Check: CISC-RT-000190
Cisco IOS XE Router RTR STIG:
CISC-RT-000190
(in versions v2 r9 through v1 r1)
Title
The Cisco router must be configured to have Internet Control Message Protocol (ICMP) redirect messages disabled on all external interfaces. (Cat II impact)
Discussion
The ICMP supports IP traffic by relaying information about paths, routes, and network conditions. Routers automatically send ICMP messages under a wide variety of conditions. Redirect ICMP messages are commonly used by attackers for network mapping and diagnosis.
Check Content
Review the router configuration to verify that the no ip redirects command has been configured on all external interfaces as shown in the example below: interface GigabitEthernet0/1 ip address x.x.x.x 255.255.255.0 no ip redirects If ICMP Redirect messages are enabled on any external interfaces, this is a finding.
Fix Text
Disable ICMP redirects on all external interfaces as shown in the example below: R4(config)#int g0/1 R4(config-if)#no ip redirects
Additional Identifiers
Rule ID: SV-216657r855818_rule
Vulnerability ID: V-216657
Group Title: SRG-NET-000362-RTR-000115
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-002385 |
The information system protects against or limits the effects of organization-defined types of denial of service attacks by employing organization-defined security safeguards. |
Controls
Number | Title |
---|---|
SC-5 |
Denial Of Service Protection |