STIGQter STIGQter: STIG Summary: Cisco IOS Router RTR Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 23 Oct 2020:

The Cisco PE router must be configured with Unicast Reverse Path Forwarding (uRPF) loose mode enabled on all CE-facing interfaces.

DISA Rule

SV-216617r531085_rule

Vulnerability Number

V-216617

Group Title

SRG-NET-000205-RTR-000008

Rule Version

CISC-RT-000740

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure uRPF loose mode on all CE-facing interfaces as shown in the example below.

R2(config)#int R4(config)#int g0/2
R2(config-if)#ip verify unicast source reachable-via any
R2(config-if)#end

Check Contents

Review the router configuration to determine if uRPF loose mode is enabled on all CE-facing interfaces.

interface GigabitEthernet0/2
ip address x.1.12.2 255.255.255.252
ip access-group BLOCK_TO_CORE in
ip verify unicast source reachable-via any

If uRPF loose mode is not enabled on all CE-facing interfaces, this is a finding.

Vulnerability Number

V-216617

Documentable

False

Rule Version

CISC-RT-000740

Severity Override Guidance

Review the router configuration to determine if uRPF loose mode is enabled on all CE-facing interfaces.

interface GigabitEthernet0/2
ip address x.1.12.2 255.255.255.252
ip access-group BLOCK_TO_CORE in
ip verify unicast source reachable-via any

If uRPF loose mode is not enabled on all CE-facing interfaces, this is a finding.

Check Content Reference

M

Target Key

4027

Comments