NET0903 - Loopback address is not used as the iBGP source IP

Information

The router must use its loopback interface address as the source address for all iBGP peering sessions.

Using a loopback address as the source address offers a multitude of uses for security, access, management, and scalability. It is easier to construct appropriate filters for control plane traffic. Log information recorded by authentication and syslog servers will record the router's loopback address instead of the numerous physical interface addresses.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.
NOTE: This check requires manual verfication to ensure all configured peering sessions with iBGP neighbors use the loopback address as the source address as shown in the example below:

router bgp 100
neighbor 10.10.2.2 remote-as 100
neighbor 10.10.2.2 update-source Loopback0

Solution

Ensure the router's loopback address is used as the source address for iBGP peering.

See Also

https://iasecontent.disa.mil/stigs/zip/U_Network_Infrastructure_Router_L3_Switch_V8R29_STIG.zip

Item Details

References: CAT|III, Rule-ID|SV-15359r2_rule, STIG-ID|NET0903, Vuln-ID|V-14681

Plugin: Cisco

Control ID: be6cf0ff61fe8c819ebbafd000dddc2454cef199e0509629c158aa42fdb7426d