STIGQter STIGQter: STIG Summary: Cisco IOS XR Router RTR Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 23 Oct 2020:

The Cisco Multicast Source Discovery Protocol (MSDP) router must be configured to limit the amount of source-active messages it accepts on a per-peer basis.

DISA Rule

SV-216822r531087_rule

Vulnerability Number

V-216822

Group Title

SRG-NET-000018-RTR-000009

Rule Version

CISC-RT-000940

Severity

CAT III

CCI(s)

Weight

10

Fix Recommendation

Configure the router to limit the amount of source-active messages it accepts from each peer.

RP/0/0/CPU0:R2(config)#router msdp
RP/0/0/CPU0:R2(config-msdp)#peer x.14.2.1
RP/0/0/CPU0:R2(config-msdp-peer)#maximum external-sa nnn
RP/0/0/CPU0:R2(config-msdp-peer)#exit
RP/0/0/CPU0:R2(config-msdp)#peer x.15.3.5
RP/0/0/CPU0:R2(config-msdp-peer)#maximum external-sa nnn
RP/0/0/CPU0:R2(config-msdp-peer)#end

Check Contents

Review the router configuration to determine if it is configured to limit the amount of source-active messages it accepts on a per-peer basis.

router msdp



peer 4.4.4.4
remote-as 33
maximum external-sa 555
!
peer 5.5.5.5
remote-as 44
maximum external-sa 555
!
!

If the router is not configured to limit the source-active messages it accepts, this is a finding.

Vulnerability Number

V-216822

Documentable

False

Rule Version

CISC-RT-000940

Severity Override Guidance

Review the router configuration to determine if it is configured to limit the amount of source-active messages it accepts on a per-peer basis.

router msdp



peer 4.4.4.4
remote-as 33
maximum external-sa 555
!
peer 5.5.5.5
remote-as 44
maximum external-sa 555
!
!

If the router is not configured to limit the source-active messages it accepts, this is a finding.

Check Content Reference

M

Target Key

4029

Comments