8
RP/0/0/CPU0:R2(config-vrf-af)#end

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Cisco_NX-OS_Switch_Y24M10_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-4, CAT|II, CCI|CCI-001414, Rule-ID|SV-216771r531087_rule, STIG-ID|CISC-RT-000430, STIG-Legacy|SV-105887, STIG-Legacy|V-96749, Vuln-ID|V-216771

Plugin: Cisco

Control ID: df351525571a5ecbdb348d941418eaf02c330dc5c23bf1861e82a5d7918ef1fb