Check: CISC-RT-000190
Cisco IOS XR Router RTR STIG:
CISC-RT-000190
(in versions v2 r4 through v1 r0.1)
Title
The Cisco router must be configured to have Internet Control Message Protocol (ICMP) redirect messages disabled on all external interfaces. (Cat II impact)
Discussion
The ICMP supports IP traffic by relaying information about paths, routes, and network conditions. Routers automatically send ICMP messages under a wide variety of conditions. Redirect ICMP messages are commonly used by attackers for network mapping and diagnosis.
Check Content
Review the router configuration to verify that ipv4 redirects command has not been configured on any external interface as shown in the example below. interface GigabitEthernet0/0/0/1 ipv4 address x.11.1.2 255.255.255.252 ipv4 redirects If ICMP Redirect messages are enabled on any external interfaces, this is a finding.
Fix Text
Disable ICMP redirects on all external interfaces as shown in the example below. RP/0/0/CPU0:R3(config)#int g0/0/0/1 RP/0/0/CPU0:R3(config-if)#no ipv4 redirects
Additional Identifiers
Rule ID: SV-216748r856439_rule
Vulnerability ID: V-216748
Group Title: SRG-NET-000362-RTR-000115
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-002385 |
The information system protects against or limits the effects of organization-defined types of denial of service attacks by employing organization-defined security safeguards. |
Controls
Number | Title |
---|---|
SC-5 |
Denial Of Service Protection |