STIGQter STIGQter: STIG Summary: Cisco IOS Router RTR Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 23 Oct 2020:

The Cisco perimeter router must be configured to have Proxy ARP disabled on all external interfaces.

DISA Rule

SV-216586r531085_rule

Vulnerability Number

V-216586

Group Title

SRG-NET-000364-RTR-000112

Rule Version

CISC-RT-000380

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

This requirement is not applicable for the DODIN Backbone.

Disable Proxy ARP on all external interfaces as shown in the example below.

R2(config)#int g0/1
R2(config-if)#no ip proxy-arp

Check Contents

This requirement is not applicable for the DODIN Backbone.

Review the router configuration to determine if IP Proxy ARP is disabled on all external interfaces as shown in the example below.

interface GigabitEthernet0/1
description link to DISN
ip address x.1.12.2 255.255.255.252
no ip proxy-arp

Note: By default Proxy ARP is enabled on all interfaces; hence, if enabled, it will not be shown in the configuration.

If IP Proxy ARP is enabled on any external interface, this is a finding.

Vulnerability Number

V-216586

Documentable

False

Rule Version

CISC-RT-000380

Severity Override Guidance

This requirement is not applicable for the DODIN Backbone.

Review the router configuration to determine if IP Proxy ARP is disabled on all external interfaces as shown in the example below.

interface GigabitEthernet0/1
description link to DISN
ip address x.1.12.2 255.255.255.252
no ip proxy-arp

Note: By default Proxy ARP is enabled on all interfaces; hence, if enabled, it will not be shown in the configuration.

If IP Proxy ARP is enabled on any external interface, this is a finding.

Check Content Reference

M

Target Key

4027

Comments