Router Security Requirements Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +71 −5 ⚠ 9 ✎ 13
Comparison against the immediately-prior release (V2R3). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 71
- V-78209 Medium The router must be configured to enforce approved authorizations for controlling the flow of information within the network based on organization-defined information flow control policies.
- V-78211 Medium The router must not be configured to have any feature enabled that calls home to the vendor.
- V-78213 Medium The router must not be configured to have any zero-touch deployment feature enabled when connected to an operational network.
- V-78215 High The router must be configured to restrict traffic destined to itself.
- V-78217 Medium The router must be configured to drop all fragmented Internet Control Message Protocol (ICMP) packets destined to itself.
- V-78219 Medium The router must be configured to have Gratuitous ARP disabled on all external interfaces.
- V-78221 Low The router must be configured to have IP directed broadcast disabled on all interfaces.
- V-78223 Medium The router must be configured to have Internet Control Message Protocol (ICMP) unreachable notifications disabled on all external interfaces.
- V-78225 Medium The router must be configured to have Internet Control Message Protocol (ICMP) mask replies disabled on all external interfaces.
- V-78227 Medium The router must be configured to have Internet Control Message Protocol (ICMP) redirects disabled on all external interfaces.
- V-78229 Low The router must be configured to log all packets that have been dropped.
- V-78231 Medium The router must be configured to produce audit records containing information to establish where the events occurred.
- V-78233 Medium The router must be configured to produce audit records containing information to establish the source of the events.
- V-78235 Low The router must be configured to disable the auxiliary port unless it is connected to a secured modem providing encryption and authentication.
- V-78237 High The perimeter router must be configured to deny network traffic by default and allow network traffic by exception.
- V-78239 Medium The perimeter router must be configured to block inbound packets with source Bogon IP address prefixes.
- V-78241 High The perimeter router must be configured to protect an enclave connected to an alternate gateway by using an inbound filter that only permits packets with destination addresses within the sites address space.
- V-78243 Medium The perimeter router must be configured to filter traffic destined to the enclave in accordance with the guidelines contained in DoD Instruction 8551.1.
- V-78245 Medium The perimeter router must be configured to filter ingress traffic at the external interface on an inbound direction.
- V-78247 Medium The perimeter router must be configured to filter egress traffic at the internal interface on an inbound direction.
- V-78249 Low The perimeter router must be configured to have Link Layer Discovery Protocols (LLDPs) disabled on all external interfaces.
- V-78251 Medium The perimeter router must be configured to have Proxy ARP disabled on all external interfaces.
- V-78253 Medium The perimeter router must be configured to block all outbound management traffic.
- V-78255 Medium The out-of-band management (OOBM) gateway must be configured to transport management traffic to the Network Operations Center (NOC) via dedicated circuit, MPLS/VPN service, or IPsec tunnel.
- V-78257 Medium The out-of-band management (OOBM) gateway router must be configured to forward only authorized management traffic to the Network Operations Center (NOC).
- V-78263 Medium The router providing connectivity to the NOC must be configured to forward all in-band management traffic via an IPsec tunnel.
- V-78265 Medium The BGP router must be configured to use a unique key for each autonomous system (AS) that it peers with.
- V-78267 Medium The BGP router must be configured to reject inbound route advertisements for any Bogon prefixes.
- V-78269 Medium The BGP router must be configured to reject inbound route advertisements for any prefixes belonging to the local autonomous system (AS).
- V-78271 Medium The BGP router must be configured to reject inbound route advertisements from a customer edge (CE) router for prefixes that are not allocated to that customer.
- V-78273 Medium The BGP router must be configured to reject outbound route advertisements for any prefixes that do not belong to any customers or the local autonomous system (AS).
- V-78275 Medium The BGP router must be configured to reject outbound route advertisements for any prefixes belonging to the IP core.
- V-78277 Low The BGP router must be configured to reject route advertisements from BGP peers that do not list their autonomous system (AS) number as the first AS in the AS_PATH attribute.
- V-78279 Medium The BGP router must be configured to use the maximum prefixes feature to protect against route table flooding and prefix de-aggregation attacks.
- V-78281 Low The BGP router must be configured to limit the prefix size on any inbound route advertisement to /24 or the least significant prefixes issued to the customer.
- V-78283 Low The BGP router must be configured to use its loopback address as the source address for iBGP peering sessions.
- V-78285 Low The MPLS router must be configured to use its loopback address as the source address for LDP peering sessions.
- V-78287 Low The MPLS router must be configured to synchronize IGP and LDP to minimize packet loss when an IGP adjacency is established prior to LDP peers completing label exchange.
- V-78289 Low The MPLS router with RSVP-TE enabled must be configured with message pacing to adjust maximum burst and maximum number of RSVP messages to an output queue based on the link speed and input queue size of adjacent core routers.
- V-78291 Medium The MPLS edge routers must be configured to have TTL Propagation disabled.
- V-78293 High The PE router must be configured to have each Virtual Routing and Forwarding (VRF) instance bound to the appropriate physical or logical interfaces to maintain traffic separation between all MPLS L3VPNs.
- V-78295 High The PE router must be configured to have each Virtual Routing and Forwarding (VRF) instance with the appropriate Route Target (RT).
- V-78297 Medium The PE router must be configured to have each VRF with the appropriate Route Distinguisher (RD).
- V-78299 Medium The PE router providing MPLS Layer 2 Virtual Private Network (L2VPN) services must be configured to authenticate targeted Label Distribution Protocol (LDP) sessions used to exchange virtual circuit (VC) information using a FIPS-approved message authentication code algorithm.
- V-78301 High The PE router providing MPLS Virtual Private Wire Service (VPWS) must be configured to have the appropriate virtual circuit identification (VC ID) for each attachment circuit.
- V-78303 High The PE router providing Virtual Private LAN Services (VPLS) must be configured to have all attachment circuits defined to the virtual forwarding instance (VFI) with the globally unique VPN ID assigned for each customer VLAN.
- V-78305 Low The PE router must be configured to enforce the split-horizon rule for all pseudowires within a Virtual Private LAN Services (VPLS) bridge domain.
- V-78307 Medium The PE router providing Virtual Private LAN Services (VPLS) must be configured to have traffic storm control thresholds on CE-facing interfaces.
- V-78309 Low The PE router must be configured to implement Internet Group Management Protocol (IGMP) or Multicast Listener Discovery (MLD) snooping for each Virtual Private LAN Services (VPLS) bridge domain.
- V-78311 Medium The PE router must be configured to limit the number of MAC addresses it can learn for each Virtual Private LAN Services (VPLS) bridge domain.
- V-78313 High The PE router must be configured to block any traffic that is destined to IP core infrastructure.
- V-78315 Medium The PE router must be configured with Unicast Reverse Path Forwarding (RPF) loose mode on all CE-facing interfaces.
- V-78317 Medium The PE router must be configured to ignore or block all packets with any IP options.
- V-78319 Low The PE router must be configured to enforce a Quality-of-Service (QoS) policy in accordance with the QoS DoDIN Technical Profile.
- V-78321 Low The PE or P router must be configured to implement a Quality-of-Service (QoS) policy in accordance with the QoS DoDIN Technical Profile.
- V-78323 Medium The PE router must be configured to enforce a Quality-of-Service (QoS) policy so that all customer traffic receives forwarding treatment as specified in the service level agreement (SLA).
- V-78325 Medium The router must be configured to enforce a Quality-of-Service (QoS) policy to limit the effects of packet flooding denial-of-service (DoS) attacks.
- V-78327 Low The multicast Rendezvous Point (RP) router must be configured to limit the multicast forwarding cache so that its resources are not saturated by managing an overwhelming number of Protocol Independent Multicast (PIM) and Multicast Source Discovery Protocol (MSDP) source-active entries.
- V-78329 Medium The multicast Designated Router (DR) must be configured to rate limit the number of Protocol Independent Multicast (PIM) Register messages it will allow for each source-group (S, G) entry.
- V-78331 Low The multicast Designated Router (DR) must be configured to filter the Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Report messages to allow hosts to join only multicast groups that have been approved by the organization.
- V-78333 Medium The multicast Designated Router (DR) must be configured to filter the Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Report messages to allow hosts to join a multicast group only from sources that have been approved by the organization.
- V-78335 Medium The multicast Designated Router (DR) must be configured to limit the number of mroute states resulting from Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Host Membership Reports.
- V-78337 Medium The multicast Designated Router (DR) must be configured to increase the shortest-path tree (SPT) threshold or set it to infinity to minimalize source-group (S, G) state within the multicast topology where Any Source Multicast (ASM) is deployed.
- V-78339 Medium The Multicast Source Discovery Protocol (MSDP) router must be configured to only accept MSDP packets from known MSDP peers.
- V-78341 Medium The Multicast Source Discovery Protocol (MSDP) router must be configured to authenticate all received MSDP packets.
- V-78343 Low The Multicast Source Discovery Protocol (MSDP) router must be configured to filter received source-active multicast advertisements for any undesirable multicast groups (e.g., auto-RP, source-specific, link-local, black listed, etc.) and Bogon sources.
- V-78345 Low The Multicast Source Discovery Protocol (MSDP) router must be configured to filter source-active multicast advertisements to external MSDP peers to avoid global visibility of local-only multicast sources and groups.
- V-78347 Low The MSDP router must be configured to limit the amount of source-active messages it accepts on per-peer basis.
- V-78349 Low The Multicast Source Discovery Protocol (MSDP) router must be configured to use its loopback address as the source address when originating MSDP traffic.
- V-78351 Medium The router must be configured to only permit management traffic that ingresses and egresses the OOBM interface.
- V-78357 Medium The out-of-band management (OOBM) gateway router must be configured to block any traffic destined to itself that is not sourced from the OOBM network or the NOC.
Removed rules 5
- V-55753 Medium The router must enforce information flow control using explicit security attributes (for example, IP addresses, port numbers, protocol, Autonomous System, or interface) on information, source, and destination objects.
- V-55771 Medium The router must manage excess bandwidth to limit the effects of packet flooding types of denial of service (DoS) attacks.
- V-55775 Medium The router must restrict BGP connections to known IP addresses of neighbor routers from trusted Autonomous Systems (AS).
- V-55777 Medium The router must configure the maximum hop limit value to at least 32.
- V-55791 Medium The router must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including NSA configuration guides, Communications Tasking Orders (CTOs), and Directive-Type Memorandums (DTMs).
Severity changes 9
- V-55729 Medium Low The multicast edge router must be configured to establish boundaries for administratively scoped multicast traffic.
- V-55731 Medium Low The router must be configured to have all inactive interfaces disabled.
- V-55733 Medium High The perimeter router must be configured to not be a Border Gateway Protocol (BGP) peer to an alternate gateway service provider.
- V-55735 Medium Low The perimeter router must be configured to not redistribute static routes to an alternate gateway service provider into BGP or an IGP peering with the NIPRNet or to other autonomous systems.
- V-55747 Medium Low The multicast Rendezvous Point (RP) router must be configured to filter Protocol Independent Multicast (PIM) Register messages received from the Designated Router (DR) for any undesirable multicast groups and Bogon sources.
- V-55749 Medium Low The multicast Rendezvous Point (RP) router must be configured to filter Protocol Independent Multicast (PIM) Join messages received from the Designated Router (DR) for any undesirable multicast groups.
- V-55761 Medium High The perimeter router must be configured to restrict it from accepting outbound IP packets that contain an illegitimate address in the source address field via egress filter or by enabling Unicast Reverse Path Forwarding (uRPF).
- V-55763 Medium Low The router must be configured to have all non-essential capabilities disabled.
- V-55769 Medium Low The BGP router must be configured to enable the Generalized TTL Security Mechanism (GTSM).
Content changes 13
- V-55723 Medium description The multicast router must be configured to disable Protocol Independent Multicast (PIM) on all interfaces that are not required to support multicast routing.
- V-55727 Medium descriptioncheckfix The multicast router must be configured to bind a Protocol Independent Multicast (PIM) neighbor filter to interfaces that have PIM enabled.
- V-55739 Medium descriptioncheckfix The out-of-band management (OOBM) gateway router must be configured to have separate IGP instances for the managed network and management network.
- V-55741 Medium descriptioncheckfix The out-of-band management (OOBM) gateway router must be configured to not redistribute routes between the management network routing domain and the managed network routing domain.
- V-55757 Medium descriptioncheck The router must be configured to implement message authentication for all control plane protocols.
- V-55759 Medium descriptioncheckfix The router must be configured to use keys with a duration not exceeding 180 days for authenticating routing protocol messages.
- V-55765 Medium descriptioncheck The router must be configured to use encryption for routing protocol authentication.
- V-55767 Medium descriptioncheckfix The router must be configured to authenticate all routing protocol messages using NIST-validated FIPS 140-2 message authentication code algorithm.
- V-55773 Medium descriptioncheckfix The perimeter router must be configured to block all packets with any IP options.
- V-55779 Medium descriptioncheckfix The router must be configured to stop forwarding traffic upon the failure of the following actions: system initialization, shutdown, or system abort.
- V-55781 Medium descriptionfix The router must be configured to protect against or limit the effects of denial-of-service (DoS) attacks by employing control plane protection.
- V-55785 Medium descriptioncheckfix The perimeter router must be configured to only allow incoming communications from authorized sources to be routed to authorized destinations.
- V-55789 Medium descriptioncheck The router must be configured to fail securely in the event of an operational failure.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000002
- Vuln IDs
-
- V-55721
- Rule IDs
-
- SV-69975r2_rule
Checks: C-56287r3_chk
Verify each router enforces approved authorizations for controlling the flow of information between interconnected networks in accordance with applicable policy. If the router does not enforce approved authorizations for controlling the flow of information between interconnected networks in accordance with applicable policy, this is a finding.
Fix: F-60591r1_fix
Configure the router to enforce approved authorizations for controlling the flow of information between interconnected networks in accordance with applicable policy.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000003
- Vuln IDs
-
- V-55723
- Rule IDs
-
- SV-69977r2_rule
Checks: C-56289r2_chk
If IPv4 or IPv6 multicast routing is enabled, verify all interfaces enabled for PIM are documented in the network's multicast topology diagram. Review the router configuration to determine if multicast routing is enabled and which interfaces are enabled for PIM. If an interface is not required to support multicast routing and it is enabled, this is a finding.
Fix: F-60593r1_fix
Document all enabled interfaces for PIM in the network's multicast topology diagram. Disable support for PIM on interfaces that are not required to support it.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000004
- Vuln IDs
-
- V-55727
- Rule IDs
-
- SV-69981r2_rule
Checks: C-56293r2_chk
This requirement is not applicable for the DoDIN Backbone. Review the multicast topology diagram and determine if router interfaces are enabled for IPv4 or IPv6 multicast routing. If the router is enabled for multicast routing, verify all interfaces enabled for PIM have a neighbor filter bound to the interface. The neighbor filter must only accept PIM control plane traffic from the documented PIM neighbors. If PIM neighbor filters are not bound to all interfaces that have PIM enabled, this is a finding.
Fix: F-60597r2_fix
This requirement is not applicable for the DoDIN Backbone. Configure neighbor filters to only accept PIM control plane traffic from documented PIM neighbors. Bind neighbor filters to all PIM enabled interfaces.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000005
- Vuln IDs
-
- V-55729
- Rule IDs
-
- SV-69983r2_rule
Checks: C-56295r1_chk
Review the multicast topology diagram to determine if there are any documented Admin-Local (FFx4::/16), Site-Local (FFx5::/16), or Organization-Local (FFx8::/16) multicast boundaries for IPv6 traffic or any Local-Scope (239.255.0.0/16) boundaries for IPv4 traffic. Verify the appropriate boundaries are configured on the applicable multicast-enabled interfaces. If the appropriate boundaries are not configured on applicable multicast-enabled interfaces, this is a finding.
Fix: F-60599r1_fix
Configure the appropriate boundaries to contain packets addressed within the administratively scoped zone. Defined multicast addresses are FFx4::/16, FFx5::/16, FFx8::/16, and 239.255.0.0/16.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000007
- Vuln IDs
-
- V-55731
- Rule IDs
-
- SV-69985r3_rule
Checks: C-56297r3_chk
Review the router configuration. If an interface is not being used but is configured or enabled, this is a finding.
Fix: F-60601r3_fix
Delete inactive sub-interfaces and disable and delete the configuration of any inactive ports on the router.
- RMF Control
- AC-4
- Severity
- H
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000009
- Vuln IDs
-
- V-55733
- Rule IDs
-
- SV-69987r2_rule
Checks: C-56301r2_chk
This requirement is not applicable for the DoDIN Backbone. Review the configuration of the router connecting to the alternate gateway. Verify there are no BGP neighbors configured to the remote AS that belongs to the alternate gateway service provider. If there are BGP neighbors connecting the remote AS of the alternate gateway service provider, this is a finding.
Fix: F-60603r2_fix
This requirement is not applicable for the DoDIN Backbone. Configure a static route on the perimeter router to reach the AS of a router connecting to an alternate gateway.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000010
- Vuln IDs
-
- V-55735
- Rule IDs
-
- SV-69989r2_rule
Checks: C-56303r3_chk
This requirement is not applicable for the DoDIN Backbone. Review the configuration of the route connecting to the alternate gateway. Verify that redistribution of static routes to the alternate gateway is not occurring. If the static routes to the alternate gateway are being redistributed into an Exterior Gateway Protocol or Interior Gateway Protocol to a NIPRNet gateway, this is a finding.
Fix: F-60607r2_fix
This requirement is not applicable for the DoDIN Backbone. Configure the router so that static routes are not redistributed to an alternate gateway into either an Exterior Gateway Protocol or Interior Gateway Protocol to the NIPRNet or to other autonomous systems.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000011
- Vuln IDs
-
- V-55739
- Rule IDs
-
- SV-69993r2_rule
Checks: C-56305r2_chk
This requirement is not applicable for the DoDIN Backbone. Verify that the OOBM interface is an adjacency in the Interior Gateway Protocol routing domain for the management network. If the router does not enforce that Interior Gateway Protocol instances configured on the OOBM gateway router peer only with their own routing domain, this is a finding.
Fix: F-60609r2_fix
This requirement is not applicable for the DoDIN Backbone. Configure the router to enforce that Interior Gateway Protocol instances configured on the OOBM gateway router peer only with their own routing domain.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000012
- Vuln IDs
-
- V-55741
- Rule IDs
-
- SV-69995r2_rule
Checks: C-56307r2_chk
This requirement is not applicable for the DoDIN Backbone. Verify the Interior Gateway Protocol instance used for the managed network does not redistribute routes into the Interior Gateway Protocol instance used for the management network, and vice versa. If the Interior Gateway Protocol instance used for the managed network redistributes routes into the Interior Gateway Protocol instance used for the management network, or vice versa, this is a finding.
Fix: F-60613r2_fix
This requirement is not applicable for the DoDIN Backbone. Configure the Interior Gateway Protocol instance used for the managed network to prohibit redistribution of routes into the Interior Gateway Protocol instance used for the management network, and vice versa.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000013
- Vuln IDs
-
- V-55747
- Rule IDs
-
- SV-70001r2_rule
Checks: C-56313r2_chk
Verify that the RP router is configured to filter PIM register messages. If the RP router peering with PIM-SM routers is not configured with a PIM import policy to block registration messages for any undesirable multicast groups and Bogon sources, this is a finding.
Fix: F-60617r2_fix
Configure RP routers to filter PIM register messages received from a multicast DR for any undesirable multicast groups or BOGON sources.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000014
- Vuln IDs
-
- V-55749
- Rule IDs
-
- SV-70003r2_rule
Checks: C-56317r3_chk
Verify that the RP router is configured to filter PIM join messages for any reserved multicast groups. If the RP router peering with PIM-SM routers is not configured with a PIM import policy to block join messages for reserved and any undesirable multicast groups, this is a finding.
Fix: F-60621r2_fix
RP routers that are peering with customer PIM-SM routers must implement a PIM import policy to block join messages for reserved and any undesirable multicast groups.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000025-RTR-000020
- Vuln IDs
-
- V-55757
- Rule IDs
-
- SV-70011r2_rule
Checks: C-56323r2_chk
Review the router configuration. For every protocol that affects the routing or forwarding tables (where information is exchanged between neighbors), verify that neighbor router authentication is enabled. If authentication is not enabled, this is a finding.
Fix: F-60627r1_fix
Configure authentication to be enabled for every protocol that affects the routing or forwarding tables.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000025-RTR-000085
- Vuln IDs
-
- V-55759
- Rule IDs
-
- SV-70013r2_rule
Checks: C-56325r2_chk
This requirement is not applicable for the DoDIN Backbone. For each authenticated routing protocol session, review the configured key expiration dates. If any key has a lifetime of more than 180 days, this is a finding.
Fix: F-60629r3_fix
This requirement is not applicable for the DoDIN Backbone. For each authenticated routing protocol session, configure each key to have a lifetime of no more than 180 days.
- RMF Control
- SC-5
- Severity
- H
- CCI
- CCI-001094
- Version
- SRG-NET-000026-RTR-000031
- Vuln IDs
-
- V-55761
- Rule IDs
-
- SV-70015r2_rule
Checks: C-56327r3_chk
This requirement is not applicable for the DoDIN Backbone. Review the router configuration to verify uRPF or an egress filter has been configured on all internal interfaces to restrict the router from accepting outbound IP packets that contain an illegitimate address in the source address field. If uRPF or an egress filter to restrict the router from accepting outbound IP packets that contain an illegitimate address in the source address field has not been configured on all internal interfaces in an enclave, this is a finding.
Fix: F-60631r2_fix
This requirement is not applicable for the DoDIN Backbone. Configure the router to ensure that an egress filter or uRPF is configured to restrict the router from accepting any outbound IP packet that contains an external IP address in the source field.
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- SRG-NET-000131-RTR-000035
- Vuln IDs
-
- V-55763
- Rule IDs
-
- SV-70017r2_rule
Checks: C-56329r1_chk
Review the router configuration to determine if services or functions not required for operation, or not related to router functionality (e.g., DNS, email client or server, FTP server, or web server) are enabled. If unnecessary services and functions are enabled on the router, this is a finding.
Fix: F-60633r2_fix
Remove unneeded services and functions from the router. Removal is recommended because the service or function may be inadvertently enabled otherwise. However, if removal is not possible, disable the service or function.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- SRG-NET-000168-RTR-000077
- Vuln IDs
-
- V-55765
- Rule IDs
-
- SV-70019r2_rule
Checks: C-56331r2_chk
Review the router configuration. For every protocol that affects the routing or forwarding tables (where information is exchanged between neighbors), verify that neighbor router authentication is encrypting the authentication key. If authentication is not encrypting the authentication key, this is a finding.
Fix: F-60635r1_fix
Configure routing protocol authentication to encrypt the authentication key.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- SRG-NET-000168-RTR-000078
- Vuln IDs
-
- V-55767
- Rule IDs
-
- SV-70021r2_rule
Checks: C-56333r3_chk
Review the router configuration to verify it is using a NIST-validated FIPS 140-2 message authentication code algorithm to authenticate routing protocol messages. If a NIST-validated FIPS 140-2 message authentication code algorithm is not being used to authenticate routing protocol messages, this is a finding.
Fix: F-60637r3_fix
Configure routing protocol authentication to use a NIST-validated FIPS 140-2 message authentication code algorithm.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-002385
- Version
- SRG-NET-000191-RTR-000081
- Vuln IDs
-
- V-55769
- Rule IDs
-
- SV-70023r2_rule
Checks: C-56335r2_chk
Review the router configuration. If the router is not configured to use GTSM for all Exterior Border Gateway Protocol peering sessions, this is a finding.
Fix: F-60639r2_fix
Configure all Exterior Border Gateway Protocol peering sessions to use GTSM.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000195-RTR-000084
- Vuln IDs
-
- V-55773
- Rule IDs
-
- SV-70027r2_rule
Checks: C-56339r2_chk
This requirement is not applicable for the DoDIN Backbone. Review the router configuration to determine if it will block all packets with IP options. If the router is not configured to drop all packets with IP options, this is a finding.
Fix: F-60643r2_fix
This requirement is not applicable for the DoDIN Backbone. Configure the router to drop all packets with IP options.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- SRG-NET-000235-RTR-000114
- Vuln IDs
-
- V-55779
- Rule IDs
-
- SV-70033r2_rule
Checks: C-56345r3_chk
Verify the router stops forwarding traffic or maintains the configured security policies upon the failure of the following actions: system initialization, shutdown, or system abort. If the router does not stop forwarding traffic or maintain the configured security policies upon the failure of system initialization, shutdown, or system abort, this is a finding.
Fix: F-60649r2_fix
This is a capability that would be intrinsic to the router as a result of its development and may not be configurable. If it is a configurable option, configure the router to stop forwarding traffic or maintain the configured security policies upon the failure of the following actions: system initialization, shutdown, or system abort.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000110
- Vuln IDs
-
- V-55781
- Rule IDs
-
- SV-70035r2_rule
Checks: C-56347r1_chk
Determine whether control plane protection has been implemented on the device by verifying traffic types have been classified based on importance levels and a policy has been configured to filter and rate limit the traffic according to each class. If the router does not have control plane protection implemented, this is a finding.
Fix: F-60651r2_fix
Implement control plane protection by classifying traffic types based on importance and configure filters to restrict and rate limit the traffic directed to and processed by the RP according to each class.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-RTR-000109
- Vuln IDs
-
- V-55785
- Rule IDs
-
- SV-70039r2_rule
Checks: C-56355r3_chk
This requirement is not applicable for the DoDIN Backbone. Review the router configuration to determine if the router allows only incoming communications from authorized sources to be routed to authorized destinations. If the router does not restrict incoming communications to allow only authorized sources and destinations, this is a finding.
Fix: F-60659r2_fix
This requirement is not applicable for the DoDIN Backbone. Configure the router to allow only incoming communications from authorized sources to be routed to authorized destinations.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001126
- Version
- SRG-NET-000365-RTR-000112
- Vuln IDs
-
- V-55789
- Rule IDs
-
- SV-70043r2_rule
Checks: C-56357r2_chk
Review the documentation of the router or interview the System Administrator. Verify that the router fails securely in the event of an operational failure. If it cannot fail securely, this is a finding.
Fix: F-60661r2_fix
This is a capability that would be intrinsic to the router as a result of its development and may not be configurable. If it is a configurable option, configure the device to fail securely in the event of an operational failure.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001368
- Version
- SRG-NET-000018-RTR-000001
- Vuln IDs
-
- V-78209
- Rule IDs
-
- SV-92915r1_rule
Checks: C-77765r1_chk
This requirement is not applicable for the DoDIN Backbone. Review the router configuration to verify that access control lists (ACLs) and filters are configured to allow or deny traffic for specific source and destination addresses as well as ports and protocols. These filters should be applied inbound or outbound on the appropriate external and internal interfaces. If the router is not configured to enforce approved authorizations for controlling the flow of information within the network based on organization-defined information flow control policies, this is a finding.
Fix: F-84937r1_fix
This requirement is not applicable for the DoDIN Backbone. Configure ACLs and filters to allow or deny traffic for specific source and destination addresses as well as ports and protocols. Apply the filters inbound or outbound on the appropriate external and internal interfaces. Policy-based routing can also be implemented if needed.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000195-RTR-000083
- Vuln IDs
-
- V-78211
- Rule IDs
-
- SV-92917r1_rule
Checks: C-77767r1_chk
Verify the call home service is disabled on the device. If a call home service is enabled, this is a finding.
Fix: F-84939r1_fix
Configure the network device to disable the call home service or feature.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000109
- Vuln IDs
-
- V-78213
- Rule IDs
-
- SV-92919r1_rule
Checks: C-77769r1_chk
Review the device configuration to determine if a configuration auto-loading or zero-touch deployment feature is enabled. If a configuration auto-loading feature or zero-touch deployment feature is enabled, this is a finding. Note: Auto-configuration or zero-touch deployment features can be enabled when the router is offline for the purpose of image loading or building out the configuration. In addition, this would not be applicable to the provisioning of virtual routers via a software-defined network (SDN) orchestration system.
Fix: F-84941r1_fix
Disable all configuration auto-loading or zero-touch deployment features.
- RMF Control
- SC-7
- Severity
- H
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000001
- Vuln IDs
-
- V-78215
- Rule IDs
-
- SV-92921r1_rule
Checks: C-77771r1_chk
Review the access control list (ACL) or filter for the router receive path and verify that it will only process specific management plane and control plane traffic from specific sources. If the router is not configured with a receive-path filter to restrict traffic destined to itself, this is a finding. Note: If the platform does not support the receive path filter, verify that all Layer 3 interfaces have an ingress ACL to control what packets are allowed to be destined to the router for processing.
Fix: F-84943r1_fix
Configure all routers with receive path filters to restrict traffic destined to the router.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000002
- Vuln IDs
-
- V-78217
- Rule IDs
-
- SV-92923r1_rule
Checks: C-77773r1_chk
Review the access control list (ACL) or filter for the router receive path. Verify that it will drop all fragmented ICMP packets destined to itself. If the router is not configured with a receive-path filter to drop all fragmented ICMP packets, this is a finding. Note: If the platform does not support the receive path filter, verify that all Layer 3 interfaces have an ingress ACL to control what packets are allowed to be destined to the router for processing.
Fix: F-84945r1_fix
Ensure all routers have their receive path filter configured to drop all fragmented ICMP packets.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000111
- Vuln IDs
-
- V-78219
- Rule IDs
-
- SV-92925r1_rule
Checks: C-77775r1_chk
Review the configuration to determine if gratuitous ARP is disabled on all external interfaces. If gratuitous ARP is enabled on any external interface, this is a finding.
Fix: F-84947r1_fix
Disable gratuitous ARP on all external interfaces.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000112
- Vuln IDs
-
- V-78221
- Rule IDs
-
- SV-92927r1_rule
Checks: C-77777r1_chk
Review the router configuration to determine if IP directed broadcast is enabled. If IP directed broadcast is enabled on Layer 3 interfaces, this is a finding.
Fix: F-84949r1_fix
Disable IP directed broadcasts on all Layer 3 interfaces.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000113
- Vuln IDs
-
- V-78223
- Rule IDs
-
- SV-92929r1_rule
Checks: C-77779r1_chk
Review the device configuration to determine if controls have been defined to ensure the router does not send ICMP unreachable notifications out to any external interfaces. If ICMP unreachable notifications are enabled on any external interfaces, this is a finding.
Fix: F-84951r1_fix
Disable ICMP unreachable notifications on all external interfaces.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000114
- Vuln IDs
-
- V-78225
- Rule IDs
-
- SV-92931r1_rule
Checks: C-77781r1_chk
Review the device configuration to determine if controls have been defined to ensure the router does not send ICMP Mask Reply messages out to any external interfaces. If ICMP Mask Reply messages are enabled on any external interfaces, this is a finding.
Fix: F-84953r1_fix
Disable ICMP mask replies on all external interfaces.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000115
- Vuln IDs
-
- V-78227
- Rule IDs
-
- SV-92933r1_rule
Checks: C-77783r1_chk
Review the device configuration to determine if controls have been defined to ensure the router does not send ICMP Redirect messages out to any external interfaces. If ICMP Redirect messages are enabled on any external interfaces, this is a finding.
Fix: F-84955r1_fix
Disable ICMP redirects on all external interfaces.
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000134
- Version
- SRG-NET-000078-RTR-000001
- Vuln IDs
-
- V-78229
- Rule IDs
-
- SV-92935r1_rule
Checks: C-77785r1_chk
Review the router interface access control lists (ACLs) to verify all deny statements are logged. If packets being dropped are not logged, this is a finding.
Fix: F-84957r1_fix
Configure interface ACLs to log all deny statements.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000132
- Version
- SRG-NET-000076-RTR-000001
- Vuln IDs
-
- V-78231
- Rule IDs
-
- SV-92937r1_rule
Checks: C-77787r1_chk
The router must log all packets that have been dropped via the access control list (ACL). If the router fails to log all packets that have been dropped via the ACL, this is a finding. Log output must contain an interface name as to where the packet was filtered. If the logged output does not contain an interface name as to where the packet was filtered, this is a finding.
Fix: F-84959r1_fix
Configure the router to record the interface in the log record for packets being dropped.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- SRG-NET-000077-RTR-000001
- Vuln IDs
-
- V-78233
- Rule IDs
-
- SV-92939r1_rule
Checks: C-77789r1_chk
The router must log all packets that have been dropped via the access control list. If the router fails to log all packets that have been dropped via the control list, this is a finding. Log output must contain the source IP address and port of the filtered packets. If the logged output does not contain source IP address and port of the filtered packets, this is a finding.
Fix: F-84961r1_fix
Configure the router to record the source address in the log record for packets being dropped.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000001
- Vuln IDs
-
- V-78235
- Rule IDs
-
- SV-92941r1_rule
Checks: C-77791r1_chk
Review the configuration and verify that the auxiliary port is disabled unless a secured modem providing encryption and authentication is connected to it. If the auxiliary port is not disabled or is not connected to a secured modem when it is enabled, this is a finding.
Fix: F-84963r1_fix
Disable the auxiliary port. If used for out-of-band administrative access, the port must be connected to a secured modem providing encryption and authentication.
- RMF Control
- SC-7
- Severity
- H
- CCI
- CCI-001109
- Version
- SRG-NET-000202-RTR-000001
- Vuln IDs
-
- V-78237
- Rule IDs
-
- SV-92943r1_rule
Checks: C-77793r1_chk
This requirement is not applicable for the DoDIN Backbone. Review the router configuration to verify that the access control list (ACL) or filter is configured to allow specific ports and protocols and deny all other traffic. The filter must be configured inbound on all external interfaces. If the ACL or filter is not configured to allow specific ports and protocols and deny all other traffic, this is a finding. If the filter is not configured inbound on all external interfaces, this is a finding.
Fix: F-84965r1_fix
This requirement is not applicable for the DoDIN Backbone. Configure the perimeter router to deny network traffic by default and allow network traffic by exception.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-RTR-000110
- Vuln IDs
-
- V-78239
- Rule IDs
-
- SV-92945r1_rule
Checks: C-77795r1_chk
This requirement is not applicable for the DoDIN Backbone. Review the router configuration to verify that an ingress access control list (ACL) is applied to all external interfaces. Verify that the ingress ACL is blocking packets with Bogon source addresses. If the router is not configured to block inbound packets with source Bogon IP address prefixes, this is a finding.
Fix: F-84967r1_fix
This requirement is not applicable for the DoDIN Backbone. Configure the perimeter to block inbound packets with Bogon source addresses.
- RMF Control
- AC-4
- Severity
- H
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000008
- Vuln IDs
-
- V-78241
- Rule IDs
-
- SV-92947r1_rule
Checks: C-77797r1_chk
This requirement is not applicable for the DoDIN Backbone. Review the configuration of each router interface connecting to an alternate gateway. Verify each permit statement of the ingress filter only permits packets with destination addresses of the site's NIPRNet address space or a destination address belonging to the address block assigned by the alternate gateway network service provider. If the ingress filter permits packets with addresses other than those specified, such as destination addresses of the site's NIPRNet address space or a destination address belonging to the address block assigned by the alternate gateway network service provider, this is a finding.
Fix: F-84969r1_fix
This requirement is not applicable for the DoDIN Backbone. Configure the ingress filter of the perimeter router connected to an alternate gateway to only permit packets with destination addresses of the site's NIPRNet address space or a destination address belonging to the address block assigned by the alternate gateway network service provider.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000003
- Vuln IDs
-
- V-78243
- Rule IDs
-
- SV-92949r1_rule
Checks: C-77799r1_chk
This requirement is not applicable for the DoDIN Backbone. Review the router configuration to verify that the ingress and egress filters are in accordance with DoD 8551. If the router does not filter traffic in accordance with the guidelines contained in DoD 8551, this is a finding.
Fix: F-84971r1_fix
This requirement is not applicable for the DoDIN Backbone. Configure the router to use ingress and egress ACLs to restrict traffic in accordance with the guidelines contained in DOD Instruction 8551.1 for all services and protocols required for operational commitments.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000004
- Vuln IDs
-
- V-78245
- Rule IDs
-
- SV-92951r1_rule
Checks: C-77801r1_chk
This requirement is not applicable for the DoDIN Backbone. Review the router configuration to verify that the ingress ACL is bound to the external interface in an inbound direction. If the router is not configured to filter traffic entering the network at the external interface in an inbound direction, this is a finding.
Fix: F-84973r1_fix
This requirement is not applicable for the DoDIN Backbone. Bind the ingress ACL to the external interface (inbound).
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000005
- Vuln IDs
-
- V-78247
- Rule IDs
-
- SV-92953r1_rule
Checks: C-77803r1_chk
This requirement is not applicable for the DoDIN Backbone. Review the router configuration to verify that the egress ACL is bound to the internal interface in an inbound direction. If the router is not configured to filter traffic leaving the network at the external interface in an inbound direction, this is a finding.
Fix: F-84975r1_fix
This requirement is not applicable for the DoDIN Backbone. Configure an egress ACL bound to the internal interface in an inbound direction to filter traffic leaving the network.
- RMF Control
- SC-7
- Severity
- L
- CCI
- CCI-002403
- Version
- SRG-NET-000364-RTR-000111
- Vuln IDs
-
- V-78249
- Rule IDs
-
- SV-92955r1_rule
Checks: C-77805r1_chk
This requirement is not applicable for the DoDIN Backbone. Review all router configurations to ensure LLDPs are not included in the global configuration or LLDPs are not included for each active external interface. Examples of LLDPs are Cisco Discovery Protocol (CDP), Link Layer Discovery Protocol (LLDP), and Link Layer Discovery Protocol - Media Endpoint Discovery (LLDP-MED). If LLDPs are configured globally or on any external interface, this is a finding.
Fix: F-84977r1_fix
This requirement is not applicable for the DoDIN Backbone. Disable LLDPs on all external interfaces.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-RTR-000112
- Vuln IDs
-
- V-78251
- Rule IDs
-
- SV-92957r1_rule
Checks: C-77807r1_chk
This requirement is not applicable for the DoDIN Backbone. Review the router configuration to determine if IP Proxy ARP is disabled on all external interfaces. If IP Proxy ARP is enabled on any external interface, this is a finding.
Fix: F-84979r1_fix
This requirement is not applicable for the DoDIN Backbone. Disable IP Proxy ARP on all external interfaces.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000364-RTR-000113
- Vuln IDs
-
- V-78253
- Rule IDs
-
- SV-92959r1_rule
Checks: C-77809r1_chk
This requirement is not applicable for the DoDIN Backbone. The perimeter router of the managed network must be configured with an access control list (ACL) or filter on the egress interface to block all management traffic. If management traffic is not blocked at the perimeter, this is a finding.
Fix: F-84981r1_fix
This requirement is not applicable for the DoDIN Backbone. Configure the perimeter router of the managed network with an ACL or filter on the egress interface to block all outbound management traffic.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000009
- Vuln IDs
-
- V-78255
- Rule IDs
-
- SV-92961r1_rule
Checks: C-77811r1_chk
This requirement is not applicable for the DoDIN Backbone. Review the network topology diagram to determine connectivity between the managed network and the NOC. Review the OOBM gateway router configuration to validate the path and interface that the management traffic traverses. If management traffic is not transported between the managed network and the NOC via dedicated circuit, MPLS/VPN service, or IPsec tunnel, this is a finding.
Fix: F-84983r1_fix
This requirement is not applicable for the DoDIN Backbone. Ensure that a dedicated circuit, MPLS/VPN service, or IPsec tunnel is deployed to transport management traffic between the managed network and the NOC.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000010
- Vuln IDs
-
- V-78257
- Rule IDs
-
- SV-92963r1_rule
Checks: C-77813r1_chk
This requirement is not applicable for the DoDIN Backbone. Review the network topology diagram to determine connectivity between the managed network and the NOC. Review the OOBM gateway router configuration to validate the path that the management traffic traverses. Verify that only management traffic is forwarded through the OOBM interface or IPsec tunnel. If traffic other than authorized management traffic is permitted through the OOBM interface or IPsec tunnel, this is a finding.
Fix: F-84985r1_fix
This requirement is not applicable for the DoDIN Backbone. Configure filters based on port, source IP address, and destination IP address to permit only authorized management traffic into IPsec tunnels or the OOBM interface used for forwarding management data.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000013
- Vuln IDs
-
- V-78263
- Rule IDs
-
- SV-92969r1_rule
Checks: C-77819r1_chk
This requirement is not applicable for the DoDIN Backbone. Verify that all traffic from the managed network to the management network and vice-versa is secured via IPsec tunnel. If the management traffic is not secured via IPsec tunnel, this is a finding.
Fix: F-84991r1_fix
This requirement is not applicable for the DoDIN Backbone. Ensure that all traffic from the managed network to the management network and vice-versa is secured via IPsec tunnel.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000025-RTR-000021
- Vuln IDs
-
- V-78265
- Rule IDs
-
- SV-92971r1_rule
Checks: C-77821r1_chk
Interview the ISSM and router administrator to determine if unique keys are being used. If unique keys are not being used, this is a finding.
Fix: F-84993r1_fix
Configure all eBGP routers with unique keys for each eBGP neighbor that it peers with.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001368
- Version
- SRG-NET-000018-RTR-000002
- Vuln IDs
-
- V-78267
- Rule IDs
-
- SV-92973r1_rule
Checks: C-77823r1_chk
Review the router configuration to verify that it will reject routes of any Bogon prefixes. The prefix filter must be referenced inbound on the appropriate BGP neighbor statements. If the router is not configured to reject inbound route advertisements for any Bogon prefixes, this is a finding.
Fix: F-84995r1_fix
Ensure all eBGP routers are configured to reject inbound route advertisements for any Bogon prefixes.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001368
- Version
- SRG-NET-000018-RTR-000003
- Vuln IDs
-
- V-78269
- Rule IDs
-
- SV-92975r1_rule
Checks: C-77825r1_chk
Review the router configuration to verify that it will reject routes belonging to the local AS. The prefix filter must be referenced inbound on the appropriate BGP neighbor statements. If the router is not configured to reject inbound route advertisements belonging to the local AS, this is a finding.
Fix: F-84997r1_fix
Ensure all eBGP routers are configured to reject inbound route advertisements for any prefixes belonging to the local AS.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001368
- Version
- SRG-NET-000018-RTR-000004
- Vuln IDs
-
- V-78271
- Rule IDs
-
- SV-92977r1_rule
Checks: C-77827r1_chk
Review the router configuration to verify that there are filters defined to only accept routes for prefixes that belong to specific customers. The prefix filter must be referenced inbound on the appropriate BGP neighbor statement. If the router is not configured to reject inbound route advertisements from each CE router for prefixes that are not allocated to that customer, this is a finding. Note: Routes to PE-CE links within a VPN are needed for troubleshooting end-to-end connectivity across the MPLS/IP backbone. Hence, these prefixes are an exception to this requirement.
Fix: F-84999r1_fix
Configure all eBGP routers to reject inbound route advertisements from a CE router for prefixes that are not allocated to that customer.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001368
- Version
- SRG-NET-000018-RTR-000005
- Vuln IDs
-
- V-78273
- Rule IDs
-
- SV-92979r1_rule
Checks: C-77829r1_chk
Review the router configuration to verify that there is a filter defined to only advertise routes for prefixes that belong to any customers or the local AS. The prefix filter must be referenced outbound on the appropriate BGP neighbor statements. If the router is not configured to reject outbound route advertisements that belong to any customers or the local AS, this is a finding.
Fix: F-85001r1_fix
Configure all eBGP routers to filter outbound route advertisements for prefixes that are not allocated to or belong to any customer or the local AS.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000006
- Vuln IDs
-
- V-78275
- Rule IDs
-
- SV-92981r1_rule
Checks: C-77833r1_chk
Review the router configuration to verify that there is a filter defined to block route advertisements for prefixes that belong to the IP core. The prefix filter must be referenced outbound on the appropriate BGP neighbor statements. If the router is not configured to reject outbound route advertisements that belong to the IP core, this is a finding.
Fix: F-85003r1_fix
Configure all eBGP routers to filter outbound route advertisements belonging to the IP core.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-000032
- Version
- SRG-NET-000018-RTR-000006
- Vuln IDs
-
- V-78277
- Rule IDs
-
- SV-92983r1_rule
Checks: C-77835r1_chk
Review the router configuration to verify the router is configured to deny updates received from eBGP peers that do not list their AS number as the first AS in the AS_PATH attribute. If the router is not configured to reject updates from peers that do not list their AS number as the first AS in the AS_PATH attribute, this is a finding.
Fix: F-85005r1_fix
Configure all ASBRs to deny updates received from eBGP peers that do not list their AS number as the first AS in the AS_PATH attribute.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000117
- Vuln IDs
-
- V-78279
- Rule IDs
-
- SV-92985r1_rule
Checks: C-77837r1_chk
Review the router configuration to verify that the number of received prefixes from each eBGP neighbor is controlled. If the router is not configured to control the number of prefixes received from each peer to protect against route table flooding and prefix de-aggregation attacks, this is a finding.
Fix: F-85007r1_fix
Configure all eBGP routers to use the maximum prefixes feature to protect against route table flooding and prefix de-aggregation attacks.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000118
- Vuln IDs
-
- V-78281
- Rule IDs
-
- SV-92987r1_rule
Checks: C-77839r1_chk
Review the router configuration to verify that there is a filter to reject inbound route advertisements that are greater than /24 or the least significant prefixes issued to the customer, whichever is larger. If the router is not configured to limit the prefix size on any inbound route advertisement to /24 or the least significant prefixes issued to the customer, this is a finding.
Fix: F-85009r1_fix
Ensure all eBGP routers are configured to limit the prefix size on any route advertisement to /24 or the least significant prefixes issued to the customer.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SRG-NET-000512-RTR-000001
- Vuln IDs
-
- V-78283
- Rule IDs
-
- SV-92989r1_rule
Checks: C-77841r1_chk
Review the router configuration to verify that a loopback address has been configured. Verify that a loopback interface is used as the source address for all iBGP sessions. If the router does not use its loopback address as the source address for all iBGP sessions, this is a finding.
Fix: F-85011r1_fix
Ensure that the router’s loopback address is used as the source address when originating traffic.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SRG-NET-000512-RTR-000002
- Vuln IDs
-
- V-78285
- Rule IDs
-
- SV-92991r1_rule
Checks: C-77843r1_chk
Review the router configuration to determine if it uses its loopback address as the source address for LDP peering sessions. Verify that a loopback address has been configured as shown in the following example: An MPLS router will use the LDP router ID as the source address for LDP hellos and when establishing TCP sessions with LDP peers; hence, it is necessary to verify that the LDP router ID is the same as the loopback address. By default, routers will assign the LDP router ID using the highest IP address on the router, with preference given to loopback addresses. If the router-id command is specified that overrides this default behavior, verify that it is the IP address of the designated loopback interface. If the router is not configured do use its loopback address for LDP peering, this is a finding.
Fix: F-85013r1_fix
Configure MPLS routers to use their loopback address as the source address for LDP peering sessions.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SRG-NET-000512-RTR-000003
- Vuln IDs
-
- V-78287
- Rule IDs
-
- SV-92993r1_rule
Checks: C-77845r1_chk
Review the router OSPF or IS-IS configuration. Verify that LDP will synchronize with the link-state routing protocol. If the router is not configured to synchronize IGP and LDP, this is a finding.
Fix: F-85015r1_fix
Configure the MPLS router to synchronize IGP and LDP, minimizing packet loss when an IGP adjacency is established prior to LDP peers completing label exchange.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-001095
- Version
- SRG-NET-000193-RTR-000001
- Vuln IDs
-
- V-78289
- Rule IDs
-
- SV-92995r1_rule
Checks: C-77847r1_chk
Review the router configuration to verify that the router has been configured to prevent a burst of RSVP traffic engineering signaling messages from overflowing the input queue of any neighbor core router. If the router with RSVP-TE enabled does not have message pacing configured based on the link speed and input queue size of adjacent core routers, this is a finding.
Fix: F-85017r1_fix
Ensure all routers with RSVP-TE enabled have message pacing configured that will adjust maximum burst and maximum number of RSVP messages to an output queue based on the link speed and input queue size of adjacent core routers.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-RTR-000004
- Vuln IDs
-
- V-78291
- Rule IDs
-
- SV-92997r1_rule
Checks: C-77849r1_chk
Review the router configuration to verify that TTL propagation is disabled. If the router is not configured to disable TTL propagation, this is a finding.
Fix: F-85019r1_fix
Configure LERs to disable TTL propagation.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- SRG-NET-000512-RTR-000005
- Vuln IDs
-
- V-78293
- Rule IDs
-
- SV-92999r1_rule
Checks: C-77851r1_chk
Review the design plan for deploying L3VPN and VRF-lite. Review all CE-facing interfaces and verify that the proper VRF is defined. If any VRFs are not bound to the appropriate physical or logical interface, this is a finding.
Fix: F-85021r1_fix
Configure the PE router to have each VRF bound to the appropriate physical or logical interfaces to maintain traffic separation between all MPLS L3VPNs.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- SRG-NET-000512-RTR-000006
- Vuln IDs
-
- V-78295
- Rule IDs
-
- SV-93001r1_rule
Checks: C-77853r1_chk
Verify that the correct RT is configured for each VRF. Review the design plan for MPLS/L3VPN and VRF-lite to determine what RTs have been assigned for each VRF. Review the route-target import, route-target, or route-target export statements under each configured VRF and verify that the correct RTs have been defined for each VRF. Note: Import and export route-maps are normally used when finer granularity is required. If there are VRFs configured with the wrong RT, this is a finding.
Fix: F-85023r1_fix
Configure all J-PE routers to have the correct VRF defined with the appropriate RT.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-RTR-000007
- Vuln IDs
-
- V-78297
- Rule IDs
-
- SV-93003r1_rule
Checks: C-77855r1_chk
Review the RDs that have been assigned for each VRF according to the plan provided by the ISSM. Review all VRFs configured on CE-facing interfaces and verify that the proper RD has been configured for each. If the wrong RD has been configured for any VRF, this is a finding.
Fix: F-85025r1_fix
Configure the correct RD for each VRF.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001958
- Version
- SRG-NET-000343-RTR-000001
- Vuln IDs
-
- V-78299
- Rule IDs
-
- SV-93005r1_rule
Checks: C-77857r1_chk
Review the router configuration to determine if LDP messages are being authenticated for the targeted LDP sessions. If authentication is not being used for the LDP sessions using a FIPS-approved message authentication code algorithm, this is a finding.
Fix: F-85027r1_fix
Implement authentication for all targeted LDP sessions using a FIPS-approved message authentication code algorithm.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- SRG-NET-000512-RTR-000008
- Vuln IDs
-
- V-78301
- Rule IDs
-
- SV-93007r1_rule
Checks: C-77859r1_chk
Review the ingress and egress PE router configuration for each virtual circuit that has been provisioned. Verify that the correct and unique VCID has been configured for the appropriate attachment circuit. If the correct VC ID has not been configured on both routers, this is a finding. Note: Ethernet over MPLS in VLAN mode transports Ethernet traffic from a source 802.1Q VLAN to a destination 802.1Q VLAN over a core MPLS network. The VC ID must be unique and the same on each end as it is used to connect the endpoints of the VC.
Fix: F-85029r1_fix
Assign globally unique VC IDs for each virtual circuit and configure the attachment circuits with the appropriate VC ID. Configure the same VC ID on both ends of the VC.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- SRG-NET-000512-RTR-000009
- Vuln IDs
-
- V-78303
- Rule IDs
-
- SV-93009r1_rule
Checks: C-77861r1_chk
Review the implementation plan and the VPN IDs assigned to customer VLANs for the VPLS deployment. Review the PE router configuration to verify that customer attachment circuits (i.e., VLANs) are associated to the appropriate VFI. If the attachment circuits have not been bound to VFI configured with the assigned VPN ID for each VLAN, this is a finding.
Fix: F-85031r1_fix
Assign globally unique VPN IDs for each customer VLAN using VPLS for carrier Ethernet services between multiple sites, and configure the attachment circuits to the appropriate VFI.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SRG-NET-000512-RTR-000010
- Vuln IDs
-
- V-78305
- Rule IDs
-
- SV-93011r1_rule
Checks: C-77863r1_chk
Review the PE router configuration to verify that split horizon is enabled. If it is disabled, this is a finding. Note: In a ring VPLS, split horizon is disabled so that a PE router can forward a packet received from one pseudowire to another pseudowire. To prevent the consequential loop, at least one span in the ring would not have a pseudowire for any given VPLS instance.
Fix: F-85033r1_fix
Enable split horizon on all PE routers deploying VPLS in a full-mesh configuration.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001095
- Version
- SRG-NET-000193-RTR-000002
- Vuln IDs
-
- V-78307
- Rule IDs
-
- SV-93013r1_rule
Checks: C-77865r1_chk
Review the router configuration to verify that storm control is enabled on CE-facing interfaces deploying VPLS. If storm control is not enabled at a minimum for broadcast traffic, this is a finding. Note: The threshold level can be from 0 to 100 percent of the link's bandwidth, where "0" suppresses all traffic. Most FastEthernet switching modules do not support multicast and unicast traffic storm control.
Fix: F-85035r1_fix
Configure storm control for each VPLS bridge domain. Base the suppression threshold on expected traffic rates plus some additional capacity. For example, if the peak broadcast traffic that is acceptable for a port is 10 percent, a threshold of 15 percent might be appropriate.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000119
- Vuln IDs
-
- V-78309
- Rule IDs
-
- SV-93015r1_rule
Checks: C-77867r1_chk
Review the router configuration to verify that IGMP or MLD snooping has been configured for IPv4 and IPv6 multicast traffic respectively for each VPLS bridge domain (VFI instance). If the router is not configured to implement IGMP or MLD snooping for each VPLS bridge domain, this is a finding.
Fix: F-85037r1_fix
Configure IGMP or MLD snooping for IPv4 and IPv6 multicast traffic respectively for each VPLS bridge domain.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001094
- Version
- SRG-NET-000192-RTR-000002
- Vuln IDs
-
- V-78311
- Rule IDs
-
- SV-93017r1_rule
Checks: C-77869r1_chk
Review the PE router configuration to determine if a MAC address limit has been set for each bridge domain. If a limit has not been configured, this is a finding.
Fix: F-85039r1_fix
Configure a MAC address learning limit for each VPLS bridge domain.
- RMF Control
- SC-7
- Severity
- H
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000007
- Vuln IDs
-
- V-78313
- Rule IDs
-
- SV-93019r1_rule
Checks: C-77871r1_chk
Review the router configuration to verify that an ingress ACL is applied to all CE-facing interfaces. Verify that the ingress ACL rejects and logs packets destined to the IP core address block. If the PE router is not configured to block any traffic with a destination address assigned to the IP core infrastructure, this is a finding. Note: Internet Control Message Protocol (ICMP) echo requests and traceroutes will be allowed to the edge from external adjacent peers.
Fix: F-85041r1_fix
Configure protection for the IP core to be implemented at the edges by blocking any traffic with a destination address assigned to the IP core infrastructure.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000008
- Vuln IDs
-
- V-78315
- Rule IDs
-
- SV-93021r1_rule
Checks: C-77873r1_chk
Review the router configuration to determine if uRPF loose mode is enabled on all CE-facing interfaces. If uRPF loose mode is not enabled on all CE-facing interfaces, this is a finding.
Fix: F-85043r1_fix
Enable uRPF loose mode on all CE-facing interfaces.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000195-RTR-000085
- Vuln IDs
-
- V-78317
- Rule IDs
-
- SV-93023r1_rule
Checks: C-77875r1_chk
Review the router configuration to determine if it will block all packets with IP options. If the router is not configured to drop all packets with IP options, this is a finding.
Fix: F-85045r1_fix
Configure the router to drop all packets with IP options.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-001095
- Version
- SRG-NET-000193-RTR-000113
- Vuln IDs
-
- V-78319
- Rule IDs
-
- SV-93025r1_rule
Checks: C-77877r1_chk
Review the router configuration and verify that a QoS policy has been configured to provide preferred treatment for mission-critical applications in accordance with the QoS DoDIN Technical Profile. Verify that the class-maps are configured to match on DSCP, protocols, or access control lists (ACLs) that identify traffic types based on ports. Verify that the policy-map is configured to set DSCP values for the defined class-maps in accordance with the QoS DoDIN Technical Profile. Verify that an input service policy is bound to all CE-facing interfaces. If the router is not configured to enforce a QoS policy in accordance with the QoS DoDIN Technical Profile, this is a finding.
Fix: F-85047r1_fix
Configure a QoS policy on each router in accordance with the QoS DoDIN Technical Profile.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-001095
- Version
- SRG-NET-000193-RTR-000114
- Vuln IDs
-
- V-78321
- Rule IDs
-
- SV-93027r1_rule
Checks: C-77879r1_chk
Review the router configuration and verify that a QoS policy has been configured to provide preferred treatment for mission-critical applications in accordance with the QoS DoDIN Technical Profile. Verify that the class-maps are configured to match on DSCP values that have been set at the edges. Verify that the policy map is configured to reserve the bandwidth for each traffic type as specified via the class-maps. Verify that an output service policy is bound to all interfaces. If the router is not configured to implement a QoS policy in accordance with the QoS DoDIN Technical Profile, this is a finding.
Fix: F-85049r1_fix
Configure a QoS policy on each router in accordance with the QoS DoDIN Technical Profile.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001095
- Version
- SRG-NET-000193-RTR-000109
- Vuln IDs
-
- V-78323
- Rule IDs
-
- SV-93029r1_rule
Checks: C-77881r1_chk
Review the router configuration verify that the class-maps are configured to match on DSCP, protocols, or access control lists (ACLs) that identify traffic types based on ports. Verify that the policy-map is configured to set DSCP values for the defined class-maps in accordance with the customer SLA. Verify that an input service policy is bound to all CE-facing interfaces. If the PE router does not enforce a QoS policy to ensure that all customer traffic receives forwarding treatment as specified in the SLA, this is a finding.
Fix: F-85051r1_fix
The ISSM will ensure QoS policies are configured on all the PE routers so all customer traffic receives forwarding treatment as specified in the SLA.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001095
- Version
- SRG-NET-000193-RTR-000112
- Vuln IDs
-
- V-78325
- Rule IDs
-
- SV-93031r1_rule
Checks: C-77883r1_chk
Review the router configuration and interview the System Administrator to verify that a mechanism for traffic prioritization and bandwidth reservation exists. This arrangement must ensure that sufficient capacity is available for mission-critical traffic and enforce the traffic priorities specified by the Combatant Commands/Services/Agencies. If no such scheme exists or it is not configured, this is a finding.
Fix: F-85053r1_fix
Implement a mechanism for traffic prioritization and bandwidth reservation. This mechanism must enforce the traffic priorities specified by the Combatant Commands/Services/Agencies.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000120
- Vuln IDs
-
- V-78327
- Rule IDs
-
- SV-93033r1_rule
Checks: C-77885r1_chk
Review the router configuration to determine if forwarding cache thresholds are defined. If the RP router is not configured to limit the multicast forwarding cache to ensure that its resources are not saturated, this is a finding.
Fix: F-85055r1_fix
Configure MSDP-enabled RP routers to limit the multicast forwarding cache for source-active entries.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000121
- Vuln IDs
-
- V-78329
- Rule IDs
-
- SV-93035r1_rule
Checks: C-77887r1_chk
Review the configuration of the DR to verify that it is rate limiting the number of multicast register messages. If the DR is not limiting multicast register messages, this is a finding.
Fix: F-85057r1_fix
Configure the DR to rate limit the number of multicast register messages it will allow for each (S, G) entry.
- RMF Control
- SC-7
- Severity
- L
- CCI
- CCI-002403
- Version
- SRG-NET-000364-RTR-000114
- Vuln IDs
-
- V-78331
- Rule IDs
-
- SV-93037r1_rule
Checks: C-77889r1_chk
Review the configuration of the DR to verify that it is filtering IGMP or MLD report messages, allowing hosts to join only those groups that have been approved. If the DR is not filtering IGMP or MLD report messages, this is a finding.
Fix: F-85059r1_fix
Configure the DR to filter the IGMP and MLD report messages to allow hosts to join only those multicast groups that have been approved.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-RTR-000115
- Vuln IDs
-
- V-78333
- Rule IDs
-
- SV-93039r1_rule
Checks: C-77893r1_chk
Review the configuration of the DR to verify that it is filtering IGMP or MLD report messages, allowing hosts to only join multicast groups from sources that have been approved. If the DR is not filtering IGMP or MLD report messages, this is a finding.
Fix: F-85063r1_fix
Configure the DR to filter the IGMP and MLD report messages to allow hosts to join only those multicast groups from sources that have been approved.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000122
- Vuln IDs
-
- V-78335
- Rule IDs
-
- SV-93041r1_rule
Checks: C-77895r1_chk
Review the DR configuration to verify that it is limiting the number of mroute states via IGMP or MLD. If the DR is not limiting multicast join requests via IGMP or MLD, this is a finding. Note: If both global and per-interface state limiters are configured, the limits configured for per-interface state limiters are still enforced but are constrained by the global limit.
Fix: F-85065r1_fix
Configure the DR on a global or interface basis to limit the number of mroute states resulting from IGMP or MLD membership reports.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000123
- Vuln IDs
-
- V-78337
- Rule IDs
-
- SV-93043r1_rule
Checks: C-77897r1_chk
Review the multicast last-hop router configuration to verify that the SPT switchover threshold is increased (default is "0") or set to infinity (never switch over). If any multicast router is not configured to increase the SPT threshold or set to infinity to minimalize (S, G) state, this is a finding.
Fix: F-85067r1_fix
Configure the multicast router to increase the SPT threshold or set it to infinity to minimalize (S, G) state within the multicast topology where ASM is deployed.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-RTR-000116
- Vuln IDs
-
- V-78339
- Rule IDs
-
- SV-93045r1_rule
Checks: C-77899r1_chk
Review the router configuration to determine if there is a receive path or interface filter to only accept MSDP packets from known MSDP peers. If the router is not configured to only accept MSDP packets from known MSDP peers, this is a finding.
Fix: F-85069r1_fix
Ensure the receive path or interface filter for all MSDP routers only accepts MSDP packets from known MSDP peers.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001958
- Version
- SRG-NET-000343-RTR-000002
- Vuln IDs
-
- V-78341
- Rule IDs
-
- SV-93047r1_rule
Checks: C-77901r1_chk
Review the router configuration to determine if received MSDP packets are authenticated. If the router does not require MSDP authentication, this is a finding.
Fix: F-85071r1_fix
Ensure all MSDP packets received by an MSDP router are authenticated.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001368
- Version
- SRG-NET-000018-RTR-000007
- Vuln IDs
-
- V-78343
- Rule IDs
-
- SV-93049r1_rule
Checks: C-77903r1_chk
Review the router configuration to determine if there is import policy to block source-active multicast advertisements for reserved, Martian, single-source multicast, and any other undesirable multicast groups, as well as any (S, G) states with Bogon source addresses. Verify that an inbound source-active filter is bound to each MSDP peer. Review the access lists referenced by the source-active filter to verify that bad multicast groups, auto-RP, single source multicast (SSM) groups, and advertisements from Bogon sources are blocked. If the router is not configured with an import policy to block undesirable SA multicast advertisements, this is a finding.
Fix: F-85073r1_fix
Ensure all MSDP routers implement an import policy to block multicast advertisements for reserved, martian, single-source multicast, and any other undesirable multicast groups, as well as any (S, G) states with Bogon source addresses.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001368
- Version
- SRG-NET-000018-RTR-000008
- Vuln IDs
-
- V-78345
- Rule IDs
-
- SV-93051r1_rule
Checks: C-77905r1_chk
Review the router configuration to determine if there is export policy to block local source-active multicast advertisements. Verify that an outbound source-active filter is bound to each MSDP peer. Review the access lists referenced by the source-active filters and verify that MSDP source-active messages being sent to MSDP peers do not leak advertisements that are local. If the router is not configured with an export policy to block local source-active multicast advertisements, this is a finding.
Fix: F-85075r1_fix
Ensure an export policy is implemented on all MSDP routers to avoid global visibility of local multicast (S, G) states.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001368
- Version
- SRG-NET-000018-RTR-000009
- Vuln IDs
-
- V-78347
- Rule IDs
-
- SV-93053r1_rule
Checks: C-77907r1_chk
Review the router configuration to determine if it is configured to limit the amount of source-active messages it accepts on a per-peer basis. If the router is not configured to limit the source-active messages it accepts, this is a finding.
Fix: F-85077r1_fix
Configure the MSDP router to limit the amount of source-active messages it accepts from each peer.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SRG-NET-000512-RTR-000011
- Vuln IDs
-
- V-78349
- Rule IDs
-
- SV-93055r1_rule
Checks: C-77909r1_chk
Review the router configuration to verify that a loopback address has been configured. Verify that a loopback interface is used as the source address for all MSDP packets generated by the router. If the router does not use its loopback address as the source address when originating MSDP traffic, this is a finding.
Fix: F-85079r1_fix
Ensure that the router’s loopback address is used as the source address when originating traffic.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000012
- Vuln IDs
-
- V-78351
- Rule IDs
-
- SV-93057r1_rule
Checks: C-77911r1_chk
Step 1: Verify that the managed interface has an inbound and outbound ACL configured. Step 2: Verify that the ingress ACL blocks all transit traffic—that is, any traffic not destined to the router itself. In addition, traffic accessing the managed router should be originated at the NOC. Note that the destination used by any host within the management network to access the managed router must be via the management interface. The loopback should not be a valid address since these prefixes would not be advertised into the management network IGP domain. This could only be possible if the managed network elements had an IGP adjacency with the managed network, which should not be the case. Step 3: Verify that the egress ACL blocks any traffic not originated by the managed router. In addition, traffic egressing the management interface must be destined to the NOC. Caveat: This requirement is only applicable if the management interface connected to the OOBM access switch is a routed interface. If the management interface is a true OOBM interface, this requirement is not applicable. If the router does not restrict traffic that ingresses and egresses the management interface, this is a finding.
Fix: F-85081r1_fix
If the management interface is a routed interface, it must be configured with both an ingress and egress ACL. The ingress ACL should block any transit traffic, while the egress ACL should block any traffic that was not originated by the managed network device.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000011
- Vuln IDs
-
- V-78357
- Rule IDs
-
- SV-93063r1_rule
Checks: C-77919r2_chk
This requirement is not applicable for the DoDIN Backbone. Review the access control list (ACL) or filter for the router receive path. Verify that only traffic sourced from the OOBM network or the NOC is allowed to access the router. If the router does not block any traffic destined to itself that is not sourced from the OOBM network or the NOC, this is a finding. Note: If the platform does not support the receive path filter, verify that all non-OOBM interfaces have an ingress ACL to restrict access to that interface address or any of the router’s loopback addresses to only traffic sourced from the management network. An exception would be to allow packets destined to these interfaces used for troubleshooting, such as ping and traceroute.
Fix: F-85089r1_fix
This requirement is not applicable for the DoDIN Backbone. Ensure that traffic from the managed network is not able to access the OOBM gateway router using either receive path or interface ingress ACLs.