Network Infrastructure Policy Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001098
- Version
- NET0090
- Vuln IDs
-
- V-8046
- Rule IDs
-
- SV-8532r3_rule
Checks: C-7427r6_chk
Validate the network diagram by correlating the information with all routers, multi-layer switches, and firewall configurations. Validate all subnets have been documented accordingly. Validate any connectivity documented on the diagram by physically examining the cable connections for the downstream and upstream links, as well as connections for major network components (Routers, Switches, Firewalls, IDS/IPS, etc.). If the site has not maintained network topology diagrams for the enclave, this is a finding.
Fix: F-7621r4_fix
Update the enclave's network topology diagram to represent the current state of the network and its connectivity.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001121
- Version
- NET0130
- Vuln IDs
-
- V-8047
- Rule IDs
-
- SV-8533r3_rule
Checks: C-7428r3_chk
Review the network topology and interview the ISSO to verify that each external connection to the site’s network has been validated and approved by the AO and CAO and that CAP requirements have been met. If there are any external connections that have not been validated and approved, this is a finding.
Fix: F-7622r3_fix
All external connections will be validated and approved prior to connection. Interview the ISSM to verify that all connections have a mission requirement and that the AO is aware of the requirement.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001121
- Version
- NET0135
- Vuln IDs
-
- V-8048
- Rule IDs
-
- SV-8534r4_rule
Checks: C-7429r5_chk
Review the network topology and interview the ISSO to verify that external connections to the network are reviewed and documented on a semi-annual basis. If there are any external connections that have not been documented, or if the connections are not reviewed on a semi-annual basis, this is a finding.
Fix: F-7623r3_fix
Implement a semi-annual review process to document and account for external connections to the organization.
- RMF Control
- SC-7
- Severity
- L
- CCI
- CCI-001121
- Version
- NET0140
- Vuln IDs
-
- V-8049
- Rule IDs
-
- SV-8535r3_rule
Checks: C-7430r3_chk
Review the network topology to determine external connections and inspect location where CSU/DSUs and data service jacks reside. If these components are not in a secured environment, this is a finding.
Fix: F-7624r3_fix
Move all critical communications to controlled access areas. Controlled access areas in this case means controlled restriction to authorize site personnel, i.e., dedicated communications rooms or locked cabinets. This is an area afforded entry control at a security level commensurate with the operational requirement. This protection will be sufficient to protect the network from unauthorized personnel. The keys to the locked cabinets and dedicated communications rooms will be controlled and only provided to authorized network/network security individuals.
- RMF Control
- SC-7
- Severity
- H
- CCI
- CCI-001101
- Version
- NET0160
- Vuln IDs
-
- V-8051
- Rule IDs
-
- SV-8537r3_rule
Checks: C-7432r7_chk
Any connection to an internet service provider (ISP) must be approved by the Office of the DoD CIO before a connection is made to the ISP. Based on the use cases below, verify written approval has been obtained from the Office of the DoD CIO or verify a renewal request has been appropriately submitted. There are three basic use cases for an ISP connection. Use case (1): An ISP connection that originates from an approved DISN infrastructure source (includes IAP connections at the DECCs). A DoDIN Waiver is required for a CC/S/A to connect the unclassified DISN to an ISP. These connection requests must come to the Waiver Panel with a Component CIO endorsement of the requirement. These connections should not be provisioned and put into use until waived. Expired waivers pending renewal from the OSD DoDIN Waiver Panel may be downgraded to a Severity 3 category, if proof of a requested renewal can be verified. A DISN enclave that cannot prove DoDIN Waiver approval for the ISP connection is a Severity 1 category. Note: If discovered during a CCRI assessment, the review team lead will immediately report the unapproved ISP connection to the USCYBERCOM and the Connection Approval Office. USCYBERCOM will direct the connection be immediately disconnected. Use Case (2): An ISP connection to a Stand Alone Enclave (physically and logically separated from any DISN connection) requires DoDIN Waiver approval prior to connection. The Stand Alone Enclave must have an AO issued ATO and the connection must be logically and physically separated from the DISN. An unapproved ISP connection in this use case will be assigned a Severity 3 category. Use Case (3): An ISP connection to a non-DoD network (such as a contractor-owned infrastructure) co-located on the same premises as the DoD network. The non-DoD network is physically and logically separated from any DoD IP network. Furthermore, it is not connected to any DoD IP network. The non-DoD network infrastructure is not DoD funded nor is it operated or administered by DoD military or civilian personnel. In addition, the non-DoD network with the ISP connection is not storing, processing, or transmitting any DoD data. For such a network as defined herein, a DoDIN Waiver approval is not required for deploying a connection to an ISP. However, the AO must perform and have on file a risk assessment endorsed by the facility or installation command. If any of the above use cases that are applicable and written approval has been not been obtained from the Office of the DoD CIO or if a renewal request has not been submitted, this is a finding.
Fix: F-7626r4_fix
Written mission justification approval must be obtained from the Office of the DoD CIO prior to establishing a direct connection to the Internet via commercial service provider outside DoD CIO approved Internet access points (e.g. DISA IAP, Cloud Access Point, NIPRnet Federated Gateway, DREN IAP, etc.).
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001102
- Version
- NET0170
- Vuln IDs
-
- V-8052
- Rule IDs
-
- SV-8538r4_rule
Checks: C-7433r5_chk
Review the network topology diagram and verify that ingress and egress traffic via external connections to the enclave do not bypass the enclave’s perimeter security. If there are external connections to the enclave that bypass the enclaves’ perimeter security, this is a finding.
Fix: F-7627r5_fix
Disconnect any external network connections not routed through the organization's perimeter security or validated and approved by the AO.
- RMF Control
- PE-3
- Severity
- M
- CCI
- CCI-000921
- Version
- NET0210
- Vuln IDs
-
- V-8054
- Rule IDs
-
- SV-8540r3_rule
Checks: C-7435r5_chk
Inspect the site to validate physical network components are in a secure environment with limited access. If there are any network components not located in a secure environment, this is a finding.
Fix: F-7629r4_fix
Move all critical communications into controlled access areas. Controlled access area in this case means controlled restriction to authorize site personnel, i.e., dedicated communications rooms or locked cabinets. This is an area afforded entry control at a security level commensurate with the operational requirement. This protection will be sufficient to protect the network from unauthorized personnel. The keys to the locked cabinets and dedicated communications rooms will be controlled and only provided to authorized network/network security individuals.
- RMF Control
- AU-9
- Severity
- L
- CCI
- CCI-001575
- Version
- NET1025
- Vuln IDs
-
- V-8060
- Rule IDs
-
- SV-8546r2_rule
Checks: C-7441r2_chk
Review the network topology and verify that a syslog server is located within the management network. Note the IP address as documented on the management network topology and verify that this is what is configured on the network elements as the host device for sending syslog data. If a centralized syslog server has not been deployed in the management network, this is a finding.
Fix: F-7635r2_fix
Stand up a syslog server and connect it to the management network. Configure all managed network elements to send syslog data to the syslog server.
- RMF Control
- CM-8
- Severity
- L
- CCI
- CCI-001785
- Version
- NET1040
- Vuln IDs
-
- V-8061
- Rule IDs
-
- SV-8547r2_rule
Checks: C-7442r2_chk
At a minimum, a copy of the current and previous network element configurations must be saved. Storage can take place on a classified network, OOB network, or offline. If the current and previous network element configurations are not stored in a secured location, this is a finding.
Fix: F-7636r2_fix
The network administrator will store the current and previous router and switch configurations in a secure location. Storage can take place on a classified network, OOB network, or offline. Configurations can only be accessed by server or network admin.
- RMF Control
- CA-3
- Severity
- M
- CCI
- CCI-000262
- Version
- NET0351
- Vuln IDs
-
- V-8066
- Rule IDs
-
- SV-8552r3_rule
Checks: C-7447r3_chk
Review the network topology diagrams and visually inspect the firewall location to validate correct position on the network. If the firewall is not positioned between the perimeter router and the private network and between the perimeter router and the DMZ, this is a finding. Exception: If the perimeter security for the enclave or B/C/P/S is provisioned via the JRSS, then this requirement is not applicable.
Fix: F-7641r2_fix
Move the firewall into the prescribed location to allow for enforcement of the Enclave Security Policy and allow for all traffic to be screened.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- NET-IDPS-033
- Vuln IDs
-
- V-8078
- Rule IDs
-
- SV-8564r3_rule
Checks: C-7459r4_chk
Interview the SA to determine the IDPS backup procedures as well as have SA display the backup files saved on the file server. If the IDPS data is not backed up on a weekly basis, this is a finding.
Fix: F-7653r2_fix
The organization must establish weekly backup procedures for the network IDS/IPS data.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- NET-IDPS-035
- Vuln IDs
-
- V-8080
- Rule IDs
-
- SV-8566r2_rule
Checks: C-7461r2_chk
Interview the ISSO and the IDPS administrator. Have the IDPS administrator display update notifications that have been received, the build number or patch level, then search the vendor’s vulnerability database for current release and patch level. If software and signatures are not updated when updates are provided by the vendor, this is a finding.
Fix: F-7655r3_fix
Have the IDPS administrator subscribe to the X-press notification or similar service offered by the vendor. Ensure the IDPS software is updated when software is available either by DISA or the vendor for security related distributions.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- NET-VLAN-001
- Vuln IDs
-
- V-8081
- Rule IDs
-
- SV-8567r3_rule
Checks: C-7462r5_chk
Inspect switches and associated cross-connect hardware are kept in a secured IDF. If the hardware is located in an open area, verify all hardware is located in a secured and locked cabinet. If switches and associated cross-connect hardware are not kept in secured IDFs or locked cabinet, this is a finding.
Fix: F-7656r4_fix
Place switches and associated cross-connect hardware in a secured IDF. If the hardware is located in an open area, ensure the hardware is located in a secured and locked cabinet.
- RMF Control
- AU-10
- Severity
- L
- CCI
- CCI-001902
- Version
- NET0198
- Vuln IDs
-
- V-8099
- Rule IDs
-
- SV-8585r3_rule
Checks: C-7480r3_chk
Verify the DHCP audit and event logs include hostnames and MAC addresses of all clients. Also, validate logs are kept online for thirty days and offline for one year. If the logs do not include hostnames and MAC addresses or if the logs are not kept online for thirty days and offline for one year, this is a finding.
Fix: F-7674r3_fix
Configure the DHCP audit and event logs to log hostname and MAC addresses. Store the logs for a minimum of thirty days online and then offline for one year.
- RMF Control
- AU-10
- Severity
- L
- CCI
- CCI-001902
- Version
- NET0199
- Vuln IDs
-
- V-8100
- Rule IDs
-
- SV-8586r3_rule
Checks: C-7481r3_chk
Review the configuration of SIPRNet DHCP servers to verify that the lease duration is set to a minimum of thirty days. If the lease duration is less than thirty days, this is a finding.
Fix: F-7675r2_fix
Configure any DHCP server used on the SIPRNet with a minimum lease duration of thirty days.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- NET-IDPS-021
- Vuln IDs
-
- V-8272
- Rule IDs
-
- SV-8758r3_rule
Checks: C-3692r5_chk
Review the network topology to ensure the enclave has the IDPS positioned to monitor all traffic to and from the enclave. Review any type of report that was recently produced from information provided by the sensor showing any recent alerts, an escalation activity and any type of log or configuration changes. This will show the sensor is being actively monitored and alerts are being acted upon. If the enclave’s CNDSP requires continuous monitoring of the IDPS, the CNDSPs management team (e.g. sensor grid management team at DISA) will verify the operational status by providing information about the enclave’s IDPS such as a network diagram, MOA, current alert information, or other information to validate its operational status. If there is no IDPS positioned and enabled to monitor all ingress and egress traffic, this is a finding. Exception: If the perimeter security for the enclave or B/C/P/S is provisioned via the JRSS, then this requirement is not applicable.
Fix: F-7899r5_fix
Install an IDPS inline or passively, behind the enclave firewall to monitor all unencrypted traffic, inbound and outbound.
- RMF Control
- CA-3
- Severity
- H
- CCI
- CCI-002080
- Version
- NET0369
- Vuln IDs
-
- V-11796
- Rule IDs
-
- SV-12294r4_rule
Checks: C-7782r8_chk
Determine if a deny-by-default security posture has been implemented for both inbound and outbound traffic on the perimeter router or firewall. If a deny-by-default security posture has not been implemented at the network perimeter, this is a finding.
Fix: F-11043r6_fix
Implement a deny-by-default security posture on either the enclave perimeter router or firewall.
- RMF Control
- AC-19
- Severity
- H
- CCI
- CCI-002327
- Version
- WIR0035
- Vuln IDs
-
- V-12072
- Rule IDs
-
- SV-12625r6_rule
Checks: C-8089r7_chk
Work with the traditional reviewer or interview the ISSO or SM. Determine if the site SCIF CSA has approved wireless CMDs in the site SCIFs. Determine if the SCIF CSA has approved wireless devices in site SCIFs. Ask for approval documentation. If wireless devices are allowed in site SCIFs without required approval, this is a finding.
Fix: F-11360r3_fix
Train users to comply with this requirement as well as site procedures document and include the requirement in the site User Agreement.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- NET1815
- Vuln IDs
-
- V-12101
- Rule IDs
-
- SV-12654r2_rule
Checks: C-8118r2_chk
Interview the ISSM and review the SSAA. GRE tunnels found on a premise or edge SIPRNet router that have an endpoint within the REL IP address space must be documented in the SSAA. If the REL LAN has not been documented in the SSAA, this is a finding.
Fix: F-11390r2_fix
The ISSM will document GRE tunnels defined on a premise or edge SIPRNet router that have an endpoint within the REL IP address space.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- NET1816
- Vuln IDs
-
- V-12102
- Rule IDs
-
- SV-12655r2_rule
Checks: C-8119r2_chk
Have the ISSM disclose documentation that a REL LAN review has been performed annually. If annual reviews are not being performed, this is a finding.
Fix: F-11391r2_fix
The ISSM will document REL LAN reviews being performed annually.
- RMF Control
- AC-19
- Severity
- M
- CCI
- CCI-002327
- Version
- WIR0040
- Vuln IDs
-
- V-12106
- Rule IDs
-
- SV-12659r5_rule
Checks: C-8122r5_chk
Detailed Policy Requirements: DoD Components may operate unclassified WLAN systems and WLAN-enabled PEDs in secure spaces when classified systems are turned off and RF transmitter separation is implemented in accordance with CNSS Advisory Memorandum TEMPEST/1-13, the Mobile Policy SRG, and the Network Policy and Mobility Policy STIGs. The ISSO will ensure unclassified wireless devices are not operated in areas where classified information is electronically stored, processed, or transmitted unless: - Approved by the AO. - The unclassified wireless equipment is separated from the classified data equipment at the minimum distance described in CNSS Advisory Memorandum TEMPEST/1-13. - Classified processing equipment is turned off. Review written policies, training material, or user agreements to see if wireless usage in these areas is addressed. Verify proper procedures for wireless device use in classified areas is addressed in training program. Review documentation. Work with the traditional security reviewer to verify the following: If classified information is not processed at this site, this is not a finding. If any of the following are found, this is a finding: - Unclassified wireless equipment is being operated in a Secure Space while classified equipment is turned on. - AO has not approved the use of unclassified wireless equipment in the Secure Space. - Users are not trained or made aware (using signage or user agreement) of procedures for wireless device usage in and around classified processing areas.
Fix: F-3423r3_fix
Central Computer and Telecommunication Agency (CTTA) must designate a separation distance in writing. AO must coordinate with the CTTA. Train users or get a signed user agreement on procedures for wireless device usage in and around classified processing areas.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001101
- Version
- NET0168
- Vuln IDs
-
- V-14634
- Rule IDs
-
- SV-15259r3_rule
Checks: C-12650r3_chk
Inspect the network topology and physical connectivity to verify compliance. If the site has a non-DoD external connection and does not have an IDPS located between the site’s Approved Gateway and the perimeter router, this is a finding.
Fix: F-14096r3_fix
Install and configure an IDPS between the site’s Approved Gateway and the premise router.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002395
- Version
- NET0346
- Vuln IDs
-
- V-14638
- Rule IDs
-
- SV-15263r4_rule
Checks: C-13708r10_chk
Review the network topology diagram and interview the ISSO to verify that all NIPRNet-only applications are located in a local enclave DMZ. If there are any NIPRNet-only applications not hosted in the enclave’s DMZ, this is a finding.
Fix: F-14743r6_fix
Implement and move NIPRNet-only applications to a local enclave DMZ.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- NET0348
- Vuln IDs
-
- V-14640
- Rule IDs
-
- SV-15265r4_rule
Checks: C-13707r5_chk
Review the network topology diagram and interview the ISSO to verify that all Internet-facing applications are hosted in a DoD DMZ Extension. If there are any Internet-facing applications hosted in the enclave’s DMZ or private network, this is a finding.
Fix: F-14742r4_fix
Implement and move internet facing applications logically to a DoD DMZ Extension.
- RMF Control
- SC-7
- Severity
- H
- CCI
- CCI-001116
- Version
- NET0365
- Vuln IDs
-
- V-14642
- Rule IDs
-
- SV-15268r6_rule
Checks: C-12658r8_chk
Determine which type of solution is used for deep packet inspection at the enclave boundary. Acceptable solutions for meeting this requirement are a deep packet inspection firewall, or a stateful packet inspection firewall in conjunction with any combination of application firewalls or application layer gateways. If the organization does not have any implementation of deep packet inspection protecting their network perimeter boundaries, this is a finding. Exception: If the perimeter security for the enclave or B/C/P/S is provisioned via the JRSS, then this requirement is not applicable.
Fix: F-14102r9_fix
Implement a deep packet inspection solution at the enclave boundaries. Verify any IA appliances used for deep packet inspection are connected, properly configured, and actively inspecting all ingress and egress network traffic.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- NET1622
- Vuln IDs
-
- V-14716
- Rule IDs
-
- SV-15442r2_rule
Checks: C-12907r2_chk
Review the network topology and verify that an OOB network provides connectivity from the management network to all of the managed network elements. If an OOB network has not been deployed, verify that the network administrators have management access via the console to the managed network elements. If there is no OOB network or if network administrators do not have management access via the console to the managed network elements, this is a finding.
Fix: F-14183r2_fix
The network administrator will manage devices via direct connection or access via OOB management network.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000765
- Version
- NET0445
- Vuln IDs
-
- V-14723
- Rule IDs
-
- SV-15473r2_rule
Checks: C-12939r2_chk
Review all network element configurations to ensure that an authentication server is being used. Then verify that a two-factor authentication method has been implemented. The RADIUS or TACACS server referenced in the configurations will call a two-factor authentication server. If two-factor authentication is not being used to access all network elements, this is a finding.
Fix: F-14190r2_fix
The network administrator must ensure strong two-factor authentication is being incorporated in the access scheme.
- RMF Control
- AC-4
- Severity
- H
- CCI
- CCI-000028
- Version
- NET-TUNL-026
- Vuln IDs
-
- V-14737
- Rule IDs
-
- SV-15493r5_rule
Checks: C-12959r6_chk
Review network device configurations and topology diagrams to validate encapsulated traffic received from other enclaves terminate at the perimeter for filtering and content inspection. If the tunnel is terminated on a VPN gateway, validate the traffic is inspected by a firewall and IDPS before gaining access to the private network. If the tunnel is being provided by the perimeter router with a direct connection to the tenant's perimeter router, then the perimeter router (of the enclave providing the transient service) must be configured (examples: policy based routing or VRF bound to this interface with only a default route pointing out) to insure all traffic received by this connecting interface is forwarded directly to the NIPR/SIPR interface regardless of destination. If this isn't being done then the connecting interface will have to be treated as an external interface with all the applicable checks. Secured connections such as SSL or TLS which are used for remote access, secure web access, etc. is also applicable to this rule. These types of connections like the other types above must terminate at the enclave perimeter, enclave DMZ, or an enclave service network for filtering and content inspection before passing into the enclave's private network. If the tunnels do not meet any of the criteria above and bypass the enclave's perimeter without filtering and inspection, this is a finding. Note: This vulnerability is not applicable for any VPN connectivity between multiple sites of the same enclave, nor is it applicable for VPN remote access to the enclave. For theses deployments, the implementation must be compliant with all requirements specified within IPsec VPN STIG.
Fix: F-14203r3_fix
Move tunnel decapsulation to a secure end-point at the enclave's perimeter for filtering and inspection.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002396
- Version
- NET-TUNL-028
- Vuln IDs
-
- V-14738
- Rule IDs
-
- SV-15494r2_rule
Checks: C-12960r2_chk
Review the enclave's security authorization package and the ATC or Interim ATC amending the connection approval received. If the tunneling of classified traffic is not documented in the security authorization package and an ATC or Interim ATC, this is a finding.
Fix: F-14204r2_fix
Document the tunneling of classified traffic in the security authorization package and the ATC or Interim ATC.
- RMF Control
- SC-7
- Severity
- H
- CCI
- CCI-002396
- Version
- NET-TUNL-030
- Vuln IDs
-
- V-14740
- Rule IDs
-
- SV-15496r2_rule
Checks: C-12962r3_chk
Review the network topology diagram. If there is a connection between the classified network and the unclassified network for the purpose of tunneling classified traffic across a non-DISN or OCONUS DISN unclassified IP network, verify there is approval by the DSAWG. If there is no document stating DSAWG approval, this is a finding.
Fix: F-14206r3_fix
Remove the connection between the classified and unclassified network. Obtain approval from the DSAWG for the purpose of tunneling classified traffic across a non-DISN or OCONUS DISN unclassified IP network.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- NET1826
- Vuln IDs
-
- V-14741
- Rule IDs
-
- SV-15497r2_rule
Checks: C-12963r3_chk
Review the topology diagram of the classified network. If there are any leased circuits connecting to DoD Vendor, Foreign, or Federal Mission Partner enclave or network without a signed DoD CIO-approved sponsorship memo, this is a finding. If classified connectivity is not to a DSS-approved contractor facility or DoD Component-approved foreign government facility, this is a finding.
Fix: F-14207r2_fix
Terminate all leased circuits connecting to DoD Vendor, Foreign, or Federal Mission Partner enclave or network without a signed DoD CIO-approved sponsorship memo. Terminate all leased circuits for a classified network that is not connecting to a DSS-approved contractor facility or DoD Component-approved foreign government facility.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- NET1827
- Vuln IDs
-
- V-14742
- Rule IDs
-
- SV-15498r2_rule
Checks: C-12964r2_chk
Review SIPRNet accreditation package and an Interim Authority to Connect/Authority to Connect (IATC/ATC) amending the connection approval received. If C2 and non-C2 exceptions are not documented, this is a finding.
Fix: F-14208r1_fix
Document all SIPRNet connections.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002396
- Version
- NET-TUNL-031
- Vuln IDs
-
- V-14743
- Rule IDs
-
- SV-15499r2_rule
Checks: C-12965r2_chk
Review the configuration of the IPsec VPN gateway and verify that the tunnel provisioned for transporting classified traffic across an unclassified IP transport network is using cryptographic algorithms in accordance with CNSS Policy No. 15. If cryptographic algorithms used for tunneling classified traffic across an unclassified network are not in accordance with CNSS Policy No. 15, this is a finding.
Fix: F-14209r2_fix
Configure the tunnel used for transporting classified traffic across an unclassified IP transport network to negotiate with the remote end point to employ cryptographic algorithms in accordance with CNSS Policy No. 15.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- NET1832
- Vuln IDs
-
- V-14745
- Rule IDs
-
- SV-15501r2_rule
Checks: C-12967r2_chk
Review the network topology diagram. If there is a connection between the classified network and the unclassified network for the purpose of tunneling classified traffic across the unclassified IP network, verify that the IPsec VPN gateway used to provision the tunnel is compliant with appropriate physical security protection standards for processing classified information. If appropriate physical security protection has not been enforced, this is a finding.
Fix: F-14211r2_fix
Employ the necessary physical security protection for the VPN gateway devices used for tunneling classified traffic across the unclassified IP network.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- NET0998
- Vuln IDs
-
- V-17772
- Rule IDs
-
- SV-18981r2_rule
Checks: C-19035r2_chk
Review the network topology diagram to determine if a management network has been implemented. Validate the IP address space documented for this network by verifying the IP addresses referenced for management access (SSH, NTP, AAA, SNMP manager, Syslog server, etc.) to the managed network elements. If a management network has not been implemented, this is a finding.
Fix: F-17671r2_fix
Define a large enough address block that will enable the management network to scale in proportion to the managed network.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- NET0810
- Vuln IDs
-
- V-17860
- Rule IDs
-
- SV-19152r2_rule
Checks: C-19370r3_chk
Review the network topology to determine that there are two NTP servers and what network they are connected to. Verify that they are both online according to the documented IP address. Where possible, deploy multiple gateways with diverse paths to the NTP servers. An alternative design is to have one server connected to a reference clock and the other server reference an external stratum-1 server. With this scenario, the NTP clients should be configured to prefer the stratum-1 server over the stratum-2 server. The NTP servers should be configured to easily scale by creating a hierarchy of lower level (stratum-2 to stratum-15) servers to accommodate the workload. The width and depth of the hierarchy is dependent on the number of NTP clients as well as the amount of redundancy that is required. If two NTP servers have not been deployed in the management network, this is a finding.
Fix: F-17801r1_fix
Deploy and implement at least two NTP servers in the management network.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- NET-IDPS-016
- Vuln IDs
-
- V-18490
- Rule IDs
-
- SV-20025r2_rule
Checks: C-21124r2_chk
Review the DMZ topology and verify public servers are being monitored by an IDPS. If an IDPS sensor is not deployed to monitor all DMZ segments housing public servers, this is a finding.
Fix: F-19077r1_fix
Place an IDPS sensor in the enclave to monitor public servers.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- NET-IDPS-018
- Vuln IDs
-
- V-18492
- Rule IDs
-
- SV-20027r2_rule
Checks: C-21126r3_chk
Review topology of the network segment hosting the web, application, and database servers. If this segment is not being monitored by an IDPS sensor, this is a finding.
Fix: F-19914r2_fix
Implement an IDPS strategy to monitor the network segment hosting web, application, and database servers.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- NET-IDPS-019
- Vuln IDs
-
- V-18493
- Rule IDs
-
- SV-20028r2_rule
Checks: C-21127r3_chk
Review the management network topology and verify network security management servers are being monitored by an IDPS. If an IDPS sensor is not deployed to monitor all segments housing network security management servers, this is a finding.
Fix: F-19083r1_fix
Install an IDPS to monitor and protect the Management Network (management subnet or OOB network).
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- NET-IDPS-024
- Vuln IDs
-
- V-18496
- Rule IDs
-
- SV-20031r2_rule
Checks: C-21131r2_chk
Review the network topology diagram and interview the ISSO to determine how the IDS sensor data is transported between sites. If it is not transported across an OOB network or an encrypted tunnel, this is a finding.
Fix: F-19086r2_fix
Design a communications path for OOB traffic or create an encrypted tunnel using a FIPS 140-2 validated encryption algorithm to protect data.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- NET-IDPS-025
- Vuln IDs
-
- V-18497
- Rule IDs
-
- SV-20032r2_rule
Checks: C-21132r2_chk
Review the network topology diagram and interview the ISSO to determine how the IDPS traffic between the sensor and the security management or sensor data collection servers is transported. If the IDPS traffic does not traverse a dedicated VLAN logically separating IDPS traffic from all other enclave traffic, this is a finding.
Fix: F-19087r1_fix
Design a communications path for OOB traffic or create a VLAN for IDPS traffic to protect the data.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- NET-IDPS-027
- Vuln IDs
-
- V-18504
- Rule IDs
-
- SV-20039r2_rule
Checks: C-21198r2_chk
Interview the IDPS administrator and determine if anomaly-based detection is deployed in the network. If implemented, ensure that any products collecting baselines for anomaly-based detection have their baselines rebuilt periodically to support accurate detection. If the collection products do not have their baselines rebuilt periodically, this is a finding.
Fix: F-19095r1_fix
Establish procedures to update anomaly-based sensors.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- NET-IDPS-029
- Vuln IDs
-
- V-18506
- Rule IDs
-
- SV-20041r2_rule
Checks: C-21207r2_chk
If the signatures are located on a server, verify that the directories on which the signature packs are placed are protected by read-only access. If the directories are not set for read-only access, this is a finding.
Fix: F-19097r1_fix
Modify the access restrictions to prevent the signatures from being updated.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- NET-IDPS-030
- Vuln IDs
-
- V-18507
- Rule IDs
-
- SV-20042r2_rule
Checks: C-21208r2_chk
Review the file server accounts and determine if the accounts with read access to the IDPS signatures are provided only to the IDPS sensors. If there are accounts other than those allocated for the IDPS sensors providing access to the signatures, this is a finding.
Fix: F-19098r1_fix
Secure the signatures from access to accounts for IDS updates.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- NET-IDPS-031
- Vuln IDs
-
- V-18510
- Rule IDs
-
- SV-20045r2_rule
Checks: C-21274r2_chk
Interview the SA to determine the IDPS maintenance procedures as well as have SA display the backup files saved on the file server. If the IDPS configuration is not backed up prior to applying software or signature updates, or when making changes to the configuration, this is a finding.
Fix: F-19104r1_fix
Establish backup procedures and define directories to store the configuration settings and operating system versions.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- NET-IDPS-032
- Vuln IDs
-
- V-18511
- Rule IDs
-
- SV-20046r2_rule
Checks: C-21275r2_chk
Interview the SA and determine the process of software and signature validation. If file checksums provided by the vendor are not compared and verified with checksums computed from CD or downloaded files, this is a finding.
Fix: F-19105r1_fix
Establish change control procedures that include file validation and integrity.
- RMF Control
- SI-4
- Severity
- M
- CCI
- CCI-001673
- Version
- NET-WIDS-001
- Vuln IDs
-
- V-18596
- Rule IDs
-
- SV-20145r3_rule
Checks: C-22258r4_chk
Detailed Policy Requirements: DoD components will ensure that a Wireless Intrusion detection System (WIDS) is implemented that allows for monitoring of WLAN activity and the detection of WLAN-related policy violations on all unclassified and classified DoD wired and wireless LANs. The WIDS shall be capable of monitoring IEEE 802.11 transmissions within all DoD LAN environments and detect nearby unauthorized WLAN devices. WIDS shall not be required to monitor non-IEEE 802.11 transmissions. WIDS Implementation Criteria. The WIDS shall continuously scan for and detect authorized and unauthorized WLAN activities 24 hours a day, 7 days a week. Note: Exceptions to WIDS implementation criteria may be made by the AO for DoD wired and wireless LAN operating environments. This exception allows the AO to implement periodic scanning conducted by designated personnel using handheld scanners during walk-through assessments. Periodic scanning may be conducted as the alternative to the continuous scanning only in special circumstances, where it has been determined on a case-by-case basis that continuous scanning is either infeasible or unwarranted. The AO exception must be documented. The "infeasible" criteria includes the following use case examples: - It's not my building - this scenario means that for contractual, or other similar reasons, the DoD component is not allowed to install a WIDS. - There's no power or space is limited - this scenarios means that for space weight and power (SWAP) reasons, the addition of continuous scanning capabilities cannot be accomplished because it would exceeds SWAP availability. Another reason power would affect your decision to waive continuous scanning requirements is if the entire LAN is only in operation periodically (e.g. the wired/wireless LAN is enabled on a vehicle that is only operating when the vehicle is being used for a specific operation). - The exception for "Minimal Impact WLAN Systems" that: Do not provide connectivity to WLAN-enabled PEDs (e.g., backhaul systems); have no available FIPS 140 validated 802.1X EAP-TLS supplicant; support a very small number of users for a specific mission (e.g., 10 or less users); are standalone networks; or are highly specialized WLAN systems that are isolated from the DoDIN (e.g., handheld personal digital assistants [PDAs] used as radio-frequency identification [RFID] readers, a network of WLAN-enabled Voice over Internet Protocol [VoIP] phones) allows the AO to waive any of the security requirements in the Instruction. This includes using non-standard/proprietary FIPS validated encryption, using an alternative FIPS validated EAP type, and not having a continuous WIDS. -The cost of the continuous WIDS capability is more expensive that the total cost of the LAN without a WIDS. The AO must conduct a wireless threat risk assessment where it has been shown by analysis that the threat environment is extremely unlikely to non-existent to meet the "unwarranted" exception criteria. Check Procedures: Interview the site ISSO. Determine if the scanning by a WIDS is being conducted and if it is continuous or periodic. If a continuous scanning WIDS is used, there is no finding. If periodic scanning is used, verify the exception to policy is documented and signed by the AO. Verify the exception meets one of the required criteria. If periodic scanning is being performed but requirements have not been met, this is a finding. If no WIDS scanning is being performed at the site, this is a finding.
Fix: F-19231r1_fix
Perform required WIDS scanning
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WIR0115-02
- Vuln IDs
-
- V-19900
- Rule IDs
-
- SV-22070r3_rule
Checks: C-25550r2_chk
Review the WLAN system product documentation. Verify the system is WPA2-Enterprise certified by the Wi-Fi Alliance. If the WLAN product is not WPA2-Enterprise certified, this is a finding.
Fix: F-34115r2_fix
Procure WLAN equipment whose implementation of TLS has been FIPS 140-2 validated.
- RMF Control
- AC-23
- Severity
- M
- CCI
- CCI-002345
- Version
- NET1050
- Vuln IDs
-
- V-23735
- Rule IDs
-
- SV-28616r3_rule
Checks: C-28855r4_chk
Inspect the network element configurations that have been stored offline. If the configurations are not encrypted, this is a finding.
Fix: F-25887r3_fix
Encrypt all network device configurations stored offline.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WIR0123
- Vuln IDs
-
- V-25319
- Rule IDs
-
- SV-31432r4_rule
Checks: C-31754r3_chk
Have the SA show how the guest WLAN is physically connected to the firewall or supporting switch and how it is logically connected through firewall or switch configuration settings. Verify the equipment is connected via a separate WLAN or logical segmentation of the host WLAN (e.g., separate service set identifier (SSID) and virtual LAN). If a guest WLAN is set up as a separate WLAN from the DoD network or not set up as a logical segmentation from the DoD network or DoD WLAN, this is a finding.
Fix: F-28238r1_fix
Reconfigure physical and logical connections as needed so the Internet-only WLAN infrastructure resides in a dedicated subnet off the perimeter firewall.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WIR0114
- Vuln IDs
-
- V-30255
- Rule IDs
-
- SV-39891r3_rule
Checks: C-38911r2_chk
Review the WLAN system product documentation. Verify the system is WPA2-Enterprise certified. If the WLAN product is not WPA2-Enterprise certified, this is a finding.
Fix: F-34048r1_fix
Procure WPA2-Enterprise certified WLAN equipment.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- NET0180
- Vuln IDs
-
- V-31632
- Rule IDs
-
- SV-41919r3_rule
Checks: C-40348r4_chk
Validate global IP addresses in use on unclassified or classified networks registered through the DoD Network Information Center. For NIPRNet, go to the website https://www.nic.mil. For SIPRNet, go to the web portal at http://www.ssc.smil.mil. To verify Department of the Navy IP addresses, go to http://infosec.navy.mil.ipaddress.com. If the site is using an address space that has not been registered and allocated to the site, this is a finding.
Fix: F-35552r4_fix
Submit any unregistered and/or unauthorized global IP addresses to the DoD Network Information Center (NIC) for registration.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- NET0185
- Vuln IDs
-
- V-31637
- Rule IDs
-
- SV-41924r6_rule
Checks: C-40352r12_chk
Review network diagrams, enterprise sensor reports, and network scans submitted to the Connection Approval Office. Determine that only global IP addresses assigned by the NIC are in use within the organization's SIPRNet enclave. Determine whether NAT and unauthorized IP address space is in use in the organization's SIPRNet enclave. Exceptions to this requirement are listed below: 1. Closed classified networks logically transiting SIPRNet for enclave-to-enclave VPN transport only. 2. Out-of-Band management networks, where the NATd nodes do not access SIPRNet base enterprise services. 3. Thin client deployments where the hosting thin client server serves as the SIPRNet access point for its thin clients and that the organization maintains detailed thin client service usage audit logs. 4. Valid operational mission need or implementation constraints. All exceptions must have approval by the SIPRNet DISN accreditation official, DISA AO. If NAT and unauthorized IP address space is in use on the organization's SIPRNet infrastructure, this is a finding.
Fix: F-35556r5_fix
Remove the NAT configurations and private address space from the organization's SIPRNet enclave. Configure the SIPRNet enclave with SSC authorized .smil.mil or .sgov.gov addresses. If NAT or private address space is required, as per one of the stated exceptions or for valid mission requirements, then submit a detailed approval request to use of private addressing through the DSAWG Secretariat to the DISN accreditation official, DISA AO.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- NET0928
- Vuln IDs
-
- V-33831
- Rule IDs
-
- SV-44284r2_rule
Checks: C-41894r5_chk
Review the Bogon/Martian maintenance policy to validate plans and procedures are in place to protect the enclave from illegitimate network traffic with up to date Bogon/Martian rulesets. If the site does not have a policy to keep Bogon/Martian rulesets up to date, this is a finding.
Fix: F-37761r2_fix
Implement a Bogon/Martian maintenance policy to protect the enclave from illegitimate network traffic.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001121
- Version
- NET0131
- Vuln IDs
-
- V-66349
- Rule IDs
-
- SV-80839r1_rule
Checks: C-66995r1_chk
Review the network topology and interview the ISSO to verify that each external connection to the site’s network has been validated and approved by the AO and CAO and that CAP requirements have been met. If there are any external connections that have not been validated and approved, this is a finding.
Fix: F-72425r1_fix
All external connections will be validated and approved prior to connection. Interview the ISSM to verify that all connections have a mission requirement and that the AO is aware of the requirement.
- RMF Control
- AU-11
- Severity
- L
- CCI
- CCI-000167
- Version
- NET1026
- Vuln IDs
-
- V-66351
- Rule IDs
-
- SV-80841r1_rule
Checks: C-66997r1_chk
Examine the syslog server to verify that it is configured to store messages for at least 30 days. Have the administrator show you the syslog files stored offline for one year. If the syslog messages are not kept online for thirty days and offline for one year, this is a finding.
Fix: F-72427r1_fix
Configure the syslog server to store messages for at least 30 days on-line. The administrator must establish a strategy for storing the logs off-line for minimum of 1 year.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- NET2000
- Vuln IDs
-
- V-66353
- Rule IDs
-
- SV-80843r1_rule
Checks: C-66999r1_chk
Review the router configuration to determine if LDP and RSVP messages are being authenticated as shown in the examples below. If authentication is not being used for these protocols using a secured hashing algorithm for message authentication, this is a finding. An LDP session is secured by configuring a password for each LDP peer as shown in the example below: mpls ip mpls label protocol ldp mpls ldp neighbor 10.1.1.1 password xzxxxxxxxxxxx mpls ldp neighbor 10.3.3.3 password xxxxxzzzzxxxz The IP address 10.1.1.1 and 10.3.3.3 in this example are the router IDs of the neighbors for which this router has an LDP session requiring MD5 authentication. To specify that the router ID 10.1.1.1 is to be found in VPN routing/forwarding instance (VRF) named VPN1 instead of the global route table, the "vrf" keyword is used in the command as shown in the following example: mpls ldp neighbor vrf VPN1 10.1.1.1 password xxxxxxxxxxxxxxxxx A group of peers using the same MD5 password can be configured as shown in the example below: mpls ldp password for 10 xxxxxxxxxxxxxxx mpls ldp password required for 10 ! access-list 10 permit 10.1.1.1 access-list 10 permit 10.3.3.3 access-list 10 permit 10.4.4.4 The access list specifies a password is mandatory for LDP sessions with neighbors whose LDP router IDs are permitted by the access list. To configure MD5 or SHA-1 authentication for RSVP, both ip rsvp authentication key and ip rsvp authentication commands must be configured as shown in the example below. The latter command simply enables authentication. interface Ethernet0/0 ip address 192.168.101.2 255.255.255.0 ip rsvp bandwidth 7500 7500 ip rsvp authentication type sha-1 ip rsvp authentication key xxxxxxxx ip rsvp authentication Note: If SHA-1 is not specified using the ip rsvp authentication type command, MD5 will be utilized.
Fix: F-72429r1_fix
Implement neighbor authentication using a secured hashing algorithm for all signaling protocols deployed to build LSP tunnels.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- NET2001
- Vuln IDs
-
- V-66355
- Rule IDs
-
- SV-80845r1_rule
Checks: C-67001r1_chk
Review the DISN-facing interfaces of the enclave perimeter routers to verify that LDP or RSVP is not enabled. If any of these interfaces are LDP or RSVP enabled, this is a finding.
Fix: F-72431r1_fix
Disable LDP and RSVP on DISN-facing interfaces on all perimeter routers.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001549
- Version
- NET2002
- Vuln IDs
-
- V-66357
- Rule IDs
-
- SV-80847r1_rule
Checks: C-67003r1_chk
Review the router configuration and verify that the "mpls ldp sync" command is configured on the IS-IS or OSPF configuration as shown in the following example: mpls ip mpls label protocol ldp ! interface POS0/3 ip router isis mpls ip ... ... ... router isis mpls ldp sync If not all MPLS routers synchronize IGP and LDP, this is a finding. Note: If the LDP peer is reachable, the IGP waits indefinitely (by default) for synchronization to be achieved. To limit the length of time the IGP session must wait, enter the "mpls ldp igp sync holddown" command. If the LDP peer is not reachable, the IGP establishes the adjacency to enable the LDP session to be established.
Fix: F-72433r1_fix
Configure the MPLS router to synchronize IGP and LDP, minimizing packet loss when an IGP adjacency is established prior to LDP peers completing label exchange.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- NET2003
- Vuln IDs
-
- V-66359
- Rule IDs
-
- SV-80849r1_rule
Checks: C-67005r1_chk
Review the switch configuration to verify that VTP clients and servers are authenticating messages as shown in the following configuration example: vtp mode server vtp version 2 vtp domain ICAN1 vtp password xxxxxxxx If any switches within the ICAN infrastructure have implemented VTP and are not authenticating VTP messages with a hash function using the most secured cryptographic algorithm available, this is a finding.
Fix: F-72435r1_fix
Configure the switch to authenticate all VLAN Trunk Protocol (VTP) messages with a hash function using the most secured cryptographic algorithm available.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- NET2004
- Vuln IDs
-
- V-66361
- Rule IDs
-
- SV-80851r1_rule
Checks: C-67007r1_chk
In cases where VLANs do not span multiple switches it is a best practice to not implement STP. Avoiding the use of STP will provide the most deterministic and highly available network topology. If STP is required, then review the switch configuration to verify that RSTP or MSTP has been implemented. Following are example configurations: RSTP spanning-tree mode rapid-pvst MST spanning-tree mode mst spanning-tree mst configuration name Region1 revision 1 instance 1 vlan 10, 11, 12 instance 2 vlan 13, 14 If RSTP or MSTP has not been implemented where STP is required, this is a finding. Note: Note: Cisco has implemented RSTP as part of MSTP and Rapid-PVST+.
Fix: F-72437r1_fix
Configure Rapid STP be implemented at the access and distribution layers where VLANs span multiple switches.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-001095
- Version
- NET2005
- Vuln IDs
-
- V-66363
- Rule IDs
-
- SV-80853r1_rule
Checks: C-67009r1_chk
Review each router and verify that a QoS policy has been configured to provide preferred treatment for control plane traffic and C2 real-time services. Step 1: Verify that the class-maps are configured to match on DSCP values that have been set at the edges as shown in the configuration example below: class-map match-all CONTROL_PLANE match ip dscp 48 class-map match-all C2_VOICE match ip dscp 47 class-map match-all VOICE match ip dscp ef class-map match-all VIDEO match ip dscp af4 class-map match-all PREFERRED_DATA match ip dscp af3 Step 2: Verify that the policy map applied to the core-layer-facing interface reserves the bandwidth for each traffic type as shown in the following example: policy-map QOS_POLICY class CONTROL_PLANE priority percent 10 class C2_VOICE priority percent 10 class VOICE priority percent 15 class VIDEO bandwidth percent 25 class PREFERRED_DATA bandwidth percent 25 class class-default bandwidth percent 15 Step 3: Verify that an output service policy is bound to the core-layer-facing interface as shown in the configuration example below: interface GigabitEthernet1/1 ip address 10.2.0.2 255.255.255.252 service-policy output QOS_POLICY If a QoS policy has not been implemented within the JIE WAN infrastructure to provide assured services for control plane traffic and C2 real-time services, this is a finding.
Fix: F-72439r1_fix
Configure a QoS policy on each router to provide assured services for control plane traffic and C2 real-time services.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- NET2006
- Vuln IDs
-
- V-66365
- Rule IDs
-
- SV-80855r1_rule
Checks: C-67011r1_chk
By default, multicast is disabled globally as well as on all interfaces. Multicast routing is enabled on a router with the global command ip multicast-routing. PIM is enabled on an interface with either of the following commands: ip pim sparse-mode, ip pim dense-mode, ip pim sparse-dense-mode. If the global command ip multicast-routing is defined, review all interface configurations and verify that only the required interfaces are enabled for PIM. The following is a sample configuration with multicast routing enabled and PIM enabled on an interface. ip multicast-routing ! interface FastEthernet0/0 ip pim sparse-mode If PIM is not disabled on interfaces that are not supporting multicast, this is a finding.
Fix: F-72441r1_fix
The router administrator will disable PIM on all router interfaces that are not required to support multicast routing.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001414
- Version
- NET2007
- Vuln IDs
-
- V-66367
- Rule IDs
-
- SV-80857r1_rule
Checks: C-67013r1_chk
Step 1: Verify that an ACL is configured that will specify the allowable PIM neighbors similar to the following example. ip access-list standard pim-neighbors permit 192.0.2.1 permit 192.0.2.3 Step 2: Verify that a pim neighbor-filter command is configured on all PIM enabled interfaces that is referencing the PIM neighbor ACL similar to the following example: interface GigabitEthernet0/3 ip address 192.0.2.2 255.255.255.0 pim neighbor-filter pim-neighbors If PIM neighbor filter is not bound to interfaces that have PIM enabled, this is a finding.
Fix: F-72443r1_fix
The router administrator configures and binds a PIM neighbor filter to those interfaces that have PIM enabled.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001414
- Version
- NET2008
- Vuln IDs
-
- V-66369
- Rule IDs
-
- SV-80859r1_rule
Checks: C-67015r1_chk
The administratively-scoped IPv4 multicast address space is 239.0.0.0 through 239.255.255.255. Packets addressed to administratively-scoped multicast addresses must not cross administrative boundaries. This can be accomplished by applying a multicast boundary statement to all COI-facing interfaces as shown in the following example: ip multicast-routing ! interface FastEthernet0/0 ip address 199.36.92.1 255.255.255.252 ip pim sparse-mode ip multicast boundary 1 ! access-list 1 deny 239.0.0.0 0.255.255.255 access-list 1 permit any If inbound and outbound administratively-scoped multicast traffic is not blocked, this is a finding.
Fix: F-72445r1_fix
Configure a multicast boundary statement at all COI-facing interfaces that has PIM enabled to block inbound and outbound administratively-scoped multicast traffic.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001414
- Version
- NET2009
- Vuln IDs
-
- V-66371
- Rule IDs
-
- SV-80861r1_rule
Checks: C-67017r1_chk
To prevent Auto-RP messages from entering or leaving the PIM domain, the ip multicast boundary command must be configured on a COI-facing PIM-enabled interface. Verify that the referenced ACL denies multicast addresses 224.0.1.39 and 224.0.1.40, as shown in the example below: ip multicast-routing ! interface FastEthernet0/0 ip address 199.36.92.1 255.255.255.252 ip pim sparse-mode ip multicast boundary 1 ! access-list 1 deny 224.0.1.39 access-list 1 deny 224.0.1.40 If COI-facing interfaces do not block inbound and outbound Auto-RP discovery and announcement messages, this is a finding.
Fix: F-72447r1_fix
Block inbound and outbound Auto-RP discovery and announcement messages at external-facing PIM-enabled interfaces.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001414
- Version
- NET2010
- Vuln IDs
-
- V-66373
- Rule IDs
-
- SV-80863r1_rule
Checks: C-67019r1_chk
Verify that the RP router is configured to filter PIM register messages using the ip pim accept-register global command as shown in the example below. This command can reference either an ACL or a route-map to identify and prevent unauthorized sources or groups from registering with the RP. ip pim accept-register list PIM_REGISTER_FILTER ! ip access-list extended PIM_REGISTER_FILTER deny ip any 224.0.0.0 0.0.0.255 deny ip 0.0.0.0 0.255.255.255 any deny ip 1.0.0.0 0.255.255.255 any deny ip 2.0.0.0 0.255.255.255 any deny ip 5.0.0.0 0.255.255.255 any deny ip 7.0.0.0 0.255.255.255 any deny ip 10.0.0.0 0.255.255.255 any deny ip 23.0.0.0 0.255.255.255 any deny ip 27.0.0.0 0.255.255.255 any ... ... ... deny ip 172.16.0.0 0.15.255.255 any deny ip 192.168.0.0 0.0.255.255 any deny ip 197.0.0.0 0.255.255.255 any deny ip 223.0.0.0 0.255.255.255 any deny ip 224.0.0.0 224.255.255.255 any permit ip any any If the RP router peering with customer PIM-SM routers is not configured with a PIM import policy to block registration messages for reserved multicast groups, this is a finding.
Fix: F-72449r1_fix
Configure RP routers to filter PIM register messages received from a tenant multicast DR for any reserved or any other undesirable multicast groups.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001414
- Version
- NET2011
- Vuln IDs
-
- V-66375
- Rule IDs
-
- SV-80865r1_rule
Checks: C-67023r1_chk
Verify that the RP router is configured to filter PIM join messages for any reserved multicast groups using the ip pim accept-rp global command as shown in the example below. The ip pim accept-rp global command causes the router to accept only (*, G) join messages destined for the specified RP address as allowed by the referenced access-list. ip pim accept-rp 10.10.2.1 PIM_JOIN_FILTER ! ip access-list standard PIM_JOIN_FILTER deny 224.0.1.2 deny 224.0.1.3 deny 224.0.1.8 deny 224.0.1.22 deny 224.0.1.24 deny 224.0.1.25 ... ... ... deny 225.1.2.3 deny 229.55.150.208 deny 234.42.42.42 255.255.255.252 deny 239.0.0.0 0.255.255.255 permit any Note: IOS 12.4T extends the ip multicast-routing command with a group-range or access-list argument that can be used to filter multicast control (PIM, IGMP) and data packets for unauthorized groups. If the RP router peering with customer PIM-SM routers is not configured with a PIM import policy to block join messages for reserved and any undesirable multicast groups, this is a finding.
Fix: F-72451r1_fix
RP routers that are peering with customer PIM-SM routers must implement a PIM import policy to block join messages for reserved and any undesirable multicast groups.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001095
- Version
- NET2012
- Vuln IDs
-
- V-66379
- Rule IDs
-
- SV-80869r1_rule
Checks: C-67025r1_chk
Review the configuration of the DR to verify that it is rate limiting the number of multicast register messages. If the DR is not limiting multicast register messages, this is a finding. The following is a PIM sparse mode configuration example that limits the number of register messages for each (S, G) multicast entry to 10 per second. ip multicast-routing ! interface FastEthernet 0/0 description link to core ip address 192.168.123.2 255.255.255.0 ip pim sparse-mode ! interface FastEthernet 0/1 description User LAN ip address 192.168.122.1 255.255.255.0 ip pim sparse-mode ! ip pim rp-address 1.1.1.1 ip pim register-rate 10
Fix: F-72455r1_fix
Configure the Designated Router (DR) to rate limit the number of multicast register messages it will allow for each (S, G) entry.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001414
- Version
- NET2013
- Vuln IDs
-
- V-66381
- Rule IDs
-
- SV-80871r1_rule
Checks: C-67027r1_chk
Review the configuration of the DR to verify that it is filtering IGMP or MLD report messages allowing hosts to only join those groups that have been approved by the organization. If the DR is not filtering IGMP or MLD report messages, this is a finding. The following is a PIM sparse mode configuration example filtering specific multicast groups as defined in access-list 11 on the LAN-facing interface. ip multicast-routing ! interface FastEthernet 0/0 description link to core ip address 192.168.123.2 255.255.255.0 ip pim sparse-mode ! interface FastEthernet 0/1 description User LAN ip address 192.168.122.1 255.255.255.0 ip pim sparse-mode ip igmp access-group 11 ! access-list 11 permit 224.10.10.0 0.0.0.255 access-list 11 permit 224.11.11.0 0.0.0.255 access-list 11 permit 224.20.20.0 0.0.0.255
Fix: F-72457r1_fix
Configure the Designated Router (DR) to filter the Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) report messages to allow tenant hosts to join only those multicast groups that have been approved by the organization.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001095
- Version
- NET2014
- Vuln IDs
-
- V-66389
- Rule IDs
-
- SV-80879r1_rule
Checks: C-67035r1_chk
Review the DR configuration to verify that it is limiting the number of mroute states via IGMP or MLD. If the DR is not limiting multicast join requests via IGMP or MLD, this is a finding. The following is a PIM sparse mode DR configuration example that limits the number of IGMP join requests on both a global and a per-interface basis ip multicast-routing ip igmp limit 80 ! interface FastEthernet 0/1 description User LAN121 ip address 192.168.122.1 255.255.255.0 ip pim sparse-mode ip igmp limit 50 ! interface FastEthernet 0/2 description User LAN122 ip address 192.168.122.1 255.255.255.0 ip pim sparse-mode ip igmp limit 50 Note: If both global and per interface state limiters are configured, the limits configured for per interface state limiters are still enforced but are constrained by the global limit.
Fix: F-72465r1_fix
Configure the Designated Router (DR) on a global or interface basis to limit the number of mroute states resulting from IGMP or MLD membership reports.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001095
- Version
- NET2015
- Vuln IDs
-
- V-66391
- Rule IDs
-
- SV-80881r1_rule
Checks: C-67037r1_chk
Review the multicast last-hop router configuration to verify that the SPT switchover threshold is increased (default is 0) or set to infinity (never switch over). The following is a PIM sparse mode last-hop router configuration example that will disable the SPT switchover for all multicast groups: ip multicast-routing ip pim spt-threshold infinity If any multicast router is not configured to increase the SPT threshold or set it to infinity to minimalize (S,G) state, this is a finding.
Fix: F-72467r1_fix
Configure the multicast router to increase the SPT threshold or set it to infinity to minimalize (S,G) state within the multicast topology where Any Source Multicast (ASM) is deployed.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-001095
- Version
- NET2016
- Vuln IDs
-
- V-66393
- Rule IDs
-
- SV-80883r1_rule
Checks: C-67041r1_chk
Review the access switches connected to multicast last-hop routers to determine if IGMP snooping is enabled. The following are switch configuration examples with IGMP snooping enabled globally and on a per-VLAN basis: Enable IGMP Snooping globally: ip igmp snooping Enable IGMP Snooping for VLAN: ip igmp snooping vlan 7 If any switches within the ICAN access layer do not have IGMP or MLD snooping enabled, this is a finding.
Fix: F-72469r1_fix
Configure the switch to implement IGMP or MLD snooping, ensuring multicast traffic for any given multicast group is forwarded to only those hosts that have joined the group.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- NET2017
- Vuln IDs
-
- V-66397
- Rule IDs
-
- SV-80887r1_rule
Checks: C-67043r1_chk
All routers or multilayer switches providing first-hop redundancy services must be configured to delay preemption to provide enough time for the IGP to stabilize. Review the router or multilayer switch providing first-hop redundancy services and verify that the preemption delay is configured. If preemption delay is configured, this is a finding. Following is an HSRP configuration example that delays the preemption by 30 seconds. interface GigabitEthernet 0/0/0 ip address 10.11.0.2 255.255.255.0 standby 1 priority 110 standby 1 ip 10.21.0.1 standby 1 preempt standby 1 preempt delay minimum 30 Following is a VRRP configuration example that delays the preemption by 30 seconds. interface GigabitEthernet 0/0/0 ip address 10.11.0.2 255.255.255.0 vrrp 1 priority 110 vrrp 1 ip 10.21.0.1 vrrp 1 preempt delay minimum 30 For VRRP implementations, a preemptive scheme is enabled by default. If preemption is disabled using the no vrrp preempt command, the virtual router backup that is elected to become virtual router master remains the master until the original virtual router master recovers and becomes master again.
Fix: F-72473r1_fix
Configure each router and multilayer switch providing first-hop redundancy services to be configured to delay the preempt to provide enough time for the IGP to stabilize. Note: The amount of delay will be based on the number of IGP routes.