Router Security Requirements Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000002
- Vuln IDs
-
- SRG-NET-000019-RTR-000002
- Rule IDs
-
- SRG-NET-000019-RTR-000002_rule
Checks: C-SRG-NET-000019-RTR-000002_chk
Verify each router enforces approved authorizations for controlling the flow of information between interconnected networks in accordance with applicable policy. If the router does not enforce approved authorizations for controlling the flow of information between interconnected networks, this is a finding.
Fix: F-SRG-NET-000019-RTR-000002_fix
Configure the router to enforce approved authorizations for controlling the flow of information between interconnected networks in accordance with applicable policy.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000003
- Vuln IDs
-
- SRG-NET-000019-RTR-000003
- Rule IDs
-
- SRG-NET-000019-RTR-000003_rule
Checks: C-SRG-NET-000019-RTR-000003_chk
If IPv4 or IPv6 multicast routing is enabled, verify all interfaces enabled for PIM are documented in the network's multicast topology diagram. Review the router configuration to determine if multicast routing is enabled and which interfaces are enabled for PIM. If an interface is not required to support multicast routing and it is enabled, this is a finding.
Fix: F-SRG-NET-000019-RTR-000003_fix
Document all enabled interfaces for PIM in the network's multicast topology diagram. Disable support for PIM on interfaces that are not required to support it.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000004
- Vuln IDs
-
- SRG-NET-000019-RTR-000004
- Rule IDs
-
- SRG-NET-000019-RTR-000004_rule
Checks: C-SRG-NET-000019-RTR-000004_chk
Review the multicast topology diagram and determine if router interfaces are enabled for IPv4 or IPv6 multicast routing. If the router is enabled for multicast routing, verify all interfaces enabled for PIM have a neighbor filter bound to the interface. The neighbor filter must only accept PIM control plane traffic from the documented PIM neighbors. If PIM neighbor filters are not bound to all interfaces that have PIM enabled, this is a finding.
Fix: F-SRG-NET-000019-RTR-000004_fix
Configure neighbor filters to only accept PIM control plane traffic from documented PIM neighbors. Bind neighbor filters to all PIM enabled interfaces.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000005
- Vuln IDs
-
- SRG-NET-000019-RTR-000005
- Rule IDs
-
- SRG-NET-000019-RTR-000005_rule
Checks: C-SRG-NET-000019-RTR-000005_chk
Review the multicast topology diagram to determine if there are any documented Admin-Local (FFx4::/16), Site-Local (FFx5::/16), or Organization-Local (FFx8::/16) multicast boundaries for IPv6 traffic or any Local-Scope (239.255.0.0/16) boundaries for IPv4 traffic. Verify the appropriate boundaries are configured on the applicable multicast-enabled interfaces. If the appropriate boundaries are not configured on applicable multicast-enabled interfaces, this is a finding.
Fix: F-SRG-NET-000019-RTR-000005_fix
Configure the necessary boundaries to contain packets addressed within the administratively scoped zone. Defined multicast addresses are FFx4::/16, FFx5::/16, FFx8::/16, and 239.255.0.0/16.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000007
- Vuln IDs
-
- SRG-NET-000019-RTR-000007
- Rule IDs
-
- SRG-NET-000019-RTR-000007_rule
Checks: C-SRG-NET-000019-RTR-000007_chk
Verify inactive interfaces on the router or multilayer switch are disabled. If there are any inactive interfaces enabled on the router or multilayer switch, this is a finding.
Fix: F-SRG-NET-000019-RTR-000007_fix
Remove subinterfaces and disable any inactive ports on the router or multilayer switch.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000008
- Vuln IDs
-
- SRG-NET-000019-RTR-000008
- Rule IDs
-
- SRG-NET-000019-RTR-000008_rule
Checks: C-SRG-NET-000019-RTR-000008_chk
Verify all inactive interfaces have a filter to deny all traffic applied to the interface. If an inactive interface does not have a filter to deny all traffic, this is a finding.
Fix: F-SRG-NET-000019-RTR-000008_fix
Configure a filter to deny all traffic, then apply it to all inactive interfaces.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000009
- Vuln IDs
-
- SRG-NET-000019-RTR-000009
- Rule IDs
-
- SRG-NET-000019-RTR-000009_rule
Checks: C-SRG-NET-000019-RTR-000009_chk
Review the configuration of each router interface connecting to an Alternate Gateway. Verify each permit statement of the ingress filter only permits packets with destination addresses of the site's NIPRNet address space or a destination address belonging to the address block assigned by the Alternate Gateway network service provider. If the ingress filter permits packets with addresses other than those specified, such as destination addresses of the site's NIPRNet address space or a destination address belonging to the address block assigned by the Alternate Gateway network service provider, this is a finding.
Fix: F-SRG-NET-000019-RTR-000009_fix
Configure the ingress filter of the perimeter router connected to an Alternate Gateway to only permit packets with destination addresses of the site's NIPRNet address space or a destination address belonging to the address block assigned by the Alternate Gateway network service provider.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000010
- Vuln IDs
-
- SRG-NET-000019-RTR-000010
- Rule IDs
-
- SRG-NET-000019-RTR-000010_rule
Checks: C-SRG-NET-000019-RTR-000010_chk
Review the configuration of the router connecting to the Alternate Gateway. Verify there are no BGP neighbors configured to the remote AS that belongs to the Alternate Gateway service provider. If there are BGP neighbors connecting the remote AS of the Alternate Gateway service provider, this is a finding.
Fix: F-SRG-NET-000019-RTR-000010_fix
Configure a static route on the perimeter router to reach the AS of a router connecting to an Alternate Gateway.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000011
- Vuln IDs
-
- SRG-NET-000019-RTR-000011
- Rule IDs
-
- SRG-NET-000019-RTR-000011_rule
Checks: C-SRG-NET-000019-RTR-000011_chk
Review the configuration of the route connecting to the Alternate Gateway. Verify redistribution of static routes to the Alternate Gateway is not occurring. If the static routes to the Alternate Gateway are being redistributed into an EGP or IGP to a NIPRNet gateway, this is a finding.
Fix: F-SRG-NET-000019-RTR-000011_fix
Do not redistribute static routes to an Alternate Gateway into either an EGP or IGP to a NIPRNet gateway.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000012
- Vuln IDs
-
- SRG-NET-000019-RTR-000012
- Rule IDs
-
- SRG-NET-000019-RTR-000012_rule
Checks: C-SRG-NET-000019-RTR-000012_chk
Verify that the OOBM interface is an adjacency in the IGP routing domain for the management network. If the OOBM interface is an adjacency for routing domains that are not for the management network, this is a finding.
Fix: F-SRG-NET-000019-RTR-000012_fix
Configure multiple IGP instances on the OOBM gateway router to peer only with their own routing domain.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000013
- Vuln IDs
-
- SRG-NET-000019-RTR-000013
- Rule IDs
-
- SRG-NET-000019-RTR-000013_rule
Checks: C-SRG-NET-000019-RTR-000013_chk
Verify the IGP instance used for the managed network does not redistribute routes into the IGP instance used for the management network, and vice versa. If the IGP instance used for the managed network redistributes routes into the IGP instance used for the management network, or vice versa, this is a finding.
Fix: F-SRG-NET-000019-RTR-000013_fix
Configure the IGP instance used for the managed network to prohibit redistribution of routes into the IGP instance used for the management network, and vice versa.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000014
- Vuln IDs
-
- SRG-NET-000019-RTR-000014
- Rule IDs
-
- SRG-NET-000019-RTR-000014_rule
Checks: C-SRG-NET-000019-RTR-000014_chk
Review the configuration to verify the management interface is configured as passive for the IGP instance for the managed network. If the management interface is not configured as passive for the IGP instance for the managed network, this is a finding.
Fix: F-SRG-NET-000019-RTR-000014_fix
Configure the management interface as passive for the IGP instance configured for the managed network.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-002190
- Version
- SRG-NET-000020-RTR-000015
- Vuln IDs
-
- SRG-NET-000020-RTR-000015
- Rule IDs
-
- SRG-NET-000020-RTR-000015_rule
Checks: C-SRG-NET-000020-RTR-000015_chk
Verify source and destination objects are used as a basis for information flow between the router and other network elements. If non-explicit attributes are used for information flow control, this is a finding. If source and destination objects are not used, this is a finding.
Fix: F-SRG-NET-000020-RTR-000015_fix
Configure the router to enforce flow control using explicit security attributes on information, source, and destination objects as a basis for flow control decisions.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-002205
- Version
- SRG-NET-000025-RTR-000020
- Vuln IDs
-
- SRG-NET-000025-RTR-000020
- Rule IDs
-
- SRG-NET-000025-RTR-000020_rule
Checks: C-SRG-NET-000025-RTR-000020_chk
Review the router configuration; for every protocol that affects the routing or forwarding tables (where information is exchanged between neighbors), verify that neighbor router authentication is enabled. If authentication is not enabled, this is a finding.
Fix: F-SRG-NET-000025-RTR-000020_fix
Configure authentication to be enabled for every protocol that affects the routing or forwarding tables.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-002205
- Version
- SRG-NET-000025-RTR-000085
- Vuln IDs
-
- SRG-NET-000025-RTR-000085
- Rule IDs
-
- SRG-NET-000025-RTR-000085_rule
Checks: C-SRG-NET-000025-RTR-000085_chk
Review key expiration dates. When configuring authentication for routing protocols that provide key chains, configure two rotating keys with overlapping expiration dates, both with 180-day expiration dates. If two rotating keys with overlapping expiration dates, both with 180-day expiration dates, are not configured, this is a finding.
Fix: F-SRG-NET-000025-RTR-000085_fix
Configure the router to utilize two rotating keys with overlapping expiration dates, both with 180-day expiration dates, for routing protocol authentication.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-NET-000131-RTR-000035
- Vuln IDs
-
- SRG-NET-000131-RTR-000035
- Rule IDs
-
- SRG-NET-000131-RTR-000035_rule
Checks: C-SRG-NET-000131-RTR-000035_chk
Review the router configuration to determine if services or functions not required for operation, or not related to router functionality (e.g., DNS, email client or server, FTP server, or web server) are enabled. If unnecessary services and functions are enabled on the router, this is a finding.
Fix: F-SRG-NET-000131-RTR-000035_fix
Remove unneeded services and functions from the router. Removal is recommended since the service or function may be inadvertently enabled otherwise. However, if removal is not possible, disable the service or function.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- SRG-NET-000168-RTR-000077
- Vuln IDs
-
- SRG-NET-000168-RTR-000077
- Rule IDs
-
- SRG-NET-000168-RTR-000077_rule
Checks: C-SRG-NET-000168-RTR-000077_chk
Verify the router is configured to encrypt all methods of authentication. If the router is not configured to encrypt all methods of authentication, this is a finding.
Fix: F-SRG-NET-000168-RTR-000077_fix
Configure all methods of authentication to be encrypted.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- SRG-NET-000168-RTR-000078
- Vuln IDs
-
- SRG-NET-000168-RTR-000078
- Rule IDs
-
- SRG-NET-000168-RTR-000078_rule
Checks: C-SRG-NET-000168-RTR-000078_chk
Review the router documentation to verify it is using NIST-validated FIPS 140-2 compliant cryptography for encrypted authentication mechanisms. If NIST-validated FIPS 140-2 compliant cryptography is not being used for all encrypted authentication mechanisms, this is a finding.
Fix: F-SRG-NET-000168-RTR-000078_fix
Configure all authentication mechanisms using encryption to use FIPS 140-2 validated algorithms.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000191-RTR-000081
- Vuln IDs
-
- SRG-NET-000191-RTR-000081
- Rule IDs
-
- SRG-NET-000191-RTR-000081_rule
Checks: C-SRG-NET-000191-RTR-000081_chk
Review the router configuration and ensure that the neighbor command TTL-security is configured for all eBGP peering sessions. If the router does not have the neighbor command TTL-security configured for all eBGP peering sessions, this is a finding.
Fix: F-SRG-NET-000191-RTR-000081_fix
Configure all eBGP routers to use GTSM to mitigate risks associated with a control plane DoS attack.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001094
- Version
- SRG-NET-000026-RTR-000031
- Vuln IDs
-
- SRG-NET-000026-RTR-000031
- Rule IDs
-
- SRG-NET-000026-RTR-000031_rule
Checks: C-SRG-NET-000026-RTR-000031_chk
Review the router configuration to verify uRPF or an egress filter has been configured on all internal interfaces. If uRPF or an egress filter has not been configured on all internal interfaces in an enclave, this is a finding.
Fix: F-SRG-NET-000026-RTR-000031_fix
Configure the router to ensure that an egress filter or uRPF is configured to restrict the router from accepting any outbound IP packet that contains an external IP address in the source field.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001095
- Version
- SRG-NET-000193-RTR-000111
- Vuln IDs
-
- SRG-NET-000193-RTR-000111
- Rule IDs
-
- SRG-NET-000193-RTR-000111_rule
Checks: C-SRG-NET-000193-RTR-000111_chk
Review the router configuration and interview the system administrator; verify that a mechanism for traffic prioritization and bandwidth reservation exists. This arrangement must ensure that sufficient capacity is available for mission-critical traffic and enforce the traffic priorities specified by the Combatant Commanders/Services/Agencies. If no such scheme exists or it is not configured, this is a finding.
Fix: F-SRG-NET-000193-RTR-000111_fix
Implement a mechanism for traffic prioritization and bandwidth reservation. This mechanism must enforce the traffic priorities specified by the Combatant Commanders/Services/Agencies.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000195-RTR-000084
- Vuln IDs
-
- SRG-NET-000195-RTR-000084
- Rule IDs
-
- SRG-NET-000195-RTR-000084_rule
Checks: C-SRG-NET-000195-RTR-000084_chk
Review the configuration to determine if source routing is enabled. If source routing is enabled, this is a finding.
Fix: F-SRG-NET-000195-RTR-000084_fix
Configure the router to disable IP source routing.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000195-RTR-000086
- Vuln IDs
-
- SRG-NET-000195-RTR-000086
- Rule IDs
-
- SRG-NET-000195-RTR-000086_rule
Checks: C-SRG-NET-000195-RTR-000086_chk
Review the router configuration to verify that BGP connections are only from known neighbors in a trusted AS by restricting TCP port 179 to specific IP addresses. If the router is not configured to restrict TCP port 179 to specific IP addresses, this is a finding.
Fix: F-SRG-NET-000195-RTR-000086_fix
Configure an ingress filter to block any unauthorized BGP connection attempts.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000108
- Vuln IDs
-
- SRG-NET-000205-RTR-000108
- Rule IDs
-
- SRG-NET-000205-RTR-000108_rule
Checks: C-SRG-NET-000205-RTR-000108_chk
Review the router configuration to determine if the maximum hop limit has been configured. If it has been configured, then it must be set to at least 32. If it has not been configured, it must be determined what the default value is. If the default value is below 32 and the maximum hop limit value has not been configured, this is a finding.
Fix: F-SRG-NET-000205-RTR-000108_fix
Configure the router maximum hop limit value to at least 32.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000108
- Vuln IDs
-
- SRG-NET-000362-RTR-000108
- Rule IDs
-
- SRG-NET-000362-RTR-000108_rule
Checks: C-SRG-NET-000362-RTR-000108_chk
Determine whether control plane protection has been implemented on the device by verifying traffic types have been classified based on importance levels and a policy has been configured to filter and rate limit the traffic according to each class. If the router does not have control plane protection implemented, this is a finding.
Fix: F-SRG-NET-000362-RTR-000108_fix
Implement control plane protection by classifying traffic types based on importance and configure filters to restrict and rate limit the traffic punted to the route processor according to each class.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-RTR-000109
- Vuln IDs
-
- SRG-NET-000364-RTR-000109
- Rule IDs
-
- SRG-NET-000364-RTR-000109_rule
Checks: C-SRG-NET-000364-RTR-000109_chk
Review the router configuration to determine if the router only allows incoming communications from authorized sources to be routed to authorized destinations. If the router does not restrict incoming communications by authorized sources and destinations, this is a finding.
Fix: F-SRG-NET-000364-RTR-000109_fix
Configure the router to only allow incoming communications from authorized sources to be routed to authorized destinations.