STIGQter STIGQter: STIG Summary: Cisco IOS-XE Switch RTR Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 23 Apr 2021:

The Cisco switch must be configured to have Internet Control Message Protocol (ICMP) redirect messages disabled on all external interfaces.

DISA Rule

SV-221002r622190_rule

Vulnerability Number

V-221002

Group Title

SRG-NET-000362-RTR-000115

Rule Version

CISC-RT-000190

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Disable ICMP redirects on all external interfaces as shown in the example below:

SW1(config)#int g0/1
SW1(config-if)#no ip redirects

Check Contents

Review the switch configuration to verify that the no ip redirects command has been configured on all external interfaces as shown in the example below:

interface GigabitEthernet0/1
ip address x.x.x.x 255.255.255.0
no ip redirects

If ICMP Redirect messages are enabled on any external interfaces, this is a finding.

Vulnerability Number

V-221002

Documentable

False

Rule Version

CISC-RT-000190

Severity Override Guidance

Review the switch configuration to verify that the no ip redirects command has been configured on all external interfaces as shown in the example below:

interface GigabitEthernet0/1
ip address x.x.x.x 255.255.255.0
no ip redirects

If ICMP Redirect messages are enabled on any external interfaces, this is a finding.

Check Content Reference

M

Target Key

4074

Comments