Router Security Requirements Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates ✎ 3
Comparison against the immediately-prior release (V3R3). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Content changes 3
- V-78273 Medium check The BGP router must be configured to reject outbound route advertisements for any prefixes that do not belong to any customers or the local autonomous system (AS).
- V-78281 Low check The BGP router must be configured to limit the prefix size on any inbound route advertisement to /24 or the least significant prefixes issued to the customer.
- V-92243 Low check The BGP router must be configured to reject route advertisements from CE routers with an originating AS in the AS_PATH attribute that does not belong to that customer.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000002
- Vuln IDs
-
- V-55721
- Rule IDs
-
- SV-69975r2_rule
Checks: C-56287r3_chk
Verify each router enforces approved authorizations for controlling the flow of information between interconnected networks in accordance with applicable policy. If the router does not enforce approved authorizations for controlling the flow of information between interconnected networks in accordance with applicable policy, this is a finding.
Fix: F-60591r1_fix
Configure the router to enforce approved authorizations for controlling the flow of information between interconnected networks in accordance with applicable policy.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000003
- Vuln IDs
-
- V-55723
- Rule IDs
-
- SV-69977r2_rule
Checks: C-56289r2_chk
If IPv4 or IPv6 multicast routing is enabled, verify all interfaces enabled for PIM are documented in the network's multicast topology diagram. Review the router configuration to determine if multicast routing is enabled and which interfaces are enabled for PIM. If an interface is not required to support multicast routing and it is enabled, this is a finding.
Fix: F-60593r1_fix
Document all enabled interfaces for PIM in the network's multicast topology diagram. Disable support for PIM on interfaces that are not required to support it.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000004
- Vuln IDs
-
- V-55727
- Rule IDs
-
- SV-69981r2_rule
Checks: C-56293r2_chk
This requirement is not applicable for the DoDIN Backbone. Review the multicast topology diagram and determine if router interfaces are enabled for IPv4 or IPv6 multicast routing. If the router is enabled for multicast routing, verify all interfaces enabled for PIM have a neighbor filter bound to the interface. The neighbor filter must only accept PIM control plane traffic from the documented PIM neighbors. If PIM neighbor filters are not bound to all interfaces that have PIM enabled, this is a finding.
Fix: F-60597r2_fix
This requirement is not applicable for the DoDIN Backbone. Configure neighbor filters to only accept PIM control plane traffic from documented PIM neighbors. Bind neighbor filters to all PIM enabled interfaces.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000005
- Vuln IDs
-
- V-55729
- Rule IDs
-
- SV-69983r3_rule
Checks: C-56295r2_chk
Review the router configuration and verify that admin-scope multicast traffic is blocked at the external edge. If the router is not configured to establish boundaries for administratively scoped multicast traffic, this is a finding.
Fix: F-60599r2_fix
Step 1: Configure the ACL to deny packets with multicast administratively scoped destination addresses. Step 2: Apply the multicast boundary at the appropriate interfaces.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000007
- Vuln IDs
-
- V-55731
- Rule IDs
-
- SV-69985r3_rule
Checks: C-56297r3_chk
Review the router configuration. If an interface is not being used but is configured or enabled, this is a finding.
Fix: F-60601r3_fix
Delete inactive sub-interfaces and disable and delete the configuration of any inactive ports on the router.
- RMF Control
- AC-4
- Severity
- H
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000009
- Vuln IDs
-
- V-55733
- Rule IDs
-
- SV-69987r3_rule
Checks: C-56301r2_chk
This requirement is not applicable for the DoDIN Backbone. Review the configuration of the router connecting to the alternate gateway. Verify there are no BGP neighbors configured to the remote AS that belongs to the alternate gateway service provider. If there are BGP neighbors connecting the remote AS of the alternate gateway service provider, this is a finding.
Fix: F-60603r2_fix
This requirement is not applicable for the DoDIN Backbone. Configure a static route on the perimeter router to reach the AS of a router connecting to an alternate gateway.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000010
- Vuln IDs
-
- V-55735
- Rule IDs
-
- SV-69989r3_rule
Checks: C-56303r4_chk
This requirement is not applicable for the DoDIN Backbone. Review the configuration of the router connecting to the alternate gateway and verify that redistribution of static routes to the alternate gateway is not occurring. If the static routes to the alternate gateway are being redistributed into BGP or any IGP peering with a NIPRNet gateway or another autonomous system, this is a finding.
Fix: F-60607r2_fix
This requirement is not applicable for the DoDIN Backbone. Configure the router so that static routes are not redistributed to an alternate gateway into either an Exterior Gateway Protocol or Interior Gateway Protocol to the NIPRNet or to other autonomous systems.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000011
- Vuln IDs
-
- V-55739
- Rule IDs
-
- SV-69993r2_rule
Checks: C-56305r2_chk
This requirement is not applicable for the DoDIN Backbone. Verify that the OOBM interface is an adjacency in the Interior Gateway Protocol routing domain for the management network. If the router does not enforce that Interior Gateway Protocol instances configured on the OOBM gateway router peer only with their own routing domain, this is a finding.
Fix: F-60609r2_fix
This requirement is not applicable for the DoDIN Backbone. Configure the router to enforce that Interior Gateway Protocol instances configured on the OOBM gateway router peer only with their own routing domain.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000012
- Vuln IDs
-
- V-55741
- Rule IDs
-
- SV-69995r2_rule
Checks: C-56307r2_chk
This requirement is not applicable for the DoDIN Backbone. Verify the Interior Gateway Protocol instance used for the managed network does not redistribute routes into the Interior Gateway Protocol instance used for the management network, and vice versa. If the Interior Gateway Protocol instance used for the managed network redistributes routes into the Interior Gateway Protocol instance used for the management network, or vice versa, this is a finding.
Fix: F-60613r2_fix
This requirement is not applicable for the DoDIN Backbone. Configure the Interior Gateway Protocol instance used for the managed network to prohibit redistribution of routes into the Interior Gateway Protocol instance used for the management network, and vice versa.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000013
- Vuln IDs
-
- V-55747
- Rule IDs
-
- SV-70001r3_rule
Checks: C-56313r3_chk
Verify that the RP router is configured to filter PIM register messages. If the RP router peering with PIM-SM routers is not configured with a PIM import policy to block registration messages for any undesirable multicast groups and sources, this is a finding.
Fix: F-60617r3_fix
Configure the RP router to filter PIM register messages received from a multicast DR for any undesirable multicast groups or sources.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000014
- Vuln IDs
-
- V-55749
- Rule IDs
-
- SV-70003r3_rule
Checks: C-56317r4_chk
Verify that the RP router is configured to filter PIM register messages. Note: Alternative is to configure all designated routers to filter IGMP Membership Report (a.k.a join) messages received from hosts. If the RP router peering with PIM-SM routers is not configured with a PIM import policy to block registration messages for any undesirable multicast groups and Bogon sources, this is a finding.
Fix: F-60621r2_fix
RP routers that are peering with customer PIM-SM routers must implement a PIM import policy to block join messages for reserved and any undesirable multicast groups.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000025-RTR-000020
- Vuln IDs
-
- V-55757
- Rule IDs
-
- SV-70011r2_rule
Checks: C-56323r2_chk
Review the router configuration. For every protocol that affects the routing or forwarding tables (where information is exchanged between neighbors), verify that neighbor router authentication is enabled. If authentication is not enabled, this is a finding.
Fix: F-60627r1_fix
Configure authentication to be enabled for every protocol that affects the routing or forwarding tables.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000025-RTR-000085
- Vuln IDs
-
- V-55759
- Rule IDs
-
- SV-70013r2_rule
Checks: C-56325r2_chk
This requirement is not applicable for the DoDIN Backbone. For each authenticated routing protocol session, review the configured key expiration dates. If any key has a lifetime of more than 180 days, this is a finding.
Fix: F-60629r3_fix
This requirement is not applicable for the DoDIN Backbone. For each authenticated routing protocol session, configure each key to have a lifetime of no more than 180 days.
- RMF Control
- SC-5
- Severity
- H
- CCI
- CCI-001094
- Version
- SRG-NET-000026-RTR-000031
- Vuln IDs
-
- V-55761
- Rule IDs
-
- SV-70015r3_rule
Checks: C-56327r4_chk
This requirement is not applicable for the DoDIN Backbone. Review the router configuration to verify uRPF or an egress filter has been configured on all internal interfaces to restrict the router from accepting outbound IP packets that contain an illegitimate address in the source address field. If uRPF or an egress filter to restrict the router from accepting outbound IP packets that contain an illegitimate address in the source address field has not been configured on all internal interfaces, this is a finding.
Fix: F-60631r2_fix
This requirement is not applicable for the DoDIN Backbone. Configure the router to ensure that an egress filter or uRPF is configured to restrict the router from accepting any outbound IP packet that contains an external IP address in the source field.
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- SRG-NET-000131-RTR-000035
- Vuln IDs
-
- V-55763
- Rule IDs
-
- SV-70017r2_rule
Checks: C-56329r1_chk
Review the router configuration to determine if services or functions not required for operation, or not related to router functionality (e.g., DNS, email client or server, FTP server, or web server) are enabled. If unnecessary services and functions are enabled on the router, this is a finding.
Fix: F-60633r2_fix
Remove unneeded services and functions from the router. Removal is recommended because the service or function may be inadvertently enabled otherwise. However, if removal is not possible, disable the service or function.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- SRG-NET-000168-RTR-000077
- Vuln IDs
-
- V-55765
- Rule IDs
-
- SV-70019r2_rule
Checks: C-56331r2_chk
Review the router configuration. For every protocol that affects the routing or forwarding tables (where information is exchanged between neighbors), verify that neighbor router authentication is encrypting the authentication key. If authentication is not encrypting the authentication key, this is a finding.
Fix: F-60635r1_fix
Configure routing protocol authentication to encrypt the authentication key.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- SRG-NET-000168-RTR-000078
- Vuln IDs
-
- V-55767
- Rule IDs
-
- SV-70021r3_rule
Checks: C-56333r5_chk
Review the router configuration to verify it is using a NIST-validated FIPS 198-1 message authentication code algorithm to authenticate routing protocol messages. If a NIST-validated FIPS 198-1 message authentication code algorithm is not being used to authenticate routing protocol messages, this is a finding.
Fix: F-60637r4_fix
Configure routing protocol authentication to use a NIST-validated FIPS 198-1 message authentication code algorithm.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-002385
- Version
- SRG-NET-000191-RTR-000081
- Vuln IDs
-
- V-55769
- Rule IDs
-
- SV-70023r3_rule
Checks: C-56335r2_chk
Review the router configuration. If the router is not configured to use GTSM for all Exterior Border Gateway Protocol peering sessions, this is a finding.
Fix: F-60639r2_fix
Configure all Exterior Border Gateway Protocol peering sessions to use GTSM.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000195-RTR-000084
- Vuln IDs
-
- V-55773
- Rule IDs
-
- SV-70027r2_rule
Checks: C-56339r2_chk
This requirement is not applicable for the DoDIN Backbone. Review the router configuration to determine if it will block all packets with IP options. If the router is not configured to drop all packets with IP options, this is a finding.
Fix: F-60643r2_fix
This requirement is not applicable for the DoDIN Backbone. Configure the router to drop all packets with IP options.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- SRG-NET-000235-RTR-000114
- Vuln IDs
-
- V-55779
- Rule IDs
-
- SV-70033r2_rule
Checks: C-56345r3_chk
Verify the router stops forwarding traffic or maintains the configured security policies upon the failure of the following actions: system initialization, shutdown, or system abort. If the router does not stop forwarding traffic or maintain the configured security policies upon the failure of system initialization, shutdown, or system abort, this is a finding.
Fix: F-60649r2_fix
This is a capability that would be intrinsic to the router as a result of its development and may not be configurable. If it is a configurable option, configure the router to stop forwarding traffic or maintain the configured security policies upon the failure of the following actions: system initialization, shutdown, or system abort.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000110
- Vuln IDs
-
- V-55781
- Rule IDs
-
- SV-70035r2_rule
Checks: C-56347r1_chk
Determine whether control plane protection has been implemented on the device by verifying traffic types have been classified based on importance levels and a policy has been configured to filter and rate limit the traffic according to each class. If the router does not have control plane protection implemented, this is a finding.
Fix: F-60651r2_fix
Implement control plane protection by classifying traffic types based on importance and configure filters to restrict and rate limit the traffic directed to and processed by the RP according to each class.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-RTR-000109
- Vuln IDs
-
- V-55785
- Rule IDs
-
- SV-70039r2_rule
Checks: C-56355r3_chk
This requirement is not applicable for the DoDIN Backbone. Review the router configuration to determine if the router allows only incoming communications from authorized sources to be routed to authorized destinations. If the router does not restrict incoming communications to allow only authorized sources and destinations, this is a finding.
Fix: F-60659r2_fix
This requirement is not applicable for the DoDIN Backbone. Configure the router to allow only incoming communications from authorized sources to be routed to authorized destinations.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001126
- Version
- SRG-NET-000365-RTR-000112
- Vuln IDs
-
- V-55789
- Rule IDs
-
- SV-70043r2_rule
Checks: C-56357r2_chk
Review the documentation of the router or interview the System Administrator. Verify that the router fails securely in the event of an operational failure. If it cannot fail securely, this is a finding.
Fix: F-60661r2_fix
This is a capability that would be intrinsic to the router as a result of its development and may not be configurable. If it is a configurable option, configure the device to fail securely in the event of an operational failure.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001368
- Version
- SRG-NET-000018-RTR-000001
- Vuln IDs
-
- V-78209
- Rule IDs
-
- SV-92915r1_rule
Checks: C-77765r1_chk
This requirement is not applicable for the DoDIN Backbone. Review the router configuration to verify that access control lists (ACLs) and filters are configured to allow or deny traffic for specific source and destination addresses as well as ports and protocols. These filters should be applied inbound or outbound on the appropriate external and internal interfaces. If the router is not configured to enforce approved authorizations for controlling the flow of information within the network based on organization-defined information flow control policies, this is a finding.
Fix: F-84937r1_fix
This requirement is not applicable for the DoDIN Backbone. Configure ACLs and filters to allow or deny traffic for specific source and destination addresses as well as ports and protocols. Apply the filters inbound or outbound on the appropriate external and internal interfaces. Policy-based routing can also be implemented if needed.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000195-RTR-000083
- Vuln IDs
-
- V-78211
- Rule IDs
-
- SV-92917r1_rule
Checks: C-77767r1_chk
Verify the call home service is disabled on the device. If a call home service is enabled, this is a finding.
Fix: F-84939r1_fix
Configure the network device to disable the call home service or feature.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000109
- Vuln IDs
-
- V-78213
- Rule IDs
-
- SV-92919r1_rule
Checks: C-77769r1_chk
Review the device configuration to determine if a configuration auto-loading or zero-touch deployment feature is enabled. If a configuration auto-loading feature or zero-touch deployment feature is enabled, this is a finding. Note: Auto-configuration or zero-touch deployment features can be enabled when the router is offline for the purpose of image loading or building out the configuration. In addition, this would not be applicable to the provisioning of virtual routers via a software-defined network (SDN) orchestration system.
Fix: F-84941r1_fix
Disable all configuration auto-loading or zero-touch deployment features.
- RMF Control
- SC-7
- Severity
- H
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000001
- Vuln IDs
-
- V-78215
- Rule IDs
-
- SV-92921r2_rule
Checks: C-77771r1_chk
Review the access control list (ACL) or filter for the router receive path and verify that it will only process specific management plane and control plane traffic from specific sources. If the router is not configured with a receive-path filter to restrict traffic destined to itself, this is a finding. Note: If the platform does not support the receive path filter, verify that all Layer 3 interfaces have an ingress ACL to control what packets are allowed to be destined to the router for processing.
Fix: F-84943r1_fix
Configure all routers with receive path filters to restrict traffic destined to the router.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000002
- Vuln IDs
-
- V-78217
- Rule IDs
-
- SV-92923r1_rule
Checks: C-77773r1_chk
Review the access control list (ACL) or filter for the router receive path. Verify that it will drop all fragmented ICMP packets destined to itself. If the router is not configured with a receive-path filter to drop all fragmented ICMP packets, this is a finding. Note: If the platform does not support the receive path filter, verify that all Layer 3 interfaces have an ingress ACL to control what packets are allowed to be destined to the router for processing.
Fix: F-84945r1_fix
Ensure all routers have their receive path filter configured to drop all fragmented ICMP packets.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000111
- Vuln IDs
-
- V-78219
- Rule IDs
-
- SV-92925r1_rule
Checks: C-77775r1_chk
Review the configuration to determine if gratuitous ARP is disabled on all external interfaces. If gratuitous ARP is enabled on any external interface, this is a finding.
Fix: F-84947r1_fix
Disable gratuitous ARP on all external interfaces.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000112
- Vuln IDs
-
- V-78221
- Rule IDs
-
- SV-92927r1_rule
Checks: C-77777r1_chk
Review the router configuration to determine if IP directed broadcast is enabled. If IP directed broadcast is enabled on Layer 3 interfaces, this is a finding.
Fix: F-84949r1_fix
Disable IP directed broadcasts on all Layer 3 interfaces.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000113
- Vuln IDs
-
- V-78223
- Rule IDs
-
- SV-92929r1_rule
Checks: C-77779r1_chk
Review the device configuration to determine if controls have been defined to ensure the router does not send ICMP unreachable notifications out to any external interfaces. If ICMP unreachable notifications are enabled on any external interfaces, this is a finding.
Fix: F-84951r1_fix
Disable ICMP unreachable notifications on all external interfaces.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000114
- Vuln IDs
-
- V-78225
- Rule IDs
-
- SV-92931r1_rule
Checks: C-77781r1_chk
Review the device configuration to determine if controls have been defined to ensure the router does not send ICMP Mask Reply messages out to any external interfaces. If ICMP Mask Reply messages are enabled on any external interfaces, this is a finding.
Fix: F-84953r1_fix
Disable ICMP mask replies on all external interfaces.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000115
- Vuln IDs
-
- V-78227
- Rule IDs
-
- SV-92933r1_rule
Checks: C-77783r1_chk
Review the device configuration to determine if controls have been defined to ensure the router does not send ICMP Redirect messages out to any external interfaces. If ICMP Redirect messages are enabled on any external interfaces, this is a finding.
Fix: F-84955r1_fix
Disable ICMP redirects on all external interfaces.
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000134
- Version
- SRG-NET-000078-RTR-000001
- Vuln IDs
-
- V-78229
- Rule IDs
-
- SV-92935r1_rule
Checks: C-77785r1_chk
Review the router interface access control lists (ACLs) to verify all deny statements are logged. If packets being dropped are not logged, this is a finding.
Fix: F-84957r1_fix
Configure interface ACLs to log all deny statements.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000132
- Version
- SRG-NET-000076-RTR-000001
- Vuln IDs
-
- V-78231
- Rule IDs
-
- SV-92937r1_rule
Checks: C-77787r1_chk
The router must log all packets that have been dropped via the access control list (ACL). If the router fails to log all packets that have been dropped via the ACL, this is a finding. Log output must contain an interface name as to where the packet was filtered. If the logged output does not contain an interface name as to where the packet was filtered, this is a finding.
Fix: F-84959r1_fix
Configure the router to record the interface in the log record for packets being dropped.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- SRG-NET-000077-RTR-000001
- Vuln IDs
-
- V-78233
- Rule IDs
-
- SV-92939r1_rule
Checks: C-77789r1_chk
The router must log all packets that have been dropped via the access control list. If the router fails to log all packets that have been dropped via the control list, this is a finding. Log output must contain the source IP address and port of the filtered packets. If the logged output does not contain source IP address and port of the filtered packets, this is a finding.
Fix: F-84961r1_fix
Configure the router to record the source address in the log record for packets being dropped.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000001
- Vuln IDs
-
- V-78235
- Rule IDs
-
- SV-92941r1_rule
Checks: C-77791r1_chk
Review the configuration and verify that the auxiliary port is disabled unless a secured modem providing encryption and authentication is connected to it. If the auxiliary port is not disabled or is not connected to a secured modem when it is enabled, this is a finding.
Fix: F-84963r1_fix
Disable the auxiliary port. If used for out-of-band administrative access, the port must be connected to a secured modem providing encryption and authentication.
- RMF Control
- SC-7
- Severity
- H
- CCI
- CCI-001109
- Version
- SRG-NET-000202-RTR-000001
- Vuln IDs
-
- V-78237
- Rule IDs
-
- SV-92943r1_rule
Checks: C-77793r1_chk
This requirement is not applicable for the DoDIN Backbone. Review the router configuration to verify that the access control list (ACL) or filter is configured to allow specific ports and protocols and deny all other traffic. The filter must be configured inbound on all external interfaces. If the ACL or filter is not configured to allow specific ports and protocols and deny all other traffic, this is a finding. If the filter is not configured inbound on all external interfaces, this is a finding.
Fix: F-84965r1_fix
This requirement is not applicable for the DoDIN Backbone. Configure the perimeter router to deny network traffic by default and allow network traffic by exception.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-RTR-000110
- Vuln IDs
-
- V-78239
- Rule IDs
-
- SV-92945r2_rule
Checks: C-77795r2_chk
This requirement is not applicable for the DoDIN Backbone. Review the router configuration to verify that an ingress access control list (ACL) is applied to all external interfaces. Verify that the ingress ACL is blocking packets with Bogon source addresses. If the router is not configured to block inbound packets with source Bogon IP address prefixes, this is a finding. External Interfaces connected to the NIPRNet or SIPRNet Review the inbound ACLs on external facing interfaces attached to the NIPRnet or SIPRnet to validate access control lists are configured to block inbound packets with IP sources addresses as documented in RFC5735 and RFC6598. External Interfaces connected to a commercial ISP or other non-DoD network Review the inbound ACLs on external facing interfaces validate access control lists are configured to block inbound packets with IP sources addresses as documented in RFC5735 and RFC6598 as well as address space that has been allocated to the RIRs but not assigned by the RIR to an ISP or other enterprise network. The full list of bogons can be found at the following link: https://www.team-cymru.org/Services/Bogons/fullbogons-ipv4.txt
Fix: F-84967r1_fix
This requirement is not applicable for the DoDIN Backbone. Configure the perimeter to block inbound packets with Bogon source addresses.
- RMF Control
- AC-4
- Severity
- H
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000008
- Vuln IDs
-
- V-78241
- Rule IDs
-
- SV-92947r1_rule
Checks: C-77797r1_chk
This requirement is not applicable for the DoDIN Backbone. Review the configuration of each router interface connecting to an alternate gateway. Verify each permit statement of the ingress filter only permits packets with destination addresses of the site's NIPRNet address space or a destination address belonging to the address block assigned by the alternate gateway network service provider. If the ingress filter permits packets with addresses other than those specified, such as destination addresses of the site's NIPRNet address space or a destination address belonging to the address block assigned by the alternate gateway network service provider, this is a finding.
Fix: F-84969r1_fix
This requirement is not applicable for the DoDIN Backbone. Configure the ingress filter of the perimeter router connected to an alternate gateway to only permit packets with destination addresses of the site's NIPRNet address space or a destination address belonging to the address block assigned by the alternate gateway network service provider.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000003
- Vuln IDs
-
- V-78243
- Rule IDs
-
- SV-92949r2_rule
Checks: C-77799r2_chk
This requirement is not applicable for the DoDIN Backbone. Review the router configuration to verify that the ingress filter is in accordance with DoD 8551. If the router does not filter traffic in accordance with the guidelines contained in DoD 8551, this is a finding.
Fix: F-84971r2_fix
This requirement is not applicable for the DoDIN Backbone. Configure the router to use ingress ACLs to restrict traffic in accordance with the guidelines contained in DOD Instruction 8551.1 for all services and protocols required for operational commitments.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000004
- Vuln IDs
-
- V-78245
- Rule IDs
-
- SV-92951r1_rule
Checks: C-77801r1_chk
This requirement is not applicable for the DoDIN Backbone. Review the router configuration to verify that the ingress ACL is bound to the external interface in an inbound direction. If the router is not configured to filter traffic entering the network at the external interface in an inbound direction, this is a finding.
Fix: F-84973r1_fix
This requirement is not applicable for the DoDIN Backbone. Bind the ingress ACL to the external interface (inbound).
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000005
- Vuln IDs
-
- V-78247
- Rule IDs
-
- SV-92953r2_rule
Checks: C-77803r2_chk
This requirement is not applicable for the DoDIN Backbone. Review the router configuration to verify that the egress ACL is bound to the internal interface in an inbound direction. If the router is not configured to filter traffic leaving the network at the internal interface in an inbound direction, this is a finding.
Fix: F-84975r1_fix
This requirement is not applicable for the DoDIN Backbone. Configure an egress ACL bound to the internal interface in an inbound direction to filter traffic leaving the network.
- RMF Control
- SC-7
- Severity
- L
- CCI
- CCI-002403
- Version
- SRG-NET-000364-RTR-000111
- Vuln IDs
-
- V-78249
- Rule IDs
-
- SV-92955r1_rule
Checks: C-77805r1_chk
This requirement is not applicable for the DoDIN Backbone. Review all router configurations to ensure LLDPs are not included in the global configuration or LLDPs are not included for each active external interface. Examples of LLDPs are Cisco Discovery Protocol (CDP), Link Layer Discovery Protocol (LLDP), and Link Layer Discovery Protocol - Media Endpoint Discovery (LLDP-MED). If LLDPs are configured globally or on any external interface, this is a finding.
Fix: F-84977r1_fix
This requirement is not applicable for the DoDIN Backbone. Disable LLDPs on all external interfaces.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-RTR-000112
- Vuln IDs
-
- V-78251
- Rule IDs
-
- SV-92957r1_rule
Checks: C-77807r1_chk
This requirement is not applicable for the DoDIN Backbone. Review the router configuration to determine if IP Proxy ARP is disabled on all external interfaces. If IP Proxy ARP is enabled on any external interface, this is a finding.
Fix: F-84979r1_fix
This requirement is not applicable for the DoDIN Backbone. Disable IP Proxy ARP on all external interfaces.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000364-RTR-000113
- Vuln IDs
-
- V-78253
- Rule IDs
-
- SV-92959r1_rule
Checks: C-77809r1_chk
This requirement is not applicable for the DoDIN Backbone. The perimeter router of the managed network must be configured with an access control list (ACL) or filter on the egress interface to block all management traffic. If management traffic is not blocked at the perimeter, this is a finding.
Fix: F-84981r1_fix
This requirement is not applicable for the DoDIN Backbone. Configure the perimeter router of the managed network with an ACL or filter on the egress interface to block all outbound management traffic.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000009
- Vuln IDs
-
- V-78255
- Rule IDs
-
- SV-92961r1_rule
Checks: C-77811r1_chk
This requirement is not applicable for the DoDIN Backbone. Review the network topology diagram to determine connectivity between the managed network and the NOC. Review the OOBM gateway router configuration to validate the path and interface that the management traffic traverses. If management traffic is not transported between the managed network and the NOC via dedicated circuit, MPLS/VPN service, or IPsec tunnel, this is a finding.
Fix: F-84983r1_fix
This requirement is not applicable for the DoDIN Backbone. Ensure that a dedicated circuit, MPLS/VPN service, or IPsec tunnel is deployed to transport management traffic between the managed network and the NOC.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000010
- Vuln IDs
-
- V-78257
- Rule IDs
-
- SV-92963r1_rule
Checks: C-77813r1_chk
This requirement is not applicable for the DoDIN Backbone. Review the network topology diagram to determine connectivity between the managed network and the NOC. Review the OOBM gateway router configuration to validate the path that the management traffic traverses. Verify that only management traffic is forwarded through the OOBM interface or IPsec tunnel. If traffic other than authorized management traffic is permitted through the OOBM interface or IPsec tunnel, this is a finding.
Fix: F-84985r1_fix
This requirement is not applicable for the DoDIN Backbone. Configure filters based on port, source IP address, and destination IP address to permit only authorized management traffic into IPsec tunnels or the OOBM interface used for forwarding management data.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000013
- Vuln IDs
-
- V-78263
- Rule IDs
-
- SV-92969r1_rule
Checks: C-77819r1_chk
This requirement is not applicable for the DoDIN Backbone. Verify that all traffic from the managed network to the management network and vice-versa is secured via IPsec tunnel. If the management traffic is not secured via IPsec tunnel, this is a finding.
Fix: F-84991r1_fix
This requirement is not applicable for the DoDIN Backbone. Ensure that all traffic from the managed network to the management network and vice-versa is secured via IPsec tunnel.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000025-RTR-000021
- Vuln IDs
-
- V-78265
- Rule IDs
-
- SV-92971r1_rule
Checks: C-77821r1_chk
Interview the ISSM and router administrator to determine if unique keys are being used. If unique keys are not being used, this is a finding.
Fix: F-84993r1_fix
Configure all eBGP routers with unique keys for each eBGP neighbor that it peers with.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001368
- Version
- SRG-NET-000018-RTR-000002
- Vuln IDs
-
- V-78267
- Rule IDs
-
- SV-92973r1_rule
Checks: C-77823r1_chk
Review the router configuration to verify that it will reject routes of any Bogon prefixes. The prefix filter must be referenced inbound on the appropriate BGP neighbor statements. If the router is not configured to reject inbound route advertisements for any Bogon prefixes, this is a finding.
Fix: F-84995r1_fix
Ensure all eBGP routers are configured to reject inbound route advertisements for any Bogon prefixes.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001368
- Version
- SRG-NET-000018-RTR-000003
- Vuln IDs
-
- V-78269
- Rule IDs
-
- SV-92975r1_rule
Checks: C-77825r1_chk
Review the router configuration to verify that it will reject routes belonging to the local AS. The prefix filter must be referenced inbound on the appropriate BGP neighbor statements. If the router is not configured to reject inbound route advertisements belonging to the local AS, this is a finding.
Fix: F-84997r1_fix
Ensure all eBGP routers are configured to reject inbound route advertisements for any prefixes belonging to the local AS.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001368
- Version
- SRG-NET-000018-RTR-000004
- Vuln IDs
-
- V-78271
- Rule IDs
-
- SV-92977r1_rule
Checks: C-77827r1_chk
Review the router configuration to verify that there are filters defined to only accept routes for prefixes that belong to specific customers. The prefix filter must be referenced inbound on the appropriate BGP neighbor statement. If the router is not configured to reject inbound route advertisements from each CE router for prefixes that are not allocated to that customer, this is a finding. Note: Routes to PE-CE links within a VPN are needed for troubleshooting end-to-end connectivity across the MPLS/IP backbone. Hence, these prefixes are an exception to this requirement.
Fix: F-84999r1_fix
Configure all eBGP routers to reject inbound route advertisements from a CE router for prefixes that are not allocated to that customer.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001368
- Version
- SRG-NET-000018-RTR-000005
- Vuln IDs
-
- V-78273
- Rule IDs
-
- SV-92979r2_rule
Checks: C-77829r2_chk
This requirement is not applicable for the DODIN Backbone. Review the router configuration to verify that there is a filter defined to only advertise routes for prefixes that belong to any customers or the local AS. The prefix filter must be referenced outbound on the appropriate BGP neighbor statements. If the router is not configured to reject outbound route advertisements that belong to any customers or the local AS, this is a finding.
Fix: F-85001r1_fix
Configure all eBGP routers to filter outbound route advertisements for prefixes that are not allocated to or belong to any customer or the local AS.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000006
- Vuln IDs
-
- V-78275
- Rule IDs
-
- SV-92981r1_rule
Checks: C-77833r1_chk
Review the router configuration to verify that there is a filter defined to block route advertisements for prefixes that belong to the IP core. The prefix filter must be referenced outbound on the appropriate BGP neighbor statements. If the router is not configured to reject outbound route advertisements that belong to the IP core, this is a finding.
Fix: F-85003r1_fix
Configure all eBGP routers to filter outbound route advertisements belonging to the IP core.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-000032
- Version
- SRG-NET-000018-RTR-000006
- Vuln IDs
-
- V-78277
- Rule IDs
-
- SV-92983r1_rule
Checks: C-77835r1_chk
Review the router configuration to verify the router is configured to deny updates received from eBGP peers that do not list their AS number as the first AS in the AS_PATH attribute. If the router is not configured to reject updates from peers that do not list their AS number as the first AS in the AS_PATH attribute, this is a finding.
Fix: F-85005r1_fix
Configure all ASBRs to deny updates received from eBGP peers that do not list their AS number as the first AS in the AS_PATH attribute.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000117
- Vuln IDs
-
- V-78279
- Rule IDs
-
- SV-92985r1_rule
Checks: C-77837r1_chk
Review the router configuration to verify that the number of received prefixes from each eBGP neighbor is controlled. If the router is not configured to control the number of prefixes received from each peer to protect against route table flooding and prefix de-aggregation attacks, this is a finding.
Fix: F-85007r1_fix
Configure all eBGP routers to use the maximum prefixes feature to protect against route table flooding and prefix de-aggregation attacks.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000118
- Vuln IDs
-
- V-78281
- Rule IDs
-
- SV-92987r2_rule
Checks: C-77839r2_chk
This requirement is not applicable for the DODIN Backbone. Review the router configuration to verify that there is a filter to reject inbound route advertisements that are greater than /24 or the least significant prefixes issued to the customer, whichever is larger. If the router is not configured to limit the prefix size on any inbound route advertisement to /24 or the least significant prefixes issued to the customer, this is a finding.
Fix: F-85009r1_fix
Ensure all eBGP routers are configured to limit the prefix size on any route advertisement to /24 or the least significant prefixes issued to the customer.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SRG-NET-000512-RTR-000001
- Vuln IDs
-
- V-78283
- Rule IDs
-
- SV-92989r1_rule
Checks: C-77841r1_chk
Review the router configuration to verify that a loopback address has been configured. Verify that a loopback interface is used as the source address for all iBGP sessions. If the router does not use its loopback address as the source address for all iBGP sessions, this is a finding.
Fix: F-85011r1_fix
Ensure that the router’s loopback address is used as the source address when originating traffic.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SRG-NET-000512-RTR-000002
- Vuln IDs
-
- V-78285
- Rule IDs
-
- SV-92991r1_rule
Checks: C-77843r1_chk
Review the router configuration to determine if it uses its loopback address as the source address for LDP peering sessions. Verify that a loopback address has been configured as shown in the following example: An MPLS router will use the LDP router ID as the source address for LDP hellos and when establishing TCP sessions with LDP peers; hence, it is necessary to verify that the LDP router ID is the same as the loopback address. By default, routers will assign the LDP router ID using the highest IP address on the router, with preference given to loopback addresses. If the router-id command is specified that overrides this default behavior, verify that it is the IP address of the designated loopback interface. If the router is not configured do use its loopback address for LDP peering, this is a finding.
Fix: F-85013r1_fix
Configure MPLS routers to use their loopback address as the source address for LDP peering sessions.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SRG-NET-000512-RTR-000003
- Vuln IDs
-
- V-78287
- Rule IDs
-
- SV-92993r1_rule
Checks: C-77845r1_chk
Review the router OSPF or IS-IS configuration. Verify that LDP will synchronize with the link-state routing protocol. If the router is not configured to synchronize IGP and LDP, this is a finding.
Fix: F-85015r1_fix
Configure the MPLS router to synchronize IGP and LDP, minimizing packet loss when an IGP adjacency is established prior to LDP peers completing label exchange.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-001095
- Version
- SRG-NET-000193-RTR-000001
- Vuln IDs
-
- V-78289
- Rule IDs
-
- SV-92995r2_rule
Checks: C-77847r1_chk
Review the router configuration to verify that the router has been configured to prevent a burst of RSVP traffic engineering signaling messages from overflowing the input queue of any neighbor core router. If the router with RSVP-TE enabled does not have message pacing configured based on the link speed and input queue size of adjacent core routers, this is a finding.
Fix: F-85017r1_fix
Ensure all routers with RSVP-TE enabled have message pacing configured that will adjust maximum burst and maximum number of RSVP messages to an output queue based on the link speed and input queue size of adjacent core routers.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-RTR-000004
- Vuln IDs
-
- V-78291
- Rule IDs
-
- SV-92997r2_rule
Checks: C-77849r1_chk
Review the router configuration to verify that TTL propagation is disabled. If the router is not configured to disable TTL propagation, this is a finding.
Fix: F-85019r1_fix
Configure LERs to disable TTL propagation.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- SRG-NET-000512-RTR-000005
- Vuln IDs
-
- V-78293
- Rule IDs
-
- SV-92999r2_rule
Checks: C-77851r1_chk
Review the design plan for deploying L3VPN and VRF-lite. Review all CE-facing interfaces and verify that the proper VRF is defined. If any VRFs are not bound to the appropriate physical or logical interface, this is a finding.
Fix: F-85021r1_fix
Configure the PE router to have each VRF bound to the appropriate physical or logical interfaces to maintain traffic separation between all MPLS L3VPNs.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- SRG-NET-000512-RTR-000006
- Vuln IDs
-
- V-78295
- Rule IDs
-
- SV-93001r1_rule
Checks: C-77853r1_chk
Verify that the correct RT is configured for each VRF. Review the design plan for MPLS/L3VPN and VRF-lite to determine what RTs have been assigned for each VRF. Review the route-target import, route-target, or route-target export statements under each configured VRF and verify that the correct RTs have been defined for each VRF. Note: Import and export route-maps are normally used when finer granularity is required. If there are VRFs configured with the wrong RT, this is a finding.
Fix: F-85023r1_fix
Configure all J-PE routers to have the correct VRF defined with the appropriate RT.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-RTR-000007
- Vuln IDs
-
- V-78297
- Rule IDs
-
- SV-93003r1_rule
Checks: C-77855r1_chk
Review the RDs that have been assigned for each VRF according to the plan provided by the ISSM. Review all VRFs configured on CE-facing interfaces and verify that the proper RD has been configured for each. If the wrong RD has been configured for any VRF, this is a finding.
Fix: F-85025r1_fix
Configure the correct RD for each VRF.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001958
- Version
- SRG-NET-000343-RTR-000001
- Vuln IDs
-
- V-78299
- Rule IDs
-
- SV-93005r1_rule
Checks: C-77857r1_chk
Review the router configuration to determine if LDP messages are being authenticated for the targeted LDP sessions. If authentication is not being used for the LDP sessions using a FIPS-approved message authentication code algorithm, this is a finding.
Fix: F-85027r1_fix
Implement authentication for all targeted LDP sessions using a FIPS-approved message authentication code algorithm.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- SRG-NET-000512-RTR-000008
- Vuln IDs
-
- V-78301
- Rule IDs
-
- SV-93007r2_rule
Checks: C-77859r1_chk
Review the ingress and egress PE router configuration for each virtual circuit that has been provisioned. Verify that the correct and unique VCID has been configured for the appropriate attachment circuit. If the correct VC ID has not been configured on both routers, this is a finding. Note: Ethernet over MPLS in VLAN mode transports Ethernet traffic from a source 802.1Q VLAN to a destination 802.1Q VLAN over a core MPLS network. The VC ID must be unique and the same on each end as it is used to connect the endpoints of the VC.
Fix: F-85029r1_fix
Assign globally unique VC IDs for each virtual circuit and configure the attachment circuits with the appropriate VC ID. Configure the same VC ID on both ends of the VC.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- SRG-NET-000512-RTR-000009
- Vuln IDs
-
- V-78303
- Rule IDs
-
- SV-93009r1_rule
Checks: C-77861r1_chk
Review the implementation plan and the VPN IDs assigned to customer VLANs for the VPLS deployment. Review the PE router configuration to verify that customer attachment circuits (i.e., VLANs) are associated to the appropriate VFI. If the attachment circuits have not been bound to VFI configured with the assigned VPN ID for each VLAN, this is a finding.
Fix: F-85031r1_fix
Assign globally unique VPN IDs for each customer VLAN using VPLS for carrier Ethernet services between multiple sites, and configure the attachment circuits to the appropriate VFI.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SRG-NET-000512-RTR-000010
- Vuln IDs
-
- V-78305
- Rule IDs
-
- SV-93011r1_rule
Checks: C-77863r1_chk
Review the PE router configuration to verify that split horizon is enabled. If it is disabled, this is a finding. Note: In a ring VPLS, split horizon is disabled so that a PE router can forward a packet received from one pseudowire to another pseudowire. To prevent the consequential loop, at least one span in the ring would not have a pseudowire for any given VPLS instance.
Fix: F-85033r1_fix
Enable split horizon on all PE routers deploying VPLS in a full-mesh configuration.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001095
- Version
- SRG-NET-000193-RTR-000002
- Vuln IDs
-
- V-78307
- Rule IDs
-
- SV-93013r2_rule
Checks: C-77865r2_chk
Review the router configuration to verify that storm control is enabled on CE-facing interfaces deploying VPLS. If storm control is not enabled for broadcast traffic, this is a finding. Note: The threshold level can be from 0 to 100 percent of the link's bandwidth, where "0" suppresses all traffic. Most FastEthernet switching modules do not support multicast and unicast traffic storm control.
Fix: F-85035r2_fix
Configure storm control for each VPLS bridge domain. Base the suppression threshold on expected traffic rates plus some additional capacity.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000119
- Vuln IDs
-
- V-78309
- Rule IDs
-
- SV-93015r1_rule
Checks: C-77867r1_chk
Review the router configuration to verify that IGMP or MLD snooping has been configured for IPv4 and IPv6 multicast traffic respectively for each VPLS bridge domain (VFI instance). If the router is not configured to implement IGMP or MLD snooping for each VPLS bridge domain, this is a finding.
Fix: F-85037r1_fix
Configure IGMP or MLD snooping for IPv4 and IPv6 multicast traffic respectively for each VPLS bridge domain.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001094
- Version
- SRG-NET-000192-RTR-000002
- Vuln IDs
-
- V-78311
- Rule IDs
-
- SV-93017r1_rule
Checks: C-77869r1_chk
Review the PE router configuration to determine if a MAC address limit has been set for each bridge domain. If a limit has not been configured, this is a finding.
Fix: F-85039r1_fix
Configure a MAC address learning limit for each VPLS bridge domain.
- RMF Control
- SC-7
- Severity
- H
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000007
- Vuln IDs
-
- V-78313
- Rule IDs
-
- SV-93019r1_rule
Checks: C-77871r1_chk
Review the router configuration to verify that an ingress ACL is applied to all CE-facing interfaces. Verify that the ingress ACL rejects and logs packets destined to the IP core address block. If the PE router is not configured to block any traffic with a destination address assigned to the IP core infrastructure, this is a finding. Note: Internet Control Message Protocol (ICMP) echo requests and traceroutes will be allowed to the edge from external adjacent peers.
Fix: F-85041r1_fix
Configure protection for the IP core to be implemented at the edges by blocking any traffic with a destination address assigned to the IP core infrastructure.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000008
- Vuln IDs
-
- V-78315
- Rule IDs
-
- SV-93021r2_rule
Checks: C-77873r1_chk
Review the router configuration to determine if uRPF loose mode is enabled on all CE-facing interfaces. If uRPF loose mode is not enabled on all CE-facing interfaces, this is a finding.
Fix: F-85043r1_fix
Enable uRPF loose mode on all CE-facing interfaces.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000195-RTR-000085
- Vuln IDs
-
- V-78317
- Rule IDs
-
- SV-93023r1_rule
Checks: C-77875r1_chk
Review the router configuration to determine if it will block all packets with IP options. If the router is not configured to drop all packets with IP options, this is a finding.
Fix: F-85045r1_fix
Configure the router to drop all packets with IP options.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-001095
- Version
- SRG-NET-000193-RTR-000113
- Vuln IDs
-
- V-78319
- Rule IDs
-
- SV-93025r1_rule
Checks: C-77877r1_chk
Review the router configuration and verify that a QoS policy has been configured to provide preferred treatment for mission-critical applications in accordance with the QoS DoDIN Technical Profile. Verify that the class-maps are configured to match on DSCP, protocols, or access control lists (ACLs) that identify traffic types based on ports. Verify that the policy-map is configured to set DSCP values for the defined class-maps in accordance with the QoS DoDIN Technical Profile. Verify that an input service policy is bound to all CE-facing interfaces. If the router is not configured to enforce a QoS policy in accordance with the QoS DoDIN Technical Profile, this is a finding.
Fix: F-85047r1_fix
Configure a QoS policy on each router in accordance with the QoS DoDIN Technical Profile.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-001095
- Version
- SRG-NET-000193-RTR-000114
- Vuln IDs
-
- V-78321
- Rule IDs
-
- SV-93027r2_rule
Checks: C-77879r1_chk
Review the router configuration and verify that a QoS policy has been configured to provide preferred treatment for mission-critical applications in accordance with the QoS DoDIN Technical Profile. Verify that the class-maps are configured to match on DSCP values that have been set at the edges. Verify that the policy map is configured to reserve the bandwidth for each traffic type as specified via the class-maps. Verify that an output service policy is bound to all interfaces. If the router is not configured to implement a QoS policy in accordance with the QoS DoDIN Technical Profile, this is a finding.
Fix: F-85049r1_fix
Configure a QoS policy on each router in accordance with the QoS DoDIN Technical Profile.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001095
- Version
- SRG-NET-000193-RTR-000112
- Vuln IDs
-
- V-78325
- Rule IDs
-
- SV-93031r1_rule
Checks: C-77883r1_chk
Review the router configuration and interview the System Administrator to verify that a mechanism for traffic prioritization and bandwidth reservation exists. This arrangement must ensure that sufficient capacity is available for mission-critical traffic and enforce the traffic priorities specified by the Combatant Commands/Services/Agencies. If no such scheme exists or it is not configured, this is a finding.
Fix: F-85053r1_fix
Implement a mechanism for traffic prioritization and bandwidth reservation. This mechanism must enforce the traffic priorities specified by the Combatant Commands/Services/Agencies.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000120
- Vuln IDs
-
- V-78327
- Rule IDs
-
- SV-93033r1_rule
Checks: C-77885r1_chk
Review the router configuration to determine if forwarding cache thresholds are defined. If the RP router is not configured to limit the multicast forwarding cache to ensure that its resources are not saturated, this is a finding.
Fix: F-85055r1_fix
Configure MSDP-enabled RP routers to limit the multicast forwarding cache for source-active entries.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000121
- Vuln IDs
-
- V-78329
- Rule IDs
-
- SV-93035r2_rule
Checks: C-77887r2_chk
Review the configuration of the RP to verify that it is rate limiting the number of multicast register messages. If the RP is not limiting multicast register messages, this is a finding.
Fix: F-85057r2_fix
Configure the RP to rate limit the number of multicast register messages.
- RMF Control
- SC-7
- Severity
- L
- CCI
- CCI-002403
- Version
- SRG-NET-000364-RTR-000114
- Vuln IDs
-
- V-78331
- Rule IDs
-
- SV-93037r2_rule
Checks: C-77889r2_chk
Review the configuration of the DR to verify that it is filtering IGMP or MLD report messages, allowing hosts to join only those groups that have been approved. Note: This requirement is only applicable to Source Specific Multicast (SSM) implementation. This requirement is not applicable to Any Source Multicast (ASM) since the filtering is being performed by the Rendezvous Point router. If the DR is not filtering IGMP or MLD report messages, this is a finding.
Fix: F-85059r1_fix
Configure the DR to filter the IGMP and MLD report messages to allow hosts to join only those multicast groups that have been approved.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-RTR-000115
- Vuln IDs
-
- V-78333
- Rule IDs
-
- SV-93039r2_rule
Checks: C-77893r2_chk
Review the configuration of the DR to verify that it is filtering IGMP or MLD report messages, allowing hosts to only join multicast groups from sources that have been approved. Note: This requirement is only applicable to Source Specific Multicast (SSM) implementation If the DR is not filtering IGMP or MLD report messages, this is a finding.
Fix: F-85063r1_fix
Configure the DR to filter the IGMP and MLD report messages to allow hosts to join only those multicast groups from sources that have been approved.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000122
- Vuln IDs
-
- V-78335
- Rule IDs
-
- SV-93041r1_rule
Checks: C-77895r1_chk
Review the DR configuration to verify that it is limiting the number of mroute states via IGMP or MLD. If the DR is not limiting multicast join requests via IGMP or MLD, this is a finding. Note: If both global and per-interface state limiters are configured, the limits configured for per-interface state limiters are still enforced but are constrained by the global limit.
Fix: F-85065r1_fix
Configure the DR on a global or interface basis to limit the number of mroute states resulting from IGMP or MLD membership reports.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000123
- Vuln IDs
-
- V-78337
- Rule IDs
-
- SV-93043r1_rule
Checks: C-77897r1_chk
Review the multicast last-hop router configuration to verify that the SPT switchover threshold is increased (default is "0") or set to infinity (never switch over). If any multicast router is not configured to increase the SPT threshold or set to infinity to minimalize (S, G) state, this is a finding.
Fix: F-85067r1_fix
Configure the multicast router to increase the SPT threshold or set it to infinity to minimalize (S, G) state within the multicast topology where ASM is deployed.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-RTR-000116
- Vuln IDs
-
- V-78339
- Rule IDs
-
- SV-93045r1_rule
Checks: C-77899r1_chk
Review the router configuration to determine if there is a receive path or interface filter to only accept MSDP packets from known MSDP peers. If the router is not configured to only accept MSDP packets from known MSDP peers, this is a finding.
Fix: F-85069r1_fix
Ensure the receive path or interface filter for all MSDP routers only accepts MSDP packets from known MSDP peers.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001958
- Version
- SRG-NET-000343-RTR-000002
- Vuln IDs
-
- V-78341
- Rule IDs
-
- SV-93047r1_rule
Checks: C-77901r1_chk
Review the router configuration to determine if received MSDP packets are authenticated. If the router does not require MSDP authentication, this is a finding.
Fix: F-85071r1_fix
Ensure all MSDP packets received by an MSDP router are authenticated.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001368
- Version
- SRG-NET-000018-RTR-000007
- Vuln IDs
-
- V-78343
- Rule IDs
-
- SV-93049r2_rule
Checks: C-77903r2_chk
Review the router configuration to determine if there is an import policy to block source-active multicast advertisements for any undesirable multicast groups, as well as any (S, G) states with undesirable source addresses. Step 1: Verify that an inbound source-active filter is bound to each MSDP peer. Step 2: Review the access lists referenced by the source-active filter to verify that undesirable multicast groups, auto-RP, single source multicast (SSM) groups, and advertisements from undesirable sources are blocked. If the router is not configured with an import policy to block undesirable SA multicast advertisements, this is a finding.
Fix: F-85073r2_fix
Configure the MSDP router to implement an import policy to block multicast advertisements for undesirable multicast groups and sources.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001368
- Version
- SRG-NET-000018-RTR-000008
- Vuln IDs
-
- V-78345
- Rule IDs
-
- SV-93051r1_rule
Checks: C-77905r1_chk
Review the router configuration to determine if there is export policy to block local source-active multicast advertisements. Verify that an outbound source-active filter is bound to each MSDP peer. Review the access lists referenced by the source-active filters and verify that MSDP source-active messages being sent to MSDP peers do not leak advertisements that are local. If the router is not configured with an export policy to block local source-active multicast advertisements, this is a finding.
Fix: F-85075r1_fix
Ensure an export policy is implemented on all MSDP routers to avoid global visibility of local multicast (S, G) states.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001368
- Version
- SRG-NET-000018-RTR-000009
- Vuln IDs
-
- V-78347
- Rule IDs
-
- SV-93053r1_rule
Checks: C-77907r1_chk
Review the router configuration to determine if it is configured to limit the amount of source-active messages it accepts on a per-peer basis. If the router is not configured to limit the source-active messages it accepts, this is a finding.
Fix: F-85077r1_fix
Configure the MSDP router to limit the amount of source-active messages it accepts from each peer.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SRG-NET-000512-RTR-000011
- Vuln IDs
-
- V-78349
- Rule IDs
-
- SV-93055r1_rule
Checks: C-77909r1_chk
Review the router configuration to verify that a loopback address has been configured. Verify that a loopback interface is used as the source address for all MSDP packets generated by the router. If the router does not use its loopback address as the source address when originating MSDP traffic, this is a finding.
Fix: F-85079r1_fix
Ensure that the router’s loopback address is used as the source address when originating traffic.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000012
- Vuln IDs
-
- V-78351
- Rule IDs
-
- SV-93057r2_rule
Checks: C-77911r2_chk
Step 1: Verify that the managed interface has an inbound and outbound ACL configured. Step 2: Verify that the ingress filter only allows management, IGP, and ICMP traffic. Caveat: If the management interface is a true OOBM interface, this requirement is not applicable. If the router does not restrict traffic that ingresses and egresses the management interface, this is a finding.
Fix: F-85081r2_fix
If the management interface is a routed interface, it must be configured with both an ingress and egress ACL.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000011
- Vuln IDs
-
- V-78357
- Rule IDs
-
- SV-93063r1_rule
Checks: C-77919r2_chk
This requirement is not applicable for the DoDIN Backbone. Review the access control list (ACL) or filter for the router receive path. Verify that only traffic sourced from the OOBM network or the NOC is allowed to access the router. If the router does not block any traffic destined to itself that is not sourced from the OOBM network or the NOC, this is a finding. Note: If the platform does not support the receive path filter, verify that all non-OOBM interfaces have an ingress ACL to restrict access to that interface address or any of the router’s loopback addresses to only traffic sourced from the management network. An exception would be to allow packets destined to these interfaces used for troubleshooting, such as ping and traceroute.
Fix: F-85089r1_fix
This requirement is not applicable for the DoDIN Backbone. Ensure that traffic from the managed network is not able to access the OOBM gateway router using either receive path or interface ingress ACLs.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-000032
- Version
- SRG-NET-000018-RTR-000010
- Vuln IDs
-
- V-92243
- Rule IDs
-
- SV-102345r2_rule
Checks: C-91409r3_chk
This requirement is not applicable for the DODIN Backbone. Review the router configuration to verify the router is configured to deny updates received from CE routers with an originating AS in the AS_PATH attribute that does not belong to that customer. Step 1: Review router configuration and verify that there is an as-path access-list statement defined to only accept routes from a CE router whose AS did not originate the route. Step 2: Verify that the as-path access list is referenced by the filter-list inbound for the appropriate BGP neighbors. If the router is not configured to reject updates from CE routers with an originating AS in the AS_PATH attribute that does not belong to that customer, this is a finding.
Fix: F-98451r2_fix
Configure the router to reject updates from CE routers with an originating AS in the AS_PATH attribute that does not belong to that customer.