STIGQter STIGQter: STIG Summary: Cisco IOS Switch RTR Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 23 Apr 2021:

The Cisco perimeter switch must be configured to have Proxy ARP disabled on all external interfaces.

DISA Rule

SV-220451r622190_rule

Vulnerability Number

V-220451

Group Title

SRG-NET-000364-RTR-000112

Rule Version

CISC-RT-000380

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Disable Proxy ARP on all external interfaces as shown in the example below:

SW1(config)#int g0/1
SW1(config-if)#no ip proxy-arp

Check Contents

Review the switch configuration to determine if IP Proxy ARP is disabled on all external interfaces as shown in the example below:

interface GigabitEthernet0/1
description link to DISN
ip address x.1.12.2 255.255.255.252
no ip proxy-arp

Note: By default, Proxy ARP is enabled on all interfaces; hence, if enabled, it will not be shown in the configuration.

If IP Proxy ARP is enabled on any external interface, this is a finding.

Vulnerability Number

V-220451

Documentable

False

Rule Version

CISC-RT-000380

Severity Override Guidance

Review the switch configuration to determine if IP Proxy ARP is disabled on all external interfaces as shown in the example below:

interface GigabitEthernet0/1
description link to DISN
ip address x.1.12.2 255.255.255.252
no ip proxy-arp

Note: By default, Proxy ARP is enabled on all interfaces; hence, if enabled, it will not be shown in the configuration.

If IP Proxy ARP is enabled on any external interface, this is a finding.

Check Content Reference

M

Target Key

4065

Comments