NET0989 - Management traffic leaks into the managed network - 'access-list OOBM_INGRESS_ACL deny'

Information

Management network traffic is leaking into the managed network.

If the gateway router is not a dedicated device for the OOBM network, several safeguards must be implemented for containment of management and production traffic boundaries. To provide separation, access control lists or filters must be configured to block any traffic from the management network destined for the managed network's production address spaces.

NOTE: Change 'OOBM_INRESS_ACL' to the ACL list for granting your organization's management network access to the router and to prevent the management network from leaking into the managed network.

Solution

Configure access control lists or filters to block any traffic from the management network destined for the managed network's production address spaces.

See Also

https://iasecontent.disa.mil/stigs/zip/U_Network_Perimeter_Router_L3_Switch_V8R32_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-7, CAT|II, Rule-ID|SV-19305r1_rule, STIG-ID|NET0989, Vuln-ID|V-17819

Plugin: Cisco

Control ID: 4f3b688c85cfba868341ae4be18b81f0f49882c694555f702619da6c2c898ecd