SV-233294r639663_rule
V-233294
SRG-NET-000364-RTR-000201
JUNI-RT-000382
CAT II
10
Step 1: Configure a filter to block packets with a routing header as shown in the example.
user@R1# edit firewall family inet6
user@R1# edit filter IPV6-INGRESS-FILTER
user@R1# set term ROUTING_HEADER from next-header routing
user@R1# set term ROUTING_HEADER then discard syslog
user@R1# top
Step 2: Apply the filter inbound on all external IPv6-enabled interfaces.
user@R1# edit interfaces ge-0/0/0 unit 0 family inet6
user@R1# set filter input IPV6-INGRESS-FILTER
user@R1# commit
This requirement is not applicable for the DODIN Backbone.
Review the router configuration to determine if it is configured to drop IPv6 packets containing a Routing Header of type 0, 1, or 3-255.
Step 1: Verify that all external IPv6-enabled interfaces have an IPv6 filter as shown in the example below.
interfaces {
ge-0/0/0 {
unit 0 {
family inet6 {
filter {
input IPV6-INGRESS-FILTER;
}
address 2001:1:0:146::1/64;
}
}
}
}
Step 2: Verify that the IPV6 filter blocks all packets with a routing header as shown in the example below.
firewall {
family inet6 {
filter IPV6-INGRESS-FILTER {
term ROUTING_HEADER {
from {
next-header routing;
}
then {
syslog;
discard;
}
}
term ALLOW_TCP_ESTABLISHED {
from {
next-header tcp;
tcp-established;
}
then accept;
}
term DENY_BY_DEFAULT {
then {
syslog;
discard;
}
}
}
}
}
Note: Currently JUNOS has no method to filter option type within a routing header. Hence, all packets with a routing header must be dropped.
If the router is not configured to drop IPv6 packets containing a Routing Header of type 0, 1, or 3-255, this is a finding.
V-233294
False
JUNI-RT-000382
This requirement is not applicable for the DODIN Backbone.
Review the router configuration to determine if it is configured to drop IPv6 packets containing a Routing Header of type 0, 1, or 3-255.
Step 1: Verify that all external IPv6-enabled interfaces have an IPv6 filter as shown in the example below.
interfaces {
ge-0/0/0 {
unit 0 {
family inet6 {
filter {
input IPV6-INGRESS-FILTER;
}
address 2001:1:0:146::1/64;
}
}
}
}
Step 2: Verify that the IPV6 filter blocks all packets with a routing header as shown in the example below.
firewall {
family inet6 {
filter IPV6-INGRESS-FILTER {
term ROUTING_HEADER {
from {
next-header routing;
}
then {
syslog;
discard;
}
}
term ALLOW_TCP_ESTABLISHED {
from {
next-header tcp;
tcp-established;
}
then accept;
}
term DENY_BY_DEFAULT {
then {
syslog;
discard;
}
}
}
}
}
Note: Currently JUNOS has no method to filter option type within a routing header. Hence, all packets with a routing header must be dropped.
If the router is not configured to drop IPv6 packets containing a Routing Header of type 0, 1, or 3-255, this is a finding.
M
4032