SV-217049r639663_rule
V-217049
SRG-NET-000205-RTR-000012
JUNI-RT-000440
CAT II
10
If the management interface is not a dedicated OOBM interface, it must be configured with both an ingress and egress filter.
Configure an inbound filter a shown in the example below.
[edit firewall family inet]
set filter OOBM_INBOUND term ALLOW_SNMP from protocol udp port snmp
set filter OOBM_INBOUND term ALLOW_SNMP then accept
set filter OOBM_INBOUND term ALLOW_TACACS from protocol tcp port tacacs
set filter OOBM_INBOUND term ALLOW_TACACS then accept
set filter OOBM_INBOUND term ALLOW_SSH from protocol tcp port ssh
set filter OOBM_INBOUND term ALLOW_SSH then accept
set filter OOBM_INBOUND term ALLOW_NTP from protocol udp port ntp
set filter OOBM_INBOUND term ALLOW_NTP then accept
set filter OOBM_INBOUND term ALLOW_ICMP from protocol icmp
set filter OOBM_INBOUND term ALLOW_ICMP then accept
set filter OOBM_INBOUND term DENY_OTHER then syslog discard
Configure an outbound filter a shown in the example below.
set filter OOBM_OUTBOUND term ALLOW_SNMP from protocol udp port [snmp snmptrap]
set filter OOBM_OUTBOUND term ALLOW_SNMP then accept
set filter OOBM_OUTBOUND term ALLOW_TACACS from protocol tcp port tacacs
set filter OOBM_OUTBOUND term ALLOW_TACACS then accept
set filter OOBM_OUTBOUND term ALLOW_SSH from protocol tcp port ssh
set filter OOBM_OUTBOUND term ALLOW_SSH then accept
set filter OOBM_OUTBOUND term ALLOW_NTP from protocol udp port ntp
set filter OOBM_OUTBOUND term ALLOW_NTP then accept
set filter OOBM_OUTBOUND term ALLOW_SYSLOG from protocol udp port
set filter OOBM_OUTBOUND term ALLOW_SYSLOG then accept
set filter OOBM_OUTBOUND term ALLOW_NETFLOW from protocol udp port [2055 9995 9996]
set filter OOBM_OUTBOUND term ALLOW_NETFLOW then accept
set filter OOBM_OUTBOUND term DENY_OTHER then syslog discard
Apply the filters to the OOBM interfaces.
[edit interfaces ge-0/0/0 unit 0 family inet]
set filter input OOBM_INBOUND
set filter output OOBM_OUTBOUND
Verify that the managed interface has an inbound and outbound filter configured.
interfaces {
…
…
…
ge-0/0/0 {
description "OOBM Network";
unit 0 {
family inet {
filter {
input OOBM_INBOUND;
output OOBM_OUTBOUND;
}
address 10.2.14.1/24;
}
}
}
Verify that the ingress filter only allows management and ICMP traffic.
firewall {
family inet {
…
…
…
filter OOBM_INBOUND {
term ALLOW_SNMP {
from {
protocol udp;
port snmp;
}
then accept;
}
term ALLOW_TACACS {
from {
protocol tcp;
port tacacs;
}
then accept;
}
term ALLOW_ICMP {
from {
protocol icmp;
}
then accept;
}
term ALLOW_SSH {
from {
protocol tcp;
port ssh;
}
then accept;
}
term ALLOW_NTP {
from {
protocol tcp;
port ntp;
}
then accept;
}
term DENY_OTHER {
then {
syslog;
discard;
}
}
}
}
}
Verify that the ingress filter only allows management and ICMP traffic.
firewall {
family inet {
…
…
…
filter OOBM_OUTBOUND {
term ALLOW_SNMP {
from {
protocol udp;
port [ snmp snmptrap ];
}
then accept;
}
term ALLOW_TACACS {
from {
protocol tcp;
port tacacs;
}
then accept;
}
term ALLOW_SSH {
from {
protocol tcp;
port ssh;
}
then accept;
}
term ALLOW_NTP {
from {
protocol udp;
port ntp;
}
then accept;
}
term ALLOW_SYSLOG {
from {
protocol udp;
port syslog;
}
then accept;
}
term ALLOW_NETFLOW {
from {
protocol udp;
port [ 2055 9995 9996 ];
}
then accept;
}
term DENY_OTHER {
then {
syslog;
discard;
}
}
}
}
}
Caveat: If the management interface is a true OOBM interface, this requirement is not applicable.
If the router does not restrict traffic that ingresses and egresses the management interface, this is a finding.
V-217049
False
JUNI-RT-000440
Verify that the managed interface has an inbound and outbound filter configured.
interfaces {
…
…
…
ge-0/0/0 {
description "OOBM Network";
unit 0 {
family inet {
filter {
input OOBM_INBOUND;
output OOBM_OUTBOUND;
}
address 10.2.14.1/24;
}
}
}
Verify that the ingress filter only allows management and ICMP traffic.
firewall {
family inet {
…
…
…
filter OOBM_INBOUND {
term ALLOW_SNMP {
from {
protocol udp;
port snmp;
}
then accept;
}
term ALLOW_TACACS {
from {
protocol tcp;
port tacacs;
}
then accept;
}
term ALLOW_ICMP {
from {
protocol icmp;
}
then accept;
}
term ALLOW_SSH {
from {
protocol tcp;
port ssh;
}
then accept;
}
term ALLOW_NTP {
from {
protocol tcp;
port ntp;
}
then accept;
}
term DENY_OTHER {
then {
syslog;
discard;
}
}
}
}
}
Verify that the ingress filter only allows management and ICMP traffic.
firewall {
family inet {
…
…
…
filter OOBM_OUTBOUND {
term ALLOW_SNMP {
from {
protocol udp;
port [ snmp snmptrap ];
}
then accept;
}
term ALLOW_TACACS {
from {
protocol tcp;
port tacacs;
}
then accept;
}
term ALLOW_SSH {
from {
protocol tcp;
port ssh;
}
then accept;
}
term ALLOW_NTP {
from {
protocol udp;
port ntp;
}
then accept;
}
term ALLOW_SYSLOG {
from {
protocol udp;
port syslog;
}
then accept;
}
term ALLOW_NETFLOW {
from {
protocol udp;
port [ 2055 9995 9996 ];
}
then accept;
}
term DENY_OTHER {
then {
syslog;
discard;
}
}
}
}
}
Caveat: If the management interface is a true OOBM interface, this requirement is not applicable.
If the router does not restrict traffic that ingresses and egresses the management interface, this is a finding.
M
4032