STIGQter STIGQter: STIG Summary: HP FlexFabric Switch RTR Security Technical Implementation Guide Version: 1 Release: 2 Benchmark Date: 24 Jul 2020:

The HP FlexFabric Switch must protect an enclave connected to an Alternate Gateway by using an inbound filter that only permits packets with destination addresses within the sites address space.

DISA Rule

SV-80591r1_rule

Vulnerability Number

V-66101

Group Title

SRG-NET-000019-RTR-000009

Rule Version

HFFS-RT-000003

Severity

CAT I

CCI(s)

Weight

10

Fix Recommendation

Configure the ingress filter of the perimeter HP FlexFabric Switch connected to an Alternate Gateway to only permit packets with destination addresses of the site's NIPRNet address space or a destination address belonging to the address block assigned by the Alternate Gateway network service provider.

[HP] acl advanced 3010
[HP-acl-ipv4-adv-3010] rule 1 permit ip destination 192.168.1.0 0.0.0.255
[HP-acl-ipv4-adv-3010] rule 2 permit ip destination 192.168.2.0 0.0.0.255
[HP-acl-ipv4-adv-3010] rule 3 permit ip destination 192.168.3.0 0.0.0.255
[HP-acl-ipv4-adv-3010] rule 4 permit ip destination 192.168.4.0 0.0.0.255
[HP-acl-ipv4-adv-3010] rule 5 deny ip destination any

[HP] interface gig0/1
[HP-GigabitEthernet0/1] packet-filter 3010 inbound

Check Contents

Review the configuration of each HP FlexFabric Switch interface connecting to an Alternate Gateway.

Verify that the ACL configured to block unauthorized networks are configured on the interface.

Verify each permit statement of the ingress filter only permits packets with destination addresses of the site's NIPRNet address space or a destination address belonging to the address block assigned by the Alternate Gateway network service provider.

If the ACL is not configured to only permit packets with destination addresses within the sites address space, this is a finding.

[HP]display interface gig0/1

interface GigabitEthernet0/1
port link-mode route
ip address 192.168.10.1 255.255.255.0
packet-filter 3010 inbound

Vulnerability Number

V-66101

Documentable

False

Rule Version

HFFS-RT-000003

Severity Override Guidance

Review the configuration of each HP FlexFabric Switch interface connecting to an Alternate Gateway.

Verify that the ACL configured to block unauthorized networks are configured on the interface.

Verify each permit statement of the ingress filter only permits packets with destination addresses of the site's NIPRNet address space or a destination address belonging to the address block assigned by the Alternate Gateway network service provider.

If the ACL is not configured to only permit packets with destination addresses within the sites address space, this is a finding.

[HP]display interface gig0/1

interface GigabitEthernet0/1
port link-mode route
ip address 192.168.10.1 255.255.255.0
packet-filter 3010 inbound

Check Content Reference

M

Target Key

2979

Comments