Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-216697 | CISC-RT-000590 | SV-216697r531086_rule | Low |
Description |
---|
Using a loopback address as the source address offers a multitude of uses for security, access, management, and scalability of backbone routers. It is easier to construct appropriate ingress filters for router management plane traffic destined to the network management subnet since the source addresses will be from the range used for loopback interfaces instead of from a larger range of addresses used for physical interfaces. Log information recorded by authentication and syslog servers will record the router's loopback address instead of the numerous physical interface addresses. |
STIG | Date |
---|---|
Cisco IOS XE Router RTR Security Technical Implementation Guide | 2023-02-28 |
Check Text ( C-17930r288036_chk ) |
---|
Review the router configuration to determine if it is compliant with this requirement. Verify that a loopback address has been configured as shown in the following example: interface Loopback0 ip address 10.1.1.1 255.255.255.255 By default, routers will use its loopback address for LDP peering. If an address has not be configured on the loopback interface, it will use its physical interface connecting to the LDP peer. If the router-id command is specified that overrides this default behavior, verify that it is a loopback interface as shown in the example below: mpls ldp router-id Loopback0 If the router is not configured to use its loopback address for LDP peering, this is a finding. |
Fix Text (F-17928r288037_fix) |
---|
Configure the router to use their loopback address as the source address for LDP peering sessions. As noted in the check content, the default behavior is to use its loopback address. R4(config)#mpls ldp router-id lo0 |