STIGQter STIGQter: STIG Summary: Router Security Requirements Guide Version: 4 Release: 2 Benchmark Date: 23 Apr 2021:

The perimeter router must be configured to drop IPv6 packets containing a Destination Option header with invalid option type values.

DISA Rule

SV-220150r604135_rule

Vulnerability Number

V-220150

Group Title

SRG-NET-000364

Rule Version

SRG-NET-000364-RTR-000203

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the router to drop IPv6 packets containing a Destination Option header with option type values of 0x05 (Router Alert) or 0xC2 (Jumbo Payload).

Check Contents

This requirement is not applicable for the DODIN Backbone.

Review the router configuration and determine if filters are bound to the external interfaces to drop IPv6 packets containing a Destination Option header with option type values of 0x05 (Router Alert) or 0xC2 (Jumbo Payload).

Note: Because Hop-by-Hop and destination options have the same exact header format, they are combined under the dest-option-type keyword. According to Cisco, since Hop-by-Hop and Destination Option headers have non-overlapping types, dest-option-type to match either can be used. The Hop-by-Hop and Destination Option headers can be filtered via protocol 0 and 60 respectively.

If the router is not configured to drop IPv6 packets containing a Destination Option header with invalid option type values, this is a finding.

Vulnerability Number

V-220150

Documentable

False

Rule Version

SRG-NET-000364-RTR-000203

Severity Override Guidance

This requirement is not applicable for the DODIN Backbone.

Review the router configuration and determine if filters are bound to the external interfaces to drop IPv6 packets containing a Destination Option header with option type values of 0x05 (Router Alert) or 0xC2 (Jumbo Payload).

Note: Because Hop-by-Hop and destination options have the same exact header format, they are combined under the dest-option-type keyword. According to Cisco, since Hop-by-Hop and Destination Option headers have non-overlapping types, dest-option-type to match either can be used. The Hop-by-Hop and Destination Option headers can be filtered via protocol 0 and 60 respectively.

If the router is not configured to drop IPv6 packets containing a Destination Option header with invalid option type values, this is a finding.

Check Content Reference

M

Target Key

2917

Comments