STIGQter STIGQter: STIG Summary: Cisco IOS XE Router RTR Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 23 Apr 2021:

The Cisco perimeter router must be configured to drop IPv6 packets containing a Destination Option header with invalid option type values.

DISA Rule

SV-230150r647443_rule

Vulnerability Number

V-230150

Group Title

SRG-NET-000364-RTR-000203

Rule Version

CISC-RT-000395

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the router to drop IPv6 packets containing a Destination Option header with option type values of 0x05 (Router Alert) or 0xC2 (Jumbo Payload) as shown in the example below.
R1(config)#ipv6 access-list FILTER_IPV6
R1(config-ipv6-acl)#deny 60 any any dest-option-type 5 log
R1(config-ipv6-acl)#deny 60 any any dest-option-type 194 log
R1(config-ipv6-acl)#permit …



R1(config-ipv6-acl)#deny ipv6 any any log
R1(config-ipv6-acl)#exit
R1(config)#int g1/0
R1(config-if)#ipv6 traffic-filter FILTER_IPV6
R1(config-if)#end

Check Contents

This requirement is not applicable for the DODIN Backbone.

Review the router configuration to determine if it is compliant with this requirement.

Step 1: Verify that an inbound IPv6 ACL has been configured on the external interface.

interface gigabitethernet1/0
ipv6 address 2001::1:0:22/64
ipv6 traffic-filter FILTER_IPV6 in

Step 2: Verify that the ACL drops IPv6 packets containing a Destination Option header with option type values of 0x05 (Router Alert) or 0xC2 (Jumbo Payload) as shown in the example below.

ipv6 access-list FILTER_IPV6
deny 60 any any dest-option-type 5 log
deny 60 any any dest-option-type 194 log
permit ipv6 …



deny ipv6 any any log

If the router is not configured to drop IPv6 packets containing a Destination Option header with option type values of 0x05 (Router Alert) or 0xC2 (Jumbo Payload), this is a finding.

Vulnerability Number

V-230150

Documentable

False

Rule Version

CISC-RT-000395

Severity Override Guidance

This requirement is not applicable for the DODIN Backbone.

Review the router configuration to determine if it is compliant with this requirement.

Step 1: Verify that an inbound IPv6 ACL has been configured on the external interface.

interface gigabitethernet1/0
ipv6 address 2001::1:0:22/64
ipv6 traffic-filter FILTER_IPV6 in

Step 2: Verify that the ACL drops IPv6 packets containing a Destination Option header with option type values of 0x05 (Router Alert) or 0xC2 (Jumbo Payload) as shown in the example below.

ipv6 access-list FILTER_IPV6
deny 60 any any dest-option-type 5 log
deny 60 any any dest-option-type 194 log
permit ipv6 …



deny ipv6 any any log

If the router is not configured to drop IPv6 packets containing a Destination Option header with option type values of 0x05 (Router Alert) or 0xC2 (Jumbo Payload), this is a finding.

Check Content Reference

M

Target Key

4028

Comments