NET0989 - Management traffic leaks into the managed network - 'OOBM Interface (ip access-list ACL_LIST in)'

Information

Management network traffic is leaking into the managed network.

If the gateway router is not a dedicated device for the OOBM network, several safeguards must be implemented for containment of management and production traffic boundaries. To provide separation, access control lists or filters must be configured to block any traffic from the management network destined for the managed network's production address spaces.

NOTE: Change 'OOBM_INTERFACE' to the OOBM interface for your organization.
NOTE: Change 'OOBM_INGRESS_ACL' to the ACL list for granting access to the local management network access to ensure management traffic does not leak into the managed network.

Solution

Configure access control lists or filters to block any traffic from the management network destined for the managed network's production address spaces.

See Also

https://iasecontent.disa.mil/stigs/zip/U_Network_Perimeter_Router_L3_Switch_V8R32_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-7(15), CAT|II, Rule-ID|SV-19305r1_rule, STIG-ID|NET0989, Vuln-ID|V-17819

Plugin: Cisco

Control ID: 4f3b688c85cfba868341ae4be18b81f0f49882c694555f702619da6c2c898ecd