DISA STIGS Viewer

AOS must be configured to disable nonessential capabilities.

Overview

Finding ID Version Rule ID IA Controls Severity
V-266577 ARBA-NT-000300 SV-266577r1040221_rule   Medium
Description
It is detrimental for network elements to provide, or enable by default, functionality exceeding requirements or mission objectives. These unnecessary capabilities or services are often overlooked and therefore may remain unsecured. They increase the risk to the platform by providing additional attack vectors. Network elements are capable of providing a wide variety of functions and services. Some of the functions and services, provided by default, may not be necessary to support essential organizational operations (e.g., key missions and functions).
STIG Date
HPE Aruba Networking AOS Wireless Security Technical Implementation Guide 2024-10-29

Details

Check Text (C-70501r1040219_chk)
Verify the AOS configuration with the following command:
show firewall-cp

Verify that nonessential capabilities, functions, ports, protocols, and/or services are denied.

If any nonessential capabilities, functions, ports, protocols, and/or services are allowed, this is a finding.
Fix Text (F-70404r1040220_fix)
Configure AOS with the following commands:
configure terminal
firewall cp
ipv4 deny any proto 6 ports 17 17 ipv4 deny any proto 6 ports 8080 8080
ipv4 deny any proto 6 ports 8081 8081
ipv4 deny any proto 6 ports 8082 8082
ipv4 deny any proto 6 ports 8088 8088
ipv6 deny any proto 6 ports 17 17
ipv6 deny any proto 6 ports 8080 8080
ipv6 deny any proto 6 ports 8081 8081
ipv6 deny any proto 6 ports 8082 8082
ipv6 deny any proto 6 ports 8088 8088
exit
write memory

Block any other ports as desired using the following example:
<ipv4/ipv6> deny any proto <ftp, http, telnet, tftp, protocol #> ports <start port 0-65535> <end port 0-65535>