The Dell OS10 out-of-band management (OOBM) gateway router must be configured to block any traffic destined to itself that is not sourced from the OOBM network or the NOC.
An XCCDF Rule
Description
If the gateway router is not a dedicated device for the OOBM network, several safeguards must be implemented for containment of management and production traffic boundaries. It is imperative that hosts from the managed network are not able to access the OOBM gateway router.
- ID
- SV-269880r1052242_rule
- Version
- OS10-RTR-000480
- Severity
- Medium
- References
- Updated
Remediation Templates
A Manual Procedure
This requirement is not applicable for the DODIN Backbone. If the OOBM gateway router is a dedicated device for the OOBM network, this requirement is not applicable.
Step 1: Configure an inbound ACL to bind to any OOBM interface connecting to the OOBM backbone which ensures that traffic destined to the OS10 OOBM router is only from the OOBM or NOC address space.
OS10(config)# ip access-list MGMT_TRAFFIC_FROM_NOC
OS10(config-ipv4-acl)# seq 10 permit ip 10.10.1.0/24 host 10.10.1.1