NET0400 - Interior routing protocols are not authenticated - 'RIPv2 (Key-Chain Check)'

Information

The network element must authenticate all IGP peers.

A rogue router could send a fictitious routing update to convince a site's premise router to send traffic to an incorrect or even a rogue destination. This diverted traffic could be analyzed to learn confidential information of the site's network, or merely used to disrupt the network's ability to effectively communicate with other networks.

NOTE: Change 'RIPv2_KEY_CHAIN' to the key-chain for your organization's EIGRP authentication.
NOTE: RIPv2 not present in the configuration so checks related to RIPv2 authentication are not applicable.

Solution

Configure authentication for all IGP peers.

See Also

https://iasecontent.disa.mil/stigs/zip/U_Network_Perimeter_Router_L3_Switch_V8R32_STIG.zip

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-3, CAT|II, Rule-ID|SV-3034r3_rule, STIG-ID|NET0400, Vuln-ID|V-3034

Plugin: Cisco

Control ID: a0fea0ab702ce669a4a78684acf30364e7f82f1ec6a59a04d1bccfcec5d5516b