NET0400 - Interior routing protocols are not authenticated - 'IS-IS (Interface Check - isis authentication mode)'

Information

The network element must authenticate all IGP peers.

A rogue router could send a fictitious routing update to convince a site's premise router to send traffic to an incorrect or even a rogue destination. This diverted traffic could be analyzed to learn confidential information of the site's network, or merely used to disrupt the network's ability to effectively communicate with other networks.

Solution

Configure authentication for all IGP peers.

See Also

https://iasecontent.disa.mil/stigs/zip/U_Network_Perimeter_Router_L3_Switch_V8R32_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-8(1), CAT|II, Rule-ID|SV-3034r3_rule, STIG-ID|NET0400, Vuln-ID|V-3034

Plugin: Cisco

Control ID: a0fea0ab702ce669a4a78684acf30364e7f82f1ec6a59a04d1bccfcec5d5516b