4.3.1 Control Plane ACL Management

Information

Restrict Management Access to trusted management devices

Restricting what devices are allowed to access your network infrastructure helps reduce credential stuffing and man-in-the-middle (MITM) attacks.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

switch# conf
switch(config)# access-list ip <acl-name>
switch(config-acl-ip)# permit ip <ip address or network> any
switch(config-acl-ip)# deny ip any any log
switch(config)# apply access-list ip <acl-name> control-plane vrf mgmt

Impact:

There are significant risks associated with allowing any device with reachability to access the exposed ports on network infrastructure. White listing specific devices to allow specific interfaces ensures only specific devices will be able to access specific interfaces.

See Also

https://workbench.cisecurity.org/benchmarks/24202

Item Details

Category: ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, MEDIA PROTECTION, SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|AC-3, 800-53|AC-5, 800-53|AC-6, 800-53|CA-7, 800-53|MP-2, 800-53|SC-4, CSCv7|14.6, CSCv7|14.7

Plugin: ArubaOS

Control ID: 2cab48dc394be162bc4e94e0b7d048fdd2f457e54fb32444bc1f15c31a1fab10