UCF STIG Viewer Logo

BGP connections must be restricted to authorized IP addresses of neighbors from trusted Autonomous Systems.


Overview

Finding ID Version Rule ID IA Controls Severity
V-3035 NET0410 SV-3035r2_rule ECSC-1 Medium
Description
Advertisement of routes by an autonomous system for networks that do not belong to any of its trusted peers pulls traffic away from the authorized network. This causes DoS on the network that allocated the block of addresses and may cause DoS on the network that is inadvertently advertising it as the originator. It is also possible that a misconfigured or compromised router within the network could re-distribute IGP routes into BGP thereby leaking internal routes.
STIG Date
Perimeter Router Security Technical Implementation Guide 2015-04-03

Details

Check Text ( C-3490r2_chk )
Review the device configuration to ensure that BGP connections are only from known authorized neighbors in a trusted AS by restricting TCP port 179 to specific IP addresses.

If BGP connections aren't restricted to authorized neighbors by IP address and TCP port 179, this is a finding.
Fix Text (F-3060r2_fix)
Create an ingress ACL to block any unauthorized BGP connection attempts.