Free DISA STIG and SRG Library | Vaulted
Removed

V-206708

The firewall must restrict traffic entering the VPN tunnels to the management network to only the authorized management packets based on destination address.

Finding ID
SRG-NET-000364-FW-000036
Rule ID
SV-206708r604133_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-NET-000364
CCI
CCI-002403
Target Key
(None)
Documentable
No
Discussion

Protect the management network with a filtering firewall configured to block unauthorized traffic. This requirement is similar to the out-of-band management (OOBM) model, when the production network is managed in-band. The management network could also be housed at a Network Operations Center (NOC) that is located locally or remotely at a single or multiple interconnected sites. NOC interconnectivity, as well as connectivity between the NOC and the managed networks’ premise routers, would be enabled using either provisioned circuits or VPN technologies such as IPsec tunnels or MPLS VPN services.

Fix Text

Where IPsec technology is deployed to connect the managed network to the NOC, restrict the traffic entering the tunnels so that only the authorized management packets with authorized destination addresses are permitted.

Check Content

Inspect the architecture diagrams. Inspect the NOC and the managed network. Note that the IPsec tunnel endpoints may be configured on the premise or gateway router, the VPN gateway firewall, or a VPN concentrator. Verify that all traffic between the managed network and management network and vice-versa is secured via IPsec encapsulation. If the firewall does not restrict traffic entering the VPN tunnels to the management network to only the authorized management packets based on destination address, this is a finding.