Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-14681 | NET0903 | SV-15357r2_rule | ECSC-1 | Low |
Description |
---|
Using a loopback address as the source address offers a multitude of uses for security, access, management, and scalability. It is easier to construct appropriate filters for control plane traffic. Log information recorded by authentication and syslog servers will record the router’s loopback address instead of the numerous physical interface addresses. |
STIG | Date |
---|---|
Infrastructure Router Security Technical Implementation Guide | 2013-10-08 |
Check Text ( C-12824r2_chk ) |
---|
Review the configuration and verify iBGP peering uses the router's loopback interface address as the source address. |
Fix Text (F-14148r2_fix) |
---|
Ensure the router’s loopback address is used as the source address for iBGP peering. |