IncidentResponsev2

4.55 Verify Network Segmentation and ACLs

Task

Verify network segmentation and access control lists (ACLs) are properly configured to restrict unauthorized lateral movement, enforce network boundaries, and align with security policies.


Conditions

Given access to network diagrams, VLAN configurations, router/switch/firewall ACLs, and the ability to perform active network validation testing.


Standards


End State

Network segmentation and ACL configurations are validated. Unauthorized communication pathways are identified, and corrective actions are tracked.


Notes


Manual Steps

Step 1: Review Network Segmentation Design

Operator Note: Critical and sensitive systems should never be on the same VLAN as user workstations or guest users.


Step 2: Review VLAN and Subnet Configurations

Switches / VLAN Config

Example Cisco:

show vlan brief
show interfaces trunk

Look for:

Operator Note: VLAN hopping is a real risk → avoid poorly assigned or default VLANs.


Step 3: Review Router, Switch, and Firewall ACLs

Example review:

Device Command What to look for
Cisco Router show access-lists Permissive “permit any any” rules
Cisco Switch (SVI ACLs) show ip access-lists Incomplete or missing ACLs
Firewalls Web/CLI Overly broad or “allow all” rules

Validate:

Operator Note: “Permit any” or large CIDR “permit” ranges → red flag for misconfiguration.


Step 4: Perform Active Network Validation Testing

Tool Platform Usage
Nmap Cross-platform Scan from source VLAN to destination VLAN
Netcat Cross-platform Port testing
Hping3 Linux Advanced packet crafting (optional)

Example Nmap Validation:

nmap -Pn -p 22,135,3389 192.168.100.0/24

From user VLAN → ensure you CANNOT reach sensitive ports (RDP, SMB) on server VLAN.

Example Netcat quick test:

nc -vz 192.168.100.10 3389

Operator Note: Tests should be performed from representative VLANs → user → server, guest → internal, etc.


Step 5: Investigate and Escalate Findings

Issue Found Recommended Action
Flat network (no segmentation) Recommend VLAN implementation
Missing ACLs or overly permissive rules Work with network admins to implement controls
Guest or public networks can access internal systems Block guest VLAN from internal ranges
Unused switch ports active Shutdown or assign to unused VLAN

Operator Note: Engage network owners and administrators before making changes → change control procedures apply.


Dependencies


Other Available Tools

Tool Platform Installation Usage
Nmap Cross-platform Package manager Network connectivity scans
Netcat Cross-platform Built-in or package manager Port scanning and testing
Switch CLI (Cisco/Aruba/etc.) CLI Native VLAN and ACL validation
Firewall GUI / CLI Network device Native Review ACL and rule sets

Operator Recommendations and Additional Tools

Operator Checklist

Best Practices


References


Revision History

Date Version Description Author
2025-05-02 1.0 Created from scratch with detailed operator-focused network segmentation and ACL validation process Leo