STIGQter STIGQter: STIG Summary: Cisco IOS Router RTR Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 23 Oct 2020:

The Cisco multicast Designated Router (DR) must be configured to limit the number of mroute states resulting from Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Host Membership Reports.

DISA Rule

SV-216631r531085_rule

Vulnerability Number

V-216631

Group Title

SRG-NET-000362-RTR-000122

Rule Version

CISC-RT-000880

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the DR on a global or interface basis to limit the number of mroute states resulting from IGMP or MLD membership reports.

R3(config)#int g0/0
R3(config-if)#ip igmp limit 2

Check Contents

Review the DR configuration to verify that it is limiting the number of mroute states via IGMP or MLD.

Verify IGMP limits have been configured globally or on each host-facing interface via the ip igmp limit command as shown in the example.

interface GigabitEthernet0/0
ip address 10.3.3.3 255.255.255.0



ip igmp limit nn

If the DR is not limiting multicast join requests via IGMP or MLD on a global or interfaces basis, this is a finding.

Vulnerability Number

V-216631

Documentable

False

Rule Version

CISC-RT-000880

Severity Override Guidance

Review the DR configuration to verify that it is limiting the number of mroute states via IGMP or MLD.

Verify IGMP limits have been configured globally or on each host-facing interface via the ip igmp limit command as shown in the example.

interface GigabitEthernet0/0
ip address 10.3.3.3 255.255.255.0



ip igmp limit nn

If the DR is not limiting multicast join requests via IGMP or MLD on a global or interfaces basis, this is a finding.

Check Content Reference

M

Target Key

4027

Comments