DISA STIGS Viewer

The RUCKUS ICX perimeter router must be configured to deny network traffic by default and allow network traffic by exception.

Overview

Finding ID Version Rule ID IA Controls Severity
V-273604 RCKS-RTR-000370 SV-273604r1110881_rule   High
Description
A deny-all, permit-by-exception network communications traffic policy ensures that only connections that are essential and approved are allowed. This requirement applies to both inbound and outbound network communications traffic. All inbound and outbound traffic must be denied by default. Firewalls and perimeter routers should only allow traffic through that is explicitly permitted. The initial defense for the internal network is to block any traffic at the perimeter that is attempting to make a connection to a host residing on the internal network. In addition, allowing unknown or undesirable outbound traffic by the firewall or router will establish a state that will permit the return of this undesirable traffic inbound.
STIG Date
RUCKUS ICX Router Security Technical Implementation Guide 2025-06-03

Details

Check Text (C-77695r1109832_chk)
Confirm that external interfaces are configured with ACLs that permit traffic by exception.

ip access-list extended EXT-ACL
sequence 10 permit sshow host x.x.x.x host y.y.y.y log
sequence 20 permit ip x.x.x.0 0.0.0.255 any
sequence 30 deny ip any any log

interface ethernet x/x/x
ip access-group EXT-ACL in logging enable

If the ACL or filter is not configured to allow specific ports and protocols and deny all other traffic, this is a finding.

If the filter is not configured inbound on all external interfaces, this is a finding.
Fix Text (F-77600r1109833_fix)
Apply ACL configuration to apply desired traffic restrictions:

ip access-list extended EXT-ACL
sequence 10 permit sshow host x.x.x.x host y.y.y.y log
sequence 20 permit ip x.x.x.0 0.0.0.255 any
sequence 30 deny ip any any log

interface ethernet x/x/x
ip access-group EXT-ACL in logging enable