CISC-RT-000391 - The Cisco perimeter switch must be configured to suppress Router Advertisements on all external IPv6-enabled interfaces.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Many of the known attacks in stateless autoconfiguration are defined in RFC 3756 were present in IPv4 ARP attacks. To mitigate these vulnerabilities, links that have no hosts connected such as the interface connecting to external gateways must be configured to suppress router advertisements.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Configure the switch to suppress Router Advertisements on all external IPv6-enabled interfaces as shown in the example below.

SW1(config)# interface e1/1
SW1(config-if-range)# ipv6 nd suppress-ra
SW1(config-if-range)# end

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Cisco_NX-OS_Switch_Y24M04_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000366, Rule-ID|SV-237760r648795_rule, STIG-ID|CISC-RT-000391, Vuln-ID|V-237760

Plugin: Cisco

Control ID: 4f4c38b2ce002c876c04a82895736b192193775538c2da0f91903ded7c5dc947