Korean
<< Back
VID 29151
Severity 40
Port 22
Protocol TCP
Class CISCO
Detailed Description The CISCO IOS system does not apply SNMP ACL. If ACLs are not applied, then anyone with a valid SNMP community string may monitor and manage the router. An ACL should be defined and applied for all SNMP community strings to limit access to a small number of authorized management stations.

* Platforms Affected:
CISCO IOS
Recommendation Apply SNMP access control list as follows :
Allow specific hosts to access SNMP by using access-list (port:161,162)
Router# config terminal
Router(config)# access-list 100 permit ip host 100.100.100.100 any
Router(config)# access-list 100 deny udp any any eq snmp
Router(config)# access-list 100 deny udp any any eq snmptrap
Router(config)# access-list 100 permit ip any any
Router(config)# interface serial 0 (Set access-list to the interface for SNMP)
Router(config-if)# ip access-group 100 in

In case of switch device, set this to vlan
Router(config)# interface vlan1
Router(config-if)# ip access-group 100 in
Related URL (CVE)
Related URL (SecurityFocus)
Related URL (ISS)