NET0960 - Routers are not set to intercept TCP SYN attacks - 'ip tcp intercept list TCP_INTERCEPT_ACL'

Information

The TCP SYN attack involves transmitting a volume of connections that cannot be completed at the destination. This attack causes the connection queues to fill up, thereby denying service to legitimate TCP users.

NOTE: Change 'TCP_INTERCEPT_ACL' to the access control list number for your organization's configuration to intercept TCP SYN attacks. CAVEAT: If the site has implemented SYN flood protection for the network using the perimeter firewall or IPS (or an IDS if it is configured to dynamically configure upstream router to block the attack), there is not an additional requirement to implement it on the router.

Solution

Ensure that the TCP Intercept is used to intercept TCP SYN attacks from outside the network.

See Also

https://iasecontent.disa.mil/stigs/zip/U_Network_Perimeter_Router_L3_Switch_V8R31_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-5, CAT|II, Rule-ID|SV-16143r3_rule, STIG-ID|NET0960, Vuln-ID|V-3165

Plugin: Cisco

Control ID: fa58d6532bf35fd190f5baa2a1c9d04479d83d52c484fd291b6b69d5ec54d443