01-23-2020 06:42 PM
Hi Everyone,
We have an Internet gateway router(#CiscoASR) on which we have snmp configuration for monitoring purpose and we have secured it with ACL as well. But now our infosec team is saying that they are able to see the router as vulnerable for SNMP threats when they have done a vulnerability scan from internet, though we have secured it by using ACL's. Please suggest how to fix this.
Thanks,
Babjani.
Solved! Go to Solution.
01-24-2020 05:42 PM
Hi,
You need to use both snmp access-list and interface access-list. The snmp access-list specifies which devices can access snmp using the specified string. Therefore, the router will process snmp and reject or accept based on access-list and string. You, therefore, will need an access-list on the outside interface to block all snmp packets from the Internet.
There should be no impact on the router from having an access-list on the outside interface as long as you do not have excessive logging enabled on the access-list.
Thanks
John
01-24-2020 10:45 PM
Hi John/Everyone,
Thanks John for your time over this discussion.
We have applied an extended ACL over the Internet link interface deny snmp, snmptraps ntp traffic and permitting rest of the traffic. Hence the issue resolved.
Thanks,
Babjani.
01-23-2020 08:42 PM
Hi,
What type of access-list are you using? Interface access-list, SNMP access-list.
Thanks
John
01-23-2020 10:19 PM - edited 01-23-2020 11:30 PM
01-24-2020 05:42 PM
Hi,
You need to use both snmp access-list and interface access-list. The snmp access-list specifies which devices can access snmp using the specified string. Therefore, the router will process snmp and reject or accept based on access-list and string. You, therefore, will need an access-list on the outside interface to block all snmp packets from the Internet.
There should be no impact on the router from having an access-list on the outside interface as long as you do not have excessive logging enabled on the access-list.
Thanks
John
01-24-2020 10:45 PM
Hi John/Everyone,
Thanks John for your time over this discussion.
We have applied an extended ACL over the Internet link interface deny snmp, snmptraps ntp traffic and permitting rest of the traffic. Hence the issue resolved.
Thanks,
Babjani.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide