STIGQter STIGQter: STIG Summary: Cisco NX-OS Switch RTR Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 23 Apr 2021:

The Cisco multicast Designated switch (DR) must be configured to limit the number of mroute states resulting from Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Host Membership Reports.

DISA Rule

SV-221140r622190_rule

Vulnerability Number

V-221140

Group Title

SRG-NET-000362-RTR-000122

Rule Version

CISC-RT-000880

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the DR on a global or interface basis to limit the number of mroute states resulting from IGMP or MLD membership reports.

SW1(config)# int e2/4
SW1(config-if)# ip igmp state-limit 44
SW1(config-if)# end

Check Contents

Review the DR configuration to verify that it is limiting the number of mroute states via IGMP or MLD.

Verify IGMP state limits have been configured on all applicable interfaces as shown in the example below:

interface Ethernet2/4
no switchport
ip address 10.2.22.3/24
ip pim sparse-mode
ip igmp version 3
ip igmp state-limit nnn

If the DR is not limiting multicast join requests via IGMP or MLD on all applicable interfaces, this is a finding.

Vulnerability Number

V-221140

Documentable

False

Rule Version

CISC-RT-000880

Severity Override Guidance

Review the DR configuration to verify that it is limiting the number of mroute states via IGMP or MLD.

Verify IGMP state limits have been configured on all applicable interfaces as shown in the example below:

interface Ethernet2/4
no switchport
ip address 10.2.22.3/24
ip pim sparse-mode
ip igmp version 3
ip igmp state-limit nnn

If the DR is not limiting multicast join requests via IGMP or MLD on all applicable interfaces, this is a finding.

Check Content Reference

M

Target Key

4075

Comments