DISA STIGS Viewer

The Dell OS10 Router must be configured to log all packets that have been dropped.

Overview

Finding ID Version Rule ID IA Controls Severity
V-269867 OS10-RTR-000260 SV-269867r1051986_rule   Low
Description
Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done or attempted to be done, and by whom, to compile an accurate risk assessment. Auditing the actions on network devices provides a means to recreate an attack or identify a configuration mistake on the device.
STIG Date
Dell OS10 Switch Router Security Technical Implementation Guide 2024-12-11

Details

Check Text (C-73900r1051984_chk)
Review the router configuration to verify that audit logging is enabled.

!
logging audit enable

Review the router configuration to verify that all ACL rules that drop packets are configured to log the event.

!
ip access-list FILTER_EXTERNAL_INGRESS
seq 10 permit ...
seq 20 permit ...
seq 30 permit ...
seq 40 deny ip any any log

If audit logging is disabled or an ACL is not configured to log dropped packets, this is a finding.
Fix Text (F-73801r1051985_fix)
Configure the router to enable audit logging and to log all packets dropped by ACL rules.

OS10(config)# logging audit enable

OS10(config)# ip access-list FILTER_EXTERNAL_INGRESS
OS10(config-ipv4-acl)# permit ...
OS10(config-ipv4-acl)# permit ...
OS10(config-ipv4-acl)# deny ip any any log