Check: RCKS-RTR-000480
RUCKUS ICX Router STIG:
RCKS-RTR-000480
(in version v1 r1)
Title
The RUCKUS ICX out-of-band management (OOBM) gateway router must be configured to block any traffic destined to itself that is not sourced from the OOBM network or the Network Operations Center (NOC). (Cat II impact)
Discussion
If the gateway router is not a dedicated device for the OOBM network, several safeguards must be implemented for containment of management and production traffic boundaries. It is imperative that hosts from the managed network are not able to access the OOBM gateway router.
Check Content
This requirement is not applicable for the DODIN Backbone. Verify traffic destined to itself is only sourced by the OOBM or the NOC. In the example below, the OOBM backbone network is 10.11.1.0/24, the NOC address spaces is 10.12.1.0/24, and the OOBM LAN address space at remote site connecting to the managed network is 10.13.1.0/24. 1. Note the inbound ACL applied to the OOBM interfaces. interface ethernet 1/2/1 port-name OOBM-to-NOC ip address 10.11.1.8 255.255.255.0 ip access-group TRAFFIC_FROM_NOC in logging enable ! interface ethernet 1/2/2 port-name OOBM_LAN_ACCESS_SWITCH ip address 10.13.1.1 255.255.255.0 ip access-group TRAFFIC_TO_NOC in logging enable 2. Review the inbound ACL bound to any OOB interface connecting to the OOBM backbone and verify traffic destined to itself is only from the OOBM or NOC address space. ip access-list extended TRAFFIC_FROM_NOC sequence 10 permit ip 10.11.1.0 0.0.0.255 host 10.11.1.8 sequence 20 permit ip 10.12.1.0 0.0.0.255 host 10.11.1.8 sequence 30 permit ip 10.11.1.0 0.0.0.255 host 10.13.1.1 sequence 40 permit ip 10.12.1.0 0.0.0.255 host 10.13.1.1 sequence 50 deny ip any host 10.11.1.8 log sequence 60 deny ip any host 10.13.1.1 log sequence 70 permit ip 10.11.1.0 0.0.0.255 10.13.1.0 0.0.0.255 sequence 80 permit ip 10.12.1.0 0.0.0.255 10.13.1.0 0.0.0.255 sequence 90 deny ip any any log ! 3. Review the inbound ACL bound to any OOBM LAN interfaces and verify traffic destined to itself is from the OOBM LAN address space. ip access-list extended TRAFFIC_TO_NOC sequence 10 permit ip 10.13.1.0 0.0.0.255 host 10.13.1.1 sequence 20 permit ip 10.13.1.0 0.0.0.255 host 10.11.1.8 sequence 30 deny ip any host 10.13.1.1 log sequence 40 deny ip any host 10.11.1.8 log sequence 50 permit ip 10.13.1.0 0.0.0.255 10.11.1.0 0.0.0.255 sequence 60 permit ip 10.13.1.0 0.0.0.255 10.12.1.0 0.0.0.255 sequence 70 deny ip any any log ! If the router does not block any traffic destined to itself that is not sourced from the OOBM network or the NOC, this is a finding.
Fix Text
This requirement is not applicable for the DODIN Backbone. Configure traffic from the managed network to not be able to access the OOBM gateway router using either receive path or interface ingress ACLs. 1. Configure the ACL to only allow traffic to the route processor from the OOBM backbone and the NOC. ICX(config)#ip access ext TRAFFIC_FROM_NOC ICX(config-ext-ipacl-TRAFFIC_FROM_NOC)#permit ip 10.11.1.0/24 host 10.11.1.8 ICX(config-ext-ipacl-TRAFFIC_FROM_NOC)#permit ip 10.12.1.0/24 host 10.11.1.8 ICX(config-ext-ipacl-TRAFFIC_FROM_NOC)#permit ip 10.11.1.0/24 host 10.13.1.1 ICX(config-ext-ipacl-TRAFFIC_FROM_NOC)#permit ip 10.12.1.0/24 host 10.13.1.1 ICX(config-ext-ipacl-TRAFFIC_FROM_NOC)#deny ip any host 10.11.1.8 log ICX(config-ext-ipacl-TRAFFIC_FROM_NOC)#deny ip any host 10.13.1.1 log ICX(config-ext-ipacl-TRAFFIC_FROM_NOC)#permit ip 10.11.1.0/24 10.13.1.0/24 ICX(config-ext-ipacl-TRAFFIC_FROM_NOC)#permit ip 10.12.1.0/24 10.13.1.0/24 ICX(config-ext-ipacl-TRAFFIC_FROM_NOC)#deny ip any any log 2. Configure the ACL to only allow traffic to the route processor from the OOBM LAN. ICX(config)#ip access ext TRAFFIC_TO_NOC ICX(config-ext-ipacl-TRAFFIC_TO_NOC)#permit ip 10.13.1.0/24 host 10.13.1.1 ICX(config-ext-ipacl-TRAFFIC_TO_NOC)#permit ip 10.13.1.0/24 host 10.11.1.8 ICX(config-ext-ipacl-TRAFFIC_TO_NOC)#deny ip any host 10.13.1.1 log ICX(config-ext-ipacl-TRAFFIC_TO_NOC)#deny ip any host 10.11.1.8 log ICX(config-ext-ipacl-TRAFFIC_TO_NOC)#permit ip 10.13.1.0/24 10.11.1.0/24 ICX(config-ext-ipacl-TRAFFIC_TO_NOC)#permit ip 10.13.1.0/24 10.12.1.0/24 ICX(config-ext-ipacl-TRAFFIC_TO_NOC)#deny ip any any log 3. Apply the ACLs configured above to the appropriate OOBM interfaces as shown in the example below: ICX(config)#interface ethernet 1/2/1 ICX(config-if-e10000-1/2/1)#port-name OOBM-to-NOC ICX(config-if-e10000-1/2/1)#ip access-group TRAFFIC_FROM_NOC in logging enable ICX(config-if-e10000-1/2/1)#interface ethernet 1/2/2 ICX(config-if-e10000-1/2/2)#port-name OOBM_LAN_ACCESS_SWITCH ICX(config-if-e10000-1/2/2)#ip access-group TRAFFIC_TO_NOC in logging enable
Additional Identifiers
Rule ID: SV-273615r1111064_rule
Vulnerability ID: V-273615
Group Title: SRG-NET-000205-RTR-000011
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-001097 |
Monitor and control communications at the external managed interfaces to the system and at key managed interfaces within the system. |
Controls
Number | Title |
---|---|
SC-7 |
Boundary Protection |