NET0927 - RFC1918 addresses are not blocked - '192.168.0.0/16 Network Blocked'

Information

Inbound IP packets using RFC 1918 address space (10.0.0.0/8, 172.16.0.0 /12, and 192.168.0 /16) must be blocked, denied, or dropped at the perimeter device.

This type of IP address spoofing occurs when someone outside the network uses an RFC1918 address to gain access to systems or devices on the internal network. If the intruder is successful, they can intercept data, passwords, etc., and use that information to perform destructive acts on or to the network.

NOTE: Change 'AG_INGRESS_ACL_1' to the access-list IP standard access list number for your organization.

Solution

Configure the perimeter device to ensure access control lists are configured to block, deny, or drop inbound IP addresses using the RFC1918 IP address space of 10.0.0.0/8, 172.16.0.0/12, and 192.168.0/16. Depending on the security posture of the access control list, this requirement may be met explicitl or inexplicitly.

See Also

https://iasecontent.disa.mil/stigs/zip/U_Network_Perimeter_Router_L3_Switch_V8R32_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-7, CAT|I, Rule-ID|SV-15392r2_rule, STIG-ID|NET0927, Vuln-ID|V-14692

Plugin: Cisco

Control ID: 83d77a38650b0fb1cd2ccd9d8ee2948b87faee4c6a6b629be5bd2a1910e1b057