I have questions regarding the PCI DSS requirements for quarterly external vulnerability scans by an ASV, specifically what public IPs I need to include in these scans.
The organization is a retail chain store (the questions pertain to the brick-and-mortar portion - not their eCommerce). There are no public facing services in any of the brick-and-mortar locations, other than for internal business needs (such as remote access [with 2FA], etc.).
My questions:
1) Some locations have external load balancers, to which several Internet lines connect (different ISPs). All these Internet lines are mapped to the same external interface of the perimeter firewall and are thus governed by the exact same firewall rules. So from a security perspective, scanning one of these IPs should be sufficient, but is this allowed per PCI DSS 3.0 (or 2.0)?
2) There are MPLS routers which do have public IPs, but they are not reachable from outside the MPLS. Do they need to be scanned?
3) There are routers that provide backup VPNs for the MPLS which have public IPs that only accepts connection from the MPLS network (no ping, all ports filtered). Do they need to be scanned?
4) There are public IPs mapped to internal managed Intrusion Detection System (IDS) devices, which are only accessible to our IDS provider (both through IP & port restrictions in the perimeter firewall as well as through the security of the IDS devices). Do they need to be scanned?