SV-217060r639663_rule
V-217060
SRG-NET-000362-RTR-000117
JUNI-RT-000540
CAT II
10
Configure the router to use the maximum prefixes feature to protect against route table flooding and prefix de-aggregation attacks as shown in the example below.
[edit protocols bgp group GROUP_AS4]
set family inet unicast prefix-limit maximum nnnnn teardown
Review the router configuration to verify that the number of received prefixes from each eBGP neighbor is controlled.
protocols {
bgp {
group GROUP_AS4 {
type external;
family inet {
unicast {
prefix-limit {
maximum 10;
teardown;
}
}
} peer-as 4;
neighbor x.x.x.x;
}
If the router is not configured to control the number of prefixes received from each peer to protect against route table flooding and prefix de-aggregation attacks, this is a finding.
V-217060
False
JUNI-RT-000540
Review the router configuration to verify that the number of received prefixes from each eBGP neighbor is controlled.
protocols {
bgp {
group GROUP_AS4 {
type external;
family inet {
unicast {
prefix-limit {
maximum 10;
teardown;
}
}
} peer-as 4;
neighbor x.x.x.x;
}
If the router is not configured to control the number of prefixes received from each peer to protect against route table flooding and prefix de-aggregation attacks, this is a finding.
M
4032