Select any two versions of this STIG to compare the individual requirements
Select any old version/release of this STIG to view the previous requirements
Review the Cisco IOS XE router configuration. Verify that the external interface blocks inbound traffic with a source IP address belonging to the internal network. The configuration should look similar to the example below where the private IP address space is 1.1.1.0/24: interface FastEthernet 0/0 description NIPRNet link ip address x.x.x.x 255.255.255.0 ip access-group INGRESS_ACL in ... ip access-list extended INGRESS_ACL deny ip 1.1.1.0 0.0.0.255 any log ... If the external interface of the Cisco IOS XE router has not been configured to block all inbound packets with a source IP address belonging to the private network, this is a finding.
Configure the Cisco IOS XE router to block all inbound packets with a source IP address belonging to the private network. The configuration would look similar to the example below: interface FastEthernet 0/0 description NIPRNet link ip address x.x.x.x 255.255.255.0 ip access-group INGRESS_ACL in ... ip access-list extended INGRESS_ACL deny ip 1.1.1.0 0.0.0.255 any log ...
Review the Cisco IOS XE router configuration to determine if IPv4 or IPv6 multicast routing is enabled. Verify all interfaces enabled for PIM are documented in the network's multicast topology diagram. Review the router configuration to determine if multicast routing is enabled and which interfaces are enabled for PIM. Following is an example of multicast globally enabled and PIM enabled on an interface. ip multicast-routing distributed ! … … … interface GigabitEthernet4 ip address 1.1.35.3 255.255.255.0 ip pim sparse-mode If an interface is not required to support multicast routing and it is enabled, this is a finding.
Configure the Cisco IOS XE router so that PIM is disabled on interfaces that are not required to support it. The configuration would look similar to the example below: ISR4000 (config) #Interface GigabitEthernet 0/0/1 ISR4000 (config) #no ip PIM
Step 1: Verify that an ACL is configured that will specify the allowable PIM neighbors similar to the following example: ip access-list standard PIM-NEIGHBORS permit 192.0.2.1 permit 192.0.2.3 Step 2: Verify that a pim neighbor-filter command is configured on all PIM enabled interfaces that is referencing the PIM neighbor ACL similar to the following example: interface GigabitEthernet0/3 ip address 192.0.2.2 255.255.255.0 ip pim sparse-mode pim neighbor-filter PIM-NEIGHBORS If the Cisco IOS XE router has not been configured with PIM neighbor filter on all PIM-enabled interfaces, this is a finding.
Configure the Cisco IOS XE router with PIM neighbor filters on all PIM-enabled interfaces as shown in the example below: ip access-list standard PIM-NEIGHBORS permit 192.0.2.1 permit 192.0.2.3 ... ... ... interface GigabitEthernet0/3 ip address 192.0.2.2 255.255.255.0 ip pim sparse-mode ip pim neighbor-filter PIM-NEIGHBORS
Review the multicast topology diagram to determine if there are any documented Admin-Local (FFx4::/16), Site-Local (FFx5::/16), or Organization-Local (FFx8::/16) multicast boundaries for IPv6 traffic or any Local-Scope (239.255.0.0/16) boundaries for IPv4 traffic. Verify the appropriate boundaries are configured on the applicable multicast-enabled interfaces. The configuration should look similar to the example below: interface GigabitEthernet0/0/0 ip address 192.168.25.75 255.255.255.0 ip access-group v4_Local_Scope out ipv6 address 2001:192:168:25::75/64 ipv6 multicast boundary scope 4 end Extended IP access list v4_Local_Scope 10 deny ip 239.255.0.0 0.0.255.255 any log Note: The IPv6 scopes are defined as: admin-local Admin-local(4) organization-local Organization-local(8) site-local Site-local(5) If the appropriate boundaries are not configured on applicable multicast-enabled interfaces, this is a finding.
Configure the Cisco IOS XE router with the appropriate IPv6 multicast boundary scopes and with the appropriate IPv4 access control lists, as seen in the example below: interface GigabitEthernet0/0/0 ip address 192.168.25.75 255.255.255.0 ip access-group V4_LOCAL_SCOPE out ipv6 address 2001:192:168:25::75/64 ipv6 multicast boundary scope 4 ! ip access list extended V4_LOCAL_SCOPE 10 deny ip 239.255.0.0 0.0.255.255 any log Note: The IPv6 scopes are defined as follows: subnet-local (3) admin-local (4) site-local (5) organization-local (8)
View the configuration of the Cisco IOS XE router. The configuration should look similar to the example below: interface GigabitEthernet0/0/0 no ip address shutdown If an interface is not being used, but is configured or enabled, this is a finding.
Configure the Cisco IOS XE router so that all inactive sub-interfaces are deleted, and disable and delete the configuration of any inactive ports on the router. To shut down an interface see the following commands: ISR4000(config) #Interface GigabitEthernet 0/0/1 ISR4000(config-if) #shutdown To clear the configuration of an inactive interface, use the following command: ISR4000 (config) #default interface GigabitEthernet 0/0/1
Review the configuration of each router interface connecting to an Alternate Gateway on the Cisco IOS XE router. Verify each permit statement of the ingress filter only permits packets with destination addresses of the site's NIPRNet address space or a destination address belonging to the address block assigned by the Alternate Gateway network service provider. If the ingress filter permits packets with addresses other than those specified, such as destination addresses of the site's NIPRNet address space or a destination address belonging to the address block assigned by the Alternate Gateway network service provider, this is a finding.
Configure the Cisco IOS XE router to permit packets with destination addresses of the site's NIPRNet address space or a destination address belonging to the address block assigned by the Alternate Gateway network service provider. The configuration would look similar to the example below: interface GigabitEthernet 0/0/1 description Alternate Gateway link ip address x.x.x.x 255.255.255.0 ip access-group Alternate_Gateway_ACL in ... ip access-list extended Alternate_Gateway_ACL permit ip 1.1.1.0 0.0.0.255 any log ...
Review the configuration of the Cisco IOS XE router connecting to the Alternate Gateway. Verify there are no BGP neighbors configured to the remote AS that belongs to the Alternate Gateway service provider. If there are BGP neighbors connecting the remote AS of the Alternate Gateway service provider, this is a finding.
Configure a static route on the perimeter Cisco IOS XE router to reach the AS of a router connecting to an Alternate Gateway, using the following command: ISR4000 (config) #ip route <Destination Prefix> <Destination Prefix mask> <Forwarding routers address> The configuration would look similar to the example below: ip route 1.1.1.0 255.255.255.0 2.2.2.2
Review the configuration of the route connecting to the Alternate Gateway on the Cisco IOS XE router to verify that redistribution of static routes to the Alternate Gateway is not occurring by reviewing the BGP and OSPF configurations. If the "redistribute static" command is in the configurations, this is a finding.
Configure the Cisco IOS XE router so that static routes are not redistributed to an Alternate Gateway into either an Exterior Gateway Protocol or Interior Gateway Protocol to the NIPRNet or to other Autonomous System. Use the "NO" command to disable redistribution of static routers; example below: ISR4000(config-router)#no redistribute static
Verify that the OOBM interface is an adjacency only in the IGP routing domain for the management network. The following would be an example where EIGRP is run on the management network 10.0.0.0 and OSPF in the managed network 172.20.0.0. The network 10.1.20.0/24 is the OOBM backbone and 10.1.1.0 is the local management LAN connecting to the OOBM interfaces of the managed network (i.e., the private and service network) elements. interface Serial0/0 description to_OOBM_Backbone ip address 10.1.20.3 255.255.255.0 ! interface FastEthernet 0/0 description Enclave_Management_LAN ip address 10.1.1.1 255.255.255.0 ! interface FastEthernet 0/1 description to_our_PrivateNet ip address 172.20.4.2 255.255.255.0 ! interface FastEthernet 0/2 description to_our_ServiceNet ip address 172.20.5.2 255.255.255.0 ! router ospf 1 network 172.20.0.0 ! router eigrp 12 network 10.0.0.0 If the OOBM interface is not an adjacency only in the IGP routing domain for the management network, this is a finding.
Ensure that multiple IGP instances configured on the OOBM gateway router peer only with their appropriate routing domain. Verify that the all interfaces are configured for the appropriate IGP instance.
Verify the Interior Gateway Protocol instance used for the managed network on the Cisco IOS XE router does not redistribute routes into the Interior Gateway Protocol instance used for the management network, and vice versa. The configuration will look similar to the example below: router ospf 1 area 1 authentication message-digest redistribute ospf 1 vrf Mgmt passive-interface default no passive-interface GigabitEthernet0/0 no passive-interface GigabitEthernet0/1 network 200.30.3.0 0.0.0.255 area 1 If the Interior Gateway Protocol instance used for the managed network redistributes routes into the Interior Gateway Protocol instance used for the management network, or vice versa, this is a finding.
On the Cisco IOS XE router configure the Interior Gateway Protocol instance used for the managed network to prohibit redistribution of routes into the Interior Gateway Protocol instance used for the management network, and vice versa. Use the “NO” form of the redistribute command to disable redistribution of the management network. For example: ISR4000(config-router)#no redistribute ospf 1 vrf Mgmt
Review the configuration of the Cisco IOS XE router to verify the management interface is configured as passive for the Interior Gateway Protocol instance for the managed network. The configuration would look similar to the following example: router ospf 1 area 1 authentication message-digest passive-interface GigabitEthernet0/0 network 200.30.3.0 0.0.0.255 area 1 If the management interface is not configured as passive for the Interior Gateway Protocol instance for the managed network, this is a finding.
Configure the management interface of the Cisco IOS XE router as passive for the Interior Gateway Protocol instance configured for the managed network. The configuration will look similar to the example below: outer ospf 1 area 1 authentication message-digest passive-interface GigabitEthernet0/0 network 200.30.3.0 0.0.0.255 area 1
Review the Cisco IOS XE router configuration and verify that neighbor router authentication is configured for all control plane protocols. The configuration should look similar to the examples below: OSPF Example: router ospf 1 area 1 authentication message-digest interface GigabitEthernet0/0 ip ospf message-digest-key 1 md5 <authentication key> BGP Example: router bgp 65001 bgp log-neighbor-changes neighbor 2200:31:3::1 remote-as 65000 neighbor 2200:31:3::1 password <password> neighbor 200.31.3.1 remote-as 65000 neighbor 200.31.3.1 password <password> If authentication is not enabled, this is a finding.
Configure neighbor router authentication for all control plane protocols. The configuration will look similar to the example below: OSPF Example: router ospf 1 area 1 authentication message-digest interface GigabitEthernet0/0 ip ospf message-digest-key 1 md5 <authentication key> BGP Example: router bgp 65001 bgp log-neighbor-changes neighbor 2200:31:3::1 remote-as 65000 neighbor 2200:31:3::1 password <password> neighbor 200.31.3.1 remote-as 65000 neighbor 200.31.3.1 password <password>
Review the Cisco IOS XE router configuration to verify that all IGPs deployed on the router utilizing a key chain do not have a key with a duration exceeding “180” days. The configuration should look similar to the example below: interface Ethernet 0 ip authentication mode eigrp 1 md5 ip authentication key-chain eigrp 1 KEY_CHAIN ... router eigrp 1 network x.x.x.x ... key chain KEY_CHAIN key 1 key-string willow accept-lifetime 22:45:00 Feb 10 2016 22:45:00 Aug 10 2016 send-lifetime 23:00:00 Feb 10 2016 22:45:00 Aug 10 2016 key 2 key-string birch accept-lifetime 22:45:00 Aug 9 2016 22:45:00 Feb 10 2006 send-lifetime 23:00:00 Aug 9 2016 22:45:00 Feb 10 2006 key 3 key-string maple accept-lifetime 22:45:00 Feb 10 2006 22:45:00 Aug 10 2006 send-lifetime 23:00:00 Feb 10 2006 22:45:00 Aug 10 2006 If the Cisco IOS XE router is configured with a key chain with a duration exceeding “180” days, this is a finding.
Configure all key chain used for IGP authentication to have keys that will not have a duration exceeding “180” days as shown in the example below: key chain KEY_CHAIN key 1 key-string willow accept-lifetime 22:45:00 Feb 10 2016 22:45:00 Aug 10 2016 send-lifetime 23:00:00 Feb 10 2016 22:45:00 Aug 10 2016 key 2 key-string birch accept-lifetime 22:45:00 Aug 9 2016 22:45:00 Feb 10 2006 send-lifetime 23:00:00 Aug 9 2016 22:45:00 Feb 10 2006 key 3 key-string maple accept-lifetime 22:45:00 Feb 10 2006 22:45:00 Aug 10 2006 send-lifetime 23:00:00 Feb 10 2006 22:45:00 Aug 10 2006
Review the Cisco IOS XE router configuration to validate uRPF or an ACL on an inbound direction has been configured on all internal interfaces as shown in the example below: uRPF Example: interface FastEthernet 0/0 description downstream link to enclave LAN ip address x.x.x.x 255.255.255.0 ip verify unicast source reachable-via rx 102 access-list 102 deny ip any any log ACL Example: interface FastEthernet 0/0 description downstream link to our network ip address 199.36.90.1 255.255.255.0 ip access-group 102 in ... access-list 102 permit tcp any any established access-list 102 permit tcp [internal network] [wildcard mask] any eq ftp-data access-list 102 permit tcp [internal network] [wildcard mask] any eq ftp access-list 102 permit tcp [internal network] [wildcard mask] any eq http access-list 102 permit . . . access-list 102 deny any If the Cisco IOS XE router has not been configured with uRPF strict mode or an ACL inbound on all internal interfaces, this is a finding.
Configure the Cisco IOS XE router with uRPF strict mode or an ACL inbound on all internal interfaces as shown in the examples below: uRPF Example: interface FastEthernet 0/0 description downstream link to enclave LAN ip address x.x.x.x 255.255.255.0 ip verify unicast source reachable-via rx 102 access-list 102 deny ip any any log ACL Example: interface FastEthernet 0/0 description downstream link to our network ip address 199.36.90.1 255.255.255.0 ip access-group 102 in ... access-list 102 permit tcp any any established access-list 102 permit tcp [internal network] [wildcard mask] any eq ftp-data access-list 102 permit tcp [internal network] [wildcard mask] any eq ftp access-list 102 permit tcp [internal network] [wildcard mask] any eq http access-list 102 permit . . . access-list 102 deny any
Verify that the Cisco IOS XE router does not have any unnecessary or non-secure ports, protocols and services enabled. For example, the following commands should not be in the configuration: ip bootp server ip identd ip finger ip http-server ip rcmd rcp-enable ip rcmd rsh-enable service config service finger service tcp-small-servers service udp-small-servers service pad If any unnecessary or non-secure ports, protocols or services are enabled, this is a finding.
Disable all unnecessary or non-secure ports, protocols and services. If any of the following commands are in the configuration, remove them. service udp-small-servers service tcp-small-servers service finger service pad ip dns server ip identd ip finger ip http-server ip rcmd rcp-enable ip rcmd rsh-enable ip bootp server service config
Review the configuration of the Cisco IOS XE router. Verify that an encrypted HMAC authentication is being used for all routing protocols as shown in the following configuration examples: key chain OSPF_KEY key 1 key-string OSPFKEY cryptographic-algorithm hmac-sha-1 ! interface GigabitEthernet3 ip address 1.1.35.3 255.255.255.0 ip ospf authentication key-chain OSPF_KEY ------------------------------------------- key chain EIGRP_KEY key 1 key-string EIGRPKEY ! interface GigabitEthernet3 ip address 1.1.35.3 255.255.255.0 ip authentication mode eigrp 22 md5 ip authentication key-chain eigrp 22 EIGRP_KEY ---------------------------------------- key chain ISIS_KEY key 1 key-string ISISKEY ! interface GigabitEthernet3 ip address 1.1.35.3 255.255.255.0 ip router isis isis authentication mode md5 isis authentication key-chain ISIS_KEY --------------------------------------------- router bgp 44 neighbor 1.1.1.1 remote-as 44 neighbor 1.1.1.1 password xxxxx --------------------------------------------- If not all routing protocols are configured to authenticate all routing protocol messages using an encrypted HMAC, this is a finding.
Configure the Cisco IOS XE router to use an encrypted HMAC authentication for all routing protocols.
Review the Cisco IOS XE router configuration and verify that the neighbor command "ttl-security" is configured for all eBGP peering sessions. The configuration would look similar to the following: router bgp 100 neighbor 10.1.1.1 remote-as 222 neighbor 10.1.1.1 ttl-security hops 1 If the "ttl-security" command is not configured for all eBGP peering sessions, this is a finding.
Configure all eBGP neighbors with GTSM. The configuration would look similar to the following: router bgp 100 neighbor 10.1.1.1 remote-as 222 neighbor 10.1.1.1 ttl-security hops 1
Review the Cisco IOS XE router configuration. Interview the system administrator to verify that Quality of Service (QoS) has been implemented to ensure capacity is available for mission-critical, voice, and control plane traffic during periods of congestion. The following steps should be used to verify the configuration. Step 1: Verify that the class-maps are configured to match on DSCP values that have been set at the edges as shown in the configuration example below: class-map match-all CONTROL_PLANE match ip dscp 48 class-map match-all C2_VOICE match ip dscp 47 class-map match-all VOICE match ip dscp ef class-map match-all VIDEO match ip dscp af4 class-map match-all CRITICAL_DATA match ip dscp af3 Step 2: Verify that the policy map applied to the core-layer-facing interface reserves the bandwidth for each traffic type as shown in the following example: policy-map QOS_POLICY class CONTROL_PLANE priority percent 10 class C2_VOICE priority percent 10 class VOICE priority percent 15 class VIDEO bandwidth percent 25 class CRITICAL_DATA bandwidth percent 25 class class-default bandwidth percent 15 Step 3: Verify that an output service policy is bound to the core-layer-facing interface as shown in the configuration example below: interface GigabitEthernet1/1 ip address x.x.x.x 255.255.255.0 service-policy output QOS_POLICY If QoS policy has not been implemented to ensure there is capacity available for critical, voice, and control plane traffic during periods of congestion, this is a finding.
Configure a QOS policy on the Cisco IOS XE router to ensure capacity is available for mission-critical, voice, and control plane traffic during periods of congestion. The configuration should look similar to the following: class-map match-all CONTROL_PLANE match ip dscp 48 class-map match-all C2_VOICE match ip dscp 47 class-map match-all VOICE match ip dscp ef class-map match-all VIDEO match ip dscp af4 class-map match-all CRITICAL_DATA match ip dscp af3 … … … policy-map QOS_POLICY class CONTROL_PLANE priority percent 10 class C2_VOICE priority percent 10 class VOICE priority percent 15 class VIDEO bandwidth percent 25 class CRITICAL_DATA bandwidth percent 25 class class-default bandwidth percent 15 … … … interface GigabitEthernet1/1 ip address x.x.x.x 255.255.255.0 service-policy output QOS_POLICY
Review the configuration of the Cisco IOS XE router to determine if source routing is enabled. If "ip source-routing" is in the configuration then it is enabled, this is a finding.
Configure the Cisco IOS XE router to disable IP source routing, using the command below: ISR4000(config)#no ip source-route
Review the router configuration and compare it against the network documentation (topology diagrams and peering agreements). Verify that each BGP peering session is configured with the correct IP address and remote Autonomous System Number (ASN). If any BGP peering session is not configured with the correct IP address and remote Autonomous System Number (ASN), this is a finding.
Configure each BGP peering session to the specific IP address of the peer router and remote Autonomous System Number (ASN) assigned to the organization controlling that peer.
Review the Cisco IOS XE router configuration to determine if the maximum hop limit for IPv6 Neighbor Discovery has been configured. The configuration would look similar to the example below: ipv6 hop-limit 32 If the router does not have the maximum hop limit value set to at least "32", this is a finding. If it has been configured, then it must be set to at least "32". If it has not been configured, it must be determined what the default value is. If the default value is below "32" and the maximum hop limit value has not been configured (set to at least "32"), this is a finding. In any case, maximum hop limit must be at least "32".
Configure the Cisco IOS XE router IPv6 Neighbor Discovery maximum hop limit value to at least "32". The configuration would look similar to the example below: ipv6 hop-limit 32
Step 1: Verify traffic types have been classified based on importance levels. The following is an example configuration: class-map match-all CoPP_CRITICAL match access-group name CoPP_CRITICAL class-map match-any CoPP_IMPORTANT match access-group name CoPP_IMPORTANT match protocol arp class-map match-all CoPP_NORMAL match access-group name CoPP_NORMAL class-map match-any CoPP_UNDESIRABLE match access-group name CoPP_UNDESIRABLE class-map match-all CoPP_DEFAULT match access-group name CoPP_DEFAULT Step 2: Review the ACLs referenced by the match access-group commands to determine if the traffic is being classified appropriately. The following is an example configuration: ip access-list extended CoPP_CRITICAL remark our control plane adjacencies are critical permit ospf host [OSPF neighbor A] any permit ospf host [OSPF neighbor B] any permit pim host [PIM neighbor A] any permit pim host [PIM neighbor B] any permit pim host [RP addr] any permit igmp any 224.0.0.0 15.255.255.255 permit tcp host [BGP neighbor] eq bgp host [local BGP addr] permit tcp host [BGP neighbor] host [local BGP addr] eq bgp deny ip any any ! ip access-list extended CoPP_IMPORTANT permit tcp host [TACACS server] eq tacacs any permit tcp [management subnet] 0.0.0.255 any eq 22 permit udp host [SNMP manager] any eq snmp permit udp host [NTP server] eq ntp any deny ip any any ! ip access-list extended CoPP_NORMAL remark we will want to rate limit ICMP traffic permit icmp any any echo permit icmp any any echo-reply permit icmp any any time-exceeded permit icmp any any unreachable deny ip any any ! ip access-list extended CoPP_UNDESIRABLE remark other management plane traffic that should not be received permit udp any any eq ntp permit udp any any eq snmptrap permit tcp any any eq 22 permit tcp any any eq 23 remark other control plane traffic not configured on router permit eigrp any any permit udp any any eq rip deny ip any any ! ip access-list extended CoPP_DEFAULT permit ip any any Note: Explicitly defining undesirable traffic with ACL entries enables the network operator to collect statistics. Excessive ARP packets can potentially monopolize Route Processor resources, starving other important processes. Currently, ARP is the only Layer 2 protocol that can be specifically classified using the match protocol command. Step 3: Review the policy-map to determine if the traffic is being policed appropriately for each classification. The following is an example configuration: policy-map CONTROL_PLANE_POLICY class CoPP_CRITICAL police 512000 8000 conform-action transmit exceed-action transmit class CoPP_IMPORTANT police 256000 4000 conform-action transmit exceed-action drop class CoPP_NORMAL police 128000 2000 conform-action transmit exceed-action drop class CoPP_UNDESIRABLE police 8000 1000 conform-action drop exceed-action drop Step 4: Verify that the CoPP policy is enabled. The following is an example configuration: control-plane service-policy input CONTROL_PLANE_POLICY If the Cisco IOS XE router does not have control plane protection implemented, this is a finding.
Implement control plane protection by classifying traffic types based on importance and configure filters to restrict and rate limit the traffic directed to and processed by the route processor according to each class. The configuration would look similar to the one below: class-map match-any CoPP_UNDESIRABLE match access-group name CoPP_UNDESIRABLE class-map match-any CoPP_IMPORTANT match access-group name CoPP_IMPORTANT match protocol arp class-map match-all CoPP_DEFAULT match access-group name CoPP_DEFAULT policy-map CONTROL_PLANE_POLICY class CoPP_CRITICAL police 512000 8000 conform-action transmit exceed-action transmit class CoPP_IMPORTANT police 256000 4000 conform-action transmit exceed-action drop class CoPP_NORMAL police 128000 2000 conform-action transmit exceed-action drop class CoPP_UNDESIRABLE police 8000 1000 conform-action drop exceed-action drop class CoPP_DEFAULT police 64000 1000 conform-action transmit exceed-action drop
Review the Cisco IOS XE router configuration to determine if the router only allows incoming communications from authorized sources to be routed to authorized destinations. The configuration should look similar to the following example: interface GigabitEthernet 0/0/1 description NIPRNet link ip address x.x.x.x 255.255.255.0 ip access-group Authorized_Sources_ACL in ... ip access-list extended Authorized_Sources_ACL deny ip 1.1.1.0 0.0.0.255 any log ... If the Cisco IOS XE router does not restrict incoming communications to allow only authorized sources and destinations, this is a finding.
Configure the Cisco IOS XE router to only allow incoming communications from authorized sources to be routed to authorized destinations. The configuration would look similar to the example below: interface GigabitEthernet 0/0/1 description NIPRNet link ip address x.x.x.x 255.255.255.0 ip access-group Authorized_Sources_ACL in ... ip access-list extended Authorized_Sources_ACL deny ip 1.1.1.0 0.0.0.255 any log ...