STIGQter STIGQter: STIG Summary: Cisco IOS XE Router RTR Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 23 Apr 2021:

The Cisco perimeter router must be configured to have Proxy ARP disabled on all external interfaces.

DISA Rule

SV-216676r531086_rule

Vulnerability Number

V-216676

Group Title

SRG-NET-000364-RTR-000112

Rule Version

CISC-RT-000380

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

This requirement is not applicable for the DODIN Backbone.

Disable Proxy ARP on all external interfaces as shown in the example below:

R2(config)#int g0/1
R2(config-if)#no ip proxy-arp

Check Contents

This requirement is not applicable for the DODIN Backbone.

Review the router configuration to determine if IP Proxy ARP is disabled on all external interfaces as shown in the example below:

interface GigabitEthernet0/1
description link to DISN
ip address x.1.12.2 255.255.255.252
no ip proxy-arp

Note: By default Proxy ARP is enabled on all interfaces; hence, if enabled, it will not be shown in the configuration.

If IP Proxy ARP is enabled on any external interface, this is a finding.

Vulnerability Number

V-216676

Documentable

False

Rule Version

CISC-RT-000380

Severity Override Guidance

This requirement is not applicable for the DODIN Backbone.

Review the router configuration to determine if IP Proxy ARP is disabled on all external interfaces as shown in the example below:

interface GigabitEthernet0/1
description link to DISN
ip address x.1.12.2 255.255.255.252
no ip proxy-arp

Note: By default Proxy ARP is enabled on all interfaces; hence, if enabled, it will not be shown in the configuration.

If IP Proxy ARP is enabled on any external interface, this is a finding.

Check Content Reference

M

Target Key

4028

Comments