1.2.2 Ensure 'Permitted IP Addresses' is set for all management profiles where SSH, HTTPS, or SNMP is enabled - HTTPS

Information

For all management profiles, only the IP addresses required for device management should be specified.
Rationale:
If a Permitted IP Addresses list is either not specified or is too broad, an attacker may gain the ability to attempt management access from unintended locations, such as the Internet. The Ensure 'Security Policy' denying any/all traffic exists at the bottom of the security policies ruleset recommendation in this benchmark can provide additional protection by requiring a security policy specifically allowing device management access.

Solution

Navigate to Network > Network Profiles > Interface Management.
Set Permitted IP Addresses to only include those necessary for device management.
Default Value:
Not enabled

See Also

https://workbench.cisecurity.org/files/2104

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-3, 800-53|SC-7(15), CSCv6|11.6, CSCv6|11.7, CSCv7|11.6, CSCv7|11.7

Plugin: Palo_Alto

Control ID: b4e2b2e894ef182594bb58e8ee5d242e127082d9b98fadfef27ac18010c25670