HP FlexFabric Switch RTR STIG Version Comparison
HP FlexFabric Switch RTR Security Technical Implementation Guide
Comparison
There are 1 differences between versions v1 r1 (Feb. 26, 2016) (the "left" version) and v1 r2 (July 24, 2020) (the "right" version).
Check HFFS-RT-000005 was removed from the benchmark in the "right" version. The text below reflects the old wording.
This check's original form is available here.
Text Differences
Title
The HP FlexFabric Switch must restrict BGP connections to known IP addresses from trusted Autonomous Systems (AS).
Check Content
Review the router configuration and compare it against the network documentation (topology diagrams and peering agreements). Verify that each BGP peering session is configured with the correct IP address and remote Autonomous System Number (ASN). If any BGP peering session is not configured with the correct IP address and remote Autonomous System Number (ASN), this is a finding.
Discussion
Advertisement of routes by an Autonomous System for networks that do not belong to any of its trusted peers pulls traffic away from the authorized network. This causes a DoS on the network that allocated the block of addresses and may cause a DoS on the network that is inadvertently advertising it as the originator. It is also possible that a misconfigured or compromised router within the network could redistribute Interior Gateway Protocol routes into Border Gateway Protocol, thereby leaking internal routes.
Fix
Configure each BGP peering session to the specific IP address of the peer router and remote Autonomous System Number (ASN) assigned to the organization controlling that peer.