1. Home
  2. Security Hardening
  3. DISA STIG Cisco Firewall V8R25
  4. NET0380 – The firewall must reject requests for access from loopback address – ‘mgmt in’

NET0380 – The firewall must reject requests for access from loopback address – ‘mgmt in’

Details

The firewall must reject requests for access or services where the source address received by the firewall specifies a loopback address.

The loopback address is used by an Inter-Processor Control (IPC) mechanism that enables the client and server portion of an application running on the same machine to communicate, and so it is trusted. It should never be used as the source IP address of an inbound or outbound transmission.

Solution

Establish filters to block any attempt from the firewall or any network to pass any packets claiming to be from a loopback address.

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: System and Communications Protection.This control applies to the following type of system Cisco.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles