1. Home
  2. Security Hardening
  3. DISA STIG Cisco IOS Switch RTR V2R1
  4. CISC-RT-000200 – The Cisco switch must be configured to log all packets that have been dropped at interfaces via an access control list (ACL).

CISC-RT-000200 – The Cisco switch must be configured to log all packets that have been dropped at interfaces via an access control list (ACL).

Details

Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done or attempted to be done, and by whom, to compile an accurate risk assessment. Auditing the actions on network devices provides a means to recreate an attack or identify a configuration mistake on the device.

Solution

Configure ACLs to log packets that are dropped as shown in the example below:

SW1(config)#ip access-list extended INGRESS_FILTER



SW1(config-ext-nacl)#deny ip any any log

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Audit and Accountability.This control applies to the following type of system Cisco.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles