STIGQter STIGQter: STIG Summary: Cisco IOS XR Router RTR Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 23 Oct 2020:

The Cisco Multicast Source Discovery Protocol (MSDP) router must be configured to authenticate all received MSDP packets.

DISA Rule

SV-216819r531087_rule

Vulnerability Number

V-216819

Group Title

SRG-NET-000343-RTR-000002

Rule Version

CISC-RT-000910

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the router to authenticate MSDP messages as shown in the following example:

RP/0/0/CPU0:R2(config)#router msdp
RP/0/0/CPU0:R2(config-msdp)#peer x.14.2.1
RP/0/0/CPU0:R2(config-msdp-peer)#password clear xxxxxxxxxxxx
RP/0/0/CPU0:R2(config-msdp-peer)#exit
RP/0/0/CPU0:R2(config-msdp)#peer x.15.3.5
RP/0/0/CPU0:R2(config-msdp-peer)#password clear xxxxxxxxxxx
RP/0/0/CPU0:R2(config-msdp-peer)#end

Check Contents

Review the router configuration to determine if received MSDP packets are authenticated.

router msdp
peer x.14.2.1
password encrypted 094E410B1B1C
remote-as nn
!
peer x.15.3.5
password encrypted 04500A140A2F
remote-as nn
!
!

If the router does not require MSDP authentication, this is a finding.

Vulnerability Number

V-216819

Documentable

False

Rule Version

CISC-RT-000910

Severity Override Guidance

Review the router configuration to determine if received MSDP packets are authenticated.

router msdp
peer x.14.2.1
password encrypted 094E410B1B1C
remote-as nn
!
peer x.15.3.5
password encrypted 04500A140A2F
remote-as nn
!
!

If the router does not require MSDP authentication, this is a finding.

Check Content Reference

M

Target Key

4029

Comments