III - Administrative Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-NET-000019
<GroupDescription></GroupDescription>Group -
The multicast Rendezvous Point (RP) router must be configured to filter Protocol Independent Multicast (PIM) Register messages received from the Designated Router (DR) for any undesirable multicast groups and sources.
<VulnDiscussion>Real-time multicast traffic can entail multiple large flows of data. An attacker can flood a network segment with multicast p...Rule Low Severity -
SRG-NET-000019
<GroupDescription></GroupDescription>Group -
The multicast Rendezvous Point (RP) router must be configured to filter Protocol Independent Multicast (PIM) Join messages received from the Designated Router (DR) for any undesirable multicast groups.
<VulnDiscussion>Real-time multicast traffic can entail multiple large flows of data. An attacker can flood a network segment with multicast p...Rule Low Severity -
SRG-NET-000076
<GroupDescription></GroupDescription>Group -
The router must be configured to produce audit records containing information to establish where the events occurred.
<VulnDiscussion>Without establishing where events occurred, it is impossible to establish, correlate, and investigate the events leading up t...Rule Medium Severity -
SRG-NET-000077
<GroupDescription></GroupDescription>Group -
The router must be configured to produce audit records containing information to establish the source of the events.
<VulnDiscussion>Without establishing the source of the event, it is impossible to establish, correlate, and investigate the events leading up...Rule Medium Severity -
SRG-NET-000078
<GroupDescription></GroupDescription>Group -
The router must be configured to log all packets that have been dropped.
<VulnDiscussion>Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is ...Rule Low Severity -
SRG-NET-000131
<GroupDescription></GroupDescription>Group -
The router must be configured to have all non-essential capabilities disabled.
<VulnDiscussion>A compromised router introduces risk to the entire network infrastructure, as well as data resources that are accessible via ...Rule Low Severity -
SRG-NET-000168
<GroupDescription></GroupDescription>Group -
The router must be configured to use encryption for routing protocol authentication.
<VulnDiscussion>A rogue router could send a fictitious routing update to convince a site's perimeter router to send traffic to an incorrect o...Rule Medium Severity -
SRG-NET-000168
<GroupDescription></GroupDescription>Group -
The router must be configured to authenticate all routing protocol messages using NIST-validated FIPS 198-1 message authentication code algorithm.
<VulnDiscussion>A rogue router could send a fictitious routing update to convince a site's perimeter router to send traffic to an incorrect o...Rule Medium Severity -
SRG-NET-000192
<GroupDescription></GroupDescription>Group -
The PE router must be configured to limit the number of MAC addresses it can learn for each Virtual Private LAN Services (VPLS) bridge domain.
<VulnDiscussion>VPLS defines an architecture that delivers Ethernet multipoint services over an MPLS network. Customer Layer 2 frames are for...Rule Medium Severity -
SRG-NET-000193
<GroupDescription></GroupDescription>Group -
The MPLS router with RSVP-TE enabled must be configured with message pacing or refresh reduction to adjust maximum number of RSVP messages to an output queue based on the link speed and input queue size of adjacent core routers.
<VulnDiscussion>RSVP-TE can be used to perform constraint-based routing when building LSP tunnels within the network core that will support Q...Rule Low Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.