STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated just now
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to RUCKUS ICX Router Security Technical Implementation Guide

V-273604

CAT I (High)

The RUCKUS ICX perimeter router must be configured to deny network traffic by default and allow network traffic by exception.

Rule ID

SV-273604r1110881_rule

STIG

RUCKUS ICX Router Security Technical Implementation Guide

Version

V1R1

CCIs

CCI-001109

Discussion

A deny-all, permit-by-exception network communications traffic policy ensures that only connections that are essential and approved are allowed. This requirement applies to both inbound and outbound network communications traffic. All inbound and outbound traffic must be denied by default. Firewalls and perimeter routers should only allow traffic through that is explicitly permitted. The initial defense for the internal network is to block any traffic at the perimeter that is attempting to make a connection to a host residing on the internal network. In addition, allowing unknown or undesirable outbound traffic by the firewall or router will establish a state that will permit the return of this undesirable traffic inbound.

Check Content

Confirm that external interfaces are configured with ACLs that permit traffic by exception.  

ip access-list extended EXT-ACL
 sequence 10 permit sshow host x.x.x.x host y.y.y.y log
 sequence 20 permit ip x.x.x.0 0.0.0.255 any
 sequence 30 deny ip any any log

interface ethernet x/x/x
  ip access-group EXT-ACL in logging enable

If the ACL or filter is not configured to allow specific ports and protocols and deny all other traffic, this is a finding.

If the filter is not configured inbound on all external interfaces, this is a finding.

Fix Text

Apply ACL configuration to apply desired traffic restrictions:

ip access-list extended EXT-ACL
 sequence 10 permit sshow host x.x.x.x host y.y.y.y log
 sequence 20 permit ip x.x.x.0 0.0.0.255 any
 sequence 30 deny ip any any log

interface ethernet x/x/x
  ip access-group EXT-ACL in logging enable