STIGQter STIGQter: STIG Summary: Router Security Requirements Guide Version: 4 Release: 2 Benchmark Date: 23 Apr 2021:

The BGP router must be configured to use the maximum prefixes feature to protect against route table flooding and prefix de-aggregation attacks.

DISA Rule

SV-207156r604135_rule

Vulnerability Number

V-207156

Group Title

SRG-NET-000362

Rule Version

SRG-NET-000362-RTR-000117

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure all eBGP routers to use the maximum prefixes feature to protect against route table flooding and prefix de-aggregation attacks.

Check Contents

Review the router configuration to verify that the number of received prefixes from each eBGP neighbor is controlled.

If the router is not configured to control the number of prefixes received from each peer to protect against route table flooding and prefix de-aggregation attacks, this is a finding.

Vulnerability Number

V-207156

Documentable

False

Rule Version

SRG-NET-000362-RTR-000117

Severity Override Guidance

Review the router configuration to verify that the number of received prefixes from each eBGP neighbor is controlled.

If the router is not configured to control the number of prefixes received from each peer to protect against route table flooding and prefix de-aggregation attacks, this is a finding.

Check Content Reference

M

Target Key

2917

Comments