UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The network element must authenticate all IGP peers.


Overview

Finding ID Version Rule ID IA Controls Severity
V-3034 NET0400 SV-3034r2_rule ECSC-1 Medium
Description
A rogue router could send a fictitious routing update to convince a site’s premise router to send traffic to an incorrect or even a rogue destination. This diverted traffic could be analyzed to learn confidential information of the site’s network, or merely used to disrupt the network’s ability to effectively communicate with other networks.
STIG Date
Infrastructure Router Security Technical Implementation Guide 2013-10-08

Details

Check Text ( C-3489r3_chk )
Ensure authentication is implemented for IGP peers.
Fix Text (F-3059r3_fix)
Configure authentication for all IGP peers.