Router Security Requirements Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +105 −105
Comparison against the immediately-prior release (V3R6). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 105
- V-207097 Medium The router must be configured to enforce approved authorizations for controlling the flow of information within the network based on organization-defined information flow control policies.
- V-207098 Medium The BGP router must be configured to reject inbound route advertisements for any Bogon prefixes.
- V-207099 Medium The BGP router must be configured to reject inbound route advertisements for any prefixes belonging to the local autonomous system (AS).
- V-207100 Medium The BGP router must be configured to reject inbound route advertisements from a customer edge (CE) router for prefixes that are not allocated to that customer.
- V-207101 Medium The BGP router must be configured to reject outbound route advertisements for any prefixes that do not belong to any customers or the local autonomous system (AS).
- V-207102 Low The BGP router must be configured to reject route advertisements from BGP peers that do not list their autonomous system (AS) number as the first AS in the AS_PATH attribute.
- V-207103 Low The Multicast Source Discovery Protocol (MSDP) router must be configured to filter received source-active multicast advertisements for any undesirable multicast groups and sources.
- V-207104 Low The Multicast Source Discovery Protocol (MSDP) router must be configured to filter source-active multicast advertisements to external MSDP peers to avoid global visibility of local-only multicast sources and groups.
- V-207105 Low The MSDP router must be configured to limit the amount of source-active messages it accepts on per-peer basis.
- V-207106 Low The BGP router must be configured to reject route advertisements from CE routers with an originating AS in the AS_PATH attribute that does not belong to that customer.
- V-207107 Low The router must be configured to disable the auxiliary port unless it is connected to a secured modem providing encryption and authentication.
- V-207108 Medium The perimeter router must be configured to enforce approved authorizations for controlling the flow of information between interconnected networks in accordance with applicable policy.
- V-207109 Medium The multicast router must be configured to disable Protocol Independent Multicast (PIM) on all interfaces that are not required to support multicast routing.
- V-207110 Medium The multicast router must be configured to bind a Protocol Independent Multicast (PIM) neighbor filter to interfaces that have PIM enabled.
- V-207111 Low The multicast edge router must be configured to establish boundaries for administratively scoped multicast traffic.
- V-207112 Low The router must be configured to have all inactive interfaces disabled.
- V-207113 High The perimeter router must be configured to protect an enclave connected to an alternate gateway by using an inbound filter that only permits packets with destination addresses within the sites address space.
- V-207114 High The perimeter router must be configured to not be a Border Gateway Protocol (BGP) peer to an alternate gateway service provider.
- V-207115 Low The perimeter router must be configured to not redistribute static routes to an alternate gateway service provider into BGP or an IGP peering with the NIPRNet or to other autonomous systems.
- V-207116 Medium The out-of-band management (OOBM) gateway router must be configured to have separate IGP instances for the managed network and management network.
- V-207117 Medium The out-of-band management (OOBM) gateway router must be configured to not redistribute routes between the management network routing domain and the managed network routing domain.
- V-207118 Low The multicast Rendezvous Point (RP) router must be configured to filter Protocol Independent Multicast (PIM) Register messages received from the Designated Router (DR) for any undesirable multicast groups and sources.
- V-207119 Low The multicast Rendezvous Point (RP) router must be configured to filter Protocol Independent Multicast (PIM) Join messages received from the Designated Router (DR) for any undesirable multicast groups.
- V-207120 Medium The router must be configured to produce audit records containing information to establish where the events occurred.
- V-207121 Medium The router must be configured to produce audit records containing information to establish the source of the events.
- V-207122 Low The router must be configured to log all packets that have been dropped.
- V-207123 Low The router must be configured to have all non-essential capabilities disabled.
- V-207124 Medium The router must be configured to use encryption for routing protocol authentication.
- V-207125 Medium The router must be configured to authenticate all routing protocol messages using NIST-validated FIPS 198-1 message authentication code algorithm.
- V-207126 Medium The PE router must be configured to limit the number of MAC addresses it can learn for each Virtual Private LAN Services (VPLS) bridge domain.
- V-207127 Low The MPLS router with RSVP-TE enabled must be configured with message pacing or refresh reduction to adjust maximum number of RSVP messages to an output queue based on the link speed and input queue size of adjacent core routers.
- V-207128 Medium The PE router providing Virtual Private LAN Services (VPLS) must be configured to have traffic storm control thresholds on CE-facing interfaces.
- V-207129 Medium The PE router must be configured to enforce a Quality-of-Service (QoS) policy to limit the effects of packet flooding denial-of-service (DoS) attacks.
- V-207130 Low The PE router must be configured to enforce a Quality-of-Service (QoS) policy in accordance with the QoS DoDIN Technical Profile.
- V-207131 Low The P router must be configured to enforce a Quality-of-Service (QoS) policy in accordance with the QoS GIG Technical Profile.
- V-207132 High The perimeter router must be configured to deny network traffic by default and allow network traffic by exception.
- V-207133 High The router must be configured to restrict traffic destined to itself.
- V-207134 Medium The router must be configured to drop all fragmented Internet Control Message Protocol (ICMP) packets destined to itself.
- V-207135 Medium The perimeter router must be configured to filter traffic destined to the enclave in accordance with the guidelines contained in DoD Instruction 8551.1.
- V-207136 Medium The perimeter router must be configured to filter ingress traffic at the external interface on an inbound direction.
- V-207137 Medium The perimeter router must be configured to filter egress traffic at the internal interface on an inbound direction.
- V-207138 Medium The BGP router must be configured to reject outbound route advertisements for any prefixes belonging to the IP core.
- V-207139 High The PE router must be configured to block any traffic that is destined to IP core infrastructure.
- V-207140 Medium The PE router must be configured with Unicast Reverse Path Forwarding (uRPF) loose mode enabled on all CE-facing interfaces..
- V-207141 Medium The out-of-band management (OOBM) gateway must be configured to transport management traffic to the Network Operations Center (NOC) via dedicated circuit, MPLS/VPN service, or IPsec tunnel.
- V-207142 Medium The out-of-band management (OOBM) gateway router must be configured to forward only authorized management traffic to the Network Operations Center (NOC).
- V-207143 Medium The out-of-band management (OOBM) gateway router must be configured to block any traffic destined to itself that is not sourced from the OOBM network or the NOC.
- V-207144 Medium The router must be configured to only permit management traffic that ingresses and egresses the OOBM interface.
- V-207145 Medium The router providing connectivity to the NOC must be configured to forward all in-band management traffic via an IPsec tunnel.
- V-207146 Medium The router must be configured to stop forwarding traffic upon the failure of the following actions: system initialization, shutdown, or system abort.
- V-207147 Medium The PE router providing MPLS Layer 2 Virtual Private Network (L2VPN) services must be configured to authenticate targeted Label Distribution Protocol (LDP) sessions used to exchange virtual circuit (VC) information using a FIPS-approved message authentication code algorithm.
- V-207148 Medium The Multicast Source Discovery Protocol (MSDP) router must be configured to authenticate all received MSDP packets.
- V-207149 Medium The router must not be configured to have any zero-touch deployment feature enabled when connected to an operational network.
- V-207150 Medium The router must be configured to protect against or limit the effects of denial-of-service (DoS) attacks by employing control plane protection.
- V-207151 Medium The router must be configured to have Gratuitous ARP disabled on all external interfaces.
- V-207152 Low The router must be configured to have IP directed broadcast disabled on all interfaces.
- V-207153 Medium The router must be configured to have Internet Control Message Protocol (ICMP) unreachable notifications disabled on all external interfaces.
- V-207154 Medium The router must be configured to have Internet Control Message Protocol (ICMP) mask replies disabled on all external interfaces.
- V-207155 Medium The router must be configured to have Internet Control Message Protocol (ICMP) redirects disabled on all external interfaces.
- V-207156 Medium The BGP router must be configured to use the maximum prefixes feature to protect against route table flooding and prefix de-aggregation attacks.
- V-207157 Low The BGP router must be configured to limit the prefix size on any inbound route advertisement to /24 or the least significant prefixes issued to the customer.
- V-207158 Low The PE router must be configured to implement Internet Group Management Protocol (IGMP) or Multicast Listener Discovery (MLD) snooping for each Virtual Private LAN Services (VPLS) bridge domain.
- V-207159 Low The multicast Rendezvous Point (RP) router must be configured to limit the multicast forwarding cache so that its resources are not saturated by managing an overwhelming number of Protocol Independent Multicast (PIM) and Multicast Source Discovery Protocol (MSDP) source-active entries.
- V-207160 Medium The multicast Rendezvous Point (RP) must be configured to rate limit the number of Protocol Independent Multicast (PIM) Register messages.
- V-207161 Medium The multicast Designated Router (DR) must be configured to limit the number of mroute states resulting from Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Host Membership Reports.
- V-207162 Medium The multicast Designated Router (DR) must be configured to increase the shortest-path tree (SPT) threshold or set it to infinity to minimalize source-group (S, G) state within the multicast topology where Any Source Multicast (ASM) is deployed.
- V-207163 Medium The perimeter router must be configured to only allow incoming communications from authorized sources to be routed to authorized destinations.
- V-207164 Medium The perimeter router must be configured to block inbound packets with source Bogon IP address prefixes.
- V-207165 Low The perimeter router must be configured to have Link Layer Discovery Protocols (LLDPs) disabled on all external interfaces.
- V-207166 Medium The perimeter router must be configured to have Proxy ARP disabled on all external interfaces.
- V-207167 Medium The perimeter router must be configured to block all outbound management traffic.
- V-207168 Low The multicast Designated Router (DR) must be configured to filter the Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Report messages to allow hosts to join only multicast groups that have been approved by the organization.
- V-207169 Medium The multicast Designated Router (DR) must be configured to filter the Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Report messages to allow hosts to join a multicast group only from sources that have been approved by the organization.
- V-207170 Medium The Multicast Source Discovery Protocol (MSDP) router must be configured to only accept MSDP packets from known MSDP peers.
- V-207171 Medium The router must be configured to fail securely in the event of an operational failure.
- V-207172 Low The BGP router must be configured to use its loopback address as the source address for iBGP peering sessions.
- V-207173 Low The MPLS router must be configured to use its loopback address as the source address for LDP peering sessions.
- V-207174 Low The MPLS router must be configured to synchronize IGP and LDP to minimize packet loss when an IGP adjacency is established prior to LDP peers completing label exchange.
- V-207175 Medium The MPLS router must be configured to have TTL Propagation disabled.
- V-207176 High The PE router must be configured to have each Virtual Routing and Forwarding (VRF) instance bound to the appropriate physical or logical interfaces to maintain traffic separation between all MPLS L3VPNs.
- V-207177 High The PE router must be configured to have each Virtual Routing and Forwarding (VRF) instance with the appropriate Route Target (RT).
- V-207178 Medium The PE router must be configured to have each VRF with the appropriate Route Distinguisher (RD).
- V-207179 High The PE router providing MPLS Virtual Private Wire Service (VPWS) must be configured to have the appropriate virtual circuit identification (VC ID) for each attachment circuit.
- V-207180 High The PE router providing Virtual Private LAN Services (VPLS) must be configured to have all attachment circuits defined to the virtual forwarding instance (VFI) with the globally unique VPN ID assigned for each customer VLAN.
- V-207181 Low The PE router must be configured to enforce the split-horizon rule for all pseudowires within a Virtual Private LAN Services (VPLS) bridge domain.
- V-207182 Low The Multicast Source Discovery Protocol (MSDP) router must be configured to use its loopback address as the source address when originating MSDP traffic.
- V-216506 Medium The router must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
- V-216978 Medium The router must not be configured to have any feature enabled that calls home to the vendor.
- V-216979 High The perimeter router must be configured to restrict it from accepting outbound IP packets that contain an illegitimate address in the source address field via egress filter or by enabling Unicast Reverse Path Forwarding (uRPF).
- V-216980 Medium The perimeter router must be configured to block all packets with any IP options.
- V-216981 Medium The PE router must be configured to ignore or block all packets with any IP options.
- V-216982 Medium The router must be configured to implement message authentication for all control plane protocols.
- V-216983 Medium The BGP router must be configured to use a unique key for each autonomous system (AS) that it peers with.
- V-216984 Medium The router must be configured to use keys with a duration not exceeding 180 days for authenticating routing protocol messages.
- V-216985 Low The BGP router must be configured to enable the Generalized TTL Security Mechanism (GTSM).
- V-220144 Low The router must be configured to advertise a hop limit of at least 32 in Router Advertisement messages for IPv6 stateless auto-configuration deployments.
- V-220145 Medium The router must not be configured to use IPv6 Site Local Unicast addresses.
- V-220146 Medium The perimeter router must be configured to suppress Router Advertisements on all external IPv6-enabled interfaces.
- V-220147 Medium The perimeter router must be configured to drop IPv6 undetermined transport packets.
- V-220148 Medium The perimeter router must be configured drop IPv6 packets with a Routing Header type 0, 1, or 3255.
- V-220149 Medium The perimeter router must be configured to drop IPv6 packets containing a Hop-by-Hop header with invalid option type values.
- V-220150 Medium The perimeter router must be configured to drop IPv6 packets containing a Destination Option header with invalid option type values.
- V-220151 Medium The perimeter router must be configured to drop IPv6 packets containing an extension header with the Endpoint Identification option.
- V-220152 Medium The perimeter router must be configured to drop IPv6 packets containing the NSAP address option within Destination Option header.
- V-220153 Medium The perimeter router must be configured to drop IPv6 packets containing a Hop-by-Hop or Destination Option extension header with an undefined option type.
Removed rules 105
- V-100095 Medium The router must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
- V-101083 Low The router must be configured to advertise a hop limit of at least 32 in Router Advertisement messages for IPv6 stateless auto-configuration deployments.
- V-101085 Medium The router must not be configured to use IPv6 Site Local Unicast addresses.
- V-101087 Medium The perimeter router must be configured to suppress Router Advertisements on all external IPv6-enabled interfaces.
- V-101089 Medium The perimeter router must be configured to drop IPv6 undetermined transport packets.
- V-101091 Medium The perimeter router must be configured drop IPv6 packets with a Routing Header type 0, 1, or 3255.
- V-101093 Medium The perimeter router must be configured to drop IPv6 packets containing a Hop-by-Hop header with invalid option type values.
- V-101095 Medium The perimeter router must be configured to drop IPv6 packets containing a Destination Option header with invalid option type values.
- V-101097 Medium The perimeter router must be configured to drop IPv6 packets containing an extension header with the Endpoint Identification option.
- V-101099 Medium The perimeter router must be configured to drop IPv6 packets containing the NSAP address option within Destination Option header.
- V-101101 Medium The perimeter router must be configured to drop IPv6 packets containing a Hop-by-Hop or Destination Option extension header with an undefined option type.
- V-55721 Medium The perimeter router must be configured to enforce approved authorizations for controlling the flow of information between interconnected networks in accordance with applicable policy.
- V-55723 Medium The multicast router must be configured to disable Protocol Independent Multicast (PIM) on all interfaces that are not required to support multicast routing.
- V-55727 Medium The multicast router must be configured to bind a Protocol Independent Multicast (PIM) neighbor filter to interfaces that have PIM enabled.
- V-55729 Low The multicast edge router must be configured to establish boundaries for administratively scoped multicast traffic.
- V-55731 Low The router must be configured to have all inactive interfaces disabled.
- V-55733 High The perimeter router must be configured to not be a Border Gateway Protocol (BGP) peer to an alternate gateway service provider.
- V-55735 Low The perimeter router must be configured to not redistribute static routes to an alternate gateway service provider into BGP or an IGP peering with the NIPRNet or to other autonomous systems.
- V-55739 Medium The out-of-band management (OOBM) gateway router must be configured to have separate IGP instances for the managed network and management network.
- V-55741 Medium The out-of-band management (OOBM) gateway router must be configured to not redistribute routes between the management network routing domain and the managed network routing domain.
- V-55747 Low The multicast Rendezvous Point (RP) router must be configured to filter Protocol Independent Multicast (PIM) Register messages received from the Designated Router (DR) for any undesirable multicast groups and sources.
- V-55749 Low The multicast Rendezvous Point (RP) router must be configured to filter Protocol Independent Multicast (PIM) Join messages received from the Designated Router (DR) for any undesirable multicast groups.
- V-55757 Medium The router must be configured to implement message authentication for all control plane protocols.
- V-55759 Medium The router must be configured to use keys with a duration not exceeding 180 days for authenticating routing protocol messages.
- V-55761 High The perimeter router must be configured to restrict it from accepting outbound IP packets that contain an illegitimate address in the source address field via egress filter or by enabling Unicast Reverse Path Forwarding (uRPF).
- V-55763 Low The router must be configured to have all non-essential capabilities disabled.
- V-55765 Medium The router must be configured to use encryption for routing protocol authentication.
- V-55767 Medium The router must be configured to authenticate all routing protocol messages using NIST-validated FIPS 198-1 message authentication code algorithm.
- V-55769 Low The BGP router must be configured to enable the Generalized TTL Security Mechanism (GTSM).
- V-55773 Medium The perimeter router must be configured to block all packets with any IP options.
- V-55779 Medium The router must be configured to stop forwarding traffic upon the failure of the following actions: system initialization, shutdown, or system abort.
- V-55781 Medium The router must be configured to protect against or limit the effects of denial-of-service (DoS) attacks by employing control plane protection.
- V-55785 Medium The perimeter router must be configured to only allow incoming communications from authorized sources to be routed to authorized destinations.
- V-55789 Medium The router must be configured to fail securely in the event of an operational failure.
- V-78209 Medium The router must be configured to enforce approved authorizations for controlling the flow of information within the network based on organization-defined information flow control policies.
- V-78211 Medium The router must not be configured to have any feature enabled that calls home to the vendor.
- V-78213 Medium The router must not be configured to have any zero-touch deployment feature enabled when connected to an operational network.
- V-78215 High The router must be configured to restrict traffic destined to itself.
- V-78217 Medium The router must be configured to drop all fragmented Internet Control Message Protocol (ICMP) packets destined to itself.
- V-78219 Medium The router must be configured to have Gratuitous ARP disabled on all external interfaces.
- V-78221 Low The router must be configured to have IP directed broadcast disabled on all interfaces.
- V-78223 Medium The router must be configured to have Internet Control Message Protocol (ICMP) unreachable notifications disabled on all external interfaces.
- V-78225 Medium The router must be configured to have Internet Control Message Protocol (ICMP) mask replies disabled on all external interfaces.
- V-78227 Medium The router must be configured to have Internet Control Message Protocol (ICMP) redirects disabled on all external interfaces.
- V-78229 Low The router must be configured to log all packets that have been dropped.
- V-78231 Medium The router must be configured to produce audit records containing information to establish where the events occurred.
- V-78233 Medium The router must be configured to produce audit records containing information to establish the source of the events.
- V-78235 Low The router must be configured to disable the auxiliary port unless it is connected to a secured modem providing encryption and authentication.
- V-78237 High The perimeter router must be configured to deny network traffic by default and allow network traffic by exception.
- V-78239 Medium The perimeter router must be configured to block inbound packets with source Bogon IP address prefixes.
- V-78241 High The perimeter router must be configured to protect an enclave connected to an alternate gateway by using an inbound filter that only permits packets with destination addresses within the sites address space.
- V-78243 Medium The perimeter router must be configured to filter traffic destined to the enclave in accordance with the guidelines contained in DoD Instruction 8551.1.
- V-78245 Medium The perimeter router must be configured to filter ingress traffic at the external interface on an inbound direction.
- V-78247 Medium The perimeter router must be configured to filter egress traffic at the internal interface on an inbound direction.
- V-78249 Low The perimeter router must be configured to have Link Layer Discovery Protocols (LLDPs) disabled on all external interfaces.
- V-78251 Medium The perimeter router must be configured to have Proxy ARP disabled on all external interfaces.
- V-78253 Medium The perimeter router must be configured to block all outbound management traffic.
- V-78255 Medium The out-of-band management (OOBM) gateway must be configured to transport management traffic to the Network Operations Center (NOC) via dedicated circuit, MPLS/VPN service, or IPsec tunnel.
- V-78257 Medium The out-of-band management (OOBM) gateway router must be configured to forward only authorized management traffic to the Network Operations Center (NOC).
- V-78263 Medium The router providing connectivity to the NOC must be configured to forward all in-band management traffic via an IPsec tunnel.
- V-78265 Medium The BGP router must be configured to use a unique key for each autonomous system (AS) that it peers with.
- V-78267 Medium The BGP router must be configured to reject inbound route advertisements for any Bogon prefixes.
- V-78269 Medium The BGP router must be configured to reject inbound route advertisements for any prefixes belonging to the local autonomous system (AS).
- V-78271 Medium The BGP router must be configured to reject inbound route advertisements from a customer edge (CE) router for prefixes that are not allocated to that customer.
- V-78273 Medium The BGP router must be configured to reject outbound route advertisements for any prefixes that do not belong to any customers or the local autonomous system (AS).
- V-78275 Medium The BGP router must be configured to reject outbound route advertisements for any prefixes belonging to the IP core.
- V-78277 Low The BGP router must be configured to reject route advertisements from BGP peers that do not list their autonomous system (AS) number as the first AS in the AS_PATH attribute.
- V-78279 Medium The BGP router must be configured to use the maximum prefixes feature to protect against route table flooding and prefix de-aggregation attacks.
- V-78281 Low The BGP router must be configured to limit the prefix size on any inbound route advertisement to /24 or the least significant prefixes issued to the customer.
- V-78283 Low The BGP router must be configured to use its loopback address as the source address for iBGP peering sessions.
- V-78285 Low The MPLS router must be configured to use its loopback address as the source address for LDP peering sessions.
- V-78287 Low The MPLS router must be configured to synchronize IGP and LDP to minimize packet loss when an IGP adjacency is established prior to LDP peers completing label exchange.
- V-78289 Low The MPLS router with RSVP-TE enabled must be configured with message pacing or refresh reduction to adjust maximum number of RSVP messages to an output queue based on the link speed and input queue size of adjacent core routers.
- V-78291 Medium The MPLS router must be configured to have TTL Propagation disabled.
- V-78293 High The PE router must be configured to have each Virtual Routing and Forwarding (VRF) instance bound to the appropriate physical or logical interfaces to maintain traffic separation between all MPLS L3VPNs.
- V-78295 High The PE router must be configured to have each Virtual Routing and Forwarding (VRF) instance with the appropriate Route Target (RT).
- V-78297 Medium The PE router must be configured to have each VRF with the appropriate Route Distinguisher (RD).
- V-78299 Medium The PE router providing MPLS Layer 2 Virtual Private Network (L2VPN) services must be configured to authenticate targeted Label Distribution Protocol (LDP) sessions used to exchange virtual circuit (VC) information using a FIPS-approved message authentication code algorithm.
- V-78301 High The PE router providing MPLS Virtual Private Wire Service (VPWS) must be configured to have the appropriate virtual circuit identification (VC ID) for each attachment circuit.
- V-78303 High The PE router providing Virtual Private LAN Services (VPLS) must be configured to have all attachment circuits defined to the virtual forwarding instance (VFI) with the globally unique VPN ID assigned for each customer VLAN.
- V-78305 Low The PE router must be configured to enforce the split-horizon rule for all pseudowires within a Virtual Private LAN Services (VPLS) bridge domain.
- V-78307 Medium The PE router providing Virtual Private LAN Services (VPLS) must be configured to have traffic storm control thresholds on CE-facing interfaces.
- V-78309 Low The PE router must be configured to implement Internet Group Management Protocol (IGMP) or Multicast Listener Discovery (MLD) snooping for each Virtual Private LAN Services (VPLS) bridge domain.
- V-78311 Medium The PE router must be configured to limit the number of MAC addresses it can learn for each Virtual Private LAN Services (VPLS) bridge domain.
- V-78313 High The PE router must be configured to block any traffic that is destined to IP core infrastructure.
- V-78315 Medium The PE router must be configured with Unicast Reverse Path Forwarding (uRPF) loose mode enabled on all CE-facing interfaces..
- V-78317 Medium The PE router must be configured to ignore or block all packets with any IP options.
- V-78319 Low The PE router must be configured to enforce a Quality-of-Service (QoS) policy in accordance with the QoS DoDIN Technical Profile.
- V-78321 Low The P router must be configured to enforce a Quality-of-Service (QoS) policy in accordance with the QoS GIG Technical Profile.
- V-78325 Medium The PE router must be configured to enforce a Quality-of-Service (QoS) policy to limit the effects of packet flooding denial-of-service (DoS) attacks.
- V-78327 Low The multicast Rendezvous Point (RP) router must be configured to limit the multicast forwarding cache so that its resources are not saturated by managing an overwhelming number of Protocol Independent Multicast (PIM) and Multicast Source Discovery Protocol (MSDP) source-active entries.
- V-78329 Medium The multicast Rendezvous Point (RP) must be configured to rate limit the number of Protocol Independent Multicast (PIM) Register messages.
- V-78331 Low The multicast Designated Router (DR) must be configured to filter the Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Report messages to allow hosts to join only multicast groups that have been approved by the organization.
- V-78333 Medium The multicast Designated Router (DR) must be configured to filter the Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Report messages to allow hosts to join a multicast group only from sources that have been approved by the organization.
- V-78335 Medium The multicast Designated Router (DR) must be configured to limit the number of mroute states resulting from Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Host Membership Reports.
- V-78337 Medium The multicast Designated Router (DR) must be configured to increase the shortest-path tree (SPT) threshold or set it to infinity to minimalize source-group (S, G) state within the multicast topology where Any Source Multicast (ASM) is deployed.
- V-78339 Medium The Multicast Source Discovery Protocol (MSDP) router must be configured to only accept MSDP packets from known MSDP peers.
- V-78341 Medium The Multicast Source Discovery Protocol (MSDP) router must be configured to authenticate all received MSDP packets.
- V-78343 Low The Multicast Source Discovery Protocol (MSDP) router must be configured to filter received source-active multicast advertisements for any undesirable multicast groups and sources.
- V-78345 Low The Multicast Source Discovery Protocol (MSDP) router must be configured to filter source-active multicast advertisements to external MSDP peers to avoid global visibility of local-only multicast sources and groups.
- V-78347 Low The MSDP router must be configured to limit the amount of source-active messages it accepts on per-peer basis.
- V-78349 Low The Multicast Source Discovery Protocol (MSDP) router must be configured to use its loopback address as the source address when originating MSDP traffic.
- V-78351 Medium The router must be configured to only permit management traffic that ingresses and egresses the OOBM interface.
- V-78357 Medium The out-of-band management (OOBM) gateway router must be configured to block any traffic destined to itself that is not sourced from the OOBM network or the NOC.
- V-92243 Low The BGP router must be configured to reject route advertisements from CE routers with an originating AS in the AS_PATH attribute that does not belong to that customer.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001368
- Version
- SRG-NET-000018-RTR-000001
- Vuln IDs
-
- V-207097
- V-78209
- Rule IDs
-
- SV-207097r604135_rule
- SV-92915
Checks: C-7358r382136_chk
This requirement is not applicable for the DoDIN Backbone. Review the router configuration to verify that access control lists (ACLs) and filters are configured to allow or deny traffic for specific source and destination addresses as well as ports and protocols. These filters should be applied inbound or outbound on the appropriate external and internal interfaces. If the router is not configured to enforce approved authorizations for controlling the flow of information within the network based on organization-defined information flow control policies, this is a finding.
Fix: F-7358r382137_fix
This requirement is not applicable for the DoDIN Backbone. Configure ACLs and filters to allow or deny traffic for specific source and destination addresses as well as ports and protocols. Apply the filters inbound or outbound on the appropriate external and internal interfaces. Policy-based routing can also be implemented if needed.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001368
- Version
- SRG-NET-000018-RTR-000002
- Vuln IDs
-
- V-207098
- V-78267
- Rule IDs
-
- SV-207098r604135_rule
- SV-92973
Checks: C-7359r382139_chk
Review the router configuration to verify that it will reject routes of any Bogon prefixes. The prefix filter must be referenced inbound on the appropriate BGP neighbor statements. If the router is not configured to reject inbound route advertisements for any Bogon prefixes, this is a finding.
Fix: F-7359r382140_fix
Ensure all eBGP routers are configured to reject inbound route advertisements for any Bogon prefixes.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001368
- Version
- SRG-NET-000018-RTR-000003
- Vuln IDs
-
- V-207099
- V-78269
- Rule IDs
-
- SV-207099r604135_rule
- SV-92975
Checks: C-7360r382142_chk
Review the router configuration to verify that it will reject routes belonging to the local AS. The prefix filter must be referenced inbound on the appropriate BGP neighbor statements. If the router is not configured to reject inbound route advertisements belonging to the local AS, this is a finding.
Fix: F-7360r382143_fix
Ensure all eBGP routers are configured to reject inbound route advertisements for any prefixes belonging to the local AS.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001368
- Version
- SRG-NET-000018-RTR-000004
- Vuln IDs
-
- V-207100
- V-78271
- Rule IDs
-
- SV-207100r604135_rule
- SV-92977
Checks: C-7361r382145_chk
Review the router configuration to verify that there are filters defined to only accept routes for prefixes that belong to specific customers. The prefix filter must be referenced inbound on the appropriate BGP neighbor statement. If the router is not configured to reject inbound route advertisements from each CE router for prefixes that are not allocated to that customer, this is a finding. Note: Routes to PE-CE links within a VPN are needed for troubleshooting end-to-end connectivity across the MPLS/IP backbone. Hence, these prefixes are an exception to this requirement.
Fix: F-7361r382146_fix
Configure all eBGP routers to reject inbound route advertisements from a CE router for prefixes that are not allocated to that customer.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001368
- Version
- SRG-NET-000018-RTR-000005
- Vuln IDs
-
- V-207101
- V-78273
- Rule IDs
-
- SV-207101r604135_rule
- SV-92979
Checks: C-7362r382148_chk
This requirement is not applicable for the DODIN Backbone. Review the router configuration to verify that there is a filter defined to only advertise routes for prefixes that belong to any customers or the local AS. The prefix filter must be referenced outbound on the appropriate BGP neighbor statements. If the router is not configured to reject outbound route advertisements that belong to any customers or the local AS, this is a finding.
Fix: F-7362r382149_fix
Configure all eBGP routers to filter outbound route advertisements for prefixes that are not allocated to or belong to any customer or the local AS.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-000032
- Version
- SRG-NET-000018-RTR-000006
- Vuln IDs
-
- V-207102
- V-78277
- Rule IDs
-
- SV-207102r604135_rule
- SV-92983
Checks: C-7363r382151_chk
Review the router configuration to verify the router is configured to deny updates received from eBGP peers that do not list their AS number as the first AS in the AS_PATH attribute. If the router is not configured to reject updates from peers that do not list their AS number as the first AS in the AS_PATH attribute, this is a finding.
Fix: F-7363r382152_fix
Configure all ASBRs to deny updates received from eBGP peers that do not list their AS number as the first AS in the AS_PATH attribute.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001368
- Version
- SRG-NET-000018-RTR-000007
- Vuln IDs
-
- V-207103
- V-78343
- Rule IDs
-
- SV-207103r604135_rule
- SV-93049
Checks: C-7364r382154_chk
Review the router configuration to determine if there is an import policy to block source-active multicast advertisements for any undesirable multicast groups, as well as any (S, G) states with undesirable source addresses. Step 1: Verify that an inbound source-active filter is bound to each MSDP peer. Step 2: Review the access lists referenced by the source-active filter to verify that undesirable multicast groups, auto-RP, single source multicast (SSM) groups, and advertisements from undesirable sources are blocked. If the router is not configured with an import policy to block undesirable SA multicast advertisements, this is a finding.
Fix: F-7364r382155_fix
Configure the MSDP router to implement an import policy to block multicast advertisements for undesirable multicast groups and sources.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001368
- Version
- SRG-NET-000018-RTR-000008
- Vuln IDs
-
- V-207104
- V-78345
- Rule IDs
-
- SV-207104r604135_rule
- SV-93051
Checks: C-7365r382157_chk
Review the router configuration to determine if there is export policy to block local source-active multicast advertisements. Verify that an outbound source-active filter is bound to each MSDP peer. Review the access lists referenced by the source-active filters and verify that MSDP source-active messages being sent to MSDP peers do not leak advertisements that are local. If the router is not configured with an export policy to block local source-active multicast advertisements, this is a finding.
Fix: F-7365r382158_fix
Ensure an export policy is implemented on all MSDP routers to avoid global visibility of local multicast (S, G) states.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001368
- Version
- SRG-NET-000018-RTR-000009
- Vuln IDs
-
- V-207105
- V-78347
- Rule IDs
-
- SV-207105r604135_rule
- SV-93053
Checks: C-7366r382160_chk
Review the router configuration to determine if it is configured to limit the amount of source-active messages it accepts on a per-peer basis. If the router is not configured to limit the source-active messages it accepts, this is a finding.
Fix: F-7366r382161_fix
Configure the MSDP router to limit the amount of source-active messages it accepts from each peer.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-000032
- Version
- SRG-NET-000018-RTR-000010
- Vuln IDs
-
- V-207106
- V-92243
- Rule IDs
-
- SV-207106r604135_rule
- SV-102345
Checks: C-7367r382163_chk
This requirement is not applicable for the DODIN Backbone. Review the router configuration to verify the router is configured to deny updates received from CE routers with an originating AS in the AS_PATH attribute that does not belong to that customer. Step 1: Review router configuration and verify that there is an as-path access-list statement defined to only accept routes from a CE router whose AS did not originate the route. Step 2: Verify that the as-path access list is referenced by the filter-list inbound for the appropriate BGP neighbors. If the router is not configured to reject updates from CE routers with an originating AS in the AS_PATH attribute that does not belong to that customer, this is a finding.
Fix: F-7367r382164_fix
Configure the router to reject updates from CE routers with an originating AS in the AS_PATH attribute that does not belong to that customer.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000001
- Vuln IDs
-
- V-207107
- V-78235
- Rule IDs
-
- SV-207107r604135_rule
- SV-92941
Checks: C-7368r382166_chk
Review the configuration and verify that the auxiliary port is disabled unless a secured modem providing encryption and authentication is connected to it. If the auxiliary port is not disabled or is not connected to a secured modem when it is enabled, this is a finding.
Fix: F-7368r382167_fix
Disable the auxiliary port. If used for out-of-band administrative access, the port must be connected to a secured modem providing encryption and authentication.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000002
- Vuln IDs
-
- V-207108
- V-55721
- Rule IDs
-
- SV-207108r604135_rule
- SV-69975
Checks: C-7369r382169_chk
Verify each router enforces approved authorizations for controlling the flow of information between interconnected networks in accordance with applicable policy. If the router does not enforce approved authorizations for controlling the flow of information between interconnected networks in accordance with applicable policy, this is a finding.
Fix: F-7369r382170_fix
Configure the router to enforce approved authorizations for controlling the flow of information between interconnected networks in accordance with applicable policy.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000003
- Vuln IDs
-
- V-207109
- V-55723
- Rule IDs
-
- SV-207109r604135_rule
- SV-69977
Checks: C-7370r382172_chk
If IPv4 or IPv6 multicast routing is enabled, verify all interfaces enabled for PIM are documented in the network's multicast topology diagram. Review the router configuration to determine if multicast routing is enabled and which interfaces are enabled for PIM. If an interface is not required to support multicast routing and it is enabled, this is a finding.
Fix: F-7370r382173_fix
Document all enabled interfaces for PIM in the network's multicast topology diagram. Disable support for PIM on interfaces that are not required to support it.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000004
- Vuln IDs
-
- V-207110
- V-55727
- Rule IDs
-
- SV-207110r604135_rule
- SV-69981
Checks: C-7371r382175_chk
This requirement is not applicable for the DoDIN Backbone. Review the multicast topology diagram and determine if router interfaces are enabled for IPv4 or IPv6 multicast routing. If the router is enabled for multicast routing, verify all interfaces enabled for PIM have a neighbor filter bound to the interface. The neighbor filter must only accept PIM control plane traffic from the documented PIM neighbors. If PIM neighbor filters are not bound to all interfaces that have PIM enabled, this is a finding.
Fix: F-7371r382176_fix
This requirement is not applicable for the DoDIN Backbone. Configure neighbor filters to only accept PIM control plane traffic from documented PIM neighbors. Bind neighbor filters to all PIM enabled interfaces.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000005
- Vuln IDs
-
- V-207111
- V-55729
- Rule IDs
-
- SV-207111r604135_rule
- SV-69983
Checks: C-7372r382226_chk
Review the router configuration and verify that admin-scope multicast traffic is blocked at the external edge. If the router is not configured to establish boundaries for administratively scoped multicast traffic, this is a finding.
Fix: F-7372r382227_fix
Step 1: Configure the ACL to deny packets with multicast administratively scoped destination addresses. Step 2: Apply the multicast boundary at the appropriate interfaces.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000007
- Vuln IDs
-
- V-207112
- V-55731
- Rule IDs
-
- SV-207112r604135_rule
- SV-69985
Checks: C-7373r382229_chk
Review the router configuration. If an interface is not being used but is configured or enabled, this is a finding.
Fix: F-7373r382230_fix
Delete inactive sub-interfaces and disable and delete the configuration of any inactive ports on the router.
- RMF Control
- AC-4
- Severity
- H
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000008
- Vuln IDs
-
- V-207113
- V-78241
- Rule IDs
-
- SV-207113r604135_rule
- SV-92947
Checks: C-7374r382232_chk
This requirement is not applicable for the DoDIN Backbone. Review the configuration of each router interface connecting to an alternate gateway. Verify each permit statement of the ingress filter only permits packets with destination addresses of the site's NIPRNet address space or a destination address belonging to the address block assigned by the alternate gateway network service provider. If the ingress filter permits packets with addresses other than those specified, such as destination addresses of the site's NIPRNet address space or a destination address belonging to the address block assigned by the alternate gateway network service provider, this is a finding.
Fix: F-7374r382233_fix
This requirement is not applicable for the DoDIN Backbone. Configure the ingress filter of the perimeter router connected to an alternate gateway to only permit packets with destination addresses of the site's NIPRNet address space or a destination address belonging to the address block assigned by the alternate gateway network service provider.
- RMF Control
- AC-4
- Severity
- H
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000009
- Vuln IDs
-
- V-207114
- V-55733
- Rule IDs
-
- SV-207114r604135_rule
- SV-69987
Checks: C-7375r382235_chk
This requirement is not applicable for the DoDIN Backbone. Review the configuration of the router connecting to the alternate gateway. Verify there are no BGP neighbors configured to the remote AS that belongs to the alternate gateway service provider. If there are BGP neighbors connecting the remote AS of the alternate gateway service provider, this is a finding.
Fix: F-7375r382236_fix
This requirement is not applicable for the DoDIN Backbone. Configure a static route on the perimeter router to reach the AS of a router connecting to an alternate gateway.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000010
- Vuln IDs
-
- V-207115
- V-55735
- Rule IDs
-
- SV-207115r604135_rule
- SV-69989
Checks: C-7376r382238_chk
This requirement is not applicable for the DoDIN Backbone. Review the configuration of the router connecting to the alternate gateway and verify that redistribution of static routes to the alternate gateway is not occurring. If the static routes to the alternate gateway are being redistributed into BGP or any IGP peering with a NIPRNet gateway or another autonomous system, this is a finding.
Fix: F-7376r382239_fix
This requirement is not applicable for the DoDIN Backbone. Configure the router so that static routes are not redistributed to an alternate gateway into either an Exterior Gateway Protocol or Interior Gateway Protocol to the NIPRNet or to other autonomous systems.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000011
- Vuln IDs
-
- V-207116
- V-55739
- Rule IDs
-
- SV-207116r604135_rule
- SV-69993
Checks: C-7377r382241_chk
This requirement is not applicable for the DoDIN Backbone. Verify that the OOBM interface is an adjacency in the Interior Gateway Protocol routing domain for the management network. If the router does not enforce that Interior Gateway Protocol instances configured on the OOBM gateway router peer only with their own routing domain, this is a finding.
Fix: F-7377r382242_fix
This requirement is not applicable for the DoDIN Backbone. Configure the router to enforce that Interior Gateway Protocol instances configured on the OOBM gateway router peer only with their own routing domain.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000012
- Vuln IDs
-
- V-207117
- V-55741
- Rule IDs
-
- SV-207117r604135_rule
- SV-69995
Checks: C-7378r382244_chk
This requirement is not applicable for the DoDIN Backbone. Verify the Interior Gateway Protocol instance used for the managed network does not redistribute routes into the Interior Gateway Protocol instance used for the management network, and vice versa. If the Interior Gateway Protocol instance used for the managed network redistributes routes into the Interior Gateway Protocol instance used for the management network, or vice versa, this is a finding.
Fix: F-7378r382245_fix
This requirement is not applicable for the DoDIN Backbone. Configure the Interior Gateway Protocol instance used for the managed network to prohibit redistribution of routes into the Interior Gateway Protocol instance used for the management network, and vice versa.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000013
- Vuln IDs
-
- V-207118
- V-55747
- Rule IDs
-
- SV-207118r604135_rule
- SV-70001
Checks: C-7379r382247_chk
Verify that the RP router is configured to filter PIM register messages. If the RP router peering with PIM-SM routers is not configured with a PIM import policy to block registration messages for any undesirable multicast groups and sources, this is a finding.
Fix: F-7379r382248_fix
Configure the RP router to filter PIM register messages received from a multicast DR for any undesirable multicast groups or sources.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000014
- Vuln IDs
-
- V-207119
- V-55749
- Rule IDs
-
- SV-207119r604135_rule
- SV-70003
Checks: C-7380r382250_chk
Verify that the RP router is configured to filter PIM register messages. Note: Alternative is to configure all designated routers to filter IGMP Membership Report (a.k.a join) messages received from hosts. If the RP router peering with PIM-SM routers is not configured with a PIM import policy to block registration messages for any undesirable multicast groups and Bogon sources, this is a finding.
Fix: F-7380r382251_fix
RP routers that are peering with customer PIM-SM routers must implement a PIM import policy to block join messages for reserved and any undesirable multicast groups.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000132
- Version
- SRG-NET-000076-RTR-000001
- Vuln IDs
-
- V-207120
- V-78231
- Rule IDs
-
- SV-207120r604135_rule
- SV-92937
Checks: C-7381r382253_chk
The router must log all packets that have been dropped via the access control list (ACL). If the router fails to log all packets that have been dropped via the ACL, this is a finding. Log output must contain an interface name as to where the packet was filtered. If the logged output does not contain an interface name as to where the packet was filtered, this is a finding.
Fix: F-7381r382254_fix
Configure the router to record the interface in the log record for packets being dropped.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- SRG-NET-000077-RTR-000001
- Vuln IDs
-
- V-207121
- V-78233
- Rule IDs
-
- SV-207121r604135_rule
- SV-92939
Checks: C-7382r382256_chk
The router must log all packets that have been dropped via the access control list. If the router fails to log all packets that have been dropped via the control list, this is a finding. Log output must contain the source IP address and port of the filtered packets. If the logged output does not contain source IP address and port of the filtered packets, this is a finding.
Fix: F-7382r382257_fix
Configure the router to record the source address in the log record for packets being dropped.
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000134
- Version
- SRG-NET-000078-RTR-000001
- Vuln IDs
-
- V-207122
- V-78229
- Rule IDs
-
- SV-207122r604135_rule
- SV-92935
Checks: C-7383r382259_chk
Review the router interface access control lists (ACLs) to verify all deny statements are logged. If packets being dropped are not logged, this is a finding.
Fix: F-7383r382260_fix
Configure interface ACLs to log all deny statements.
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- SRG-NET-000131-RTR-000035
- Vuln IDs
-
- V-207123
- V-55763
- Rule IDs
-
- SV-207123r604135_rule
- SV-70017
Checks: C-7384r382262_chk
Review the router configuration to determine if services or functions not required for operation, or not related to router functionality (e.g., DNS, email client or server, FTP server, or web server) are enabled. If unnecessary services and functions are enabled on the router, this is a finding.
Fix: F-7384r382263_fix
Remove unneeded services and functions from the router. Removal is recommended because the service or function may be inadvertently enabled otherwise. However, if removal is not possible, disable the service or function.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- SRG-NET-000168-RTR-000077
- Vuln IDs
-
- V-207124
- V-55765
- Rule IDs
-
- SV-207124r604135_rule
- SV-70019
Checks: C-7385r382265_chk
Review the router configuration. For every protocol that affects the routing or forwarding tables (where information is exchanged between neighbors), verify that neighbor router authentication is encrypting the authentication key. If authentication is not encrypting the authentication key, this is a finding.
Fix: F-7385r382266_fix
Configure routing protocol authentication to encrypt the authentication key.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- SRG-NET-000168-RTR-000078
- Vuln IDs
-
- V-207125
- V-55767
- Rule IDs
-
- SV-207125r604135_rule
- SV-70021
Checks: C-7386r382268_chk
Review the router configuration to verify it is using a NIST-validated FIPS 198-1 message authentication code algorithm to authenticate routing protocol messages. If a NIST-validated FIPS 198-1 message authentication code algorithm is not being used to authenticate routing protocol messages, this is a finding.
Fix: F-7386r382269_fix
Configure routing protocol authentication to use a NIST-validated FIPS 198-1 message authentication code algorithm.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001094
- Version
- SRG-NET-000192-RTR-000002
- Vuln IDs
-
- V-207126
- V-78311
- Rule IDs
-
- SV-207126r604135_rule
- SV-93017
Checks: C-7387r382271_chk
Review the PE router configuration to determine if a MAC address limit has been set for each bridge domain. If a limit has not been configured, this is a finding.
Fix: F-7387r382272_fix
Configure a MAC address learning limit for each VPLS bridge domain.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-001095
- Version
- SRG-NET-000193-RTR-000001
- Vuln IDs
-
- V-207127
- V-78289
- Rule IDs
-
- SV-207127r604135_rule
- SV-92995
Checks: C-7388r382319_chk
Review the router configuration to verify that the router has been configured to prevent a burst of RSVP traffic engineering signaling messages from overflowing the input queue of any neighbor core router. If the router with RSVP-TE enabled does not have message pacing configured based on the link speed and input queue size of adjacent core routers, this is a finding.
Fix: F-7388r382320_fix
Ensure all routers with RSVP-TE enabled have message pacing configured that will adjust maximum burst and maximum number of RSVP messages to an output queue based on the link speed and input queue size of adjacent core routers.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001095
- Version
- SRG-NET-000193-RTR-000002
- Vuln IDs
-
- V-207128
- V-78307
- Rule IDs
-
- SV-207128r604135_rule
- SV-93013
Checks: C-7389r382322_chk
Review the router configuration to verify that storm control is enabled on CE-facing interfaces deploying VPLS. If storm control is not enabled for broadcast traffic, this is a finding. Note: The threshold level can be from 0 to 100 percent of the link's bandwidth, where "0" suppresses all traffic. Most FastEthernet switching modules do not support multicast and unicast traffic storm control.
Fix: F-7389r382323_fix
Configure storm control for each VPLS bridge domain. Base the suppression threshold on expected traffic rates plus some additional capacity.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001095
- Version
- SRG-NET-000193-RTR-000112
- Vuln IDs
-
- V-207129
- V-78325
- Rule IDs
-
- SV-207129r604135_rule
- SV-93031
Checks: C-7390r382325_chk
Review the router configuration and interview the System Administrator to verify that a mechanism for traffic prioritization and bandwidth reservation exists. This arrangement must ensure that sufficient capacity is available for mission-critical traffic and enforce the traffic priorities specified by the Combatant Commands/Services/Agencies. If no such scheme exists or it is not configured, this is a finding.
Fix: F-7390r382326_fix
Implement a mechanism for traffic prioritization and bandwidth reservation. This mechanism must enforce the traffic priorities specified by the Combatant Commands/Services/Agencies.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-001095
- Version
- SRG-NET-000193-RTR-000113
- Vuln IDs
-
- V-207130
- V-78319
- Rule IDs
-
- SV-207130r604135_rule
- SV-93025
Checks: C-7391r539640_chk
Review the router configuration and verify that a QoS policy has been configured to provide preferred treatment for mission-critical applications in accordance with the QoS GIG Technical Profile. Verify that the class-maps are configured to match on DSCP, protocols, or access control lists (ACLs) that identify traffic types based on ports. Verify that the policy-map is configured to set DSCP values for the defined class-maps in accordance with the QoS GIG Technical Profile. Verify that an output service policy is bound to all interfaces. Note: The GTP QOS document (GTP-0009) can be downloaded via the following link: https://intellipedia.intelink.gov/wiki/Portal:GIG_Technical_Guidance/GTG_GTPs/GTP_Development_List If the router is not configured to implement a QoS policy in accordance with the QoS GIG Technical Profile, this is a finding.
Fix: F-7391r539641_fix
Configure a QoS policy on each router in accordance with the QoS GIG Technical Profile.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-001095
- Version
- SRG-NET-000193-RTR-000114
- Vuln IDs
-
- V-207131
- V-78321
- Rule IDs
-
- SV-207131r604135_rule
- SV-93027
Checks: C-7392r539643_chk
Review the router configuration and verify that a QoS policy has been configured to provide preferred treatment for mission-critical applications in accordance with the QoS GIG Technical Profile. Verify that the class-maps are configured to match on DSCP, protocols, or access control lists (ACLs) that identify traffic types based on ports. Verify that the policy-map is configured to set DSCP values for the defined class-maps in accordance with the QoS GIG Technical Profile. Verify that an input service policy is bound to all interfaces. Note: The GTP QOS document (GTP-0009) can be downloaded via the following link: https://intellipedia.intelink.gov/wiki/Portal:GIG_Technical_Guidance/GTG_GTPs/GTP_Development_List If the router is not configured to implement a QoS policy in accordance with the QoS GIG Technical Profile, this is a finding.
Fix: F-7392r539644_fix
Configure a QoS policy on each router in accordance with the QoS GIG Technical Profile.
- RMF Control
- SC-7
- Severity
- H
- CCI
- CCI-001109
- Version
- SRG-NET-000202-RTR-000001
- Vuln IDs
-
- V-207132
- V-78237
- Rule IDs
-
- SV-207132r604135_rule
- SV-92943
Checks: C-7393r382334_chk
This requirement is not applicable for the DoDIN Backbone. Review the router configuration to verify that the access control list (ACL) or filter is configured to allow specific ports and protocols and deny all other traffic. The filter must be configured inbound on all external interfaces. If the ACL or filter is not configured to allow specific ports and protocols and deny all other traffic, this is a finding. If the filter is not configured inbound on all external interfaces, this is a finding.
Fix: F-7393r382335_fix
This requirement is not applicable for the DoDIN Backbone. Configure the perimeter router to deny network traffic by default and allow network traffic by exception.
- RMF Control
- SC-7
- Severity
- H
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000001
- Vuln IDs
-
- V-207133
- V-78215
- Rule IDs
-
- SV-207133r604135_rule
- SV-92921
Checks: C-7394r382337_chk
Review the access control list (ACL) or filter for the router receive path and verify that it will only process specific management plane and control plane traffic from specific sources. If the router is not configured with a receive-path filter to restrict traffic destined to itself, this is a finding. Note: If the platform does not support the receive path filter, verify that all Layer 3 interfaces have an ingress ACL to control what packets are allowed to be destined to the router for processing.
Fix: F-7394r382338_fix
Configure all routers with receive path filters to restrict traffic destined to the router.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000002
- Vuln IDs
-
- V-207134
- V-78217
- Rule IDs
-
- SV-207134r604135_rule
- SV-92923
Checks: C-7395r382340_chk
Review the access control list (ACL) or filter for the router receive path. Verify that it will drop all fragmented ICMP packets destined to itself. If the router is not configured with a receive-path filter to drop all fragmented ICMP packets, this is a finding. Note: If the platform does not support the receive path filter, verify that all Layer 3 interfaces have an ingress ACL to control what packets are allowed to be destined to the router for processing.
Fix: F-7395r382341_fix
Ensure all routers have their receive path filter configured to drop all fragmented ICMP packets.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000003
- Vuln IDs
-
- V-207135
- V-78243
- Rule IDs
-
- SV-207135r604135_rule
- SV-92949
Checks: C-7396r382343_chk
This requirement is not applicable for the DoDIN Backbone. Review the router configuration to verify that the ingress filter is in accordance with DoD 8551. If the router does not filter traffic in accordance with the guidelines contained in DoD 8551, this is a finding.
Fix: F-7396r539636_fix
This requirement is not applicable for the DoDIN Backbone. Configure the router to use ingress ACLs to restrict traffic in accordance with the guidelines contained in DOD Instruction 8551.1 for all services and protocols required for operational commitments.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000004
- Vuln IDs
-
- V-207136
- V-78245
- Rule IDs
-
- SV-207136r604135_rule
- SV-92951
Checks: C-7397r382346_chk
This requirement is not applicable for the DoDIN Backbone. Review the router configuration to verify that the ingress ACL is bound to the external interface in an inbound direction. If the router is not configured to filter traffic entering the network at the external interface in an inbound direction, this is a finding.
Fix: F-7397r382347_fix
This requirement is not applicable for the DoDIN Backbone. Bind the ingress ACL to the external interface (inbound).
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000005
- Vuln IDs
-
- V-207137
- V-78247
- Rule IDs
-
- SV-207137r604135_rule
- SV-92953
Checks: C-7398r382349_chk
This requirement is not applicable for the DoDIN Backbone. Review the router configuration to verify that the egress ACL is bound to the internal interface in an inbound direction. If the router is not configured to filter traffic leaving the network at the internal interface in an inbound direction, this is a finding.
Fix: F-7398r382350_fix
This requirement is not applicable for the DoDIN Backbone. Configure an egress ACL bound to the internal interface in an inbound direction to filter traffic leaving the network.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000006
- Vuln IDs
-
- V-207138
- V-78275
- Rule IDs
-
- SV-207138r604135_rule
- SV-92981
Checks: C-7399r382352_chk
Review the router configuration to verify that there is a filter defined to block route advertisements for prefixes that belong to the IP core. The prefix filter must be referenced outbound on the appropriate BGP neighbor statements. If the router is not configured to reject outbound route advertisements that belong to the IP core, this is a finding.
Fix: F-7399r382353_fix
Configure all eBGP routers to filter outbound route advertisements belonging to the IP core.
- RMF Control
- SC-7
- Severity
- H
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000007
- Vuln IDs
-
- V-207139
- V-78313
- Rule IDs
-
- SV-207139r604135_rule
- SV-93019
Checks: C-7400r382355_chk
Review the router configuration to verify that an ingress ACL is applied to all CE-facing interfaces. Verify that the ingress ACL rejects and logs packets destined to the IP core address block. If the PE router is not configured to block any traffic with a destination address assigned to the IP core infrastructure, this is a finding. Note: Internet Control Message Protocol (ICMP) echo requests and traceroutes will be allowed to the edge from external adjacent peers.
Fix: F-7400r382356_fix
Configure protection for the IP core to be implemented at the edges by blocking any traffic with a destination address assigned to the IP core infrastructure.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000008
- Vuln IDs
-
- V-207140
- V-78315
- Rule IDs
-
- SV-207140r604135_rule
- SV-93021
Checks: C-7401r382358_chk
Review the router configuration to determine if uRPF loose mode is enabled on all CE-facing interfaces. If uRPF loose mode is not enabled on all CE-facing interfaces, this is a finding.
Fix: F-7401r382359_fix
Enable uRPF loose mode on all CE-facing interfaces.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000009
- Vuln IDs
-
- V-207141
- V-78255
- Rule IDs
-
- SV-207141r604135_rule
- SV-92961
Checks: C-7402r382361_chk
This requirement is not applicable for the DoDIN Backbone. Review the network topology diagram to determine connectivity between the managed network and the NOC. Review the OOBM gateway router configuration to validate the path and interface that the management traffic traverses. If management traffic is not transported between the managed network and the NOC via dedicated circuit, MPLS/VPN service, or IPsec tunnel, this is a finding.
Fix: F-7402r382362_fix
This requirement is not applicable for the DoDIN Backbone. Ensure that a dedicated circuit, MPLS/VPN service, or IPsec tunnel is deployed to transport management traffic between the managed network and the NOC.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000010
- Vuln IDs
-
- V-207142
- V-78257
- Rule IDs
-
- SV-207142r604135_rule
- SV-92963
Checks: C-7403r382409_chk
This requirement is not applicable for the DoDIN Backbone. Review the network topology diagram to determine connectivity between the managed network and the NOC. Review the OOBM gateway router configuration to validate the path that the management traffic traverses. Verify that only management traffic is forwarded through the OOBM interface or IPsec tunnel. If traffic other than authorized management traffic is permitted through the OOBM interface or IPsec tunnel, this is a finding.
Fix: F-7403r382410_fix
This requirement is not applicable for the DoDIN Backbone. Configure filters based on port, source IP address, and destination IP address to permit only authorized management traffic into IPsec tunnels or the OOBM interface used for forwarding management data.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000011
- Vuln IDs
-
- V-207143
- V-78357
- Rule IDs
-
- SV-207143r604135_rule
- SV-93063
Checks: C-7404r382412_chk
This requirement is not applicable for the DoDIN Backbone. Review the access control list (ACL) or filter for the router receive path. Verify that only traffic sourced from the OOBM network or the NOC is allowed to access the router. If the router does not block any traffic destined to itself that is not sourced from the OOBM network or the NOC, this is a finding. Note: If the platform does not support the receive path filter, verify that all non-OOBM interfaces have an ingress ACL to restrict access to that interface address or any of the router’s loopback addresses to only traffic sourced from the management network. An exception would be to allow packets destined to these interfaces used for troubleshooting, such as ping and traceroute.
Fix: F-7404r382413_fix
This requirement is not applicable for the DoDIN Backbone. Ensure that traffic from the managed network is not able to access the OOBM gateway router using either receive path or interface ingress ACLs.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000012
- Vuln IDs
-
- V-207144
- V-78351
- Rule IDs
-
- SV-207144r604135_rule
- SV-93057
Checks: C-7405r382415_chk
Step 1: Verify that the managed interface has an inbound and outbound ACL configured. Step 2: Verify that the ingress filter only allows management, IGP, and ICMP traffic. Caveat: If the management interface is a true OOBM interface, this requirement is not applicable. If the router does not restrict traffic that ingresses and egresses the management interface, this is a finding.
Fix: F-7405r382416_fix
If the management interface is a routed interface, it must be configured with both an ingress and egress ACL.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000013
- Vuln IDs
-
- V-207145
- V-78263
- Rule IDs
-
- SV-207145r604135_rule
- SV-92969
Checks: C-7406r382418_chk
This requirement is not applicable for the DoDIN Backbone. Verify that all traffic from the managed network to the management network and vice-versa is secured via IPsec tunnel. If the management traffic is not secured via IPsec tunnel, this is a finding.
Fix: F-7406r382419_fix
This requirement is not applicable for the DoDIN Backbone. Ensure that all traffic from the managed network to the management network and vice-versa is secured via IPsec tunnel.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- SRG-NET-000235-RTR-000114
- Vuln IDs
-
- V-207146
- V-55779
- Rule IDs
-
- SV-207146r604135_rule
- SV-70033
Checks: C-7407r382421_chk
Verify the router stops forwarding traffic or maintains the configured security policies upon the failure of the following actions: system initialization, shutdown, or system abort. If the router does not stop forwarding traffic or maintain the configured security policies upon the failure of system initialization, shutdown, or system abort, this is a finding.
Fix: F-7407r382422_fix
This is a capability that would be intrinsic to the router as a result of its development and may not be configurable. If it is a configurable option, configure the router to stop forwarding traffic or maintain the configured security policies upon the failure of the following actions: system initialization, shutdown, or system abort.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001958
- Version
- SRG-NET-000343-RTR-000001
- Vuln IDs
-
- V-207147
- V-78299
- Rule IDs
-
- SV-207147r604135_rule
- SV-93005
Checks: C-7408r382424_chk
Review the router configuration to determine if LDP messages are being authenticated for the targeted LDP sessions. If authentication is not being used for the LDP sessions using a FIPS-approved message authentication code algorithm, this is a finding.
Fix: F-7408r382425_fix
Implement authentication for all targeted LDP sessions using a FIPS-approved message authentication code algorithm.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001958
- Version
- SRG-NET-000343-RTR-000002
- Vuln IDs
-
- V-207148
- V-78341
- Rule IDs
-
- SV-207148r604135_rule
- SV-93047
Checks: C-7409r382427_chk
Review the router configuration to determine if received MSDP packets are authenticated. If the router does not require MSDP authentication, this is a finding.
Fix: F-7409r382428_fix
Ensure all MSDP packets received by an MSDP router are authenticated.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000109
- Vuln IDs
-
- V-207149
- V-78213
- Rule IDs
-
- SV-207149r604135_rule
- SV-92919
Checks: C-7410r382430_chk
Review the device configuration to determine if a configuration auto-loading or zero-touch deployment feature is enabled. If a configuration auto-loading feature or zero-touch deployment feature is enabled, this is a finding. Note: Auto-configuration or zero-touch deployment features can be enabled when the router is offline for the purpose of image loading or building out the configuration. In addition, this would not be applicable to the provisioning of virtual routers via a software-defined network (SDN) orchestration system.
Fix: F-7410r382431_fix
Disable all configuration auto-loading or zero-touch deployment features.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000110
- Vuln IDs
-
- V-207150
- V-55781
- Rule IDs
-
- SV-207150r604135_rule
- SV-70035
Checks: C-7411r382433_chk
Determine whether control plane protection has been implemented on the device by verifying traffic types have been classified based on importance levels and a policy has been configured to filter and rate limit the traffic according to each class. If the router does not have control plane protection implemented, this is a finding.
Fix: F-7411r382434_fix
Implement control plane protection by classifying traffic types based on importance and configure filters to restrict and rate limit the traffic directed to and processed by the RP according to each class.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000111
- Vuln IDs
-
- V-207151
- V-78219
- Rule IDs
-
- SV-207151r604135_rule
- SV-92925
Checks: C-7412r382436_chk
Review the configuration to determine if gratuitous ARP is disabled on all external interfaces. If gratuitous ARP is enabled on any external interface, this is a finding.
Fix: F-7412r382437_fix
Disable gratuitous ARP on all external interfaces.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000112
- Vuln IDs
-
- V-207152
- V-78221
- Rule IDs
-
- SV-207152r604135_rule
- SV-92927
Checks: C-7413r382439_chk
Review the router configuration to determine if IP directed broadcast is enabled. If IP directed broadcast is enabled on Layer 3 interfaces, this is a finding.
Fix: F-7413r382440_fix
Disable IP directed broadcasts on all Layer 3 interfaces.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000113
- Vuln IDs
-
- V-207153
- V-78223
- Rule IDs
-
- SV-207153r604135_rule
- SV-92929
Checks: C-7414r382442_chk
Review the device configuration to determine if controls have been defined to ensure the router does not send ICMP unreachable notifications out to any external interfaces. If ICMP unreachable notifications are enabled on any external interfaces, this is a finding.
Fix: F-7414r382443_fix
Disable ICMP unreachable notifications on all external interfaces.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000114
- Vuln IDs
-
- V-207154
- V-78225
- Rule IDs
-
- SV-207154r604135_rule
- SV-92931
Checks: C-7415r382445_chk
Review the device configuration to determine if controls have been defined to ensure the router does not send ICMP Mask Reply messages out to any external interfaces. If ICMP Mask Reply messages are enabled on any external interfaces, this is a finding.
Fix: F-7415r382446_fix
Disable ICMP mask replies on all external interfaces.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000115
- Vuln IDs
-
- V-207155
- V-78227
- Rule IDs
-
- SV-207155r604135_rule
- SV-92933
Checks: C-7416r382448_chk
Review the device configuration to determine if controls have been defined to ensure the router does not send ICMP Redirect messages out to any external interfaces. If ICMP Redirect messages are enabled on any external interfaces, this is a finding.
Fix: F-7416r382449_fix
Disable ICMP redirects on all external interfaces.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000117
- Vuln IDs
-
- V-207156
- V-78279
- Rule IDs
-
- SV-207156r604135_rule
- SV-92985
Checks: C-7417r382451_chk
Review the router configuration to verify that the number of received prefixes from each eBGP neighbor is controlled. If the router is not configured to control the number of prefixes received from each peer to protect against route table flooding and prefix de-aggregation attacks, this is a finding.
Fix: F-7417r382452_fix
Configure all eBGP routers to use the maximum prefixes feature to protect against route table flooding and prefix de-aggregation attacks.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000118
- Vuln IDs
-
- V-207157
- V-78281
- Rule IDs
-
- SV-207157r604135_rule
- SV-92987
Checks: C-7418r382499_chk
This requirement is not applicable for the DODIN Backbone. Review the router configuration to verify that there is a filter to reject inbound route advertisements that are greater than /24 or the least significant prefixes issued to the customer, whichever is larger. If the router is not configured to limit the prefix size on any inbound route advertisement to /24 or the least significant prefixes issued to the customer, this is a finding.
Fix: F-7418r382500_fix
Ensure all eBGP routers are configured to limit the prefix size on any route advertisement to /24 or the least significant prefixes issued to the customer.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000119
- Vuln IDs
-
- V-207158
- V-78309
- Rule IDs
-
- SV-207158r604135_rule
- SV-93015
Checks: C-7419r382502_chk
Review the router configuration to verify that IGMP or MLD snooping has been configured for IPv4 and IPv6 multicast traffic respectively for each VPLS bridge domain (VFI instance). If the router is not configured to implement IGMP or MLD snooping for each VPLS bridge domain, this is a finding.
Fix: F-7419r382503_fix
Configure IGMP or MLD snooping for IPv4 and IPv6 multicast traffic respectively for each VPLS bridge domain.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000120
- Vuln IDs
-
- V-207159
- V-78327
- Rule IDs
-
- SV-207159r604135_rule
- SV-93033
Checks: C-7420r382505_chk
Review the router configuration to determine if forwarding cache thresholds are defined. If the RP router is not configured to limit the multicast forwarding cache to ensure that its resources are not saturated, this is a finding.
Fix: F-7420r382506_fix
Configure MSDP-enabled RP routers to limit the multicast forwarding cache for source-active entries.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000121
- Vuln IDs
-
- V-207160
- V-78329
- Rule IDs
-
- SV-207160r604135_rule
- SV-93035
Checks: C-7421r382508_chk
Review the configuration of the RP to verify that it is rate limiting the number of multicast register messages. If the RP is not limiting multicast register messages, this is a finding.
Fix: F-7421r382509_fix
Configure the RP to rate limit the number of multicast register messages.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000122
- Vuln IDs
-
- V-207161
- V-78335
- Rule IDs
-
- SV-207161r604135_rule
- SV-93041
Checks: C-7422r382511_chk
Review the DR configuration to verify that it is limiting the number of mroute states via IGMP or MLD. If the DR is not limiting multicast join requests via IGMP or MLD, this is a finding. Note: If both global and per-interface state limiters are configured, the limits configured for per-interface state limiters are still enforced but are constrained by the global limit.
Fix: F-7422r382512_fix
Configure the DR on a global or interface basis to limit the number of mroute states resulting from IGMP or MLD membership reports.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000123
- Vuln IDs
-
- V-207162
- V-78337
- Rule IDs
-
- SV-207162r604135_rule
- SV-93043
Checks: C-7423r382514_chk
Review the multicast last-hop router configuration to verify that the SPT switchover threshold is increased (default is "0") or set to infinity (never switch over). If any multicast router is not configured to increase the SPT threshold or set to infinity to minimalize (S, G) state, this is a finding.
Fix: F-7423r382515_fix
Configure the multicast router to increase the SPT threshold or set it to infinity to minimalize (S, G) state within the multicast topology where ASM is deployed.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-RTR-000109
- Vuln IDs
-
- V-207163
- V-55785
- Rule IDs
-
- SV-207163r604135_rule
- SV-70039
Checks: C-7424r382517_chk
This requirement is not applicable for the DoDIN Backbone. Review the router configuration to determine if the router allows only incoming communications from authorized sources to be routed to authorized destinations. If the router does not restrict incoming communications to allow only authorized sources and destinations, this is a finding.
Fix: F-7424r382518_fix
This requirement is not applicable for the DoDIN Backbone. Configure the router to allow only incoming communications from authorized sources to be routed to authorized destinations.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-RTR-000110
- Vuln IDs
-
- V-207164
- V-78239
- Rule IDs
-
- SV-207164r604135_rule
- SV-92945
Checks: C-7425r539634_chk
This requirement is not applicable for the DODIN Backbone. Verify that the ingress filter is blocking packets with Bogon source addresses. Review the router configuration to verify that it is configured to block IP packets with a Bogon source address. IPv4 Bogon Prefixes 0.0.0.0/8 10.0.0.0/8 100.64.0.0/10 127.0.0.0/8 169.254.0.0/16 172.16.0.0/12 192.0.0.0/24 192.0.2.0/24 192.88.99.0/24 192.168.0.0/16 198.18.0.0/15 | 198.51.100.0/24 203.0.113.0/24 224.0.0.0/4 240.0.0.0/4 IPv6 Bogon Prefixes ::/128 ::1/128 0::/96 ::ffff:0:0/96 3ffe::/16 64:ff9b::/96 100::/64 2001:10::/28 2001:db8::/32 2001:2::/48 2001::/32 2001::/23 2002::/16 fc00::/7 fe80::/10 fec0::/10 ff00::/8 If the router is not configured to block inbound IP packets containing a Bogon source address, this is a finding. Note: At a minimum, IP packets containing a source address from the special purpose address space as defined in RFC 6890 must be blocked. The 6Bone prefix (3ffe::/16) is also be considered a Bogon address. Perimeter routers connected to commercial ISPs for Internet or other non-DoD network sources will need to be reviewed for a full Bogon list. The IPv4 full Bogon list contains prefixes that have been allocated to RIRs but not assigned by those RIRs. Reference the following link: http://www.team-cymru.org/Services/Bogons/fullbogons-ipv4.txt The IPv6 full Bogon list contains prefixes that have not been allocated to RIRs, or those that have been allocated to RIRs but have not been assigned by those RIRs. Reference the following link: https://www.team-cymru.org/Services/Bogons/fullbogons-ipv6.txt
Fix: F-7425r457792_fix
This requirement is not applicable for the DODIN Backbone. Configure the router to block inbound packets with Bogon source addresses.
- RMF Control
- SC-7
- Severity
- L
- CCI
- CCI-002403
- Version
- SRG-NET-000364-RTR-000111
- Vuln IDs
-
- V-207165
- V-78249
- Rule IDs
-
- SV-207165r604135_rule
- SV-92955
Checks: C-7426r382523_chk
This requirement is not applicable for the DoDIN Backbone. Review all router configurations to ensure LLDPs are not included in the global configuration or LLDPs are not included for each active external interface. Examples of LLDPs are Cisco Discovery Protocol (CDP), Link Layer Discovery Protocol (LLDP), and Link Layer Discovery Protocol - Media Endpoint Discovery (LLDP-MED). If LLDPs are configured globally or on any external interface, this is a finding.
Fix: F-7426r382524_fix
This requirement is not applicable for the DoDIN Backbone. Disable LLDPs on all external interfaces.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-RTR-000112
- Vuln IDs
-
- V-207166
- V-78251
- Rule IDs
-
- SV-207166r604135_rule
- SV-92957
Checks: C-7427r382526_chk
This requirement is not applicable for the DoDIN Backbone. Review the router configuration to determine if IP Proxy ARP is disabled on all external interfaces. If IP Proxy ARP is enabled on any external interface, this is a finding.
Fix: F-7427r382527_fix
This requirement is not applicable for the DoDIN Backbone. Disable IP Proxy ARP on all external interfaces.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000364-RTR-000113
- Vuln IDs
-
- V-207167
- V-78253
- Rule IDs
-
- SV-207167r604135_rule
- SV-92959
Checks: C-7428r382529_chk
This requirement is not applicable for the DoDIN Backbone. The perimeter router of the managed network must be configured with an access control list (ACL) or filter on the egress interface to block all management traffic. If management traffic is not blocked at the perimeter, this is a finding.
Fix: F-7428r382530_fix
This requirement is not applicable for the DoDIN Backbone. Configure the perimeter router of the managed network with an ACL or filter on the egress interface to block all outbound management traffic.
- RMF Control
- SC-7
- Severity
- L
- CCI
- CCI-002403
- Version
- SRG-NET-000364-RTR-000114
- Vuln IDs
-
- V-207168
- V-78331
- Rule IDs
-
- SV-207168r604135_rule
- SV-93037
Checks: C-7429r382532_chk
Review the configuration of the DR to verify that it is filtering IGMP or MLD report messages, allowing hosts to join only those groups that have been approved. Note: This requirement is only applicable to Source Specific Multicast (SSM) implementation. This requirement is not applicable to Any Source Multicast (ASM) since the filtering is being performed by the Rendezvous Point router. If the DR is not filtering IGMP or MLD report messages, this is a finding.
Fix: F-7429r382533_fix
Configure the DR to filter the IGMP and MLD report messages to allow hosts to join only those multicast groups that have been approved.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-RTR-000115
- Vuln IDs
-
- V-207169
- V-78333
- Rule IDs
-
- SV-207169r604135_rule
- SV-93039
Checks: C-7430r382535_chk
Review the configuration of the DR to verify that it is filtering IGMP or MLD report messages, allowing hosts to only join multicast groups from sources that have been approved. Note: This requirement is only applicable to Source Specific Multicast (SSM) implementation If the DR is not filtering IGMP or MLD report messages, this is a finding.
Fix: F-7430r382536_fix
Configure the DR to filter the IGMP and MLD report messages to allow hosts to join only those multicast groups from sources that have been approved.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-RTR-000116
- Vuln IDs
-
- V-207170
- V-78339
- Rule IDs
-
- SV-207170r604135_rule
- SV-93045
Checks: C-7431r382538_chk
Review the router configuration to determine if there is a receive path or interface filter to only accept MSDP packets from known MSDP peers. If the router is not configured to only accept MSDP packets from known MSDP peers, this is a finding.
Fix: F-7431r382539_fix
Ensure the receive path or interface filter for all MSDP routers only accepts MSDP packets from known MSDP peers.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001126
- Version
- SRG-NET-000365-RTR-000112
- Vuln IDs
-
- V-207171
- V-55789
- Rule IDs
-
- SV-207171r604135_rule
- SV-70043
Checks: C-7432r382541_chk
Review the documentation of the router or interview the System Administrator. Verify that the router fails securely in the event of an operational failure. If it cannot fail securely, this is a finding.
Fix: F-7432r382542_fix
This is a capability that would be intrinsic to the router as a result of its development and may not be configurable. If it is a configurable option, configure the device to fail securely in the event of an operational failure.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SRG-NET-000512-RTR-000001
- Vuln IDs
-
- V-207172
- V-78283
- Rule IDs
-
- SV-207172r604135_rule
- SV-92989
Checks: C-7433r382604_chk
Review the router configuration to verify that a loopback address has been configured. Verify that a loopback interface is used as the source address for all iBGP sessions. If the router does not use its loopback address as the source address for all iBGP sessions, this is a finding.
Fix: F-7433r382605_fix
Ensure that the router’s loopback address is used as the source address when originating traffic.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SRG-NET-000512-RTR-000002
- Vuln IDs
-
- V-207173
- V-78285
- Rule IDs
-
- SV-207173r604135_rule
- SV-92991
Checks: C-7434r382607_chk
Review the router configuration to determine if it uses its loopback address as the source address for LDP peering sessions. Verify that a loopback address has been configured as shown in the following example: An MPLS router will use the LDP router ID as the source address for LDP hellos and when establishing TCP sessions with LDP peers; hence, it is necessary to verify that the LDP router ID is the same as the loopback address. By default, routers will assign the LDP router ID using the highest IP address on the router, with preference given to loopback addresses. If the router-id command is specified that overrides this default behavior, verify that it is the IP address of the designated loopback interface. If the router is not configured do use its loopback address for LDP peering, this is a finding.
Fix: F-7434r382608_fix
Configure MPLS routers to use their loopback address as the source address for LDP peering sessions.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SRG-NET-000512-RTR-000003
- Vuln IDs
-
- V-207174
- V-78287
- Rule IDs
-
- SV-207174r604135_rule
- SV-92993
Checks: C-7435r382610_chk
Review the router OSPF or IS-IS configuration. Verify that LDP will synchronize with the link-state routing protocol. If the router is not configured to synchronize IGP and LDP, this is a finding.
Fix: F-7435r382611_fix
Configure the MPLS router to synchronize IGP and LDP, minimizing packet loss when an IGP adjacency is established prior to LDP peers completing label exchange.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-RTR-000004
- Vuln IDs
-
- V-207175
- V-78291
- Rule IDs
-
- SV-207175r604135_rule
- SV-92997
Checks: C-7436r382613_chk
Review the router configuration to verify that TTL propagation is disabled. If the router is not configured to disable TTL propagation, this is a finding.
Fix: F-7436r382614_fix
Configure LERs to disable TTL propagation.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- SRG-NET-000512-RTR-000005
- Vuln IDs
-
- V-207176
- V-78293
- Rule IDs
-
- SV-207176r604135_rule
- SV-92999
Checks: C-7437r382616_chk
Review the design plan for deploying L3VPN and VRF-lite. Review all CE-facing interfaces and verify that the proper VRF is defined. If any VRFs are not bound to the appropriate physical or logical interface, this is a finding.
Fix: F-7437r382617_fix
Configure the PE router to have each VRF bound to the appropriate physical or logical interfaces to maintain traffic separation between all MPLS L3VPNs.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- SRG-NET-000512-RTR-000006
- Vuln IDs
-
- V-207177
- V-78295
- Rule IDs
-
- SV-207177r604135_rule
- SV-93001
Checks: C-7438r382619_chk
Verify that the correct RT is configured for each VRF. Review the design plan for MPLS/L3VPN and VRF-lite to determine what RTs have been assigned for each VRF. Review the route-target import, route-target, or route-target export statements under each configured VRF and verify that the correct RTs have been defined for each VRF. Note: Import and export route-maps are normally used when finer granularity is required. If there are VRFs configured with the wrong RT, this is a finding.
Fix: F-7438r382620_fix
Configure all J-PE routers to have the correct VRF defined with the appropriate RT.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-RTR-000007
- Vuln IDs
-
- V-207178
- V-78297
- Rule IDs
-
- SV-207178r604135_rule
- SV-93003
Checks: C-7439r382622_chk
Review the RDs that have been assigned for each VRF according to the plan provided by the ISSM. Review all VRFs configured on CE-facing interfaces and verify that the proper RD has been configured for each. If the wrong RD has been configured for any VRF, this is a finding.
Fix: F-7439r382623_fix
Configure the correct RD for each VRF.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- SRG-NET-000512-RTR-000008
- Vuln IDs
-
- V-207179
- V-78301
- Rule IDs
-
- SV-207179r604135_rule
- SV-93007
Checks: C-7440r382625_chk
Review the ingress and egress PE router configuration for each virtual circuit that has been provisioned. Verify that the correct and unique VCID has been configured for the appropriate attachment circuit. If the correct VC ID has not been configured on both routers, this is a finding. Note: Ethernet over MPLS in VLAN mode transports Ethernet traffic from a source 802.1Q VLAN to a destination 802.1Q VLAN over a core MPLS network. The VC ID must be unique and the same on each end as it is used to connect the endpoints of the VC.
Fix: F-7440r382626_fix
Assign globally unique VC IDs for each virtual circuit and configure the attachment circuits with the appropriate VC ID. Configure the same VC ID on both ends of the VC.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- SRG-NET-000512-RTR-000009
- Vuln IDs
-
- V-207180
- V-78303
- Rule IDs
-
- SV-207180r604135_rule
- SV-93009
Checks: C-7441r382628_chk
Review the implementation plan and the VPN IDs assigned to customer VLANs for the VPLS deployment. Review the PE router configuration to verify that customer attachment circuits (i.e., VLANs) are associated to the appropriate VFI. If the attachment circuits have not been bound to VFI configured with the assigned VPN ID for each VLAN, this is a finding.
Fix: F-7441r382629_fix
Assign globally unique VPN IDs for each customer VLAN using VPLS for carrier Ethernet services between multiple sites, and configure the attachment circuits to the appropriate VFI.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SRG-NET-000512-RTR-000010
- Vuln IDs
-
- V-207181
- V-78305
- Rule IDs
-
- SV-207181r604135_rule
- SV-93011
Checks: C-7442r382631_chk
Review the PE router configuration to verify that split horizon is enabled. If it is disabled, this is a finding. Note: In a ring VPLS, split horizon is disabled so that a PE router can forward a packet received from one pseudowire to another pseudowire. To prevent the consequential loop, at least one span in the ring would not have a pseudowire for any given VPLS instance.
Fix: F-7442r382632_fix
Enable split horizon on all PE routers deploying VPLS in a full-mesh configuration.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SRG-NET-000512-RTR-000011
- Vuln IDs
-
- V-207182
- V-78349
- Rule IDs
-
- SV-207182r604135_rule
- SV-93055
Checks: C-7443r382634_chk
Review the router configuration to verify that a loopback address has been configured. Verify that a loopback interface is used as the source address for all MSDP packets generated by the router. If the router does not use its loopback address as the source address when originating MSDP traffic, this is a finding.
Fix: F-7443r382635_fix
Ensure that the router’s loopback address is used as the source address when originating traffic.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-RTR-000100
- Vuln IDs
-
- V-216506
- V-100095
- Rule IDs
-
- SV-216506r604135_rule
- SV-109199
Checks: C-17741r382637_chk
Determine if the router is configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs. If it is not configured in accordance with the designated security configuration settings, this is a finding.
Fix: F-17739r382638_fix
Configure the router to be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000131-RTR-000083
- Vuln IDs
-
- V-216978
- V-78211
- Rule IDs
-
- SV-216978r604135_rule
- SV-92917
Checks: C-18208r382640_chk
Verify the call home service is disabled on the device. If a call home service is enabled, this is a finding.
Fix: F-18206r382641_fix
Configure the network device to disable the call home service or feature.
- RMF Control
- SC-5
- Severity
- H
- CCI
- CCI-001094
- Version
- SRG-NET-000205-RTR-000014
- Vuln IDs
-
- V-216979
- V-55761
- Rule IDs
-
- SV-216979r604135_rule
- SV-70015
Checks: C-18209r382643_chk
This requirement is not applicable for the DoDIN Backbone. Review the router configuration to verify uRPF or an egress filter has been configured on all internal interfaces to restrict the router from accepting outbound IP packets that contain an illegitimate address in the source address field. If uRPF or an egress filter to restrict the router from accepting outbound IP packets that contain an illegitimate address in the source address field has not been configured on all internal interfaces, this is a finding.
Fix: F-18207r382644_fix
This requirement is not applicable for the DoDIN Backbone. Configure the router to ensure that an egress filter or uRPF is configured to restrict the router from accepting any outbound IP packet that contains an external IP address in the source field.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000205-RTR-000015
- Vuln IDs
-
- V-216980
- V-55773
- Rule IDs
-
- SV-216980r604135_rule
- SV-70027
Checks: C-18210r382646_chk
This requirement is not applicable for the DoDIN Backbone. Review the router configuration to determine if it will block all packets with IP options. If the router is not configured to drop all packets with IP options, this is a finding.
Fix: F-18208r382647_fix
This requirement is not applicable for the DoDIN Backbone. Configure the router to drop all packets with IP options.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000205-RTR-000016
- Vuln IDs
-
- V-216981
- V-78317
- Rule IDs
-
- SV-216981r604135_rule
- SV-93023
Checks: C-18211r382649_chk
Review the router configuration to determine if it will block all packets with IP options. If the router is not configured to drop all packets with IP options, this is a finding.
Fix: F-18209r382650_fix
Configure the router to drop all packets with IP options.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000230-RTR-000001
- Vuln IDs
-
- V-216982
- V-55757
- Rule IDs
-
- SV-216982r604135_rule
- SV-70011
Checks: C-18212r382652_chk
Review the router configuration. For every protocol that affects the routing or forwarding tables (where information is exchanged between neighbors), verify that neighbor router authentication is enabled. If authentication is not enabled, this is a finding.
Fix: F-18210r382653_fix
Configure authentication to be enabled for every protocol that affects the routing or forwarding tables.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-002205
- Version
- SRG-NET-000230-RTR-000002
- Vuln IDs
-
- V-216983
- V-78265
- Rule IDs
-
- SV-216983r604135_rule
- SV-92971
Checks: C-18213r382655_chk
Interview the ISSM and router administrator to determine if unique keys are being used. If unique keys are not being used, this is a finding.
Fix: F-18211r382656_fix
Configure all eBGP routers with unique keys for each eBGP neighbor that it peers with.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-002205
- Version
- SRG-NET-000230-RTR-000003
- Vuln IDs
-
- V-216984
- V-55759
- Rule IDs
-
- SV-216984r604135_rule
- SV-70013
Checks: C-18214r382658_chk
This requirement is not applicable for the DoDIN Backbone. For each authenticated routing protocol session, review the configured key expiration dates. If any key has a lifetime of more than 180 days, this is a finding.
Fix: F-18212r382659_fix
This requirement is not applicable for the DoDIN Backbone. For each authenticated routing protocol session, configure each key to have a lifetime of no more than 180 days.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000124
- Vuln IDs
-
- V-216985
- V-55769
- Rule IDs
-
- SV-216985r604135_rule
- SV-70023
Checks: C-18215r382661_chk
Review the router configuration. If the router is not configured to use GTSM for all Exterior Border Gateway Protocol peering sessions, this is a finding.
Fix: F-18213r382662_fix
Configure all Exterior Border Gateway Protocol peering sessions to use GTSM.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SRG-NET-000512-RTR-000012
- Vuln IDs
-
- V-220144
- V-101083
- Rule IDs
-
- SV-220144r604135_rule
- SV-110187
Checks: C-21859r539649_chk
This requirement is not applicable for the DODIN Backbone. Review the router configuration to determine if the hop limit has been configured for Router Advertisement messages. If it has been configured and has not been set to at least 32, it is a finding.
Fix: F-21851r457760_fix
Configure the router to advertise a hop limit of at least 32 in Router Advertisement messages.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-RTR-000013
- Vuln IDs
-
- V-220145
- V-101085
- Rule IDs
-
- SV-220145r604135_rule
- SV-110189
Checks: C-21860r457762_chk
Review the router configuration to ensure FEC0::/10 IP addresses are not defined. If IPv6 Site Local Unicast addresses are defined, this is a finding.
Fix: F-21852r539651_fix
Configure the router using authorized IPv6 addresses.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-RTR-000014
- Vuln IDs
-
- V-220146
- V-101087
- Rule IDs
-
- SV-220146r604135_rule
- SV-110191
Checks: C-21861r457765_chk
This requirement is not applicable for the DODIN Backbone. Review the router configuration to verify Router Advertisements are suppressed on all external IPv6-enabled interfaces. If the router is not configured to suppress Router Advertisements on all external IPv6-enabled interfaces, this is a finding.
Fix: F-21853r457766_fix
Configure the router to suppress Router Advertisements on all external IPv6-enabled interfaces.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-RTR-000200
- Vuln IDs
-
- V-220147
- V-101089
- Rule IDs
-
- SV-220147r604135_rule
- SV-110193
Checks: C-21862r457769_chk
This requirement is not applicable for the DODIN Backbone. Review the router configuration to determine if it is configured to drop IPv6 undetermined transport packets. If the router is not configured to drop IPv6 undetermined transport packets, this is a finding.
Fix: F-21855r457770_fix
Configure the router to drop IPv6 undetermined transport packets.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-RTR-000201
- Vuln IDs
-
- V-220148
- V-101091
- Rule IDs
-
- SV-220148r604135_rule
- SV-110195
Checks: C-21863r457773_chk
This requirement is not applicable for the DODIN Backbone. Review the router configuration to determine if it is configured to drop IPv6 packets containing a Routing Header of type 0, 1, or 3–255. If the router is not configured to drop IPv6 packets containing a Routing Header of type 0, 1, or 3–255, this is a finding.
Fix: F-21856r457774_fix
Configure the router to drop IPv6 packets with Routing Header of type 0, 1, or 3–255.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-RTR-000202
- Vuln IDs
-
- V-220149
- V-101093
- Rule IDs
-
- SV-220149r604135_rule
- SV-110197
Checks: C-21864r457776_chk
This requirement is not applicable for the DODIN Backbone. Review the router configuration to determine if filters are bound to the applicable interfaces to drop IPv6 packets containing a Hop-by-Hop header with option type values of 0x04 (Tunnel Encapsulation Limit), 0xC9 (Home Address Destination), or 0xC3 (NSAP Address). Note: Because hop-by-hop and destination options have the same exact header format, they are combined under the dest-option-type keyword. Since Hop-by-Hop and Destination Option headers have non-overlapping types, the dest-option-type to match either can be used. The Hop-by-Hop and Destination Option headers can be filtered via protocol 0 and 60 respectively. If the router is not configured to drop IPv6 packets containing a Hop-by-Hop header with invalid option type values, this is a finding.
Fix: F-21857r457777_fix
Configure the router to drop IPv6 packets containing a Hop-by-Hop header with option type values of 0x04 (Tunnel Encapsulation Limit), 0xC9 (Home Address Destination), or 0xC3 (NSAP Address).
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-RTR-000203
- Vuln IDs
-
- V-220150
- V-101095
- Rule IDs
-
- SV-220150r604135_rule
- SV-110199
Checks: C-21865r457779_chk
This requirement is not applicable for the DODIN Backbone. Review the router configuration and determine if filters are bound to the external interfaces to drop IPv6 packets containing a Destination Option header with option type values of 0x05 (Router Alert) or 0xC2 (Jumbo Payload). Note: Because Hop-by-Hop and destination options have the same exact header format, they are combined under the dest-option-type keyword. According to Cisco, since Hop-by-Hop and Destination Option headers have non-overlapping types, dest-option-type to match either can be used. The Hop-by-Hop and Destination Option headers can be filtered via protocol 0 and 60 respectively. If the router is not configured to drop IPv6 packets containing a Destination Option header with invalid option type values, this is a finding.
Fix: F-21858r457780_fix
Configure the router to drop IPv6 packets containing a Destination Option header with option type values of 0x05 (Router Alert) or 0xC2 (Jumbo Payload).
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-RTR-000204
- Vuln IDs
-
- V-220151
- V-101097
- Rule IDs
-
- SV-220151r604135_rule
- SV-110201
Checks: C-21866r457782_chk
This requirement is not applicable for the DODIN Backbone. Review the router switch configuration and determine if filters are bound to the applicable interfaces to drop IPv6 packets containing an option type values of 0x8A (Endpoint Identification) regardless of whether it appears in a Hop-by-Hop or Destination Option header. Note: Because hop-by-hop and destination options have the same exact header format, they are combined under the dest-option-type keyword. According to Cisco, since Hop-by-Hop and Destination Option headers have non-overlapping types, dest-option-type to match either can be used. The Hop-by-Hop and Destination Option headers can be filtered via protocol 0 and 60 respectively. If the router is not configured to drop IPv6 packets containing an extension header with the Endpoint Identification option, this is a finding.
Fix: F-21859r457783_fix
Configure the router to drop IPv6 packets containing an option type values of 0x8A (Endpoint Identification) regardless of whether it appears in a Hop-by-Hop or Destination Option header.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-RTR-000205
- Vuln IDs
-
- V-220152
- V-101099
- Rule IDs
-
- SV-220152r604135_rule
- SV-110203
Checks: C-21867r457785_chk
This requirement is not applicable for the DODIN Backbone. Review the router configuration and determine if filters are bound to the applicable interfaces to drop IPv6 packets containing a Destination Option header with option type value of 0xC3 (NSAP address). Note: Because Hop-by-Hop and destination options have the same header format, they are combined under the dest-option-type keyword. According to Cisco, since Hop-by-Hop and Destination Option headers have non-overlapping types, dest-option-type to match either can be used. The Hop-by-Hop and Destination Option headers can be filtered via protocol 0 and 60 respectively. If the router is not configured to drop IPv6 packets containing the NSAP address option within Destination Option header, this is a finding.
Fix: F-21860r457786_fix
Configure the router to drop IPv6 packets containing a Destination Option header with option type value of 0xC3 (NSAP address).
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-RTR-000206
- Vuln IDs
-
- V-220153
- V-101101
- Rule IDs
-
- SV-220153r604135_rule
- SV-110205
Checks: C-21868r457788_chk
This requirement is not applicable for the DODIN Backbone. Review the router configuration and determine if filters are bound to the applicable interfaces to drop all inbound IPv6 packets containing an undefined option type value regardless of whether they appear in a Hop-by-Hop or Destination Option header. Undefined values are 0x02, 0x03, 0x06, 0x9 – 0xE, 0x10 – 0x22, 0x24, 0x25, 0x27 – 0x2F, and 0x31 – 0xFF. If the router is not configured to drop IPv6 packets containing a Hop-by-Hop or Destination Option extension header with an undefined option type, this is a finding.
Fix: F-21861r539656_fix
Configure the router to drop all inbound IPv6 packets containing an undefined option type value regardless of whether or not they appear in a Hop-by-Hop or Destination Option header.