STIGQter STIGQter: STIG Summary: Cisco NX-OS Switch RTR Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 23 Apr 2021:

The Cisco perimeter switch must be configured to filter egress traffic at the internal interface on an inbound direction.

DISA Rule

SV-221094r622190_rule

Vulnerability Number

V-221094

Group Title

SRG-NET-000205-RTR-000005

Rule Version

CISC-RT-000340

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the switch to use an inbound ACL on all internal interfaces as shown in the example below:

SW1(config)# int e2/4
SW1(config-if)# ip access-group EGRESS_FILTER in
SW1(config-if)# end

Check Contents

Review the switch configuration to verify that the egress ACL is bound to the internal interface in an inbound direction.

interface Ethernet2/4
description downstream link to LAN
no switchport
ip access-group EGRESS_FILTER in
ip address 10.1.12.1/24

If the switch is not configured to filter traffic leaving the network at the internal interface in an inbound direction, this is a finding.

Vulnerability Number

V-221094

Documentable

False

Rule Version

CISC-RT-000340

Severity Override Guidance

Review the switch configuration to verify that the egress ACL is bound to the internal interface in an inbound direction.

interface Ethernet2/4
description downstream link to LAN
no switchport
ip access-group EGRESS_FILTER in
ip address 10.1.12.1/24

If the switch is not configured to filter traffic leaving the network at the internal interface in an inbound direction, this is a finding.

Check Content Reference

M

Target Key

4075

Comments