STIGQter STIGQter: STIG Summary: Cisco NX-OS Switch RTR Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 23 Apr 2021:

The Cisco Multicast Source Discovery Protocol (MSDP) switch must be configured to limit the amount of source-active messages it accepts on a per-peer basis.

DISA Rule

SV-221146r622190_rule

Vulnerability Number

V-221146

Group Title

SRG-NET-000018-RTR-000009

Rule Version

CISC-RT-000940

Severity

CAT III

CCI(s)

Weight

10

Fix Recommendation

Configure the switch to limit the amount of source-active messages it accepts from each peer.

SW1(config)# ip msdp sa-limit x.1.28.2 nnn
SW1(config)# end

Check Contents

Review the switch configuration to determine if it is configured to limit the amount of source-active messages it accepts on a per-peer basis.

ip msdp peer x.1.28.2 connect-source Ethernet2/1 remote-as nn



ip msdp sa-limit x.1.28.2 nnn

If the switch is not configured to limit the source-active messages it accepts, this is a finding.

Vulnerability Number

V-221146

Documentable

False

Rule Version

CISC-RT-000940

Severity Override Guidance

Review the switch configuration to determine if it is configured to limit the amount of source-active messages it accepts on a per-peer basis.

ip msdp peer x.1.28.2 connect-source Ethernet2/1 remote-as nn



ip msdp sa-limit x.1.28.2 nnn

If the switch is not configured to limit the source-active messages it accepts, this is a finding.

Check Content Reference

M

Target Key

4075

Comments