The Cisco switch must be configured to drop all fragmented Internet Control Message Protocol (ICMP) packets destined to itself.
An XCCDF Rule
Description
Fragmented ICMP packets can be generated by hackers for DoS attacks such as Ping O' Death and Teardrop. It is imperative that all fragmented ICMP packets are dropped.
- ID
- SV-221081r999690_rule
- Version
- CISC-RT-000140
- Severity
- Medium
- References
- Updated
Remediation Templates
A Manual Procedure
Configure the external and internal ACLs to drop all fragmented ICMP packets destined to itself as shown in the example below:
SW1(config)# ip access-list EXTERNAL_ACL
SW1(config-acl)# 35 deny icmp any host x.11.1.2 fragments log
SW1(config-acl)# exit