NET-IPV6-027 - IPv6 Loopback ADDR is not blocked by the enclave

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

The network element must be configured restrict to accept the device from accepting any inbound IP packets with a local host loop back address, (0-0-0-0-0-0-0-1 or --1/128).

The unicast address 0-0-0-0-0-0-0-1, also defined --1/128 is called the loopback address. A node could use it to send an IPv6 packet to itself. It should never be assigned to any physical interface. It is treated as having link-local scope, and may be thought of as the link-local unicast address of a virtual interface to an imaginary link that goes nowhere. The loopback address must not be used as the source address in IPv6 packets that are sent outside of a single node. An IPv6 packet with a destination address of loopback must never be sent outside of a single node and must never be forwarded by an IPv6 router. A packet received on an interface with destination address of loopback must be dropped.

NOTE: Change 'IPV6_INGRESS_ACL' to the access control list for IPv6 inbound connection filtering.

Solution

The administrator will configure the router ACLs to restrict IP addresses that contain any Loopback addresses.

See Also

https://iasecontent.disa.mil/stigs/zip/U_Network_Perimeter_Router_L3_Switch_V8R32_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-7, CAT|I, Rule-ID|SV-15401r2_rule, STIG-ID|NET-IPV6-027, Vuln-ID|V-14695

Plugin: Cisco

Control ID: f69ba607b900137b53acaec2465a24ca3225ac527939ed057aff0f09448d7c5f