Check: SRG-NET-000019-RTR-000011
Router SRG:
SRG-NET-000019-RTR-000011
(in versions v4 r3 through v4 r1)
Title
The out-of-band management (OOBM) gateway router must be configured to have separate IGP instances for the managed network and management network. (Cat II impact)
Discussion
If the gateway router is not a dedicated device for the OOBM network, implementation of several safeguards for containment of management and production traffic boundaries must occur. Since the managed and management network are separate routing domains, configuration of separate Interior Gateway Protocol routing instances is critical on the router to segregate traffic from each network.
Check Content
This requirement is not applicable for the DoDIN Backbone. Verify that the OOBM interface is an adjacency in the Interior Gateway Protocol routing domain for the management network. If the router does not enforce that Interior Gateway Protocol instances configured on the OOBM gateway router peer only with their own routing domain, this is a finding.
Fix Text
This requirement is not applicable for the DoDIN Backbone. Configure the router to enforce that Interior Gateway Protocol instances configured on the OOBM gateway router peer only with their own routing domain.
Additional Identifiers
Rule ID: SV-207116r604135_rule
Vulnerability ID: V-207116
Group Title: SRG-NET-000019
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-001414 |
The information system enforces approved authorizations for controlling the flow of information between interconnected systems based on organization-defined information flow control policies. |
Controls
Number | Title |
---|---|
AC-4 |
Information Flow Enforcement |