SV-216562r531085_rule
V-216562
SRG-NET-000205-RTR-000002
CISC-RT-000140
CAT II
10
Configure the external and internal ACLs to drop all fragmented ICMP packets destined to itself as shown in the example below.
R1(config)#ip access-list extended EXTERNAL_ACL
R1(config-ext-nacl)#deny icmp any host x.11.1.2 fragments
R1(config)#ip access-list extended INTERNAL_ACL
R1(config-ext-nacl)#deny icmp any host 10.1.12.2 fragments
Note: Ensure the above statement is before any permit statements for ICMP.
Review the external and internal ACLs to verify that the router is configured to drop all fragmented ICMP packets destined to itself.
ip access-list extended EXTERNAL_ACL
permit tcp host x.11.1.1 eq bgp host x.11.1.2
permit tcp host x.11.1.1 host x.11.1.2 eq bgp
deny icmp any host x.11.1.2 fragments
permit icmp host x.11.1.1 host x.11.1.2 echo
…
…
deny ip any any
!
ip access-list extended INTERNAL_ACL
deny icmp any host 10.1.12.2 fragments
permit icmp any any
Note: Ensure the statement to deny ICMP fragments is before any permit statements for ICMP.
If the router is not configured to drop all fragmented ICMP packets destined to itself, this is a finding.
V-216562
False
CISC-RT-000140
Review the external and internal ACLs to verify that the router is configured to drop all fragmented ICMP packets destined to itself.
ip access-list extended EXTERNAL_ACL
permit tcp host x.11.1.1 eq bgp host x.11.1.2
permit tcp host x.11.1.1 host x.11.1.2 eq bgp
deny icmp any host x.11.1.2 fragments
permit icmp host x.11.1.1 host x.11.1.2 echo
…
…
deny ip any any
!
ip access-list extended INTERNAL_ACL
deny icmp any host 10.1.12.2 fragments
permit icmp any any
Note: Ensure the statement to deny ICMP fragments is before any permit statements for ICMP.
If the router is not configured to drop all fragmented ICMP packets destined to itself, this is a finding.
M
4027