CISC-RT-000190 - The Cisco switch must be configured to have Internet Control Message Protocol (ICMP) redirect messages disabled on all external interfaces.

Information

The ICMP supports IP traffic by relaying information about paths, routes, and network conditions. Switches automatically send ICMP messages under a wide variety of conditions. Redirect ICMP messages are commonly used by attackers for network mapping and diagnosis.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Disable ICMP redirects on all external interfaces as shown in the example below:

SW1(config)# int e2/7
SW1(config-if)# no ip redirects

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Cisco_NX-OS_Switch_Y24M10_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-5, CAT|II, CCI|CCI-002385, Rule-ID|SV-221085r999694_rule, STIG-ID|CISC-RT-000190, STIG-Legacy|SV-110989, STIG-Legacy|V-101885, Vuln-ID|V-221085

Plugin: Cisco

Control ID: 6b3d4d23bff83a50099a43945d3c6e9dc45a61ab0e1e71a4e7cdfabd18c19b63