Router Security Requirements Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +3
Comparison against the immediately-prior release (V4R3). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 3
- V-264309 Medium The router must employ organization-defined controls by type of denial of service (DoS) to achieve the DoS objective.
- V-264310 Medium The router must implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions.
- V-264311 Medium The router must establish organization-defined alternate communications paths for system operations organizational command and control.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001368
- Version
- SRG-NET-000018-RTR-000001
- Vuln IDs
-
- V-207097
- V-78209
- Rule IDs
-
- SV-207097r604135_rule
- SV-92915
Checks: C-7358r382136_chk
This requirement is not applicable for the DoDIN Backbone. Review the router configuration to verify that access control lists (ACLs) and filters are configured to allow or deny traffic for specific source and destination addresses as well as ports and protocols. These filters should be applied inbound or outbound on the appropriate external and internal interfaces. If the router is not configured to enforce approved authorizations for controlling the flow of information within the network based on organization-defined information flow control policies, this is a finding.
Fix: F-7358r382137_fix
This requirement is not applicable for the DoDIN Backbone. Configure ACLs and filters to allow or deny traffic for specific source and destination addresses as well as ports and protocols. Apply the filters inbound or outbound on the appropriate external and internal interfaces. Policy-based routing can also be implemented if needed.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001368
- Version
- SRG-NET-000018-RTR-000002
- Vuln IDs
-
- V-207098
- V-78267
- Rule IDs
-
- SV-207098r604135_rule
- SV-92973
Checks: C-7359r382139_chk
Review the router configuration to verify that it will reject routes of any Bogon prefixes. The prefix filter must be referenced inbound on the appropriate BGP neighbor statements. If the router is not configured to reject inbound route advertisements for any Bogon prefixes, this is a finding.
Fix: F-7359r382140_fix
Ensure all eBGP routers are configured to reject inbound route advertisements for any Bogon prefixes.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001368
- Version
- SRG-NET-000018-RTR-000003
- Vuln IDs
-
- V-207099
- V-78269
- Rule IDs
-
- SV-207099r604135_rule
- SV-92975
Checks: C-7360r382142_chk
Review the router configuration to verify that it will reject routes belonging to the local AS. The prefix filter must be referenced inbound on the appropriate BGP neighbor statements. If the router is not configured to reject inbound route advertisements belonging to the local AS, this is a finding.
Fix: F-7360r382143_fix
Ensure all eBGP routers are configured to reject inbound route advertisements for any prefixes belonging to the local AS.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001368
- Version
- SRG-NET-000018-RTR-000004
- Vuln IDs
-
- V-207100
- V-78271
- Rule IDs
-
- SV-207100r604135_rule
- SV-92977
Checks: C-7361r382145_chk
Review the router configuration to verify that there are filters defined to only accept routes for prefixes that belong to specific customers. The prefix filter must be referenced inbound on the appropriate BGP neighbor statement. If the router is not configured to reject inbound route advertisements from each CE router for prefixes that are not allocated to that customer, this is a finding. Note: Routes to PE-CE links within a VPN are needed for troubleshooting end-to-end connectivity across the MPLS/IP backbone. Hence, these prefixes are an exception to this requirement.
Fix: F-7361r382146_fix
Configure all eBGP routers to reject inbound route advertisements from a CE router for prefixes that are not allocated to that customer.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001368
- Version
- SRG-NET-000018-RTR-000005
- Vuln IDs
-
- V-207101
- V-78273
- Rule IDs
-
- SV-207101r604135_rule
- SV-92979
Checks: C-7362r382148_chk
This requirement is not applicable for the DODIN Backbone. Review the router configuration to verify that there is a filter defined to only advertise routes for prefixes that belong to any customers or the local AS. The prefix filter must be referenced outbound on the appropriate BGP neighbor statements. If the router is not configured to reject outbound route advertisements that belong to any customers or the local AS, this is a finding.
Fix: F-7362r382149_fix
Configure all eBGP routers to filter outbound route advertisements for prefixes that are not allocated to or belong to any customer or the local AS.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001368
- Version
- SRG-NET-000018-RTR-000006
- Vuln IDs
-
- V-207102
- V-78277
- Rule IDs
-
- SV-207102r945854_rule
- SV-92983
Checks: C-7363r382151_chk
Review the router configuration to verify the router is configured to deny updates received from eBGP peers that do not list their AS number as the first AS in the AS_PATH attribute. If the router is not configured to reject updates from peers that do not list their AS number as the first AS in the AS_PATH attribute, this is a finding.
Fix: F-7363r382152_fix
Configure all ASBRs to deny updates received from eBGP peers that do not list their AS number as the first AS in the AS_PATH attribute.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001368
- Version
- SRG-NET-000018-RTR-000007
- Vuln IDs
-
- V-207103
- V-78343
- Rule IDs
-
- SV-207103r604135_rule
- SV-93049
Checks: C-7364r382154_chk
Review the router configuration to determine if there is an import policy to block source-active multicast advertisements for any undesirable multicast groups, as well as any (S, G) states with undesirable source addresses. Step 1: Verify that an inbound source-active filter is bound to each MSDP peer. Step 2: Review the access lists referenced by the source-active filter to verify that undesirable multicast groups, auto-RP, single source multicast (SSM) groups, and advertisements from undesirable sources are blocked. If the router is not configured with an import policy to block undesirable SA multicast advertisements, this is a finding.
Fix: F-7364r382155_fix
Configure the MSDP router to implement an import policy to block multicast advertisements for undesirable multicast groups and sources.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001368
- Version
- SRG-NET-000018-RTR-000008
- Vuln IDs
-
- V-207104
- V-78345
- Rule IDs
-
- SV-207104r604135_rule
- SV-93051
Checks: C-7365r382157_chk
Review the router configuration to determine if there is export policy to block local source-active multicast advertisements. Verify that an outbound source-active filter is bound to each MSDP peer. Review the access lists referenced by the source-active filters and verify that MSDP source-active messages being sent to MSDP peers do not leak advertisements that are local. If the router is not configured with an export policy to block local source-active multicast advertisements, this is a finding.
Fix: F-7365r382158_fix
Ensure an export policy is implemented on all MSDP routers to avoid global visibility of local multicast (S, G) states.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001368
- Version
- SRG-NET-000018-RTR-000009
- Vuln IDs
-
- V-207105
- V-78347
- Rule IDs
-
- SV-207105r604135_rule
- SV-93053
Checks: C-7366r382160_chk
Review the router configuration to determine if it is configured to limit the amount of source-active messages it accepts on a per-peer basis. If the router is not configured to limit the source-active messages it accepts, this is a finding.
Fix: F-7366r382161_fix
Configure the MSDP router to limit the amount of source-active messages it accepts from each peer.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001368
- Version
- SRG-NET-000018-RTR-000010
- Vuln IDs
-
- V-207106
- V-92243
- Rule IDs
-
- SV-207106r945855_rule
- SV-102345
Checks: C-7367r382163_chk
This requirement is not applicable for the DODIN Backbone. Review the router configuration to verify the router is configured to deny updates received from CE routers with an originating AS in the AS_PATH attribute that does not belong to that customer. Step 1: Review router configuration and verify that there is an as-path access-list statement defined to only accept routes from a CE router whose AS did not originate the route. Step 2: Verify that the as-path access list is referenced by the filter-list inbound for the appropriate BGP neighbors. If the router is not configured to reject updates from CE routers with an originating AS in the AS_PATH attribute that does not belong to that customer, this is a finding.
Fix: F-7367r382164_fix
Configure the router to reject updates from CE routers with an originating AS in the AS_PATH attribute that does not belong to that customer.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000001
- Vuln IDs
-
- V-207107
- V-78235
- Rule IDs
-
- SV-207107r604135_rule
- SV-92941
Checks: C-7368r382166_chk
Review the configuration and verify that the auxiliary port is disabled unless a secured modem providing encryption and authentication is connected to it. If the auxiliary port is not disabled or is not connected to a secured modem when it is enabled, this is a finding.
Fix: F-7368r382167_fix
Disable the auxiliary port. If used for out-of-band administrative access, the port must be connected to a secured modem providing encryption and authentication.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000002
- Vuln IDs
-
- V-207108
- V-55721
- Rule IDs
-
- SV-207108r604135_rule
- SV-69975
Checks: C-7369r382169_chk
Verify each router enforces approved authorizations for controlling the flow of information between interconnected networks in accordance with applicable policy. If the router does not enforce approved authorizations for controlling the flow of information between interconnected networks in accordance with applicable policy, this is a finding.
Fix: F-7369r382170_fix
Configure the router to enforce approved authorizations for controlling the flow of information between interconnected networks in accordance with applicable policy.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000003
- Vuln IDs
-
- V-207109
- V-55723
- Rule IDs
-
- SV-207109r604135_rule
- SV-69977
Checks: C-7370r382172_chk
If IPv4 or IPv6 multicast routing is enabled, verify all interfaces enabled for PIM are documented in the network's multicast topology diagram. Review the router configuration to determine if multicast routing is enabled and which interfaces are enabled for PIM. If an interface is not required to support multicast routing and it is enabled, this is a finding.
Fix: F-7370r382173_fix
Document all enabled interfaces for PIM in the network's multicast topology diagram. Disable support for PIM on interfaces that are not required to support it.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000004
- Vuln IDs
-
- V-207110
- V-55727
- Rule IDs
-
- SV-207110r604135_rule
- SV-69981
Checks: C-7371r382175_chk
This requirement is not applicable for the DoDIN Backbone. Review the multicast topology diagram and determine if router interfaces are enabled for IPv4 or IPv6 multicast routing. If the router is enabled for multicast routing, verify all interfaces enabled for PIM have a neighbor filter bound to the interface. The neighbor filter must only accept PIM control plane traffic from the documented PIM neighbors. If PIM neighbor filters are not bound to all interfaces that have PIM enabled, this is a finding.
Fix: F-7371r382176_fix
This requirement is not applicable for the DoDIN Backbone. Configure neighbor filters to only accept PIM control plane traffic from documented PIM neighbors. Bind neighbor filters to all PIM enabled interfaces.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000005
- Vuln IDs
-
- V-207111
- V-55729
- Rule IDs
-
- SV-207111r604135_rule
- SV-69983
Checks: C-7372r382226_chk
Review the router configuration and verify that admin-scope multicast traffic is blocked at the external edge. If the router is not configured to establish boundaries for administratively scoped multicast traffic, this is a finding.
Fix: F-7372r382227_fix
Step 1: Configure the ACL to deny packets with multicast administratively scoped destination addresses. Step 2: Apply the multicast boundary at the appropriate interfaces.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000007
- Vuln IDs
-
- V-207112
- V-55731
- Rule IDs
-
- SV-207112r604135_rule
- SV-69985
Checks: C-7373r382229_chk
Review the router configuration. If an interface is not being used but is configured or enabled, this is a finding.
Fix: F-7373r382230_fix
Delete inactive sub-interfaces and disable and delete the configuration of any inactive ports on the router.
- RMF Control
- AC-4
- Severity
- H
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000008
- Vuln IDs
-
- V-207113
- V-78241
- Rule IDs
-
- SV-207113r604135_rule
- SV-92947
Checks: C-7374r382232_chk
This requirement is not applicable for the DoDIN Backbone. Review the configuration of each router interface connecting to an alternate gateway. Verify each permit statement of the ingress filter only permits packets with destination addresses of the site's NIPRNet address space or a destination address belonging to the address block assigned by the alternate gateway network service provider. If the ingress filter permits packets with addresses other than those specified, such as destination addresses of the site's NIPRNet address space or a destination address belonging to the address block assigned by the alternate gateway network service provider, this is a finding.
Fix: F-7374r382233_fix
This requirement is not applicable for the DoDIN Backbone. Configure the ingress filter of the perimeter router connected to an alternate gateway to only permit packets with destination addresses of the site's NIPRNet address space or a destination address belonging to the address block assigned by the alternate gateway network service provider.
- RMF Control
- AC-4
- Severity
- H
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000009
- Vuln IDs
-
- V-207114
- V-55733
- Rule IDs
-
- SV-207114r604135_rule
- SV-69987
Checks: C-7375r382235_chk
This requirement is not applicable for the DoDIN Backbone. Review the configuration of the router connecting to the alternate gateway. Verify there are no BGP neighbors configured to the remote AS that belongs to the alternate gateway service provider. If there are BGP neighbors connecting the remote AS of the alternate gateway service provider, this is a finding.
Fix: F-7375r382236_fix
This requirement is not applicable for the DoDIN Backbone. Configure a static route on the perimeter router to reach the AS of a router connecting to an alternate gateway.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000010
- Vuln IDs
-
- V-207115
- V-55735
- Rule IDs
-
- SV-207115r604135_rule
- SV-69989
Checks: C-7376r382238_chk
This requirement is not applicable for the DoDIN Backbone. Review the configuration of the router connecting to the alternate gateway and verify that redistribution of static routes to the alternate gateway is not occurring. If the static routes to the alternate gateway are being redistributed into BGP or any IGP peering with a NIPRNet gateway or another autonomous system, this is a finding.
Fix: F-7376r382239_fix
This requirement is not applicable for the DoDIN Backbone. Configure the router so that static routes are not redistributed to an alternate gateway into either an Exterior Gateway Protocol or Interior Gateway Protocol to the NIPRNet or to other autonomous systems.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000011
- Vuln IDs
-
- V-207116
- V-55739
- Rule IDs
-
- SV-207116r604135_rule
- SV-69993
Checks: C-7377r382241_chk
This requirement is not applicable for the DoDIN Backbone. Verify that the OOBM interface is an adjacency in the Interior Gateway Protocol routing domain for the management network. If the router does not enforce that Interior Gateway Protocol instances configured on the OOBM gateway router peer only with their own routing domain, this is a finding.
Fix: F-7377r382242_fix
This requirement is not applicable for the DoDIN Backbone. Configure the router to enforce that Interior Gateway Protocol instances configured on the OOBM gateway router peer only with their own routing domain.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000012
- Vuln IDs
-
- V-207117
- V-55741
- Rule IDs
-
- SV-207117r604135_rule
- SV-69995
Checks: C-7378r382244_chk
This requirement is not applicable for the DoDIN Backbone. Verify the Interior Gateway Protocol instance used for the managed network does not redistribute routes into the Interior Gateway Protocol instance used for the management network, and vice versa. If the Interior Gateway Protocol instance used for the managed network redistributes routes into the Interior Gateway Protocol instance used for the management network, or vice versa, this is a finding.
Fix: F-7378r382245_fix
This requirement is not applicable for the DoDIN Backbone. Configure the Interior Gateway Protocol instance used for the managed network to prohibit redistribution of routes into the Interior Gateway Protocol instance used for the management network, and vice versa.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000013
- Vuln IDs
-
- V-207118
- V-55747
- Rule IDs
-
- SV-207118r604135_rule
- SV-70001
Checks: C-7379r382247_chk
Verify that the RP router is configured to filter PIM register messages. If the RP router peering with PIM-SM routers is not configured with a PIM import policy to block registration messages for any undesirable multicast groups and sources, this is a finding.
Fix: F-7379r382248_fix
Configure the RP router to filter PIM register messages received from a multicast DR for any undesirable multicast groups or sources.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001414
- Version
- SRG-NET-000019-RTR-000014
- Vuln IDs
-
- V-207119
- V-55749
- Rule IDs
-
- SV-207119r604135_rule
- SV-70003
Checks: C-7380r382250_chk
Verify that the RP router is configured to filter PIM register messages. Note: Alternative is to configure all designated routers to filter IGMP Membership Report (a.k.a join) messages received from hosts. If the RP router peering with PIM-SM routers is not configured with a PIM import policy to block registration messages for any undesirable multicast groups and Bogon sources, this is a finding.
Fix: F-7380r382251_fix
RP routers that are peering with customer PIM-SM routers must implement a PIM import policy to block join messages for reserved and any undesirable multicast groups.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000132
- Version
- SRG-NET-000076-RTR-000001
- Vuln IDs
-
- V-207120
- V-78231
- Rule IDs
-
- SV-207120r604135_rule
- SV-92937
Checks: C-7381r382253_chk
The router must log all packets that have been dropped via the access control list (ACL). If the router fails to log all packets that have been dropped via the ACL, this is a finding. Log output must contain an interface name as to where the packet was filtered. If the logged output does not contain an interface name as to where the packet was filtered, this is a finding.
Fix: F-7381r382254_fix
Configure the router to record the interface in the log record for packets being dropped.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- SRG-NET-000077-RTR-000001
- Vuln IDs
-
- V-207121
- V-78233
- Rule IDs
-
- SV-207121r604135_rule
- SV-92939
Checks: C-7382r382256_chk
The router must log all packets that have been dropped via the access control list. If the router fails to log all packets that have been dropped via the control list, this is a finding. Log output must contain the source IP address and port of the filtered packets. If the logged output does not contain source IP address and port of the filtered packets, this is a finding.
Fix: F-7382r382257_fix
Configure the router to record the source address in the log record for packets being dropped.
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000134
- Version
- SRG-NET-000078-RTR-000001
- Vuln IDs
-
- V-207122
- V-78229
- Rule IDs
-
- SV-207122r604135_rule
- SV-92935
Checks: C-7383r382259_chk
Review the router interface access control lists (ACLs) to verify all deny statements are logged. If packets being dropped are not logged, this is a finding.
Fix: F-7383r382260_fix
Configure interface ACLs to log all deny statements.
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- SRG-NET-000131-RTR-000035
- Vuln IDs
-
- V-207123
- V-55763
- Rule IDs
-
- SV-207123r604135_rule
- SV-70017
Checks: C-7384r382262_chk
Review the router configuration to determine if services or functions not required for operation, or not related to router functionality (e.g., DNS, email client or server, FTP server, or web server) are enabled. If unnecessary services and functions are enabled on the router, this is a finding.
Fix: F-7384r382263_fix
Remove unneeded services and functions from the router. Removal is recommended because the service or function may be inadvertently enabled otherwise. However, if removal is not possible, disable the service or function.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- SRG-NET-000168-RTR-000077
- Vuln IDs
-
- V-207124
- V-55765
- Rule IDs
-
- SV-207124r604135_rule
- SV-70019
Checks: C-7385r382265_chk
Review the router configuration. For every protocol that affects the routing or forwarding tables (where information is exchanged between neighbors), verify that neighbor router authentication is encrypting the authentication key. If authentication is not encrypting the authentication key, this is a finding.
Fix: F-7385r382266_fix
Configure routing protocol authentication to encrypt the authentication key.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- SRG-NET-000168-RTR-000078
- Vuln IDs
-
- V-207125
- V-55767
- Rule IDs
-
- SV-207125r604135_rule
- SV-70021
Checks: C-7386r382268_chk
Review the router configuration to verify it is using a NIST-validated FIPS 198-1 message authentication code algorithm to authenticate routing protocol messages. If a NIST-validated FIPS 198-1 message authentication code algorithm is not being used to authenticate routing protocol messages, this is a finding.
Fix: F-7386r382269_fix
Configure routing protocol authentication to use a NIST-validated FIPS 198-1 message authentication code algorithm.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001094
- Version
- SRG-NET-000192-RTR-000002
- Vuln IDs
-
- V-207126
- V-78311
- Rule IDs
-
- SV-207126r604135_rule
- SV-93017
Checks: C-7387r382271_chk
Review the PE router configuration to determine if a MAC address limit has been set for each bridge domain. If a limit has not been configured, this is a finding.
Fix: F-7387r382272_fix
Configure a MAC address learning limit for each VPLS bridge domain.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-001095
- Version
- SRG-NET-000193-RTR-000001
- Vuln IDs
-
- V-207127
- V-78289
- Rule IDs
-
- SV-207127r604135_rule
- SV-92995
Checks: C-7388r382319_chk
Review the router configuration to verify that the router has been configured to prevent a burst of RSVP traffic engineering signaling messages from overflowing the input queue of any neighbor core router. If the router with RSVP-TE enabled does not have message pacing configured based on the link speed and input queue size of adjacent core routers, this is a finding.
Fix: F-7388r382320_fix
Ensure all routers with RSVP-TE enabled have message pacing configured that will adjust maximum burst and maximum number of RSVP messages to an output queue based on the link speed and input queue size of adjacent core routers.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001095
- Version
- SRG-NET-000193-RTR-000002
- Vuln IDs
-
- V-207128
- V-78307
- Rule IDs
-
- SV-207128r604135_rule
- SV-93013
Checks: C-7389r382322_chk
Review the router configuration to verify that storm control is enabled on CE-facing interfaces deploying VPLS. If storm control is not enabled for broadcast traffic, this is a finding. Note: The threshold level can be from 0 to 100 percent of the link's bandwidth, where "0" suppresses all traffic. Most FastEthernet switching modules do not support multicast and unicast traffic storm control.
Fix: F-7389r382323_fix
Configure storm control for each VPLS bridge domain. Base the suppression threshold on expected traffic rates plus some additional capacity.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001095
- Version
- SRG-NET-000193-RTR-000112
- Vuln IDs
-
- V-207129
- V-78325
- Rule IDs
-
- SV-207129r604135_rule
- SV-93031
Checks: C-7390r382325_chk
Review the router configuration and interview the System Administrator to verify that a mechanism for traffic prioritization and bandwidth reservation exists. This arrangement must ensure that sufficient capacity is available for mission-critical traffic and enforce the traffic priorities specified by the Combatant Commands/Services/Agencies. If no such scheme exists or it is not configured, this is a finding.
Fix: F-7390r382326_fix
Implement a mechanism for traffic prioritization and bandwidth reservation. This mechanism must enforce the traffic priorities specified by the Combatant Commands/Services/Agencies.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-001095
- Version
- SRG-NET-000193-RTR-000113
- Vuln IDs
-
- V-207130
- V-78319
- Rule IDs
-
- SV-207130r604135_rule
- SV-93025
Checks: C-7391r539640_chk
Review the router configuration and verify that a QoS policy has been configured to provide preferred treatment for mission-critical applications in accordance with the QoS GIG Technical Profile. Verify that the class-maps are configured to match on DSCP, protocols, or access control lists (ACLs) that identify traffic types based on ports. Verify that the policy-map is configured to set DSCP values for the defined class-maps in accordance with the QoS GIG Technical Profile. Verify that an output service policy is bound to all interfaces. Note: The GTP QOS document (GTP-0009) can be downloaded via the following link: https://intellipedia.intelink.gov/wiki/Portal:GIG_Technical_Guidance/GTG_GTPs/GTP_Development_List If the router is not configured to implement a QoS policy in accordance with the QoS GIG Technical Profile, this is a finding.
Fix: F-7391r539641_fix
Configure a QoS policy on each router in accordance with the QoS GIG Technical Profile.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-001095
- Version
- SRG-NET-000193-RTR-000114
- Vuln IDs
-
- V-207131
- V-78321
- Rule IDs
-
- SV-207131r604135_rule
- SV-93027
Checks: C-7392r539643_chk
Review the router configuration and verify that a QoS policy has been configured to provide preferred treatment for mission-critical applications in accordance with the QoS GIG Technical Profile. Verify that the class-maps are configured to match on DSCP, protocols, or access control lists (ACLs) that identify traffic types based on ports. Verify that the policy-map is configured to set DSCP values for the defined class-maps in accordance with the QoS GIG Technical Profile. Verify that an input service policy is bound to all interfaces. Note: The GTP QOS document (GTP-0009) can be downloaded via the following link: https://intellipedia.intelink.gov/wiki/Portal:GIG_Technical_Guidance/GTG_GTPs/GTP_Development_List If the router is not configured to implement a QoS policy in accordance with the QoS GIG Technical Profile, this is a finding.
Fix: F-7392r539644_fix
Configure a QoS policy on each router in accordance with the QoS GIG Technical Profile.
- RMF Control
- SC-7
- Severity
- H
- CCI
- CCI-001109
- Version
- SRG-NET-000202-RTR-000001
- Vuln IDs
-
- V-207132
- V-78237
- Rule IDs
-
- SV-207132r604135_rule
- SV-92943
Checks: C-7393r382334_chk
This requirement is not applicable for the DoDIN Backbone. Review the router configuration to verify that the access control list (ACL) or filter is configured to allow specific ports and protocols and deny all other traffic. The filter must be configured inbound on all external interfaces. If the ACL or filter is not configured to allow specific ports and protocols and deny all other traffic, this is a finding. If the filter is not configured inbound on all external interfaces, this is a finding.
Fix: F-7393r382335_fix
This requirement is not applicable for the DoDIN Backbone. Configure the perimeter router to deny network traffic by default and allow network traffic by exception.
- RMF Control
- SC-7
- Severity
- H
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000001
- Vuln IDs
-
- V-207133
- V-78215
- Rule IDs
-
- SV-207133r604135_rule
- SV-92921
Checks: C-7394r382337_chk
Review the access control list (ACL) or filter for the router receive path and verify that it will only process specific management plane and control plane traffic from specific sources. If the router is not configured with a receive-path filter to restrict traffic destined to itself, this is a finding. Note: If the platform does not support the receive path filter, verify that all Layer 3 interfaces have an ingress ACL to control what packets are allowed to be destined to the router for processing.
Fix: F-7394r382338_fix
Configure all routers with receive path filters to restrict traffic destined to the router.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000002
- Vuln IDs
-
- V-207134
- V-78217
- Rule IDs
-
- SV-207134r604135_rule
- SV-92923
Checks: C-7395r382340_chk
Review the access control list (ACL) or filter for the router receive path. Verify that it will drop all fragmented ICMP packets destined to itself. If the router is not configured with a receive-path filter to drop all fragmented ICMP packets, this is a finding. Note: If the platform does not support the receive path filter, verify that all Layer 3 interfaces have an ingress ACL to control what packets are allowed to be destined to the router for processing.
Fix: F-7395r382341_fix
Ensure all routers have their receive path filter configured to drop all fragmented ICMP packets.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000003
- Vuln IDs
-
- V-207135
- V-78243
- Rule IDs
-
- SV-207135r604135_rule
- SV-92949
Checks: C-7396r382343_chk
This requirement is not applicable for the DoDIN Backbone. Review the router configuration to verify that the ingress filter is in accordance with DoD 8551. If the router does not filter traffic in accordance with the guidelines contained in DoD 8551, this is a finding.
Fix: F-7396r539636_fix
This requirement is not applicable for the DoDIN Backbone. Configure the router to use ingress ACLs to restrict traffic in accordance with the guidelines contained in DOD Instruction 8551.1 for all services and protocols required for operational commitments.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000004
- Vuln IDs
-
- V-207136
- V-78245
- Rule IDs
-
- SV-207136r604135_rule
- SV-92951
Checks: C-7397r382346_chk
This requirement is not applicable for the DoDIN Backbone. Review the router configuration to verify that the ingress ACL is bound to the external interface in an inbound direction. If the router is not configured to filter traffic entering the network at the external interface in an inbound direction, this is a finding.
Fix: F-7397r382347_fix
This requirement is not applicable for the DoDIN Backbone. Bind the ingress ACL to the external interface (inbound).
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000005
- Vuln IDs
-
- V-207137
- V-78247
- Rule IDs
-
- SV-207137r604135_rule
- SV-92953
Checks: C-7398r382349_chk
This requirement is not applicable for the DoDIN Backbone. Review the router configuration to verify that the egress ACL is bound to the internal interface in an inbound direction. If the router is not configured to filter traffic leaving the network at the internal interface in an inbound direction, this is a finding.
Fix: F-7398r382350_fix
This requirement is not applicable for the DoDIN Backbone. Configure an egress ACL bound to the internal interface in an inbound direction to filter traffic leaving the network.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000006
- Vuln IDs
-
- V-207138
- V-78275
- Rule IDs
-
- SV-207138r604135_rule
- SV-92981
Checks: C-7399r382352_chk
Review the router configuration to verify that there is a filter defined to block route advertisements for prefixes that belong to the IP core. The prefix filter must be referenced outbound on the appropriate BGP neighbor statements. If the router is not configured to reject outbound route advertisements that belong to the IP core, this is a finding.
Fix: F-7399r382353_fix
Configure all eBGP routers to filter outbound route advertisements belonging to the IP core.
- RMF Control
- SC-7
- Severity
- H
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000007
- Vuln IDs
-
- V-207139
- V-78313
- Rule IDs
-
- SV-207139r604135_rule
- SV-93019
Checks: C-7400r382355_chk
Review the router configuration to verify that an ingress ACL is applied to all CE-facing interfaces. Verify that the ingress ACL rejects and logs packets destined to the IP core address block. If the PE router is not configured to block any traffic with a destination address assigned to the IP core infrastructure, this is a finding. Note: Internet Control Message Protocol (ICMP) echo requests and traceroutes will be allowed to the edge from external adjacent peers.
Fix: F-7400r382356_fix
Configure protection for the IP core to be implemented at the edges by blocking any traffic with a destination address assigned to the IP core infrastructure.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000008
- Vuln IDs
-
- V-207140
- V-78315
- Rule IDs
-
- SV-207140r604135_rule
- SV-93021
Checks: C-7401r382358_chk
Review the router configuration to determine if uRPF loose mode is enabled on all CE-facing interfaces. If uRPF loose mode is not enabled on all CE-facing interfaces, this is a finding.
Fix: F-7401r382359_fix
Enable uRPF loose mode on all CE-facing interfaces.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000009
- Vuln IDs
-
- V-207141
- V-78255
- Rule IDs
-
- SV-207141r604135_rule
- SV-92961
Checks: C-7402r382361_chk
This requirement is not applicable for the DoDIN Backbone. Review the network topology diagram to determine connectivity between the managed network and the NOC. Review the OOBM gateway router configuration to validate the path and interface that the management traffic traverses. If management traffic is not transported between the managed network and the NOC via dedicated circuit, MPLS/VPN service, or IPsec tunnel, this is a finding.
Fix: F-7402r382362_fix
This requirement is not applicable for the DoDIN Backbone. Ensure that a dedicated circuit, MPLS/VPN service, or IPsec tunnel is deployed to transport management traffic between the managed network and the NOC.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000010
- Vuln IDs
-
- V-207142
- V-78257
- Rule IDs
-
- SV-207142r604135_rule
- SV-92963
Checks: C-7403r382409_chk
This requirement is not applicable for the DoDIN Backbone. Review the network topology diagram to determine connectivity between the managed network and the NOC. Review the OOBM gateway router configuration to validate the path that the management traffic traverses. Verify that only management traffic is forwarded through the OOBM interface or IPsec tunnel. If traffic other than authorized management traffic is permitted through the OOBM interface or IPsec tunnel, this is a finding.
Fix: F-7403r382410_fix
This requirement is not applicable for the DoDIN Backbone. Configure filters based on port, source IP address, and destination IP address to permit only authorized management traffic into IPsec tunnels or the OOBM interface used for forwarding management data.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000011
- Vuln IDs
-
- V-207143
- V-78357
- Rule IDs
-
- SV-207143r604135_rule
- SV-93063
Checks: C-7404r382412_chk
This requirement is not applicable for the DoDIN Backbone. Review the access control list (ACL) or filter for the router receive path. Verify that only traffic sourced from the OOBM network or the NOC is allowed to access the router. If the router does not block any traffic destined to itself that is not sourced from the OOBM network or the NOC, this is a finding. Note: If the platform does not support the receive path filter, verify that all non-OOBM interfaces have an ingress ACL to restrict access to that interface address or any of the router’s loopback addresses to only traffic sourced from the management network. An exception would be to allow packets destined to these interfaces used for troubleshooting, such as ping and traceroute.
Fix: F-7404r382413_fix
This requirement is not applicable for the DoDIN Backbone. Ensure that traffic from the managed network is not able to access the OOBM gateway router using either receive path or interface ingress ACLs.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000012
- Vuln IDs
-
- V-207144
- V-78351
- Rule IDs
-
- SV-207144r604135_rule
- SV-93057
Checks: C-7405r382415_chk
Step 1: Verify that the managed interface has an inbound and outbound ACL configured. Step 2: Verify that the ingress filter only allows management, IGP, and ICMP traffic. Caveat: If the management interface is a true OOBM interface, this requirement is not applicable. If the router does not restrict traffic that ingresses and egresses the management interface, this is a finding.
Fix: F-7405r382416_fix
If the management interface is a routed interface, it must be configured with both an ingress and egress ACL.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000013
- Vuln IDs
-
- V-207145
- V-78263
- Rule IDs
-
- SV-207145r604135_rule
- SV-92969
Checks: C-7406r382418_chk
This requirement is not applicable for the DoDIN Backbone. Verify that all traffic from the managed network to the management network and vice-versa is secured via IPsec tunnel. If the management traffic is not secured via IPsec tunnel, this is a finding.
Fix: F-7406r382419_fix
This requirement is not applicable for the DoDIN Backbone. Ensure that all traffic from the managed network to the management network and vice-versa is secured via IPsec tunnel.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- SRG-NET-000235-RTR-000114
- Vuln IDs
-
- V-207146
- V-55779
- Rule IDs
-
- SV-207146r604135_rule
- SV-70033
Checks: C-7407r382421_chk
Verify the router stops forwarding traffic or maintains the configured security policies upon the failure of the following actions: system initialization, shutdown, or system abort. If the router does not stop forwarding traffic or maintain the configured security policies upon the failure of system initialization, shutdown, or system abort, this is a finding.
Fix: F-7407r382422_fix
This is a capability that would be intrinsic to the router as a result of its development and may not be configurable. If it is a configurable option, configure the router to stop forwarding traffic or maintain the configured security policies upon the failure of the following actions: system initialization, shutdown, or system abort.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001958
- Version
- SRG-NET-000343-RTR-000001
- Vuln IDs
-
- V-207147
- V-78299
- Rule IDs
-
- SV-207147r856631_rule
- SV-93005
Checks: C-7408r382424_chk
Review the router configuration to determine if LDP messages are being authenticated for the targeted LDP sessions. If authentication is not being used for the LDP sessions using a FIPS-approved message authentication code algorithm, this is a finding.
Fix: F-7408r382425_fix
Implement authentication for all targeted LDP sessions using a FIPS-approved message authentication code algorithm.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001958
- Version
- SRG-NET-000343-RTR-000002
- Vuln IDs
-
- V-207148
- V-78341
- Rule IDs
-
- SV-207148r856632_rule
- SV-93047
Checks: C-7409r382427_chk
Review the router configuration to determine if received MSDP packets are authenticated. If the router does not require MSDP authentication, this is a finding.
Fix: F-7409r382428_fix
Ensure all MSDP packets received by an MSDP router are authenticated.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000109
- Vuln IDs
-
- V-207149
- V-78213
- Rule IDs
-
- SV-207149r856633_rule
- SV-92919
Checks: C-7410r382430_chk
Review the device configuration to determine if a configuration auto-loading or zero-touch deployment feature is enabled. If a configuration auto-loading feature or zero-touch deployment feature is enabled, this is a finding. Note: Auto-configuration or zero-touch deployment features can be enabled when the router is offline for the purpose of image loading or building out the configuration. In addition, this would not be applicable to the provisioning of virtual routers via a software-defined network (SDN) orchestration system.
Fix: F-7410r382431_fix
Disable all configuration auto-loading or zero-touch deployment features.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000110
- Vuln IDs
-
- V-207150
- V-55781
- Rule IDs
-
- SV-207150r856634_rule
- SV-70035
Checks: C-7411r382433_chk
Determine whether control plane protection has been implemented on the device by verifying traffic types have been classified based on importance levels and a policy has been configured to filter and rate limit the traffic according to each class. If the router does not have control plane protection implemented, this is a finding.
Fix: F-7411r382434_fix
Implement control plane protection by classifying traffic types based on importance and configure filters to restrict and rate limit the traffic directed to and processed by the RP according to each class.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000111
- Vuln IDs
-
- V-207151
- V-78219
- Rule IDs
-
- SV-207151r856635_rule
- SV-92925
Checks: C-7412r382436_chk
Review the configuration to determine if gratuitous ARP is disabled on all external interfaces. If gratuitous ARP is enabled on any external interface, this is a finding.
Fix: F-7412r382437_fix
Disable gratuitous ARP on all external interfaces.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000112
- Vuln IDs
-
- V-207152
- V-78221
- Rule IDs
-
- SV-207152r856636_rule
- SV-92927
Checks: C-7413r382439_chk
Review the router configuration to determine if IP directed broadcast is enabled. If IP directed broadcast is enabled on Layer 3 interfaces, this is a finding.
Fix: F-7413r382440_fix
Disable IP directed broadcasts on all Layer 3 interfaces.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000113
- Vuln IDs
-
- V-207153
- V-78223
- Rule IDs
-
- SV-207153r856637_rule
- SV-92929
Checks: C-7414r382442_chk
Review the device configuration to determine if controls have been defined to ensure the router does not send ICMP unreachable notifications out to any external interfaces. If ICMP unreachable notifications are enabled on any external interfaces, this is a finding.
Fix: F-7414r382443_fix
Disable ICMP unreachable notifications on all external interfaces.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000114
- Vuln IDs
-
- V-207154
- V-78225
- Rule IDs
-
- SV-207154r856638_rule
- SV-92931
Checks: C-7415r382445_chk
Review the device configuration to determine if controls have been defined to ensure the router does not send ICMP Mask Reply messages out to any external interfaces. If ICMP Mask Reply messages are enabled on any external interfaces, this is a finding.
Fix: F-7415r382446_fix
Disable ICMP mask replies on all external interfaces.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000115
- Vuln IDs
-
- V-207155
- V-78227
- Rule IDs
-
- SV-207155r856639_rule
- SV-92933
Checks: C-7416r382448_chk
Review the device configuration to determine if controls have been defined to ensure the router does not send ICMP Redirect messages out to any external interfaces. If ICMP Redirect messages are enabled on any external interfaces, this is a finding.
Fix: F-7416r382449_fix
Disable ICMP redirects on all external interfaces.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000117
- Vuln IDs
-
- V-207156
- V-78279
- Rule IDs
-
- SV-207156r856640_rule
- SV-92985
Checks: C-7417r382451_chk
Review the router configuration to verify that the number of received prefixes from each eBGP neighbor is controlled. If the router is not configured to control the number of prefixes received from each peer to protect against route table flooding and prefix de-aggregation attacks, this is a finding.
Fix: F-7417r382452_fix
Configure all eBGP routers to use the maximum prefixes feature to protect against route table flooding and prefix de-aggregation attacks.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000118
- Vuln IDs
-
- V-207157
- V-78281
- Rule IDs
-
- SV-207157r856641_rule
- SV-92987
Checks: C-7418r382499_chk
This requirement is not applicable for the DODIN Backbone. Review the router configuration to verify that there is a filter to reject inbound route advertisements that are greater than /24 or the least significant prefixes issued to the customer, whichever is larger. If the router is not configured to limit the prefix size on any inbound route advertisement to /24 or the least significant prefixes issued to the customer, this is a finding.
Fix: F-7418r382500_fix
Ensure all eBGP routers are configured to limit the prefix size on any route advertisement to /24 or the least significant prefixes issued to the customer.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000119
- Vuln IDs
-
- V-207158
- V-78309
- Rule IDs
-
- SV-207158r856642_rule
- SV-93015
Checks: C-7419r382502_chk
Review the router configuration to verify that IGMP or MLD snooping has been configured for IPv4 and IPv6 multicast traffic respectively for each VPLS bridge domain (VFI instance). If the router is not configured to implement IGMP or MLD snooping for each VPLS bridge domain, this is a finding.
Fix: F-7419r382503_fix
Configure IGMP or MLD snooping for IPv4 and IPv6 multicast traffic respectively for each VPLS bridge domain.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000120
- Vuln IDs
-
- V-207159
- V-78327
- Rule IDs
-
- SV-207159r856643_rule
- SV-93033
Checks: C-7420r382505_chk
Review the router configuration to determine if forwarding cache thresholds are defined. If the RP router is not configured to limit the multicast forwarding cache to ensure that its resources are not saturated, this is a finding.
Fix: F-7420r382506_fix
Configure MSDP-enabled RP routers to limit the multicast forwarding cache for source-active entries.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000121
- Vuln IDs
-
- V-207160
- V-78329
- Rule IDs
-
- SV-207160r856644_rule
- SV-93035
Checks: C-7421r382508_chk
Review the configuration of the RP to verify that it is rate limiting the number of multicast register messages. If the RP is not limiting multicast register messages, this is a finding.
Fix: F-7421r382509_fix
Configure the RP to rate limit the number of multicast register messages.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000122
- Vuln IDs
-
- V-207161
- V-78335
- Rule IDs
-
- SV-207161r856645_rule
- SV-93041
Checks: C-7422r382511_chk
Review the DR configuration to verify that it is limiting the number of mroute states via IGMP or MLD. If the DR is not limiting multicast join requests via IGMP or MLD, this is a finding. Note: If both global and per-interface state limiters are configured, the limits configured for per-interface state limiters are still enforced but are constrained by the global limit.
Fix: F-7422r382512_fix
Configure the DR on a global or interface basis to limit the number of mroute states resulting from IGMP or MLD membership reports.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000123
- Vuln IDs
-
- V-207162
- V-78337
- Rule IDs
-
- SV-207162r945856_rule
- SV-93043
Checks: C-7423r382514_chk
Review the multicast last-hop router configuration to verify that the SPT switchover threshold is increased (default is "0") or set to infinity (never switch over). If any multicast router is not configured to increase the SPT threshold or set to infinity to minimalize (S, G) state, this is a finding.
Fix: F-7423r382515_fix
Configure the multicast router to increase the SPT threshold or set it to infinity to minimalize (S, G) state within the multicast topology where ASM is deployed.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-RTR-000109
- Vuln IDs
-
- V-207163
- V-55785
- Rule IDs
-
- SV-207163r856646_rule
- SV-70039
Checks: C-7424r382517_chk
This requirement is not applicable for the DoDIN Backbone. Review the router configuration to determine if the router allows only incoming communications from authorized sources to be routed to authorized destinations. If the router does not restrict incoming communications to allow only authorized sources and destinations, this is a finding.
Fix: F-7424r382518_fix
This requirement is not applicable for the DoDIN Backbone. Configure the router to allow only incoming communications from authorized sources to be routed to authorized destinations.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-RTR-000110
- Vuln IDs
-
- V-207164
- V-78239
- Rule IDs
-
- SV-207164r856649_rule
- SV-92945
Checks: C-7425r856647_chk
This requirement is not applicable for the DODIN Backbone. Verify that the ingress filter is blocking packets with Bogon source addresses. Review the router configuration to verify that it is configured to block IP packets with a Bogon source address. IPv4 Bogon Prefixes 0.0.0.0/8 10.0.0.0/8 100.64.0.0/10 127.0.0.0/8 169.254.0.0/16 172.16.0.0/12 192.0.0.0/24 192.0.2.0/24 192.88.99.0/24 192.168.0.0/16 198.18.0.0/15 | 198.51.100.0/24 203.0.113.0/24 224.0.0.0/4 240.0.0.0/4 IPv6 Bogon Prefixes ::/128 ::1/128 0::/96 ::ffff:0:0/96 3ffe::/16 64:ff9b::/96 100::/64 2001:10::/28 2001:db8::/32 2001:2::/48 2001::/32 2001::/23 2002::/16 fc00::/7 fec0::/10 ff00::/8 If the router is not configured to block inbound IP packets containing a Bogon source address, this is a finding. Note: At a minimum, IP packets containing a source address from the special purpose address space as defined in RFC 6890 must be blocked. The 6Bone prefix (3ffe::/16) is also be considered a Bogon address. Perimeter routers connected to commercial ISPs for Internet or other non-DoD network sources will need to be reviewed for a full Bogon list. The IPv4 full Bogon list contains prefixes that have been allocated to RIRs but not assigned by those RIRs. Reference the following link: http://www.team-cymru.org/Services/Bogons/fullbogons-ipv4.txt The IPv6 full Bogon list contains prefixes that have not been allocated to RIRs, or those that have been allocated to RIRs but have not been assigned by those RIRs. Reference the following link: https://www.team-cymru.org/Services/Bogons/fullbogons-ipv6.txt
Fix: F-7425r856648_fix
This requirement is not applicable for the DODIN Backbone. Configure the router to block inbound packets with Bogon source addresses.
- RMF Control
- SC-7
- Severity
- L
- CCI
- CCI-002403
- Version
- SRG-NET-000364-RTR-000111
- Vuln IDs
-
- V-207165
- V-78249
- Rule IDs
-
- SV-207165r856650_rule
- SV-92955
Checks: C-7426r382523_chk
This requirement is not applicable for the DoDIN Backbone. Review all router configurations to ensure LLDPs are not included in the global configuration or LLDPs are not included for each active external interface. Examples of LLDPs are Cisco Discovery Protocol (CDP), Link Layer Discovery Protocol (LLDP), and Link Layer Discovery Protocol - Media Endpoint Discovery (LLDP-MED). If LLDPs are configured globally or on any external interface, this is a finding.
Fix: F-7426r382524_fix
This requirement is not applicable for the DoDIN Backbone. Disable LLDPs on all external interfaces.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-RTR-000112
- Vuln IDs
-
- V-207166
- V-78251
- Rule IDs
-
- SV-207166r856651_rule
- SV-92957
Checks: C-7427r382526_chk
This requirement is not applicable for the DoDIN Backbone. Review the router configuration to determine if IP Proxy ARP is disabled on all external interfaces. If IP Proxy ARP is enabled on any external interface, this is a finding.
Fix: F-7427r382527_fix
This requirement is not applicable for the DoDIN Backbone. Disable IP Proxy ARP on all external interfaces.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-RTR-000113
- Vuln IDs
-
- V-207167
- V-78253
- Rule IDs
-
- SV-207167r945857_rule
- SV-92959
Checks: C-7428r382529_chk
This requirement is not applicable for the DoDIN Backbone. The perimeter router of the managed network must be configured with an access control list (ACL) or filter on the egress interface to block all management traffic. If management traffic is not blocked at the perimeter, this is a finding.
Fix: F-7428r382530_fix
This requirement is not applicable for the DoDIN Backbone. Configure the perimeter router of the managed network with an ACL or filter on the egress interface to block all outbound management traffic.
- RMF Control
- SC-7
- Severity
- L
- CCI
- CCI-002403
- Version
- SRG-NET-000364-RTR-000114
- Vuln IDs
-
- V-207168
- V-78331
- Rule IDs
-
- SV-207168r856652_rule
- SV-93037
Checks: C-7429r382532_chk
Review the configuration of the DR to verify that it is filtering IGMP or MLD report messages, allowing hosts to join only those groups that have been approved. Note: This requirement is only applicable to Source Specific Multicast (SSM) implementation. This requirement is not applicable to Any Source Multicast (ASM) since the filtering is being performed by the Rendezvous Point router. If the DR is not filtering IGMP or MLD report messages, this is a finding.
Fix: F-7429r382533_fix
Configure the DR to filter the IGMP and MLD report messages to allow hosts to join only those multicast groups that have been approved.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-RTR-000115
- Vuln IDs
-
- V-207169
- V-78333
- Rule IDs
-
- SV-207169r856653_rule
- SV-93039
Checks: C-7430r382535_chk
Review the configuration of the DR to verify that it is filtering IGMP or MLD report messages, allowing hosts to only join multicast groups from sources that have been approved. Note: This requirement is only applicable to Source Specific Multicast (SSM) implementation If the DR is not filtering IGMP or MLD report messages, this is a finding.
Fix: F-7430r382536_fix
Configure the DR to filter the IGMP and MLD report messages to allow hosts to join only those multicast groups from sources that have been approved.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-RTR-000116
- Vuln IDs
-
- V-207170
- V-78339
- Rule IDs
-
- SV-207170r856654_rule
- SV-93045
Checks: C-7431r382538_chk
Review the router configuration to determine if there is a receive path or interface filter to only accept MSDP packets from known MSDP peers. If the router is not configured to only accept MSDP packets from known MSDP peers, this is a finding.
Fix: F-7431r382539_fix
Ensure the receive path or interface filter for all MSDP routers only accepts MSDP packets from known MSDP peers.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001126
- Version
- SRG-NET-000365-RTR-000112
- Vuln IDs
-
- V-207171
- V-55789
- Rule IDs
-
- SV-207171r604135_rule
- SV-70043
Checks: C-7432r382541_chk
Review the documentation of the router or interview the System Administrator. Verify that the router fails securely in the event of an operational failure. If it cannot fail securely, this is a finding.
Fix: F-7432r382542_fix
This is a capability that would be intrinsic to the router as a result of its development and may not be configurable. If it is a configurable option, configure the device to fail securely in the event of an operational failure.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SRG-NET-000512-RTR-000001
- Vuln IDs
-
- V-207172
- V-78283
- Rule IDs
-
- SV-207172r604135_rule
- SV-92989
Checks: C-7433r382604_chk
Review the router configuration to verify that a loopback address has been configured. Verify that a loopback interface is used as the source address for all iBGP sessions. If the router does not use its loopback address as the source address for all iBGP sessions, this is a finding.
Fix: F-7433r382605_fix
Ensure that the router’s loopback address is used as the source address when originating traffic.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SRG-NET-000512-RTR-000002
- Vuln IDs
-
- V-207173
- V-78285
- Rule IDs
-
- SV-207173r604135_rule
- SV-92991
Checks: C-7434r382607_chk
Review the router configuration to determine if it uses its loopback address as the source address for LDP peering sessions. Verify that a loopback address has been configured as shown in the following example: An MPLS router will use the LDP router ID as the source address for LDP hellos and when establishing TCP sessions with LDP peers; hence, it is necessary to verify that the LDP router ID is the same as the loopback address. By default, routers will assign the LDP router ID using the highest IP address on the router, with preference given to loopback addresses. If the router-id command is specified that overrides this default behavior, verify that it is the IP address of the designated loopback interface. If the router is not configured do use its loopback address for LDP peering, this is a finding.
Fix: F-7434r382608_fix
Configure MPLS routers to use their loopback address as the source address for LDP peering sessions.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SRG-NET-000512-RTR-000003
- Vuln IDs
-
- V-207174
- V-78287
- Rule IDs
-
- SV-207174r604135_rule
- SV-92993
Checks: C-7435r382610_chk
Review the router OSPF or IS-IS configuration. Verify that LDP will synchronize with the link-state routing protocol. If the router is not configured to synchronize IGP and LDP, this is a finding.
Fix: F-7435r382611_fix
Configure the MPLS router to synchronize IGP and LDP, minimizing packet loss when an IGP adjacency is established prior to LDP peers completing label exchange.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-RTR-000004
- Vuln IDs
-
- V-207175
- V-78291
- Rule IDs
-
- SV-207175r604135_rule
- SV-92997
Checks: C-7436r382613_chk
Review the router configuration to verify that TTL propagation is disabled. If the router is not configured to disable TTL propagation, this is a finding.
Fix: F-7436r382614_fix
Configure LERs to disable TTL propagation.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- SRG-NET-000512-RTR-000005
- Vuln IDs
-
- V-207176
- V-78293
- Rule IDs
-
- SV-207176r604135_rule
- SV-92999
Checks: C-7437r382616_chk
Review the design plan for deploying L3VPN and VRF-lite. Review all CE-facing interfaces and verify that the proper VRF is defined. If any VRFs are not bound to the appropriate physical or logical interface, this is a finding.
Fix: F-7437r382617_fix
Configure the PE router to have each VRF bound to the appropriate physical or logical interfaces to maintain traffic separation between all MPLS L3VPNs.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- SRG-NET-000512-RTR-000006
- Vuln IDs
-
- V-207177
- V-78295
- Rule IDs
-
- SV-207177r604135_rule
- SV-93001
Checks: C-7438r382619_chk
Verify that the correct RT is configured for each VRF. Review the design plan for MPLS/L3VPN and VRF-lite to determine what RTs have been assigned for each VRF. Review the route-target import, route-target, or route-target export statements under each configured VRF and verify that the correct RTs have been defined for each VRF. Note: Import and export route-maps are normally used when finer granularity is required. If there are VRFs configured with the wrong RT, this is a finding.
Fix: F-7438r382620_fix
Configure all J-PE routers to have the correct VRF defined with the appropriate RT.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-RTR-000007
- Vuln IDs
-
- V-207178
- V-78297
- Rule IDs
-
- SV-207178r604135_rule
- SV-93003
Checks: C-7439r382622_chk
Review the RDs that have been assigned for each VRF according to the plan provided by the ISSM. Review all VRFs configured on CE-facing interfaces and verify that the proper RD has been configured for each. If the wrong RD has been configured for any VRF, this is a finding.
Fix: F-7439r382623_fix
Configure the correct RD for each VRF.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- SRG-NET-000512-RTR-000008
- Vuln IDs
-
- V-207179
- V-78301
- Rule IDs
-
- SV-207179r604135_rule
- SV-93007
Checks: C-7440r382625_chk
Review the ingress and egress PE router configuration for each virtual circuit that has been provisioned. Verify that the correct and unique VCID has been configured for the appropriate attachment circuit. If the correct VC ID has not been configured on both routers, this is a finding. Note: Ethernet over MPLS in VLAN mode transports Ethernet traffic from a source 802.1Q VLAN to a destination 802.1Q VLAN over a core MPLS network. The VC ID must be unique and the same on each end as it is used to connect the endpoints of the VC.
Fix: F-7440r382626_fix
Assign globally unique VC IDs for each virtual circuit and configure the attachment circuits with the appropriate VC ID. Configure the same VC ID on both ends of the VC.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- SRG-NET-000512-RTR-000009
- Vuln IDs
-
- V-207180
- V-78303
- Rule IDs
-
- SV-207180r604135_rule
- SV-93009
Checks: C-7441r382628_chk
Review the implementation plan and the VPN IDs assigned to customer VLANs for the VPLS deployment. Review the PE router configuration to verify that customer attachment circuits (i.e., VLANs) are associated to the appropriate VFI. If the attachment circuits have not been bound to VFI configured with the assigned VPN ID for each VLAN, this is a finding.
Fix: F-7441r382629_fix
Assign globally unique VPN IDs for each customer VLAN using VPLS for carrier Ethernet services between multiple sites, and configure the attachment circuits to the appropriate VFI.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SRG-NET-000512-RTR-000010
- Vuln IDs
-
- V-207181
- V-78305
- Rule IDs
-
- SV-207181r604135_rule
- SV-93011
Checks: C-7442r382631_chk
Review the PE router configuration to verify that split horizon is enabled. If it is disabled, this is a finding. Note: In a ring VPLS, split horizon is disabled so that a PE router can forward a packet received from one pseudowire to another pseudowire. To prevent the consequential loop, at least one span in the ring would not have a pseudowire for any given VPLS instance.
Fix: F-7442r382632_fix
Enable split horizon on all PE routers deploying VPLS in a full-mesh configuration.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SRG-NET-000512-RTR-000011
- Vuln IDs
-
- V-207182
- V-78349
- Rule IDs
-
- SV-207182r604135_rule
- SV-93055
Checks: C-7443r382634_chk
Review the router configuration to verify that a loopback address has been configured. Verify that a loopback interface is used as the source address for all MSDP packets generated by the router. If the router does not use its loopback address as the source address when originating MSDP traffic, this is a finding.
Fix: F-7443r382635_fix
Ensure that the router’s loopback address is used as the source address when originating traffic.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-RTR-000100
- Vuln IDs
-
- V-216506
- V-100095
- Rule IDs
-
- SV-216506r604135_rule
- SV-109199
Checks: C-17741r382637_chk
Determine if the router is configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs. If it is not configured in accordance with the designated security configuration settings, this is a finding.
Fix: F-17739r382638_fix
Configure the router to be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000131-RTR-000083
- Vuln IDs
-
- V-216978
- V-78211
- Rule IDs
-
- SV-216978r856655_rule
- SV-92917
Checks: C-18208r382640_chk
Verify the call home service is disabled on the device. If a call home service is enabled, this is a finding.
Fix: F-18206r382641_fix
Configure the network device to disable the call home service or feature.
- RMF Control
- SC-7
- Severity
- H
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000014
- Vuln IDs
-
- V-216979
- V-55761
- Rule IDs
-
- SV-216979r945858_rule
- SV-70015
Checks: C-18209r382643_chk
This requirement is not applicable for the DoDIN Backbone. Review the router configuration to verify uRPF or an egress filter has been configured on all internal interfaces to restrict the router from accepting outbound IP packets that contain an illegitimate address in the source address field. If uRPF or an egress filter to restrict the router from accepting outbound IP packets that contain an illegitimate address in the source address field has not been configured on all internal interfaces, this is a finding.
Fix: F-18207r382644_fix
This requirement is not applicable for the DoDIN Backbone. Configure the router to ensure that an egress filter or uRPF is configured to restrict the router from accepting any outbound IP packet that contains an external IP address in the source field.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000015
- Vuln IDs
-
- V-216980
- V-55773
- Rule IDs
-
- SV-216980r945859_rule
- SV-70027
Checks: C-18210r382646_chk
This requirement is not applicable for the DoDIN Backbone. Review the router configuration to determine if it will block all packets with IP options. If the router is not configured to drop all packets with IP options, this is a finding.
Fix: F-18208r382647_fix
This requirement is not applicable for the DoDIN Backbone. Configure the router to drop all packets with IP options.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000205-RTR-000016
- Vuln IDs
-
- V-216981
- V-78317
- Rule IDs
-
- SV-216981r945860_rule
- SV-93023
Checks: C-18211r382649_chk
Review the router configuration to determine if it will block all packets with IP options. If the router is not configured to drop all packets with IP options, this is a finding.
Fix: F-18209r382650_fix
Configure the router to drop all packets with IP options.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001184
- Version
- SRG-NET-000230-RTR-000001
- Vuln IDs
-
- V-216982
- V-55757
- Rule IDs
-
- SV-216982r945861_rule
- SV-70011
Checks: C-18212r382652_chk
Review the router configuration. For every protocol that affects the routing or forwarding tables (where information is exchanged between neighbors), verify that neighbor router authentication is enabled. If authentication is not enabled, this is a finding.
Fix: F-18210r382653_fix
Configure authentication to be enabled for every protocol that affects the routing or forwarding tables.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001184
- Version
- SRG-NET-000230-RTR-000002
- Vuln IDs
-
- V-216983
- V-78265
- Rule IDs
-
- SV-216983r945862_rule
- SV-92971
Checks: C-18213r382655_chk
Interview the ISSM and router administrator to determine if unique keys are being used. If unique keys are not being used, this is a finding.
Fix: F-18211r382656_fix
Configure all eBGP routers with unique keys for each eBGP neighbor that it peers with.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001184
- Version
- SRG-NET-000230-RTR-000003
- Vuln IDs
-
- V-216984
- V-55759
- Rule IDs
-
- SV-216984r945863_rule
- SV-70013
Checks: C-18214r382658_chk
This requirement is not applicable for the DoDIN Backbone. For each authenticated routing protocol session, review the configured key expiration dates. If any key has a lifetime of more than 180 days, this is a finding.
Fix: F-18212r382659_fix
This requirement is not applicable for the DoDIN Backbone. For each authenticated routing protocol session, configure each key to have a lifetime of no more than 180 days.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-002385
- Version
- SRG-NET-000362-RTR-000124
- Vuln IDs
-
- V-216985
- V-55769
- Rule IDs
-
- SV-216985r856661_rule
- SV-70023
Checks: C-18215r382661_chk
Review the router configuration. If the router is not configured to use GTSM for all Exterior Border Gateway Protocol peering sessions, this is a finding.
Fix: F-18213r382662_fix
Configure all Exterior Border Gateway Protocol peering sessions to use GTSM.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SRG-NET-000512-RTR-000012
- Vuln IDs
-
- V-220144
- V-101083
- Rule IDs
-
- SV-220144r604135_rule
- SV-110187
Checks: C-21859r539649_chk
This requirement is not applicable for the DODIN Backbone. Review the router configuration to determine if the hop limit has been configured for Router Advertisement messages. If it has been configured and has not been set to at least 32, it is a finding.
Fix: F-21851r457760_fix
Configure the router to advertise a hop limit of at least 32 in Router Advertisement messages.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-RTR-000013
- Vuln IDs
-
- V-220145
- V-101085
- Rule IDs
-
- SV-220145r604135_rule
- SV-110189
Checks: C-21860r457762_chk
Review the router configuration to ensure FEC0::/10 IP addresses are not defined. If IPv6 Site Local Unicast addresses are defined, this is a finding.
Fix: F-21852r539651_fix
Configure the router using authorized IPv6 addresses.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-RTR-000014
- Vuln IDs
-
- V-220146
- V-101087
- Rule IDs
-
- SV-220146r604135_rule
- SV-110191
Checks: C-21861r457765_chk
This requirement is not applicable for the DODIN Backbone. Review the router configuration to verify Router Advertisements are suppressed on all external IPv6-enabled interfaces. If the router is not configured to suppress Router Advertisements on all external IPv6-enabled interfaces, this is a finding.
Fix: F-21853r457766_fix
Configure the router to suppress Router Advertisements on all external IPv6-enabled interfaces.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-RTR-000200
- Vuln IDs
-
- V-220147
- V-101089
- Rule IDs
-
- SV-220147r950991_rule
- SV-110193
Checks: C-21862r856662_chk
This requirement is not applicable for the DODIN Backbone. Review the router configuration to determine if it is configured to drop IPv6 undetermined transport packets. If the router is not configured to drop IPv6 undetermined transport packets, this is a finding.
Fix: F-21855r457770_fix
Configure the router to drop IPv6 undetermined transport packets.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-RTR-000201
- Vuln IDs
-
- V-220148
- V-101091
- Rule IDs
-
- SV-220148r856665_rule
- SV-110195
Checks: C-21863r856664_chk
This requirement is not applicable for the DODIN Backbone. Review the router configuration to determine if it is configured to drop IPv6 packets containing a Routing Header of type 0, 1, or 3–255. If the router is not configured to drop IPv6 packets containing a Routing Header of type 0, 1, or 3–255, this is a finding.
Fix: F-21856r457774_fix
Configure the router to drop IPv6 packets with Routing Header of type 0, 1, or 3–255.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-RTR-000202
- Vuln IDs
-
- V-220149
- V-101093
- Rule IDs
-
- SV-220149r856667_rule
- SV-110197
Checks: C-21864r856666_chk
This requirement is not applicable for the DODIN Backbone. Review the router configuration to determine if filters are bound to the applicable interfaces to drop IPv6 packets containing a Hop-by-Hop header with option type values of 0x04 (Tunnel Encapsulation Limit), 0xC9 (Home Address Destination), or 0xC3 (NSAP Address). Note: Because hop-by-hop and destination options have the same exact header format, they are combined under the dest-option-type keyword. Since Hop-by-Hop and Destination Option headers have non-overlapping types, the dest-option-type to match either can be used. The Hop-by-Hop and Destination Option headers can be filtered via protocol 0 and 60 respectively. If the router is not configured to drop IPv6 packets containing a Hop-by-Hop header with invalid option type values, this is a finding.
Fix: F-21857r457777_fix
Configure the router to drop IPv6 packets containing a Hop-by-Hop header with option type values of 0x04 (Tunnel Encapsulation Limit), 0xC9 (Home Address Destination), or 0xC3 (NSAP Address).
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-RTR-000203
- Vuln IDs
-
- V-220150
- V-101095
- Rule IDs
-
- SV-220150r856669_rule
- SV-110199
Checks: C-21865r856668_chk
This requirement is not applicable for the DODIN Backbone. Review the router configuration and determine if filters are bound to the external interfaces to drop IPv6 packets containing a Destination Option header with option type values of 0x05 (Router Alert) or 0xC2 (Jumbo Payload). Note: Because Hop-by-Hop and destination options have the same exact header format, they are combined under the dest-option-type keyword. According to Cisco, since Hop-by-Hop and Destination Option headers have non-overlapping types, dest-option-type to match either can be used. The Hop-by-Hop and Destination Option headers can be filtered via protocol 0 and 60 respectively. If the router is not configured to drop IPv6 packets containing a Destination Option header with invalid option type values, this is a finding.
Fix: F-21858r457780_fix
Configure the router to drop IPv6 packets containing a Destination Option header with option type values of 0x05 (Router Alert) or 0xC2 (Jumbo Payload).
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-RTR-000204
- Vuln IDs
-
- V-220151
- V-101097
- Rule IDs
-
- SV-220151r856671_rule
- SV-110201
Checks: C-21866r856670_chk
This requirement is not applicable for the DODIN Backbone. Review the router switch configuration and determine if filters are bound to the applicable interfaces to drop IPv6 packets containing an option type values of 0x8A (Endpoint Identification) regardless of whether it appears in a Hop-by-Hop or Destination Option header. Note: Because hop-by-hop and destination options have the same exact header format, they are combined under the dest-option-type keyword. According to Cisco, since Hop-by-Hop and Destination Option headers have non-overlapping types, dest-option-type to match either can be used. The Hop-by-Hop and Destination Option headers can be filtered via protocol 0 and 60 respectively. If the router is not configured to drop IPv6 packets containing an extension header with the Endpoint Identification option, this is a finding.
Fix: F-21859r457783_fix
Configure the router to drop IPv6 packets containing an option type values of 0x8A (Endpoint Identification) regardless of whether it appears in a Hop-by-Hop or Destination Option header.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-RTR-000205
- Vuln IDs
-
- V-220152
- V-101099
- Rule IDs
-
- SV-220152r856673_rule
- SV-110203
Checks: C-21867r856672_chk
This requirement is not applicable for the DODIN Backbone. Review the router configuration and determine if filters are bound to the applicable interfaces to drop IPv6 packets containing a Destination Option header with option type value of 0xC3 (NSAP address). Note: Because Hop-by-Hop and destination options have the same header format, they are combined under the dest-option-type keyword. According to Cisco, since Hop-by-Hop and Destination Option headers have non-overlapping types, dest-option-type to match either can be used. The Hop-by-Hop and Destination Option headers can be filtered via protocol 0 and 60 respectively. If the router is not configured to drop IPv6 packets containing the NSAP address option within Destination Option header, this is a finding.
Fix: F-21860r457786_fix
Configure the router to drop IPv6 packets containing a Destination Option header with option type value of 0xC3 (NSAP address).
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-RTR-000206
- Vuln IDs
-
- V-220153
- V-101101
- Rule IDs
-
- SV-220153r856675_rule
- SV-110205
Checks: C-21868r856674_chk
This requirement is not applicable for the DODIN Backbone. Review the router configuration and determine if filters are bound to the applicable interfaces to drop all inbound IPv6 packets containing an undefined option type value regardless of whether they appear in a Hop-by-Hop or Destination Option header. Undefined values are 0x02, 0x03, 0x06, 0x9 – 0xE, 0x10 – 0x22, 0x24, 0x25, 0x27 – 0x2F, and 0x31 – 0xFF. If the router is not configured to drop IPv6 packets containing a Hop-by-Hop or Destination Option extension header with an undefined option type, this is a finding.
Fix: F-21861r539656_fix
Configure the router to drop all inbound IPv6 packets containing an undefined option type value regardless of whether or not they appear in a Hop-by-Hop or Destination Option header.
- RMF Control
- Severity
- M
- CCI
- CCI-004866
- Version
- SRG-NET-000705-RTR-000110
- Vuln IDs
-
- V-264309
- Rule IDs
-
- SV-264309r984168_rule
Checks: C-68222r984166_chk
Verify the router is configured to employ organization-defined controls by type of DoS to achieve the DoS objective. If the router is not configured to employ organization-defined controls by type of DoS to achieve the DoS objective, this is a finding.
Fix: F-68130r984167_fix
Configure the router to employ organization-defined controls by type of DoS to achieve the DoS objective.
- RMF Control
- Severity
- M
- CCI
- CCI-004891
- Version
- SRG-NET-000715-RTR-000120
- Vuln IDs
-
- V-264310
- Rule IDs
-
- SV-264310r984171_rule
Checks: C-68223r984169_chk
Verify the router is configured to implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions. If the router is not configured to implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions, this is a finding.
Fix: F-68131r984170_fix
Configure the router to implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions.
- RMF Control
- Severity
- M
- CCI
- CCI-004931
- Version
- SRG-NET-000760-RTR-000160
- Vuln IDs
-
- V-264311
- Rule IDs
-
- SV-264311r984174_rule
Checks: C-68224r984172_chk
Verify the router is configured to establish organization-defined alternate communications paths for system operations organizational command and control. If the router is not configured to establish organization-defined alternate communications paths for system operations organizational command and control, this is a finding.
Fix: F-68132r984173_fix
Configure the router to establish organization-defined alternate communications paths for system operations organizational command and control.