STIGQter STIGQter: STIG Summary: Cisco NX-OS Switch RTR Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 23 Apr 2021:

The Cisco BGP switch must be configured to use a unique key for each autonomous system (AS) that it peers with.

DISA Rule

SV-221102r622190_rule

Vulnerability Number

V-221102

Group Title

SRG-NET-000230-RTR-000002

Rule Version

CISC-RT-000480

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the switch to use unique keys for each AS that it peers with as shown in the example below:

SW1(config)# router bgp xx
SW1(config-router)# neighbor x.1.12.2
SW1(config-router-neighbor)# password yyyyyyyyy
SW1(config-router-neighbor)# exit
SW1(config-router)# neighbor x.2.44.4
SW1(config-router-neighbor)# password zzzzzzzzzz
SW1(config-router-neighbor)# end

Check Contents

Review the BGP configuration to determine if it is peering with multiple autonomous systems. Interview the ISSM and switch administrator to determine if unique keys are being used.

router bgp xx
router-id 10.1.1.1
neighbor x.1.12.2 remote-as 2
password 3 7b07d1b3023056a9
address-family ipv4 unicast
neighbor x.2.44.4 remote-as xx
password 3 f07a10cb41db8bb6f8f0a340049a9b02
address-family ipv4 unicast

If unique keys are not being used, this is a finding.

Vulnerability Number

V-221102

Documentable

False

Rule Version

CISC-RT-000480

Severity Override Guidance

Review the BGP configuration to determine if it is peering with multiple autonomous systems. Interview the ISSM and switch administrator to determine if unique keys are being used.

router bgp xx
router-id 10.1.1.1
neighbor x.1.12.2 remote-as 2
password 3 7b07d1b3023056a9
address-family ipv4 unicast
neighbor x.2.44.4 remote-as xx
password 3 f07a10cb41db8bb6f8f0a340049a9b02
address-family ipv4 unicast

If unique keys are not being used, this is a finding.

Check Content Reference

M

Target Key

4075

Comments