Router Security Requirements Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-NET-000364
<GroupDescription></GroupDescription>Group -
The perimeter router must be configured to block all outbound management traffic.
<VulnDiscussion>For in-band management, the management network must have its own subnet in order to enforce control and access boundaries pro...Rule Medium Severity -
SRG-NET-000364
<GroupDescription></GroupDescription>Group -
The multicast Designated Router (DR) must be configured to filter the Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Report messages to allow hosts to join only multicast groups that have been approved by the organization.
<VulnDiscussion>Real-time multicast traffic can entail multiple large flows of data. Large unicast flows tend to be fairly isolated (i.e., so...Rule Low Severity -
SRG-NET-000364
<GroupDescription></GroupDescription>Group -
The multicast Designated Router (DR) must be configured to filter the Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Report messages to allow hosts to join a multicast group only from sources that have been approved by the organization.
<VulnDiscussion>Real-time multicast traffic can entail multiple large flows of data. Large unicast flows tend to be fairly isolated (i.e., so...Rule Medium Severity -
SRG-NET-000364
<GroupDescription></GroupDescription>Group -
The Multicast Source Discovery Protocol (MSDP) router must be configured to only accept MSDP packets from known MSDP peers.
<VulnDiscussion>MSDP peering with customer network routers presents additional risks to the DISN Core, whether from a rogue or misconfigured ...Rule Medium Severity -
SRG-NET-000365
<GroupDescription></GroupDescription>Group -
The router must be configured to fail securely in the event of an operational failure.
<VulnDiscussion>If the router fails in an unsecure manner (open), unauthorized traffic originating externally to the enclave may enter or the...Rule Medium Severity -
SRG-NET-000512
<GroupDescription></GroupDescription>Group -
The BGP router must be configured to use its loopback address as the source address for iBGP peering sessions.
<VulnDiscussion>Using a loopback address as the source address offers a multitude of uses for security, access, management, and scalability o...Rule Low Severity -
SRG-NET-000512
<GroupDescription></GroupDescription>Group -
The MPLS router must be configured to use its loopback address as the source address for LDP peering sessions.
<VulnDiscussion>Using a loopback address as the source address offers a multitude of uses for security, access, management, and scalability o...Rule Low Severity -
SRG-NET-000512
<GroupDescription></GroupDescription>Group -
The MPLS router must be configured to synchronize IGP and LDP to minimize packet loss when an IGP adjacency is established prior to LDP peers completing label exchange.
<VulnDiscussion>Packet loss can occur when an IGP adjacency is established and the router begins forwarding packets using the new adjacency b...Rule Low Severity -
SRG-NET-000512
<GroupDescription></GroupDescription>Group -
The MPLS router must be configured to have TTL Propagation disabled.
<VulnDiscussion>The head end of the label-switched path (LSP), the label edge router (LER) will decrement the IP packet's time-to-live (TTL) ...Rule Medium Severity -
SRG-NET-000512
<GroupDescription></GroupDescription>Group -
The PE router must be configured to have each Virtual Routing and Forwarding (VRF) instance bound to the appropriate physical or logical interfaces to maintain traffic separation between all MPLS L3VPNs.
<VulnDiscussion>The primary security model for an MPLS L3VPN infrastructure is traffic separation. The service provider must guarantee the cu...Rule High Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.