Cisco IOS Router RTR Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-NET-000364-RTR-000112
Group -
The Cisco perimeter router must be configured to have Proxy ARP disabled on all external interfaces.
When Proxy ARP is enabled on a router, it allows that router to extend the network (at Layer 2) across multiple interfaces (LAN segments). Because proxy ARP allows hosts from different LAN segments...Rule Medium Severity -
SRG-NET-000364-RTR-000113
Group -
The Cisco perimeter router must be configured to block all outbound management traffic.
For in-band management, the management network must have its own subnet in order to enforce control and access boundaries provided by Layer 3 network nodes, such as routers and firewalls. Managemen...Rule Medium Severity -
SRG-NET-000205-RTR-000009
Group -
SRG-NET-000205-RTR-000010
Group -
The Cisco out-of-band management (OOBM) gateway router must be configured to forward only authorized management traffic to the Network Operations Center (NOC).
The OOBM network is an IP network used exclusively for the transport of OAM&P data from the network being managed to the OSS components located at the NOC. Its design provides connectivity to each ...Rule Medium Severity -
SRG-NET-000019-RTR-000011
Group -
The Cisco out-of-band management (OOBM) gateway router must be configured to have separate IGP instances for the managed network and management network.
If the gateway router is not a dedicated device for the OOBM network, implementation of several safeguards for containment of management and production traffic boundaries must occur. Since the mana...Rule Medium Severity -
SRG-NET-000019-RTR-000012
Group -
The Cisco out-of-band management (OOBM) gateway router must be configured to not redistribute routes between the management network routing domain and the managed network routing domain.
If the gateway router is not a dedicated device for the OOBM network, several safeguards must be implemented for containment of management and production traffic boundaries; otherwise, it is possib...Rule Medium Severity -
SRG-NET-000205-RTR-000011
Group -
The Cisco out-of-band management (OOBM) gateway router must be configured to block any traffic destined to itself that is not sourced from the OOBM network or the Network Operations Center (NOC).
If the gateway router is not a dedicated device for the OOBM network, several safeguards must be implemented for containment of management and production traffic boundaries. It is imperative that h...Rule Medium Severity -
SRG-NET-000205-RTR-000012
Group -
SRG-NET-000205-RTR-000013
Group -
The Cisco router providing connectivity to the Network Operations Center (NOC) must be configured to forward all in-band management traffic via an IPsec tunnel.
When the production network is managed in-band, the management network could be housed at a NOC that is located remotely at single or multiple interconnected sites. NOC interconnectivity, as well a...Rule Medium Severity -
SRG-NET-000018-RTR-000002
Group -
The Cisco BGP router must be configured to reject inbound route advertisements for any Bogon prefixes.
Accepting route advertisements for Bogon prefixes can result in the local autonomous system (AS) becoming a transit for malicious traffic as it will in turn advertise these prefixes to neighbor aut...Rule Medium Severity -
SRG-NET-000018-RTR-000003
Group -
The Cisco BGP router must be configured to reject inbound route advertisements for any prefixes belonging to the local autonomous system (AS).
Accepting route advertisements belonging to the local AS can result in traffic looping or being black holed, or at a minimum using a non-optimized path.Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.