NET0989 - Management traffic leaks into the managed network - 'access-list OOBM_INGRESS_ACL permit'

Information

Management network traffic is leaking into the managed network.

If the gateway router is not a dedicated device for the OOBM network, several safeguards must be implemented for containment of management and production traffic boundaries. To provide separation, access control lists or filters must be configured to block any traffic from the management network destined for the managed network's production address spaces.

NOTE: Change 'OOBM_INRESS_ACL' to the ACL list for granting your organization's management network access to the router and to prevent the management network from leaking into the managed network.
NOTE: Change 'REMOTE_MANAGEMENT_NETWORK' to the management network space at the NOC.
NOTE: Change 'LOCAL_MANAGEMENT_NETWORK' to the OOBM network for your organization.

Solution

Configure access control lists or filters to block any traffic from the management network destined for the managed network's production address spaces.

See Also

https://iasecontent.disa.mil/stigs/zip/U_Network_Perimeter_Router_L3_Switch_V8R32_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-7, CAT|II, Rule-ID|SV-19305r1_rule, STIG-ID|NET0989, Vuln-ID|V-17819

Plugin: Cisco

Control ID: 4f3b688c85cfba868341ae4be18b81f0f49882c694555f702619da6c2c898ecd