Cisco ISR 4000 Family Routers Administrator Guidance
Page
24
of
66
o
Source Port
o
Destination Port
Traffic matching is done based on a top-down approach in the access list. The first entry that a
packet matches will be the one applied to it. The VPNGW EP requires that the TOE Access control
lists (ACLs) are to be configured to drop all packet flows as the default rule and that traffic
matching the acl be able to be logged. The drop all default rule can be achieved by including an
ACL rule to drop all packets as the last rule in the ACL configuration. The logging of matching
traffic is done by appending the key word “log-input” per the command reference at the end of the
acl statements, as done below.
A privileged authorized administrator may manipulate the ACLs using the commands ip inspect,
access-list, crypto map, and access-group as described
[8]
.
Access lists must be configured on the TOE to meet the requirements of the VPN Gateway
Extended Package.
Note: These access lists must be integrated with the defined security policy for your TOE router.
Enabling just these access lists with no permits will result in traffic being dropped. Ensure that
your access list entries are inserted above the default deny acl.
In this example, we are assuming that interface GigabitEthernet0/0 is the external interface, and is
assigned an IP address of 10.200.1.1. Interface GigabitEthernet0/1 is the internal interface and is
assigned an IP address of 10.100.1.1.
If remote administration is required, ssh has to be explicitly allowed through either the internal or
external interfaces.
TOE-common-criteria#
configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
TOE-common-criteria(config)#
access-list 199 permit tcp host 10.200.0.1 host
10.200.0.1 eq 22 log-input
To log connections to the Certificate Authority, implement the following acl:.
TOE-common-criteria(config)#
access-list 100 permit ip any host [IP of CA] log-
input
TOE-common-criteria(config)#
access-list 199 permit ip any host [IP of CA] log-
input
To close ports that don’t need to be open and may introduce additional vulnerabilities, implement
the following acl:.
TOE-common-criteria(config)#
access-list 100 deny 132 any any log-input
TOE-common-criteria(config)#
access-list 199 deny 132 any any log-input
To explicitly create the default deny acl for traffic with no other match, implement the following
acl:
TOE-common-criteria(config)#
access-list 100 deny any any log-input
TOE-common-criteria(config)#
access-list 199 deny any any log-input