SV-216749r531087_rule
V-216749
SRG-NET-000078-RTR-000001
CISC-RT-000200
CAT III
10
Configure ACLs to log packets that are dropped as shown in the example below.
RP/0/0/CPU0:R3(config)#ipv4 access-list EXTERNAL_ACL_INBOUND
…
…
…
RP/0/0/CPU0:R3(config-ipv4-acl)#deny ip any any log
Review all ACLs used to filter traffic and verify that packets being dropped are logged as shown in the configuration below.
ipv4 access-list EXTERNAL_ACL_INBOUND
10 permit tcp host x.11.1.1 eq bgp host x.11.1.2
20 permit tcp host x.11.1.1 host x.11.1.2 eq bgp
25 deny icmp any host x.11.1.2 fragments log
30 permit icmp host x.11.1.1 host x.11.1.2 echo
40 permit icmp host x.11.1.1 host x.11.1.2 echo-reply
50 deny ipv4 any host x.11.1.1 log
60 permit tcp any any established
…
…
…
140 deny ipv4 any any log
If packets being dropped at interfaces are not logged, this is a finding.
V-216749
False
CISC-RT-000200
Review all ACLs used to filter traffic and verify that packets being dropped are logged as shown in the configuration below.
ipv4 access-list EXTERNAL_ACL_INBOUND
10 permit tcp host x.11.1.1 eq bgp host x.11.1.2
20 permit tcp host x.11.1.1 host x.11.1.2 eq bgp
25 deny icmp any host x.11.1.2 fragments log
30 permit icmp host x.11.1.1 host x.11.1.2 echo
40 permit icmp host x.11.1.1 host x.11.1.2 echo-reply
50 deny ipv4 any host x.11.1.1 log
60 permit tcp any any established
…
…
…
140 deny ipv4 any any log
If packets being dropped at interfaces are not logged, this is a finding.
M
4029