Cisco IOS XR Router RTR Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-NET-000205-RTR-000002
Group -
The Cisco router must be configured to drop all fragmented Internet Control Message Protocol (ICMP) packets destined to itself.
Fragmented ICMP packets can be generated by hackers for DoS attacks such as Ping O' Death and Teardrop. It is imperative that all fragmented ICMP packets are dropped.Rule Medium Severity -
SRG-NET-000362-RTR-000112
Group -
SRG-NET-000362-RTR-000113
Group -
SRG-NET-000362-RTR-000115
Group -
The Cisco router must be configured to have Internet Control Message Protocol (ICMP) redirect messages disabled on all external interfaces.
The ICMP supports IP traffic by relaying information about paths, routes, and network conditions. Routers automatically send ICMP messages under a wide variety of conditions. Redirect ICMP messages...Rule Medium Severity -
SRG-NET-000078-RTR-000001
Group -
The Cisco router must be configured to log all packets that have been dropped at interfaces via ACL.
Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done or attempted to be done, and by whom, to compile an accurate ...Rule Low Severity -
SRG-NET-000076-RTR-000001
Group -
SRG-NET-000077-RTR-000001
Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.