SV-75277r1_rule
V-60821
SRG-NET-000019
AMLS-L2-000110
CAT II
10
Configure an Access Control List to control information flow between connected networks.
Configuration Example
configure
mac access-list STIG
permit [src mac] [src mask] [dst mac] [dst mask]/[any] [protocol]
exit
Verify the use of MAC Access Control Lists to prevent unintended information flow between network segments.
For network boundary interfaces, verify the use of an access control list by entering "show mac access-list summary" to validate the use of an access control list on the interface.
Verify the access control list restricts network traffic as intended by entering "show mac access-list [name]" and substituting the name of the access control list for the bracketed variable.
If there is no access control list configured, or if the access control list does not prevent unintended flow of information between network segments, this is a finding.
V-60821
False
AMLS-L2-000110
Verify the use of MAC Access Control Lists to prevent unintended information flow between network segments.
For network boundary interfaces, verify the use of an access control list by entering "show mac access-list summary" to validate the use of an access control list on the interface.
Verify the access control list restricts network traffic as intended by entering "show mac access-list [name]" and substituting the name of the access control list for the bracketed variable.
If there is no access control list configured, or if the access control list does not prevent unintended flow of information between network segments, this is a finding.
M
2821