UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The network device must use its loopback interface address as the source address for all iBGP peering sessions.


Overview

Finding ID Version Rule ID IA Controls Severity
V-14681 NET0903 SV-15357r3_rule ECSC-1 Low
Description
Using a loopback address as the source address offers a multitude of uses for security, access, management, and scalability. It is easier to construct appropriate filters for control plane traffic. Log information recorded by authentication and syslog servers will record the router's loopback address instead of the numerous physical interface addresses.
STIG Date
Perimeter Router Security Technical Implementation Guide 2015-07-01

Details

Check Text ( C-12824r3_chk )
Review the configuration and verify iBGP peering uses the devices loopback interface address as the source address.

If the loopback interface isn't being used as the source address for iBGP peering, this is a finding.
Fix Text (F-14148r3_fix)
Configure the network device's loopback address as the source address for iBGP peering.