NET-IPV6-035 - IPv6 Jumbo Payload hop by hop header must be blocked.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

The IPv6 Jumbo Payload allows IP packets to be larger than 65,535 bytes. This feature is only useful on very specialized high performance systems (e.g. super computers). Common place link layer technologies do not support these payload sizes and special link layer designs would be necessary. This header should be dropped unless the system is specifically designed to use very large payloads, since it only serves as an opportunity to break implementations.

NOTE: Nessus did not perform this check as manual review is required. Determine if your device and software version support IPv6 ACL Extensions for Hop by Hop Filtering. You may use the Cisco Feature Navigator for assistance.

Solution

Configure the firewall to drop all inbound and/or outbound IPv6 packets containing a hop-by-hop option of option type 0xC2.

See Also

https://iasecontent.disa.mil/stigs/zip/U_Network_Firewall_V8R24_STIG.zip

Item Details

References: CAT|II, Rule-ID|SV-20551r2_rule, STIG-ID|NET-IPV6-035, Vuln-ID|V-18815

Plugin: Cisco

Control ID: 40967579d531f6443d2899982782332c0cd9ea98de8a5bb86b1260d48f5f692b