SV-221086r622190_rule
V-221086
SRG-NET-000078-RTR-000001
CISC-RT-000200
CAT III
10
Configure ACLs to log packets that are dropped as shown in the example below:
SW1(config)# ip access-list EXTERNAL_ACL
SW1(config-acl)# 90 deny ip any any log
SW1(config-acl)# end
Review all ACLs used to filter traffic and verify that packets being dropped are logged as shown in the configuration below:
ip access-list EXTERNAL_ACL
10 permit tcp x.11.1.1/32 eq bgp x.11.1.2/32
20 permit tcp x.11.1.1/32 x.11.1.2/32 eq bgp
30 permit icmp x.11.1.1/32 x.11.1.2/32 echo
…
…
…
90 deny ip any any log
If packets being dropped at an interface are not logged, this is a finding.
V-221086
False
CISC-RT-000200
Review all ACLs used to filter traffic and verify that packets being dropped are logged as shown in the configuration below:
ip access-list EXTERNAL_ACL
10 permit tcp x.11.1.1/32 eq bgp x.11.1.2/32
20 permit tcp x.11.1.1/32 x.11.1.2/32 eq bgp
30 permit icmp x.11.1.1/32 x.11.1.2/32 echo
…
…
…
90 deny ip any any log
If packets being dropped at an interface are not logged, this is a finding.
M
4075