SV-221081r622190_rule
V-221081
SRG-NET-000205-RTR-000002
CISC-RT-000140
CAT II
10
Configure the external and internal ACLs to drop all fragmented ICMP packets destined to itself as shown in the example below:
SW1(config)# ip access-list EXTERNAL_ACL
SW1(config-acl)# 35 deny icmp any host x.11.1.2 fragments log
SW1(config-acl)# exit
SW1(config)# ip access-list INTERNAL_ACL
SW1(config-acl)# 25 deny icmp any host 10.1.12.2 fragments log
SW1(config-acl)# end
Note: Ensure the above statement is before any permit statements for ICMP.
Review the external and internal ACLs to verify that the switch is configured drop all fragmented ICMP packets destined to itself.
ip access-list EXTERNAL_ACL
10 permit tcp x.11.1.1/32 eq bgp x.11.1.2/32
20 permit tcp x.11.1.1/32 x.11.1.2/32 eq bgp
30 deny icmp any x.11.1.2/32 fragments log
40 permit icmp x.11.1.1/32 x.11.1.2/32 echo
…
…
…
90 deny ip any any log
ip access-list INTERNAL_ACL
10 deny icmp any host 10.1.12.2/32 fragments
20 permit icmp any any
Note: Ensure the statement to deny ICMP fragments is before any permit statements for ICMP.
If the switch is not configured to drop all fragmented ICMP packets destined to itself, this is a finding.
V-221081
False
CISC-RT-000140
Review the external and internal ACLs to verify that the switch is configured drop all fragmented ICMP packets destined to itself.
ip access-list EXTERNAL_ACL
10 permit tcp x.11.1.1/32 eq bgp x.11.1.2/32
20 permit tcp x.11.1.1/32 x.11.1.2/32 eq bgp
30 deny icmp any x.11.1.2/32 fragments log
40 permit icmp x.11.1.1/32 x.11.1.2/32 echo
…
…
…
90 deny ip any any log
ip access-list INTERNAL_ACL
10 deny icmp any host 10.1.12.2/32 fragments
20 permit icmp any any
Note: Ensure the statement to deny ICMP fragments is before any permit statements for ICMP.
If the switch is not configured to drop all fragmented ICMP packets destined to itself, this is a finding.
M
4075