DISA STIGS Viewer

The RUCKUS ICX router must be configured to have all inactive interfaces disabled.

Overview

Finding ID Version Rule ID IA Controls Severity
V-273584 RCKS-RTR-000160 SV-273584r1110889_rule   Low
Description
An inactive interface is rarely monitored or controlled and may expose a network to an undetected attack on that interface. Unauthorized personnel with access to the communication facility could gain access to a router by connecting to a configured interface that is not in use. If an interface is no longer used, the configuration must be deleted and the interface disabled. For sub-interfaces, delete sub-interfaces that are on inactive interfaces and delete sub-interfaces that are themselves inactive. If the sub-interface is no longer necessary for authorized communications, it must be deleted.
STIG Date
RUCKUS ICX Router Security Technical Implementation Guide 2025-06-03

Details

Check Text (C-77675r1109772_chk)
Review the router configuration and verify inactive interfaces are disabled:

interface ethernet 1/1/11
disable
!

If inactive interfaces are not disabled, this is a finding.
Fix Text (F-77580r1109773_fix)
Disable inactive interfaces:

interface ethernet 1/1/11
disable
!