NET1808 - Remote VPN end-point not a mirror of local gateway

Information

Gateway configuration at the remote VPN end-point is a not a mirror of the local gateway.

The IPSec tunnel end points may be configured on the OOBM gateway routers connecting the managed network and the NOC. They may also be configured on a firewall or VPN concentrator located behind the gateway router. In either case, the crypto access-list used to identify the traffic to be protected must be a mirror (both IP source and destination address) of the crypto access list configured at the remote VPN peer.

NOTE: This check requires manual verification that the crypto access-list are mirrored on other VPN equipment located behind the gateway router.
NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Configure the crypto access-list used to identify the traffic to be protected so that it is a mirror (both IP source and destination address) of the crypto access list configured at the remote VPN peer.

See Also

https://iasecontent.disa.mil/stigs/zip/U_Network_Infrastructure_Router_L3_Switch_V8R28_STIG.zip

Item Details

References: CAT|II, Rule-ID|SV-19063r1_rule, STIG-ID|NET1808, Vuln-ID|V-17814

Plugin: Cisco

Control ID: 702eb449062df7708481addce1253851e0209d5e63337ca5740866c0dfb41db1