Router Security Requirements Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
The router must be configured to log all packets that have been dropped.
<VulnDiscussion>Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is ...Rule Low Severity -
SRG-NET-000131
<GroupDescription></GroupDescription>Group -
The router must be configured to have all non-essential capabilities disabled.
<VulnDiscussion>A compromised router introduces risk to the entire network infrastructure, as well as data resources that are accessible via ...Rule Low Severity -
SRG-NET-000168
<GroupDescription></GroupDescription>Group -
The router must be configured to use encryption for routing protocol authentication.
<VulnDiscussion>A rogue router could send a fictitious routing update to convince a site's perimeter router to send traffic to an incorrect o...Rule Medium Severity -
SRG-NET-000168
<GroupDescription></GroupDescription>Group -
The router must be configured to authenticate all routing protocol messages using NIST-validated FIPS 198-1 message authentication code algorithm.
<VulnDiscussion>A rogue router could send a fictitious routing update to convince a site's perimeter router to send traffic to an incorrect o...Rule Medium Severity -
SRG-NET-000192
<GroupDescription></GroupDescription>Group -
The PE router must be configured with Unicast Reverse Path Forwarding (uRPF) loose mode enabled on all CE-facing interfaces..
<VulnDiscussion>The uRPF feature is a defense against spoofing and denial-of-service (DoS) attacks by verifying if the source address of any ...Rule Medium Severity -
SRG-NET-000205
<GroupDescription></GroupDescription>Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.