SV-220430r622190_rule
V-220430
SRG-NET-000205-RTR-000002
CISC-RT-000140
CAT II
10
Configure the external and internal ACLs to drop all fragmented ICMP packets destined to itself as shown in the example below:
SW1(config)#ip access-list extended EXTERNAL_ACL
SW1(config-ext-nacl)#deny icmp any host x.11.1.2 fragments
SW1(config)#ip access-list extended INTERNAL_ACL
SW1(config-ext-nacl)#deny icmp any host 10.1.12.2 fragments
Note: Ensure the above statement is before any permit statements for ICMP.
Review the external and internal access control lists (ACLs) to verify that the switch is configured drop all fragmented ICMP packets destined to itself.
ip access-list extended EXTERNAL_ACL
deny icmp any host x.11.1.2 fragments
permit icmp host x.11.1.1 host x.11.1.2 echo
…
…
deny ip any any
!
ip access-list extended INTERNAL_ACL
deny icmp any host 10.1.12.2 fragments
permit icmp any any
Note: Ensure the statement to deny ICMP fragments is before any permit statements for ICMP.
If the switch is not configured to drop all fragmented ICMP packets destined to itself, this is a finding.
V-220430
False
CISC-RT-000140
Review the external and internal access control lists (ACLs) to verify that the switch is configured drop all fragmented ICMP packets destined to itself.
ip access-list extended EXTERNAL_ACL
deny icmp any host x.11.1.2 fragments
permit icmp host x.11.1.1 host x.11.1.2 echo
…
…
deny ip any any
!
ip access-list extended INTERNAL_ACL
deny icmp any host 10.1.12.2 fragments
permit icmp any any
Note: Ensure the statement to deny ICMP fragments is before any permit statements for ICMP.
If the switch is not configured to drop all fragmented ICMP packets destined to itself, this is a finding.
M
4065