The RUCKUS ICX perimeter router must be configured to deny network traffic by default and allow network traffic by exception.
Overview
Finding ID | Version | Rule ID | IA Controls | Severity |
V-273604 | RCKS-RTR-000370 | SV-273604r1110881_rule | High |
Description |
A deny-all, permit-by-exception network communications traffic policy ensures that only connections that are essential and approved are allowed. This requirement applies to both inbound and outbound network communications traffic. All inbound and outbound traffic must be denied by default. Firewalls and perimeter routers should only allow traffic through that is explicitly permitted. The initial defense for the internal network is to block any traffic at the perimeter that is attempting to make a connection to a host residing on the internal network. In addition, allowing unknown or undesirable outbound traffic by the firewall or router will establish a state that will permit the return of this undesirable traffic inbound. |
STIG | Date |
RUCKUS ICX Router Security Technical Implementation Guide | 2025-06-03 |
Details
Check Text (C-77695r1109832_chk) |
Confirm that external interfaces are configured with ACLs that permit traffic by exception. ip access-list extended EXT-ACL sequence 10 permit sshow host x.x.x.x host y.y.y.y log sequence 20 permit ip x.x.x.0 0.0.0.255 any sequence 30 deny ip any any log interface ethernet x/x/x ip access-group EXT-ACL in logging enable If the ACL or filter is not configured to allow specific ports and protocols and deny all other traffic, this is a finding. If the filter is not configured inbound on all external interfaces, this is a finding. |
Fix Text (F-77600r1109833_fix) |
Apply ACL configuration to apply desired traffic restrictions: ip access-list extended EXT-ACL sequence 10 permit sshow host x.x.x.x host y.y.y.y log sequence 20 permit ip x.x.x.0 0.0.0.255 any sequence 30 deny ip any any log interface ethernet x/x/x ip access-group EXT-ACL in logging enable |