NET0924 - IPv4 Link-local address is not blocked

Information

Inbound IP packets using link-local address space (169.254.0.0/16) must be blocked, denied, or dropped at the perimeter device.

This type of IP address spoofing occurs when someone outside the network uses a link-local address to gain access to systems or devices on the internal network. If the intruder is successful, they can intercept data, passwords, etc., and use that information to perform destructive acts on or to the network.

NOTE: Depending on the security posture of the access control list, this requirement may be met explicitly or implicitly.
NOTE: Change 'AG_INGRESS_ACL_1' to the access-list IP standard access list number for your organization.

Solution

Configure the perimeter device to ensure access control lists are configured to block, deny, or drop inbound IP addresses using the local host IP address space of 169.254.0.0/16. Depending on the security posture of the access control list, this requirement may be met explicitly or inexplicitly.

See Also

https://iasecontent.disa.mil/stigs/zip/U_Network_Perimeter_Router_L3_Switch_V8R32_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-7, CAT|I, Rule-ID|SV-15386r2_rule, STIG-ID|NET0924, Vuln-ID|V-14690

Plugin: Cisco

Control ID: 4828876833f3e466aea640078923743d20ba000cd3ca0b8e1aefd619469ed956