Check: NET0380
Network - Firewall:
NET0380
(in versions v8 r25 through v8 r21)
Title
The firewall must reject requests for access or services where the source address received by the firewall specifies a loopback address. (Cat II impact)
Discussion
The loopback address is used by an Inter-Processor Control (IPC) mechanism that enables the client and server portion of an application running on the same machine to communicate, and so it is trusted. It should never be used as the source IP address of an inbound or outbound transmission.
Check Content
Review the device configuration to determine if filters are in place to block loopback addresses. If loopback addresses are not being filtered by the firewall, this is a finding.
Fix Text
Establish filters to block any attempt from the firewall or any network to pass any packets claiming to be from a loopback address.
Additional Identifiers
Rule ID:
Vulnerability ID: V-14644
Group Title:
Expert Comments
CCIs
Number | Definition |
---|---|
No CCIs are assigned to this check |
Controls
Number | Title |
---|---|
No controls are assigned to this check |