SV-216749r531087_rule
V-216749
SRG-NET-000078-RTR-000001
CISC-RT-000200
CAT III
10
Configure ACLs to log  packets that are dropped as shown in the example below.
RP/0/0/CPU0:R3(config)#ipv4 access-list EXTERNAL_ACL_INBOUND
…
…
…
RP/0/0/CPU0:R3(config-ipv4-acl)#deny ip any any log
Review all ACLs used to filter traffic and verify that packets being dropped are logged as shown in the configuration below.
ipv4 access-list EXTERNAL_ACL_INBOUND
 10 permit tcp host x.11.1.1 eq bgp host x.11.1.2
 20 permit tcp host x.11.1.1 host x.11.1.2 eq bgp
 25 deny icmp any host x.11.1.2 fragments log 
 30 permit icmp host x.11.1.1 host x.11.1.2 echo
 40 permit icmp host x.11.1.1 host x.11.1.2 echo-reply
 50 deny ipv4 any host x.11.1.1 log
 60 permit tcp any any established
 …
 …
 …
 140 deny ipv4 any any log 
If packets being dropped at interfaces are not logged, this is a finding.
V-216749
False
CISC-RT-000200
Review all ACLs used to filter traffic and verify that packets being dropped are logged as shown in the configuration below.
ipv4 access-list EXTERNAL_ACL_INBOUND
 10 permit tcp host x.11.1.1 eq bgp host x.11.1.2
 20 permit tcp host x.11.1.1 host x.11.1.2 eq bgp
 25 deny icmp any host x.11.1.2 fragments log 
 30 permit icmp host x.11.1.1 host x.11.1.2 echo
 40 permit icmp host x.11.1.1 host x.11.1.2 echo-reply
 50 deny ipv4 any host x.11.1.1 log
 60 permit tcp any any established
 …
 …
 …
 140 deny ipv4 any any log 
If packets being dropped at interfaces are not logged, this is a finding.
M
4029