Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-18633 | NET-TUNL-001 | SV-20197r4_rule | ECSC-1 | Medium |
Description |
---|
There are a number of outdated tunneling schemes that should be blocked to avoid importing IPv6 packets. DoD IPv6 IA Guidance for MO3 (S0-C7-2) has identified the following to be blocked at the perimeter: Source Demand Routing Protocol (SDRP) AX.25 IP-within-IP Encapsulation Protocol EtherIP protocol Encapsulation Header Protocol PPTP |
STIG | Date |
---|---|
Perimeter L3 Switch Security Technical Implementation Guide | 2017-03-09 |
Check Text ( C-44243r2_chk ) |
---|
Review the network device configuration and determine if filters are bound to the applicable interfaces to drop all inbound and outbound IPv4 or IPv6 packets with any of the following tunneling protocols: Source Demand Routing Protocol (SDRP) - protocol field value of 0x2A (42) AX.25 - protocol field value of 0x5D (93) IP-within-IP Encapsulation Protocol - protocol field value of 0x5E (94) EtherIP protocol - protocol field value of 0x61 (97) Encapsulation Header Protocol - protocol field value of 0x62 (98) PPTP - TCP or UDP destination port (0x06BB) 1723 If the appropriate filters are not configured and applied, this is a finding. |
Fix Text (F-19260r3_fix) |
---|
Configure the network device to drop all inbound and outbound IPv4 or IPv6 packets with any of the following tunneling protocols: Source Demand Routing Protocol (SDRP) - protocol field value of 0x2A (42) AX.25 - protocol field value of 0x5D (93) IP-within-IP Encapsulation Protocol - protocol field value of 0x5E (94) EtherIP protocol - protocol field value of 0x61 (97) Encapsulation Header Protocol - protocol field value of 0x62 (98) PPTP - TCP or UDP destination port (0x06BB) 1723 |