Skip to content

Cisco IOS XR Router RTR Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-NET-000362-RTR-000114

    Group
  • SRG-NET-000019-RTR-000009

    Group
  • SRG-NET-000018-RTR-000001

    Group
  • SRG-NET-000168-RTR-000078

    Group
  • The Cisco router must be configured to enable routing protocol authentication using FIPS 198-1 algorithms with keys not exceeding 180 days of lifetime.

    A rogue router could send a fictitious routing update to convince a site's perimeter router to send traffic to an incorrect or even a rogue destination. This diverted traffic could be analyzed to l...
    Rule Medium Severity
  • SRG-NET-000019-RTR-000007

    Group
  • SRG-NET-000131-RTR-000035

    Group
  • The Cisco router must be configured to have all non-essential capabilities disabled.

    A compromised router introduces risk to the entire network infrastructure, as well as data resources that are accessible via the network. The perimeter defense has no oversight or control of attack...
    Rule Low Severity
  • SRG-NET-000205-RTR-000001

    Group
  • The Cisco router must be configured to restrict traffic destined to itself.

    The route processor handles traffic destined to the router—the key component used to build forwarding paths and is instrumental with all network management functions. Hence, any disruption or DoS a...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules