NET-IPV6-024 - IPv6 6-to-4 addresses with a prefix of 2002::/16 must be filtered at the perimeter.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

'6-to-4' is a tunneling IPv6 transition mechanism [RFC 3056]. The guidance is the default case, which assumes that 6-to-4 is not being used as an IPv6 transition mechanism. If 6-to-4 is implemented, reference addition 6-to-4 guidance defined in the STIG.

Drop all inbound IPv6 packets containing a source address of type 2002::/16. This assumes the 6-to-4 transition mechanism is not being used.

Drop all inbound IPv6 packets containing a destination address of type 2002::/16. This assumes the 6-to-4 transition mechanism is not being used.

NOTE: Nessus did not detect IPv6 on the Outside interface so this check is not applicable.

Solution

Configure the device using filters to restrict IP addresses that contain any 6-to-4 addresses.

See Also

https://iasecontent.disa.mil/stigs/zip/U_Network_Firewall_V8R24_STIG.zip

Item Details

References: CAT|II, Rule-ID|SV-20160r2_rule, STIG-ID|NET-IPV6-024, Vuln-ID|V-18608

Plugin: Cisco

Control ID: 6e2f2cdad0b5fb885cb40f27c0b34ff43d3c643bd3a66d985c8e0f90c1b0b37b