STIGQter STIGQter: STIG Summary: Cisco IOS Router RTR Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 23 Oct 2020:

The Cisco Multicast Source Discovery Protocol (MSDP) router must be configured to limit the amount of source-active messages it accepts on a per-peer basis.

DISA Rule

SV-216637r531085_rule

Vulnerability Number

V-216637

Group Title

SRG-NET-000018-RTR-000009

Rule Version

CISC-RT-000940

Severity

CAT III

CCI(s)

Weight

10

Fix Recommendation

Configure the router to limit the amount of source-active messages it accepts from each peer.

R8(config)#ip msdp sa-limit x.1.28.2 nnn

Check Contents

Review the router configuration to determine if it is configured to limit the amount of source-active messages it accepts on a per-peer basis.

ip msdp peer x.1.28.2 remote-as nn
ip msdp sa-filter in 10.1.28.2 list MSDP_SA_FILTER
ip msdp sa-limit X.1.28.2 nnn

If the router is not configured to limit the source-active messages it accepts, this is a finding.

Vulnerability Number

V-216637

Documentable

False

Rule Version

CISC-RT-000940

Severity Override Guidance

Review the router configuration to determine if it is configured to limit the amount of source-active messages it accepts on a per-peer basis.

ip msdp peer x.1.28.2 remote-as nn
ip msdp sa-filter in 10.1.28.2 list MSDP_SA_FILTER
ip msdp sa-limit X.1.28.2 nnn

If the router is not configured to limit the source-active messages it accepts, this is a finding.

Check Content Reference

M

Target Key

4027

Comments