UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The network element must authenticate all IGP peers.


Overview

Finding ID Version Rule ID IA Controls Severity
V-3034 NET0400 SV-15290r2_rule ECSC-1 Medium
Description
A rogue router could send a fictitious routing update to convince a site’s premise router to send traffic to an incorrect or even a rogue destination. This diverted traffic could be analyzed to learn confidential information of the site’s network, or merely used to disrupt the network’s ability to effectively communicate with other networks.
STIG Date
Perimeter Router Security Technical Implementation Guide Cisco 2015-04-06

Details

Check Text ( C-3489r4_chk )
Review the device configuration to determine if authentication is configured for all IGP peers.

If authentication is not configured for all IGP peers, this is a finding.
Fix Text (F-3059r3_fix)
Configure authentication for all IGP peers.