Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-14637 | NET-IPV6-004 | SV-15262r3_rule | DCBP-1 ECSC-1 | Medium |
Description |
---|
Many of the known attacks in stateless autoconfiguration are defined in RFC 3756 were present in IPv4 ARP attacks. IPSec AH was originally suggested as mitigation for the link local attacks, but has since been found to have bootstrapping problems and to be very administrative intensive. Due to first requiring an IP address in order to set up the IPSec security association creates the chicken-before-the-egg dilemma. There are solutions being developed (Secure Neighbor Discovery and Cryptographic Generated Addressing) to secure these threats but are not currently available at the time of this writing. To mitigate these vulnerabilities, links that have no hosts connected such as the interface connecting to external gateways will be configured to suppress router advertisements. Disable (or do not configure) all IPv6 Neighbor Discovery functions across tunnels including the Neighbor Unreachability Detection (NUD) function. Note: this is applicable only when the inner IP layer is IPv6 since IPv4 does not have the Neighbor Discovery functionality. |
STIG | Date |
---|---|
Firewall Security Technical Implementation Guide - Cisco | 2017-12-07 |
Check Text ( C-12653r5_chk ) |
---|
Inspect the device configuration to validate IPv6 router advertisement suppression is enabled on all external-facing interfaces. This is applicable to all IPv6-enabled interfaces connected to an IP backbone (i.e. NIPRNet, SIPRNet, etc.), backdoor link, or an alternate gateway (AG). If router advertisements are not suppressed on external facing IPv6 interfaces, this is a finding. |
Fix Text (F-14099r2_fix) |
---|
Configure the network device to enable route advertisement suppression on all external facing have IPv6 enabled on the interface. |