NET0410 - BGP sessions are not restricted. 'ACL IP Recieve Access-List (ICMP Fragments)'

Information

The administrator will restrict BGP connections to known IP addresses of neighbor routers from trusted Autonomous Systems.

Advertisement of routes by an autonomous system for networks that do not belong to any of its trusted peers pulls traffic away from the authorized network. This causes DoS on the network that allocated the block of addresses and may cause DoS on the network that is inadvertently advertising it as the originator. It is also possible that a misconfigured or compromised router within the network could re-distribute IGP routes into BGP thereby leaking internal routes.

NOTE: Change 'IP_RECEIVE_ACL' to the access control list number for IP receive filtering.
NOTE: The 'IP Receive ACL' feature is currently only supported on 7500 and 12000 series routers with 12.0(24)S and 12.0(22)S.

Solution

The administrator will create ingress ACL to block any unauthorized BGP connection attempts.

See Also

https://iasecontent.disa.mil/stigs/zip/U_Network_Perimeter_Router_L3_Switch_V8R32_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-7(5), CAT|II, Rule-ID|SV-3035r3_rule, STIG-ID|NET0410, Vuln-ID|V-3035

Plugin: Cisco

Control ID: 5600d361579e94cc2eb24278e6117503b64021871e811f07484b21084e209927