NET0987 - Managed network has access to OOBM gateway router - 'Review IP_RECEIVE_ACL'

Information

Traffic from the managed network is able to access the OOBM gateway router.

If the gateway router is not a dedicated device for the OOBM network, several safeguards must be implemented for containment of management and production traffic boundaries. It is imperative that hosts from the managed network are not able to access the OOBM gateway router.

NOTE: A manual review of the ACL list utilized to grant your organization's management network access to the router should be performed to ensure the managed network does not have access. Verify that the ACL referenced by the ip receive acl statement restricts all management plane traffic to the validated network management address block at the NOC.
NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Ensure that traffic from the managed network is not able to access the OOBM gateway router using either receive path or interface ingress ACLs.

See Also

https://iasecontent.disa.mil/stigs/zip/U_Network_Infrastructure_Router_L3_Switch_V8R29_STIG.zip

Item Details

References: CAT|II, Rule-ID|SV-19301r2_rule, STIG-ID|NET0987, Vuln-ID|V-17817

Plugin: Cisco

Control ID: 0cb7a60ec17b118cc4837c81328b16d56c436664c95ff043f28fa7e2d3bb708e