STIGQter STIGQter: STIG Summary: Cisco ISE NAC Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 13 Apr 2021:

The Cisco ISE must be configured to dynamically apply restricted access of endpoints that are granted access using MAC Authentication Bypass (MAB).

DISA Rule

SV-242602r714116_rule

Vulnerability Number

V-242602

Group Title

SRG-NET-000343-NAC-001470

Rule Version

CSCO-NC-000280

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the authorization policies for devices granted access via MAB to have restricted access.

1. Navigate to Work Centers >> Network Access >> Policy Sets.
2. Choose ">" on the applicable policy set.
3. Expand the "Authorization Policy".
4. Add a restricted VLAN, Access Control List, Scalable Group Tag, or any combination of these that are used to restrict access under results.
5. Repeat this for each authorization policy that devices connecting via MAB will use.
6. Choose "Save".

Check Contents

Verify that the authorization policies for devices granted access via MAB will have restricted access.

1. Navigate to Work Centers >> Network Access >> Policy Sets.
2. Choose ">" on the applicable policy set.
3. Expand the Authorization Policy.
4. Make a note of the result/results on each authorization policy for MAB.
5. Navigate to Policy >> Policy Elements >> Results >> Authorization.
6. Expand "Authorization".
7. Choose "Authorization Profiles".
8. View the Standard Authorization Profile/Profiles noted above to ensure that a restricted VLAN, Access Control List, Scalable Group Tag, or any combination of these is used to restrict access.

If a VLAN is the only thing being applied to the session and the VLAN has an ACL on the layer 3 interface, this is not a finding.

If there is not a restriction on an MAB authorization policy, this is a finding.

Vulnerability Number

V-242602

Documentable

False

Rule Version

CSCO-NC-000280

Severity Override Guidance

Verify that the authorization policies for devices granted access via MAB will have restricted access.

1. Navigate to Work Centers >> Network Access >> Policy Sets.
2. Choose ">" on the applicable policy set.
3. Expand the Authorization Policy.
4. Make a note of the result/results on each authorization policy for MAB.
5. Navigate to Policy >> Policy Elements >> Results >> Authorization.
6. Expand "Authorization".
7. Choose "Authorization Profiles".
8. View the Standard Authorization Profile/Profiles noted above to ensure that a restricted VLAN, Access Control List, Scalable Group Tag, or any combination of these is used to restrict access.

If a VLAN is the only thing being applied to the session and the VLAN has an ACL on the layer 3 interface, this is not a finding.

If there is not a restriction on an MAB authorization policy, this is a finding.

Check Content Reference

M

Target Key

5383

Comments