Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-14681 | NET0903 | SV-15359r2_rule | Low |
Description |
---|
Using a loopback address as the source address offers a multitude of uses for security, access, management, and scalability. It is easier to construct appropriate filters for control plane traffic. Log information recorded by authentication and syslog servers will record the router’s loopback address instead of the numerous physical interface addresses. |
STIG | Date |
---|---|
Perimeter L3 Switch Security Technical Implementation Guide - Cisco | 2017-03-09 |
Check Text ( C-12826r2_chk ) |
---|
Verify that the peering session with iBGP neighbors use the loopback address as the source address as shown in the example below: interface loopback 0 ip address 10.10.2.1 255.255.255.255 … router bgp 100 neighbor 200.200.200.2 remote-as 200 neighbor 188.20.120.2 remote-as 144 neighbor 10.10.2.2 remote-as 100 neighbor 10.10.2.2 update-source Loopback0 neighbor 10.10.2.3 remote-as 100 neighbor 10.10.2.3 update-source Loopback0 |
Fix Text (F-14148r3_fix) |
---|
Configure the network device's loopback address as the source address for iBGP peering. |