SV-220523r539418_rule
V-220523
SRG-APP-000038-NDM-000213
CISC-ND-000140
CAT II
10
Configure the Cisco switch to restrict management access to specific IP addresses via SSH as shown in the example below:
SW2(config)#ip access-list standard MANAGEMENT_NET
SW2(config-std-nacl)#permit x.x.x.0 0.0.0.255
SW2(config-std-nacl)#exit
SW2(config)#line vty 0 4
SW2(config-line)#transport input ssh
SW2(config-line)#access-class MANAGEMENT_NET in
SW2(config-line)#end
Review the Cisco switch configuration to verify that it is compliant with this requirement. Administrative access to the switch must only be allowed from hosts residing in the management network.
Step 1: Verify that the line vty has an ACL inbound applied as shown in the example below:
line vty 0 4
access-class MANAGEMENT_NET in
transport input ssh
Step 2: Verify that the ACL permits only hosts from the management network to access the switch.
ip access-list extended MANAGEMENT_NET
permit ip x.x.x.0 0.0.0.255 any
deny ip any any log-input
If the Cisco switch is not configured to enforce approved authorizations for controlling the flow of management information within the device based on control policies, this is a finding.
V-220523
False
CISC-ND-000140
Review the Cisco switch configuration to verify that it is compliant with this requirement. Administrative access to the switch must only be allowed from hosts residing in the management network.
Step 1: Verify that the line vty has an ACL inbound applied as shown in the example below:
line vty 0 4
access-class MANAGEMENT_NET in
transport input ssh
Step 2: Verify that the ACL permits only hosts from the management network to access the switch.
ip access-list extended MANAGEMENT_NET
permit ip x.x.x.0 0.0.0.255 any
deny ip any any log-input
If the Cisco switch is not configured to enforce approved authorizations for controlling the flow of management information within the device based on control policies, this is a finding.
M
4067