NET1004 - No ingress ACL on management VLAN interface

Information

If the management systems reside within the same Layer 2 switching domain as the managed network elements, then separate VLANs will be deployed to provide separation at that level. In this case, the management network still has its own subnet while at the same time it is defined as a unique VLAN. Inter-VLAN routing or the routing of traffic between nodes residing in different subnets requires a router or multi-layer switch (MLS). Access control lists must be used to enforce the boundaries between the management network and the network being managed. When using a MLS, an alternate method to prevent inter-VLAN routing is to configure the management Virtual Routing and Forwarding (VRF) to not import route targets from other VRFs which would ensure there is no reachability between networks.

NOTE: This check is derived from the L3 switch guidance, if the scan target is a router the check can be ignored.
NOTE: Change 'MGT_VLAN_Interface' to the VLAN interface configured to carry the management network traffic.
NOTE: Change 'MGT_VLAN_ACL' to the MGMT access-list configured to control management traffic.

Solution

If an MLS is used to provide inter-VLAN routing, configure an inbound ACL for the management network VLAN interface.

See Also

https://iasecontent.disa.mil/stigs/zip/U_Network_Infrastructure_Router_L3_Switch_V8R28_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-7, CAT|II, Rule-ID|SV-19703r2_rule, STIG-ID|NET1004, Vuln-ID|V-17833

Plugin: Cisco

Control ID: bc2c29e42c5b60082446dc70cd933ef4bacec9ff71b0b6e116a8a9b7b862a7ea