NET1800 - IPSec VPN is not configured as a tunnel type VPN

Information

The IAO will ensure IPSec VPNs are established as tunnel type VPNs when transporting management traffic across an ip backbone network.

Using dedicated paths, the OOBM backbone connects the OOBM gateway routers located at the premise of the managed networks and at the NOC. Dedicated links can be deployed using provisioned circuits (ATM, Frame Relay, SONET, T-carrier, and others or VPN technologies such as subscribing to MPLS Layer 2 and Layer 3 VPN services) or implementing a secured path with gateway-to-gateway IPsec tunnel. The tunnel mode ensures that the management traffic will be logically separated from any other traffic traversing the same path.

NOTE: This check requires a manual review of the router's configuration file to ensure that each IPSec VPN is configured as 'mode tunnel'.
NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Establish the VPN as a tunneled VPN. Terminate the tunneled VPN outside of the firewall. Ensure all host-to-host VPN are established between trusted known hosts.

See Also

https://iasecontent.disa.mil/stigs/zip/U_Network_Infrastructure_Router_L3_Switch_V8R29_STIG.zip

Item Details

References: CAT|II, Rule-ID|SV-3008r1_rule, STIG-ID|NET1800, Vuln-ID|V-3008

Plugin: Cisco

Control ID: 1a31d9070a1bff415b632e8525bc76b1f8cb3deb737d573fd311a230fd71c411