Cisco ACI Router Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates −19 ✎ 24
Comparison against the immediately-prior release (V1R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Removed rules 19
- V-272065 Low The Multicast Source Discovery Protocol (MSDP) Cisco ACI must be configured to filter received source-active multicast advertisements for any undesirable multicast groups and sources.
- V-272066 Low The Cisco ACI Multicast Source Discovery Protocol (MSDP) must be configured to filter source-active (SA) multicast advertisements to external MSDP peers to avoid global visibility of local-only multicast sources and groups.
- V-272067 Low The Multicast Source Discovery Protocol (MSDP) Cisco ACI must be configured to limit the amount of source-active (SA) messages it accepts on per-peer basis.
- V-272068 Medium The multicast Cisco ACI must be configured to disable Protocol Independent Multicast (PIM) on all interfaces that are not required to support multicast routing.
- V-272070 Low The multicast edge Cisco ACI must be configured to establish boundaries for administratively scoped multicast traffic.
- V-272071 Medium The out-of-band management (OOBM) gateway Cisco ACI must be configured to have separate OSPF instances for the managed network and management network.
- V-272072 Medium The Cisco ACI out-of-band management (OOBM) must be configured to not redistribute routes between the management network routing domain and the managed network routing domain.
- V-272080 Medium The BGP Cisco ACI must be configured to reject outbound route advertisements for any prefixes belonging to the IP core.
- V-272083 Medium The BGP Cisco ACI must be configured to use a unique key for each autonomous system (AS) it peers with.
- V-272084 Medium The Cisco ACI must be configured to use keys with a duration of 180 days or less for authenticating routing protocol messages.
- V-272085 Medium The Multicast Source Discovery Protocol (MSDP) Cisco ACI must be configured to authenticate all received MSDP packets.
- V-272090 Low The Cisco ACI multicast rendezvous point (RP) must be configured to limit the multicast forwarding cache so that its resources are not saturated by managing an overwhelming number of Protocol Independent Multicast (PIM) and Multicast Source Discovery Protocol (MSDP) source-active entries.
- V-272093 Medium The Cisco ACI multicast shortest-path tree (SPT) threshold must be set to the default.
- V-272096 Medium The Cisco ACI multicast must be configured to filter the Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Report messages to allow hosts to join a multicast group only from sources that have been approved by the organization.
- V-272097 Medium Cisco ACI Multicast Source Discovery Protocol (MSDP) must be configured to only accept MSDP packets from known MSDP peers.
- V-272099 Low The Multicast Source Discovery Protocol (MSDP) Cisco ACI must be configured to use its loopback address as the source address when originating MSDP traffic.
- V-272100 Low The Cisco ACI must be configured to advertise a hop limit of at least 32 in Cisco ACI Advertisement messages for IPv6 stateless auto-configuration deployments.
- V-272102 Medium The Cisco ACI must implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions.
- V-272105 Low The MPLS Cisco ACI with Resource Reservation Protocol Traffic Engineering (RSVP-TE) enabled must be configured with message pacing or refresh reduction to adjust the maximum number of RSVP messages to an output queue based on the link speed and input queue size of adjacent core Cisco ACIs.
Content changes 24
- V-272061 Medium descriptioncheckfix The Cisco ACI must be configured to enforce approved authorizations for controlling the flow of information within the network based on organization-defined information flow control policies.
- V-272062 Medium descriptioncheckfix The BGP Cisco ACI must be configured to reject inbound route advertisements for any prefixes belonging to the local autonomous system (AS).
- V-272063 Medium descriptioncheckfix The BGP Cisco ACI must be configured to reject outbound route advertisements for any prefixes that do not belong to any customers or the local autonomous system (AS).
- V-272064 Low descriptioncheckfix The BGP Cisco ACI must be configured to reject route advertisements from BGP peers that do not list their autonomous system (AS) number as the first AS in the AS_PATH attribute.
- V-272069 Medium checkfix The multicast Cisco ACI must be configured to bind a Protocol Independent Multicast (PIM) neighbor filter to interfaces that have PIM enabled.
- V-272073 Low checkfix The Cisco ACI multicast rendezvous point (RP) must be configured to filter Protocol Independent Multicast (PIM) Register messages received from the designated router (DR) for any undesirable multicast groups and sources.
- V-272074 Low checkfix The multicast rendezvous point (RP) Cisco ACI must be configured to filter Protocol Independent Multicast (PIM) Join messages received from the designated router (DR) for any undesirable multicast groups.
- V-272076 Medium checkfix The Cisco ACI must not be configured to have any feature enabled that calls home to the vendor.
- V-272077 Medium checkfix The Cisco ACI must be configured to use encryption for routing protocol authentication.
- V-272078 Medium descriptioncheckfix The Cisco ACI must be configured to authenticate all routing protocol messages using a NIST-validated FIPS 198-1 message authentication code algorithm.
- V-272079 Medium descriptioncheckfix The Cisco ACI must be configured to drop all fragmented Internet Control Message Protocol (ICMP) packets destined to itself.
- V-272081 Medium descriptioncheckfix The Cisco ACI must be configured to only permit management traffic that ingresses and egresses the OOBM interface.
- V-272082 Medium checkfix The Cisco ACI must be configured to implement message authentication and secure communications for all control plane protocols.
- V-272087 Medium checkfix The Cisco ACI must be configured to have Internet Control Message Protocol (ICMP) mask replies disabled on all external interfaces.
- V-272088 Medium descriptioncheckfix The BGP Cisco ACI must be configured to use the maximum prefixes feature to protect against route table flooding and prefix de-aggregation attacks.
- V-272089 Low checkfix The BGP Cisco ACI must be configured to limit the prefix size on any inbound route advertisement to /24 or the least significant prefixes issued to the customer.
- V-272091 Medium descriptioncheckfix The multicast rendezvous point (RP) must be configured to rate limit the number of Protocol Independent Multicast (PIM) Register messages.
- V-272092 Medium descriptioncheckfix The Cisco ACI must be configured to limit the mroute states created by Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) reports on a Cisco APIC Bridge Domain (BD) or interface.
- V-272094 Low descriptioncheckfix Cisco ACI must be configured so the BGP neighbor is directly connected and will not connect a BGP session to a directly connected neighbor device's loopback address.
- V-272095 Low descriptioncheckfix The Cisco ACI multicast must be configured to filter the Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Report messages to allow hosts to join only multicast groups and only from sources that have been approved by the organization.
- V-272098 Low checkfix The Cisco ACI must be configured to use its loopback address as the source address for internal Border Gateway Protocol (iBGP) peering sessions.
- V-272101 Medium checkfix The Cisco ACI must not be configured to use IPv6 site local unicast addresses.
- V-272103 Medium checkfix The Cisco ACI must establish organization-defined alternate communication paths for system operations organizational command and control.
- V-272104 Medium checkfix The Cisco ACI must be configured to protect against or limit the effects of denial-of-service (DoS) attacks by employing control plane protection.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001368
- Version
- CACI-RT-000001
- Vuln IDs
-
- V-272061
- Rule IDs
-
- SV-272061r1168386_rule
Checks: C-76111r1168384_chk
Review the switch configuration to verify that contracts are configured. 1. To check contract configuration, navigate to Tenants >> {{Your_Tenant}} >> Contracts >> Standard (whitelist)/Taboos (blacklist) >> {{Your_Contract}} >> {{your_subject}}. 2. To check the configuration for the Provider and Consumer of the contract, navigate to Tenants >> {{Your_Tenant}} >> Application Profiles >> {{ your_Application_Profile}} >> Application EPGs >> {{Your_EPG}} >> Contracts. If the switch is not configured to use contract filters to enforce approved authorizations for controlling the flow of information within the network based on organization-defined information flow control policies, this is a finding.
Fix: F-76018r1168385_fix
Configure "contracts" to define security policies that control traffic between different EPGs. Contract subjects must combine filters that will designate what traffic is allowed to pass through the contract, but for the contract to work it must be applied where the Provider contract is attached to the service side and the Consumer is attached to the user side. Traffic must be initiated from the Consumer EPG to the Provider EPG, including filters and security policies. 1. Configure the details of each contract. Navigate to Tenants >> {{Your_Tenant}} >> Contracts >> Standard (whitelist)/Taboos (blacklist) >> {{Your_Contract}} >> {{your_subject}}. 2. Configure the details of each Provider and Consumer of the contract. Navigate to Tenants >> {{Your_Tenant}} >> Application Profiles >> {{ your_Application_Profile}} >> Application EPGs >> {{Your_EPG}} >> Contracts.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001368
- Version
- CACI-RT-000002
- Vuln IDs
-
- V-272062
- Rule IDs
-
- SV-272062r1168387_rule
Checks: C-76112r1168089_chk
Review the switch configuration to verify it will reject routes belonging to the local AS. 1. Verify a prefix list has been configured containing prefixes belonging to the local AS. Navigate to Tenants >> {{your_Tenant}} >> Networking >> L3Outs >> {{your_L3Outs}} >> Route Map for import and export route control. 2. Review the route-map to the inbound BGP policy. Navigate to Tenants >> {{your_Tenant}} >> Networking >> L3Outs >> {{your_L3Outs}} >> External EPGs >> Policy >> General >> Route Control Profile. If the switch is not configured to reject inbound route advertisements belonging to the local AS, this is a finding.
Fix: F-76019r1168090_fix
Configure the router to reject inbound route advertisements for any prefixes belonging to the local AS. From the relevant BGP peer configuration, create a route-map to filter local AS prefixes. Apply the route-map to the inbound BGP policy. Within the inbound policy, add a prefix filter rule that explicitly rejects any routes with a prefix matching the local AS number. 1. Navigate to Tenants >> {{your_Tenant}} >> Networking >> L3Outs >> {{your_L3Outs}} >> Route Map for import and export route control. 2. Apply that route MAP to the external EPG in the following location: Tenants >> {{your_Tenant}} >> Networking >> L3Outs >> {{your_L3Outs}} >> External EPGs >> Policy >> General >> Route Control Profile. Note: An alternative to route maps is to use subnets under the External EPG with the correct route controls assigned as discussed in vendor documentation (Reference the L3 out white paper).
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001368
- Version
- CACI-RT-000003
- Vuln IDs
-
- V-272063
- Rule IDs
-
- SV-272063r1168094_rule
Checks: C-76113r1168092_chk
Review the ACI configuration to verify it will reject routes belonging to the local AS. 1. Verify a prefix list has been configured containing prefixes belonging to the local AS. Navigate to Tenants >> {{your_Tenant}} >> Networking >> L3Outs >> {{your_L3Outs}} >> Route Map for import and export route control. 2. Verify the prefix list has been applied to all external BGP peers. Navigate to Tenants >> {{your_Tenant}} >> Networking >> L3Outs >> {{your_L3Outs}} >> External EPGs >> Policy >> General >> Route Control Profile. If the ACI is not configured to reject inbound route advertisements belonging to the local AS, this is a finding.
Fix: F-76020r1168093_fix
Configure the router to reject outbound route advertisements for any prefixes belonging to the local AS. Use a prefix list containing the local AS prefixes and apply it as an outbound filter on the BGP neighbor configuration. 1. Navigate to Tenants >> {{your_Tenant}} >> Networking >> L3Outs >> {{your_L3Outs}} >> Route Map for import and export route control. 2. Then apply that route MAP to the external EPG in the following location: Tenants >> {{your_Tenant}} >> Networking >> L3Outs >> {{your_L3Outs}} >> External EPGs >> Policy >> General >> Route Control Profile. Note: An alternative to route maps is to use subnets under the External EPG with the correct route Controls assigned as discussed in vendor documentation (Reference the L3 out white paper).
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001368
- Version
- CACI-RT-000004
- Vuln IDs
-
- V-272064
- Rule IDs
-
- SV-272064r1168097_rule
Checks: C-76114r1168095_chk
By default, Cisco ACI enforces the first AS in the AS_PATH attribute for all route advertisements. Review the configuration to verify the default BGP configuration on the ACI fabric. 1. Navigate to Tenants >> {{your_Tenant}} >> Networking >> L3Outs >> {{your_L3Outs}} >> Route Map for import and export route control. 2. Apply that route MAP to the external EPG in the following location: Tenants >> {{your_Tenant}} >> Networking >> L3Outs >> {{your_L3Outs}} >> External EPGs >> Policy >> General >> Route Control Profile. If the device is not configured to reject updates from peers that do not list their AS number as the first AS in the AS_PATH attribute, this is a finding.
Fix: F-76021r1168096_fix
Configure the device to deny updates received from eBGP peers that do not list their AS number as the first AS in the AS_PATH attribute. 1. Navigate to Tenants >> {{your_Tenant}} >> Networking >> L3Outs >> {{your_L3Outs}} >> Route Map for import and export route control. 2. Apply that route MAP to the external EPG in the following location: Tenants >> {{your_Tenant}} >> Networking >> L3Outs >> {{your_L3Outs}} >> External EPGs >> Policy >> General >> Route Control Profile. Note: An alternative to route maps is to use subnets under the External EPG with the correct route Controls assigned discussed in vendor documentation (Reference the L3 out white paper).
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- CACI-RT-000009
- Vuln IDs
-
- V-272069
- Rule IDs
-
- SV-272069r1168390_rule
Checks: C-76119r1168388_chk
1. Review the network's multicast topology diagram. 2. Review the switch configuration to verify only the PIM interfaces as shown in the multicast topology diagram are enabled for PIM. Navigate to Tenants >> {{your_Tenants}} >> Networking >> VRFs >> {{Your_VRF}} >> multicast >> Configuration >> PIM settings >> Reserved Route MAP. If a multicast interface is required to support PIM and it is not enabled, this is a finding.
Fix: F-76026r1168389_fix
Configure the relevant multicast enabled interfaces by configuring a route map on the PIM settings for the VRF on the GUI. Navigate to Tenants >> {{your_Tenants}} >> Networking >> VRFs >> {{Your_VRF}} >> multicast >> Configuration >> PIM settings >> Reserved Route MAP.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001414
- Version
- CACI-RT-000013
- Vuln IDs
-
- V-272073
- Rule IDs
-
- SV-272073r1168393_rule
Checks: C-76123r1168391_chk
View the configuration to check for PIM compliance on the relevant multicast enabled interfaces by configuring a route map on the PIM settings for the VRF on the GUI. Navigate to Tenants >> {{your_Tenants}} >> Networking >> VRFs>> {{Your_VRF}} >> multicast >> Configuration >> PIM settings >> Reserved Route MAP. If the CISCO ACI peering with PIM-SM routers is not configured with a policy to block registration messages for any undesirable multicast groups and sources, this is a finding.
Fix: F-76030r1168392_fix
Configure an access list on the rendezvous point (RP) to explicitly deny PIM register messages originating from specific source-group combinations, effectively blocking the propagation of those multicast streams across the network; access this configuration. Configure the relevant multicast enabled interfaces by configuring a route map on the PIM settings for the VRF on the GUI. Navigate to Tenants >> {{your_Tenants}} >> Networking >> VRFs>> {{Your_VRF}} >> multicast >> Configuration >> PIM settings >> Reserved Route MAP.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001414
- Version
- CACI-RT-000014
- Vuln IDs
-
- V-272074
- Rule IDs
-
- SV-272074r1168396_rule
Checks: C-76124r1168394_chk
View the configuration to verify PIM compliance. Configure the relevant multicast enabled interfaces by configuring a route map on the PIM settings for the VRF on the GUI. Navigate to Tenants >> {{your_Tenants}} >> Networking >> VRFs >> {{Your_VRF}} >> multicast >> Configuration >> PIM settings >> Reserved Route MAP. If the Cisco ACI is not configured to filter join messages received from the DR for any undesirable multicast groups, this is a finding.
Fix: F-76031r1168395_fix
Configure ACLs on the border leaf switches that act as the PIM DRs, specifically targeting the multicast group addresses to be blocked. This essentially prevents unwanted multicast traffic from entering the fabric by filtering the Join messages at the entry point. Configure the relevant multicast enabled interfaces by configuring a route map on the PIM settings for the VRF on the GUI. Navigate to Tenants >> {{your_Tenants}} >> Networking >> VRFs >> {{Your_VRF}} >> multicast >> Configuration >> PIM settings >> Reserved Route MAP.
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000134
- Version
- CACI-RT-000015
- Vuln IDs
-
- V-272075
- Rule IDs
-
- SV-272075r1114309_rule
Checks: C-76125r1114308_chk
Use the APIC GUI to navigate to each tenant. Within each contract, review each rule with "Action" set to "Deny". Verify these rules have the "Directive" set to "Log". If packets being dropped at interfaces are not logged, this is a finding.
Fix: F-76032r1064190_fix
Configure ACLs to log packets that are dropped. Use the APIC GUI to navigate to each tenant: 1. Go to the contract section and either create a new contract or modify an existing one where drop logging is to be implemented. 2. Within the contract, create the necessary filter rules based on the desired criteria (e.g., source/destination IP, port, protocol) and set the "Action" to "Deny" with the "Directive" set to "Log". 3. Assign the contract to the relevant endpoint groups (EPGs) to enforce the policy on traffic between them.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- CACI-RT-000016
- Vuln IDs
-
- V-272076
- Rule IDs
-
- SV-272076r1168127_rule
Checks: C-76126r1168125_chk
Verify the ACI configuration under Admin >> External Data Collectors >> monitoring Destinations >> smart callhome/callhome is not setup, and that no Intersight configuration is setup at System >> System Settings >> Intersight Connectivity. If the Call Home feature is configured to send messages to unauthorized individuals such as Cisco TAC, this is a finding.
Fix: F-76033r1168126_fix
Disable the Call Home feature: 1. Navigate to Admin >> External Data Collectors >> monitoring Destinations >> smart callhome. 2. In the General tab, set the Admin State to "Off". 3. Click "Save".
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- CACI-RT-000017
- Vuln IDs
-
- V-272077
- Rule IDs
-
- SV-272077r1168399_rule
Checks: C-76127r1168397_chk
Verify PSKs are configured. Navigate to Tenants >> {{your_tenants}} >> Networking >> L3Outs >> {{your_L3Out}} >> Logical Node Profiles >> {{your_node_profile}} >> Logical Interface Profiles >> {{your_interface_Profile} >> OSPF|EIGRP|BGP Interface profile. If PSKs are not configured to use encryption for routing protocol authentication, this is a finding.
Fix: F-76034r1168398_fix
Configure one or more PSKs used to generate encryption keys for the routing protocol authentication process. Navigate to Tenants >> {{your_tenants}} >> Networking >> L3Outs >> {{your_L3Out}} >> Logical Node Profiles >> {{your_node_profile}} >> Logical Interface Profiles >> {{your_interface_Profile} >> OSPF|EIGRP|BGP Interface profile.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- CACI-RT-000018
- Vuln IDs
-
- V-272078
- Rule IDs
-
- SV-272078r1168402_rule
Checks: C-76128r1168400_chk
If EIGRP, RIP, and IS-IS protocols are used (these protocols only support MD5 authentication), this is a finding. Review the switch configuration using the show bgp and show ospf commands to verify BGP and OSPF. Navigate to Tenants >> {{your_tenants}} >> Networking >> L3Outs >> {{your_L3Out}} >> Logical Node Profiles >> {{your_node_profile}} >> Logical Interface Profiles >> {{your_interface_Profile}>> OSPF|EIGRP|BGP Interface profile. If authentication protocols that affect the routing or forwarding tables are not configured to use key chain (TCP-AO) authentication with 180 maximum lifetime, this is a finding.
Fix: F-76035r1168401_fix
Configure authentication for every protocol that affects the routing or forwarding tables to use key chain (TCP-AO) authentication. Configure all supported control plane protocols. This typically includes protocols such as BGP and OSPF. Navigate to Tenants >> {{your_tenants}} >> Networking >> L3Outs >> {{your_L3Out}} >> Logical Node Profiles >> {{your_node_profile}} >> Logical Interface Profiles >> {{your_interface_Profile} >> OSPF|EIGRP|BGP Interface profile.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- CACI-RT-000019
- Vuln IDs
-
- V-272079
- Rule IDs
-
- SV-272079r1168423_rule
Checks: C-76129r1168403_chk
If this review is for the DODIN Backbone, mark as Not Applicable. When creating a contract, create a Deny statement that looks at all the fragmented bits and denies only those packets. Review the following two locations: Option 1: Review any standard contract (whitelist) with an explicit deny for the fragment bit to counter act any allows. Tenant >> Contracts >> Standard >> {{your_Contract}} >> {{your_contract_Subject}} >> Policy >> General >> Filters >> create/ add a deny for ICMP traffic. The filter entries should include the following: Ethertype set to IP/ipv6, IP Protocol set to ICMP/ICMPv6, and the Match Only Fragments box checked. Option 2: Review any taboo contract (blacklist) for the fragment bits: Tenant >> Contracts >> Taboo >> {{your_Contract}} >> Policy >> General >> {{your_contract_Subject}} >> Filters >> create/ add a deny for ICMP traffic. The filter entries should include the following: Ethertype set to IP/ipv6, IP Protocol set to ICMP/ICMPv6, and the Match Only Fragments box checked3. Verify ICMP and Fragmented are selected to be denied. If all fragmented ICMP packets destined to Cisco ACI IP addresses are not dropped, this is a finding.
Fix: F-76036r1168422_fix
Place the deny rule before any permit rules for ICMP traffic to ensure fragmented ICMP packets are dropped first. When you are creating a contract you would want to create a Deny statement that looks at all the fragmented bits and denies only those packets. There are 2 ways to do this. Option 1: Create a standard contract (whitelist) with an explicit deny for the fragment bit to counter act any allows. Navigate to the following location and configure settings: Tenant >> Contracts >> Standard >> {{your_Contract}} >> {{your_contract_Subject}} >> Policy >> General >> Filters >> create/ add a deny for ICMP traffic. The filter entries should include the following: Ethertype set to IP/ipv6, IP Protocol set to ICMP/ICMPv6, and the Match Only Fragments box checked. Option 2: Create a taboo contract (blacklist) for the fragment bits by navigating to the following location: Tenant >> Contracts >> Taboo >> {{your_Contract}} >> Policy >> General >> {{your_contract_Subject}} >> Filters >> create/ add a deny for ICMP traffic. The filter entries should include the following: Ethertype set to IP/ipv6, IP Protocol set to ICMP/ICMPv6, and the Match Only Fragments box checked.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- CACI-RT-000021
- Vuln IDs
-
- V-272081
- Rule IDs
-
- SV-272081r1168142_rule
Checks: C-76131r1168140_chk
To setup the OOB to limit what devices/ networks can access it, use the contracts in the following settings: Tenant >> Tenant mgmt >> Node Management Addresses >> Static Node Management Addresses Tenant >> Tenant mgmt >> Node Management EPGs >> Out-of-Band EPG default Tenant >> Tenant mgmt >> External Management Network Instance Profiles >> {{YourInstanceProfile}} If the Cisco ACI is not configured to only permit management traffic that ingresses and egresses the OOBM interface, this is a finding.
Fix: F-76038r1168141_fix
Navigate to the relevant tenant to setup the OOB to limit what devices/ networks can access it. Utilize contracts in the following settings: Tenant >> Tenant mgmt >> Node Management Addresses >> Static Node Management Addresses Tenant >> Tenant mgmt >> Node Management EPGs >> Out-of-Band EPG default Tenant >> Tenant mgmt >> External Management Network Instance Profiles >> {{YourInstanceProfile}}
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001184
- Version
- CACI-RT-000022
- Vuln IDs
-
- V-272082
- Rule IDs
-
- SV-272082r1168145_rule
Checks: C-76132r1168143_chk
Verify secure communications and message authentication on all control plane protocols is configured. 1. Verify Secure Communication: - Navigate to Fabric >> Fabric Policies >> Policies >> Pod >> Management Access. - Verify SSH and SSL protocols are enabled for APIC management. 2. Verify Message Authentication: - Navigate to Fabric >> Fabric Policies >> Pod Policies >> Policies >> Interconnect. - Verify IPsec for FI communication is enabled. 3. Verify OpFlex for Southbound Communication is set to TLS. 4. Navigate to Fabric >> Fabric Policies >> Pod Policies >> Policies >> Trust Domain. - Verify the Trust Domain is enabled and configured. Verify BGP neighbor authentication keys on Cisco ACI border leaf switches are configured to use a different authentication key for each AS peer. 1. Navigate to Tenants >> All Tenants >> your_tenant >> Networking >> L3Outs >> your_l3out. 2. Expand Logical Node Profiles >> node_profile. 3. Select Logical Interface Profiles >> interface_profile (where the BGP peering is configured). 4. Within the Logical Interface Profile, review each BGP Peer Connectivity profiles for each individual BGP peer. 5. In the BGP Peer Connectivity Profile settings, review the Password to verify each peer has a unique password. If message authentication and secure communications is not configured for all control plane protocols, this is a finding.
Fix: F-76039r1168144_fix
Configure secure communications and message authentication on all control plane protocols. 1. Verify Secure Communication: - Navigate to Fabric >> Fabric Policies >> Policies >> Pod >> Management Access. - Verify SSH and SSL protocols are enabled for APIC management. Configure the ports used for SSH and SSL connections as needed. 2. Configure Message Authentication: - Navigate to Fabric >> Fabric Policies >> Pod Policies >> Policies >> Interconnect. - Enable IPsec for FI communication to ensure secure communication between the APIC and the switches. - Configure the IPsec parameters, such as the encryption algorithm and authentication method. 3. Configure OpFlex for Southbound Communication to use TLS: Note: OpFlex is a southbound protocol designed to facilitate communications between the SDN Controller and the switches and routers. 4. Enable Trust Domain: - Navigate to Fabric >> Fabric Policies >> Pod Policies >> Policies >> Trust Domain. - Enable the Trust Domain to ensure that only trusted devices can communicate with the APIC. - Configure the Trust Domain parameters, such as the certificate authority and the trusted devices. To configure BGP neighbor authentication keys on Cisco ACI border leaf switches using a different authentication key for each AS peer, configure the BGP Peer Connectivity Profile within the L3Out configuration. 1. In the APIC GUI, go to Tenants >> All Tenants >> your_tenant >> Networking >> L3Outs >> your_l3out. 2. Expand Logical Node Profiles >> node_profile. 3. Select Logical Interface Profiles >> interface_profile (where the BGP peering is configured). 4. Within the Logical Interface Profile, locate or create the BGP Peer Connectivity Profile associated with the peer you want to authenticate. Edit or create a profile. 5. In the BGP Peer Connectivity Profile settings: - Remote Autonomous System Number: Specify the AS number of the peer. - Password: Enter the authentication key/password for this specific peer. - Confirm Password: Re-enter the same password. - Other settings, such as peer controls, address type controls, and route control profiles, can be adjusted as needed for the BGP peering configuration. 6. Repeat the steps for each peer that must be configured. Create separate BGP Peer Connectivity profiles for each individual BGP peer, with different passwords for each. Ensure the peer devices have the matching authentication key/password configured for successful BGP peering.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- CACI-RT-000026
- Vuln IDs
-
- V-272086
- Rule IDs
-
- SV-272086r1114094_rule
Checks: C-76136r1064209_chk
Review the configuration for each L3OUT Bridge Domain to determine if gratuitous ARP is disabled: 1. In the APIC GUI Navigation pane, select "Tenant" and inspect each Tenant's Bridge Domain configuration. 2. Expand "Networking" and right-click each Bridge Domain. 3. View the Layer 3 configuration tab. Verify GARP-based detection is not enabled. If GARP is enabled on any external interface, this is a finding.
Fix: F-76043r1114093_fix
Disable GARP for each L3OUT Bridge Domain: 1. In the APIC GUI navigation pane, select "Tenant" and complete the following for each tenant listed. 2. Expand "Networking", right-click, "Create Bridge Domain" to open the dialog box, and fill out the form. - In the Layer 3 Configurations tab, GARP based detection must not be enabled. 3. Click "NEXT". 4. Complete the Bridge Domain configuration. 5. Click "Finish".
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- CACI-RT-000027
- Vuln IDs
-
- V-272087
- Rule IDs
-
- SV-272087r1168151_rule
Checks: C-76137r1168149_chk
Review the router configuration and verify IP mask replies have been disabled on all external interfaces using any of the following options: 1. For contracts with external L3out traffic, verify specific allow statements do not allow any ICMP type 17 packets. 2. Verify the Filter for ICMP Type 17 and confirm that every contract that allows ICMP has the type 17 explicit deny to prevent this request. 3. Configure a Taboo contract (blacklist) that explicitly denies ICMP type 17. If IP mask replies are not disabled on all external interfaces, this is a finding.
Fix: F-76044r1168150_fix
Disable IP mash replies on all external interfaces using any of the following options. 1. ACI is a whitelist model by default, so all traffic is denied by default. When contracts are added, users can be specific with the allow statements to avoid allowing any ICMP type 17 packets. 2. Configure the filter for ICMP Type 17 and confirm every contract that allows ICMP has the type 17 explicit deny to prevent this request. 3. Configure a Taboo contract (blacklist) that explicitly denies ICMP type 17.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- CACI-RT-000028
- Vuln IDs
-
- V-272088
- Rule IDs
-
- SV-272088r1168406_rule
Checks: C-76138r1168152_chk
Verify the BGP configuration for each tenant: Tenants >> {{your_Tenant}} >> Networking >> L3Out >> {{your_l3out}} >> Logical Node Profiles >> {{your_Logical_node_Profile}} >> Logical Interface Profiles >> {{your_logical_interface_profile}} >> BGP peer x.x.x.x >> Policy >> BGP Peer Prefix Policy. If the router is not configured to control the number of prefixes received from each peer to protect against route table flooding and prefix de-aggregation attacks, this is a finding.
Fix: F-76045r1168405_fix
Configure the router to use the maximum prefixes feature to protect against route table flooding and prefix de-aggregation attacks as shown in the example below: For each BGP peer, navigate to Tenants >> {{your_Tenant}} >> Networking >> L3Out >> {{your_l3out}} >> Logical Node Profiles >> {{your_Logical_node_Profile}} >> Logical Interface Profiles >> {{your_logical_interface_profile}} >> BGP peer x.x.x.x >> Policy >> BGP Peer Prefix. Create a policy within the BGP configuration section, where <peer-ip> is the IP address of the BGP peer and <number of prefixes> is the desired maximum prefix limit to be set; the default maximum prefix limit is typically 20,000 prefixes.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-002385
- Version
- CACI-RT-000029
- Vuln IDs
-
- V-272089
- Rule IDs
-
- SV-272089r1168408_rule
Checks: C-76139r1168407_chk
Review the configuration of the RP to verify it is rate limiting the number of PIM register messages. Verify the L3Out option for Route Control Enforcement Import is checked. Navigate to Tenants >> {{your_Tenant}} >> Networking >> L3Out >> {{your_l3out}} >> Policy >> Main >> Route Control Enforcement. If the router is not configured to limit the prefix size on any inbound route advertisement to /24, or the least significant prefixes issued to the customer, this is a finding.
Fix: F-76046r1168156_fix
Configure the router to limit the prefix size on any route advertisement to /24 or the least significant prefixes issued to the customer. Create a "match rule" within a "route profile" by specifying a prefix list, to be applied to the desired L3Out (external routed network) to filter BGP routes based on the prefixes defined in the list. The route profile is applied to a specific L3Out (external routed network) to control which prefixes are advertised or accepted from external networks. Refer to the L3 out documentation on setting up route maps or using the import controls on the external EPG subnets on this connection. Ensure on the L3Out the option for Route Control Enforcement Import is checked. Tenants >> {{your_Tenant}} >> Networking >> L3Out >> {{your_l3out}} >> Policy >> Main >> Route Control Enforcement
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- CACI-RT-000031
- Vuln IDs
-
- V-272091
- Rule IDs
-
- SV-272091r1168160_rule
Checks: C-76141r1168158_chk
Review the PIM configuration: Tenants >> {{your_Tenant}} >> Networking >> VRF >> {{your_VRF}} >> Multicast >> Configuration >> Pattern Policy >> under Register Traffic Policy look for Max Rate (packets per second) If the RP router is not configured to filter PIM register messages, rate limit the number of PIM register messages, and accept multicast packets only from known peers, this is a finding.
Fix: F-76048r1168159_fix
Configure the switch to filter PIM register messages, rate limit the number of PIM register messages, and accept multicast packets only from known peers. Use the command "ip pim register-rate-limit <rate>", where <rate> specifies the desired maximum number of register messages per second allowed to be sent. Navigate to the following location to configure: Tenants >> {{your_Tenant}} >> Networking >> VRF >> {{your_VRF}} >> Multicast >> Configuration >> Pattern Policy >> under Register Traffic Policy look for Max Rate (packets per second)
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- CACI-RT-000032
- Vuln IDs
-
- V-272092
- Rule IDs
-
- SV-272092r1168163_rule
Checks: C-76142r1168161_chk
Review the relevant BD configuration. Verify it is configured to limit the number of multicast routes (mroute states) generated by IGMP or MLD reports. Tenants >> {{your_Tenant}} >> Networking >> Bridge Domain >> {{your_Bridge_Domain}} >> Policy >> General >> IGMP Policy >> set the Maximum Multicast Entries If the ACI is not limiting multicast requests via IGMP or MLD on a global or interfaces basis, this is a finding.
Fix: F-76049r1168162_fix
Configure a global or interface basis to limit the number of mroute states resulting from IGMP or MLD membership reports. Tenants >> {{your_Tenant}} >> Networking >> Bridge Domain >> {{your_Bridge_Domain}} >> Policy >> General >> IGMP Policy >> set the Maximum Multicast Entries Note: This setting is used to limit the mroute states for the BD or interface created by IGMP reports. Default is disabled, no limit enforced. Valid range is 1-4294967295.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-002385
- Version
- CACI-RT-000034
- Vuln IDs
-
- V-272094
- Rule IDs
-
- SV-272094r1168411_rule
Checks: C-76144r1168409_chk
Review the BGP configuration to verify that TTL security has been configured to the default settings. Navigate to Tenants >> {{your_Tenant}} >> Networking >> L3Out >> {{your_l3out}} >> Logical Node Profiles >> {{your_Logical_node_Profile}} >> Logical Interface Profiles >> {{your_logical_interface_profile}} >> BGP peer x.x.x.x >> Policy. Verify the following in the policy: Disable Connected Check is unmarked EBGP Multihop TTL = 1 If the Cisco ACI is not configured to use GTSM for all Exterior BGP peering sessions, this is a finding.
Fix: F-76051r1168410_fix
If ACI is determined to be configured differently than the default settings, reconfigure to default settings by performing the actions on the BGP connectivity profile (path below). Navigate to Tenants >> {{your_Tenant}} >> Networking >> L3Out >> {{your_l3out}} >> Logical Node Profiles >> {{your_Logical_node_Profile}} >> Logical Interface Profiles >> {{your_logical_interface_profile}} >> BGP peer x.x.x.x >> Policy. Reset the following in the policy: Disable Connected Check is unmarked EBGP Multihop TTL = 1
- RMF Control
- SC-7
- Severity
- L
- CCI
- CCI-002403
- Version
- CACI-RT-000035
- Vuln IDs
-
- V-272095
- Rule IDs
-
- SV-272095r1168413_rule
Checks: C-76145r1168412_chk
This requirement is only applicable to Source Specific Multicast (SSM) implementation. This requirement is not applicable to Any Source Multicast (ASM), since the filtering is being performed by the rendezvous point switch. Review the configuration to verify filtering IGMP or MLD Membership Report messages, allowing hosts to join only those groups that have been approved. Navigate to the following location to review the settings: Tenants >> {{your_Tenant}} >> Networking >> Bridge Domain >> {{your_Bridge_Domain}} >> Policy >> General If the Cisco ACI is not filtering IGMP or MLD Membership Report messages, this is a finding.
Fix: F-76052r1168171_fix
Configure IGMP Snooping. Note: There are a number of methods for meeting this requirement; however, it is recommended to use filter Destinations via contracts and PIM destination filter route maps when enabling the Bridge domain to participate in IGMP and MLD Snooping. All but the contract settings can be found at the following GUI path: Tenants >> {{your_Tenant}} >> Networking >> Bridge Domain >> {{your_Bridge_Domain}} >> Policy >> General
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- CACI-RT-000038
- Vuln IDs
-
- V-272098
- Rule IDs
-
- SV-272098r1168415_rule
Checks: C-76148r1168176_chk
Review the switch configuration to verify a loopback address has been configured. Tenants >> {{your_Tenant}} >> L3Out >> {{your_l3out}} >> Logical Node Profiles >> {{your_Logical_node_Profile}} >> Policy >> BGP Peer Connectivity add your loopback If the switch does not use its loopback address as the source address for all iBGP sessions, this is a finding.
Fix: F-76055r1168414_fix
Configure BGP for the relevant L3Out to use the switch's loopback address as the source address for all iBGP peering. This configures the switch to use the loopback interface as the source IP for all BGP updates sent to the specified peer. - Navigate to Tenants >> {{your_Tenant}} >> Networking >> L3Out >> {{your_l3out}} >> Logical Node Profiles >> {{your_Logical_node_Profile}} >> Policy >> Node. - Double click the Node(Leaf) and look for the option to select "use Router ID as loopback" or set the loopback address to which to build the BGP connection and unselect "use router ID as Loopback". After setting the loopback address, navigate to Tenants >> {{your_Tenant}} >> L3Out >> {{your_l3out}} >> Logical Node Profiles >> {{your_Logical_node_Profile}} >> Policy >> BGP Peer Connectivity. Add the loopback.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- CACI-RT-000041
- Vuln IDs
-
- V-272101
- Rule IDs
-
- SV-272101r1168417_rule
Checks: C-76151r1168416_chk
Review the router configuration to ensure FEC0::/10 IP addresses are not defined. Tenants >> {{your_Tenant}} >> Networking >> VRF >> {{your_VRF}} >> Operational >> Route Table >> IPV6 Routes and Tenants >> {{your_Tenant}} >> Networking >> VRF >> {{your_VRF}} >> Operational >> Client Endpoints This will display all IPV6 address in this VRF and on which leaf they reside. If the CLI is preferred, the command is as follows when run from the APIC: fabric {{node_ID}} show ipv6 interface brief or from each node: show ipv6 interface brief If IPv6 site local unicast addresses are defined, this is a finding.
Fix: F-76058r1168186_fix
Delete unauthorized addresses. Configure the IPv6 addresses on the ACI fabric's leaf switches and virtual network segments (bridge domains) within the desired tenant to use site local unicast addresses. Tenants >> {{your_Tenant}} >> Networking >> VRF >> {{your_VRF}} >> Operational >> Route Table >> IPV6 Routes Remove unauthorized addresses. Remove unauthorized addresses from the Client Endpoints list. Tenants >> {{your_Tenant}} >> Networking >> VRF >> {{your_VRF}} >> Operational >> Client Endpoints
- RMF Control
- Severity
- M
- CCI
- CCI-004931
- Version
- CACI-RT-000043
- Vuln IDs
-
- V-272103
- Rule IDs
-
- SV-272103r1168419_rule
Checks: C-76153r1168188_chk
Review the SSP and the ACI configuration to verify logical separation using EPGs, bridge domains, and/or tenants is configured. There are a large number of places to validate that each EPG is using an organizational defined VLAN. That would be dependent on the VLAN pool associated with the Physical/ VMM Domains that the EPG is using. To check the Physical domain in the GUI, use the following path: Tenants >> {{your_Tenant}} >> Application Profiles >> {{your_application_profile}} >> Application EPGs >> {{your_EPG}} > Domains After checking the domain, check the VLAN pool on the physical domains in the GUI: Fabric >> Access Policies >> Physical and External Domains >> Physical Domains >> {{your_domain}} For VMM Domain vlan pools, check the following GUI location: Virtual Networking >> VMware >> {{your_VMM_Domain}} >> Policy >> General If organization-defined alternate communication paths for system operations organizational command and control have not been established, this is a finding.
Fix: F-76060r1168418_fix
Configure logical separation using EPGs, bridge domains, and/or tenants in accordance with the SSP. There are a large number of spots to validate that each EPG is using an organizational defined VLAN. That would be dependent on the VLAN pool associated with the Physical/ VMM Domains that the EPG is using. 1. Edit or create a physical domain in the GUI using the following path: Tenants >> {{your_Tenant}} >> Application Profiles >> {{your_application_profile}} >> Application EPGs >> {{your_EPG}} > Domains 2. Create a VLAN pool on physical domains in the GUI: Fabric >> Access Policies >> Physical and External Domains >> Physical Domains >> {{your_domain}} 3. For VMM Domain vlan pools, create a policy at the following GUI location: Virtual Networking >> VMware >> {{your_VMM_Domain}} >> Policy >> General
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- CACI-RT-000044
- Vuln IDs
-
- V-272104
- Rule IDs
-
- SV-272104r1168421_rule
Checks: C-76154r1168191_chk
Verify a Control Plane Policing (CoPP) policy is applied to the Leaf and or interface policies accordingly: Fabric >> Access Policies >> Policies >> Switch >> CoPP Pre-Filter for Leaf / CoPP Leaf Fabric >> Access Policies >> Policies >> Interface >> CoPP Interface Verify L3Out contracts include the CoPP policy. Inspect the policy at the following location: Tenants >> {{your_Tenant}} >> Networking >> L3Outs >> {{your_l3out}} >> External EPGs >> {{your_External_EPG}} >> Policy >> Contract If the CoPP policy is not configured on all Leaf and/or interfaces, this is a finding.
Fix: F-76061r1168420_fix
Protect against known types of DoS attacks on the route processor by implementing a CoPP policy. To meet this requirement, configure the COPP policy on each device, QOS to ensure the correct traffic is being dropped, and verify all l3 outs have the correct contracts applied to them. These policies must be applied to the Leaf and or interface policies accordingly. CoPP Policy: Fabric >> Access Policies >> Policies >> Switch >> CoPP Pre-Filter for Leaf / CoPP Leaf Fabric >> Access Policies >> Policies >> Interface >> CoPP Interface QOS: Since there are so many locations and settings required for this aspect, reference the QOS documentation to access these settings: https://www.cisco.com/c/en/us/td/docs/switches/datacenter/aci/apic/sw/kb/Cisco-APIC-and-QoS.html Configure L3Out contracts include the CoPP policy. Inspect the policy at the following location: Tenants >> {{your_Tenant}} >> Networking >> L3Outs >> {{your_l3out}} >> External EPGs >> {{your_External_EPG}} >> Policy >> Contract