Ensure 'Unused Interfaces' is disable

Information

Disables the unused interfaces

Rationale:

Shutting down the unused interfaces is a complement to physical security. In fact, an attacker connecting physically to an unused port of the security appliance can use the interface to gain access to the device if the relevant interface has not been disabled and the source restriction to management access is not enabled.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Configure physical interfaces, subinterfaces, and Bridge Virtual Interfaces on the Firepower Management Center:
Devices > Device Management > Interfaces page. You can then configure additional options using FlexConfig.

See Also

https://www.cisco.com/c/en/us/td/docs/security/firepower/640/hardening/ftd/FTD_Hardening_Guide_v64.html

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-4(21)

Plugin: Cisco_Firepower

Control ID: 6690e2621f318c043b55602bebbbb0cfbcc88b6c659ad758edbb6754a0d8baec